Transparent Remote File Access in the Minimum Intrusion Grid

Author(s):  
R. Andersen ◽  
B. Vinter
Keyword(s):  
Author(s):  
Cynthia M. Horne

Chapter 2 explores each of the country cases in this project, namely the Czech Republic, Slovakia, Hungary, Poland, Romania, Bulgaria, Estonia, Latvia, Lithuania, Russia, Ukraine, and Albania. The chapter provides historical details of the transitional justice reforms in all twelve countries from 1989–2013, covering lustration, file access, public disclosures, and truth commissions. This material is then used to place each country case within the typology developed in Chapter 1, according to whether the measures were expansive and included compulsory employment change, limited and included largely voluntary employment change, informal and largely symbolic, or actively rejected. The chapter provides variable conceptualization and operationalization specifics to be used in the subsequent statistical analyses, including three different lustration variables, a truth commission variable, and timing of reform variables. It provides qualitative, comparative historical details to justify the classification of countries according to the primary independent variable, namely lustration and public disclosure programs.


Author(s):  
Giusy Rita Maria La Rosa ◽  
Carlotta Palermo ◽  
Sebastiano Ferlito ◽  
Gaetano Isola ◽  
Francesco Indelicato ◽  
...  

2011 ◽  
Vol 17 (1) ◽  
pp. 1-11
Author(s):  
Youhui Zhang ◽  
Hongyi Wang ◽  
Dongsheng Wang ◽  
Weimin Zheng

2014 ◽  
Vol 915-916 ◽  
pp. 1377-1381
Author(s):  
Qiu Dong Sun ◽  
Jian Cun Zuo ◽  
Yu Feng Shao ◽  
Lin Gui

In order to reform the shortcomings of common database with a slower access speed and lower security level, this paper applied sector operating directly instead of general file access, and used the distributed computing and clustering techniques to form an information server cluster as the special database system. Firstly, the layout and sector segmentation methods were provided for data access in sector based database. And then some management methods were given to control information servers in the cluster. Finally, to more efficiently schedule the tasks for storing data and querying information, a dynamic and self-adaptive scheduling algorithm was introduced into the application server of cluster. The practice shows that the system developed by this design strategy has good efficiency and security, and the access speed of the special database system is almost 25 times than that of common database.


2010 ◽  
pp. 657-681
Author(s):  
Matthew MacDonald
Keyword(s):  

2021 ◽  
pp. 8-17
Author(s):  
Amer Ramadan ◽  

This paper reports on an in-depth examination of the impact of the backing filesystems to Docker performance in the context of Linux container-based virtualization. The experimental design was a 3x3x4 arrangement, i.e., we considered three different numbers of Docker containers, three filesystems (Ext4, XFS and Btrfs), and four application workloads related to Web server I/O activity, e-mail server I/O activity, file server I/O activity and random file access I/O activity, respectively. The experimental results indicate that Ext4 is the most optimal filesystem, among the considered filesystems, for the considered experimental settings. In addition, the XFS filesystem is not suitable for workloads that are dominated by synchronous random write components (e.g., characteristical for mail workload), while the Btrfs filesystem is not suitable for workloads dominated by random write and sequential write components (e.g., file server workload).


2021 ◽  
Author(s):  
Jianguo Jiang ◽  
Xu Wang ◽  
Yan Wang ◽  
Qiujian Lv ◽  
MeiChen Liu ◽  
...  

Author(s):  
H.-J. Hennrich ◽  
N. Spengler ◽  
H. Wrobel
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document