• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,022
Next 10 →

Thread-Local Storage

by Yair Sade , 2004
"... Dynamic memory management in C programs can be rather costly. Multithreading introduces additional synchronization overhead of C memory management functions (malloc,free) which becomes a bottleneck on multithreaded environments and especially on Symmetric Multi Processor (SMP) machines. In order to ..."
Abstract - Add to MetaCart
to reduce synchronization overhead, we extended Hoard — a state of the art memory allocator with the ability to allocate thread-local storage. Experimental results using the tool show runtime saving of up to 44 % for a set of memory management benchmarks. To allow transparent usage of thread-local storage

FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment

by Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, Roger P. Wattenhofer - IN PROCEEDINGS OF THE 5TH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI , 2002
"... Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides file availability and reliability through randomized replicated storage; it ensures the secrecy of file contents with cry ..."
Abstract - Cited by 487 (13 self) - Add to MetaCart
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides file availability and reliability through randomized replicated storage; it ensures the secrecy of file contents

ON THE CORRFXTNESS OF A LOCAL STORAGE SUBSYSTEM

by Marco A. Casanova, Arnaldo V. Moura, Luiz Tucherman
"... The design of a provably correct local storage subsystem that integrates local reliability and concurrency control is analysed. The description of the reliability and concurrency control strate-gies, as well as the correctness proof, is divided into successive layers of abstraction.. The relia-bilit ..."
Abstract - Add to MetaCart
The design of a provably correct local storage subsystem that integrates local reliability and concurrency control is analysed. The description of the reliability and concurrency control strate-gies, as well as the correctness proof, is divided into successive layers of abstraction.. The relia

Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems

by Antony Rowstron, Peter Druschel , 2001
"... This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing scheme for wide-area peer-to-peer applications. Pastry provides application-level routing and object location in a potentially very large overlay network of nodes connected via the Internet. ..."
Abstract - Cited by 2075 (49 self) - Add to MetaCart
. It can be used to support a wide range of peer-to-peer applications like global data storage, global data sharing, and naming. An insert operation in Pastry stores an object at a user-defined number of diverse nodes within the Pastry network. A lookup operation reliably retrieves a copy of the requested

Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems

by Antony Rowstron , Peter Druschel - IN PROC. OF THE 18TH IFIP/ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED SYSTEMS PLATFORMS, , 2001
"... This paper presents the design and evaluation of Pastry, a scalable, distributed object location and routing substrate for wide-area peer-to-peer applications. Pastry performs application-level routing and object location in a potentially very large overlay network of nodes connected via the Intern ..."
Abstract - Cited by 1932 (1 self) - Add to MetaCart
the Internet. It can be used to support a variety of peer-to-peer applications, including global data storage, data sharing, group communication and naming. Each node in the Pastry network has a unique identifier (nodeId). When presented with a message and a key, a Pastry node efficiently routes the message

Serverless Network File Systems

by Thomas E. Anderson, Michael D. Dahlin, Jeanna M. Neefe, David A. Patterson, Drew S. Roselli, Randolph Y. Wang - ACM TRANSACTIONS ON COMPUTER SYSTEMS , 1995
"... In this paper, we propose a new paradigm for network file system design, serverless network file systems. While traditional network file systems rely on a central server machine, a serverless system utilizes workstations cooperating as peers to provide all file system services. Any machine in the sy ..."
Abstract - Cited by 473 (28 self) - Add to MetaCart
in the system can store, cache, or control any block of data. Our approach uses this location independence, in combination with fast local area networks, to provide better performance and scalability than traditional file systems. Further, because any machine in the system can assume the responsibilities of a

Energy peak shaving with local storage

by Matthew P Johnson , Amotz Bar-Noy , Ou Liu , Yi Feng - Sustainable Computing: Informatics and Systems , 2011
"... Abstract We introduce a new problem inspired by energy pricing schemes in which a client is billed for peak usage. At each timeslot the system meets an energy demand through a combination of a new request, an unreliable amount of free source energy (e.g. solar or wind power), and previously receive ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract We introduce a new problem inspired by energy pricing schemes in which a client is billed for peak usage. At each timeslot the system meets an energy demand through a combination of a new request, an unreliable amount of free source energy (e.g. solar or wind power), and previously received energy. The added piece of infrastructure is the battery, which can store surplus energy for future use, and is initially assumed to be perfectly efficient or lossless. In a feasible solution, each demand must be supplied on time, through a combination of newly requested energy, energy withdrawn from the battery, and free source. The goal is to minimize the maximum request. In the online version of this problem, the algorithm must determine each request without knowledge of future demands or free source availability, with the goal of maximizing the amount by which the peak is reduced. We give efficient optimal algorithms for the offline problem, with and without a bounded battery. We also show how to find the optimal offline battery size, given the requirement that the final battery level equals the initial battery level. Finally, we give efficient H n -competitive algorithms assuming the peak effective demand is revealed in advance, and provide matching lower bounds. Later, we consider the setting of lossy batteries, which lose to conversion inefficiency a constant fraction of any amount charged (e.g. 33%). We efficiently adapt our algorithms to this setting, maintaining optimality for offline and (we conjecture) maintaining competitiveness for online. We give factor-revealing LPs, which provide some quasi-empirical evidence for competitiveness. Finally, we evaluate these and other, heuristic algorithms on real and synthetic data.

Value Locality and Load Value Prediction

by Mikko H. Lipasti, Christopher B. Wilkerson, John Paul Shen , 1996
"... Since the introduction of virtual memory demand-paging and cache memories, computer systems have been exploiting spatial and temporal locality to reduce the average latency of a memory reference. In this paper, we introduce the notion of value locality, a third facet of locality that is frequently p ..."
Abstract - Cited by 391 (18 self) - Add to MetaCart
present in real-world programs, and describe how to effectively capture and exploit it in order to perform load value prediction. Temporal and spatial locality are attributes of storage locations, and describe the future likelihood of references to those locations or their close neighbors. In a similar

Scalable Reed-Solomon-based Reliable Local Storage for

by Leonardo Bautista Gomez, Bogdan Nicolae, Naoya Maruyama, Satoshi Matsuoka - HPC Applications on IaaS Clouds. In Euro-Par ’12: 18th International Euro-Par Conference on Parallel Processing , 2012
"... Abstract. With increasing interest among mainstream users to run HPC applications, Infrastructure-as-a-Service (IaaS) cloud computing platforms represent a viable alternative to the acquisition and maintenance of expensive hardware, often out of the financial capabilities of such users. Also, one of ..."
Abstract - Cited by 7 (4 self) - Add to MetaCart
of the critical needs of HPC applications is an efficient, scalable and persistent storage. Unfortunately, storage options proposed by cloud providers are not standardized and typically use a different access model. In this context, the local disks on the compute nodes can be used to save large data sets

FragDB – Secure Localized Storage Based on

by Super-distributed Rfid-tag Infrastructures
"... Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – cheap and easy. However, controlling access to this data will become cumbersome if traditional forms of access control are to be ..."
Abstract - Add to MetaCart
are to be used: Overly restrictive rules might deny the potential of data sharing, while a lack of control could easily lead to Orwellian surveillance scenarios. This paper presents FragDB, a storage concept based on localized access control, where data storage and retrieval are bound to a specific place, rather
Next 10 →
Results 1 - 10 of 5,022
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University