1,862 research outputs found
Real-time disk scheduling in a mixed-media file system
This paper presents our real-time disk scheduler called the Delta L scheduler, which optimizes unscheduled best-effort disk requests by giving priority to best-effort disk requests while meeting real-time request deadlines. Our scheduler tries to execute real-time disk requests as much as possible in the background. Only when real-time request deadlines are endangered, our scheduler gives priority to real-time disk requests. The Delta L disk scheduler is part of our mixed-media file system called Clockwise. An essential part of our work is extensive and detailed raw disk performance measurements. The Delta L disk scheduler for its real-time schedulability analysis and to decide whether scheduling a best-effort request before a real-time request violates real-time constraints uses these raw performance measurements. Further, a Clockwise off-line simulator uses the raw performance measurements where a number of different disk schedulers are compared. We compare the Delta L scheduler with a prioritizing Latest Start Time (LST) scheduler and non-prioritizing EDF scheduler. The Delta L scheduler is comparable to LST in achieving low latencies for best-effort requests under light to moderate real-time loads and better in achieving low latencies for best-effort requests for extreme real-time loads. The simulator is calibrated to an actual Clockwise. Clockwise runs on a 200MHz Pentium-Pro based PC with PCI bus, multiple SCSI controllers and disks on Linux 2.2.x and the Nemesis kernel. Clockwise performance is dictated by the hardware: all available bandwidth can be committed to real-time streams, provided hardware overloads do not occur
Fast solution of Cahn-Hilliard variational inequalities using implicit time discretization and finite elements
We consider the e�cient solution of the Cahn-Hilliard variational inequality using an implicit time discretization, which is formulated as an optimal control problem with pointwise constraints on the control. By applying a semi-smooth Newton method combined with a Moreau-Yosida regularization technique for handling the control constraints we show superlinear convergence in function space. At the heart of this method lies the solution of large and sparse linear systems for which we propose the use of preconditioned Krylov subspace solvers using an e�ective Schur complement approximation. Numerical results illustrate the competitiveness of this approach
Looking at a digital research data archive - Visual interfaces to EASY
In this paper we explore visually the structure of the collection of a
digital research data archive in terms of metadata for deposited datasets. We
look into the distribution of datasets over different scientific fields; the
role of main depositors (persons and institutions) in different fields, and
main access choices for the deposited datasets. We argue that visual analytics
of metadata of collections can be used in multiple ways: to inform the archive
about structure and growth of its collection; to foster collections strategies;
and to check metadata consistency. We combine visual analytics and visual
enhanced browsing introducing a set of web-based, interactive visual interfaces
to the archive's collection. We discuss how text based search combined with
visual enhanced browsing enhances data access, navigation, and reuse.Comment: Submitted to the TPDL 201
Clockwise: a mixed-media file system
This paper presents Clockwise, a mixed-media file system. The primary goal of Clockwise is to provide a storage architecture that supports the storage and retrieval of best-effort and real-time file system data. Clockwise provides an abstraction called a dynamic partition that groups lists of related (large) blocks on one or more disks. Dynamic partitions can grow and shrink in size and reading or writing of dynamic partitions can be scheduled explicitly. With respect to scheduling, Clockwise uses a novel strategy to pre-calculate schedule slack time and it schedules best-effort requests before queued real-time requests in this slack tim
Are we reasoning about cloud application vulnerabilities in the right way?
Abstract: Enterprises are quickly transitioning to container orchestrators, like Kubernetes, which helps developers and engineers manage a large number of container images, pods, and nodes. However, this new approach does not solve the problem of software vulnerabilities but arguably it makes vulnerability management harder. Most of the time, companies have to deal with thousands of containers in a dynamic environment since they can fail, and be rescheduled in other nodes. All these factors have a great impact on the vulnerability management system because the vulnerabilities and misconfigurations in the system are too many to be manually operated, so we seek a tool to highlight the most dangerous (we need a clear definition of dangerous) to prioritize them. This paper wants to emphasize the need for a vulnerability prioritization method and a defense technique improvement
- …