|
[1] Camtasia Studio. http://www.techsmith.com/camtasia.html [2] Power Director. http://tw.cyberlink.com/ [3] Youtube Online Video Editor. http://www.youtube.com/editor [4] Dropbox. http://www.dropbox.com [5] SkyDrive. https://skydrive.live.com/ [6] Google Drive. https://drive.google.com [7] Stefan Saroiu, Krishna P. Gummadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy, “An Analysis of Internet Content Delivery Systems,” in Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, USA, Dec 2002. [8] Suel, Torsten, Patrick Noel, and Dimitre Trendafilov. "Improved file synchronization techniques for maintaining large replicated collections over slow networks." Data Engineering, 2004. Proceedings. 20th International Conference on. IEEE, 2004. [9] Yan, Hao, Utku Irmak, and Torsten Suel. "Algorithms for low-latency remote file synchronization." INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008. [10] Tridgell, Andrew, and Paul Mackerras. "The rsync algorithm." Made available in DSpace on 2011-01-05T08: 37: 42Z (GMT). No. of bitstreams: 4 TR-CS-96-05. pdf. jpg: 1630 bytes, checksum: 0ca430e24447a87c06c17c83eac1f89b (MD5) 1600-01.2003-07-03T04: 36: 15Z. xsh: 356 bytes, checksum: 8dae781761d62d702a260a7221deebf1 (MD5) TR-CS-96-05. pdf: 152912 bytes, checksum: c897794e87a41177b0ff0e9b9a98b7aa (MD5) TR-CS-96-05. pdf. txt: 8696 bytes, checksum: e0d4362b3ec0af205d1fbfee9075cd55 (MD5) Previous issue date: 2004-05-19T12: 43: 36Z (2004). [11] Park, Nohhyun, and David J. Lilja. "Characterizing datasets for data deduplication in backup applications." Workload Characterization (IISWC), [12] BitTorrent Sync. http://labs.bittorrent.com [13] Apache Subversion. http://subversion.apache.org/ [14] Dr. Andreas Mauthe; Dr. Peter Thomas (2004). Professional Content Management Systems: Handling Digital Media Assets. John Wiley & Sons. ISBN 978-0-470-85542-3. [15] Massage Passing Interface. http://www.mpi-forum.org/ [16] OpenMP. http://openmp.org/ [17] Dynamic Link Library. http://msdn.microsoft.com/enus/library/windows/desktop/ms682589(v=vs.85).aspx [18] Internet Engineering Task Force. Hypertext transfer protocol - http 1.1. RFC 2068, March 1997. [19] Richardson, Leonard, and Sam Ruby. RESTful web services. O'Reilly, 2008. [20] Crockford, D. "RFC 4627—The application/json Media Type for JavaScript Object Notation." JSON, IETF, Request for Comments (2006). [21] Fette, Ian, and Alexey Melnikov. "The websocket protocol." (2011). [22] McCarthy, Phil, and Dave Crane. Comet and Reverse Ajax: The Next-Generation Ajax 2.0. Apress, 2008. [23] Garrett, Jesse James. "Ajax: A new approach to web applications." (2005). [24] Aronovich, Lior, et al. "The design of a similarity based deduplication system."Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference. ACM, 2009. [25] Zhu, Benjamin, Kai Li, and R. Hugo Patterson. "Avoiding the Disk Bottleneck in the Data Domain Deduplication File System." Fast. Vol. 8. 2008. [26] Bobbarjung, Deepak R., Suresh Jagannathan, and Cezary Dubnicki. "Improving duplicate elimination in storage systems." ACM Transactions on Storage (TOS)2.4 (2006): 424-448. [27] Meister, Dirk, and André Brinkmann. "Multi-level comparison of data deduplication in a backup scenario." Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference. ACM, 2009. [28] Lillibridge, Mark, et al. "Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality." Fast. Vol. 9. 2009. [29] You, Lawrence L., Kristal T. Pollack, and Darrell DE Long. "Deep Store: An archival storage system architecture." Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on. IEEE, 2005. [30] Jin, Keren, and Ethan L. Miller. "The effectiveness of deduplication on virtual machine disk images." Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference. ACM, 2009. [31] Clements, Austin T., et al. "Decentralized deduplication in SAN cluster file systems." Proceedings of the 2009 conference on USENIX Annual technical conference. USENIX Association, 2009. [32] Koller, Ricardo, and Raju Rangaswami. "I/O deduplication: Utilizing content similarity to improve I/O performance." ACM Transactions on Storage (TOS) 6.3 (2010): 13. [33] Ratnasamy, Sylvia, et al. "GHT: a geographic hash table for data-centric storage." Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. ACM, 2002. [34] Eastlake, D. 3rd and P. Jones. US secure hash algorithm 1 (SHA1). RFC Editor, 2001. [35] Van Emde Boas, Peter, Robert Kaas, and Erik Zijlstra. "Design and implementation of an efficient priority queue." Mathematical Systems Theory10.1 (1976): 99-127.
|