نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

2013
Walter F. Tichy Zuwang Ruan

This paper describes IBIS, a distributed file system for a network. of UNIX machines. IBIS provides two levels of abstraction: file access transparency and file location transparency. File access transparency means that all files are accessed in the same way, regardless of whether they are remote or local. File location transparency hides the location of files in the network. IBIS provides a si...

Journal: :Intelligent Automation & Soft Computing 2011
Youhui Zhang Hongyi Wang Dongsheng Wang Weimin Zheng

This paper presents a proposal to em bed the file access control into object-based storage devices (OSD) to achieve powerf ul storage security with rich semantics; and two application pr ototypes, the OSD-based intrusion detection ( ID) and the f iner-grained (than the f ile-level) acce ss control, are im plemented to show its feasibility. To embed file access control into st orage, one of vita...

2001
Jude T. Regan Christian D. Jensen

The ability to access and share information over the Internet has introduced the need for new flexible, dynamic and fine-grained access control mechanisms. None of the current mechanisms for sharing information – distributed file systems and the web – offer adequate support for sharing in a large and highly dynamic group of users. Distributed file systems lack the ability to share information w...

Journal: :IEEE Micro 2000
Benjamin Reed Edward G. Chron Randal C. Burns Darrell D. E. Long

0272-1732/00/$10.00  2000 IEEE The need to access anything from anywhere has increased the role of distributed file servers in computing. Distributed file systems provide local file system semantics for access to remote storage. This allows network clients to incorporate the remote storage into their local file system. File semantics are well understood by users and applications, making distri...

2002
Mahmut T. Kandemir Alok N. Choudhary

Despite continued innovations in design of I/O systems, I/O performance has not kept pace with the progress in processor and communication technology. This paper addresses this I/O problem from a compiler’s perspective, and presents an I/O optimization strategy based on access pattern and storage form (file layout) detection. The objective of our optimization strategy is to determine storage fo...

2006
Dries Kimpe Andrea Lani Tiago Quintino Stefan Vandewalle Stefaan Poedts Herman Deconinck

Parallel computing is indisputably present in the future of high performance computing. For distributed memory systems, MPI is widely accepted as a de facto standard. However, I/O is often neglected when considering parallel performance. In this article, a number of I/O strategies for distributed memory systems will be examined. These will be evaluated in the context of COOLFluiD, a framework f...

2010
David Griffith

This M-file analyzes an Institute of Electrical and Electronics Engineers (IEEE) 802.11 Machine Access Control (MAC) layer channel in which multiple nonsaturated stations compete for access to a single access point (AP). The M-file allows the user to model various effects at the physical (PHY) layer, including effects of fading, path loss, and shadowing. The function SNRcdf() performs the PHY l...

2008
Jan Stender Björn Kolbeck Felix Hupfeld Eugenio Cesario Erich Focht Matthias Hess Jesús Malo Jonathan Martí

Striping is a technique that distributes file content over multiple storage servers and thereby enables parallel access. In order to be able to provide a consistent view across file data and metadata operations, the file system has to track the layout of the file and know where the file ends and where it contains gaps. In this paper, we present a light-weight protocol for maintaining a consiste...

2008
Tushar Khot

File access patterns for application startup are fixed and predictable. More precisely, they would obey the Markovian property of each future access depending only on the current access. In this project, we attempt to learn the Markov chain transition probabilities, where each file access is a state in the chain. But since multiple applications may run at the same time, the file access chains f...

ژورنال: مجله دندانپزشکی 2008
جوادی‌نژاد, شهرزاد, زارع جهرمی, مریم, میرعنایت, امیرعلی,

Background and Aim: The role of applying rotary instruments in reducing preparation time and proper root canal preparation have been approved in permanent teeth. The aim of this study was to compare the rotary instruments (Hero642) and K-files in root canal preparation of primary molars. Time and canal transportation were compared. Materials and Methods: In this experimental, invitro study, 30...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید