Sciweavers

77 search results - page 1 / 16
» UNIX Disk Access Patterns
Sort
View
USENIX
1993
13 years 6 months ago
UNIX Disk Access Patterns
Chris Ruemmler, John Wilkes
USENIX
2007
13 years 7 months ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
FAST
2004
13 years 6 months ago
Atropos: A Disk Array Volume Manager for Orchestrated Use of Disks
The Atropos logical volume manager allows applications to exploit characteristics of its underlying collection of disks. It stripes data in track-sized units and explicitly expose...
Jiri Schindler, Steven W. Schlosser, Minglong Shao...
CLUSTER
1999
IEEE
13 years 5 months ago
The Network RamDisk: Using remote memory on heterogeneous NOWs
Efficient data storage, a major concern in the modern computer industry, is mostly provided today by the the traditional magnetic disk. Unfortunately the cost of a disk transfer m...
Michail Flouris, Evangelos P. Markatos
SIGOPSE
1990
ACM
13 years 9 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...