Now showing items 11-20 of 149
Linux Kernel Hash Table Behavior: Analysis and Improvements
(Center for Information Technology Integration, 2000-08-13)
The Linux kernel employs hash table data structures to store high-usage data objects such as pages, buffers, inodes, and others. In this report we find significant performance boosts with careful analysis and tuning of ...
SC-CFS: Smarcard Secured Cryptographic File System
(Center for Information Technology Integration, 2001-01-16)
Although storing information securely is one of the most important roles expected for computer systems, it is difficult to achieve with current commodity computers. The computers may yield secrets through physical breach, ...
Wiretapping the Internet
(2000-11)
With network security threats and vulnerabilities increasing, solutions based on online detection remain attractive. A complete, durable record of all activity on a network can be used to evaluate and train intrusion ...