Techniques using identifiers and signatures with data operations

作者: Matthew R. McDANIEL , Arthur Beaverson

DOI:

关键词:

摘要: Described are techniques for representing a data segment comprising. A list of one or more tokens portions included in the is received. unique identifier uniquely identifying said from other segments signature value determined accordance with and The tokens, identifier, stored as information corresponding to segment.

参考文章(8)
Paul Francis Rieth, Jeffrey Scott Stevens, CRC hash compressed server object identifier ,(1997)
Athicha Muthitacharoen, Benjie Chen, David Mazières, A low-bandwidth network file system symposium on operating systems principles. ,vol. 35, pp. 174- 187 ,(2001) , 10.1145/502034.502052
Gregory R. Ganger, Brandon Salmon, Eno Thereska, A Two-Tiered Software Architecture for Automated Tuning of Disk Layouts ,(2003)
Gregory Hagan Moulton, Stephen B. Whitehill, Hash file system and method for use in a commonality factoring system ,(2001)
Douglas Comer, None, Ubiquitous B-Tree ACM Computing Surveys. ,vol. 11, pp. 121- 137 ,(1979) , 10.1145/356770.356776
Matthew R. McDANIEL, Michael W. Healey, Arthur Beaverson, Techniques for performing a restoration operation using device scanning ,(2006)