2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422)
DOI: 10.1109/ispass.2000.842297
|View full text |Cite
|
Sign up to set email alerts
|

A new approach in the analysis and modeling of disk access patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…• Self-similarity in access patterns [303,292,293,396]. A possible model for file access patterns is based on a hidden Markov model (HMM) [556].…”
Section: File System Access Patternsmentioning
confidence: 99%
“…• Self-similarity in access patterns [303,292,293,396]. A possible model for file access patterns is based on a hidden Markov model (HMM) [556].…”
Section: File System Access Patternsmentioning
confidence: 99%
“…The literature describes and evaluates many techniques for generating synthetic block-level I/O workloads [11,12,13,15,16,24,25], file-level workloads [1,6,14,22], and application-level I/Os workloads [18]. File-and application-level synthesis techniques are important because they can be used to produce block-level workloads.…”
Section: Related Workmentioning
confidence: 99%
“…Jump distance within state calculates the jump distance between the beginning of the current request, and the end of the most recent request corresponding to the same state as the current request. For example, consider the following sequence of locations: 10,11,12,20,21,13,22,14,23,24,15. Assume each request size is 1 unit, and define states [10,19] and [20,29].…”
Section: Attributes and Attribute-valuesmentioning
confidence: 99%
See 1 more Smart Citation
“…The Distiller is unique because, instead of attempting to preserve a set of attributes chosen a priori, it searches through a set of previously developed and studied attributes and generation techniques (e.g., [4,5,6,7,8,13,14,16]) then chooses those attributes that are most appropriate for the target workload and storage system under test. These existing techniques serve as the Distiller's library.…”
Section: Related Workmentioning
confidence: 99%