نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

2003
Daniel Ellard Jonathan Ledlie Pia Malkani Margo I. Seltzer

We present an analysis of a pair of NFS traces of contemporary email and research workloads. We show that although the research workload resembles previouslystudied workloads, the email workload is quite different. We also perform several new analyses that demonstrate the periodic nature of file system activity, the effect of out-of-order NFS calls, and the strong relationship between the name ...

2013
Rahul Neve

This paper shows the comparative study and implementation of recommendation system based on two different web mining algorithms. The proposed system is designed for web page prediction in recommendation system as well as it is helpful for the study of web mining algorithm to get frequent sequential access pattern from web log file of web server. The experiments are conducted based on the implem...

1995
Ethan L. Miller Randy H. Katz

Massively parallel file systems must provide high bandwidth file access to programs running on their machines. Most accomplish this goal by striping files across arrays of disks attached to a few specialized I/O nodes in the massively parallel processor (MPP). This arrangement requires programmers to give the file system many hints on how their data is to be laid out on disk if they want to ach...

2015
Fatima El Jamiy Abderrahmane Daif Mohamed Azouazi Abdelaziz Marzak

All over the process of treating data on HPC Systems, parallel file systems play a significant role. With more and more applications, the need for high performance InputOutput is rising. Different possibilities exist: General Parallel File System, cluster file systems and virtual parallel file system (PVFS) are the most important ones. However, these parallel file systems use pattern and model ...

2013
Lei Wei Michael K. Reiter

Cloud storage, and more specifically the encryption of file contents to protect them in the cloud, can interfere with access to these files by partially trusted third-party service providers and customers. To support such access for pattern-matching applications (e.g., malware scanning), we present a protocol that enables a client authorized by the data owner to evaluate a deterministic finite ...

2010
Olga Mordvinova Dennis Runz Julian M. Kunkel Thomas Ludwig

Choosing an appropriate cluster file system for a specific high performance computing application is challenging and depends mainly on the specific application I/O needs. There is a wide variety of I/O requirements: Some implementations require reading and writing large datasets, others out-of-core data access, or they have database access requirements. Application access patterns reflect diffe...

2013
Pradeep Shetty Richard P. Spillane Ravikant Malpani Binesh Andrews Justin Seyster Erez Zadok

As the Internet and the amount of data grows, the variability of data sizes grows too—from small MP3 tags to large VM images. With applications using increasingly more complex queries and larger data-sets, data access patterns have become more complex and randomized. Current storage systems focus on optimizing for one band of workloads at the expense of other workloads due to limitations in exi...

Journal: :The Journal of the Institute of Television Engineers of Japan 1972

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2016

2011
G. M. Nasira

The data or file will be required to be moved from secondary memory to main memory for executing certain instructions. The time taken to transfer the data is referred as latency time. The In this paper a detailed study on various file access predictors and caching techniques is discussed. The various file operations such as file prediction, file creation, file deletion, file modification and fi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید