@misc{AmazonEC2,
annote = {amazon elastic compute cloud delivers scalable, pay-as-you-go compute capacity in the cloud.},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Unknown - Unknown - Amazon Elastic Compute Cloud (Amazon EC2).html:html},
title = {{Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/}},
url = {http://aws.amazon.com/ec2/}
}
@inproceedings{Parallax05,
address = {Berkeley, CA, USA},
author = {Warfield, Andrew and Ross, Russ and Fraser, Keir and Limpach, Christian and Hand, Steven},
booktitle = {HOTOS'05: Proceedings of the 10th conference on Hot Topics in Operating Systems},
keywords = {deduplication,distributed storage,file system,vm image},
pages = {1--11},
publisher = {USENIX Association},
title = {{Parallax: managing storage for a million machines}},
year = {2005}
}
@inproceedings{cvfs03,
address = {Berkeley, CA, USA},
author = {Soules, Craig A N and Goodson, Garth R and Strunk, John D and Ganger, Gregory R},
booktitle = {FAST '03: Proceedings of the 2nd USENIX Conference on File and Storage Technologies},
keywords = {versioning},
pages = {43--58},
publisher = {USENIX Association},
title = {{Metadata Efficiency in Versioning File Systems}},
year = {2003}
}
@misc{ebs_explained,
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Unknown - Unknown - Amazon’s Elastic Block Store explained RightScale Blog.html:html},
title = {{Amazon’s Elastic Block Store explained}},
url = {http://blog.rightscale.com/2008/08/20/amazon-ebs-explained/}
}
@phdthesis{rsync,
author = {Tridgell, Andrew},
keywords = {deduplication,rsync,synchronization},
school = {The Australian National University},
title = {{Efficient Algorithms for Sorting and Synchronization}},
year = {1999}
}
@techreport{lustre_whitepaper,
institution = {Cluster File Systems, Inc.},
keywords = { file system,distributed storage},
title = {{Lustre: A Scalable, High-Performance File System}}
}
@inproceedings{resemblance97,
address = {Washington, DC, USA},
author = {Broder, A},
booktitle = {SEQUENCES '97: Proceedings of the Compression and Complexity of Sequences 1997},
isbn = {0-8186-8132-2},
keywords = { delta encoding,rabin's fingerprint,similarity},
pages = {21},
publisher = {IEEE Computer Society},
title = {{On the Resemblance and Containment of Documents}},
year = {1997}
}
@article{michel05,
address = {New York, NY, USA},
author = {Raynal, Michel},
doi = {http://doi.acm.org/10.1145/1052796.1052806},
issn = {0163-5700},
journal = {SIGACT News},
keywords = {failure detector},
number = {1},
pages = {53--70},
publisher = {ACM},
title = {{A short introduction to failure detectors for asynchronous distributed systems}},
volume = {36},
year = {2005}
}
@inproceedings{identify00,
address = {London, UK},
author = {Broder, Andrei Z},
booktitle = {COM '00: Proceedings of the 11th Annual Symposium on Combinatorial Pattern Matching},
isbn = {3-540-67633-3},
keywords = {delta encoding,rabin's fingerprint,similarity},
pages = {1--10},
publisher = {Springer-Verlag},
title = {{Identifying and Filtering Near-Duplicate Documents}},
year = {2000}
}
@techreport{centera_hash,
author = {Primmer, Robert and D'Halluin, Carl},
institution = {EMC Corp.},
keywords = { hash analysis,centera},
title = {{Collision and Preimage Resistance of the Centera Content Address}}
}
@techreport{berkeleycloud09,
abstract = {Provided certain obstacles are overcome, we believe Cloud Computing has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Developers with innovative ideas for new interactive Internet services no longer require the large capital outlays in hardware to deploy their service or the human expense to operate it. They need not be concerned about over-provisioning for a service whose popularity does not meet their predictions, thus wasting costly resources, or under-provisioning for one that becomes wildly popular, thus missing potential customers and revenue. Moreover, companies with large batch-oriented tasks can get their results as quickly as their programs can scale, since using 1000 servers for one hour costs no more than using one server for 1000 hours. This elasticity of resources, without paying a premium for large scale, is unprecedented in the history of IT. The economies of scale of very large-scale datacenters combined with ``pay-as-you-go'' resource usage has heralded the rise of Cloud Computing. It is now attractive to deploy an innovative new Internet service on a third party's Internet Datacenter rather than your own infrastructure, and to gracefully scale its resources as it grows or declines in popularity and revenue. Expanding and shrinking daily in response to normal diurnal patterns could lower costs even further. Cloud Computing transfers the risks of over-provisioning or under-provisioning to the Cloud Computing provider, who mitigates that risk by statistical multiplexing over a much larger set of users and who offers relatively low prices due better utilization and from the economy of purchasing at a larger scale. We define terms, present an economic model that quantifies the key buy vs. pay-as-you-go decision, offer a spectrum to classify Cloud Computing providers, and give our view of the top 10 obstacles and opportunities to the growth of Cloud Computing.},
author = {Armbrust, Michael and Fox, Armando and Griffith, Rean and Joseph, Anthony D and Katz, Randy H and Konwinski, Andrew and Lee, Gunho and Patterson, David A and Rabkin, Ariel and Stoica, Ion and Zaharia, Matei},
institution = {EECS Department, University of California, Berkeley},
keywords = {cloud computing},
month = feb,
number = {UCB/EECS-2009-28},
title = {{Above the Clouds: A Berkeley View of Cloud Computing}},
url = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html},
year = {2009}
}
@article{afs_performance88,
address = {New York, NY, USA},
author = {Howard, John H and Kazar, Michael L and Menees, Sherri G and Nichols, David A and Satyanarayanan, M and Sidebotham, Robert N and West, Michael J},
doi = {http://doi.acm.org/10.1145/35037.35059},
issn = {0734-2071},
journal = {ACM Trans. Comput. Syst.},
keywords = { distributed system,distributed storage},
number = {1},
pages = {51--81},
publisher = {ACM},
title = {{Scale and performance in a distributed file system}},
volume = {6},
year = {1988}
}
@misc{zfs,
annote = {$\backslash$verb+http://www.sun.com/software/solaris/zfs.jsp+},
keywords = { file system, storage, sun,deduplication},
title = {{ZFS}. http://www.sun.com/software/solaris/zfs.jsp},
url = {http://www.sun.com/software/solaris/zfs.jsp}
}
@inproceedings{Breslau1999a,
abstract = {This paper addresses two unresolved issues about Web caching. The first issue is whether Web requests from a fixed user community are distributed according to Zipf's (1929) law. The second issue relates to a number of studies on the characteristics of Web proxy traces, which have shown that the hit-ratios and temporal locality of the traces exhibit certain asymptotic properties that are uniform across the different sets of the traces. In particular, the question is whether these properties are inherent to Web accesses or whether they are simply an artifact of the traces. An answer to these unresolved issues will facilitate both Web cache resource planning and cache hierarchy design. We show that the answers to the two questions are related. We first investigate the page request distribution seen by Web proxy caches using traces from a variety of sources. We find that the distribution does not follow Zipf's law precisely, but instead follows a Zipf-like distribution with the exponent varying from trace to trace. Furthermore, we find that there is only (i) a weak correlation between the access frequency of a Web page and its size and (ii) a weak correlation between access frequency and its rate of change. We then consider a simple model where the Web accesses are independent and the reference probability of the documents follows a Zipf-like distribution. We find that the model yields asymptotic behaviour that are consistent with the experimental observations, suggesting that the various observed properties of hit-ratios and temporal locality are indeed inherent to Web accesses observed by proxies. Finally, we revisit Web cache replacement algorithms and show that the algorithm that is suggested by this simple model performs best on real trace data. The results indicate that while page requests do indeed reveal short-term correlations and other structures, a simple model for an independent request stream following a Zipf-like distribution is sufficient to capture certain asymptotic properties observed at Web proxies},
author = {Breslau, L. and Phillips, G. and Shenker, S.},
booktitle = {IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)},
doi = {10.1109/INFCOM.1999.749260},
isbn = {0-7803-5417-6},
pages = {126--134 vol.1},
publisher = {IEEE},
title = {{Web caching and Zipf-like distributions: evidence and implications}},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=749260},
year = {1999}
}
@inproceedings{lbfs01,
address = {Chateau Lake Louise, Banff, Canada},
author = {Muthitacharoen, Athicha and Chen, Benjie and Mazi\`{e}res, David},
booktitle = {Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP'01)},
keywords = { synchronization,deduplication},
month = oct,
pages = {174--187},
title = {{A Low-bandwidth Network File System}},
year = {2001}
}
@misc{glusterfs,
annote = {$\backslash$verb+http://gluster.org+},
keywords = {distributed storage,file system},
month = jan,
title = {{GlusterFS}},
url = {http://gluster.org/},
year = {2009}
}
@inproceedings{gupta01,
author = {Gupta, Indranil and Chandra, Tushar D and Goldszmidt, Germ\'{a}n S},
booktitle = {In Proc. 20th Annual ACM Symp. on Principles of Distributed Computing},
keywords = { distributed system,gossip protocol},
pages = {170--179},
publisher = {ACM Press},
title = {{On Scalable and Efficient Distributed Failure Detectors}},
year = {2001}
}
@article{dynamo07,
address = {New York, NY, USA},
author = {DeCandia, Giuseppe and Hastorun, Deniz and Jampani, Madan and Kakulapati, Gunavardhan and Lakshman, Avinash and Pilchin, Alex and Sivasubramanian, Swaminathan and Vosshall, Peter and Vogels, Werner},
doi = {http://doi.acm.org/10.1145/1323293.1294281},
issn = {0163-5980},
journal = {SIGOPS Oper. Syst. Rev.},
keywords = { availability,distributed storage},
number = {6},
pages = {205--220},
publisher = {ACM},
title = {{Dynamo: amazon's highly available key-value store}},
volume = {41},
year = {2007}
}
@inproceedings{nath08,
address = {New York, NY, USA},
author = {Nath, Partho and Urgaonkar, Bhuvan and Sivasubramaniam, Anand},
booktitle = {HPDC '08: Proceedings of the 17th international symposium on High performance distributed computing},
doi = {http://doi.acm.org/10.1145/1383422.1383428},
isbn = {978-1-59593-997-5},
keywords = { CAS, distributed storage, performance,deduplication},
pages = {35--44},
publisher = {ACM},
title = {{Evaluating the usefulness of content addressable storage for high-performance data intensive applications}},
year = {2008}
}
@inproceedings{tierstore08,
address = {Berkeley, CA, USA},
author = {Demmer, Michael and Du, Bowei and Brewer, Eric},
booktitle = {FAST'08: Proceedings of the 6th USENIX Conference on File and Storage Technologies},
keywords = {file system,synchronization},
pages = {1--14},
publisher = {USENIX Association},
title = {{TierStore: a distributed filesystem for challenged networks in developing regions}},
year = {2008}
}
@inproceedings{chord01,
author = {Stoica, Ion and Morris, Robert and Liben-Nowell, David and Karger, David R and Kaashoek, M Frans and Dabek, Frank and Balakrishnan, Hari},
booktitle = {ACM SIGCOMM},
keywords = {p2p},
pages = {149--160},
title = {{Chord: a scalable peer-to-peer lookup protocol for internet applications}},
year = {2001}
}
@article{Adamic2002,
author = {Adamic, Lada A and Huberman, Bernardo A},
journal = {Glottometrics},
keywords = {caching,networks,s law,zipf},
number = {1},
pages = {143--150},
publisher = {Citeseer},
title = {{Zipf’s law and the Internet}},
url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.9802\&amp;rep=rep1\&amp;type=pdf},
volume = {3},
year = {2002}
}
@inproceedings{pedal96,
address = {New York, NY, USA},
author = {Lee, Edward K and Thekkath, Chandramohan A},
booktitle = {ASPLOS-VII: Proceedings of the seventh international conference on Architectural support for programming languages and operating systems},
doi = {http://doi.acm.org/10.1145/237090.237157},
isbn = {0-89791-767-7},
keywords = {distributed storage,file system},
pages = {84--92},
publisher = {ACM},
title = {{Petal: distributed virtual disks}},
year = {1996}
}
@inproceedings{cumulus09,
author = {Vrable, Michael and Savage, Stefan and Voelker, Geoffrey M},
booktitle = {FAST'09},
pages = {225--238},
title = {{Cumulus: Filesystem Backup to the Cloud}},
year = {2009}
}
@article{eventually09,
address = {New York, NY, USA},
author = {Vogels, Werner},
doi = {http://doi.acm.org/10.1145/1435417.1435432},
issn = {0001-0782},
journal = {Commun. ACM},
keywords = { distributed system,distributed storage},
number = {1},
pages = {40--44},
publisher = {ACM},
title = {{Eventually Consistent}},
volume = {52},
year = {2009}
}
@inproceedings{common07,
address = {New York, NY, USA},
author = {Tang, John C and Drews, Clemens and Smith, Mark and Wu, Fei and Sue, Alison and Lau, Tessa},
booktitle = {CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems},
doi = {http://doi.acm.org/10.1145/1240624.1240769},
isbn = {978-1-59593-593-9},
keywords = {similarity},
pages = {951--960},
publisher = {ACM},
title = {{Exploring patterns of social commonality among file directories at work}},
year = {2007}
}
@inproceedings{pangaea-eurosys02,
address = {New York, NY, USA},
author = {Saito, Yasushi and Karamanolis, Christos},
booktitle = {EW10: Proceedings of the 10th workshop on ACM SIGOPS European workshop},
doi = {http://doi.acm.org/10.1145/1133373.1133421},
keywords = { deduplication,distributed storage},
pages = {231--234},
publisher = {ACM},
title = {{Pangaea: a symbiotic wide-area file system}},
year = {2002}
}
@article{dep07,
address = {New York, NY, USA},
author = {Frost, Christopher and Mammarella, Mike and Kohler, Eddie and de los Reyes, Andrew and Hovsepian, Shant and Matsuoka, Andrew and Zhang, Lei},
doi = {http://doi.acm.org/10.1145/1323293.1294291},
issn = {0163-5980},
journal = {SIGOPS Oper. Syst. Rev.},
keywords = { dependency,file system},
number = {6},
pages = {307--320},
publisher = {ACM},
title = {{Generalized file system dependencies}},
volume = {41},
year = {2007}
}
@inproceedings{efficient_dedup05,
address = {New York, NY, USA},
author = {Barreto, Jo\~{a}o and Ferreira, Paulo},
booktitle = {SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles},
doi = {http://doi.acm.org/10.1145/1095810.1118597},
isbn = {1-59593-079-5},
keywords = {deduplication,file system},
pages = {1--9},
publisher = {ACM},
title = {{Efficient file storage using content-based indexing}},
year = {2005}
}
@inproceedings{corruption_analysis08,
address = {Berkeley, CA, USA},
author = {Bairavasundaram, Lakshmi N and Goodson, Garth R and Schroeder, Bianca and Arpaci-Dusseau, Andrea C and Arpaci-Dussea, Remzi H},
booktitle = {FAST'08: Proceedings of the 6th USENIX Conference on File and Storage Technologies},
keywords = {data integrity},
pages = {1--16},
publisher = {USENIX Association},
title = {{An analysis of data corruption in the storage stack}},
year = {2008}
}
@inproceedings{irmak05,
address = {New York, NY, USA},
author = {Irmak, Utku and Suel, Torsten},
booktitle = {WWW '05: Proceedings of the 14th international conference on World Wide Web},
doi = {http://doi.acm.org/10.1145/1060745.1060757},
isbn = {1-59593-046-9},
keywords = {deduplication,delta encoding,synchronization},
pages = {43--53},
publisher = {ACM},
title = {{Hierarchical substring caching for efficient content distribution to low-bandwidth clients}},
year = {2005}
}
@mastersthesis{arrow08,
author = {Marshall, Casey},
keywords = { storage,deduplication},
month = jun,
school = {University of California, Santa Cruz},
title = {{Efficient and Safe Data Backup with Arrow}},
year = {2008}
}
@article{Almeida1996,
author = {Almeida, Virg\'{\i}lio and Bestavros, Azer and Crovella, Mark and de Oliveira, Adriana},
isbn = {0-8186-7475-X},
month = dec,
pages = {92--107},
title = {{Characterizing reference locality in the WWW}},
url = {http://dl.acm.org/citation.cfm?id=382006.383200},
year = {1996}
}
@inproceedings{sean03,
address = {New York, NY, USA},
author = {Rhea, Sean C and Liang, Kevin and Brewer, Eric},
booktitle = {WWW '03: Proceedings of the 12th international conference on World Wide Web},
doi = {http://doi.acm.org/10.1145/775152.775239},
isbn = {1-58113-680-3},
keywords = {deduplication,synchronization},
pages = {619--628},
publisher = {ACM},
title = {{Value-based web caching}},
year = {2003}
}
@inproceedings{fuzzy_matching07,
address = {Berkeley, CA, USA},
author = {Han, Bo and Keleher, Pete},
booktitle = {ATC'07: 2007 USENIX Annual Technical Conference},
isbn = {999-8888-77-6},
keywords = {CAS,rabin's fingerprint},
pages = {1--6},
publisher = {USENIX Association},
title = {{Implementation and performance evaluation of fuzzy file block matching}},
year = {2007}
}
@inproceedings{deconstructing05,
address = {Washington, DC, USA},
author = {Gunawi, Haryadi S and Agrawal, Nitin and Arpaci-Dusseau, Andrea C and Arpaci-Dusseau, Remzi H and Schindler, Jiri},
booktitle = {ISCA '05: Proceedings of the 32nd annual international symposium on Computer Architecture},
doi = {http://dx.doi.org/10.1109/ISCA.2005.20},
isbn = {0-7695-2270-X},
keywords = { emc, performance, storage,centera},
pages = {60--71},
publisher = {IEEE Computer Society},
title = {{Deconstructing Commodity Storage Clusters}},
year = {2005}
}
@article{Roadknight2000,
author = {Roadknight, Chris and Marshall, Ian and Vearer, Debbie},
doi = {10.1145/346000.346014},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Roadknight, Marshall, Vearer - 2000 - File popularity characterisation.pdf:pdf},
issn = {01635999},
journal = {ACM SIGMETRICS Performance Evaluation Review},
keywords = {file popularity,web caches},
month = mar,
number = {4},
pages = {45--50},
title = {{File popularity characterisation}},
url = {http://dl.acm.org/citation.cfm?id=346000.346014},
volume = {27},
year = {2000}
}
@article{opsync02,
address = {Washington, DC, USA},
author = {Lee, Yui-Wah and Leung, Kwong-Sak and Satyanarayanan, Mahadev},
doi = {http://dx.doi.org/10.1109/TC.2002.1146707},
issn = {0018-9340},
journal = {IEEE Trans. Comput.},
keywords = {synchronization},
number = {12},
pages = {1410--1422},
publisher = {IEEE Computer Society},
title = {{Operation Shipping for Mobile File Systems}},
volume = {51},
year = {2002}
}
@inproceedings{sparseindex09,
author = {Lillibridge, Mark and Eshghi, Kave and Bhagwat, Deepavali and Deolalikar, Vinay and Trezis, Greg and Camble, Peter},
booktitle = {FAST'09},
keywords = {deduplication},
pages = {111--123},
title = {{Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality}},
year = {2009}
}
@inproceedings{Douglis03,
author = {Douglis, Fred and Iyengar, Arun},
booktitle = {In Proceedings of the 2003 USENIX Annual Technical Conference},
keywords = { rabin's fingerprint,similarity},
pages = {113--126},
title = {{Application-specific Deltaencoding via Resemblance Detection}},
year = {2003}
}
@misc{Zhao,
annote = {a recent work, may not have very good quality, but can save the time of searching related works

      },
author = {Zhao, Haiquan (chuck and Lall, Ashwin and Ogihara, Mitsunori and Xu, Jun (jim},
title = {{Global Iceberg Detection over Distributed Data Streams}},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.3089}
}
@misc{pnfs,
annote = {$\backslash$verb+http://www.pnfs.com/+},
keywords = {distributed storage,file system},
month = jan,
title = {{Parallel Network File System}},
url = {http://www.pnfs.com/},
year = {2009}
}
@inproceedings{logical_redundancy05,
address = {New York, NY, USA},
author = {Sivathanu, Gopalan and Wright, Charles P and Zadok, Erez},
booktitle = {StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability},
doi = {http://doi.acm.org/10.1145/1103780.1103784},
isbn = {1-59593-233-X},
keywords = {data integrity,taxonomy},
pages = {26--36},
publisher = {ACM},
title = {{Ensuring data integrity in storage: techniques and applications}},
year = {2005}
}
@article{gilbert02,
address = {New York, NY, USA},
author = {Seth, Gilbert and Nancy, Lynch},
doi = {http://doi.acm.org/10.1145/564585.564601},
issn = {0163-5700},
journal = {SIGACT News},
keywords = {distributed system},
number = {2},
pages = {51--59},
publisher = {ACM},
title = {{Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services}},
volume = {33},
year = {2002}
}
@misc{vmware_kb1015180,
annote = {the vmware knowledge base provides support solutions, error messages, and troubleshooting guides},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Unknown - Unknown - VMware KB Understanding virtual machine snapshots in VMware ESX.html:html},
title = {{VMware KB: Understanding virtual machine snapshots in VMware ESX}},
url = {kb.vmware.com/kb/1015180}
}
@article{Suzaki2010,
author = {Suzaki, Kuniyasu and Yagi, Toshiki and Iijima, Kengo and Quynh, Nguyen Anh and Artho, Cyrille and Watanebe, Yoshihito},
month = aug,
pages = {1--7},
title = {{Moving from logical sharing of guest OS to physical sharing of deduplication on virtual machine}},
url = {http://dl.acm.org/citation.cfm?id=1924931.1924936},
year = {2010}
}
@article{Huberman2002,
abstract = {Zipf's law governs many features of the Internet. Observations of Zipf distributions, while interesting in and of themselves, have strong implications for the design and function of the Internet. The connectivity of Internet routers influences the robustness of the network while the distribution in the number of email contacts affects the spread of email viruses. Even web caching strategies are formulated to account for a Zipf distribution in the number of requests for webpages.},
author = {Huberman, Bernardo A},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Huberman - 2002 - Zipf ’ s law and the Internet.pdf:pdf},
journal = {Distribution},
keywords = {caching,networks,s law,zipf},
number = {1},
pages = {143--150},
publisher = {Citeseer},
title = {{Zipf ’ s law and the Internet}},
url = {http://www.hpl.hp.com/research/idl/papers/ranking/adamicglottometrics.pdf},
volume = {3},
year = {2002}
}
@inproceedings{cedar07,
address = {New York, NY, USA},
author = {Tolia, Niraj and Satyanarayanan, M and Wolbach, Adam},
booktitle = {MobiSys '07: Proceedings of the 5th international conference on Mobile systems, applications and services},
doi = {http://doi.acm.org/10.1145/1247660.1247672},
isbn = {978-1-59593-614-1},
keywords = {cas},
pages = {71--84},
publisher = {ACM},
title = {{Improving mobile database access over wide-area networks without degrading consistency}},
year = {2007}
}
@article{frangipani97,
address = {New York, NY, USA},
author = {A., Thekkath Chandramohan and Timothy, Mann and K., Lee Edward},
doi = {http://doi.acm.org/10.1145/269005.266694},
issn = {0163-5980},
journal = {SIGOPS Oper. Syst. Rev.},
keywords = {distributed storage,file system},
number = {5},
pages = {224--237},
publisher = {ACM},
title = {{Frangipani: a scalable distributed file system}},
volume = {31},
year = {1997}
}
@inproceedings{chubby06,
address = {Berkeley, CA, USA},
author = {Burrows, Mike},
booktitle = {OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation},
isbn = {1-931971-47-1},
keywords = {distributed system},
pages = {335--350},
publisher = {USENIX Association},
title = {{The Chubby lock service for loosely-coupled distributed systems}},
year = {2006}
}
@inproceedings{potshards07,
address = {Berkeley, CA, USA},
author = {Storer, Mark W and Greenan, Kevin M and Miller, Ethan L and Voruganti, Kaladhar},
booktitle = {ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference},
isbn = {999-8888-77-6},
keywords = {archival storage,distributed storage},
pages = {1--14},
publisher = {USENIX Association},
title = {{POTSHARDS: secure long-term storage without encryption}},
year = {2007}
}
@inproceedings{phi04,
author = {Hayashibara, N and Defago, X and Yared, R and Katayama, T},
booktitle = {Reliable Distributed Systems, 2004. Proceedings of the 23rd IEEE International Symposium on},
doi = {10.1109/RELDIS.2004.1353004},
issn = {1060-9857},
keywords = {failure detector},
pages = {66--78},
title = {{The $\phi$ accrual failure detector}},
year = {2004}
}
@inproceedings{slinky05,
address = {Berkeley, CA, USA},
author = {Collberg, Christian and Hartman, John H and Babu, Sridivya and Udupa, Sharath K},
booktitle = {ATEC '05: Proceedings of the annual conference on USENIX Annual Technical Conference},
keywords = {CAS},
pages = {34},
publisher = {USENIX Association},
title = {{Slinky: static linking reloaded}},
year = {2005}
}
@article{objectstorage03,
author = {Mesnier, M and Ganger, G R and Riedel, E},
doi = {10.1109/MCOM.2003.1222722},
issn = {0163-6804},
journal = {Communications Magazine, IEEE},
keywords = {object-based storage},
number = {8},
pages = {84--90},
title = {{Object-based storage}},
volume = {41},
year = {2003}
}
@inproceedings{bhag07,
author = {Bhagwat, Deepavali and Eshghi, Kave and Mehra, Pankaj},
booktitle = {Proceedings of the 13th ACM SIGKDD international conference on Knowledge Discovery and Data Mining (KDD '07)},
keywords = {similarity},
month = aug,
pages = {105--112},
title = {{Content-based Document Routing and Index Partitioning for Scalable Similarity-based Searches in a Large Corpus}},
year = {2007}
}
@inproceedings{bottleneck08,
author = {Zhu, Benjamin and Li, Kai and Patterson, Hugo},
booktitle = {FAST'08},
keywords = {data domain,deduplication,performance},
pages = {1--14},
title = {{Avoiding the disk bottleneck in the data domain deduplication file system}},
year = {2008}
}
@inproceedings{persifs05,
address = {New York, NY, USA},
author = {Ports, Dan R K and Clements, Austin T and Demaine, Erik D},
booktitle = {SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles},
doi = {http://doi.acm.org/10.1145/1095810.1118598},
isbn = {1-59593-079-5},
keywords = { deduplication, file system,versioning},
pages = {1--2},
publisher = {ACM},
title = {{PersiFS: a versioned file system with an efficient representation}},
year = {2005}
}
@article{fingerdiff06,
address = {New York, NY, USA},
author = {Bobbarjung, Deepak R and Jagannathan, Suresh and Dubnicki, Cezary},
doi = {http://doi.acm.org/10.1145/1210596.1210599},
issn = {1553-3077},
journal = {Trans. Storage},
keywords = {deduplication,similarity},
number = {4},
pages = {424--448},
publisher = {ACM},
title = {{Improving duplicate elimination in storage systems}},
volume = {2},
year = {2006}
}
@inproceedings{pergamum08,
address = {Berkeley, CA, USA},
author = {Storer, Mark W and Greenan, Kevin M and Miller, Ethan L and Voruganti, Kaladhar},
booktitle = {FAST'08: Proceedings of the 6th USENIX Conference on File and Storage Technologies},
keywords = { storage,archival storage},
pages = {1--16},
publisher = {USENIX Association},
title = {{Pergamum: replacing tape with energy efficient, reliable, disk-based archival storage}},
year = {2008}
}
@article{epidemics03,
address = {New York, NY, USA},
author = {Vogels, Werner and van Renesse, Robbert and Birman, Ken},
doi = {http://doi.acm.org/10.1145/774763.774784},
issn = {0146-4833},
journal = {SIGCOMM Comput. Commun. Rev.},
keywords = {gossip protocol},
number = {1},
pages = {131--135},
publisher = {ACM},
title = {{The power of epidemics: robust communication for large-scale distributed systems}},
volume = {33},
year = {2003}
}
@inproceedings{Guo2011,
 author = {Guo, Fanglu and Efstathopoulos, Petros},
 title = {Building a High-performance Deduplication System},
 booktitle = {USENIX ATC'11},
 year = {2011},
 pages = {25--25}
}
@article{Baek2011,
abstract = {Why does Zipf's law give a good description of data from seemingly completely unrelated phenomena?
 Here it is argued that the reason is that they can all be described as outcomes of a ubiquitous
 random group division: the elements can be citizens of a country and the groups family names, or the
 elements can be all the words making up a novel and the groups the unique words, or the elements
 could be inhabitants and the groups the cities in a country and so on. A random group formation
 (RGF) is presented from which a Bayesian estimate is obtained based on minimal information: it
 provides the best prediction for the number of groups with k elements, given the total number of
 elements, groups and the number of elements in the largest group. For each specification of these
 three values, the RGF predicts a unique group distribution N ( k )∝exp(− bk )/ k $\gamma$ , where the
 power-law index $\gamma$ is a unique function of the same three values. The universality of the result is
 made possible by the fact that no system-specific assumptions are made about the mechanism
 responsible for the group division. The direct relation between $\gamma$ and the total number of elements,
 groups and the number of elements in the largest group is calculated. The predictive power of the
 RGF model is demonstrated by direct comparison with data from a variety of systems. It is shown that
 $\gamma$ usually takes values in the interval 1≤$\gamma$≤2 and that the value for a given phenomenon depends in a
 systematic way on the total size of the dataset. The results are put in the context of earlier
 discussions on Zipf's and Gibrat's laws, N ( k )∝ k −2 and the connection between growth models and
 RGF is elucidated.},
author = {Baek, Seung Ki and Bernhardsson, Sebastian and Minnhagen, Petter},
doi = {10.1088/1367-2630/13/4/043004},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Baek, Bernhardsson, Minnhagen - 2011 - Zipf's law unzipped.pdf:pdf},
issn = {1367-2630},
journal = {New Journal of Physics},
month = apr,
number = {4},
pages = {043004},
title = {{Zipf's law unzipped}},
url = {http://stacks.iop.org/1367-2630/13/i=4/a=043004},
volume = {13},
year = {2011}
}
@techreport{avamar_whitepaper,
institution = {EMC Corp.},
keywords = {avamar},
title = {{Efficient Data Protection With EMC Avamar Global De-duplication Software}}
}
@inproceedings{ceph06,
address = {Berkeley, CA, USA},
author = {Weil, Sage A and Brandt, Scott A and Miller, Ethan L and Long, Darrell D E and Maltzahn, Carlos},
booktitle = {OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation},
isbn = {1-931971-47-1},
keywords = {distributed storage,file system},
pages = {307--320},
publisher = {USENIX Association},
title = {{Ceph: a scalable, high-performance distributed file system}},
year = {2006}
}
@inproceedings{mimic04,
address = {New York, NY, USA},
author = {Chang, Tae-Young and Velayutham, Aravind and Sivakumar, Raghupathy},
booktitle = {MobiSys '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services},
doi = {http://doi.acm.org/10.1145/990064.990085},
isbn = {1-58113-793-1},
keywords = {synchronization},
pages = {165--176},
publisher = {ACM},
title = {{Mimic: raw activity shipping for file synchronization in mobile file systems}},
year = {2004}
}
@inproceedings{pvfs00,
address = {Berkeley, CA, USA},
author = {Carns, Philip H and III, Walter B Ligon and Ross, Robert B and Thakur, Rajeev},
booktitle = {ALS'00: Proceedings of the 4th annual Linux Showcase \& Conference},
keywords = {distributed storage,file system},
pages = {28},
publisher = {USENIX Association},
title = {{PVFS: a parallel file system for linux clusters}},
year = {2000}
}
@article{shingling97,
address = {Amsterdam, The Netherlands, The Netherlands},
author = {Broder, Andrei Z and Glassman, Steven C and Manasse, Mark S and Zweig, Geoffrey},
doi = {http://dx.doi.org/10.1016/S0169-7552(97)00031-7},
issn = {0169-7552},
journal = {Comput. Netw. ISDN Syst.},
keywords = {delta encoding,rabin's fingerprint,similarity},
number = {8-13},
pages = {1157--1166},
publisher = {Elsevier Science Publishers B. V.},
title = {{Syntactic clustering of the Web}},
volume = {29},
year = {1997}
}
@article{antiquity07,
address = {New York, NY, USA},
author = {Weatherspoon, Hakim and Eaton, Patrick and Chun, Byung-Gon and Kubiatowicz, John},
doi = {http://doi.acm.org/10.1145/1272998.1273035},
issn = {0163-5980},
journal = {SIGOPS Oper. Syst. Rev.},
keywords = {data integrity,distributed storage},
number = {3},
pages = {371--384},
publisher = {ACM},
title = {{Antiquity: exploiting a secure log for wide-area distributed storage}},
volume = {41},
year = {2007}
}
@inproceedings{Reliability06,
address = {Washington, DC, USA},
author = {Bhagwat, Deepavali and Pollack, Kristal and Long, Darrell D E and Schwarz, Thomas and Miller, Ethan L and Paris, Jehan-Francois},
booktitle = {MASCOTS '06},
doi = {http://dx.doi.org/10.1109/MASCOTS.2006.42},
isbn = {0-7695-2573-3},
keywords = {deduplication,replication},
pages = {413--421},
publisher = {IEEE Computer Society},
title = {{Providing High Reliability in a Minimum Redundancy Archival Storage System}},
year = {2006}
}
@inproceedings{mad210,
author = {Wei, Jiansheng and Jiang, Hong and Zhou, Ke and Feng, Dan},
booktitle = {IEEE MSST'10},
doi = {10.1109/MSST.2010.5496987},
keywords = {HT based load balance technique;MAD2;RAM;bloom fil},
month = may,
pages = {1--14},
title = {{MAD2: A scalable high-throughput exact deduplication approach for network backup services}},
year = {2010}
}
@inproceedings{taper05,
address = {Berkeley, CA, USA},
author = {Jain, Navendu and Dahlin, Mike and Tewari, Renu},
booktitle = {FAST'05: Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies},
keywords = {bloom filter,deduplication,similarity,synchronization},
pages = {281--294},
publisher = {USENIX Association},
title = {{TAPER: tiered approach for eliminating redundancy in replica synchronization}},
year = {2005}
}
@inproceedings{stork07,
address = {Berkeley, CA, USA},
author = {Cappos, Justin and Baker, Scott and Plichta, Jeremy and Nyugen, Duy and Hardies, Jason and Borgard, Matt and Johnston, Jeffry and Hartman, John H},
booktitle = {LISA'07: Proceedings of the 21st conference on Large Installation System Administration Conference},
isbn = {978-1-59327-152-7},
keywords = { file sharing,vm image},
pages = {1--16},
publisher = {USENIX Association},
title = {{Stork: package management for distributed VM environments}},
year = {2007}
}
@article{9year08,
address = {New York, NY, USA},
author = {Traeger, Avishay and Zadok, Erez and Joukov, Nikolai and Wright, Charles P},
doi = {http://doi.acm.org/10.1145/1367829.1367831},
issn = {1553-3077},
journal = {Trans. Storage},
keywords = { file system,storage},
number = {2},
pages = {1--56},
publisher = {ACM},
title = {{A nine year study of file system and storage benchmarking}},
volume = {4},
year = {2008}
}
@inproceedings{plaxton97,
address = {New York, NY, USA},
author = {Greg, Plaxton C and Rajmohan, Rajaraman and Richa, Andr\'{e}a W},
booktitle = {SPAA '97: Proceedings of the ninth annual ACM symposium on Parallel algorithms and architectures},
doi = {http://doi.acm.org/10.1145/258492.258523},
isbn = {0-89791-890-8},
keywords = {p2p},
pages = {311--320},
publisher = {ACM},
title = {{Accessing nearby copies of replicated objects in a distributed environment}},
year = {1997}
}
@inproceedings{oceanstore00,
address = {New York, NY, USA},
author = {Kubiatowicz, John and Bindel, David and Chen, Yan and Czerwinski, Steven and Eaton, Patrick and Geels, Dennis and Gummadi, Ramakrishna and Rhea, Sean and Weatherspoon, Hakim and Wells, Chris and Zhao, Ben},
booktitle = {ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems},
doi = {http://doi.acm.org/10.1145/378993.379239},
isbn = {1-58113-317-0},
keywords = { distributed storage,p2p},
pages = {190--201},
publisher = {ACM},
title = {{OceanStore: an architecture for global-scale persistent storage}},
year = {2000}
}
@misc{sepaton,
annote = {$\backslash$verb+http://www.sepaton.com+},
keywords = { sepaton, storage,deduplication},
title = {{Sepaton}},
url = {http://www.sepaton.com}
}
@inproceedings{googlefs03,
address = {New York, NY, USA},
author = {Ghemawat, Sanjay and Gobioff, Howard and Leung, Shun-Tak},
booktitle = {SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles},
doi = {http://doi.acm.org/10.1145/945445.945450},
isbn = {1-58113-757-5},
keywords = {distributed storage,file system},
pages = {29--43},
publisher = {ACM},
title = {{The Google file system}},
year = {2003}
}
@article{Chang2008,
abstract = {Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance. These applications place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to real-time data serving). Despite these varied demands, Bigtable has successfully provided a flexible, high-performance solution for all of these Google products. In this article, we describe the simple data model provided by Bigtable, which gives clients dynamic control over data layout and format, and we describe the design and implementation of Bigtable.},
author = {Chang, Fay and Dean, Jeffrey and Ghemawat, Sanjay and Hsieh, Wilson C. and Wallach, Deborah A. and Burrows, Mike and Chandra, Tushar and Fikes, Andrew and Gruber, Robert E.},
issn = {0734-2071},
journal = {ACM Transactions on Computer Systems (TOCS)},
keywords = {Large-Scale Distributed Storage},
number = {2},
title = {{Bigtable: A Distributed Storage System for Structured Data}},
url = {http://portal.acm.org/citation.cfm?id=1365816},
volume = {26},
year = {2008}
}
@inproceedings{casper03,
author = {Tolia, Niraj and Kozuch, Michael and Satyanarayanan, Mahadev and Karp, Brad and Bressoud, Thomas},
booktitle = {In Proceedings of the 2003 USENIX Annual Technical Conference},
keywords = { distributed storage,synchronization},
pages = {127--140},
title = {{Opportunistic use of content addressable storage for distributed file systems}},
year = {2003}
}
@inproceedings{Jin2009,
address = {New York, New York, USA},
author = {Jin, Keren and Miller, Ethan L.},
booktitle = {Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference on - SYSTOR '09},
doi = {10.1145/1534530.1534540},
isbn = {9781605586236},
month = may,
pages = {1},
publisher = {ACM Press},
title = {{The effectiveness of deduplication on virtual machine disk images}},
url = {http://dl.acm.org/citation.cfm?id=1534530.1534540},
year = {2009}
}
@article{Dean2004,
author = {Dean, J and Ghemawat, S},
journal = {Operating Systems Design and Implementation (OSDI ’},
title = {{MapReduce: Simplified Data Processing on Large Clusters}},
volume = {04},
year = {2004}
}
@inproceedings{venti02,
author = {Quinlan, Sean and Dorward, Sean},
booktitle = {FAST '02},
pages = {89--101},
title = {{Venti: A New Approach to Archival Storage}},
year = {2002}
}
@inproceedings{lookaside04,
address = {Berkeley, CA, USA},
author = {Tolia, Niraj and Harkes, Jan and Kozuch, Michael and Satyanarayanan, M},
booktitle = {FAST '04: Proceedings of the 3rd USENIX Conference on File and Storage Technologies},
keywords = {CAS,caching,storage,synchronization},
pages = {227--238},
publisher = {USENIX Association},
title = {{Integrating Portable and Distributed Storage}},
year = {2004}
}
@article{Tarkoma2012,
author = {Tarkoma, Sasu and Rothenberg, Christian Esteve and Lagerspetz, Eemil},
doi = {10.1109/SURV.2011.031611.00024},
issn = {1553-877X},
journal = {IEEE Communications Surveys \& Tutorials},
number = {1},
pages = {131--155},
title = {{Theory and Practice of Bloom Filters for Distributed Systems}},
url = {http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5751342},
volume = {14},
year = {2012}
}
@article{agrawal07,
address = {New York, NY, USA},
author = {Agrawal, Nitin and Bolosky, William J and Douceur, John R and Lorch, Jacob R},
doi = {http://doi.acm.org/10.1145/1288783.1288788},
issn = {1553-3077},
journal = {Trans. Storage},
keywords = { storage,user behavior},
number = {3},
pages = {9},
publisher = {ACM},
title = {{A five-year study of file-system metadata}},
volume = {3},
year = {2007}
}
@article{disp05,
address = {New York, NY, USA},
author = {Ellard, Daniel and Megquier, James},
doi = {http://doi.acm.org/10.1145/1044956.1044960},
issn = {1553-3077},
journal = {Trans. Storage},
keywords = { distributed storage,fault tolerance},
number = {1},
pages = {71--94},
publisher = {ACM},
title = {{DISP: Practical, efficient, secure and fault-tolerant distributed data storage}},
volume = {1},
year = {2005}
}
@inproceedings{foundation08,
author = {Rhea, Sean and Cox, Russ and Pesterev, Alex},
booktitle = {USENIX ATC'08},
pages = {143--156},
title = {{Fast, inexpensive content-addressed storage in foundation}},
year = {2008}
}
@techreport{rabin81,
annote = {$\backslash$url\{http://www.xmailserver.org/rabin.pdf\}},
author = {Rabin, Michael O},
institution = {Center for Research in Computing Technology, Harvard University},
keywords = { deduplication, similarity,rabin's fingerprint},
number = {TR-CSE-03-01},
title = {{Fingerprinting by random polynomials}},
year = {1981}
}
@misc{nfsv4rfc,
annote = {$\backslash$verb+http://www.ietf.org/rfc/rfc3530.txt+},
keywords = {nfs},
title = {{Network File System, version 4}},
url = {http://www.ietf.org/rfc/rfc3530.txt}
}
@misc{falconstor,
annote = {$\backslash$verb+http://www.falconstor.com+},
keywords = { FalconStor, storage,deduplication},
title = {{FalconStor}},
url = {http://www.falconstor.com}
}
@inproceedings{Clements2009,
 author = {Clements, Austin T. and Ahmad, Irfan and Vilayannur, Murali and Li, Jinyuan},
 title = {Decentralized deduplication in SAN cluster file systems},
 booktitle = {USENIX ATC'09},
 year = {2009}
}
@article{Breslau1999b,
author = {Breslau, Lee and Cue, Pei and Cao, Pei and Fan, Li and Phillips, Graham and Shenker, Scott},
journal = {IN INFOCOM},
pages = {126 -- 134},
title = {{Web Caching and Zipf-like Distributions: Evidence and Implications}},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.2253},
year = {1999}
}
@inproceedings{deepstore05,
address = {Washington, DC, USA},
author = {You, Lawrence L and Pollack, Kristal T and Long, Darrell D E},
booktitle = {ICDE '05: Proceedings of the 21st International Conference on Data Engineering},
doi = {http://dx.doi.org/10.1109/ICDE.2005.47},
isbn = {0-7695-2285-8},
keywords = {deduplication,file system},
pages = {804--8015},
publisher = {IEEE Computer Society},
title = {{Deep Store: An Archival Storage System Architecture}},
year = {2005}
}
@misc{emc_avamar,
annote = {$\backslash$url\{http://www.emc.com/products/detail/hardware/avamar-data-store.htm\}},
keywords = { avamar, storage,deduplication},
title = {{EMC Avamar}},
url = {http://www.emc.com/products/detail/hardware/avamar-data-store.htm}
}
@inproceedings{ivy02,
address = {New York, NY, USA},
author = {Muthitacharoen, Athicha and Morris, Robert and Gil, Thomer M and Chen, Benjie},
booktitle = {OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation},
doi = {http://doi.acm.org/10.1145/1060289.1060293},
keywords = { file system, p2p,distributed storage},
pages = {31--44},
publisher = {ACM},
title = {{Ivy: a read/write peer-to-peer file system}},
year = {2002}
}
@inproceedings{pangaea02,
address = {New York, NY, USA},
author = {Saito, Yasushi and Karamanolis, Christos and Karlsson, Magnus and Mahalingam, Mallik},
booktitle = {OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation},
doi = {http://doi.acm.org/10.1145/1060289.1060292},
keywords = { deduplication,distributed storage},
pages = {15--30},
publisher = {ACM},
title = {{Taming aggressive replication in the Pangaea wide-area file system}},
year = {2002}
}
@inproceedings{czip07,
address = {Berkeley, CA, USA},
author = {Park, KyoungSoo and Ihm, Sunghwan and Bowman, Mic and Pai, Vivek S},
booktitle = {ATC'07: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference},
isbn = {999-8888-77-6},
keywords = { caching, compression,deduplication},
pages = {1--14},
publisher = {USENIX Association},
title = {{Supporting practical content-addressable caching with CZIP compression}},
year = {2007}
}
@article{gfs99,
author = {Preslan, K W and Barry, A P and Brassow, J E and Erickson, G M and Nygaard, E and Sabol, C J and Soltis, S R and Teigland, D C and O'Keefe, M T},
doi = {10.1109/MASS.1999.829973},
journal = {Mass Storage Systems, 1999. 16th IEEE Symposium on},
keywords = {distributed storage,file system},
pages = {22--41},
title = {{A 64-bit, shared disk file system for Linux}},
year = {1999}
}
@inproceedings{gpfs02,
address = {Berkeley, CA, USA},
author = {Schmuck, Frank B and Haskin, Roger L},
booktitle = {FAST '02: Proceedings of the Conference on File and Storage Technologies},
isbn = {1-880446-03-0},
keywords = { file system,distributed storage},
pages = {231--244},
publisher = {USENIX Association},
title = {{GPFS: A Shared-Disk File System for Large Computing Clusters}},
year = {2002}
}
@inproceedings{ganesh07,
address = {New York, NY, USA},
author = {Tolia, Niraj and Satyanarayanan, M},
booktitle = {WWW '07: Proceedings of the 16th international conference on World Wide Web},
doi = {http://doi.acm.org/10.1145/1242572.1242615},
isbn = {978-1-59593-654-7},
keywords = {database,deduplication},
pages = {311--320},
publisher = {ACM},
title = {{Consistency-preserving caching of dynamic database content}},
year = {2007}
}
@inproceedings{capsule02,
address = {New York, NY, USA},
author = {Sapuntzakis, Constantine P and Chandra, Ramesh and Pfaff, Ben and Chow, Jim and Lam, Monica S and Rosenblum, Mendel},
booktitle = {OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation},
doi = {http://doi.acm.org/10.1145/1060289.1060324},
keywords = { deduplication,vm migration},
pages = {377--390},
publisher = {ACM},
title = {{Optimizing the migration of virtual computers}},
year = {2002}
}
@techreport{diligent_whitepaper,
institution = {IBM Corp.},
keywords = { IBM, whitepaper,diligent},
title = {{Simple, Reliable, Fast De-duplication, Data Protection Platform}}
}
@article{Warfield2005,
author = {Warfield, Andrew and Hand, Steven and Fraser, Keir and Deegan, Tim},
month = apr,
pages = {22},
title = {{Facilitating the development of soft devices}},
url = {http://dl.acm.org/citation.cfm?id=1247360.1247382},
year = {2005}
}
@inproceedings{afs_design85,
address = {New York, NY, USA},
author = {Satyanarayanan, M and Howard, John H and Nichols, David A and Sidebotham, Robert N and Spector, Alfred Z and West, Michael J},
booktitle = {SOSP '85: Proceedings of the tenth ACM symposium on Operating systems principles},
doi = {http://doi.acm.org/10.1145/323647.323633},
isbn = {0-89791-174-1},
keywords = { file system,distributed storage},
pages = {35--50},
publisher = {ACM},
title = {{The ITC distributed file system: principles and design}},
year = {1985}
}
@inproceedings{pond03,
address = {Berkeley, CA, USA},
author = {Rhea, Sean and Eaton, Patrick and Geels, Dennis and Weatherspoon, Hakim and Zhao, Ben and Kubiatowicz, John},
booktitle = {FAST '03: Proceedings of the 2nd USENIX Conference on File and Storage Technologies},
keywords = { distributed storage, versioning,file system},
pages = {1--14},
publisher = {USENIX Association},
title = {{Pond: The OceanStore Prototype}},
year = {2003}
}
@article{replica05,
address = {New York, NY, USA},
author = {Saito, Yasushi and Shapiro, Marc},
doi = {http://doi.acm.org/10.1145/1057977.1057980},
issn = {0360-0300},
journal = {ACM Comput. Surv.},
keywords = {replication},
number = {1},
pages = {42--81},
publisher = {ACM},
title = {{Optimistic replication}},
volume = {37},
year = {2005}
}
@misc{Mendeley2009,
address = {London},
annote = {Double click on the entry on the left to view the PDF.},
author = {Mendeley},
booktitle = {Mendeley Desktop},
keywords = {Mendeley},
publisher = {Mendeley Ltd.},
title = {{Getting Started with Mendeley}},
url = {http://www.mendeley.com},
year = {2009}
}
@inproceedings{jumbo07,
address = {Berkeley, CA, USA},
author = {Eshghi, Kave and Lillibridge, Mark and Wilcock, Lawrence and Belrose, Guillaume and Hawkes, Rycharde},
booktitle = {FAST '07: Proceedings of the 5th USENIX conference on File and Storage Technologies},
keywords = { storage,deduplication},
pages = {123--138},
publisher = {USENIX Association},
title = {{Jumbo store: providing efficient incremental upload and versioning for a utility rendering service}},
year = {2007}
}
@inproceedings{capfs05,
address = {Berkeley, CA, USA},
author = {Vilayannur, Murali and Nath, Partho and Sivasubramaniam, Anand},
booktitle = {FAST'05: Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies},
keywords = { deduplication, distributed storage,CAS,storage},
pages = {17--30},
publisher = {USENIX Association},
title = {{Providing tunable consistency for a parallel file store}},
year = {2005}
}
@techreport{frame05,
author = {Kave, Eshghi and Khuern, Tang Hsiu},
institution = {HP Laboratory},
keywords = { similarity,deduplication},
month = oct,
number = {HPL-2005-30R1},
title = {{A Framework for Analyzing and Improving Content-Based Chunking Algorithms}},
year = {2005}
}
@techreport{datadomain_whitepaper,
institution = {Data Domain Corp.},
keywords = { whitepaper,data domain},
title = {{Dedupe-Centric Storage}}
}
@inproceedings{gfs00,
author = {Preslan, Kenneth W and Barry, Andrew P and Brassow, Jonathan and Cattelan, Russell and Manthei, Adam and Nygaard, Erling and Oort, Seth Van and Teigland, David and Tilstra, Mike and O'Keefe, Matthew T and Erickson, Grant and Agarwal, Manish},
booktitle = {IEEE Symposium on Mass Storage Systems},
keywords = {distributed storage,file system},
pages = {351--378},
title = {{Implementing Journaling in a Linux Shared Disk File System.}},
url = {http://dblp.uni-trier.de/db/conf/mss/mss2000.html\#PreslanBBCMNOTTOEA00},
year = {2000}
}
@phdthesis{you06,
author = {You, Lawrence},
keywords = { deduplication,storage},
month = jun,
school = {University of California, Santa Cruz},
title = {{Efficient Archival Data Storage}},
year = {2006}
}
@inproceedings{mif08,
address = {New York, NY, USA},
author = {Reimer, Darrell and Thomas, Arun and Ammons, Glenn and Mummert, Todd and Alpern, Bowen and Bala, Vasanth},
booktitle = {VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments},
doi = {http://doi.acm.org/10.1145/1346256.1346272},
isbn = {978-1-59593-796-4},
keywords = {deduplication,vm image},
pages = {111--120},
publisher = {ACM},
title = {{Opening black boxes: using semantic information to combat virtual machine image sprawl}},
year = {2008}
}
@article{bloom70,
address = {New York, NY, USA},
author = {Bloom, Burton H},
doi = {http://doi.acm.org/10.1145/362686.362692},
issn = {0001-0782},
journal = {Commun. ACM},
keywords = {bloom filter},
number = {7},
pages = {422--426},
publisher = {ACM},
title = {{Space/time trade-offs in hash coding with allowable errors}},
volume = {13},
year = {1970}
}
@inproceedings{lustre07,
address = {New York, NY, USA},
author = {Piernas, Juan and Nieplocha, Jarek and Felix, Evan J},
booktitle = {SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing},
doi = {http://doi.acm.org/10.1145/1362622.1362660},
isbn = {978-1-59593-764-3},
keywords = {distributed storage,file system},
pages = {1--10},
publisher = {ACM},
title = {{Evaluation of active storage strategies for the lustre parallel file system}},
year = {2007}
}
@inproceedings{similar94,
author = {Manber, Udi},
booktitle = {USENIX Winter 1994 Technical Conference},
keywords = { deduplication,similarity},
pages = {1--10},
title = {{Finding similar files in a large file system}},
year = {1994}
}
@inproceedings{hashanalysis06,
address = {Berkeley, CA, USA},
author = {Black, J},
booktitle = {ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference},
keywords = {hash analysis},
pages = {85--90},
publisher = {USENIX Association},
title = {{Compare-by-hash: a reasoned analysis}},
year = {2006}
}
@inproceedings{storegpu08,
address = {New York, NY, USA},
author = {Al-Kiswany, Samer and Gharaibeh, Abdullah and Santos-Neto, Elizeu and Yuan, George and Ripeanu, Matei},
booktitle = {HPDC '08: Proceedings of the 17th international symposium on High performance distributed computing},
doi = {http://doi.acm.org/10.1145/1383422.1383443},
isbn = {978-1-59593-997-5},
keywords = { performance,similarity},
pages = {165--174},
publisher = {ACM},
title = {{StoreGPU: exploiting graphics processing units to accelerate distributed storage systems}},
year = {2008}
}
@article{Bonomi2006,
author = {Bonomi, Flavio and Mitzenmacher, Michael and Panigrah, Rina and Singh, Sushil and Varghese, George},
doi = {10.1145/1151659.1159950},
isbn = {1-59593-308-5},
issn = {01464833},
journal = {ACM SIGCOMM Computer Communication Review},
keywords = {bloom filters,network flows,state machines},
month = aug,
number = {4},
pages = {315},
title = {{Beyond bloom filters}},
url = {http://dl.acm.org/citation.cfm?id=1151659.1159950},
volume = {36},
year = {2006}
}
@misc{Aliyun,
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Unknown - Unknown - Aliyun.html:html},
title = {{Alibaba Aliyun. http://www.aliyun.com}},
url = {http://www.aliyun.com/}
}
@article{tapestry04,
author = {Zhao, B Y and Huang, Ling and Stribling, J and Rhea, S C and Joseph, A D and Kubiatowicz, J D},
doi = {10.1109/JSAC.2003.818784},
issn = {0733-8716},
journal = {Selected Areas in Communications, IEEE Journal on},
keywords = {p2p},
number = {1},
pages = {41--53},
title = {{Tapestry: a resilient global-scale overlay for service deployment}},
volume = {22},
year = {2004}
}
@inproceedings{Jayaram2011,
address = {New York, New York, USA},
author = {Jayaram, K. R. and Peng, Chunyi and Zhang, Zhe and Kim, Minkyong and Chen, Han and Lei, Hui},
booktitle = {Proceedings of the Middleware 2011 Industry Track Workshop on - Middleware '11},
doi = {10.1145/2090181.2090187},
isbn = {9781450310741},
keywords = {IaaS,caching,distribution,similarity,virtual machine},
month = dec,
pages = {1--6},
publisher = {ACM Press},
title = {{An empirical analysis of similarity in virtual machine images}},
url = {http://dl.acm.org/citation.cfm?id=2090181.2090187},
year = {2011}
}
@article{Maillart2008,
abstract = {Zipf's power law is a ubiquitous empirical regularity found in many systems, thought to result from proportional growth. Here, we establish empirically the usually assumed ingredients of stochastic growth models that have been previously conjectured to be at the origin of Zipf's law. We use exceptionally detailed data on the evolution of open source software projects in Linux distributions, which offer a remarkable example of a growing complex self-organizing adaptive system, exhibiting Zipf's law over four full decades.},
author = {Maillart, T and Sornette, D and Spaeth, S and von Krogh, G},
issn = {0031-9007},
journal = {Physical review letters},
keywords = {Models, Statistical,Models, Theoretical,Software,Stochastic Processes},
month = nov,
number = {21},
pages = {218701},
pmid = {19113459},
title = {{Empirical tests of Zipf's law mechanism in open source Linux distribution.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/19113459},
volume = {101},
year = {2008}
}
@misc{netapp,
annote = {$\backslash$verb+http://www.netapp.com+},
keywords = { netapp, storage,deduplication},
title = {{NetApp}},
url = {http://www.netapp.com}
}
@inproceedings{versionfs04,
address = {Berkeley, CA, USA},
author = {Muniswamy-Reddy, Kiran-Kumar and Wright, Charles P and Himmer, Andrew and Zadok, Erez},
booktitle = {FAST '04: Proceedings of the 3rd USENIX Conference on File and Storage Technologies},
keywords = {versioning},
pages = {115--128},
publisher = {USENIX Association},
title = {{A Versatile and User-Oriented Versioning File System}},
year = {2004}
}
@inproceedings{bigtable06,
address = {Berkeley, CA, USA},
author = {Chang, Fay and Dean, Jeffrey and Ghemawat, Sanjay and Hsieh, Wilson C and Wallach, Deborah A and Burrows, Mike and Chandra, Tushar and Fikes, Andrew and Gruber, Robert E},
booktitle = {OSDI '06: Proceedings of the 7th symposium on Operating systems design and implementation},
isbn = {1-931971-47-1},
keywords = { database,distributed storage},
pages = {205--218},
publisher = {USENIX Association},
title = {{Bigtable: a distributed storage system for structured data}},
year = {2006}
}
@misc{datadomain,
annote = {$\backslash$verb+http://www.datadomain.com+},
keywords = { data domain, storage,deduplication},
title = {{Data Domain}},
url = {http://www.datadomain.com}
}
@misc{quantum,
annote = {$\backslash$verb+http://www.quantum.com+},
keywords = { Quantum, storage,deduplication},
title = {{Quantum}},
url = {http://www.quantum.com}
}
@inproceedings{elephant99,
address = {Washington, DC, USA},
author = {Santry, Douglas J and Feeley, Michael J and Hutchinson, Norman C and Veitch, Alistair C},
booktitle = {HOTOS '99: Proceedings of the The Seventh Workshop on Hot Topics in Operating Systems},
isbn = {0-7695-0237-7},
keywords = {file system,versioning},
pages = {2--7},
publisher = {IEEE Computer Society},
title = {{Elephant: The File System that Never Forgets}},
year = {1999}
}
@inproceedings{poli04,
address = {Berkeley, CA, USA},
author = {Policroniades, Calicrates and Pratt, Ian},
booktitle = {ATEC '04: Proceedings of the annual conference on USENIX Annual Technical Conference},
keywords = { performance,similarity},
pages = {6},
