TRACON: Interference-aware scheduling for data-intensive applications in virtualized environments

RC Chiang, HH Huang - … of 2011 International Conference for High …, 2011 - dl.acm.org
Large-scale data centers leverage virtualization technology to achieve excellent resource
utilization, scalability, and high availability. Ideally, the performance of an application …

Big data machine learning and graph analytics: Current state and future challenges

HH Huang, H Liu - 2014 IEEE international conference on big …, 2014 - ieeexplore.ieee.org
Big data machine learning and graph analytics have been widely used in industry,
academia and government. Continuous advance in this area is critical to business success …

Performance characterization of nvme flash devices with zoned namespaces (zns)

K Doekemeijer, N Tehrany… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
The recent emergence of NVMe flash devices with Zoned Namespace support, ZNS SSDs,
represents a significant new advancement in flash storage. ZNS SSDs introduce a new …

Expectation grammars: Leveraging high-level expectations for activity recognition

D Minnen, I Essa, T Starner - 2003 IEEE Computer Society …, 2003 - ieeexplore.ieee.org
Video-based recognition and prediction of a temporally extended activity can benefit from a
detailed description of high-level expectations about the activity. Stochastic grammars allow …

Performance modeling and practical use cases for black-box ssds

J Kim, K Choi, W Lee, J Kim - ACM Transactions on Storage (TOS), 2021 - dl.acm.org
Modern servers are actively deploying Solid-State Drives (SSDs) thanks to their high
throughput and low latency. However, current server architects cannot achieve the full …

Investigating machine learning algorithms for modeling ssd i/o performance for container-based virtualization

JE Dartois, J Boukhobza, A Knefati… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
One of the cornerstones of the cloud provider business is to reduce hardware resources cost
by maximizing their utilization. This is done through smartly sharing processor, memory …

Understanding (un) written contracts of nvme zns devices with zns-tools

N Tehrany, K Doekemeijer, A Trivedi - ar**_Techniques_and_Anti-Forensics_Methods/links/5c4aa3cd458515a4c73ea3f7/Wi**-Techniques-and-Anti-Forensics-Methods.pdf" data-clk="hl=el&sa=T&oi=gga&ct=gga&cd=8&d=14467122195085026848&ei=_8uwZ_zuFIqy6rQPl5KnWA" data-clk-atid="IGY2gPyKxcgJ" target="_blank">[PDF] researchgate.net

Wi** techniques and anti-forensics methods

M Ölvecký, D Gabriška - 2018 IEEE 16th international …, 2018 - ieeexplore.ieee.org
This paper presents a theoretical background of main research activity focused on the
evaluation of wi**/erasure standards which are mostly implemented in specific software …

{PEARL}: Plausibly Deniable Flash Translation Layer using {WOM} coding

C Chen, A Chakraborti, R Sion - 30th USENIX Security Symposium …, 2021 - usenix.org
When adversaries are powerful enough to coerce users to reveal encryption keys,
encryption alone becomes insufficient for data protection. Plausible deniability (PD) …