CLIC CLient-Informed Caching for Storage Servers
|
|
- Edwina Carter
- 6 years ago
- Views:
Transcription
1 CLIC CLient-Informed Caching for Storage Servers Xin Liu Ashraf Aboulnaga Ken Salem Xuhui Li David R. Cheriton School of Comuter Science University of Waterloo February 2009
2 Two-Tier Caching DBMS storage server
3 Two-Tier Caching DBMS 1. read() storage server
4 Two-Tier Caching DBMS 1. read() storage server 2. read()
5 Two-Tier Caching DBMS 1. read() storage server 2. read() 3. fetch
6 Two-Tier Caching DBMS 1. read() 4. fetch storage server 2. read() 3. fetch
7 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server 2. read() 3. fetch
8 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server oor temoral locality 2. read() 3. fetch
9 Two-Tier Caching DBMS 1. read() 4. fetch Problems: inclusion storage server oor temoral locality One Solution: hinting 2. read() 3. fetch
10 Examle: Write Hints DBMS write() storage server
11 Examle: Write Hints DBMS write() this is a relacement write storage server
12 Examle: Write Hints DBMS write() storage server this is a relacement write this is a good candidate for caching
13 Examle: Write Hints DBMS write() storage server this is a relacement write this is a good candidate for caching The storage server can use TQ, an ad hoc hint-aware relacement olicy, to exloit write hints.
14 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints?
15 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints? brittleness: correct resonse to hints?
16 Problems with Ad Hoc Hint-Aware Policies narrowness: new hints? multile hints? brittleness: correct resonse to hints? single source: multile hint generators? DBMS DBMS q this is a relacement write write() storage server q write(q) this is a relacement write q should I or q????
17 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s
18 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints
19 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities
20 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities benefits: handles multile hint tyes handles new hint tyes handles hints from multile clients by treating each client s hints as distinct
21 The CLIC Aroach a hint-aware caching olicy for 2nd-tier s no hard coded resonse to secific hints instead, learn which hints signal good caching oortunities benefits: handles multile hint tyes handles new hint tyes handles hints from multile clients by treating each client s hints as distinct CLIC Hints CLIC searates the generation of hints (done by the storage clients) from the interretation of those hints for caching uroses (done by the storage server).
22 CLIC Illustrated DBMS this is a blargh gor read read() storage server I don t know blargh or gor but revious blargh gor reads have been good candidates, so I will
23 Generating Hints Storage client must be modified to generate one or more tyes of hints. Storage clients attach a hint set to each read or write request. A hint set includes one hint of each tye generated by the client. A storage client may choose to generate any tyes of hints that might be of use to the storage server.
24 Generating Hints Storage client must be modified to generate one or more tyes of hints. Storage clients attach a hint set to each read or write request. A hint set includes one hint of each tye generated by the client. A storage client may choose to generate any tyes of hints that might be of use to the storage server. Examle: Hints from DB2 buffer ool ID object ID: identifies a grou of related DB objects object tye ID: distinguishes table from index request tye: read, relacement/recovery write DB2 buffer riority
25 A CLIC-Managed Cache highest riority Ha Hb each age is associated with the hint set which it was most-recently read or written Hc Hd He lowest riority
26 A CLIC-Managed Cache highest riority Ha Hb Hc each age is associated with the hint set which it was most-recently read or written each hint set has a riority Hd 6 He 8 lowest riority
27 A CLIC-Managed Cache highest riority Ha Hb Hc Hd each age is associated with the hint set which it was most-recently read or written each hint set has a riority CLIC evicts ages associated with the lowest-riority hint sets He 8 lowest riority
