Sciweavers

20 search results - page 4 / 4
» hotos 1999
Sort
View
HOTOS
1999
IEEE
13 years 9 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
HOTOS
1999
IEEE
13 years 9 months ago
Conductor: A Framework for Distributed Adaptation
Abstract--End-to-end connectivity is growing increasingly diverse, with orders of magnitude differences in characteristics throughout the network. At the same time, most applicatio...
Mark Yarvis, Peter L. Reiher, Gerald J. Popek
HOTOS
1999
IEEE
13 years 9 months ago
The Case for Efficient File Access Pattern Modeling
Most modern I/O systems treat each file access independently. However, events in a computer system are driven by programs. Thus, accesses to files occur in consistent patterns and...
Tom M. Kroeger, Darrell D. E. Long
HOTOS
1999
IEEE
13 years 9 months ago
Elephant: The File System That Never Forgets
Modern file systems associate the deletion of a file with the release of the storage associated with that file, and file writes with the irrevocable change of file contents. We pr...
Douglas J. Santry, Michael J. Feeley, Norman C. Hu...
HOTOS
2003
IEEE
13 years 10 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...