
<rss version="0.91">
    <channel>
        <title>Latest Articles from JUCS - Journal of Universal Computer Science</title>
        <description>Latest 6 Articles from JUCS - Journal of Universal Computer Science</description>
        <link>https://lib.jucs.org/</link>
        <lastBuildDate>Fri, 17 Apr 2026 03:37:05 +0000</lastBuildDate>
        <generator>Pensoft FeedCreator</generator>
        <image>
            <url>https://lib.jucs.org/i/logo.jpg</url>
            <title>Latest Articles from JUCS - Journal of Universal Computer Science</title>
            <link>https://lib.jucs.org/</link>
            <description><![CDATA[Feed provided by https://lib.jucs.org/. Click to visit.]]></description>
        </image>
	
		<item>
		    <title>Scalable Distributed Metadata Server Based on Nonblocking Transactions</title>
		    <link>https://lib.jucs.org/article/23991/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 26(1): 89-106</p>
					<p>DOI: 10.3897/jucs.2020.006</p>
					<p>Authors: Kohei Hiraga, Osamu Tatebe, Hideyuki Kawashima</p>
					<p>Abstract: Metadata performance scalability is critically important in high-performance computing when accessing many small files from millions of clients. This paper proposes a design of a scalable distributed metadata server, PPMDS, for parallel file systems using multiple key-value servers. In PPMDS, hierarchical namespace of a file system is efficiently managed by multiple servers. Multiple entries can be atomically updated using a nonblocking distributed transaction based on an algorithm of dynamic software transactional memory. This paper also proposes optimizations to further improve the metadata performance by introducing a server-side transaction processing, multiple readers, and a shared lock mode, which reduce the number of remote procedure calls and prevent unnecessary blocking. Performance evaluation shows the scalable performance up to 3 servers, and achieves 62,000 operations per second, which is 2.58x performance improvement compared to a single metadata performance.</p>
					<p><a href="https://lib.jucs.org/article/23991/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/23991/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/23991/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Tue, 28 Jan 2020 00:00:00 +0000</pubDate>
		</item>
	
		<item>
		    <title>Precise Performance Characterization of Antivirus on the File System Operations</title>
		    <link>https://lib.jucs.org/article/22647/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 25(9): 1089-1108</p>
					<p>DOI: 10.3217/jucs-025-09-1089</p>
					<p>Authors: Mohammed Al-Saleh, Hanan Hamdan</p>
					<p>Abstract: The Antivirus (AV) is of an important concern to the end-users community. Mainly, the AV achieves security by scanning data against its database of virus signatures. In addition, the AV tries to reach a pleasant balance between security and United States of Americability. When to scan data is an important design decision an AV has to make. Because AVs are equipped with on-access scanners that scan files when necessary, we want to have a fine-grained approach that provides us with high precision explanation of the performance impact of the AVs on different file system operations. Microsofts minifilter driver technology helps us achieve exactly what we want. By deploying a minifilter driver, we show that most overhead of the tested AVs are greatly imposed on the OPEN operation. Interestingly, we also show that the AV greatly enhances the timing for the READ operation. Finally, the WRITE and CLEANUP operations show almost no differences in terms of performance.</p>
					<p><a href="https://lib.jucs.org/article/22647/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/22647/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/22647/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Sat, 28 Sep 2019 00:00:00 +0000</pubDate>
		</item>
	
		<item>
		    <title>Methods for Information Hiding in Open Social Networks</title>
		    <link>https://lib.jucs.org/article/22577/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 25(2): 74-97</p>
					<p>DOI: 10.3217/jucs-025-02-0074</p>
					<p>Authors: Jędrzej Bieniasz, Krzysztof Szczypiorski</p>
					<p>Abstract: This paper summarizes research on methods for information hiding in Open Social Networks. The first contribution is the idea of StegHash, which is based on the use of hashtags in various open social networks to connect multimedia files (such as images, movies, songs) with embedded hidden data. The proof of concept was implemented and tested using a few social media services. The experiments confirmed the initial idea. Next, SocialStegDisc was designed as an application of the StegHash method by combining it with the theory of filesystems. SocialStegDisc provides the basic set of operations for files, such as creation, reading or deletion, by implementing the mechanism of a linked list. It establishes a new kind of mass-storage characterized by unlimited data space, but limited address space where the limitation is the number of the hashtags' unique permutations. The operations of the original StegHash method were optimized by trade-offs between the memory requirements and computation time. Features and limitations were identified and discussed. The proposed system broadens research on a completely new area of threats in social networks.</p>
					<p><a href="https://lib.jucs.org/article/22577/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/22577/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/22577/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Thu, 28 Feb 2019 00:00:00 +0000</pubDate>
		</item>
	
		<item>
		    <title>Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics</title>
		    <link>https://lib.jucs.org/article/28335/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 11(1): 20-36</p>
					<p>DOI: 10.3217/jucs-011-01-0020</p>
					<p>Authors: Sriranjani Sitaraman, S. Venkatesan</p>
					<p>Abstract: An important problem in digital forensics is to record a checkpoint of a disk drive mounted as a file system on a host machine without disrupting the disk s normal operations. We present a checkpointing methodology for a disk that has a Unix-like file system. While our algorithm is built around the Unix file system, it can be used to checkpoint disks formatted for other file systems such as NTFS, etc. Our algorithm satisfies several correctness conditions.</p>
					<p><a href="https://lib.jucs.org/article/28335/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/28335/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/28335/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Fri, 28 Jan 2005 00:00:00 +0000</pubDate>
		</item>
	
		<item>
		    <title>Lazy Cyclic Reference Counting</title>
		    <link>https://lib.jucs.org/article/28084/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 9(8): 813-828</p>
					<p>DOI: 10.3217/jucs-009-08-0813</p>
					<p>Authors: Rafael Lins</p>
					<p>Abstract: Reference counting is a widely employed memory management technique, in which garbage collection operations are interleaved with computation. Standard reference counting has the major drawback of being unable to handle cyclic structures. This paper presents an important optimisation to a recently published algorithm for cyclic reference counting. Proofs of the correctness of the original and lazy algorithms are provided, together with performance figures.</p>
					<p><a href="https://lib.jucs.org/article/28084/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/28084/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/28084/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Thu, 28 Aug 2003 00:00:00 +0000</pubDate>
		</item>
	
		<item>
		    <title>Distributed Caching in Networked File Systems</title>
		    <link>https://lib.jucs.org/article/27131/</link>
		    <description><![CDATA[
					<p>JUCS - Journal of Universal Computer Science 1(6): 399-409</p>
					<p>DOI: 10.3217/jucs-001-06-0399</p>
					<p>Authors: Artur Klauser, Reinhard Posch</p>
					<p>Abstract: Changing relative performance of processors, networks, and disks makes it necessary to reconsider algorithms using these three resources. As networks get faster and less congested topologies emerge, it becomes important to use network resources more aggressively to obtain good performance. Substitution of local disk accesses by accesses to remote memory can lead to better balanced resource usage and thus to faster systems. In this work we address the issue of file caching in a networked file system configuration. Distributed block-level in-memory caches are considered. We show that carefully constructed distributed concepts can lead to lower server load and better overall system performance than centralized concepts. Oversimplification, although aimed at gaining performance for single components, may deteriorate overall performance as a result of unbalanced resource usage.</p>
					<p><a href="https://lib.jucs.org/article/27131/">HTML</a></p>
					<p><a href="https://lib.jucs.org/article/27131/download/xml/">XML</a></p>
					<p><a href="https://lib.jucs.org/article/27131/download/pdf/">PDF</a></p>
			]]></description>
		    <category>Research Article</category>
		    <pubDate>Wed, 28 Jun 1995 00:00:00 +0000</pubDate>
		</item>
	
	</channel>
</rss>
	