An understanding of Input/Output data access patterns of applications is useful in several situations. First, gaining an insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps to create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop. All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that ca...
Traffic traces are important for many kinds of network research. For reasons of confidentiality, how...
The process of obtaining useful message passing applications tracefiles for performance analysis in ...
File system studies are critical to the accurate configuration, design, and continued evolution of s...
An understanding of application I/O access patterns is useful in several situations. First, gaining ...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understandin...
Storage system traces are rich in information as it contains real-world behavior. Replaying already ...
Competing workloads on a shared storage system cause I/O resource contention and application perform...
As the reliance on computer systems increases, so does complexity of the system and the data size. ...
Dataset generated for the "On server-side file access pattern matching" paper (Boito et al., HPCS 20...
Understanding a large execution trace is not easy task due to the size and complexity of typical tra...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
HPC applications with suboptimal I/O behavior interfere with well-behaving applications and lead to...
The past two decades in file system design have been driven by the sequence of trace-based file syst...
International audienceStorage systems are getting complex to handle HPC and Big Data requirements. T...
Traffic traces are important for many kinds of network research. For reasons of confidentiality, how...
The process of obtaining useful message passing applications tracefiles for performance analysis in ...
File system studies are critical to the accurate configuration, design, and continued evolution of s...
An understanding of application I/O access patterns is useful in several situations. First, gaining ...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understandin...
Storage system traces are rich in information as it contains real-world behavior. Replaying already ...
Competing workloads on a shared storage system cause I/O resource contention and application perform...
As the reliance on computer systems increases, so does complexity of the system and the data size. ...
Dataset generated for the "On server-side file access pattern matching" paper (Boito et al., HPCS 20...
Understanding a large execution trace is not easy task due to the size and complexity of typical tra...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
HPC applications with suboptimal I/O behavior interfere with well-behaving applications and lead to...
The past two decades in file system design have been driven by the sequence of trace-based file syst...
International audienceStorage systems are getting complex to handle HPC and Big Data requirements. T...
Traffic traces are important for many kinds of network research. For reasons of confidentiality, how...
The process of obtaining useful message passing applications tracefiles for performance analysis in ...
File system studies are critical to the accurate configuration, design, and continued evolution of s...