共 50 条
- [3] Using predictions of file access to improve file system performance [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIV, PROCEEDINGS: COMPUTER SCIENCE, ENGINEERING AND APPLICATIONS, 2003, : 304 - 311
- [6] Analyzing and Visualizing Web Server Access Log File [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 : 349 - 367
- [7] A small file merging and prefetching strategy based on access task in cloud storage [J]. Wang, T. (wangtao.mac@gmail.com), 1600, Editorial Board of Medical Journal of Wuhan University (38):
- [8] Detecting Intruders by User File Access Patterns [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335
- [9] A Change Recommendation Approach Using Change Patterns of a Corresponding Test File [J]. SYMMETRY-BASEL, 2018, 10 (11):
- [10] INTERFACE DESIGN ERGONOMICS - APPLICATION TO A FILE CONSULTING TASK [J]. TRAVAIL HUMAIN, 1991, 54 (01): : 57 - 67