2019
DOI: 10.1109/tpds.2019.2901883
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Ring-Based Metadata Management Policy for Large-Scale Distributed File Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The use of metadata can be considered essential for the performance of a system [Gao et al 2019]. Metadata is utilized in various areas and subfields of science [Formenton et al 2018].…”
Section: Research Studies About Metadatamentioning
confidence: 99%
“…The use of metadata can be considered essential for the performance of a system [Gao et al 2019]. Metadata is utilized in various areas and subfields of science [Formenton et al 2018].…”
Section: Research Studies About Metadatamentioning
confidence: 99%
“…For the aloha-based scheme, the authors in [26] designed a tag anti-collision scheme to minimize the total time slots required to identify tags within the query region of RFID readers. By using the secant iterative method, Gao et al in [27] proposed an aloha-based anti-collision scheme, which could effectively estimate the number of tags. Moreover, by taking Bayesian inference into account, the cross-layer tag anti-collision scheme was investigated in [28,29], which could achieve optimal identification efficiency.…”
Section: Related Work 121 Rfid-integrated Uav-aided Networkmentioning
confidence: 99%
“…First, the proposed RFID-integrated UAVaided networks in [11][12][13][14][15][16][17][18][19][20][21][22][23] consider the flexibility of UAVs but ignore the characteristics of the dense RFID environment, such as the adaptive power control for the reader. Moreover, the designed tag anti-collision schemes in [27][28][29][30][31][32] are usually based on the conventional single frequency tags, which leave multifrequency tags out of consideration.…”
Section: Synthesismentioning
confidence: 99%
“…There are approaches to expand the metadata notion to cover the content's usage pattern, the user, and their mapping information to arrive at the relevant and valuable associations. 3 The association information ranges from textual, semantic to contextual metadata, as depicted in the hierarchy of Figure 1. A ranking and logical grouping technique is used to identify and quantify sensitive metadata for the segregation of tables and restructuring relational database architecture.…”
Section: Introductionmentioning
confidence: 99%
“…It forms the most abundant source of information through which an intruder can read and replicate the system's internal mechanics. There are approaches to expand the metadata notion to cover the content's usage pattern, the user, and their mapping information to arrive at the relevant and valuable associations 3 . The association information ranges from textual, semantic to contextual metadata, as depicted in the hierarchy of Figure 1.…”
Section: Introductionmentioning
confidence: 99%