An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop.All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that can be obtained non-intrusiv...
In this thesis, some new approaches for identifying which real-time multimedia applications are runn...
outstanding paper awardInternational audienceIn this paper, we propose a pattern matching approach f...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
An understanding of application I/O access patterns is useful in several situations. First, gaining ...
An understanding of Input/Output data access patterns of applications is useful in several situation...
Competing workloads on a shared storage system cause I/O resource contention and application perform...
Storage system traces are rich in information as it contains real-world behavior. Replaying already ...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understandin...
Abstract. Efficient execution of parallel scientific applications requires high-performance storage ...
As the reliance on computer systems increases, so does complexity of the system and the data size. ...
The past two decades in file system design have been driven by the sequence of trace-based file syst...
HPC applications with suboptimal I/O behavior interfere with well-behaving applications and lead to...
In order to avoid detection, malware can disguise itself as a legitimate program or hijack system pr...
Traffic traces are important for many kinds of network research. For reasons of confidentiality, how...
In this thesis, some new approaches for identifying which real-time multimedia applications are runn...
outstanding paper awardInternational audienceIn this paper, we propose a pattern matching approach f...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...
An understanding of application I/O access patterns is useful in several situations. First, gaining ...
An understanding of Input/Output data access patterns of applications is useful in several situation...
Competing workloads on a shared storage system cause I/O resource contention and application perform...
Storage system traces are rich in information as it contains real-world behavior. Replaying already ...
In this paper, we describe the collection and analysis of file system traces from a variety of diffe...
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understandin...
Abstract. Efficient execution of parallel scientific applications requires high-performance storage ...
As the reliance on computer systems increases, so does complexity of the system and the data size. ...
The past two decades in file system design have been driven by the sequence of trace-based file syst...
HPC applications with suboptimal I/O behavior interfere with well-behaving applications and lead to...
In order to avoid detection, malware can disguise itself as a legitimate program or hijack system pr...
Traffic traces are important for many kinds of network research. For reasons of confidentiality, how...
In this thesis, some new approaches for identifying which real-time multimedia applications are runn...
outstanding paper awardInternational audienceIn this paper, we propose a pattern matching approach f...
ABSTRACT: Tracing allows the analysis of task interactions with each other and with the operating sy...