IP-networked storage protocols such as NFS and iSCSI have become increasingly common in today's LAN environments. In this paper, we experimentally compare NFS and iSCSI perfo...
Peter Radkov, Li Yin, Pawan Goyal, Prasenjit Sarka...
File versioning is a useful technique for recording a history of changes. Applications of versioning include backups and disaster recovery, as well as monitoring intruders' a...
Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, An...
This paper explores the concept of early discard for interactive search of unindexed data. Processing data inside storage devices using downloaded searchlet code enables Diamond t...
Larry Huston, Rahul Sukthankar, Rajiv Wickremesing...
We describe a technique called lookaside caching that combines the strengths of distributed file systems and portable storage devices, while negating their weaknesses. In spite of...
Niraj Tolia, Jan Harkes, Michael Kozuch, Mahadev S...
CLOCK is a classical cache replacement policy dating back to 1968 that was proposed as a low-complexity approximation to LRU. On every cache hit, the policy LRU needs to move the a...
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
MEMS-based storage devices (MEMStores) are significantly different from both disk drives and semiconductor memories. The differences motivate the queswhether they need new abstrac...
In benchmarking I/O systems, it is important to generate, accurately, the I/O access pattern that one is intending to generate. However, timing accuracy ( issuing I/Os at the desi...
Eric Anderson, Mahesh Kallahalla, Mustafa Uysal, R...