Download now Free registration required
The authors propose a highly efficient and scalable duplicate-search technique based on hash algorithm, Cloud-based computing is an emerging practice that offers significantly more infrastructure and financial flexibility than traditional computing models which requires very low computational cost and memory cost. Larger enterprises may have implemented very strong security approaches that may or may not be equaled by cloud providers, but don't just assume that security is a problem. Look for the type of security functionality the user would look for in an in-house solution. A documents may get mirrored to avoid delays or to provide fault tolerance. Their algorithms RDDA for detecting replicate documents are critical in applications where data is obtained from multiple sources.
- Format: PDF
- Size: 1094.3 KB