publisher = {USENIX Association},
title = {{Alternatives for detecting redundancy in storage systems data}},
year = {2004}
}
@misc{TheMendeleySupportTeam2011a,
abstract = {A quick introduction to Mendeley. Learn how Mendeley creates your personal digital library, how to organize and annotate documents, how to collaborate and share with colleagues, and how to generate citations and bibliographies.},
address = {London},
author = {{The Mendeley Support Team}},
booktitle = {Mendeley Desktop},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/The Mendeley Support Team - 2011 - Getting Started with Mendeley.pdf:pdf},
keywords = {Mendeley,how-to,user manual},
pages = {1--16},
publisher = {Mendeley Ltd.},
title = {{Getting Started with Mendeley}},
url = {http://www.mendeley.com},
year = {2011}
}
@inproceedings{diffengine08,
author = {Diwaker, Gupta and Sangmin, Lee and Michael, Vrable and Stefan, Savage and C., Snoeren Alex and George, Varghese and M., Voelker Geoffrey and Amin, Vahdat},
booktitle = {8th USENIX Symposium on Operating System Design and Implementation (OSDI 2008)},
keywords = {deduplication,vm},
month = dec,
organization = {USENIX},
title = {{Difference Engine: Harnessing Memory Redundancy in Virtual Machines}},
url = {http://www.cs.ucsd.edu/~dgupta/papers/osdi08-de.pdf},
year = {2008}
}
@article{Breslau1999,
abstract = {This paper addresses two unresolved issues aboutWeb caching. The first issue is whetherWeb re- quests froma fixed user community are distributed according to Zipfs lawZip29. Several early studies have supported this claim Gla94, CBC95, ABCdO96 while other recent studies have suggested other- wise NHo 98, ACC 98. The second issue relates to a number of recent studies on the characteristics ofWeb proxy traces, which have shown that the hit-ratios and temporal locality of the traces exhibit cer- tain asymptotic properties that are uniform across the different sets of the traces CI97, RV98, DMF97, GB97a, KLM97. In particular, the second issue iswhether these properties are inherent toWeb accesses or whether they are simply an artifact of the traces. An answer to these unresolved issues will facilitate bothWeb cache resource planning and cache hierarchy design. We show that the answers to the two questions are related. We first investigate the page request distribution seen byWeb proxy caches using traces from a variety of sources. We find that the distribu- tion does not follow Zipfs law precisely, but instead follows a Zipf-like distribution with the exponent varying from trace to trace. Furthermore, we find that there is (i) a weak correlation between the access frequency of a Web page and its size and (ii) a weak correlation between access frequency and its rate of change. We then consider a simple model where theWeb accesses are independent and the reference probability of the documents follows a Zipf-like distribution. We find that the model yields asymptotic behaviors that are consistent with the experimental observations, suggesting that the various observed properties of hit ratios and temporal locality are indeed inherent toWeb accesses observed by proxies. Finally, we revisitWeb cache replacement algorithms and show that the algorithm that is suggested by this simple model performs best on real trace data. The results indicate that while page requests do indeed reveal short-term correlations and other structures, a simple model for an independent request stream following a Zipf-like distribution is sufficient to capture certain asymptotic properties observed at Web proxies.},
author = {Breslau, Lee and Cao, Pei and Fan, Li and Phillips, Graham and Shenker, Scott},
doi = {10.1109/INFCOM.1999.749260},
isbn = {0780354176},
journal = {IEEE INFOCOM 99 Conference on Computer Communications Proceedings Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies The Future is Now Cat No99CH36320},
number = {i},
pages = {126--134 vol.1},
publisher = {Ieee},
title = {{Web caching and Zipf-like distributions: evidence and implications}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=749260},
volume = {XX},
year = {1999}
}
@article{pastiche02,
address = {New York, NY, USA},
author = {Cox, Landon P and Murray, Christopher D and Noble, Brian D},
doi = {http://doi.acm.org/10.1145/844128.844155},
issn = {0163-5980},
journal = {SIGOPS Oper. Syst. Rev.},
keywords = { storage,deduplication},
number = {SI},
pages = {285--298},
publisher = {ACM},
title = {{Pastiche: making backup cheap and easy}},
volume = {36},
year = {2002}
}
@book{Saichev2010,
abstract = {Zipf's law is one of the few quantitative reproducible regularities found in economics. It states that, for most countries, the size distributions of city sizes and of firms are power laws with a specific exponent: the number of cities and of firms with sizes greater than S is inversely proportional to S. Zipf's law also holds in many other scientific fields. Most explanations start with Gibrat's law of proportional growth (also known as "preferential attachment'' in the application to network growth) but need to incorporate additional constraints and ingredients introducing deviations from it. This book presents a general theoretical derivation of Zipf's law, providing a synthesis and extension of previous approaches. The general theory is presented in the language of firm dynamics for the sake of convenience but applies to many other systems. It takes into account (i) time-varying firm creation, (ii) firm's exit resulting from both a lack of sufficient capital and sudden external shocks, (iii) the coupling between firm's birth rate and the growth of the value of the population of firms. The robustness of Zipf's law is understood from the approximate validity of a general balance condition. A classification of the mechanisms responsible for deviations from Zipf's law is also offered.},
author = {Saichev, A and Malevergne, Y and Sornette, D},
booktitle = {Lecture Notes in Economics and Mathematical Systems},
doi = {10.1007/978-3-642-02946-2},
isbn = {9783642029455},
number = {1949},
pages = {171},
publisher = {Springer},
series = {Lecture Notes in Economics and Mathematical Systems},
title = {{Theory of Zipf's Law and Beyond}},
url = {http://www.springerlink.com/index/10.1007/978-3-642-02946-2},
volume = {632},
year = {2010}
}
@inproceedings{panasas04,
address = {Washington, DC, USA},
author = {Nagle, David and Serenyi, Denis and Matthews, Abbie},
booktitle = {SC '04: Proceedings of the 2004 ACM/IEEE conference on Supercomputing},
doi = {http://dx.doi.org/10.1109/SC.2004.57},
isbn = {0-7695-2153-3},
keywords = { CAS,distributed storage},
pages = {53},
publisher = {IEEE Computer Society},
title = {{The Panasas ActiveScale Storage Cluster: Delivering Scalable High Bandwidth Storage}},
year = {2004}
}
@inproceedings{kulkarni04,
address = {Berkeley, CA, USA},
author = {Kulkarni, Purushottam and Douglis, Fred and LaVoie, Jason and Tracey, John M},
booktitle = {ATEC '04: Proceedings of the annual conference on USENIX Annual Technical Conference},
keywords = { compression,deduplication,similarity},
pages = {59--72},
publisher = {USENIX Association},
title = {{Redundancy elimination within large collections of files}},
year = {2004}
}
@techreport{emc_vm_backup,
institution = {EMC Corp.},
keywords = { archival storage, vm image,avamar},
title = {{Optimized Backup and Recovery for VMWare Infrastructure with EMC Avamar}}
}
@inproceedings{Zhao2006,
address = {New York, New York, USA},
author = {Zhao, Qi (George) and Ogihara, Mitsunori and Wang, Haixun and Xu, Jun (Jim)},
booktitle = {Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems - PODS '06},
doi = {10.1145/1142351.1142394},
isbn = {1595933182},
keywords = {data streaming,icebergs,statistical inference},
month = jun,
pages = {298},
publisher = {ACM Press},
title = {{Finding global icebergs over distributed data sets}},
url = {http://dl.acm.org/citation.cfm?id=1142351.1142394},
year = {2006}
}
@inproceedings{longterm06,
address = {New York, NY, USA},
author = {Storer, Mark W and Greenan, Kevin and Miller, Ethan L},
booktitle = {StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability},
doi = {http://doi.acm.org/10.1145/1179559.1179562},
isbn = {1-59593-552-5},
keywords = { archival storage,security},
pages = {9--16},
publisher = {ACM},
title = {{Long-term threats to secure archives}},
year = {2006}
}
@article{chandra96,
address = {New York, NY, USA},
author = {Chandra, Tushar Deepak and Toueg, Sam},
doi = {http://doi.acm.org/10.1145/226643.226647},
issn = {0004-5411},
journal = {J. ACM},
keywords = {failure detector},
number = {2},
pages = {225--267},
publisher = {ACM},
title = {{Unreliable failure detectors for reliable distributed systems}},
volume = {43},
year = {1996}
}
@inproceedings{analysishash03,
address = {Berkeley, CA, USA},
author = {Henson, Val},
booktitle = {HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems},
keywords = {hash analysis},
pages = {18--21},
publisher = {USENIX Association},
title = {{An analysis of compare-by-hash}},
year = {2003}
}
@article{Xia2011,
author = {Xia, Wen and Jiang, Hong and Feng, Dan and Hua, Yu},
month = jun,
pages = {26--28},
title = {{SiLo: a similarity-locality based near-exact deduplication scheme with low RAM overhead and high throughput}},
url = {http://dl.acm.org/citation.cfm?id=2002181.2002207},
year = {2011}
}
@misc{emc_centera,
howpublished = {$\backslash$url\{http://www.emc.com/products/family/emc-centera-family.htm\}},
keywords = { centera, storage,CAS},
title = {{EMC Centera}},
url = {http://www.emc.com/products/family/emc-centera-family.htm}
}
@misc{diligent,
annote = {$\backslash$verb+http://www.diligent.com+},
keywords = { IBM, diligent, storage,deduplication},
title = {{Diligent}},
url = {http://www.diligent.com}
}
@misc{Beaumont2000,
author = {Beaumont, Leland R. and Beaumont, Leland R},
file = {:C$\backslash$:/Users/weizhang/AppData/Local/Mendeley Ltd./Mendeley Desktop/Downloaded/Beaumont, Beaumont - 2000 - Calculating Web Cache Hit Ratios.pdf:pdf},
title = {{Calculating Web Cache Hit Ratios}},
url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.3720},
year = {2000}
}
@inproceedings{consistent_hash97,
address = {New York, NY, USA},
author = {Karger, David and Lehman, Eric and Leighton, Tom and Panigrahy, Rina and Levine, Matthew and Lewin, Daniel},
booktitle = {STOC '97: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing},
doi = {http://doi.acm.org/10.1145/258533.258660},
isbn = {0-89791-888-6},
keywords = {hash analysis,p2p},
pages = {654--663},
publisher = {ACM},
title = {{Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web}},
year = {1997}
}
@inproceedings{hydrastor09,
abstract = {HYDRAstor is a scalable, secondary storage solution aimed at the enterprise market. The system consists of a back-end architectured as a grid of storage nodes built around a distributed hash table; and a front-end consisting of a layer of access nodes which implement a traditional file system interface and can be scaled in number for increased performance.},
address = {Berkeley, CA, USA},
author = {Dubnicki, Cezary and Gryz, Leszek and Heldt, Lukasz and Kaczmarczyk, Michal and Kilian, Wojciech and Strzelczak, Przemyslaw and Szczepkowski, Jerzy and Ungureanu, Cristian and Welnicki, Michal},
booktitle = {FAST '09: Proccedings of the 7th conference on File and storage technologies},
keywords = { fast, storage,2009},
pages = {197--210},
publisher = {USENIX Association},
title = {{HYDRAstor: a Scalable Secondary Storage}},
url = {http://portal.acm.org/citation.cfm?id=1525923},
year = {2009}
}
@inproceedings{can01,
address = {New York, NY, USA},
author = {Ratnasamy, Sylvia and Francis, Paul and Handley, Mark and Karp, Richard and Schenker, Scott},
booktitle = {SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications},
doi = {http://doi.acm.org/10.1145/383059.383072},
isbn = {1-58113-411-8},
keywords = { cas,p2p},
pages = {161--172},
publisher = {ACM},
title = {{A scalable content-addressable network}},
year = {2001}
}
@article{Meyer2008,
author = {Meyer, Dutch T. and Cully, Brendan and Wires, Jake and Hutchinson, Norman C. and Warfield, Andrew},
month = dec,
pages = {4},
title = {{Block mason}},
url = {http://dl.acm.org/citation.cfm?id=1855865.1855869},
year = {2008}
}
@inproceedings{extreme_binning09,
author = {Bhagwat, D and Eshghi, K and Long, D D E and Lillibridge, M},
booktitle = {IEEE MASCOTS '09},
pages = {1--9},
title = {{Extreme Binning: Scalable, parallel deduplication for chunk-based file backup}},
year = {2009}
}
@misc{exagrid,
annote = {$\backslash$verb+http://www.exagrid.com+},
keywords = { ExaGrid, storage,deduplication},
title = {{ExaGrid}},
url = {http://www.exagrid.com}
}
@article{Yolken2009,
author = {Yolken, BH},
number = {June},
title = {{Incentive-based resource allocation and control for large-scale computing services}},
url = {http://gradworks.umi.com/33/64/3364486.html},
year = {2009}
}
@inproceedings{(Christodorescu2009),
address = {Chicago, Illinois, USA},
author = {Christodorescu, Mihai and Sailer, Reiner and Schales, Douglas Lee and Sgandurra, Daniele and Zamboni, Diego},
file = {::},
pages = {97--102},
publisher = {ACM},
title = {{Cloud security is not (just) virtualization security: a short paper}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Mell2009,
author = {Mell, P and Grance, T},
file = {::},
journal = {National Institute of Standards and Technology},
title = {{The NIST Definition of Cloud Computing}},
url = {http://www.drieottawa.org/presentations/20100602/20100602\_roger\_mcilmoyle\_sungard.pdf},
year = {2009}
}
@techreport{Reeves2010,
author = {Reeves, Drue},
file = {::},
institution = {Gartner Inc.},
keywords = {Gartner},
mendeley-tags = {Gartner},
title = {{Hype Cycle for Cloud Computing, 2010}},
url = {http://my.gartner.com/portal/server.pt?open=512\&objID=260\&mode=2\&PageID=3460702\&resId=1410914\&ref=QuickSearch\&content=html\#toc},
year = {2010}
}
@article{Lin2009,
author = {Lin, Geng},
doi = {10.1109/MITP.2009.22},
file = {::},
journal = {IT Professional},
month = mar,
number = {2},
pages = {10--13},
title = {{Cloud Computing: IT as a Service}},
volume = {11},
year = {2009}
}
@article{Brynjolfsson2010,
author = {Brynjolfsson, Erik and Hofmann, Paul and Jordan, John},
doi = {10.1145/1735223.1735234},
issn = {00010782},
journal = {Communications of the ACM},
month = may,
number = {5},
pages = {32},
title = {{Cloud computing and electricity}},
url = {http://portal.acm.org/citation.cfm?doid=1735223.1735234},
volume = {53},
year = {2010}
}
@article{Erdogmus2008,
author = {Erdogmus, Hakan},
file = {::},
journal = {IEEE Software},
pages = {4--6},
title = {{Cloud Computing: Does Nirvana Hide behind the Nebula?}},
year = {2008}
}
@article{Group2009,
author = {Group, Spectrum and Associates, Hewitt and For, I T Budgets and Average, Quipment and The, Percent Rise and Insight, C I O},
journal = {CIO Insight},
number = {June},
pages = {13--15},
title = {{IT spending}},
year = {2009}
}
@article{Overell2010,
author = {Overell, By Bill and Executives, Financial and Foundation, Research and Decker, Van and Management, Performance and Systems, Management and Software, Web-oriented},
journal = {Agenda},
number = {february},
pages = {2009--2011},
title = {{Technologies Poised for Greatest Impact}},
year = {2010}
}
@inproceedings{(Wood2009),
author = {Wood, T. and Gerber, A. and Ramakrishnan, KK and Shenoy, P. and {Van Der Merwe}, J.},
file = {::},
title = {{The Case for Enterprise-Ready Virtual Private Clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Hayes2009,
author = {Hayes, J},
file = {::},
journal = {Engineering \&amp; Technology},
number = {April},
pages = {60--62},
title = {{Clout of the cloud}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4977572},
year = {2009}
}
@article{Sriram2008a,
author = {Sriram, Ilango and Khajeh-hosseini, Ali},
journal = {Methodology},
keywords = {cloud computing,cloud technologies,review},
title = {{Research Agenda in Cloud Technologies}},
year = {2008}
}
@article{VanRenesse2008,
address = {New York, New York, USA},
author = {van Renesse, Robbert and Rodrigues, Rodrigo and Spreitzer, Mike and Stewart, Christopher and Terry, Doug and Travostino, Franco},
file = {::},
journal = {Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware - LADIS '08},
pages = {1},
publisher = {ACM Press},
title = {{Challenges facing tomorrow's datacenter}},
url = {http://portal.acm.org/citation.cfm?doid=1529974.1529976},
year = {2008}
}
@article{Smith2009b,
author = {Smith, Roger},
journal = {New York},
number = {October},
pages = {65--69},
title = {{Computing in the cloud}},
year = {2009}
}
@inproceedings{1656114,
address = {Seoul, Korea},
author = {Zeng, Wenying and Zhao, Yuelong and Ou, Kairi and Song, Wei},
booktitle = {Ecology},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1655925.1656114},
pages = {1044--1048},
publisher = {ACM},
title = {{Research on cloud storage architecture and key technologies}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Wang2008,
author = {Wang, Lizhe and Tao, Jie and Kunze, Marcel and Castellanos, Alvaro Canales and Kramer, David and Karl, Wolfgang},
file = {::},
journal = {2008 10th IEEE International Conference on High Performance Computing and Communications},
pages = {825--830},
publisher = {Ieee},
title = {{Scientific Cloud Computing: Early Definition and Experience}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4637787},
year = {2008}
}
@article{(Vouk2008),
author = {Vouk, M.A.},
file = {::},
journal = {Journal of Computing and Information Technology},
number = {4},
pages = {235--246},
title = {{Cloud computing--Issues, research and implementations}},
type = {Journal article},
volume = {16},
year = {2008}
}
@article{(Armbrust2009),
author = {Armbrust, M. and Fox, A. and Griffith, R. and Joseph, A.D. and Katz, R.H. and Konwinski, A. and Lee, G. and Patterson, D.A. and Rabkin, A. and Stoica, I. and Others},
file = {::},
journal = {EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28},
title = {{Above the clouds: A berkeley view of cloud computing}},
type = {Journal article},
year = {2009}
}
@inproceedings{(Wood2009),
author = {Wood, T. and Gerber, A. and Ramakrishnan, KK and Shenoy, P. and {Van Der Merwe}, J.},
file = {::},
title = {{The Case for Enterprise-Ready Virtual Private Clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{VanRenesse2008,
address = {New York, New York, USA},
author = {van Renesse, Robbert and Rodrigues, Rodrigo and Spreitzer, Mike and Stewart, Christopher and Terry, Doug and Travostino, Franco},
doi = {10.1145/1529974.1529976},
file = {::},
isbn = {9781605582962},
journal = {Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware - LADIS '08},
pages = {1},
publisher = {ACM Press},
title = {{Challenges facing tomorrow's datacenter}},
url = {http://portal.acm.org/citation.cfm?doid=1529974.1529976},
year = {2008}
}
@article{Brunette2009,
author = {Brunette, G and Mogull, R},
journal = {CSA (Cloud Security Alliance), USA. Disponible en:},
number = {December},
pages = {1--76},
title = {{Security Guidance for critical areas of focus in Cloud Computing V2. 1}},
url = {http://scholar.google.com/scholar?hl=en\&btnG=Search\&q=intitle:Security+Guidance+for+critical+areas+of+focus+in+Cloud+Computing+V2.+1\#0},
year = {2009}
}
@article{Kleinrock2003,
author = {Kleinrock, L},
doi = {10.1016/S1570-8705(03)00012-X},
file = {::},
issn = {15708705},
journal = {Ad Hoc Networks},
keywords = {embedded devices,internet vision,nomadicity,smart spaces,ubiquitous computing},
number = {1},
pages = {3--11},
title = {{An Internet vision: the invisible global infrastructure}},
url = {http://linkinghub.elsevier.com/retrieve/pii/S157087050300012X},
volume = {1},
year = {2003}
}
@article{Mell2009,
author = {Mell, P and Grance, T},
file = {::},
journal = {National Institute of Standards and Technology},
title = {{The NIST Definition of Cloud Computing}},
url = {http://www.drieottawa.org/presentations/20100602/20100602\_roger\_mcilmoyle\_sungard.pdf},
year = {2009}
}
@article{(Motahari-Nezhad2009),
author = {Motahari-Nezhad, H.R. and Stephenson, B. and Singhal, S.},
journal = {HP Laboratories--2009},
title = {{Outsourcing Business to Cloud Computing Services: Opportunities and Challenges}},
type = {Journal article},
year = {2009}
}
@article{(Birman2009),
author = {Birman, Ken and Chockler, Gregory and Renesse, Robbert Van and van Renesse, Robbert},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1556154.1556172},
journal = {SIGACT News},
number = {2},
pages = {68--80},
publisher = {ACM},
title = {{Toward a cloud computing research agenda}},
type = {Journal article},
volume = {40},
year = {2009}
}
@article{Motahari-nezhad2009,
author = {Motahari-nezhad, Hamid R and Stephenson, Bryan and Singhal, Sharad},
file = {::;::},
journal = {Development},
keywords = {Business Outsou,business outsourcing,cloud computing,s,service oriented computing,virtual business},
title = {{Outsourcing Business to Cloud Computing Services : Opportunities and Challenges Outsourcing Business to Cloud Computing Services : Opportunities and Challenges}},
year = {2009}
}
@inproceedings{Langenberg2011b,
abstract = {Communication and sharing of knowledge are important challenges for virtual organizations (VO) in the globalized economy. There are various tools available to virtually reduce geographical distances and to support collaboration. Also for the management of knowledge appropriate solutions are available. But VOs typically have limited time to setup the entire IT- infrastructure for their collaboration. Therefore the trend to buy ready-to-use products exists. This paper characterizes requests of VOs for SaaS products, proposes functionalities to support team work and describes challenges with their solutions in the cloud.},
author = {Langenberg, Dirk and Dames, Martin and Kind, Christian},
booktitle = {Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies (i-KNOW '11 )},
doi = {10.1145/2024288.2024331},
editor = {Lindstaedt, Stefanie and Granitzer, Michael},
file = {::},
isbn = {978-1-4503-0732-1},
keywords = {Cloud Computing,KnowledgeCloud,cloud computing,knowledge management,software as a service,virtual organizations},
mendeley-tags = {Cloud Computing,KnowledgeCloud},
publisher = {ACM New York, NY, USA},
series = {ACM International Conference Proceeding Series},
title = {{Knowledge Management in Cloud Environments}},
url = {http://dl.acm.org/citation.cfm?doid=2024288.2024331},
year = {2011}
}
@article{Paul2010,
abstract = {This issue of World Health \& Population presents papers that have been published online by WHP and are selected here as representative of recent outstanding contributions to the journal. The papers in this issue include two from China and one each from Bangladesh, Kenya and Kuwait.},
author = {Paul, John E},
issn = {1718-3340},
journal = {World health \& population},
month = jan,
number = {4},
pages = {3--4},
pmid = {20739834},
title = {{From the Editor-in-Chief.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20798141},
volume = {11},
year = {2010}
}
@article{Science2009,
author = {Science, Computer and Rourkela, Technology},
journal = {Response},
number = {May},
title = {{Dynamic Approach for Web Services Selection and Master of Technology and Prof . Sanjay Kumar Jena}},
year = {2009}
}
@article{Smith2009a,
author = {Smith, David Mitchell and Plummer, Daryl C and Cearley, David W},
journal = {Business},
number = {June},
title = {{The What, Why and When of Cloud Computing}},
year = {2009}
}
@inproceedings{(Cryans2008),
address = {Munich, Germany},
author = {Cryans, Jean-Daniel and April, Alain and Abran, Alain},
doi = {http://dx.doi.org.library.capella.edu/10.1007/978-3-540-89403-2\_11},
pages = {114--126},
publisher = {Springer-Verlag},
title = {{Criteria to Compare Cloud Computing with Current Database Technology}},
type = {Conference proceedings (article)},
year = {2008}
}
@article{Luftman2009,
author = {Luftman, Jerry and McLean, ER},
journal = {MIS Quarterly Executive},
number = {1},
title = {{Key issues for IT executives}},
url = {http://misqe.org/ojs2/index.php/misqe/article/view/55},
volume = {9},
year = {2009}
}
@article{Buyya2008a,
author = {Buyya, Rajkumar and Yeo, Chee Shin and Venugopal, Srikumar},
file = {::},
journal = {2008 10th IEEE International Conference on High Performance Computing and Communications},
month = sep,
pages = {5--13},
publisher = {Ieee},
title = {{Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4637675},
year = {2008}
}
@article{Takabi2010,
abstract = {The cloud computing paradigm is still evolving, but has recently gained tremendous momentum. However, security and privacy issues pose as the key roadblock to its fast adoption. In this article, the authors present security and privacy challenges that are exacerbated by the unique aspects of clouds and show how they're related to various delivery and deployment models. They discuss various approaches to address these challenges, existing solutions, and future work needed to provide a trustworthy cloud computing environment.},
author = {Takabi, Hassan and Joshi, James B.D. and Ahn, Gail-Joon},
doi = {10.1109/MSP.2010.186},
file = {::},
issn = {1540-7993},
journal = {IEEE Security \& Privacy Magazine},
month = nov,
number = {6},
pages = {24--31},
publisher = {IEEE Computer Society},
title = {{Security and Privacy Challenges in Cloud Computing Environments}},
url = {http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2010.186},
volume = {8},
year = {2010}
}
@article{Hao2009,
author = {Hao, Fang and Lakshman, TV and Mukherjee, Sarit and H},
journal = {workshop on Virtualized},
keywords = {all or part of,data center,is granted without fee,or hard copies of,permission to make digital,personal or classroom use,provided that copies are,this work for,virtualization,vm migration},
pages = {37--44},
title = {{Enhancing dynamic cloud-based services using network virtualization}},
url = {http://portal.acm.org/citation.cfm?id=1592648.1592655},
year = {2009}
}
@article{Rehmani2009,
author = {Rehmani, Mubashir Husain and Doria, Sidney and Senouci, Mustapha Reda},
file = {::},
journal = {Network},
title = {{A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector ( AODV ) Protocol in Network Simulator ( NS-2 )}},
year = {2009}
}
@article{Voas2009,
author = {Voas, Jeffrey and Zhang, Jia},
file = {::;::},
journal = {IT Professional},
month = mar,
number = {2},
pages = {15--17},
title = {{Cloud Computing: New Wine or Just a New Bottle?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4804043},
volume = {11},
year = {2009}
}
@article{Malet2009,
author = {Malet, Barnaby},
journal = {Computing},
title = {{PhD Literature Review}},
year = {2009}
}
@article{Wang2011,
author = {Wang, Yuedui and Wen, Xiangming and Sun, Yong and Zhao, Zhenmin and Yang, Tianpu},
doi = {10.1109/NCIS.2011.28},
file = {::},
isbn = {978-1-61284-347-6},
journal = {2011 International Conference on Network Computing and Information Security},
month = may,
pages = {98--102},
publisher = {Ieee},
title = {{The Content Delivery Network System Based on Cloud Storage}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5948697},
year = {2011}
}
@article{Lenk2009a,
author = {Lenk, Alexander and Klems, Markus and Nimis, Jens and Tai, Stefan and Sandholm, Thomas},
doi = {10.1109/CLOUD.2009.5071529},
isbn = {978-1-4244-3713-9},
journal = {2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing},
keywords = {[Electronic Manuscript]},
month = may,
pages = {23--31},
publisher = {Ieee},
title = {{What's inside the Cloud? An architectural map of the Cloud landscape}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071529},
year = {2009}
}
@article{Baliga2009a,
author = {Baliga, Jayant and Ayre, Robert and Hinton, Kerry and Sorin, Wayne V W.V. and Tucker, R.S. Rodney S},
doi = {10.1109/JLT.2008.2010142},
file = {::},
issn = {0733-8724},
journal = {Journal of Lightwave Technology},
month = jul,
number = {13},
pages = {2391--2403},
title = {{Energy Consumption in Optical IP Networks}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4815495},
volume = {27},
year = {2009}
}
@article{(Motahari-Nezhad2009),
author = {Motahari-Nezhad, H.R. and Stephenson, B. and Singhal, S.},
file = {::},
journal = {HP Laboratories--2009},
title = {{Outsourcing Business to Cloud Computing Services: Opportunities and Challenges}},
type = {Journal article},
year = {2009}
}
@inproceedings{(Zhang2009),
address = {Chicago, Illinois, USA},
author = {Zhang, Xinwen and Schiffman, Joshua and Gibbs, Simon and Kunjithapatham, Anugeetha and Jeong, Sangoh},
file = {::},
pages = {127--134},
publisher = {ACM},
title = {{Securing elastic applications on mobile devices for cloud computing}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{White2009,
author = {White, Barbara Jo and Brown, Jo Ann E and Deale, Cynthia S and Hardin, Adam T},
journal = {Information Systems},
keywords = {cloud computing,collaboration,google},
number = {2},
title = {{Collaboration using cloud computing and traditional systems}},
volume = {X},
year = {2009}
}
@article{(Wood),
author = {Wood, T. and Ramakrishnan, KK and Shenoy, P. and {Van der Merwe}, J.},
file = {::},
title = {{CloudNet: A Platform for Optimized WAN Migration of Virtual Machines}},
type = {Journal article},
year = {2010}
}
@inproceedings{DeCandia:2007:DAH:1294261.1294281,
address = {New York, New York, USA},
author = {DeCandia, Giuseppe and Hastorun, Deniz and Jampani, Madan and Kakulapati, Gunavardhan and Lakshman, Avinash and Pilchin, Alex and Sivasubramanian, Swaminathan and Vosshall, Peter and Vogels, Werner},
booktitle = {Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles - SOSP '07},
doi = {10.1145/1294261.1294281},
file = {::},
isbn = {9781595935915},
keywords = {performance,reliability,scalability},
pages = {205--220},
publisher = {ACM Press},
series = {SOSP '07},
title = {{Dynamo: Amazon’s Highly Available Key-value Store}},
url = {http://portal.acm.org/citation.cfm?doid=1294261.1294281},
year = {2007}
}
@article{VIJAYAWADA2005,
author = {VIJAYAWADA, I and JANGAREDDYGUDEM, I},
title = {{CLOUD COMPUTING: AN OVERVIEW}},
url = {http://www.jatit.org/volumes/research-papers/Vol9No1/10Vol9No1.pdf},
year = {2005}
}
@article{Luftman2009,
author = {Luftman, Jerry and McLean, ER},
file = {::},
journal = {MIS Quarterly Executive},
number = {1},
title = {{Key issues for IT executives}},
url = {http://misqe.org/ojs2/index.php/misqe/article/view/55},
volume = {9},
year = {2009}
}
@article{(Vaquero2009),
author = {Vaquero, Luis M. and Merino, L and Caceres, Juan and Lindner, Maik and Rodero-Merino, Luis},
doi = {http://doi.acm.org/10.1145/1496091.1496100},
file = {::},
journal = {SIGCOMM Comput. Commun. Rev.},
number = {1},
pages = {50--55},
publisher = {ACM},
title = {{A break in the clouds: towards a cloud definition}},
type = {Journal article},
volume = {39},
year = {2009}
}
@inproceedings{(Pearson2009),
author = {Pearson, Siani},
file = {::},
pages = {44--52},
publisher = {IEEE Computer Society},
title = {{Taking account of privacy when designing cloud computing services}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Vouk2008a,
author = {Vouk, Mladen a.},
doi = {10.1109/ITI.2008.4588381},
file = {::},
isbn = {978-953-7138-12-7},
journal = {ITI 2008 - 30th International Conference on Information Technology Interfaces},
keywords = {cloud,computing,end-to-end quality of,utility computing,virtual computing lab,virtualization},
month = jun,
pages = {31--40},
publisher = {Ieee},
title = {{Cloud computing — Issues, research and implementations}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4588381},
year = {2008}
}
@article{Stocker2010,
abstract = {A new open-source software project is presented, JEMRIS, the J\"{u}lich Extensible MRI Simulator, which provides an MRI sequence development and simulation environment for the MRI community. The development was driven by the desire to achieve generality of simulated three-dimensional MRI experiments reflecting modern MRI systems hardware. The accompanying computational burden is overcome by means of parallel computing. Many aspects are covered that have not hitherto been simultaneously investigated in general MRI simulations such as parallel transmit and receive, important off-resonance effects, nonlinear gradients, and arbitrary spatiotemporal parameter variations at different levels. The latter can be used to simulate various types of motion, for instance. The JEMRIS user interface is very simple to use, but nevertheless it presents few limitations. MRI sequences with arbitrary waveforms and complex interdependent modules are modeled in a graphical user interface-based environment requiring no further programming. This manuscript describes the concepts, methods, and performance of the software. Examples of novel simulation results in active fields of MRI research are given.},
author = {St\"{o}cker, Tony and Vahedipour, Kaveh and Pflugfelder, Daniel and Shah, N Jon},
doi = {10.1002/mrm.22406},
file = {::},
issn = {1522-2594},
journal = {Magnetic resonance in medicine : official journal of the Society of Magnetic Resonance in Medicine / Society of Magnetic Resonance in Medicine},
month = jul,
number = {1},
pages = {186--93},
pmid = {20577987},
publisher = {IEEE Computer Society},
title = {{High-performance computing MRI simulations.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20643689},
volume = {64},
year = {2010}
}
@article{(Vaquero2009),
author = {Vaquero, Luis M. and Rodero-Merino, Luis and Caceres, Juan and Lindner, Maik},
file = {::},
journal = {SIGCOMM Comput. Commun. Rev.},
number = {1},
pages = {50--55},
publisher = {ACM},
title = {{A break in the clouds: towards a cloud definition}},
type = {Journal article},
volume = {39},
year = {2009}
}
@article{Yang2009,
author = {Yang, Haibo and Tate, Mary},
journal = {Future Generation Computer Systems},
keywords = {cloud computing,descriptive literature review},
pages = {807--819},
title = {{Where are we at with Cloud Computing?: A Descriptive Literature Review}},
year = {2009}
}
@inproceedings{1656114,
address = {Seoul, Korea},
author = {Zeng, Wenying and Zhao, Yuelong and Ou, Kairi and Song, Wei},
file = {::},
pages = {1044--1048},
publisher = {ACM},
title = {{Research on cloud storage architecture and key technologies}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Mowbray2009a,
author = {Mowbray, M and Pearson, S},
journal = {HP Technical Report},
title = {{A Client-Based Privacy Manager for Cloud Computing}},
year = {2009}
}
@inproceedings{Foster2008,
abstract = {Cloud Computing has become another buzzword after Web 2.0. However, there are dozens of different definitions for Cloud Computing and there seems to be no consensus on what a Cloud is. On the other hand, Cloud Computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established Grid Computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. This paper strives to compare and contrast Cloud Computing with Grid Computing from various angles and give insights into the essential characteristics of both.},
author = {Foster, Ian and Zhao, Yong and Raicu, Ioan and Lu, Shiyong},
booktitle = {2008 Grid Computing Environments Workshop},
doi = {10.1109/GCE.2008.4738445},
file = {::},
isbn = {978-1-4244-2860-1},
month = nov,
pages = {1--10},
publisher = {IEEE},
title = {{Cloud Computing and Grid Computing 360-Degree Compared}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4738445},
year = {2008}
}
@article{Paul2010,
abstract = {This issue of World Health \& Population presents papers that have been published online by WHP and are selected here as representative of recent outstanding contributions to the journal. The papers in this issue include two from China and one each from Bangladesh, Kenya and Kuwait.},
author = {Paul, John E},
file = {::},
issn = {1718-3340},
journal = {World health \& population},
month = jan,
number = {4},
pages = {3--4},
pmid = {20739834},
title = {{From the Editor-in-Chief.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20798141},
volume = {11},
year = {2010}
}
@article{Schatz2010,
author = {Schatz, Michael C and Langmead, Ben and Salzberg, Steven L},
file = {::},
journal = {Nature biotechnology},
month = jul,
number = {7},
pages = {691--3},
title = {{Cloud computing and the DNA data race.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2904649\&tool=pmcentrez\&rendertype=abstract},
volume = {28},
year = {2010}
}
@article{Voas2009,
author = {Voas, Jeffrey and Zhang, Jia},
doi = {10.1109/MITP.2009.23},
issn = {1520-9202},
journal = {IT Professional},
month = mar,
number = {2},
pages = {15--17},
title = {{Cloud Computing: New Wine or Just a New Bottle?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4804043},
volume = {11},
year = {2009}
}
@article{Katzan2010a,
author = {Katzan, Harry},
journal = {Science},
keywords = {-as-a-service,but that is only,cloud computing,cloud computing concepts,community cloud,facilities via the internet,half of the,hybrid cloud,infrastructure,loud computing is a,means of providing computer,platform-as-a-service,private cloud,public cloud,software architecture,software-as-a-service},
number = {1},
title = {{On An Ontological View Of Cloud Computing}},
volume = {3},
year = {2010}
}
@article{(Vouk2008),
author = {Vouk, M.A.},
file = {::},
journal = {Journal of Computing and Information Technology},
number = {4},
pages = {235--246},
title = {{Cloud computing--Issues, research and implementations}},
type = {Journal article},
volume = {16},
year = {2008}
}
@techreport{Reeves2010,
annote = {        From Duplicate 1 (                   Hype Cycle for Cloud Computing, 2010                 - Reeves, Drue )
                
