نتایج جستجو برای: file access pattern
تعداد نتایج: 713743 فیلتر نتایج به سال:
We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, we show that we can exploit these relationships to automatically generate predictive models for these properties, and that...
We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, we show that we can exploit these relationships to automatically generate predictive models for these properties, and that...
For typical workloads and file naming conventions, the size, lifespan, read/write ratio, and access pattern of nearly all files in a file system are accurately predicted by the name given to the file when it is created. We discuss some name-related properties observed in three contemporary NFS workloads, and present a method for automatically creating name-based models to predict interesting fi...
In this paper we have carried out an experimental study of the I/O latency of a distributed file system over a parallel multimedia platform. Our experimental platform uses NFS (Network File System) to support an application characterized by its high processing and storage requirements. We evaluate the overall system by varying several NFS parameters as well as the underlying network topology an...
Security of the digital information is becoming primary concern prior to transmitting the information itself via some media. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. In this proposed method, the carrier file and the secret message are taken into audio format and a pattern matchin...
A common file access pattern found in cluster applications is concurrent read sharing: applications running on multiple sites read access the same dataset concurrently. Traditional network file systems are limited by the server’s network bandwidth; therefore cannot satisfy the high-bandwidth concurrent reads that cluster applications typically require. This paper presents NFS-cc: a cooperative ...
To increase the scale and performance of scientific applications, scientists commonly distribute computation over multiple processors. Often without realizing it, file I/O is parallelized with the computation. An implication of this I/O parallelization is that multiple compute tasks are likely to concurrently access the I/O nodes of an HPC system. When a large number of I/O streams concurrently...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید