Filters








90,572 Hits in 3.1 sec

Evaluation techniques for storage hierarchies

R.L. Mattson, J. Gecsei, D. R. Slutz, I. L. Traiger
1970 IBM Systems Journal  
A new approach is proposed for the design of perfect hash functions. The algorithms developed can be effectively applied to key sets of large size.  ...  Analytic results are given which are applicable when problem sizes are smalL Extensive experiments have been performed to test the approach for problems of larger size.  ...  In order to use hashing techniques in a specific application, one has to first choose a suitable hash function, then select a method for collision resolution.  ... 
doi:10.1147/sj.92.0078 fatcat:m4rf3zx7djfe7erjzfhmnoh3uq

Five-year subject index

1974 IBM Systems Journal  
AND MERGING A model of floating buffering Guided bibliography to sorting STORAGE SYSTEMS Evaluation techniques for storage hierarchies A virtual machine time-sharing system Model of paging system performance  ...  Interactive simulation for banking Forecasting techniques Direct-access device simulation Skylab terminal system performance analysis Evaluation of storage hierarchies Probability for system design SORTING  ... 
doi:10.1147/sj.134.0357 fatcat:pnqvxhwn5jhpho2zwnhfvakrt4

Page 360 of IBM Systems Journal Vol. 9-13, Issue Cumulative Contents/Index [page]

1970 IBM Systems Journal  
Interactive simulation for banking Forecasting techniques Direct-access device simulation Skylab terminal system performance analysis Evaluation of storage hierarchies Probability for system design SORTING  ...  AND MERGING A model of floating buffering Guided bibliography to sorting STORAGE SYSTEMS Evaluation techniques for storage hierarchies A virtual machine time-sharing system Model of paging system performance  ... 

Systematic Approach for the selection of monitoring technologies in CO2 geological storage projects. Application of multicriteria decision making

2013 Global NEST Journal  
<p>Geologic storage of carbon dioxide (CO2) has been proposed as a viable means for reducing anthropogenic CO2 emissions.  ...  In this paper, we identify techniques of gas measurements in subsurface which are currently applying in the phase of characterization (pre-injection); MCDM will help decision-makers to hierarchy the most  ...  weight evaluated is the same for each alternative, the values will differ from each alternative.  ... 
doi:10.30955/gnj.001241 fatcat:7zuecnselzhelmlfaury6visnq

Empirical evaluation of multi-level buffer cache collaboration for storage systems

Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer
2005 Performance Evaluation Review  
to the storage client software, and the aggressively-collaborative caching trades off transparency for performance and requires changes to both the interface and the storage client software.  ...  Our study provides an empirical evaluation to address the above questions.  ...  techniques are used.  ... 
doi:10.1145/1071690.1064230 fatcat:ijkfxl2pqrat7c7hrmapi64z3q

Empirical evaluation of multi-level buffer cache collaboration for storage systems

Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer
2005 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '05  
Our study provides an empirical evaluation to address the above questions.  ...  to the storage client software, and the aggressively-collaborative caching trades off transparency for performance and requires changes to both the interface and the storage client software.  ...  techniques are used.  ... 
doi:10.1145/1064212.1064230 dblp:conf/sigmetrics/ChenZZSS05 fatcat:3sj6tovawvdfjj6wmgdyi3vaoi

Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

S. Saravanakumar, S. Chitra
2022 Computer systems science and engineering  
Result is evaluated using Cloudsim, and our algorithm outperforms in terms of computational cost by consuming 32 MB for 150-MB files.  ...  Furthermore, highly secure and flexible cipher text-based attribute access control with role hierarchy user grouping in cloud storage is implemented by extending the KUNodes (revocation) storage identity-based  ...  Storage consumption of the proposed system is evaluated by comparing the cipher text storage capacity of the existing algorithms. The evaluated results are shown in Tab. 3.  ... 
doi:10.32604/csse.2022.019508 fatcat:nzq5lyfcozco5eapu3q6ywziwq

Indexing and selecting hierarchical business logic

Alessandra Loro, Anja Gruenheid, Donald Kossmann, Damien Profeta, Philippe Beaudequin
2015 Proceedings of the VLDB Endowment  
Additionally, we introduce a weight-based lazy merging technique for rule selection. All of these techniques are evaluated with real world and synthetic data sets.  ...  These rules can impede efficient query processing when they require the business rule engine to resolve semantic hierarchies.  ...  Additionally, we evaluate our techniques with synthetic datasets.  ... 
doi:10.14778/2824032.2824064 fatcat:frb7o7zgmfdohmokodrwq77pku

Stream Scheduling: A Framework to Manage Bulk Operations in a Memory Hierarchy

Abhishek Das, William J. Dally
2007 Parallel Architecture and Compilation Techniques (PACT), Proceedings of the International Conference on  
The Stream programming model captures this by making computation and communication explicit in a 2-level storage hierarchy.  ...  The levels of memory hierarchy could include on-die storage such as caches, local DRAM, or even remote memory accessed over high-speed interconnect.  ...  A steepest gradient search algorithm is adopted to search for the best performing working set that fits in each memory level.We evaluate each optimization by plugging Stream Scheduling into the Sequoia  ... 
doi:10.1109/pact.2007.4336233 fatcat:m2s7y4urdjc3niwi2g4e6fwtbe

Page 158 of American Society of Civil Engineers. Collected Journals Vol. 1, Issue 4 [page]

1995 American Society of Civil Engineers. Collected Journals  
Finally, the view FU hierarchy use case displays the FU hierarchy for a program.  ...  Consequently, evaluation, such as checking for conformance to codes and standards at a minimum, is needed after the generation cycle is completed.  ... 

Desperately Seeking ... Optimal Multi-Tier Cache Configurations

Tyler Estro, Pranav Bhandari, Avani Wildani, Erez Zadok
2020 USENIX Workshop on Hot Topics in Storage and File Systems  
Current cache evaluation techniques (e.g., Miss Ratio Curves) are short-sighted: they analyze only a single tier of cache, focus primarily on performance, and fail to examine the critical relationships  ...  Modern cache hierarchies are tangled webs of complexity.  ...  It is vital that our methods of evaluating caches mature as storage technologies and cache hierarchies continuously evolve.  ... 
dblp:conf/hotstorage/EstroBWZ20 fatcat:f3eetlewjrdylpkgk6qaagubgy

Analytical hierarchy process based flexibility measurement tool to integrate concentrated photovoltaic in smart grid

Ahmed A. Shetaya, Rasha El-Azab, Amr M. Amin
2015 International Journal of Smart Grid and Clean Energy  
It also determines the desired storage that must be added to enhance the system flexibility for real time dispatching.  ...  This paper introduces a new process based on Analytical Hierarchy Process (AHP) to aid the integrating of CPV in Smart Grids.  ...  Acknowledgements The authors gratefully acknowledge the grant and support of "Small scale thermal solar district units for Mediterranean communities", Priority 2 -Topic 2.3 Solar Energy, Ref.  ... 
doi:10.12720/sgce.4.3.233-240 fatcat:54famhgqiba35kti7btftjzo54

A framework for evaluating storage system dependability

K. Keeton, A. Merchant
2004 International Conference on Dependable Systems and Networks, 2004  
We present a framework for evaluating the dependability of data storage systems, including both individual data protection techniques and their compositions.  ...  Predicting the dependability provided by such compositions of techniques is difficult, yet necessary for dependable system design.  ...  Acknowledgements The authors are grateful to John Wilkes, Jeff Chase and Eric Anderson for their inputs on the direction of this work and comments on earlier versions of this paper.  ... 
doi:10.1109/dsn.2004.1311958 dblp:conf/dsn/KeetonM04 fatcat:othkcz4pfnfkhc6hokhqtpfny4

Index set: A practical indexing scheme for object database systems

Jung-Ho Ahn, Ha-Joo Song, Hyoung-Joo Kim
2000 Data & Knowledge Engineering  
Ecient indexing in a class hierarchy is essential for the achievement of high performance in query evaluation for object database management systems.  ...  We develop a cost model and, through experiments, demonstrate the performance of the proposed scheme over various class hierarchies. Ó  ...  Many indexing techniques for queries on composite hierarchies have also been studied.  ... 
doi:10.1016/s0169-023x(00)00006-9 fatcat:ivyb55babngs3irvmjd7gjszym

A general framework for improving query processing performance on multi-level memory hierarchies

Bingsheng He, Yinan Li, Qiong Luo, Dongqing Yang
2007 Proceedings of the 3rd international workshop on Data management on new hardware - DaMoN '07  
We propose a general framework for improving the query processing performance on multi-level memory hierarchies.  ...  Our motivation is that (1) the memory hierarchy is an important performance factor for query processing, (2) both the memory hierarchy and database systems are becoming increasingly complex and diverse  ...  Storage models We consider two kinds of storage models, the array for static data and the linked list (LL) for dynamic data. Especially, we consider optimizing the scan on the storage models.  ... 
doi:10.1145/1363189.1363193 dblp:conf/damon/HeLLY07 fatcat:ols4ejd2k5bjnoksaeqjccjy34
« Previous Showing results 1 — 15 out of 90,572 results