Sciweavers

2746 search results - page 79 / 550
» Application performance on the Direct Access File System
Sort
View
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 7 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
LCR
2000
Springer
172views System Software» more  LCR 2000»
13 years 11 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler
MM
2010
ACM
121views Multimedia» more  MM 2010»
13 years 8 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
SIGCOMM
1996
ACM
14 years 2 days ago
ASHs: Application-Specific Handlers for High-Performance Messaging
Application-specific safe message handlers (ASHs) are designed to provide applications with hardware-level network performance. ASHs are user-written code fragments that safely an...
Deborah A. Wallach, Dawson R. Engler, M. Frans Kaa...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 8 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin