نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

Journal: :پژوهشنامه کتابداری و اطلاع رسانی 0
مریم سادات سیدین حیدر مختاری

purpose: this study aimed to investigate the status of the open access policies of highly-ranked digital repositories in the world’s universities by identifying the policies regarding the components of submission, content, data, meta-data, preservation, and access. methodology: this survey was descriptive-analytical. data was collected by administrating a researcher-made questionnaire completed...

2002
Kyoungwoon Cho Yeonseung Ryu Youjip Won Kern Koh

Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of ...

Journal: :ACM SIGSOFT Software Engineering Notes 2004

2010
Xuechen Zhang Guiquan Liu Song Jiang

Cluster-based storage systems connected with TCP/IP networks are expected to achieve a high throughput by striping files across multiple storage servers. However, for the storage system interconnected with the TCP/IP network, several critical issues, like Incast effect and data access interference, invalidate the assumption that higher access parallelism always results in increased I/O throughp...

Journal: :International journal of scientific research in computer science, engineering and information technology 2022

In the current environment, data security is paramount, and any confidential files we must have with us everywhere go raise chance of losing such files. To prevent this inconvenient method transporting private information, our suggested solution uses cloud to store users' myriad size in encrypted form, encrypting them using AES-256 version technique ensure that your remains secret. The user no ...

Journal: :JURNAL SISTEM INFORMASI BISNIS 2014

2005

The Paranoid file system is an encrypted, secure, global file system with user-managed access control. The system provides efficient peer-to-peer applicationtransparent file sharing. This paper presents the design, implementation and evaluation of the Paranoid file system and its access-control architecture. The system lets users grant safe, selective, unix-like, file access to peer-groups acro...

2000
Drew S. Roselli Jacob R. Lorch Thomas E. Anderson

In this paper, we describe the collection and analysis of file system traces from a variety of different environments, including both UNIX and NT systems, clients and servers, and instructional and production systems. Our goal is to understand how modern workloads affect the ability of file systems to provide high performance to users. Because of the increasing gap between processor speed and d...

2001
Dana B. Dahlstrom Eric Wiewiora

While processor clock rates continue to track Moore’s law, the physical mechanisms which contribute to disk access time are improving at a much slower pace. As a result, disk access time is getting longer relative to CPU cycles. Caching can alleviate congestion by keeping frequently used data in main memory, but these data must initially read from disk at some point. Furthermore, the entire wor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید