Filters








39 Hits in 5.2 sec

Taming Latency in Data Center Networking with Erasure Coded Files

Yu Xiang, Vaneet Aggarwal, Yih-Farn R. Chen, Tian Lan
2015 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing  
This paper proposes an approach to minimize service latency in a data center network where erasure-coded files are stored on distributed disks/racks and access requests are scattered across the network  ...  The results provide valuable insight on designing low-latency data center networks with erasure-coded storage. 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing 978-1-4799  ...  With knowledge of the access patterns of different files, the use of erasure coding enables a novel latency optimization of data center storage with respect to placement of erasure coded content Y.  ... 
doi:10.1109/ccgrid.2015.142 dblp:conf/ccgrid/XiangACL15 fatcat:pe6drfs4djgyto3vzqvtjlrhwm

TAMING THE UNCERTAINTY OF PUBLIC CLOUDS

Maxim Schnjakin, Christoph Meinel
2013 Services Transactions on Cloud Computing  
In our work, we presented a system that improves availability, confidentiality and reliability of data stored in the cloud.  ...  Public cloud storage services enable organizations to manage data with low operational expenses.  ...  latency) depends on the network proximity, congestions in network path and traffic load on the target server.  ... 
doi:10.29268/stcc.2013.1.2.3 fatcat:rj22bimzwjbkdacdc4gcnrpn4m

Problems in Modern High Performance Parallel I/O Systems [article]

Robert Louis Cloud
2011 arXiv   pre-print
In addressing the two prior issues, one must also question the nature of the data itself; one can ask whether contem- porary practices of data dumping and analysis are optimal and whether they will continue  ...  For a variety of reasons, the I/O subsystems of such computers have not kept pace with the computational increases, and the time required for I/O in an application has become one of the dominant bottlenecks  ...  erasure codes(typical RAID-like parity byte encoding).  ... 
arXiv:1109.0742v1 fatcat:vknt7cuqpjfnpmxmpk4lt4rhv4

Pelican: A Building Block for Exascale Cold Data Storage

Shobana Balakrishnan, Richard Black, Austin Donnelly, Paul England, Adam Glass, David Harper, Sergey Legtchenko, Aaron Ogus, Eric Peterson, Antony I. T. Rowstron
2014 USENIX Symposium on Operating Systems Design and Implementation  
We show that compared to this over-provisioned storage rack Pelican performs well for cold workloads, providing high throughput with acceptable latency.  ...  A significant fraction of data stored in cloud storage is rarely accessed. This data is referred to as cold data; cost-effective storage for cold data has become a challenge for cloud providers.  ...  It uses two servers connected using dual 10 Gbps Ethernet ports to the data center network, providing an aggregate of 40 Gbps of full-duplex bandwidth.  ... 
dblp:conf/osdi/BalakrishnanBDEGHLOPR14 fatcat:yoy5mg5bhzhrjbqvkwrbzcayei

Approximate Networking for Universal Internet Access

Junaid Qadir, Arjuna Sathiaseelan, Umar Farooq, Muhammad Usama, Muhammad Imran, Muhammad Shafique
2017 Future Internet  
The overwhelming focus of the Internet research community has been on improving the ideal networking experience by providing increasingly higher throughputs along with lower latencies.  ...  We see this in wired technologies such as the modern fiber-based broadband high-speed network, which come close to providing "ideal network" performance, have largely been restricted to urban centers and  ...  on cloud data centers with the increased adoption of cloud computing and NFV.  ... 
doi:10.3390/fi9040094 fatcat:flvo2uusrrde3gzckys4f45l4u

29th International Conference on Data Engineering [book of abstracts]

2013 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)  
Taming the Metadata Mess V.M.  ...  In this paper we address this aspect in the context of a relational database, such that when combined with (i) & (ii), complete erasure of data and its effects can be achieved ("untraceable deletion").  ...  These volunteers welcome participants, give directions, help in the sessions and on the registration desk, and generally make sure the conference is running smoothly.  ... 
doi:10.1109/icdew.2013.6547409 fatcat:wadzpuh3b5htli4mgb4jreoika

Implementing statically typed object-oriented programming languages

Roland Ducournau
2011 ACM Computing Surveys  
In statically typed object-oriented languages, message sending, or late binding, is implemented with tables often called virtual functions tables (VFT).  ...  Those tables reduce method calls to function calls, with a small fixed number of extra indirections. The overhead is more or less important, whether inheritance and subtyping are single or multiple.  ...  in the code or in the data structures.  ... 
doi:10.1145/1922649.1922655 fatcat:ntlwqmagj5h5damjaiy46whaxu

CTRQ 2017 Committee CTRQ Steering Committee CTRQ 2017 Technical Program Committee

Richard Li, Eugen Borcoci, Mazin Alshamrani, Saudi Arabia, Jasmina Husic, B Telecom, Christos Bouras, Julio César, García Álvarez, Apostolos Gkamas, Teodor Grigorie, Alexey Kashevnik (+17 others)
2017 unpublished
Reliability assurance and guaranteed quality of services require particular mechanisms that deal with dynamics of system and network changes, as well as with changes in user profiles.  ...  in communication theory.  ...  Jiachen Chen, WIN-LAB, Rutgers University for his help with the figures and crucial feedback. This research was supported by the NSF Future Internet Architecture (FIA) grant CNS-134529.  ... 
fatcat:h5n6asy5lze3dc44h3efc6rv5e

Noisy Fields: Interference and Equivocality in the Sonic Legacies of Information Theory

Nicholas A. Knouf
2015 Leonardo: Journal of the International Society for the Arts, Sciences and Technology  
Considering noise as a material-discursive phenomenon, I trace its intersections with sonic practices and information theory.  ...  Noisy Fields: Interference and Equivocality in the Sonic Legacies of Information eory discusses the ways in which noise causes interferences within disciplinary fields.  ...  Given the secrecy involved in these data centers it is not surprising for there to be no reference for this claim. ⁶⁹Spread Networks, "Spread Networks® Collocation Centers" (Specifications Sheet, 2011)  ... 
doi:10.1162/leon_a_01110 fatcat:ufx4ddxx3bel3dsbpxo4h4aw4i

Speculative Physics: the Ontology of Theory and Experiment in High Energy Particle Physics and Science Fiction [article]

Clarissa Ai Ling Lee
2014 arXiv   pre-print
There are two levels of conversations going on in the dissertation; at the first level, the discussion is centered on a critical historiography and philosophical implications of the discovery Higgs boson  ...  in relation to its position at the intersection of old (current) and the potential for new possibilities in quantum physics; I then position my findings on the Higgs boson in connection to the double-slit  ...  across a network of physicists among different collaborative groups who analyze the data cuts.  ... 
arXiv:1406.5636v1 fatcat:xdy4cigbizcrna3hpkk2r2r6xq

Learning Race and Ethnicity: Youth and Digital Media

Barbara Crow
2009 Information, Communication & Society  
As with earlier shifts in media environments, this current turn toward digital media and networks has been accompanied by fear and panic as well as elevated hopes.  ...  Digital media networks support existing forms of mass media distribution as well as smaller publics and collectivities that might center on peer groups or specialized niche interests.  ...  These phrases, while somewhat derogatory in nature, are intended only as a slang means of expression that can be generally accepted by everyone in an effort not to offend or incite, and are not aimed at  ... 
doi:10.1080/13691180802552908 fatcat:f2tko4i24fcc5nxrcgcua4mtju

Dagstuhl Reports, Volume 8, Issue 3, March 2018, Complete Issue [article]

2018
We study the never-worse relation (NWR) for Markov decision processes with an infinitehorizon reachability objective.  ...  Using the NWR, states in the same equivalence class can be collapsed. Then, actions leading to sub-optimal states can be removed. Our main results are as follows. 1.  ...  The repair problem refers to correcting one or several erasures with a given error-correcting code using as little inter-nodal communication as possible.  ... 
doi:10.4230/dagrep.8.3 fatcat:d7bgvlx2nzhbdaocgdmjeyop6u

Gesamt-PDF [chapter]

Luisa Feiersinger, Kathrin Friedrich, Moritz Queisner, Luisa Feiersinger, Kathrin Friedrich, Moritz Queisner
2018 Image – Action – Space  
Co-coding of online and offline spaces already occurred with radars.  ...  The network enables these things and surroundings to connect and exchange data.  ...  VR Headsets as Unbounded Displays In VR installations with HMDs, the displays are no longer presented in a statically installed form, e. g. a monitor or a video projection, with which the visitors are  ... 
doi:10.1515/9783110464979-017 fatcat:yhdltksvejaylooyfkjyrwxoiy

Dagstuhl Reports, Volume 9, Issue 3, March 2019, Complete Issue [article]

2019
There are no commonly accepted standards or metrics to assess the risks associated with different driver behaviors in automated vehicles.  ...  This result appears in paper "Two new results about quantum exact learning" written jointly with Srinivasan Arunachalam, Troy Lee, Manaswi Paraashar and Ronald de Wolf.  ...  The design is driven by the observation that in data centers, DRAM and network resources are underutilized.  ... 
doi:10.4230/dagrep.9.3 fatcat:2tpapmq2rfdsjpygzyvhw2l6ei

50 Algebra in Computational Complexity (Dagstuhl Seminar 14391) Manindra Agrawal, Valentine Kabanets, Thomas Thierauf, and Christopher Umans 85 Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop

Maria-Florina Balcan, Bodo Manthey, Heiko Röglin, Tim Roughgarden, Artur D'avila Garcez, Marco Gori, Pascal Hitzler, Luís Lamb, Bart Preneel, Phillip Rogaway, Mark Ryan, Peter (+5 others)
unpublished
Depth Reduction for Arithmetic Circuits Reed-Muller codes with respect to random errors and erasures We consider the behaviour of Reed-Muller codes in the Shannon model of random errors.  ...  In other words, for this range of parameters RM codes achieve capacity for the Binary-Erasure-Channel.  ...  (TBONs) are often used to execute data aggregation operations in a scalable, piecewise fashion.  ... 
fatcat:e5wnf6cuhvc3bceegijgut34zm
« Previous Showing results 1 — 15 out of 39 results