Sciweavers

FAST
2003
14 years 28 days ago
Passive NFS Tracing of Email and Research Workloads
We present an analysis of a pair of NFS traces of contemporary email and research workloads. We show that although the research workload resembles previouslystudied workloads, the...
Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo...
FAST
2003
14 years 28 days ago
Design and Implementation of Semi-preemptible IO
Allowing higher-priority requests to preempt ongoing disk IOs is of particular benefit to delay-sensitive multimedia and real-time systems. In this paper we propose Semi-preempti...
Zoran Dimitrijevic, Raju Rangaswami, Edward Y. Cha...
FAST
2003
14 years 28 days ago
More Than an Interface - SCSI vs. ATA
This paper sets out to clear up a misconception prominent in the storage community today, that SCSI disc drives and IDE (ATA) disc drives are the same technology internally, and d...
Dave Anderson, Jim Dykes, Erik Riedel
FAST
2003
14 years 28 days ago
Modeling Hard-Disk Power Consumption
Excessive power consumption is a major barrier to the market acceptance of hard disks in mobile electronic devices. Studying and reducing power consumption, however, often involve...
John Zedlewski, Sumeet Sobti, Nitin Garg, Fengzhou...
FAST
2003
14 years 28 days ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...
LISA
2004
14 years 28 days ago
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
Spyware is a rapidly spreading problem for PC users causing significant impact on system stability and privacy concerns. It attaches to extensibility points in the system to ensur...
Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron...
LISA
2004
14 years 28 days ago
autoMAC: A Tool for Automating Network Moves, Adds, and Changes
It is often difficult and time-consuming to manage computer `moves, adds, and changes' that take place in a switched, subnetted environment. It is even more difficult when th...
Christopher J. Tengi, James M. Roberts, Joseph R. ...
LISA
2004
14 years 28 days ago
Experience in Implementing an HTTP Service Closure
One ideal of configuration management is to specify only desired behavior in a high-level language, while an automatic configuration management system assures that behavior on an ...
Steven Schwartzberg, Alva L. Couch
LISA
2004
14 years 28 days ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard
LISA
2004
14 years 28 days ago
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and r...
Daniel Price, Andrew Tucker