20 results on '"ELECTRONIC file management"'
Search Results
2. Research for Practice: Crash Consistency: Keeping data safe in the presence of crashes is a fundamental problem.
- Author
-
ALAGAPPAN, RAMNATTHAN
- Subjects
- *
COMPUTER system failures , *COMPUTER system failure prevention , *COMPUTER storage capacity , *APPLICATION software , *ELECTRONIC file management , *COMPUTERS - Abstract
This article discusses system crashes and how each level of the system needs to be implemented correctly and the system component interfaces need to be used correctly by applications in order to prevent crashes. Several papers are cited within this article exploring the file system, a lower level component within the system, an exploration of interface-level guarantees with bug-finders, crash-consistent programs, and how the newer concept of persistent memory interacts with system crashes.
- Published
- 2023
- Full Text
- View/download PDF
3. Efficient I/O Merging Scheme for Distributed File Systems.
- Author
-
An, Byoung Chul and Sung, Hanul
- Subjects
- *
SCALABILITY , *METADATA , *ELECTRONIC file management - Abstract
Recently, decentralized file systems are widely used to overcome centralized file systems' load asymmetry between nodes and the scalability problem. Due to the lack of a metadata server, decentralized systems require more RPC requests to control metadata processing between clients and servers, which adversely impacts the I/O performance and traffic imbalance by increasing RPC latency. In this paper, we propose an efficient I/O scheme to reduce the RPC overhead in decentralized file systems. Instead of sending a single RPC request at a time, we enqueued the RPCs in the global queue and merged them into larger RPC requests, thus avoiding excessive RPC latency overheads. The experimental results showed that our scheme improves write and read performance by up to 13% and 16%, respectively, compared with those of the original. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Fast and Low Overhead Metadata Operations for NVM-Based File System Using Slotted Paging.
- Author
-
Lin, Fangzhu, Xiao, Chunhua, Liu, Weichen, Wu, Lin, Shi, Chen, and Ning, Kun
- Subjects
- *
ELECTRONIC file management , *METADATA , *NONVOLATILE memory , *DYNAMIC random access memory , *EDIBLE fats & oils , *JOURNAL writing , *ELECTRIC breakdown - Abstract
Existing nonvolatile memory (NVM)-based file systems can fully leverage the characteristics of NVM to obtain better performance than traditional disk-based file systems. It has the potential capacity to efficiently manage metadata and perform fast metadata operations. However, most NVM-based file systems mainly focus on managing file metadata (inode), while pay little attention to directory metadata (dentry), which also has a noticeable impact on the file system performance. Besides, the traditional journaling technique that guarantees metadata consistency may not yield satisfactory performance on NVM-based file systems. To solve these problems, in this article we propose a fast and low overhead metadata operation mechanism, called FLOMO. It first adopts a novel slotted-paging structure in NVM to reorganize dentry for efficiently performing dentry operations, and utilizes the red–black tree in DRAM to accelerate dentry lookup and the search process of dentry deletion. Moreover, FLOMO presents a selective journaling scheme for metadata updates, which partially logs the changes related to dentry in the proposed slotted page, thereby, mitigating the redundant journaling overhead. To verify FLOMO, we implement it in a typical NVM-based file system, the persistent memory file system (PMFS). Experimental results show that FLOMO accelerates the metadata operations in PMFS by 34.4% $\sim 59$ %, and notably reduces the journaling overhead for metadata, shortening the latency by 59% on average. For real-world applications, FLOMO has higher throughput compared with PMFS, PMFS without journal, and NOVA, achieving up to $2.1\times $ , $1.1\times $ , and $1.3\times $ performance improvement, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
5. A Research on the Sharing Platform of Wild Bird Data in Yunnan Province Based on Blockchain and Interstellar File System.
- Author
-
Yang, Huaiyuan, Li, Yucheng, Zhou, Hua, Zhao, Yili, and Song, Lei
- Subjects
- *
BLOCKCHAINS , *DATA warehousing , *ELECTRONIC data processing , *ACCESS control , *ELECTRONIC file management , *INFORMATION sharing - Abstract
Sharing scientific data is an effective means to rationally exploit scientific data and is vital to promote the development of the industrial chain and improve the level of science and technology. In recent years, the popularity of the open data platform has increased, but problems remain, including imperfect system architecture, unsound privacy and security, and non-standardized interaction data. To address these problems, the blockchain's decentralization, smart contracts, distributed storage, and other features can be used as the core technology for open data systems. This paper addresses the problems of opening, allocation-right confirmation, sharing, and rational use of wild-bird data from Yunnan Province, China. A data storage model is proposed based on the blockchain and interstellar file system and is applied to wild-bird data to overcome the mutual distrust between ornithology institutions in the collaborative processing and data storage of bird data. The model provides secure storage and secure access control of bird data in the cloud, thereby ensuring the decentralized and secure storage of wild-bird data for multiple research institutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. Editorial: On My Way In III: It's Not All About Me: Writing a Cover Letter for an Academic Position; In This Issue; In This Issue – Reviews.
- Subjects
- *
COVER letters , *TEACHERS , *JOB vacancies , *JOB applications , *ELECTRONIC file management - Abstract
In this article, the author offers suggestions for writing a cover letter for an academic position. It mentions cover letter as a genre of academic writing means recognizing that it presents an opportunity to make an argument and cover letters show that the applicant has considered the needs of the hiring institution. It also mentions tempting to take a cover letter off the shelf and out of the electronic files.
- Published
- 2022
- Full Text
- View/download PDF
7. Cross‐Analysis of Researchers' Different Shared File Management Activities in Cloud Storage.
- Subjects
- *
ELECTRONIC file management , *CLOUD storage , *INTERNET surveys , *INFORMATION resources management , *PERSONAL information management - Abstract
Using cloud storage for collaborative projects has become common practice among researchers. However, despite its popularity, we lack an understanding of researchers' shared file management practices in cloud storage. More importantly, although researchers engage in various shared file management activities (i.e., create, update, organize, find/re‐find, keep, archive, and delete) in cloud storage, no studies have comparatively investigated these activities. Based on 475 responses from researchers collected through an online survey, this study examined researchers' different shared file management activities by focusing on the differences in the frequency, perceived ease of use, and satisfaction for each activity, and identified well‐supported activities as well as activities that require increased support. This study deepens our understanding of researchers' shared file management practice in cloud storage by cross‐examining an array of shared file management activities, and contributes to the development of tools and applications that better support researchers' shared file management in cloud storage. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Survey on Various Cloud Security Approaches.
- Author
-
Sagar, K. V. Daya, Sri, P. S. G. Aruna, Krishna, Chinta Venkata Murali, BRAHMMESWARA, BALA, and Sakhamuri, Sridevi
- Subjects
- *
CLOUD computing , *DATA plans , *ELECTRONIC file management , *CLOUD storage , *AUDITING - Abstract
Cloud computing plays a significant role in effective data handling based on the increase in data usage in various realtime applications. Data auditing is performed on certain files and the authenticator with deduplication. It addresses the problem of key management to deduce the file content based on the malicious activities performed on the cloud. So, based on effective auditing of the integrity of the data and authenticator, the data is checked properly and minimizes the overhead of cloud storage overhead. In this work, the cloud audit and authenticator approach is proposed based on a certain file system, which makes the malicious user get authenticate the data auditing verification as the existing algorithm has low security based on entropy. They propose a data auditing approach that integrates with file management and the authenticator of data deduplication. The proposed approach performs the authenticator process and new form of file tag, which helps guarantee effective security based on the random generation of message key. The proposed approach achieves minimum computational overhead based on the authenticator and data block generation in the performance analysis. Then the security verification is performed on various attacks, such as brute force attack, a man-in-the-middle attack, etc., to check whether the approach is safe or unsafe against the attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
9. How Big Are Peoples' Computer Files? File Size Distributions Among User‐managed Collections.
- Author
-
Dinneen, Jesse David and Nguyen, Ba Xuan
- Subjects
- *
ELECTRONIC file management , *PERSONAL information management , *INFORMATION resources management , *HUMAN-computer interaction , *DEMOGRAPHIC surveys - Abstract
Improving file management interfaces and optimising system performance requires current data about users' digital collections and particularly about the file size distributions of such collections. However, prior works have examined only the sizes of system files and users' work files in varied contexts, and there has been no such study since 2013; it therefore remains unclear how today's file sizes are distributed, particularly personal files, and further if distributions differ among the major operating systems or common occupations. Here we examine such differences among 49 million files in 348 user collections. We find that the average file size has grown more than ten‐fold since the mid‐2000s, though most files are still under 8 MB, and that there are demographic and technological influences in the size distributions. We discuss the implications for user interfaces, system optimisation, and PIM research. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
10. montage: NVM-based scalable synchronization framework for crash-consistent file systems.
- Author
-
Sul, Woong, Yeom, Heon Y., and Han, Hyuck
- Subjects
- *
DESIGN exhibitions , *SYNCHRONIZATION , *DATA warehousing , *METADATA , *SCALABILITY , *ELECTRONIC file management , *ATOMIC displacements - Abstract
In file systems, a single write system call can make multiple modifications to data and metadata, but such changes are not flushed in an atomic way. To retain the consistency of file systems, conventional approaches guarantee crash consistency in exchange for sacrificing system performance. To mitigate the performance penalty, non-volatile memory (NVM) technologies are believed to be a good candidate for this purpose owing to their low latency and byte-addressibility. However, none of the prior proposals that exploit NVM provide both scalability and strict ordering of modifications. In this article, we propose montage, a crash consistency framework for file systems that consists of two parts. First, montage splits NVM space into multiple staging areas and synchronizes the flushing of modifications these to the storage device. Second, montage uses the pipelined architecture to speed up data flushing to storage. We apply montage to two journaling file systems (ext4 and JFS) and evaluate them on a multicore server with high-performance storage. The evaluation results demonstrate that our design exhibits better performance by a wide margin than recent NVM-based journaling file systems. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
11. Image Steganography-Based GUI Design to Hide Agricultural Data.
- Author
-
SOLAK, Serdar and ALTINISIK, Umut
- Subjects
- *
COMPUTER engineering , *SIGNAL-to-noise ratio , *DATA transmission systems , *CRYPTOGRAPHY , *ELECTRONIC file management , *GRAPHICAL user interfaces , *ALGORITHMS - Abstract
Throughout the ages, safely preserving and transmitting data that have extraordinary importance for humanity has increased its importance with rapid advances in computer technology. Steganography stores hidden data within the files, which are unnoticed by third parties, so it provides secure transmission of data to the receiver. In this study, a steganography-based GUI design has been carried out, which ensures that the agricultural data is safely stored and communicated to the other party. We used LSB one-bit, two-bit, three-bit substitution and PVD algorithms with GUI for stages of agricultural data hiding and extracting at cover images. We also provided extra security using the embedded key and shifting operations on the hidden data before hiding data the cover image. In short, we confused the hidden data in the cover image so that malicious people can't understand. In experimental studies, performance analysis was evaluated by comparing various criteria as similarity ratio (Structural Similarity Index Measure, SSIM), stego image quality (Peak Signal-to-Noise Ratio, PSNR) and data hiding capacity (Payload). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
12. A functional BCI model by the IEEE P2731 working group: data storage and sharing.
- Author
-
Bianchi, Luigi, Antonietti, Alberto, Bajwa, Garima, Ferrante, Raffaele, Mahmud, Mufti, and Balachandran, Pradeep
- Subjects
- *
INFORMATION sharing , *GROUP process , *DATA warehousing , *ELECTRONIC file management , *OPTICAL disks - Abstract
The IEEE P2731 working group is in the process of developing a functional model so that virtually any BCI system could be described according to it. In this paper, we want to stimulate the discussion for the definition and selection of the information that should be stored in a file for effectively allowing the sharing of BCI data and tools amongst researchers. Establishing these requirements and procedures will accelerate BCI development and lay the foundation for accessible and scalable BCI technology as well as provide the foundations for the definition of a standard file format. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. Enhancing HDFS with a full-text search system for massive small files.
- Author
-
Xu, Wentao, Zhao, Xin, Lao, Bin, and Nong, Ge
- Subjects
- *
TEXT files , *RECORDS management , *METADATA , *ELECTRONIC file management - Abstract
HDFS is a popular open-source system for scalable and reliable file management, which is designed as a general-purpose solution for distributed file storage. While it works well for medium or large files, it will suffer heavy performance degradations in case of lots of small files. To overcome this drawback, we propose here a system to enhance HDFS with a distributed true full-text search system SAES of 100% recall and precision ratios. By indexing the meta data of each file, e.g., name, size, date and description, files can be quickly accessed by efficient searches over metadata. Moreover, by merging many small files into a large file to be stored with better space and I/O efficiencies, the negative performance impacts caused by directly storing each small file individually are avoided. An experimental study is conducted for function and performance tests on both realistic and artificial data. The experimental results show that the system works well for file operations such as uploading, downloading and deleting. Moreover, the RAM consumption for managing massive small files is dramatically reduced, which is critical for good system performance. The proposed system could be a potential storage solution for massive small files. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
14. AB+DM: TWINNING.
- Author
-
TSOMONDO, DZANA
- Subjects
- *
PHOTOGRAPHY , *WIT & humor , *ELECTRONIC file management , *PALETTE (Color range) , *ARTISTS - Published
- 2021
15. Five Rules to Remember When Practicing Before the JPML.
- Author
-
Harkins, Steven
- Subjects
- *
ELECTRONIC file management , *CIVIL procedure - Abstract
Below are five rules to remember when practicing before the JPML: • Right to Appear -Any attorney authorized to practice before any federal district court may appear before the JPML with one important caveat-the attorney must maintain a case management and electronic court filing account. July 2, 2022 The Judicial Panel on Multidistrict Litigation (JPML) serves as the clearinghouse for a huge portion of the federal caseload. [Extracted from the article]
- Published
- 2022
16. A novel file system supporting rich file classification.
- Author
-
Albadri, Nehad and Dekeyser, Stijn
- Subjects
- *
APPLICATION program interfaces , *ELECTRONIC file management , *PROGRAMMING languages , *CLASSIFICATION - Abstract
Existing implementations of file systems often seem to be made on an ad hoc and implicit basis. This paper aims to enhance the organization of files and retrieval of files by modifying the traditional hierarchical file system to improve built-in query support and bulk metadata updates supported at the file system level. We introduce tags in a hierarchy of file collections and use links to allow file retrieval from multiple paths as files exist in multiple directories simultaneously. By using a series of modest changes to the hierarchical file system, we propose a novel Linked Tree Tags (LTTs) model. These changes include using multiple tags instead of names, collections instead of directories, exposing a query language at the Application Programming Interface (API) level, and allowing controlled file links. We assess our model's expressive capability and demonstrate that LTTs overcome traditional file systems' limits and provide users with the to manage their files easily. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Legal and technical questions of file system reverse engineering.
- Author
-
Stoykova, Radina, Nordvik, Rune, Ahmed, Munnazzar, Franke, Katrin, Axelsson, Stefan, and Toolan, Fergus
- Subjects
- *
REVERSE engineering , *ELECTRONIC file management , *LAW enforcement , *CRIMINAL investigation , *INTELLECTUAL property - Abstract
Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition, and correct interpretation of data structures by law enforcement in criminal investigations. This position paper examines emerging techno-legal challenges from the practice of reverse engineering for law enforcement purposes. We demonstrate that this new context creates uncertainties about the legality of tools and methods used for evidence acquisition and the compliance of law enforcement with obligations to protect intellectual property and confidential information. Further identified are gaps between legal provisions and practice related to disclosure and peer-review of sensitive digital forensic methodology, trade secrets in investigations, and governmental vulnerability disclosure. It is demonstrated that reverse engineering of file systems is insufficiently addressed by legislators, which results in a lack of file system interpretation and validation information for law enforcement and their dependence on tools. Outlined are recommendations for further developments of digital forensic regulation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. A penalty function semi-continuous thresholding methods for constraints of hashing problems.
- Author
-
Chen, Qian, Shen, Zhengwei, and Chen, Zhe
- Subjects
- *
HASHING , *IMAGE retrieval , *ALGORITHMS , *ORTHOGONAL functions , *ELECTRONIC file management - Abstract
The Hashing process is an effective tool for handling large-scale data (for example, images, videos, or multi-model data) retrieval problems. To get better retrieval accuracy, hashing models usually are imposed with three rigorous constraints, i.e., discrete binary constraint, uncorrelated condition, and the balanced constraint, which will lead to being 'NP-hard'. In this study, we divide the whole constraints set into the uncorrelated (orthogonality) constraint and the binary discrete balance constraint and propose a fast and accurate penalty function semi-continuous thresholding (PFSCT) hash coding algorithm based on forward–backward algorithms. In addition, we theoretically analyze the equivalence between the relaxed model and the original problems. Extensive numerical experiments on diverse large-scale benchmark datasets demonstrate comparable performance and effectiveness of the proposed method. • A fast and accurate penalty function semi-continuous thresholding (PFSCT) hash coding algorithm based on forward–backward algorithms is established in the work, by dividing the whole constraints set into the uncorrelated (orthogonality) constraint and the binary discrete balance constraint. • We theoretically analyze the equivalence between the relaxed model and the original problems. • Extensive numerical experiments on diverse large-scale benchmark datasets, including Cifar10, NUS-WIDE and SUN397, demonstrate comparable performance and effectiveness of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Legal and technical questions of file system reverse engineering.
- Author
-
Stoykova, Radina, Nordvik, Rune, Ahmed, Munnazzar, Franke, Katrin, Axelsson, Stefan, and Toolan, Fergus
- Subjects
- *
REVERSE engineering , *ELECTRONIC file management , *LAW enforcement , *CRIMINAL investigation , *INTELLECTUAL property - Abstract
Reverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition, and correct interpretation of data structures by law enforcement in criminal investigations. This position paper examines emerging techno-legal challenges from the practice of reverse engineering for law enforcement purposes. We demonstrate that this new context creates uncertainties about the legality of tools and methods used for evidence acquisition and the compliance of law enforcement with obligations to protect intellectual property and confidential information. Further identified are gaps between legal provisions and practice related to disclosure and peer-review of sensitive digital forensic methodology, trade secrets in investigations, and governmental vulnerability disclosure. It is demonstrated that reverse engineering of file systems is insufficiently addressed by legislators, which results in a lack of file system interpretation and validation information for law enforcement and their dependence on tools. Outlined are recommendations for further developments of digital forensic regulation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Brought to you by the ACRL ULS Technology in University Libraries Committee.
- Author
-
Fuller, Ann
- Subjects
- *
ELECTRONIC file management - Abstract
The article focuses on TheBrain, a dynamic mind map for intelligent note-taking which is a nonlinear file management system that visualizes ideas and the relationships between ideas.
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.