enter search term and/or author name
Authentication and integrity in outsourced databases
Einar Mykletun, Maithili Narasimha, Gene Tsudik
In the Outsourced Database (ODB) model, entities outsource their data management needs to a third-party service provider. Such a service provider offers mechanisms for its clients to create, store, update, and access (query) their databases. This...
Using MEMS-based storage in computer systems---device modeling and management
Scott A. Brandt, Bo Hong, Darrell D. E. Long, Ying Lin, Ethan L. Miller
MEMS-based storage is an emerging nonvolatile secondary storage technology. It promises high performance, high storage density, and low power consumption. With fundamentally different architectural designs from magnetic disk, MEMS-based storage...
On incremental file system development
Gopalan Sivathanu, Nikolai Joukov, Charles P. Wright, Erez Zadok, Rakesh Iyer
Developing file systems from scratch is difficult and error prone. Using layered, or stackable, file systems is a powerful technique to incrementally extend the functionality of existing file systems on commodity OSes at runtime. In this article, we...
Spin MOSFETs as a basis for spintronics
Satoshi Sugahara, Masaaki Tanaka
This article reviews a recently proposed new class of spin transistors referred to as spin metal-oxide-semiconductor field-effect transistors (spin MOSFETs), and their integrated circuit applications. The fundamental device structures, operating...