28 A CLIC-Managed Cache highest riority Ha 1 3 Hb 7 5 Hc 2 9 Hd 6 He 8 lowest riority 4 each age is associated with the hint set which it was most-recently read or written each hint set has a riority CLIC evicts ages associated with the lowest-riority hint sets CLIC chooses hint set riorities using a simle cost/benefit analysis
29 Cost/Benefit Analysis here?? time (,H) read or write request next request for
30 Cost/Benefit Analysis here?? time (,H) read or write request next request for is this a read request? there is a benefit to caching if the next request for is a read request
31 Cost/Benefit Analysis here?? time (,H) read or write request next request for is this a read request? there is a benefit to caching if the next request for is a read request the cost of obtaining this benefit is that must remain d until the read request
32 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching
33 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching instead CLIC estimates the cost and benefit of caching at (, H) based on revious requests with hint set H
34 Assigning Priorities to Hint Sets here?? time (,H) read or write request next request for is this a read request? when request (, H) occurs, CLIC cannot know the the cost and benefit of caching instead CLIC estimates the cost and benefit of caching at (, H) based on revious requests with hint set H CLIC assigns a riority to each hint set based on the cost and benefit of revious requests with hint set H Priority(H) = Read Hit Rate(H) Mean Time Until Read Hit(H)
35 DB2 Hint Analysis Examle STOCK table relacement writes ORDERLINE table reads
36 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set
37 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged
38 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged tracks read hit statistics only for frequently occurring hint sets
39 Efficient Hint Analysis To analyze the cost and benefit of hint sets, CLIC must track the most recent request and hint set for each age track the mean read hit rate and read hit distance for each hint set To reduce sace requirements, CLIC tracks the most recent request only for d ages and a fixed number of additional, und aged tracks read hit statistics only for frequently occurring hint sets We have also investigated the use of generalization to reduce the number of distinct hint sets.
40 Performance we have used trace-driven simulation of the storage server buffer to comare CLIC to other relacement olicies methodology 1. modify DB2 and MySQL to generate hints and roduce I/O traces 2. run TPC-C (on-line transaction rocessing) and TPC-H (decision suort) workloads on the database systems and collect I/O traces 3. feed the traces to a simulation of second-tier, which imlements CLIC, LRU, ARC, TQ and OPT 4. measure the hit ratio achieved by different olicies.
41 DB2 TPC-C - Medium DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_C300 0% 60k 120k 180k 240k 300k Server Cache Size (ages)
42 DB2 TPC-H - Medium DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_H400 0% 60k 120k 180k 240k 300k Server Cache Size (ages)
43 DB2 TPC-C - Small DB2 Buffer Cache 100% DB2_C60 Server Cache Read Hit Ratio 80% 60% 40% 20% OPT TQ LRU ARC CLIC 0% 60k 120k 180k 240k 300k Server Cache Size (ages)
44 DB2 TPC-C - Large DB2 Buffer Cache Server Cache Read Hit Ratio 100% 80% 60% 40% 20% OPT TQ LRU ARC CLIC DB2_C540 0% 60k 120k 180k 240k 300k Server Cache Size (ages)
45 Summary and Conclusions CLIC learns to identify I/O hints that signal good caching oortunities by tracking the request stream observed by the second-tier Because CLIC s resonses to secific hints are not redefined, it naturally accommodates new hint tyes and hints from multile storage clients. for our traces: CLIC s erformance usually dominates ARC s and LRU s, sometimes by a factor of 2 or more. CLIC dominates the ad hoc, hint-aware TQ algorithm CLIC s sace overhead can be ket low ( 1% of storage server size in our exeriments)
22. Swaping: Policies
22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to
More informationSecond-Tier Cache Management Using Write Hints
Second-Tier Cache Management Using Write Hints Xuhui Li University of Waterloo Aamer Sachedina IBM Toronto Lab Ashraf Aboulnaga University of Waterloo Shaobo Gao University of Waterloo Kenneth Salem University
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationMitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching
Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationJ. Parallel Distrib. Comput.
J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationAutonomic Physical Database Design - From Indexing to Multidimensional Clustering
Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More information10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1
10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1
More informationContinuous Visible k Nearest Neighbor Query on Moving Objects
Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,
More informationAUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH
AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),
More informationSource-to-Source Code Generation Based on Pattern Matching and Dynamic Programming
Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code
More informationUsing Standard AADL for COMPASS
Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric
More information10. Multiprocessor Scheduling (Advanced)
10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w
More informationPower Savings in Embedded Processors through Decode Filter Cache
Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425
More information12) United States Patent 10) Patent No.: US 6,321,328 B1
USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationReducing the Communication Costs of Graph Analysis by Read-only Replicas and Prioritized Execution
6 IEEE 8th International Conference on High Performance Comuting and Communications; IEEE th International Conference on Smart City; IEEE nd International Conference on Data Science and Systems Reducing
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More informationImplementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching
Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798
More informationInformation Flow Based Event Distribution Middleware
Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,
More informationUML for Global Computing Lecture 3: Property-Driven Development
Contents UML for Global Comuting Lecture 3: Proerty-Driven Develoment Martin Wirsing LMU München in cooeration with Hubert Baumeister Lecture : Introducing UML for Mobility Lecture 2: Refining Mobility
More informationα i k (βi k ) Request ratio of rank-k chunks (a specific chunk) at node v i g i k Size of set Ck S i Cache size of node v i
ing Hierarchical Caches in Content-Centric Networs Zixiao Jia,PengZhang,JiweiHuang,ChuangLin, and John C. S. Lui Tsinghua National Laboratory for Information Science and Technology Det. of Comuter Science
More informationSEARCH ENGINE MANAGEMENT
e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,
More informationThe Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*
The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationGDP: Using Dataflow Properties to Accurately Estimate Interference-Free Performance at Runtime
GDP: Using Dataflow Proerties to Accurately Estimate Interference-Free Performance at Runtime Magnus Jahre Deartment of Comuter Science Norwegian University of Science and Technology (NTNU) Email: magnus.jahre@ntnu.no
More informationDecoding-Workload-Aware Video Encoding
Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,
More information521493S Computer Graphics Exercise 3 (Chapters 6-8)
521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of
More informationImproved Image Super-Resolution by Support Vector Regression
Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationThe VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing
The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2
More informationAn Indexing Framework for Structured P2P Systems
An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University
More informationModel-Based Annotation of Online Handwritten Datasets
Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information
More informationExperiments on Patent Retrieval at NTCIR-4 Workshop
Working Notes of NTCIR-4, Tokyo, 2-4 June 2004 Exeriments on Patent Retrieval at NTCIR-4 Worksho Hironori Takeuchi Λ Naohiko Uramoto Λy Koichi Takeda Λ Λ Tokyo Research Laboratory, IBM Research y National
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More informationImproving Parallel-Disk Buffer Management using Randomized Writeback æ
Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University
More informationObject and Native Code Thread Mobility Among Heterogeneous Computers
Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052
More informationOptimizing Dynamic Memory Management!
Otimizing Dynamic Memory Management! 1 Goals of this Lecture! Hel you learn about:" Details of K&R hea mgr" Hea mgr otimizations related to Assignment #6" Faster free() via doubly-linked list, redundant
More informationBGP Path visibility issues.
BGP Path visibility issues Pierre.Francois@UCLouvain.be ToC ibgp draft-ietf-idr-add-aths Why doing Add-aths draft-ietf-idr-add-aths-guidelines (draft-uttaro-idr-add-aths-guidelines) Why only a small subset
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationTOPP Probing of Network Links with Large Independent Latencies
TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1
More informationA Reconfigurable Architecture for Quad MAC VLIW DSP
A Reconfigurable Architecture for Quad MAC VLIW DSP Sangwook Kim, Sungchul Yoon, Jaeseuk Oh, Sungho Kang Det. of Electrical & Electronic Engineering, Yonsei University 132 Shinchon-Dong, Seodaemoon-Gu,
More informationBuilding Better Nurse Scheduling Algorithms
Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham
More information15. Address Translation
15. Address Translation Oerating System: Three Easy Pieces AOS@UC 1 Memory Virtualizing with Efficiency and Control Memory virtualizing takes a similar strategy known as limited direct execution(lde) for
More informationTracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density
Tracing Multile Targets Using a Particle Filter Reresentation of the Joint Multitarget Probability Density Chris Kreucher, Keith Kastella, Alfred Hero This wor was suorted by United States Air Force contract
More informationProcess and Measurement System Capability Analysis
Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic
More informationSPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation
To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationModeling Reliable Broadcast of Data Buffer over Wireless Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationBlock Recycling Schemes and Their Cost-based Optimization in NAND Flash Memory Based Storage System
Block Recycling Schemes and Their Cost-based Otimization in NAND Flash Memory Based Storage System Jongmin Lee School of Comuter Science University of Seoul jmlee@uos.ac.kr Sunghoon Kim Center for the
More informationAnalytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol
Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationBasic Types and Arrays. Pointers. Records and Pointers. Record Definition. Creating a Record. Pointer. Basic Types. Arrays
Basic Tyes and Arrays ointers SE 6 Data Structures Lecture Basic Tyes integer, real (floating oint), boolean (0,), character Arrays A[099] : integer array A 0 6 7 99 A[] /9/0 ointers and Lists- Lecture
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationCrash Recovery CSC 375 Fall 2012 R&G - Chapter 18
Crash Recovery CSC 375 Fall 2012 R&G - Chater 18 If you are going to be in the logging business, one of the things that you have to o is to learn about heavy equiment. Robert VanNatta, Logging History
More informationROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture
ROSS: A Design of Read-Oriented STT-MRAM Storage for Energy-Efficient Non-Uniform Cache Architecture Jie Zhang, Miryeong Kwon, Changyoung Park, Myoungsoo Jung, Songkuk Kim Computer Architecture and Memory
More informationIEEE High Performance Serial Bus
IEEE 1394-1995 High Performance Serial Bus Michael D. Johas Teener Editor, P1394 Working Grou Plumbing Architect, Ale Comuter, Inc. One Infinite Loo, MS 35-OEM Cuertino, CA 95014 teener@ale.com Background
More informationSEMI-AUTOMATIC ROAD EXTRACTION FROM HIGH-RESOLUTION SATELLITE IMAGE
SEMI-AUOMAIC ROAD EXRACION FROM HIGH-RESOLUION SAELLIE IMAGE Commission III KEY WORDS: Road Extraction, High-Resolution Satellite Image, Urban area, Semi-automatic ABSRAC: In this research, a method is
More informationManaging Storage: Above the Hardware
Managing Storage: Above the Hardware 1 Where we are Last time: hardware HDDs and SSDs Today: how the DBMS uses the hardware to provide fast access to data 2 How DBMS manages storage "Bottom" two layers
More informationAN early generation of unstructured P2P systems is
1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,
More informationImplementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee
Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.
More informationCS 229 Final Project: Single Image Depth Estimation From Predicted Semantic Labels
CS 229 Final Project: Single Image Deth Estimation From Predicted Semantic Labels Beyang Liu beyangl@cs.stanford.edu Stehen Gould sgould@stanford.edu Prof. Dahne Koller koller@cs.stanford.edu December
More informationEvent Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking
Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking B.T.R.Naresh Reddy, Prasad Nagelli, K.Srinivasulu Reddy Abstract Vehicle detection lays an imortant role in
More informationA Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform
RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The
More informationThe Persistent Cache: Improving OID Indexing in Temporal Object-Oriented Database Systems
The Persistent Cache: Imroving ID Indexing in Temoral bject-riented Database Systems Kjetil Nørvåg Deartment of Comuter and Information Science Norwegian University of Science and Technology, Norway noervaag@idi.ntnu.no
More informationPage 1. Multilevel Memories (Improving performance using a little cash )
Page 1 Multilevel Memories (Improving performance using a little cash ) 1 Page 2 CPU-Memory Bottleneck CPU Memory Performance of high-speed computers is usually limited by memory bandwidth & latency Latency
More informationHyperbolic Caching: Flexible Caching for Web Applications
Hyperbolic Caching: Flexible Caching for Web Applications Aaron Blankstein Princeton University (now @ Blockstack Inc.) Siddhartha Sen Microsoft Research NY Michael J. Freedman Princeton University Modern
More informationConcaveCubes: Supporting Cluster-based Geographical Visualization in Large Data Scale
Eurograhics Conference on Visualization (EuroVis) 2018 J. Heer, H. Leitte, and T. Roinski (Guest Editors) Volume 37 (2018), Number 3 ConcaveCubes: Suorting Cluster-based Geograhical Visualization in Large
More informationElection Algorithms. has elected i. will eventually set elected i
Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server
More informationSwinburne Research Bank
Powered by TCPDF (www.tcdf.org) Swinburne Research Bank htt://researchbank.swinburne.edu.au Author: Li, Mingzhao; Choudhury, Farhana; Bao, Zhifeng; Samet, Hanan; Sellis, Timos Title: ConcaveCubes: Suorting
More informationPower Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks
Wireless Network, 2016, 8, 13-23 Published Online February 2016 in SciRes. htt://www.scir.org/journal/wsn htt://dx.doi.org/10.4236/wsn.2016.82002 Power Efficient Scheduled-Based Medium Access Control Protocol
More information20. Paging: Smaller Tables
20. Paging: Smaller Tables Oerating System: Three Easy Pieces AOS@UC 1 Paging: Linear Tables We usually have one age table for every rocess in the system. w Assume that 32-bit address sace with 4KB ages
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationSage Document Management Version 17.1
Sage Document Management Version 17.1 User's Guide This is a ublication of Sage Software, Inc. 2017 The Sage Grou lc or its licensors. All rights reserved. Sage, Sage logos, and Sage roduct and service
More informationhas been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE
This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with
More informationSTLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip
STLAC: A Spatial and Temporal Locality-Aware Cache and Networkon-Chip Codesign for Tiled Manycore Systems Mingyu Wang and Zhaolin Li Institute of Microelectronics, Tsinghua University, Beijing 100084,
More informationArchitecture description languages for programmable embedded systems
Architecture descrition languages for rogrammable embedded systems P. Mishra and N. Dutt Abstract: Embedded systems resent a tremendous oortunity to customise designs by exloiting the alication behaviour.
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationComplexity analysis of matrix product on multicore architectures
Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationTo appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree
To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and
More informationUsing Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment
More informationFast Shape-based Road Sign Detection for a Driver Assistance System
Fast Shae-based Road Sign Detection for a Driver Assistance System Gareth Loy Comuter Vision and Active Percetion Laboratory Royal Institute of Technology (KTH) Stockholm, Sweden Email: gareth@nada.kth.se
More informationCardS4: Modal Theorem Proving on Java Smartcards
CardS4: Modal Theorem Proving on Java Smartcards Rajeev Prabhakar Goré and Phuong Thê Nguyên Abstract We describe a successful imlementation of a theorem rover for modal logic S4 that runs on a Java smart
More informationConsistently Estimating the Selectivity of Conjuncts of Predicates
Consistently Estimating the Selectivity of Conjuncts of Predicates V. Markl 1 N. Megiddo 1 M. Kutsch T.M. Tran P. Haas 1 U. Srivastava 4 1 IBM Almaden Research Center IBM Germany IBM Silicon Valley Lab
More informationExplore or Exploit? Effective Strategies for Disambiguating Large Databases
Exlore or Exloit? Effective Strategies for Disambiguating Large Databases Reynold Cheng Eric Lo Xuan S. Yang Ming-Hay Luk Xiang Li Xike Xie University of Hong Kong, Pokfulam Road, Hong Kong Hong Kong Polytechnic
More informationA Robust Implicit Access Protocol for Real-Time Wireless Collaboration
A Robust Imlicit Access Protocol for Real-Time Wireless Collaboration Tanya L. Crenshaw, Ajay Tirumala, Sencer Hoke, Marco Caccamo Deartment of Comuter Science University of Illinois Urbana, IL 61801 {tcrensha,
More informationA Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks
A Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks Jinho Seol, Hyotaek Shim, Jaegeuk Kim, and Seungryoul Maeng Division of Computer Science School of Electrical Engineering
More informationCache Controller with Enhanced Features using Verilog HDL
Cache Controller with Enhanced Features using Verilog HDL Prof. V. B. Baru 1, Sweety Pinjani 2 Assistant Professor, Dept. of ECE, Sinhgad College of Engineering, Vadgaon (BK), Pune, India 1 PG Student
More informationAdaptive Location Constraint Processing
Adative Location Constraint Processing Zhengdao Xu and Hans-Arno Jacobsen University of Toronto zhengdao@cs.toronto.edu, jacobsen@eecg.toronto.edu ABSTRACT An imortant roblem for many location-based alications
More informationIdentity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects
Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu
More information