Sciweavers

77 search results - page 1 / 16
» UNIX Disk Access Patterns
Sort
View
76
Voted
USENIX
1993
14 years 12 months ago
UNIX Disk Access Patterns
Chris Ruemmler, John Wilkes
USENIX
2007
15 years 29 days ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
FAST
2004
15 years 1 days ago
Atropos: A Disk Array Volume Manager for Orchestrated Use of Disks
The Atropos logical volume manager allows applications to exploit characteristics of its underlying collection of disks. It stripes data in track-sized units and explicitly expose...
Jiri Schindler, Steven W. Schlosser, Minglong Shao...
CLUSTER
1999
IEEE
14 years 10 months ago
The Network RamDisk: Using remote memory on heterogeneous NOWs
Efficient data storage, a major concern in the modern computer industry, is mostly provided today by the the traditional magnetic disk. Unfortunately the cost of a disk transfer m...
Michail Flouris, Evangelos P. Markatos
SIGOPSE
1990
ACM
15 years 2 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...