نتایج جستجو برای: file access pattern
تعداد نتایج: 713743 فیلتر نتایج به سال:
purpose: this study aimed to investigate the status of the open access policies of highly-ranked digital repositories in the world’s universities by identifying the policies regarding the components of submission, content, data, meta-data, preservation, and access. methodology: this survey was descriptive-analytical. data was collected by administrating a researcher-made questionnaire completed...
Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of ...
Cluster-based storage systems connected with TCP/IP networks are expected to achieve a high throughput by striping files across multiple storage servers. However, for the storage system interconnected with the TCP/IP network, several critical issues, like Incast effect and data access interference, invalidate the assumption that higher access parallelism always results in increased I/O throughp...
In the current environment, data security is paramount, and any confidential files we must have with us everywhere go raise chance of losing such files. To prevent this inconvenient method transporting private information, our suggested solution uses cloud to store users' myriad size in encrypted form, encrypting them using AES-256 version technique ensure that your remains secret. The user no ...
The Paranoid file system is an encrypted, secure, global file system with user-managed access control. The system provides efficient peer-to-peer applicationtransparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, unix-like, file access to peer-groups acro...
In this paper, we describe the collection and analysis of file system traces from a variety of different environments, including both UNIX and NT systems, clients and servers, and instructional and production systems. Our goal is to understand how modern workloads affect the ability of file systems to provide high performance to users. Because of the increasing gap between processor speed and d...
While processor clock rates continue to track Moore’s law, the physical mechanisms which contribute to disk access time are improving at a much slower pace. As a result, disk access time is getting longer relative to CPU cycles. Caching can alleviate congestion by keeping frequently used data in main memory, but these data must initially read from disk at some point. Furthermore, the entire wor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید