نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

Journal: :Electronics 2022

Container platforms ease the deployment of applications and respond to failures. The advantages container have promoted their use in information services. However, is accompanied by associated security risks. For instance, malware uploaded users can leak important information, malicious operators cause unauthorized modifications files create service errors. These threats degrade quality service...

2014
Cairong Yan Tie Li Yongfeng Huang Yanglan Gan

The storage and access of massive small files are one of the challenges in the design of distributed file system. Hadoop distributed file system (HDFS) is primarily designed for reliable storage and fast access of very big files while it suffers a performance penalty with increasing number of small files. A middleware called Hmfs is proposed in this paper to improve the efficiency of storing an...

2004
Christian Digout

Despite the proposal of numerous tree-based structures for high-dimensional similarity searches, techniques based on a sequential scan, such as the VA-File, have been shown to be quite effective. In this thesis we present three new access structures which use sequential access patterns to ef£ciently answer similarity queries for high-dimensional vector and metric data. Two of these access struc...

2005
Rajeev Thakur Robert B. Ross Robert Latham

We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of a parallel program need to acquire exclusive access to a range of bytes. One application of this algorithm is for implementing MPI-IO’s atomic-access mode in the absence of atomicity guarantees from the underlying fil...

2000
Rolf Rabenseifner Alice E. Koniges Jean-Pierre Prost Richard Hedges

The parallel effective I/O bandwidth benchmark (b_eff_io) is aimed at producing a characteristic average number of the I/O bandwidth achievable with parallel MPI-I/O applications exhibiting various access patterns and using various buffer lengths. It is designed so that 15 minutes should be sufficient for a first pass of all access patterns. First results of the b_eff_io benchmark are given for...

2018
Sudarsun Kannan Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau Yuangang Wang Jun Xu Gopinath Palani

We present DevFS, a direct-access file system embedded completely within a storage device. DevFS provides direct, concurrent access without compromising file system integrity, crash consistency, and security. A novel reverse-caching mechanism enables the usage of host memory for inactive objects, thus reducing memory load upon the device. Evaluation of an emulated DevFS prototype shows more tha...

2007
Dan R. Lipsa Philip J. Rhodes R. Daniel Bergeron Ted M. Sparr

In this paper we propose a technique called storage-aware spatial prefetching that can provide significant performance improvements for out-of-core visualization. This approach is motivated by file chunking in which a multidimensional data file is reorganized into multidimensional sub-blocks that are stored linearly in the file. This increases the likelihood that data close in the n-dimensional...

2006
Florin Isaila David E. Singh Jesús Carretero Félix García

This paper evaluates the impact of the parallel I/O scheduling strategy on the performance of the file access in a parallel file system for clusters of commodity computers (Clusterfile). We argue that the parallel I/O scheduling strategy should be seen as a complement to other file access optimizations like striping over several I/O servers, non-contiguous I/O and collective I/O. Our study is b...

2012
Tommaso Cucinotta Nilo Redini Gianluca Dini

This paper describes the Access Control Model realized for the novel Pepys distributed, Internet-wide, file-system. The model design has been widely inspired to various existing standards and best practices about access control and security in file-system access, but it also echoes peculiar basic principles characterizing the design of Pepys, as well as the ΠP protocol, over which Pepys itself ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید