We describe a novel on-line file access predictor, Recent Popularity, capable of rapid adaptation to workload changes while simultaneously predicting more events with greater accuracy than prior efforts. We distinguish the goal of predicting the most events accurately from the goal of offering the most accurate predictions (when declining to offer a prediction is acceptable). For this purpose we present two distinct measures of accuracy, general and specific accuracy, corresponding to these goals. We describe how our new predictor and an earlier effort, Noah, can trade the number of events predicted for prediction accuracy by modifying simple parameters. When prediction accuracy is strictly more important than the number of predictions offe...
Network File System (NFS, de facto in Linux) or Common Internet File System (CIFS, de facto in Windo...
Recent increases in CPU performance have outpaced increases in hard drive performance. As a result, ...
We have previously shown that the patterns in which files are accessed offer information that can ac...
We describe a novel on-line file access predictor, Recent Popularity, capable of rapid adaptation to...
Abstract—Nearly all extant file access predictors attempt to identify the immediate successor to the...
Existing file access predictors keep track of previous file access patterns and rely on a single heu...
Abstract—Most existing studies of file access prediction are experimental in nature and rely on trac...
Prediction is a powerful tool for performance and usability. It can reduce access latency for I/O sy...
File prefetching based on previous file access patterns has been shown to be an effective means of r...
Abstract With the rapid incr system latency is an everaccess costs, which has modern operating syste...
Most modern I/O systems treat each file access independently. However, events in a computer system a...
Multiple experts, each predicting a potential file successor, improve accuracy of file access predic...
We introduce AccessRank, an algorithm that predicts revisita-tions and reuse in many contexts, such ...
We have adapted a multi-order context modeling technique used in the data compression method Predict...
An algorithm is proposed for the purpose of optimizing the availability of files to an operating sys...
Network File System (NFS, de facto in Linux) or Common Internet File System (CIFS, de facto in Windo...
Recent increases in CPU performance have outpaced increases in hard drive performance. As a result, ...
We have previously shown that the patterns in which files are accessed offer information that can ac...
We describe a novel on-line file access predictor, Recent Popularity, capable of rapid adaptation to...
Abstract—Nearly all extant file access predictors attempt to identify the immediate successor to the...
Existing file access predictors keep track of previous file access patterns and rely on a single heu...
Abstract—Most existing studies of file access prediction are experimental in nature and rely on trac...
Prediction is a powerful tool for performance and usability. It can reduce access latency for I/O sy...
File prefetching based on previous file access patterns has been shown to be an effective means of r...
Abstract With the rapid incr system latency is an everaccess costs, which has modern operating syste...
Most modern I/O systems treat each file access independently. However, events in a computer system a...
Multiple experts, each predicting a potential file successor, improve accuracy of file access predic...
We introduce AccessRank, an algorithm that predicts revisita-tions and reuse in many contexts, such ...
We have adapted a multi-order context modeling technique used in the data compression method Predict...
An algorithm is proposed for the purpose of optimizing the availability of files to an operating sys...
Network File System (NFS, de facto in Linux) or Common Internet File System (CIFS, de facto in Windo...
Recent increases in CPU performance have outpaced increases in hard drive performance. As a result, ...
We have previously shown that the patterns in which files are accessed offer information that can ac...