Retrieved from Gartner database
        
      },
author = {Reeves, Drue},
institution = {Gartner Inc.},
keywords = {Gartner},
mendeley-tags = {Gartner},
title = {{Hype Cycle for Cloud Computing, 2010}},
url = {http://my.gartner.com/portal/server.pt?open=512\&objID=260\&mode=2\&PageID=3460702\&resId=1410914\&ref=QuickSearch\&content=html\#toc},
year = {2010}
}
@article{(Wood),
author = {Wood, T. and Ramakrishnan, KK and Shenoy, P. and {Van der Merwe}, J.},
file = {::},
title = {{CloudNet: A Platform for Optimized WAN Migration of Virtual Machines}},
type = {Journal article},
year = {2010}
}
@article{VanRenesse2008,
address = {New York, New York, USA},
author = {van Renesse, Robbert and Rodrigues, Rodrigo and Spreitzer, Mike and Stewart, Christopher and Terry, Doug and Travostino, Franco},
doi = {10.1145/1529974.1529976},
isbn = {9781605582962},
journal = {Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware - LADIS '08},
pages = {1},
publisher = {ACM Press},
title = {{Challenges facing tomorrow's datacenter}},
url = {http://portal.acm.org/citation.cfm?doid=1529974.1529976},
year = {2008}
}
@techreport{Reeves2010,
annote = {Retrieved from Gartner database},
author = {Reeves, Drue},
file = {::},
institution = {Gartner Inc.},
keywords = {Gartner},
mendeley-tags = {Gartner},
title = {{Hype Cycle for Cloud Computing, 2010}},
url = {http://my.gartner.com/portal/server.pt?open=512\&objID=260\&mode=2\&PageID=3460702\&resId=1410914\&ref=QuickSearch\&content=html\#toc},
year = {2010}
}
@article{Science2009a,
author = {Science, Computer and Morris, Robert T and Supervisor, Thesis and Zeldovich, Nickolai and Orlando, Terry P},
journal = {Computer},
number = {2001},
title = {{Improving Web Site Security with Data Flow Management}},
year = {2009}
}
@article{Brynjolfsson2010,
author = {Brynjolfsson, Erik and Hofmann, Paul and Jordan, John},
file = {::},
journal = {Communications of the ACM},
month = may,
number = {5},
pages = {32},
title = {{Cloud computing and electricity}},
url = {http://portal.acm.org/citation.cfm?doid=1735223.1735234},
volume = {53},
year = {2010}
}
@article{Leavitt2009a,
author = {Leavitt, Neal},
doi = {10.1109/MC.2009.20},
issn = {0018-9162},
journal = {IEEE Computer},
month = jan,
number = {1},
pages = {15--20},
title = {{Is Cloud Computing Really Ready for Prime Time?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4755149},
volume = {42},
year = {2009}
}
@article{Rich2008a,
author = {Rich, Brandon and Thain, Douglas},
journal = {Architecture},
keywords = {active storage,age capacity and processing,capability,cloud computing,each is a commod-,ity machine running a,provides remote,transactions,user level server that},
pages = {233--234},
title = {{DataLab: Transactional Data-Parallel Computing on an Active Storage Cloud}},
year = {2008}
}
@article{(Vaquero2009),
author = {Vaquero, Luis M. and Merino, L and Caceres, Juan and Lindner, Maik and Rodero-Merino, Luis},
doi = {http://doi.acm.org/10.1145/1496091.1496100},
file = {::},
journal = {SIGCOMM Comput. Commun. Rev.},
number = {1},
pages = {50--55},
publisher = {ACM},
title = {{A break in the clouds: towards a cloud definition}},
type = {Journal article},
volume = {39},
year = {2009}
}
@article{(Birman2009),
author = {Birman, Ken and Chockler, Gregory and van Renesse, Robbert},
file = {::},
journal = {SIGACT News},
number = {2},
pages = {68--80},
publisher = {ACM},
title = {{Toward a cloud computing research agenda}},
type = {Journal article},
volume = {40},
year = {2009}
}
@article{Raman2009,
author = {Raman, T. V.},
file = {::},
journal = {Communications of the ACM},
month = feb,
number = {2},
pages = {52},
publisher = {ACM},
title = {{Toward 2 W , beyond web 2.0}},
url = {http://portal.acm.org/citation.cfm?doid=1461928.1461945},
volume = {52},
year = {2009}
}
@article{Baliga2011,
author = {Baliga, J. and Ayre, R.W.A. and Hinton, Kerry and Tucker, R.S.},
file = {::;::},
journal = {Proceedings of the IEEE},
number = {1},
pages = {149--167},
publisher = {IEEE},
title = {{Green cloud computing: Balancing energy in processing, storage, and transport}},
url = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=5559320},
volume = {99},
year = {2011}
}
@article{DaSilva2010,
abstract = {Knowledge of the structure of specimens is crucial to determine the role that they play in cellular and molecular biology. To yield the three-dimensional (3D) reconstruction by means of tomographic reconstruction algorithms, we need the use of large projection images and high processing time. Therefore, we propose the use of the high performance computing (HPC) to cope with the huge computational demands of this problem. We have implemented a HPC strategy where the distribution of tasks follows the master-slave paradigm. The master processor distributes a slab of slices, a piece of the final 3D structure to reconstruct, among the slave processors and receives reconstructed slices of the volume. We have evaluated the performance of our HPC approach using different sizes of the slab. We have observed that it is possible to find out an optimal size of the slab for the number of processor used that minimize communications time while maintaining a reasonable grain of parallelism to be exploited by the set of processors.},
author = {da Silva, M Laura and Roca-Piera, Javier and Fern\'{a}ndez, Jos\'{e}-Jes\'{u}s},
doi = {10.1007/978-1-4419-5913-3\_38},
issn = {0065-2598},
journal = {Advances in experimental medicine and biology},
keywords = {Algorithms,Automatic Data Processing,Computational Biology,Electron Microscope Tomography,Electron Microscope Tomography: methods,Electron Microscope Tomography: statistics \& numer,Imaging, Three-Dimensional,Imaging, Three-Dimensional: methods,Imaging, Three-Dimensional: statistics \& numerical,Time Factors},
month = jan,
pages = {335--42},
pmid = {20865517},
publisher = {IEEE Computer Society},
title = {{High performance computing approaches for 3D reconstruction of complex biological specimens.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=3109751\&tool=pmcentrez\&rendertype=abstract},
volume = {680},
year = {2010}
}
@article{(Birman2009),
author = {Birman, Ken and Chockler, Gregory and van Renesse, Robbert and Renesse, Robbert Van},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1556154.1556172},
journal = {SIGACT News},
number = {2},
pages = {68--80},
publisher = {ACM},
title = {{Toward a cloud computing research agenda}},
type = {Journal article},
volume = {40},
year = {2009}
}
@article{Ubiquity2008,
author = {Ubiquity, A C M and Co, Hewlett-packard},
journal = {Computing},
keywords = {1,a massive shift towards,and,as it enables creation,based on the new,computing clouds,data centers,economy of services,emerging computational mega-structures,grids,major role,of new business platforms,technology devices,technology plays here the,very large-scale systems,we are witnessing today,web science},
number = {31},
pages = {9--12},
title = {{Emergence of The Academic Computing Clouds}},
volume = {9},
year = {2008}
}
@inproceedings{(Nurmi2009),
author = {Nurmi, Daniel and Wolski, Rich and Grzegorczyk, Chris and Obertelli, Graziano and Soman, Sunil and Youseff, Lamia and Zagorodnov, Dmitrii},
file = {::},
pages = {124--131},
publisher = {IEEE Computer Society},
title = {{The Eucalyptus Open-Source Cloud-Computing System}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{(Sterling2009),
author = {Sterling, Thomas and Stark, Dylan},
file = {::},
journal = {Computing in Science and Engineering},
number = {4},
pages = {42--49},
publisher = {IEEE Computer Society},
title = {{A High-Performance Computing Forecast: Partly Cloudy}},
type = {Journal article},
volume = {11},
year = {2009}
}
@article{Napper2009,
abstract = {Computing as a utility has reached the mainstream. Scientists can now rent time on large commercial clusters through several vendors. The cloud computing model provides flexible support for "pay as you go" systems. In addition to no upfront investment in large clusters or supercomputers, such systems incur no maintenance costs. Furthermore, they can be expanded and reduced on-demand in real-time. Current cloud computing performance falls short of systems specifically designed for scientific applications. Scientific computing needs are quite different from those of web applications--composed primarily of database queries--that have been the focus of cloud computing vendors. In this paper we investigate the use of cloud computing for high-performance numerical applications. In particular, we assume unlimited monetary resources to answer the question, "How high can a cloud computing service get in the TOP500 list?" We show results for the Linpack benchmark on different allocations on Amazon EC2.},
author = {Napper, Jeffrey and Bientinesi, Paolo},
file = {::},
journal = {Conference On Computing Frontiers},
keywords = {Cloud,amazon,cloud computing,hpl},
mendeley-tags = {Cloud},
pages = {3},
title = {{Can cloud computing reach the top500?}},
year = {2009}
}
@article{Kaufman2010,
author = {Kaufman, Lori M.},
doi = {10.1109/MSP.2010.120},
file = {::},
issn = {1540-7993},
journal = {IEEE Security \& Privacy Magazine},
month = jul,
number = {4},
pages = {55--57},
publisher = {IEEE Computer Society},
title = {{Can Public-Cloud Security Meet Its Unique Challenges?}},
url = {http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2010.120},
volume = {8},
year = {2010}
}
@inproceedings{1656114,
address = {Seoul, Korea},
author = {Zeng, Wenying and Zhao, Yuelong and Ou, Kairi and Song, Wei},
booktitle = {Ecology},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1655925.1656114},
file = {::},
pages = {1044--1048},
publisher = {ACM},
title = {{Research on cloud storage architecture and key technologies}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Raman2009,
author = {Raman, T. V.},
doi = {10.1145/1461928.1461945},
issn = {00010782},
journal = {Communications of the ACM},
month = feb,
number = {2},
pages = {52},
publisher = {ACM},
title = {{Toward 2 W , beyond web 2.0}},
url = {http://portal.acm.org/citation.cfm?doid=1461928.1461945},
volume = {52},
year = {2009}
}
@article{Brunette2009,
author = {Brunette, G and Mogull, R},
file = {::},
journal = {CSA (Cloud Security Alliance), USA. Disponible en:},
number = {December},
pages = {1--76},
title = {{Security Guidance for critical areas of focus in Cloud Computing V2. 1}},
url = {http://scholar.google.com/scholar?hl=en\&btnG=Search\&q=intitle:Security+Guidance+for+critical+areas+of+focus+in+Cloud+Computing+V2.+1\#0},
year = {2009}
}
@article{Lin2009,
author = {Lin, Geng},
file = {::},
journal = {IT Professional},
month = mar,
number = {2},
pages = {10--13},
title = {{Cloud Computing: IT as a Service}},
volume = {11},
year = {2009}
}
@article{Oracle2010,
author = {Oracle, An and Paper, White},
journal = {Computing},
number = {May},
pages = {1--22},
title = {{Oracle Cloud Computing 1}},
year = {2010}
}
@article{VIJAYAWADA2005,
author = {VIJAYAWADA, I and JANGAREDDYGUDEM, I},
file = {::},
title = {{CLOUD COMPUTING: AN OVERVIEW}},
url = {http://www.jatit.org/volumes/research-papers/Vol9No1/10Vol9No1.pdf},
year = {2005}
}
@article{Schatz2010,
author = {Schatz, Michael C and Langmead, Ben and Salzberg, Steven L},
doi = {10.1038/nbt0710-691},
file = {::},
issn = {1546-1696},
journal = {Nature biotechnology},
month = jul,
number = {7},
pages = {691--3},
pmid = {20622843},
title = {{Cloud computing and the DNA data race.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2904649\&tool=pmcentrez\&rendertype=abstract},
volume = {28},
year = {2010}
}
@article{Mishra,
author = {Mishra, Amitabh},
file = {::},
journal = {Wireless Networks},
title = {{Dynamic Source Routing ( DSR ) Protocol}}
}
@article{(Sterling2009),
author = {Sterling, Thomas and Stark, Dylan},
doi = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2009.111},
journal = {Computing in Science and Engineering},
number = {4},
pages = {42--49},
publisher = {IEEE Computer Society},
title = {{A High-Performance Computing Forecast: Partly Cloudy}},
type = {Journal article},
volume = {11},
year = {2009}
}
@article{Luftman2009,
author = {Luftman, Jerry and McLean, ER},
file = {::},
journal = {MIS Quarterly Executive},
number = {1},
title = {{Key issues for IT executives}},
url = {http://misqe.org/ojs2/index.php/misqe/article/view/55},
volume = {9},
year = {2009}
}
@article{Fox2010,
author = {Fox, A and Griffith, Rean and Joseph, AD and Katz, Randy and A},
file = {::},
journal = {of the ACM},
title = {{A view of cloud computing}},
url = {http://portal.acm.org/citation.cfm?id=1721672},
year = {2010}
}
@inproceedings{(Grossman2008),
address = {Las Vegas, Nevada, USA},
author = {Grossman, Robert and Gu, Yunhong},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1401890.1402000},
pages = {920--927},
publisher = {ACM},
title = {{Data mining using high performance data clouds: experimental studies using sector and sphere}},
type = {Conference proceedings (article)},
year = {2008}
}
@article{Paul2010,
abstract = {This issue of World Health \& Population presents papers that have been published online by WHP and are selected here as representative of recent outstanding contributions to the journal. The papers in this issue include two from China and one each from Bangladesh, Kenya and Kuwait.},
author = {Paul, John E},
file = {::},
journal = {World health \& population},
month = jan,
number = {4},
pages = {3--4},
title = {{From the Editor-in-Chief.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20798141},
volume = {11},
year = {2010}
}
@article{Natis2009,
author = {Natis, Yefim V and Knipp, Eric},
journal = {Environment},
number = {June},
pages = {1--10},
title = {{APaaS : A Step to a ' Killer App ' for Cloud Computing ?}},
year = {2009}
}
@article{Baliga2009,
author = {Baliga, J. and Ayre, R. and Hinton, K. and Sorin, W.V. and Tucker, R.S.},
doi = {10.1109/JLT.2008.2010142},
issn = {0733-8724},
journal = {Journal of Lightwave Technology},
month = jul,
number = {13},
pages = {2391--2403},
title = {{Energy Consumption in Optical IP Networks}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4815495},
volume = {27},
year = {2009}
}
@article{(Vouk2008),
author = {Vouk, M.A.},
file = {::},
journal = {Journal of Computing and Information Technology},
number = {4},
pages = {235--246},
title = {{Cloud computing--Issues, research and implementations}},
type = {Journal article},
volume = {16},
year = {2008}
}
@article{Leavitt2009a,
author = {Leavitt, Neal},
doi = {10.1109/MC.2009.20},
file = {::},
issn = {0018-9162},
journal = {IEEE Computer},
month = jan,
number = {1},
pages = {15--20},
title = {{Is Cloud Computing Really Ready for Prime Time?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4755149},
volume = {42},
year = {2009}
}
@article{VIJAYAWADA2005,
author = {VIJAYAWADA, I and JANGAREDDYGUDEM, I},
file = {::},
title = {{CLOUD COMPUTING: AN OVERVIEW}},
url = {http://www.jatit.org/volumes/research-papers/Vol9No1/10Vol9No1.pdf},
year = {2005}
}
@article{(Wood),
author = {Wood, T. and Ramakrishnan, KK and Shenoy, P. and {Van der Merwe}, J.},
title = {{CloudNet: A Platform for Optimized WAN Migration of Virtual Machines}},
type = {Journal article},
year = {2010}
}
@article{Lin2009,
author = {Lin, Geng},
doi = {10.1109/MITP.2009.22},
journal = {IT Professional},
month = mar,
number = {2},
pages = {10--13},
title = {{Cloud Computing: IT as a Service}},
volume = {11},
year = {2009}
}
@inproceedings{(Zhang2009),
address = {Chicago, Illinois, USA},
author = {Zhang, Xinwen and Schiffman, Joshua and Gibbs, Simon and Kunjithapatham, Anugeetha and Jeong, Sangoh},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1655008.1655026},
file = {::},
pages = {127--134},
publisher = {ACM},
title = {{Securing elastic applications on mobile devices for cloud computing}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Motahari-nezhad2009,
author = {Motahari-nezhad, Hamid R and Stephenson, Bryan and Singhal, Sharad},
journal = {Development},
keywords = {Business Outsou,business outsourcing,cloud computing,s,service oriented computing,virtual business},
title = {{Outsourcing Business to Cloud Computing Services : Opportunities and Challenges Outsourcing Business to Cloud Computing Services : Opportunities and Challenges}},
year = {2009}
}
@article{Lamy2007,
abstract = {Affymetrix SNP arrays can interrogate thousands of SNPs at the same time. This allows us to look at the genomic content of cancer cells and to investigate the underlying events leading to cancer. Genomic copy-numbers are today routinely derived from SNP array data, but the proposed algorithms for this task most often disregard the genotype information available from germline cells in paired germline-tumour samples. Including this information may deepen our understanding of the "true" biological situation e.g. by enabling analysis of allele specific copy-numbers. Here we rely on matched germline-tumour samples and have developed a Hidden Markov Model (HMM) to estimate allelic copy-number changes in tumour cells. Further with this approach we are able to estimate the proportion of normal cells in the tumour (mixture proportion).},
author = {Lamy, Philippe and Andersen, Claus L and Dyrskjot, Lars and Torring, Niels and Wiuf, Carsten},
file = {::},
issn = {1471-2105},
journal = {BMC bioinformatics},
keywords = {Algorithms,Alleles,DNA Mutational Analysis,DNA Mutational Analysis: methods,DNA, Neoplasm,DNA, Neoplasm: analysis,Gene Dosage,Genome, Human,Genotype,Humans,Male,Markov Chains,Models, Statistical,Neoplasms,Neoplasms: diagnosis,Neoplasms: genetics,Oligonucleotide Array Sequence Analysis,Polymorphism, Single Nucleotide,Sensitivity and Specificity},
month = jan,
pages = {434},
title = {{A Hidden Markov Model to estimate population mixture and allelic copy-numbers in cancers using Affymetrix SNP arrays.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=3048369\&tool=pmcentrez\&rendertype=abstract},
volume = {8},
year = {2007}
}
@inproceedings{(Siebenlist2009),
address = {Stresa, Italy},
author = {Siebenlist, Frank},
doi = {http://doi.acm.org/10.1145/1542207.1542209},
pages = {1--2},
publisher = {ACM},
title = {{Challenges and opportunities for virtualized security in the clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Wooda,
author = {Wood, Timothy},
file = {::},
title = {{The Case for Enterprise-Ready Virtual Private Clouds University of Massachusetts Amherst}}
}
@article{Vouk2008a,
author = {Vouk, Mladen a.},
doi = {10.1109/ITI.2008.4588381},
file = {::},
isbn = {978-953-7138-12-7},
journal = {ITI 2008 - 30th International Conference on Information Technology Interfaces},
keywords = {cloud,computing,end-to-end quality of,utility computing,virtual computing lab,virtualization},
month = jun,
pages = {31--40},
publisher = {Ieee},
title = {{Cloud computing — Issues, research and implementations}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4588381},
year = {2008}
}
@article{Cellary,
author = {Cellary, Wojciech and Strykowski, Sergiusz},
journal = {Computing},
keywords = {cloud computing,e-government,oriented architecture,service-,software as a service},
pages = {5--10},
title = {{E-Government Based on Cloud Computing and Service-Oriented Architecture}}
}
@article{Khajeh-hosseinib,
author = {Khajeh-hosseini, Ali and Greenwood, David and Smith, James W and Sommerville, Ian},
file = {::},
journal = {Computing},
keywords = {cloud adoption,cloud computing,decision support},
title = {{The Cloud Adoption Toolkit : Addressing the Challenges of Cloud Adoption in the Enterprise}}
}
@article{Lenk2009a,
author = {Lenk, Alexander and Klems, Markus and Nimis, Jens and Tai, Stefan and Sandholm, Thomas},
doi = {10.1109/CLOUD.2009.5071529},
file = {::},
isbn = {978-1-4244-3713-9},
journal = {2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing},
keywords = {[Electronic Manuscript]},
month = may,
pages = {23--31},
publisher = {Ieee},
title = {{What's inside the Cloud? An architectural map of the Cloud landscape}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071529},
year = {2009}
}
@article{(Motahari-Nezhad2009),
author = {Motahari-Nezhad, H.R. and Stephenson, B. and Singhal, S.},
file = {::;::},
journal = {HP Laboratories--2009},
title = {{Outsourcing Business to Cloud Computing Services: Opportunities and Challenges}},
type = {Journal article},
year = {2009}
}
@inproceedings{(Zhang2009),
address = {Chicago, Illinois, USA},
author = {Zhang, Xinwen and Schiffman, Joshua and Gibbs, Simon and Kunjithapatham, Anugeetha and Jeong, Sangoh},
doi = {http://doi.acm.org.library.capella.edu/10.1145/1655008.1655026},
pages = {127--134},
publisher = {ACM},
title = {{Securing elastic applications on mobile devices for cloud computing}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Hinton2011,
author = {Hinton, Kerry and Baliga, Jayant and Feng, Michael and Ayre, Robert and Tucker, Rodney S},
file = {::},
journal = {IEEE Network},
number = {April},
pages = {6--12},
title = {{Energy Efficiency in the Internet}},
year = {2011}
}
@article{Napper2009,
abstract = {Computing as a utility has reached the mainstream. Scientists can now rent time on large commercial clusters through several vendors. The cloud computing model provides flexible support for "pay as you go" systems. In addition to no upfront investment in large clusters or supercomputers, such systems incur no maintenance costs. Furthermore, they can be expanded and reduced on-demand in real-time. Current cloud computing performance falls short of systems specifically designed for scientific applications. Scientific computing needs are quite different from those of web applications--composed primarily of database queries--that have been the focus of cloud computing vendors. In this paper we investigate the use of cloud computing for high-performance numerical applications. In particular, we assume unlimited monetary resources to answer the question, "How high can a cloud computing service get in the TOP500 list?" We show results for the Linpack benchmark on different allocations on Amazon EC2.},
