نتایج جستجو برای: storage applications
تعداد نتایج: 772033 فیلتر نتایج به سال:
Over the last two decades, processor speeds have been improving much faster than memory speeds. As a result, memory access delay is a major performance bottleneck in today’s systems. Because compilers often fail to automatically choreograph data and computation to avoid memory access delay, we have developed a source-to-source transformation tool for this purpose. To use our tool, developers an...
Computational science applications are driving a demand for increasingly powerful storage systems. While many techniques are available for capturing the I/O behavior of individual application trial runs and specific components of the storage system, continuous characterization of a production system remains a daunting challenge for systems with hundreds of thousands of compute cores and multipl...
This paper introduces OASIS, a self-tuning storage management architecture that allows applications and the storage environment to negotiate resource allocations without requiring human intervention. The goal of OASIS is to maximize the utilization of all the storage resources in the storage area network subject to fairness in the allocation of resources to applications. To achieve this goal, O...
Tertiary Storage: An Evaluation of New Applications
Document images can be stored compactly using JBIG. The main drawback of the method is the lack of direct access to the compressed image file (spatial access). Here we propose a storage system based on JBIG so that spatial access is also supported. For facsimile images, the increase in the file size is only about 10 %. With this cost we achieve also a fast preview to the image using only about ...
Electricity sector is among the main carbon emissions contributors. This sector has the potential to reduce its carbon emissions through producing electric energy from zero emitting facilities and through the optimization of the consumption in a way to better accommodate low carbon emissions. Hydrogen society per se combined with smart grids, as this is analyzed in this manuscript, can present ...
We live in a world where our personal data are both valuable and vulnerable to misappropriation through exploitation of security vulnerabilities in online services. For instance, Dropbox, a popular cloud storage tool, has certain security flaws that can be exploited to compromise a users data, one of which being that a user’s access pattern is unprotected. We have thus created an implementation...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید