User profiles for Ohad Rodeh
![]() | Ohad RodehUltima Genomics Verified email at pm.me Cited by 2629 |
BTRFS: The Linux B-tree filesystem
O Rodeh, J Bacik, C Mason�- ACM Transactions on Storage (TOS), 2013 - dl.acm.org
BTRFS is a Linux filesystem that has been adopted as the default filesystem in some popular
versions of Linux. It is based on copy-on-write, allowing for efficient snapshots and clones. …
versions of Linux. It is based on copy-on-write, allowing for efficient snapshots and clones. …
B-trees, shadowing, and clones
O Rodeh�- ACM Transactions on Storage (TOS), 2008 - dl.acm.org
B-trees are used by many file systems to represent files and directories. They provide guaranteed
logarithmic time key-search, insert, and remove. File systems like WAFL and ZFS use …
logarithmic time key-search, insert, and remove. File systems like WAFL and ZFS use …
zFS-a scalable distributed file system using object disks
O Rodeh, A Teperman�- 20th IEEE/11th NASA Goddard�…, 2003 - ieeexplore.ieee.org
zFS is a research project aimed at building a decentralized file system that distributes all
aspects of file and storage management over a set of cooperating machines interconnected by …
aspects of file and storage management over a set of cooperating machines interconnected by …
Object storage: The future building block for storage systems
The concept of object storage was introduced in the early 1990's by the research community.
Since then it has greatly matured and is now in its early stages of adoption by the industry. …
Since then it has greatly matured and is now in its early stages of adoption by the industry. …
Hands: A heuristically arranged non-backup in-line deduplication system
Deduplicating in-line data on primary storage is hampered by the disk bottleneck problem,
an issue which results from the need to keep an index mapping portions of data to hash …
an issue which results from the need to keep an index mapping portions of data to hash …
[HTML][HTML] GLnexus: joint variant calling for large cohort sequencing
As ever-larger cohorts of human genomes are collected in pursuit of genotype/phenotype
associations, sequencing informatics must scale up to yield complete and accurate genotypes …
associations, sequencing informatics must scale up to yield complete and accurate genotypes …
[PDF][PDF] The Architecture and Performance of Security Protocols in the EnsembleGroup Communication System
Ensemble is a Group Communication System built at Cornell and the Hebrew universities. It
allows processes to create process groups within which scalable reliable fifo-ordered …
allows processes to create process groups within which scalable reliable fifo-ordered …
[PDF][PDF] Optimized group rekey for group communications systems
In this paper we describe an efficient algorithm for the management of group keys. Our
algorithm is based on a protocol for secure IP-multicast and is used to manage group-keys in …
algorithm is based on a protocol for secure IP-multicast and is used to manage group-keys in …
Secure reliable multicast protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of
recipients such that all honest destinations receive the same message, despite the malicious …
recipients such that all honest destinations receive the same message, despite the malicious …
The Horus and Ensemble projects: Accomplishments and limitations
The Horus and Ensemble efforts culminated a multi-year Cornell research program in process
group communication used for fault-tolerance, security and adaptation. Our intent was to …
group communication used for fault-tolerance, security and adaptation. Our intent was to …