TRACON: Interference-aware scheduling for data-intensive applications in virtualized environments
Large-scale data centers leverage virtualization technology to achieve excellent resource
utilization, scalability, and high availability. Ideally, the performance of an application …
utilization, scalability, and high availability. Ideally, the performance of an application …
Big data machine learning and graph analytics: Current state and future challenges
Big data machine learning and graph analytics have been widely used in industry,
academia and government. Continuous advance in this area is critical to business success …
academia and government. Continuous advance in this area is critical to business success …
Performance characterization of nvme flash devices with zoned namespaces (zns)
The recent emergence of NVMe flash devices with Zoned Namespace support, ZNS SSDs,
represents a significant new advancement in flash storage. ZNS SSDs introduce a new …
represents a significant new advancement in flash storage. ZNS SSDs introduce a new …
Expectation grammars: Leveraging high-level expectations for activity recognition
Video-based recognition and prediction of a temporally extended activity can benefit from a
detailed description of high-level expectations about the activity. Stochastic grammars allow …
detailed description of high-level expectations about the activity. Stochastic grammars allow …
Performance modeling and practical use cases for black-box ssds
Modern servers are actively deploying Solid-State Drives (SSDs) thanks to their high
throughput and low latency. However, current server architects cannot achieve the full …
throughput and low latency. However, current server architects cannot achieve the full …
Investigating machine learning algorithms for modeling ssd i/o performance for container-based virtualization
One of the cornerstones of the cloud provider business is to reduce hardware resources cost
by maximizing their utilization. This is done through smartly sharing processor, memory …
by maximizing their utilization. This is done through smartly sharing processor, memory …
Understanding (un) written contracts of nvme zns devices with zns-tools
N Tehrany, K Doekemeijer, A Trivedi - ar**_Techniques_and_Anti-Forensics_Methods/links/5c4aa3cd458515a4c73ea3f7/Wi**-Techniques-and-Anti-Forensics-Methods.pdf" data-clk="hl=el&sa=T&oi=gga&ct=gga&cd=8&d=14467122195085026848&ei=_8uwZ_zuFIqy6rQPl5KnWA" data-clk-atid="IGY2gPyKxcgJ" target="_blank">[PDF] researchgate.net
Wi** techniques and anti-forensics methods
This paper presents a theoretical background of main research activity focused on the
evaluation of wi**/erasure standards which are mostly implemented in specific software …
evaluation of wi**/erasure standards which are mostly implemented in specific software …
{PEARL}: Plausibly Deniable Flash Translation Layer using {WOM} coding
When adversaries are powerful enough to coerce users to reveal encryption keys,
encryption alone becomes insufficient for data protection. Plausible deniability (PD) …
encryption alone becomes insufficient for data protection. Plausible deniability (PD) …