author = {Napper, Jeffrey and Bientinesi, Paolo},
journal = {Conference On Computing Frontiers},
keywords = {Cloud,amazon,cloud computing,hpl},
mendeley-tags = {Cloud},
pages = {3},
title = {{Can cloud computing reach the top500?}},
year = {2009}
}
@article{Nurmi2009,
author = {Nurmi, Daniel and Wolski, Rich and Grzegorczyk, Chris and Obertelli, Graziano and Soman, Sunil and Youseff, Lamia and Zagorodnov, Dmitrii},
file = {::},
journal = {2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid},
month = may,
pages = {124--131},
publisher = {Ieee},
title = {{The Eucalyptus Open-Source Cloud-Computing System}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071863},
year = {2009}
}
@article{Fenn2008,
author = {Fenn, Jackie},
title = {{Cloud Computing: IT of the future or powerpuff?}},
year = {2008}
}
@inproceedings{(Wood2009),
author = {Wood, T. and Gerber, A. and Ramakrishnan, KK and Shenoy, P. and {Van Der Merwe}, J.},
title = {{The Case for Enterprise-Ready Virtual Private Clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Anderson2010,
author = {Anderson, Janna Quitney},
pages = {1--26},
title = {{The future of cloud computing}},
year = {2010}
}
@inproceedings{(Siebenlist2009),
address = {Stresa, Italy},
author = {Siebenlist, Frank},
doi = {http://doi.acm.org/10.1145/1542207.1542209},
file = {::},
pages = {1--2},
publisher = {ACM},
title = {{Challenges and opportunities for virtualized security in the clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Voas2009,
author = {Voas, Jeffrey and Zhang, Jia},
doi = {10.1109/MITP.2009.23},
file = {::;::},
issn = {1520-9202},
journal = {IT Professional},
month = mar,
number = {2},
pages = {15--17},
title = {{Cloud Computing: New Wine or Just a New Bottle?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4804043},
volume = {11},
year = {2009}
}
@article{Holden2009,
author = {Holden, Edward P and Kang, Jai W and Bills, Dianne P and Ilyassov, Mukhtar},
journal = {New York},
pages = {138--143},
title = {{Databases in the Cloud: a Work in Progress}},
year = {2009}
}
@article{Leavitt2009a,
author = {Leavitt, Neal},
file = {::},
journal = {IEEE Computer},
month = jan,
number = {1},
pages = {15--20},
title = {{Is Cloud Computing Really Ready for Prime Time?}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4755149},
volume = {42},
year = {2009}
}
@article{Dovenbarger1997,
author = {Dovenbarger, Dana},
doi = {10.1145/251880.251890},
journal = {ACM SIGSOFT Software Engineering Notes},
month = mar,
number = {2},
pages = {6},
title = {{Software Technology Conference information}},
volume = {22},
year = {1997}
}
@article{Vouk2008a,
author = {Vouk, Mladen a.},
file = {::},
journal = {ITI 2008 - 30th International Conference on Information Technology Interfaces},
keywords = {cloud,computing,end-to-end quality of,utility computing,virtual computing lab,virtualization},
month = jun,
pages = {31--40},
publisher = {Ieee},
title = {{Cloud computing — Issues, research and implementations}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4588381},
year = {2008}
}
@inproceedings{(Siebenlist2009),
address = {Stresa, Italy},
author = {Siebenlist, Frank},
file = {::},
pages = {1--2},
publisher = {ACM},
title = {{Challenges and opportunities for virtualized security in the clouds}},
type = {Conference proceedings (article)},
year = {2009}
}
@inproceedings{(Nurmi2009),
author = {Nurmi, Daniel and Wolski, Rich and Grzegorczyk, Chris and Obertelli, Graziano and Soman, Sunil and Youseff, Lamia and Zagorodnov, Dmitrii},
booktitle = {2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid},
doi = {http://dx.doi.org.library.capella.edu/10.1109/CCGRID.2009.93},
isbn = {978-1-4244-3935-5},
month = may,
pages = {124--131},
publisher = {IEEE Computer Society},
title = {{The Eucalyptus Open-Source Cloud-Computing System}},
type = {Conference proceedings (article)},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071863},
year = {2009}
}
@article{Stocker2010,
abstract = {A new open-source software project is presented, JEMRIS, the J\"{u}lich Extensible MRI Simulator, which provides an MRI sequence development and simulation environment for the MRI community. The development was driven by the desire to achieve generality of simulated three-dimensional MRI experiments reflecting modern MRI systems hardware. The accompanying computational burden is overcome by means of parallel computing. Many aspects are covered that have not hitherto been simultaneously investigated in general MRI simulations such as parallel transmit and receive, important off-resonance effects, nonlinear gradients, and arbitrary spatiotemporal parameter variations at different levels. The latter can be used to simulate various types of motion, for instance. The JEMRIS user interface is very simple to use, but nevertheless it presents few limitations. MRI sequences with arbitrary waveforms and complex interdependent modules are modeled in a graphical user interface-based environment requiring no further programming. This manuscript describes the concepts, methods, and performance of the software. Examples of novel simulation results in active fields of MRI research are given.},
author = {St\"{o}cker, Tony and Vahedipour, Kaveh and Pflugfelder, Daniel and Shah, N Jon},
doi = {10.1002/mrm.22406},
issn = {1522-2594},
journal = {Magnetic resonance in medicine : official journal of the Society of Magnetic Resonance in Medicine / Society of Magnetic Resonance in Medicine},
month = jul,
number = {1},
pages = {186--93},
pmid = {20577987},
publisher = {IEEE Computer Society},
title = {{High-performance computing MRI simulations.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20643689},
volume = {64},
year = {2010}
}
@book{Kolovski2008,
author = {Kolovski, Vladimir},
booktitle = {Doctor},
file = {::},
publisher = {ProQuest},
title = {{A logic-based framework for web access control policies}},
url = {http://books.google.com/books?hl=en\&amp;lr=\&amp;id=gBt\_oznraUIC\&amp;oi=fnd\&amp;pg=PR9\&amp;dq=A+logic-based+framework+for+web+access+control+policies\&amp;ots=hRet\_dWH2h\&amp;sig=rLBmcGkJvRSskamH-UP9zQXN\_5M},
year = {2008}
}
@article{Cummings2002,
abstract = {Online relationships are less valuable than offline ones. Indeed, their net benefit depends on whether they supplement or substitute for offline social relationships.},
author = {Cummings, Jonathon N and Butler, Brian and Kraut, Robert},
issn = {00010782},
journal = {Communications of the ACM},
number = {7},
pages = {103--108},
publisher = {ACM Press},
title = {{The quality of online social relationships}},
url = {http://portal.acm.org/citation.cfm?id=514236.514242},
volume = {45},
year = {2002}
}
@article{Brynjolfsson2010,
author = {Brynjolfsson, Erik and Hofmann, Paul and Jordan, John},
doi = {10.1145/1735223.1735234},
file = {::},
issn = {00010782},
journal = {Communications of the ACM},
month = may,
number = {5},
pages = {32},
title = {{Cloud computing and electricity}},
url = {http://portal.acm.org/citation.cfm?doid=1735223.1735234},
volume = {53},
year = {2010}
}
@inproceedings{(Pearson2009),
author = {Pearson, Siani},
doi = {http://dx.doi.org.library.capella.edu/10.1109/CLOUD.2009.5071532},
pages = {44--52},
publisher = {IEEE Computer Society},
title = {{Taking account of privacy when designing cloud computing services}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Jha2009,
author = {Jha, Shantenu and Merzky, Andre and Fox, Geoffrey},
doi = {10.1002/cpe.1406},
file = {::},
issn = {15320626},
journal = {Concurrency and Computation: Practice and Experience},
month = jun,
number = {8},
pages = {1087--1108},
title = {{Using clouds to provide grids with higher levels of abstraction and explicit support for usage modes}},
url = {http://doi.wiley.com/10.1002/cpe.1406},
volume = {21},
year = {2009}
}
@article{Wang2008,
author = {Wang, Lizhe and Tao, Jie and Kunze, Marcel and Castellanos, Alvaro Canales and Kramer, David and Karl, Wolfgang},
doi = {10.1109/HPCC.2008.38},
isbn = {9780769533520},
journal = {2008 10th IEEE International Conference on High Performance Computing and Communications},
pages = {825--830},
publisher = {Ieee},
title = {{Scientific Cloud Computing: Early Definition and Experience}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4637787},
year = {2008}
}
@article{Lenk2009a,
author = {Lenk, Alexander and Klems, Markus and Nimis, Jens and Tai, Stefan and Sandholm, Thomas},
file = {::},
journal = {2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing},
keywords = {[Electronic Manuscript]},
month = may,
pages = {23--31},
publisher = {Ieee},
title = {{What's inside the Cloud? An architectural map of the Cloud landscape}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071529},
year = {2009}
}
@article{Vishwanath,
author = {Vishwanath, Kashi Venkatesh and Nagappan, Nachiappan},
keywords = {datacenter,failures},
pages = {193--203},
title = {{Characterizing Cloud Computing Hardware Reliability}}
}
@article{Lu2010a,
author = {Lu, Authors Qiang and Xu, You and Huang, Ruoyun and Chen, Yixin},
journal = {Engineering},
number = {314},
title = {{Cloud Computing for Scalable Planning by Stochastic Search}},
year = {2010}
}
@article{Glaser2011b,
abstract = {Software as a Service (SaaS), built on cloud computing technology, is emerging as the forerunner in IT infrastructure because it helps healthcare providers reduce capital investments. Cloud computing leads to predictable, monthly, fixed operating expenses for hospital IT staff. Outsourced cloud computing facilities are state-of-the-art data centers boasting some of the most sophisticated networking equipment on the market. The SaaS model helps hospitals safeguard against technology obsolescence, minimizes maintenance requirements, and simplifies management.},
author = {Glaser, John},
file = {::},
issn = {0735-0732},
journal = {Healthcare financial management : journal of the Healthcare Financial Management Association},
month = aug,
number = {8},
pages = {52--5},
pmid = {21866720},
title = {{Cloud computing can simplify HIT infrastructure management.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=3161908\&tool=pmcentrez\&rendertype=abstract},
volume = {65},
year = {2011}
}
@article{(Khajeh-Hosseini2010),
author = {Khajeh-Hosseini, A. and Sommerville, I. and Sriram, I.},
file = {::},
journal = {Arxiv preprint arXiv:1001.3257},
title = {{Research Challenges for Enterprise Cloud Computing}},
type = {Journal article},
year = {2010}
}
@inproceedings{(Nurmi2009),
author = {Nurmi, Daniel and Wolski, Rich and Grzegorczyk, Chris and Obertelli, Graziano and Soman, Sunil and Youseff, Lamia and Zagorodnov, Dmitrii},
booktitle = {2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid},
doi = {http://dx.doi.org.library.capella.edu/10.1109/CCGRID.2009.93},
file = {::},
isbn = {978-1-4244-3935-5},
month = may,
pages = {124--131},
publisher = {IEEE Computer Society},
title = {{The Eucalyptus Open-Source Cloud-Computing System}},
type = {Conference proceedings (article)},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5071863},
year = {2009}
}
@article{Raman2009,
author = {Raman, T. V.},
doi = {10.1145/1461928.1461945},
file = {::},
issn = {00010782},
journal = {Communications of the ACM},
month = feb,
number = {2},
pages = {52},
publisher = {ACM},
title = {{Toward 2 W , beyond web 2.0}},
url = {http://portal.acm.org/citation.cfm?doid=1461928.1461945},
volume = {52},
year = {2009}
}
@article{Hunter2009,
abstract = {The concept of cloud computing is going to reorganise the tenets of enterprise IT. Cloud computing sounds like traditional IT outsourcing, but the difference is that this is not just about ownership of IT staff and resources, but a new way of organising, acquiring, and paying for IT infrastructures and services, with outsourcing being just part of the mix. Characterised this way, the move towards cloud computing seems certain, even if enterprises are reluctant to move forward too rapidly right now. Only a few enterprises are actually adopting cloud services at the moment, but the fact that any are is notable. This paper discusses cloud computing's progress within the enterprises. [ABSTRACT FROM AUTHOR]},
author = {Hunter, P.},
file = {::},
journal = {Engineering \& Technology},
number = {16},
pages = {54},
title = {{Cloud aloud [cloud computing in enterprises]}},
url = {http://link.aip.org/link/ETNEBJ/v4/i16/p54/s1\&Agg=doi},
volume = {4},
year = {2009}
}
@article{Wang2008,
author = {Wang, Lizhe and Tao, Jie and Kunze, Marcel and Castellanos, Alvaro Canales and Kramer, David and Karl, Wolfgang},
doi = {10.1109/HPCC.2008.38},
isbn = {9780769533520},
journal = {2008 10th IEEE International Conference on High Performance Computing and Communications},
pages = {825--830},
publisher = {Ieee},
title = {{Scientific Cloud Computing: Early Definition and Experience}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4637787},
year = {2008}
}
@article{Stonebraker2010,
author = {Stonebraker, M and Abadi, Daniel and DeWitt, DJ and S},
journal = {of the ACM},
title = {{MapReduce and parallel DBMSs: friends or foes?}},
url = {http://portal.acm.org/citation.cfm?id=1629197},
year = {2010}
}
@article{Mell2009,
author = {Mell, P and Grance, T},
journal = {National Institute of Standards and Technology},
title = {{The NIST Definition of Cloud Computing}},
url = {http://www.drieottawa.org/presentations/20100602/20100602\_roger\_mcilmoyle\_sungard.pdf},
year = {2009}
}
@article{(2009),
abstract = {The article describes the case of using cloud computing by the Library Society of the World (LSW). It identifies a discussion on Twitter as the origin of the LSW and explores the development of the organization by using Web 2.0 tools in order to communicate and collaborate. It presents the web sites that are associated with the LSW, including Meebo, Drupal and Boing Boing.},
author = {Hastings, Robin},
file = {::},
journal = {Library Technology Reports},
keywords = {--,20,case,cloud,computing,data,distributed,electronic,networks,online,processing,sites,social,studies,web},
mendeley-tags = {--,20,case,cloud,computing,data,distributed,electronic,networks,online,processing,sites,social,studies,web},
number = {4},
title = {{A Cloud Computing Case Study.}},
type = {Journal article},
url = {http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com.library.capella.edu/login.aspx?direct=true\&\#38;db=aph\&\#38;AN=43280594\&\#38;site=ehost-live\&\#38;scope=site},
volume = {45},
year = {2009}
}
@article{AlexBatemanMattWood2008,
author = {{Alex Bateman Matt Wood}},
file = {::},
journal = {Access},
pages = {2009--2009},
title = {{Cloud computing}},
url = {http://portal.acm.org/citation.cfm?id=1364782.1364786\&amp;coll=ACM\&amp;dl=ACM\&amp;idx=J79\&amp;part=magazine\&amp;WantType=Magazines\&amp;title=Communications of the ACM},
year = {2008}
}
@article{Napper2009,
abstract = {Computing as a utility has reached the mainstream. Scientists can now rent time on large commercial clusters through several vendors. The cloud computing model provides flexible support for "pay as you go" systems. In addition to no upfront investment in large clusters or supercomputers, such systems incur no maintenance costs. Furthermore, they can be expanded and reduced on-demand in real-time. Current cloud computing performance falls short of systems specifically designed for scientific applications. Scientific computing needs are quite different from those of web applications--composed primarily of database queries--that have been the focus of cloud computing vendors. In this paper we investigate the use of cloud computing for high-performance numerical applications. In particular, we assume unlimited monetary resources to answer the question, "How high can a cloud computing service get in the TOP500 list?" We show results for the Linpack benchmark on different allocations on Amazon EC2.},
author = {Napper, Jeffrey and Bientinesi, Paolo},
file = {::},
journal = {Conference On Computing Frontiers},
keywords = {Cloud,amazon,cloud computing,hpl},
mendeley-tags = {Cloud},
pages = {3},
title = {{Can cloud computing reach the top500?}},
year = {2009}
}
@article{Cusumano2009a,
author = {Cusumano, Michael},
doi = {10.1145/1721654.1721667},
number = {June},
pages = {9--11},
title = {{technology Strategy and Management Cloud Computing and SaaS as new Computing Platforms}},
volume = {7},
year = {2009}
}
@article{Yolken2009,
author = {Yolken, BH},
file = {::},
number = {June},
title = {{Incentive-based resource allocation and control for large-scale computing services}},
url = {http://gradworks.umi.com/33/64/3364486.html},
year = {2009}
}
@article{(Sterling2009),
author = {Sterling, Thomas and Stark, Dylan},
doi = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2009.111},
file = {::},
journal = {Computing in Science and Engineering},
number = {4},
pages = {42--49},
publisher = {IEEE Computer Society},
title = {{A High-Performance Computing Forecast: Partly Cloudy}},
type = {Journal article},
volume = {11},
year = {2009}
}
@article{Stocker2010,
abstract = {A new open-source software project is presented, JEMRIS, the J\"{u}lich Extensible MRI Simulator, which provides an MRI sequence development and simulation environment for the MRI community. The development was driven by the desire to achieve generality of simulated three-dimensional MRI experiments reflecting modern MRI systems hardware. The accompanying computational burden is overcome by means of parallel computing. Many aspects are covered that have not hitherto been simultaneously investigated in general MRI simulations such as parallel transmit and receive, important off-resonance effects, nonlinear gradients, and arbitrary spatiotemporal parameter variations at different levels. The latter can be used to simulate various types of motion, for instance. The JEMRIS user interface is very simple to use, but nevertheless it presents few limitations. MRI sequences with arbitrary waveforms and complex interdependent modules are modeled in a graphical user interface-based environment requiring no further programming. This manuscript describes the concepts, methods, and performance of the software. Examples of novel simulation results in active fields of MRI research are given.},
author = {St\"{o}cker, Tony and Vahedipour, Kaveh and Pflugfelder, Daniel and Shah, N Jon},
file = {::},
journal = {Magnetic resonance in medicine : official journal of the Society of Magnetic Resonance in Medicine / Society of Magnetic Resonance in Medicine},
month = jul,
number = {1},
pages = {186--93},
publisher = {IEEE Computer Society},
title = {{High-performance computing MRI simulations.}},
url = {http://www.ncbi.nlm.nih.gov/pubmed/20643689},
volume = {64},
year = {2010}
}
@inproceedings{Wang2009a,
abstract = {Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server (s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.},
author = {Wang, C and Wang, Q and Ren, Kui and Lou, Wenjing},
booktitle = {2009 17th International Workshop on Quality of Service},
doi = {10.1109/IWQoS.2009.5201385},
file = {::},
isbn = {978-1-4244-3875-4},
issn = {1548615X},
month = jul,
number = {978},
pages = {1--9},
publisher = {IEEE},
title = {{Ensuring data storage security in Cloud Computing}},
url = {http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5201385},
volume = {186},
year = {2009}
}
@inproceedings{(Pearson2009),
author = {Pearson, Siani},
doi = {http://dx.doi.org.library.capella.edu/10.1109/CLOUD.2009.5071532},
pages = {44--52},
publisher = {IEEE Computer Society},
title = {{Taking account of privacy when designing cloud computing services}},
type = {Conference proceedings (article)},
year = {2009}
}
@article{Summit2009,
author = {Summit, Management and Resort, Gaylord Palms and Bittman, Tom},
journal = {Management},
title = {{What You Need to Know About Cloud Computing}},
year = {2009}
}
@article{Aura,
author = {Aura, Tuomas and Nikander, Pekka and Leiwo, Jussipekka},
file = {::},
journal = {Society},
title = {{DOS-resistant Authentication with Client Puzzles}}
}
@article{Schatz2010,
author = {Schatz, Michael C and Langmead, Ben and Salzberg, Steven L},
doi = {10.1038/nbt0710-691},
issn = {1546-1696},
journal = {Nature biotechnology},
month = jul,
number = {7},
pages = {691--3},
pmid = {20622843},
title = {{Cloud computing and the DNA data race.}},
url = {http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=2904649\&tool=pmcentrez\&rendertype=abstract},
volume = {28},
year = {2010}
}
@article{Brunette2009,
author = {Brunette, G and Mogull, R},
file = {::},
journal = {CSA (Cloud Security Alliance), USA. Disponible en:},
number = {December},
pages = {1--76},
title = {{Security Guidance for critical areas of focus in Cloud Computing V2. 1}},
url = {http://scholar.google.com/scholar?hl=en\&btnG=Search\&q=intitle:Security+Guidance+for+critical+areas+of+focus+in+Cloud+Computing+V2.+1\#0},
year = {2009}
}
@article{Yolken2009,
author = {Yolken, BH},
file = {::},
number = {June},
title = {{Incentive-based resource allocation and control for large-scale computing services}},
url = {http://gradworks.umi.com/33/64/3364486.html},
year = {2009}
}
@article{Armbrust2010,
author = {Armbrust, Michael and Fox, Armando and Griffith, Rean and Joseph, Anthony D and Katz, Randy and Konwinski, Andy and Lee, Gunho and Patterson, David and Rabkin, Ariel and Stoica, Ion and Zaharia, Matei},
file = {::},
journal = {Communications of the ACM},
month = apr,
number = {4},
pages = {53--58},
title = {{A view of cloud computing}},
volume = {53},
year = {2010}
}

