CLIC CLient-Informed Caching for Storage Servers

Size: px
Start display at page:

Download "CLIC CLient-Informed Caching for Storage Servers"

Transcription

1 CLIC CLient-Informed Caching for Storage Servers Xin Liu Ashraf Aboulnaga Ken Salem Xuhui Li David R. Cheriton School of Comuter Science University of Waterloo February 2009

2 Two-Tier Caching DBMS storage server

3 Two-Tier Caching DBMS 1. read() storage server

4 Two-Tier Caching DBMS 1. read() storage server 2. read()

5 Two-Tier Caching DBMS 1. read() storage server 2. read() 3. fetch

6 Two-Tier Caching DBMS 1. read() 4. fetch storage server 2. read() 3. fetch

7 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server 2. read() 3. fetch

8 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server oor temoral locality 2. read() 3. fetch

9 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server oor temoral locality One Solution: hinting 2. read() 3. fetch

10 Examle: Write Hints DBMS write() storage server

11 Examle: Write Hints DBMS write() this is a relacement write storage server

12 Examle: Write Hints DBMS write() storage server this is a relacement write this is a good candidate for caching

13 Examle: Write Hints DBMS write() storage server this is a relacement write this is a good candidate for caching The storage server can use TQ, an ad hoc hint-aware relacement olicy, to exloit write hints.

14 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints?

15 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints? brittleness: correct resonse to hints?

16 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints? brittleness: correct resonse to hints? single source: multile hint generators? DBMS DBMS q this is a relacement write write() storage server q write(q) this is a relacement write q should I or q????

17 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s

18 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints

19 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities

20 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities benefits: handles multile hint tyes handles new hint tyes handles hints from multile clients by treating each client s hints as distinct

21 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities benefits: handles multile hint tyes handles new hint tyes handles hints from multile clients by treating each client s hints as distinct CLIC Hints CLIC searates the generation of hints (done by the storage clients) from the interretation of those hints for caching uroses (done by the storage server).

22 CLIC Illustrated DBMS this is a blargh gor read read() storage server I don t know blargh or gor but revious blargh gor reads have been good candidates, so I will

23 Generating Hints Storage client must be modified to generate one or more tyes of hints. Storage clients attach a hint set to each read or write request. A hint set includes one hint of each tye generated by the client. A storage client may choose to generate any tyes of hints that might be of use to the storage server.

24 Generating Hints Storage client must be modified to generate one or more tyes of hints. Storage clients attach a hint set to each read or write request. A hint set includes one hint of each tye generated by the client. A storage client may choose to generate any tyes of hints that might be of use to the storage server. Examle: Hints from DB2 buffer ool ID object ID: identifies a grou of related DB objects object tye ID: distinguishes table from index request tye: read, relacement/recovery write DB2 buffer riority

25 A CLIC-Managed Cache highest riority Ha Hb each age is associated with the hint set which it was most-recently read or written Hc Hd He lowest riority

26 A CLIC-Managed Cache highest riority Ha Hb Hc each age is associated with the hint set which it was most-recently read or written each hint set has a riority Hd 6 He 8 lowest riority

27 A CLIC-Managed Cache highest riority Ha Hb Hc Hd each age is associated with the hint set which it was most-recently read or written each hint set has a riority CLIC evicts ages associated with the lowest-riority hint sets He 8 lowest riority

28 A CLIC-Managed Cache highest riority Ha 1 3 Hb 7 5 Hc 2 9 Hd 6 He 8 lowest riority 4 each age is associated with the hint set which it was most-recently read or written each hint set has a riority CLIC evicts ages associated with the lowest-riority hint sets CLIC chooses hint set riorities using a simle cost/benefit analysis

29 Cost/Benefit Analysis here?? time (,H) read or write request next request for

30 Cost/Benefit Analysis here?? time (,H) read or write request next request for is this a read request? there is a benefit to caching if the next request for is a read request

31 Cost/Benefit Analysis here?? time (,H) read or write request next request for is this a read request? there is a benefit to caching if the next request for is a read request the cost of obtaining this benefit is that must remain d until the read request

32 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching

33 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching instead CLIC estimates the cost and benefit of caching at (, H) based on revious requests with hint set H

34 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching instead CLIC estimates the cost and benefit of caching at (, H) based on revious requests with hint set H CLIC assigns a riority to each hint set based on the cost and benefit of revious requests with hint set H Priority(H) = Read Hit Rate(H) Mean Time Until Read Hit(H)

35 DB2 Hint Analysis Examle STOCK table relacement writes ORDERLINE table reads

36 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set

37 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged

38 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged tracks read hit statistics only for frequently occurring hint sets

39 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged tracks read hit statistics only for frequently occurring hint sets We have also investigated the use of generalization to reduce the number of distinct hint sets.

40 Performance we have used trace-driven simulation of the storage server buffer to comare CLIC to other relacement olicies methodology 1. modify DB2 and MySQL to generate hints and roduce I/O traces 2. run TPC-C (on-line transaction rocessing) and TPC-H (decision suort) workloads on the database systems and collect I/O traces 3. feed the traces to a simulation of second-tier, which imlements CLIC, LRU, ARC, TQ and OPT 4. measure the hit ratio achieved by different olicies.

41 DB2 TPC-C - Medium DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_C300 0% 60k 120k 180k 240k 300k Server Cache Size (ages)

42 DB2 TPC-H - Medium DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_H400 0% 60k 120k 180k 240k 300k Server Cache Size (ages)

43 DB2 TPC-C - Small DB2 Buffer Cache 100% DB2_C60 Server Cache Read Hit Ratio 80% 60% 40% 20% OPT TQ LRU ARC CLIC 0% 60k 120k 180k 240k 300k Server Cache Size (ages)

44 DB2 TPC-C - Large DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_C540 0% 60k 120k 180k 240k 300k Server Cache Size (ages)

45 Summary and Conclusions CLIC learns to identify I/O hints that signal good caching oortunities by tracking the request stream observed by the second-tier Because CLIC s resonses to secific hints are not redefined, it naturally accommodates new hint tyes and hints from multile storage clients. for our traces: CLIC s erformance usually dominates ARC s and LRU s, sometimes by a factor of 2 or more. CLIC dominates the ad hoc, hint-aware TQ algorithm CLIC s sace overhead can be ket low ( 1% of storage server size in our exeriments)

22. Swaping: Policies

22. Swaping: Policies 22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to

More information

Second-Tier Cache Management Using Write Hints

Second-Tier Cache Management Using Write Hints Second-Tier Cache Management Using Write Hints Xuhui Li University of Waterloo Aamer Sachedina IBM Toronto Lab Ashraf Aboulnaga University of Waterloo Shaobo Gao University of Waterloo Kenneth Salem University

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

10. Multiprocessor Scheduling (Advanced)

10. Multiprocessor Scheduling (Advanced) 10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w

More information

Power Savings in Embedded Processors through Decode Filter Cache

Power Savings in Embedded Processors through Decode Filter Cache Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Reducing the Communication Costs of Graph Analysis by Read-only Replicas and Prioritized Execution

Reducing the Communication Costs of Graph Analysis by Read-only Replicas and Prioritized Execution 6 IEEE 8th International Conference on High Performance Comuting and Communications; IEEE th International Conference on Smart City; IEEE nd International Conference on Data Science and Systems Reducing

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

UML for Global Computing Lecture 3: Property-Driven Development

UML for Global Computing Lecture 3: Property-Driven Development Contents UML for Global Comuting Lecture 3: Proerty-Driven Develoment Martin Wirsing LMU München in cooeration with Hubert Baumeister Lecture : Introducing UML for Mobility Lecture 2: Refining Mobility

