نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

2003
Daniel Ellard Michael Mesnier Gregory R. Ganger Margo Seltzer

We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, we show that we can exploit these relationships to automatically generate predictive models for these properties, and that...

2015
Daniel Ellard Michael Mesnier Eno Thereska Gregory R. Ganger Margot Seltzer Margo Seltzer

We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, we show that we can exploit these relationships to automatically generate predictive models for these properties, and that...

2003
Daniel Ellard Jonathan Ledlie Margo Seltzer

For typical workloads and file naming conventions, the size, lifespan, read/write ratio, and access pattern of nearly all files in a file system are accurately predicted by the name given to the file when it is created. We discuss some name-related properties observed in three contemporary NFS workloads, and present a method for automatically creating name-based models to predict interesting fi...

2001
Teresa Olivares Francisco J. Quiles Antonio Jose Garrido del Solo Pedro Javier García Luis Orozco-Barbosa

In this paper we have carried out an experimental study of the I/O latency of a distributed file system over a parallel multimedia platform. Our experimental platform uses NFS (Network File System) to support an application characterized by its high processing and storage requirements. We evaluate the overall system by varying several NFS parameters as well as the underlying network topology an...

2015
Samir Kumar Bandyopadhyay

Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...

Journal: :The Computer Journal 1984

Journal: :IJHPCN 2004
Ying Xu Brett D. Fleisch

A common file access pattern found in cluster applications is concurrent read sharing: applications running on multiple sites read access the same dataset concurrently. Traditional network file systems are limited by the server’s network bandwidth; therefore cannot satisfy the high-bandwidth concurrent reads that cluster applications typically require. This paper presents NFS-cc: a cooperative ...

2007
Seetharami R. Seelam Andre Kerstens Patricia J. Teller

To increase the scale and performance of scientific applications, scientists commonly distribute computation over multiple processors. Often without realizing it, file I/O is parallelized with the computation. An implication of this I/O parallelization is that multiple compute tasks are likely to concurrently access the I/O nodes of an HPC system. When a large number of I/O streams concurrently...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید