A performance isolation analysis of disk-intensive workloads on container-based clouds

MG Xavier, IC De Oliveira, FD Rossi… - 2015 23rd Euromicro …, 2015 - ieeexplore.ieee.org
The popularity of Cloud computing due to the increasing number of customers has led Cloud
providers to adopt resource-sharing solutions to meet growing demand for infrastructure …

Uncovering access, reuse, and sharing characteristics of {I/O-Intensive} files on {Large-Scale} production {HPC} systems

T Patel, S Byna, GK Lockwood, NJ Wright… - … USENIX Conference on …, 2020 - usenix.org
Large-scale high-performance computing (HPC) applications running on supercomputers
produce large amounts of data routinely and store it in files on multi-PB shared parallel …

PANORAMA: An approach to performance modeling and diagnosis of extreme-scale workflows

E Deelman, C Carothers, A Mandal… - … Journal of High …, 2017 - journals.sagepub.com
Computational science is well established as the third pillar of scientific discovery and is on
par with experimentation and theory. However, as we move closer toward the ability to …

Performance analysis of an I/O-intensive workflow executing on google cloud and amazon web services

H Nawaz, G Juve, RF Da Silva… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Scientific workflows have become the mainstream to conduct large-scale scientific research.
In the meantime, cloud computing has emerged as an alternative computing paradigm. In …

Wrangling distributed computing for high-throughput environmental science: An introduction to HTCondor

RA Erickson, MN Fienen, SG McCalla… - PLoS computational …, 2018 - journals.plos.org
Biologists and environmental scientists now routinely solve computational problems that
were unimaginable a generation ago. Examples include processing geospatial data …

Efficient hybrid central processing unit/input–output resource scheduling for virtual machines

D Wang, W Zhang, H He… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The use of virtualization technology in industrial control is increasing. However, virtual
instances or virtual machines (VMs) are confronted with the unreasonable resource …

Automatic extraction of secrets from malware

Z Zhao, GJ Ahn, H Hu - 2011 18th Working Conference on …, 2011 - ieeexplore.ieee.org
As promising results have been obtained in defeating code obfuscation techniques,
malware authors have adopted protection approaches to hide malware-related data from …

Achieving performance isolation on multi-tenant networked clouds using advanced block storage mechanisms

P Ruth, A Mandal, C Castillo, R Fowler… - Proceedings of the 6th …, 2015 - dl.acm.org
Multi-tenant cloud infrastructures are increasingly used for high-performance and high-
throughput domain science applications. Various cloud platforms, such as OpenStack and …

Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service

Y **n, I Baldin, C Heermann… - 2014 26th …, 2014 - ieeexplore.ieee.org
In this paper, we study the problem of provisioning large-scale virtual clusters over federated
clouds connected by multi-domain, layer-2 wide area networks. We first present the virtual …

[PDF][PDF] The Institute for Sustained Performance, Energy, and Resilience, University of North Carolina, Final Technical Report

R Fowler - 2018 - osti.gov
This is the final report for the UNC component of the SciDAD Institute for Sustained
Performance, Energy, and Resilience. In this report, we describe activities on the SUPER …