More information

α i k (βi k ) Request ratio of rank-k chunks (a specific chunk) at node v i g i k Size of set Ck S i Cache size of node v i

α i k (βi k ) Request ratio of rank-k chunks (a specific chunk) at node v i g i k Size of set Ck S i Cache size of node v i ing Hierarchical Caches in Content-Centric Networs Zixiao Jia,PengZhang,JiweiHuang,ChuangLin, and John C. S. Lui Tsinghua National Laboratory for Information Science and Technology Det. of Comuter Science

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

GDP: Using Dataflow Properties to Accurately Estimate Interference-Free Performance at Runtime

GDP: Using Dataflow Properties to Accurately Estimate Interference-Free Performance at Runtime GDP: Using Dataflow Proerties to Accurately Estimate Interference-Free Performance at Runtime Magnus Jahre Deartment of Comuter Science Norwegian University of Science and Technology (NTNU) Email: magnus.jahre@ntnu.no

More information

Decoding-Workload-Aware Video Encoding

Decoding-Workload-Aware Video Encoding Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Experiments on Patent Retrieval at NTCIR-4 Workshop

Experiments on Patent Retrieval at NTCIR-4 Workshop Working Notes of NTCIR-4, Tokyo, 2-4 June 2004 Exeriments on Patent Retrieval at NTCIR-4 Worksho Hironori Takeuchi Λ Naohiko Uramoto Λy Koichi Takeda Λ Λ Tokyo Research Laboratory, IBM Research y National

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Optimizing Dynamic Memory Management!

Optimizing Dynamic Memory Management! Otimizing Dynamic Memory Management! 1 Goals of this Lecture! Hel you learn about:" Details of K&R hea mgr" Hea mgr otimizations related to Assignment #6" Faster free() via doubly-linked list, redundant

More information

BGP Path visibility issues.

BGP Path visibility issues. BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

A Reconfigurable Architecture for Quad MAC VLIW DSP

A Reconfigurable Architecture for Quad MAC VLIW DSP A Reconfigurable Architecture for Quad MAC VLIW DSP Sangwook Kim, Sungchul Yoon, Jaeseuk Oh, Sungho Kang Det. of Electrical & Electronic Engineering, Yonsei University 132 Shinchon-Dong, Seodaemoon-Gu,

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

15. Address Translation

15. Address Translation 15. Address Translation Oerating System: Three Easy Pieces AOS@UC 1 Memory Virtualizing with Efficiency and Control Memory virtualizing takes a similar strategy known as limited direct execution(lde) for

More information

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density Tracing Multile Targets Using a Particle Filter Reresentation of the Joint Multitarget Probability Density Chris Kreucher, Keith Kastella, Alfred Hero This wor was suorted by United States Air Force contract

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Block Recycling Schemes and Their Cost-based Optimization in NAND Flash Memory Based Storage System

Block Recycling Schemes and Their Cost-based Optimization in NAND Flash Memory Based Storage System Block Recycling Schemes and Their Cost-based Otimization in NAND Flash Memory Based Storage System Jongmin Lee School of Comuter Science University of Seoul jmlee@uos.ac.kr Sunghoon Kim Center for the

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Basic Types and Arrays. Pointers. Records and Pointers. Record Definition. Creating a Record. Pointer. Basic Types. Arrays

Basic Types and Arrays. Pointers. Records and Pointers. Record Definition. Creating a Record. Pointer. Basic Types. Arrays Basic Tyes and Arrays ointers SE 6 Data Structures Lecture Basic Tyes integer, real (floating oint), boolean (0,), character Arrays A[099] : integer array A 0 6 7 99 A[] /9/0 ointers and Lists- Lecture

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Crash Recovery CSC 375 Fall 2012 R&G - Chapter 18

Crash Recovery CSC 375 Fall 2012 R&G - Chapter 18 Crash Recovery CSC 375 Fall 2012 R&G - Chater 18 If you are going to be in the logging business, one of the things that you have to o is to learn about heavy equiment. Robert VanNatta, Logging History

More information

ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture

ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture Jie Zhang, Miryeong Kwon, Changyoung Park, Myoungsoo Jung, Songkuk Kim Computer Architecture and Memory

More information

IEEE High Performance Serial Bus

IEEE High Performance Serial Bus IEEE 1394-1995 High Performance Serial Bus Michael D. Johas Teener Editor, P1394 Working Grou Plumbing Architect, Ale Comuter, Inc. One Infinite Loo, MS 35-OEM Cuertino, CA 95014 teener@ale.com Background

More information

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE

SEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE SEMI-AUOMAIC ROAD EXRACION FROM HIGH-RESOLUION SAELLIE IMAGE Commission III KEY WORDS: Road Extraction, High-Resolution Satellite Image, Urban area, Semi-automatic ABSRAC: In this research, a method is

More information

Managing Storage: Above the Hardware

Managing Storage: Above the Hardware Managing Storage: Above the Hardware 1 Where we are Last time: hardware HDDs and SSDs Today: how the DBMS uses the hardware to provide fast access to data 2 How DBMS manages storage "Bottom" two layers

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels

CS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels CS 229 Final Project: Single Image Deth Estimation From Predicted Semantic Labels Beyang Liu beyangl@cs.stanford.edu Stehen Gould sgould@stanford.edu Prof. Dahne Koller koller@cs.stanford.edu December

More information

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking B.T.R.Naresh Reddy, Prasad Nagelli, K.Srinivasulu Reddy Abstract Vehicle detection lays an imortant role in

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

The Persistent Cache: Improving OID Indexing in Temporal Object-Oriented Database Systems

The Persistent Cache: Improving OID Indexing in Temporal Object-Oriented Database Systems The Persistent Cache: Imroving ID Indexing in Temoral bject-riented Database Systems Kjetil Nørvåg Deartment of Comuter and Information Science Norwegian University of Science and Technology, Norway noervaag@idi.ntnu.no

More information

Page 1. Multilevel Memories (Improving performance using a little cash )

Page 1. Multilevel Memories (Improving performance using a little cash ) Page 1 Multilevel Memories (Improving performance using a little cash ) 1 Page 2 CPU-Memory Bottleneck CPU Memory Performance of high-speed computers is usually limited by memory bandwidth & latency Latency

More information

Hyperbolic Caching: Flexible Caching for Web Applications

Hyperbolic Caching: Flexible Caching for Web Applications Hyperbolic Caching: Flexible Caching for Web Applications Aaron Blankstein Princeton University (now @ Blockstack Inc.) Siddhartha Sen Microsoft Research NY Michael J. Freedman Princeton University Modern

More information

ConcaveCubes: Supporting Cluster-based Geographical Visualization in Large Data Scale

ConcaveCubes: Supporting Cluster-based Geographical Visualization in Large Data Scale Eurograhics Conference on Visualization (EuroVis) 2018 J. Heer, H. Leitte, and T. Roinski (Guest Editors) Volume 37 (2018), Number 3 ConcaveCubes: Suorting Cluster-based Geograhical Visualization in Large

More information

Election Algorithms. has elected i. will eventually set elected i

Election Algorithms. has elected i. will eventually set elected i Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server

More information

Swinburne Research Bank

Swinburne Research Bank Powered by TCPDF (www.tcdf.org) Swinburne Research Bank htt://researchbank.swinburne.edu.au Author: Li, Mingzhao; Choudhury, Farhana; Bao, Zhifeng; Samet, Hanan; Sellis, Timos Title: ConcaveCubes: Suorting

More information

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks Wireless Network, 2016, 8, 13-23 Published Online February 2016 in SciRes. htt://www.scir.org/journal/wsn htt://dx.doi.org/10.4236/wsn.2016.82002 Power Efficient Scheduled-Based Medium Access Control Protocol

More information

20. Paging: Smaller Tables

20. Paging: Smaller Tables 20. Paging: Smaller Tables Oerating System: Three Easy Pieces AOS@UC 1 Paging: Linear Tables We usually have one age table for every rocess in the system. w Assume that 32-bit address sace with 4KB ages

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Sage Document Management Version 17.1

Sage Document Management Version 17.1 Sage Document Management Version 17.1 User's Guide This is a ublication of Sage Software, Inc. 2017 The Sage Grou lc or its licensors. All rights reserved. Sage, Sage logos, and Sage roduct and service

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip

STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip Codesign for Tiled Manycore Systems Mingyu Wang and Zhaolin Li Institute of Microelectronics, Tsinghua University, Beijing 100084,

More information

Architecture description languages for programmable embedded systems

Architecture description languages for programmable embedded systems Architecture descrition languages for rogrammable embedded systems P. Mishra and N. Dutt Abstract: Embedded systems resent a tremendous oortunity to customise designs by exloiting the alication behaviour.

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Complexity analysis of matrix product on multicore architectures

Complexity analysis of matrix product on multicore architectures Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

Fast Shape-based Road Sign Detection for a Driver Assistance System

Fast Shape-based Road Sign Detection for a Driver Assistance System Fast Shae-based Road Sign Detection for a Driver Assistance System Gareth Loy Comuter Vision and Active Percetion Laboratory Royal Institute of Technology (KTH) Stockholm, Sweden Email: gareth@nada.kth.se

More information

CardS4: Modal Theorem Proving on Java Smartcards

CardS4: Modal Theorem Proving on Java Smartcards CardS4: Modal Theorem Proving on Java Smartcards Rajeev Prabhakar Goré and Phuong Thê Nguyên Abstract We describe a successful imlementation of a theorem rover for modal logic S4 that runs on a Java smart

More information

Consistently Estimating the Selectivity of Conjuncts of Predicates

Consistently Estimating the Selectivity of Conjuncts of Predicates Consistently Estimating the Selectivity of Conjuncts of Predicates V. Markl 1 N. Megiddo 1 M. Kutsch T.M. Tran P. Haas 1 U. Srivastava 4 1 IBM Almaden Research Center IBM Germany IBM Silicon Valley Lab

More information

Explore or Exploit? Effective Strategies for Disambiguating Large Databases

Explore or Exploit? Effective Strategies for Disambiguating Large Databases Exlore or Exloit? Effective Strategies for Disambiguating Large Databases Reynold Cheng Eric Lo Xuan S. Yang Ming-Hay Luk Xiang Li Xike Xie University of Hong Kong, Pokfulam Road, Hong Kong Hong Kong Polytechnic

More information

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration A Robust Imlicit Access Protocol for Real-Time Wireless Collaboration Tanya L. Crenshaw, Ajay Tirumala, Sencer Hoke, Marco Caccamo Deartment of Comuter Science University of Illinois Urbana, IL 61801 {tcrensha,

More information

A Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks

A Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks A Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks Jinho Seol, Hyotaek Shim, Jaegeuk Kim, and Seungryoul Maeng Division of Computer Science School of Electrical Engineering

More information

Cache Controller with Enhanced Features using Verilog HDL

Cache Controller with Enhanced Features using Verilog HDL Cache Controller with Enhanced Features using Verilog HDL Prof. V. B. Baru 1, Sweety Pinjani 2 Assistant Professor, Dept. of ECE, Sinhgad College of Engineering, Vadgaon (BK), Pune, India 1 PG Student

More information

Adaptive Location Constraint Processing

Adaptive Location Constraint Processing Adative Location Constraint Processing Zhengdao Xu and Hans-Arno Jacobsen University of Toronto zhengdao@cs.toronto.edu, jacobsen@eecg.toronto.edu ABSTRACT An imortant roblem for many location-based alications

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information