• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 336
Next 10 →

A Study of Integrated Prefetching and Caching Strategies

by Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li - In Proceedings of the ACM SIGMETRICS , 1995
"... Prefetching and caching are effective techniques for improving the performance of file systems, but they have not been studied in an integrated fashion. This paper proposes four properties that optimal integrated strategies for prefetching and caching must satisfy, and then presents and studies two ..."
Abstract - Cited by 210 (9 self) - Add to MetaCart
approaches by trace-driven simulation with a collection of file access traces. Our results show that the two integrated prefetching and caching strategies are indeed close to optimal and that these strategies can reduce the running time of applications by up to 50%.

Dynamic File-Access Characteristics of a Production Parallel Scientific Workload

by David Kotz, et al. , 1994
"... Multiprocessors have permitted astounding increases in computational performance, but many cannot meet the intense I/O requirements of some scientific applications. An important component of any solution to this I/O bottleneck is a parallel file system that can provide high-bandwidth access to treme ..."
Abstract - Cited by 80 (12 self) - Add to MetaCart
Multiprocessors have permitted astounding increases in computational performance, but many cannot meet the intense I/O requirements of some scientific applications. An important component of any solution to this I/O bottleneck is a parallel file system that can provide high-bandwidth access

A Hierarchical Internet Object Cache

by Anawat Chankhunthod , Peter B. Danzig, Chuck Neerdaels, Michael F. Schwartz, Kurt J. Worrell - IN PROCEEDINGS OF THE 1996 USENIX TECHNICAL CONFERENCE , 1995
"... This paper discusses the design andperformance of a hierarchical proxy-cache designed to make Internet information systems scale better. The design was motivated by our earlier trace-driven simulation study of Internet traffic. We believe that the conventional wisdom, that the benefits of hierarch ..."
Abstract - Cited by 496 (6 self) - Add to MetaCart
This paper discusses the design andperformance of a hierarchical proxy-cache designed to make Internet information systems scale better. The design was motivated by our earlier trace-driven simulation study of Internet traffic. We believe that the conventional wisdom, that the benefits

Characterizing parallel file-access patterns on a large-scale multiprocessor

by Apratim Purakayastha, Carla Schlatter Ellis, David Kotz, Ntis Nieuwejaar , Michael Best - IN PROCEEDINGS OF THE NINTH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM , 1995
"... Rapid increases in the computational speeds of multiprocessors have not been matched by correspond-ing performance enhancements in the I/O subsystem. To satisfy the large and growing I/O requirements of some parallel scientific applications, we need parallel file systems that can provide high-bandwi ..."
Abstract - Cited by 44 (4 self) - Add to MetaCart
information about every individual read and write request and about the entire mix of applications running on the machines. The results of our trace analysis lead to recommendations for parallel file system design. First, the file system should support efficient concurrent access to many files, and UO

An NFS Trace Player for File System Evaluation

by Ningning Zhu, Jiawu Chen, Tzi-cker Chiueh, Daniel Ellard , 2003
"... File access traces have been used to drive simulations of storage management algorithms such as file caching, for workload characterization and modeling, and to identify interesting access patterns for performance optimization. Surprisingly they are rarely used to test the correctness and evaluate t ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
File access traces have been used to drive simulations of storage management algorithms such as file caching, for workload characterization and modeling, and to identify interesting access patterns for performance optimization. Surprisingly they are rarely used to test the correctness and evaluate

Exploiting Redundancy to Conserve Energy in Storage Systems

by Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnicki , 2005
"... This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it evaluates the previous (redundancy-oblivious) energy conservation techniques, along with Diverted Accesses, as a function ..."
Abstract - Cited by 53 (5 self) - Add to MetaCart
-aware storage systems. To study Diverted Accesses for realistic systems and workloads, we simulate a wide-area storage system under two file-access traces. Our modeling results show that Diverted Accesses is more effective and robust than the redundancy-oblivious techniques. Our simulation results show that our

Using Multiple Predictors to Improve the Accuracy of File Access Predictions

by Gary A. S. Whittle, Jehan-françois Pâris, Ahmed Amer, Darrell D. E. Long, Randal Burns - In Proceedings of the 20th IEEE / 11th NASA Goddard Conference on Mass Storage Systems and Technologies , 2003
"... Existing file access predictors keep track of previous file access patterns and rely on a single heuristic to predict which of the previous successors to the file being currently accessed is the most likely to be accessed next. We present here a novel composite predictor that applies multiple heuris ..."
Abstract - Cited by 11 (4 self) - Add to MetaCart
heuristics to this selection problem. As a result, it can make use of specialized heuristics that can make very accurate predictions when access patterns are observed to meet their particular criteria. Simulation results involving a total of seven file access traces indicate that our predictor delivers more

A Trace-Driven Analysis of the UNIX 4.2 BSD File System

by John Ousterhout, Herve Da Costa, David Harrison, John A. Kunze, Mike Kupfer, James G. Thompson , 1985
"... We analyzed the UNIX 4.2 BSD file system by recording userlevel activity in trace files and writing programs to analyze the traces. The tracer did not record individual read and write operations, yet still provided tight bounds on what information was accessed and when. The trace analysis shows that ..."
Abstract - Cited by 277 (5 self) - Add to MetaCart
We analyzed the UNIX 4.2 BSD file system by recording userlevel activity in trace files and writing programs to analyze the traces. The tracer did not record individual read and write operations, yet still provided tight bounds on what information was accessed and when. The trace analysis shows

Abstract Visualizing Predictability of File Access Patterns

by Alison Luo, Ahmed Amer, Newton Der, Darrell D. E. Long, Alex Pang
"... We propose a novel method to study storage system predictability based on the visualization of file successor entropy, a form of conditional entropy drawn from a file access trace. First-order conditional entropy is used as a measure of predictability. It is superior to the more common measures such ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
We propose a novel method to study storage system predictability based on the visualization of file successor entropy, a form of conditional entropy drawn from a file access trace. First-order conditional entropy is used as a measure of predictability. It is superior to the more common measures

Cooperative Caching: Using Remote Client Memory to Improve File System Performance

by Michael D. Dahlin, Randolph Y. Wang, Thomas E. Anderson, David A. Patterson - IN PROCEEDINGS OF THE FIRST SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION , 1994
"... Emerging high-speed networks will allow machines to access remote data nearly as quickly as they can access local data. This trend motivates the use of cooperative caching: coordinating the file caches of many machines distributed on a LAN to form a more effective overall file cache. In this paper w ..."
Abstract - Cited by 327 (24 self) - Add to MetaCart
we examine four cooperative caching algorithms using a trace-driven simulation study. These simulations indicate that for the systems studied cooperative caching can halve the number of disk accesses, improving file system read response time by as much as 73%. Based on these simulations we conclude
Next 10 →
Results 1 - 10 of 336
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University