One of the most important problems in improving file system performance is to design effective block replacement schemes for the buffer cache. Recently, replacement schemes making use of regularities of references such as sequential and looping references were proposed and shown to be more effective than purely recency or frequency based schemes such as LRU. However, these schemes classify access patterns at the granularity of an application or a file, and thus cannot discern multiple access patterns within the same file and have to redetect the same access patterns that appear in multiple files. In this paper, we propose a Program Counter based Classification (PCC) technique that reduces the overhead and improves the accuracy of the classi...
A new buffer replacement scheme, called DEAR (DEtection-based Adaptive Replacement), is presented fo...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Pattern matching is a key building block of Intrusion Detection Systems and firewalls, which are dep...
As buffer cache is used to overcome the speed gap between processor and storage devices, performance...
Program-counter-based (PC-based) prediction techniques have been shown to be highly effective and ar...
Abstract:- Changes in cache size or architecture are the methods used to improve the cache performan...
While many block replacement algorithms for buffer caches have been proposed to address the well-kno...
To overcome the speed gap between processors and disks, many computer systems utilize buffer cache l...
In traditional file system implementations, the Least Recently Used (LRU) block replacement scheme i...
In traditional file system implementations, the Least Recently Used (LRU) block replacement scheme i...
In the past, instruction fetch speeds have been improved by using cache schemes that capture the act...
Part 6: Poster SessionsInternational audienceThis paper presents a new access-density-based prefetch...
Two contributions are made in this paper. First, we show that system level characterization of file ...
Out-of-order engines are the basis for nearly every high performance general purpose processor today...
Recent research has shown that near optimal performance can be achieved by utilizing userlevel hints...
A new buffer replacement scheme, called DEAR (DEtection-based Adaptive Replacement), is presented fo...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Pattern matching is a key building block of Intrusion Detection Systems and firewalls, which are dep...
As buffer cache is used to overcome the speed gap between processor and storage devices, performance...
Program-counter-based (PC-based) prediction techniques have been shown to be highly effective and ar...
Abstract:- Changes in cache size or architecture are the methods used to improve the cache performan...
While many block replacement algorithms for buffer caches have been proposed to address the well-kno...
To overcome the speed gap between processors and disks, many computer systems utilize buffer cache l...
In traditional file system implementations, the Least Recently Used (LRU) block replacement scheme i...
In traditional file system implementations, the Least Recently Used (LRU) block replacement scheme i...
In the past, instruction fetch speeds have been improved by using cache schemes that capture the act...
Part 6: Poster SessionsInternational audienceThis paper presents a new access-density-based prefetch...
Two contributions are made in this paper. First, we show that system level characterization of file ...
Out-of-order engines are the basis for nearly every high performance general purpose processor today...
Recent research has shown that near optimal performance can be achieved by utilizing userlevel hints...
A new buffer replacement scheme, called DEAR (DEtection-based Adaptive Replacement), is presented fo...
The full text of this article is not available on SOAR. WSU users can access the article via IEEE Xp...
Pattern matching is a key building block of Intrusion Detection Systems and firewalls, which are dep...