@inproceedings{wei2013,
 author = {Wei Zhang and Tao Yang and Gautham Narayanasamy and Hong Tang},
 title = {Low-Cost Data Deduplication for Virtual Machine Backup in Cloud Storage},
 booktitle = {Proceedings of the 5th USENIX workshop on Hot Topics in Storage and File Systems},
 series = {HotStorage'13},
 year = {2013},
 location = {San Jose, CA},
 numpages = {5},
 url = {http://dl.acm.org/citation.cfm?id=2342806.2342808},
 acmid = {2342808},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 


@inproceedings{Srinivasan2012,
 author = {Srinivasan, Kiran and Bisson, Tim and Goodson, Garth and Voruganti, Kaladhar},
 title = {iDedup: latency-aware, inline data deduplication for primary storage},
 booktitle = {Proceedings of the 10th USENIX conference on File and Storage Technologies},
 series = {FAST'12},
 year = {2012},
 location = {San Jose, CA},
 pages = {24--24},
 numpages = {1},
 url = {http://dl.acm.org/citation.cfm?id=2208461.2208485},
 acmid = {2208485},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@inproceedings{Michael2013,
 author = {Michael Ovsiannikov and Silvius Rus and Damian Reeves and Paul Sutter and Sriram Rao and Jim Kelly and Chris Zimmermanand and Dan Adkins and Thilee Subramaniam and Jeremy Fishman},
 title = {The Quantcast File System},
 booktitle = {Proceedings of the 39th international conference on Very Large Data Bases},
 series = {VLDB'13},
 year = {2013},
 isbn = {978-1-931971-82-9},
 location = {Riva Del Garda, Trento},
 pages = {2--2},
 numpages = {1},
 url = {http://dl.acm.org/citation.cfm?id=1960475.1960477},
 acmid = {1960477},
 publisher = {VLDB},
 address = {Berkeley, CA, USA},
} 

@inproceedings{Przemyslaw2013,
 author = {Przemyslaw Strzelczak and Elzbieta Adamczyk and Urszula Herman-Izycka and Jakub Sakowicz and Lukasz Slusarczyk and Jaroslaw Wrona and and Cezary Dubnicki},
 title = {Concurrent Deletion in a Distributed Content-Addressable Storage System with Global Deduplication},
 booktitle = {Proceedings of the 11th USENIX conference on File and storage technologies},
 series = {FAST'13},
 year = {2013},
 isbn = {978-1-931971-82-9},
 location = {San Jose, California},
 pages = {161--174},
 numpages = {1},
 url = {http://dl.acm.org/citation.cfm?id=1960475.1960477},
 acmid = {1960477},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@inproceedings{Fabiano2013,
 author = {Fabiano C. Botelho and Philip Shilane and Nitin Garg and Windsor Hsu},
 title = {Memory Efficient Sanitization of a Deduplicated Storage System},
 booktitle = {Proceedings of the 11th USENIX conference on File and storage technologies},
 series = {FAST'13},
 year = {2013},
 isbn = {978-1-931971-82-9},
 location = {San Jose, California},
 pages = {81--94},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=1960475.1960477},
 acmid = {1960477},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@inproceedings{Dong2011,
 author = {Dong, Wei and Douglis, Fred and Li, Kai and Patterson, Hugo and Reddy, Sazzala and Shilane, Philip},
 title = {Tradeoffs in scalable data routing for deduplication clusters},
 booktitle = {Proceedings of the 9th USENIX conference on File and stroage technologies},
 series = {FAST'11},
 year = {2011},
 isbn = {978-1-931971-82-9},
 location = {San Jose, California},
 pages = {2--2},
 numpages = {1},
 url = {http://dl.acm.org/citation.cfm?id=1960475.1960477},
 acmid = {1960477},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@INPROCEEDINGS{hdfs10, 
author={Shvachko, K. and Hairong Kuang and Radia, S. and Chansler, R.}, 
booktitle={2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)}, 
title={The Hadoop Distributed File System}, 
year={2010}, 
pages={1-10}, 
keywords={Internet;distributed databases;network operating systems;Hadoop distributed file system;Yahoo!;data storage;data stream;enterprise data;Bandwidth;Clustering algorithms;Computer architecture;Concurrent computing;Distributed computing;Facebook;File servers;File systems;Protection;Protocols;HDFS;Hadoop;distributed file system}, 
doi={10.1109/MSST.2010.5496972},}

@inproceedings{Vrable2009,
  added-at = {2009-03-03T00:00:00.000+0100},
  author = {Vrable, Michael and Savage, Stefan and Voelker, Geoffrey M.},
  biburl = {http://www.bibsonomy.org/bibtex/21d197846008f6e5995e2f73373d114a5/dblp},
  title = {Cumulus: Filesystem Backup to the Cloud},
  booktitle = {FAST'09},
  date = {2009-03-03},
  year = {2009},
  description = {dblp},
  ee = {http://www.usenix.org/events/fast09/tech/full_papers/vrable/vrable.pdf},
  interhash = {82fad15f93ab47eb9edc1e5b93ed5727},
  intrahash = {1d197846008f6e5995e2f73373d114a5},
  isbn = {978-1-931971-66-9},
  keywords = {dblp},
  pages = {225-238},
}
@inproceedings{Hansen2010,
 author = {Hansen, Jacob Gorm and Jul, Eric},
 title = {Lithium: virtual machine storage for the cloud},
 booktitle = {Proceedings of the 1st ACM symposium on Cloud computing},
 series = {SoCC '10},
 year = {2010},
 isbn = {978-1-4503-0036-0},
 location = {Indianapolis, Indiana, USA},
 pages = {15--26},
 numpages = {12},
 url = {http://doi.acm.org/10.1145/1807128.1807134},
 doi = {http://doi.acm.org/10.1145/1807128.1807134},
 acmid = {1807134},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cloud computing, file systems, replication, virtual machines},
} 

@inproceedings{NGmiddleware2011,
  author    = {Chun-Ho Ng and
               Mingcao Ma and
               Tsz-Yeung Wong and
               Patrick P. C. Lee and
               John C. S. Lui},
  title     = {Live Deduplication Storage of Virtual Machine Images in
               an Open-Source Cloud},
  booktitle = {Middleware},
  year      = {2011},
  pages     = {81-100}
}

@inproceedings{TanIPDPS2011,
  author    = {Yujuan Tan and
               Hong Jiang and
               Dan Feng and
               Lei Tian and
               Zhichao Yan},
  title     = {CABdedupe: A Causality-Based Deduplication Performance Booster
               for Cloud Backup Services},
  booktitle = {IPDPS'11},
  year      = {2011},
  pages     = {1266-1277}
}

@inproceedings{Rhea2008,
 author = {Rhea, Sean and Cox, Russ and Pesterev, Alex},
 title = {Fast, inexpensive content-addressed storage in foundation},
 booktitle = {USENIX ATC'08},
 year = {2008},
 location = {Boston, Massachusetts},
 pages = {143--156},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=1404014.1404025},
 acmid = {1404025},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 
@inproceedings{Quinlan2002,
 author = {Quinlan, Sean and Dorward, Sean},
 title = {Awarded Best Paper! - Venti: A New Approach to Archival Data Storage},
 booktitle = {Proceedings of the 1st USENIX Conference on File and Storage Technologies},
 series = {FAST '02},
 year = {2002},
 location = {Monterey, CA},
 articleno = {7},
 url = {http://dl.acm.org/citation.cfm?id=1083323.1083333},
 acmid = {1083333},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
} 

@article{Xen2003,
 author = {Barham, Paul and Dragovic, Boris and Fraser, Keir and Hand, Steven and Harris, Tim and Ho, Alex and Neugebauer, Rolf and Pratt, Ian and Warfield, Andrew},
 title = {Xen and the art of virtualization},
 journal = {SIGOPS Oper. Syst. Rev.},
 issue_date = {December 2003},
 volume = {37},
 issue = {5},
 month = oct,
 year = {2003},
 issn = {0163-5980},
 pages = {164--177},
 numpages = {14},
 url = {http://doi.acm.org/10.1145/1165389.945462},
 doi = {http://doi.acm.org/10.1145/1165389.945462},
 acmid = {945462},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {hypervisors, paravirtualization, virtual machine monitors},
} 

@article{memcached,
 author = {Fitzpatrick, Brad},
 title = {Distributed caching with memcached},
 journal = {Linux J.},
 issue_date = {August 2004},
 volume = {2004},
 issue = {124},
 month = aug,
 year = {2004},
 issn = {1075-3583},
 pages = {5--},
 url = {http://dl.acm.org/citation.cfm?id=1012889.1012894},
 acmid = {1012894},
 publisher = {Belltown Media},
 address = {Houston, TX}
} 

@inproceedings{WeiZhangIEEE,
  author    = {Wei Zhang and
               Hong Tang and
               Hao Jiang and
               Tao Yang and
               Xiaogang Li and
               Yue Zeng},
  title     = {Multi-level Selective Deduplication for VM Snapshots in Cloud Storage},
  year = {2012},
  booktitle = {IEEE CLOUD'12},
  pages     = {550-557}
}

@MISC{EMC,
  author    = {EMC},
  title     = {
{Achieving storage efficiency through EMC Celerra data deduplication.
White Paper}},
  year      = {2010}
}
@inproceedings{DEBAR,
  author    = {Tianming Yang and
               Hong Jiang and
               Dan Feng and
               Zhongying Niu and
               Ke Zhou and
               Yaping Wan},
  title     = {DEBAR: A scalable high-performance de-duplication storage
               system for backup and archiving},
  booktitle = {IEEE IPDPS},
  year      = {2010},
  pages     = {1-12}
}

@MISC{NetAppOffline,
  author    = {Carlos Alvarez},
  title     = {
{NetApp Deduplication for FAS and V-Series Deployment and Implementation Guide.
NetApp.  Technical Report TR-3505 }
               },
  year      = {2011}
}

@inproceedings{azure,
 author = {Calder, Brad and Wang, Ju and Ogus, Aaron and Nilakantan, Niranjan and Skjolsvold, Arild and McKelvie, Sam and Xu, Yikang and Srivastav, Shashwat and Wu, Jiesheng and Simitci, Huseyin and Haridas, Jaidev and Uddaraju, Chakravarthy and Khatri, Hemal and Edwards, Andrew and Bedekar, Vaman and Mainali, Shane and Abbasi, Rafay and Agarwal, Arpit and Haq, Mian Fahim ul and Haq, Muhammad Ikram ul and Bhardwaj, Deepali and Dayanand, Sowmya and Adusumilli, Anitha and McNett, Marvin and Sankaran, Sriram and Manivannan, Kavitha and Rigas, Leonidas},
 title = {Windows Azure Storage: A Highly Available Cloud Storage Service with Strong Consistency},
 booktitle = {Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles},
 series = {SOSP '11},
 year = {2011},
 isbn = {978-1-4503-0977-6},
 location = {Cascais, Portugal},
 pages = {143--157},
 numpages = {15},
 url = {http://doi.acm.org/10.1145/2043556.2043571},
 doi = {10.1145/2043556.2043571},
 acmid = {2043571},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {Windows Azure, cloud storage, distributed storage systems},
} 