نتایج جستجو برای: file access pattern

تعداد نتایج: 713743  

2005
Philip J. Rhodes Xuan Tang R. Daniel Bergeron Ted M. Sparr

Visualization of multidimensional data presents special challenges for the design of efficient out-of-core data access. Elements that are nearby in the visualization may not be nearby in the underlying data file, which can severely tax the operating system’s disk cache. The Granite Scientific Database System can address these problems because it is aware of the organization of the data on disk,...

2003
Wei Li Jianmin Liang Zhiwei Xu

Accessing remote resource is a principal challenge of grid computing. For wide-area file sharing, a most difficult problem is the inability to access files distributed in different administrative domains. In this paper, we propose a file system architecture called VegaFS, which is detached from administrative domains entirely and provides cross-domain file access abilities. The main idea is to ...

Journal: :RFC 1973
Robert Thomas

A file access protocol (FAP) of the sort proposed by John Day in RFC 520 is a good idea. The following corr~ents suggest improvements (mostly additions) to the protocol described in RFC 520. 1. (Philosophical comment) rrhe intent of both F'I'P and FAP is to make it po ssible for-a user to remotely access f iles. In effect, FTP provides means for a user to have (parts o f) file activity bf the s...

Journal: :Electr. Notes Theor. Comput. Sci. 2017
Rakan Alsowail Ian Mackie

Accidental misuse of shared files by authorised users is a predominant problem. This paper proposes a well-known static analysis approach, namely a type system, to prevent such accidental misuse. We develop a type system that intercepts commands issued by users in a file system and enforces policies on each file. Commands issued by users to manipulate files will be subject to type checking by t...

2004
Purvi Shah Jehan-François Pâris Ahmed Amer Darrell D. E. Long

Disk access times have not kept pace with the evolution of disk capacities, CPU speeds and main memory sizes. They have only improved by a factor of 3 to 4 in the last 25 years whereas other system components have almost doubled their performance every other year. As a result, disk latency has an increasingly negative impact on the overall performance of many computer applications. Two main tec...

2010
Anthony Collins Judy Kay

There has long been recognition of the limitations of hierarchical file systems, particularly when people need collections of files, email and web pages for a new task. An associative file access mechanism offers promise in addressing these limitations. Such a mechanism is particularly appealing for personal file access at pervasive interaction devices, such as tabletops, providing an excellent...

Journal: :Computer and Information Science 2008
K. Duraiswamy V. Valli Mayil

With the rapid increasing popularity of the WWW, Websites are playing a crucial role to convey knowledge to the end users. Every request of Web site or a transaction on the server is stored in a file called server log file. Providing Web administrator with meaningful information about user access behavior (also called click stream data) has become a necessity to improve the quality of Web infor...

ژورنال: محاسبات نرم 2019

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

2008
Andrew W. Leung Shankar Pasupathy Garth R. Goodson Ethan L. Miller

In this paper we present the analysis of two large-scale network file system workloads. We measured CIFS traffic for two enterprise-class file servers deployed in the NetApp data center for a three month period. One file server was used by marketing, sales, and finance departments and the other by the engineering department. Together these systems represent over 22 TB of storage used by over 15...

2003
Jiesheng Wu Pete Wyckoff Dhabaleswar K. Panda

Noncontiguous I/O access is the main access pattern in many scientific applications. Noncontiguity exists both in access to files and in access to target memory regions on the client. This characteristic imposes a requirement of native noncontiguous I/O access support in cluster file systems for high performance. In this paper, we address two main issues on supporting efficient noncontiguous I/...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید