Garth Goodson
Garth Goodson
Carnegie Mellon University, Netapp, Natero, Freshworks
Verified email at natero.com
Title
Cited by
Cited by
Year
Sift {a tool for wide-area information dissemination
TWYH Garcia-Molina
J. USENIX New Orleans, Louisiana, USA 1620, 1995
4781995
Fault-scalable Byzantine fault-tolerant services
M Abd-El-Malek, GR Ganger, GR Goodson, MK Reiter, JJ Wylie
ACM SIGOPS Operating Systems Review 39 (5), 59-74, 2005
4512005
An analysis of latent sector errors in disk drives
LN Bairavasundaram, GR Goodson, S Pasupathy, J Schindler
Proceedings of the 2007 ACM SIGMETRICS international conference on …, 2007
4112007
Self-Securing Storage: Protecting Data in Compromised Systems.
JD Strunk, GR Goodson, ML Scheinholtz, CAN Soules, GR Ganger
OSDI, 165-180, 2000
3762000
An analysis of data corruption in the storage stack
LN Bairavasundaram, AC Arpaci-Dusseau, RH Arpaci-Dusseau, ...
ACM Transactions on Storage (TOS) 4 (3), 1-28, 2008
3662008
Measurement and Analysis of Large-Scale Network File System Workloads.
AW Leung, S Pasupathy, GR Goodson, EL Miller
USENIX annual technical conference 1 (2), 5-2, 2008
3302008
Metadata efficiency in a comprehensive versioning file system
CA Soules, GR Goodson, JD Strunk, GR Ganger
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2002
2882002
Metadata efficiency in a comprehensive versioning file system
CA Soules, GR Goodson, JD Strunk, GR Ganger
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2002
2882002
iDedup: latency-aware, inline data deduplication for primary storage.
K Srinivasan, T Bisson, GR Goodson, K Voruganti
Fast 12, 1-14, 2012
2782012
Efficient Byzantine-tolerant erasure-coded storage
GR Goodson, JJ Wylie, GR Ganger, MK Reiter
International Conference on Dependable Systems and Networks, 2004, 135-144, 2004
2422004
Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior.
AG Pennington, JD Strunk, JL Griffin, CAN Soules, GR Goodson, ...
USENIX Security Symposium, 2003
1962003
Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior.
AG Pennington, JD Strunk, JL Griffin, CAN Soules, GR Goodson, ...
USENIX Security Symposium, 2003
1962003
Distributed storage system capable of restoring data in case of a storage failure
DR Kenchammana-Hosekote, JL Hafner, MT Roskow, OA Zaki, ...
US Patent 7,159,150, 2007
1762007
Parity Lost and Parity Regained.
A Krioukov, LN Bairavasundaram, GR Goodson, K Srinivasan, R Thelen, ...
FAST 2008, 127, 2008
1272008
Efficient data object storage and retrieval
M Shao, GR Goodson
US Patent 8,793,466, 2014
1162014
Hierarchically tagged cache
G Goodson, M Shao, K Smith
US Patent 8,874,850, 2014
1062014
Deduplication of data on disk devices based on a threshold number of sequential blocks
K Srinivasan, G Goodson, K Voruganti
US Patent 8,346,730, 2013
992013
System and method for nearly in-band search indexing
GR Goodson, S Pasupathy
US Patent 7,949,638, 2011
972011
Storage system-based hole punching for reclaiming unused space from a data container
T Bisson, S Pasupathy, GR Goodson, SR Kleiman
US Patent 8,086,652, 2011
962011
Survivable storage systems
GR Ganger, PK Khosla, M Bakkaloglu, MW Bigrigg, GR Goodson, S Oguz, ...
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
892001
The system can't perform the operation now. Try again later.
Articles 1–20