the proceedings contain 18 papers. the topics discussed include: is low similarity threshold a bad idea in delta compression?;dictionary based cache line compression;shadow filesystems: recovering from filesystem runt...
ISBN:
(纸本)9798400706301
the proceedings contain 18 papers. the topics discussed include: is low similarity threshold a bad idea in delta compression?;dictionary based cache line compression;shadow filesystems: recovering from filesystem runtime errors via robust alternative execution;rethinking erasure-coding libraries in the age of optimized machine learning;secure archival is hard... really hard;can storage devices be power adaptive?;a selective preprocessing offloading framework for reducing data traffic in DL training;quantitative analysis of storage requirement for autonomous vehicles;life-after-death: exploring thermal annealing conditions to enhance 3D NAND SSD endurance;and breaking barriers: expanding GPU memory with sub-two digit nanosecond latency CXL controller.
the proceedings contain 17 papers. the topics discussed include: neural cloud storage: innovative cloud storage solution for cold video;SAND: a storage abstraction for video-based deep learning;P2Cache: an application...
ISBN:
(纸本)9798400702242
the proceedings contain 17 papers. the topics discussed include: neural cloud storage: innovative cloud storage solution for cold video;SAND: a storage abstraction for video-based deep learning;P2Cache: an application-directed page cache for improving performance of data-intensive applications;when caching systems meet emerging storage devices: a case study;do we still need IO schedulers for low-latency disks?;deep note: can acoustic interference damage the availability of hard disk storage in underwater data centers?;energy implications of IO interface design choices;excessive SSD-internal parallelism considered harmful;hide-and-seek: hiding secrets in threshold voltage distributions of NAND flash memory cells;hide-and-seek: hiding secrets in threshold voltage distributions of NAND flash memory cells;and a free-space adaptive runtime zone-reset algorithm for enhanced ZNS efficiency.
the proceedings contain 19 papers. the topics discussed include: understanding configuration dependencies of filesystems;rethinking block storage encryption with virtual disks;infusing pub-sub storage with transactio...
ISBN:
(纸本)9781450393997
the proceedings contain 19 papers. the topics discussed include: understanding configuration dependencies of filesystems;rethinking block storage encryption with virtual disks;infusing pub-sub storage with transactions;when F2FS meets address remapping;cache-coherent accelerators for persistent memory crash consistency;a principled approach for selecting block I/O traces;when poll is more energy efficient than interrupt;generating realistic wear distributions for SSDs;wear leveling in SSDs considered harmful;what you can’t forget: exploiting parallelism for zoned namespaces;fair I/O scheduler for alleviating read/write interference by forced unit access in flash memory;compaction-aware zone allocation for LSM based key-value store on ZNS SSDs;and Alohomora: protecting files from ransomware attacks using fine-grained I/O whitelisting.
the proceedings contain 15 papers. the topics discussed include: how the common retention acceleration method of 3D NAND flash memory goes wrong?;isolating namespace and performance in key-value SSDs for multi-tenant ...
ISBN:
(纸本)9781450385503
the proceedings contain 15 papers. the topics discussed include: how the common retention acceleration method of 3D NAND flash memory goes wrong?;isolating namespace and performance in key-value SSDs for multi-tenant environments;automatic I/O stream management based on file characteristics;from blocks to rocks: a natural extension of zoned namespaces;from blocks to rocks: a natural extension of zoned namespaces;enabling near-data processing in distributed object storagesystems;CRDTs for truly concurrent filesystems;scalable but wasteful: current state of replication in the cloud;Libpubl: exploiting persistent user buffers as logs for write atomicity;and self-service data protection for stateful containers.
this study addresses the critical aspect of data storage requirements for Autonomous Vehicles (AVs). With AVs generating substantial amounts of data daily, understanding these requirements is vital for AV storage syst...
详细信息
ISBN:
(纸本)9798400706301
this study addresses the critical aspect of data storage requirements for Autonomous Vehicles (AVs). With AVs generating substantial amounts of data daily, understanding these requirements is vital for AV storagesystems design, enhancing vehicle safety, efficiency, and operational integrity. through a comprehensive analysis of onboard sensor and CAN bus data, alongside a novel mathematical model, this research offers insights into the storage needs, assesses system durability, and proposes a tailored storage solution and system architecture. the findings aim to guide the development of future AV storagesystems, emphasizing the importance of data-driven decision-making in AV technology advancements.
Deep learning (DL) training is data-intensive and often bottlenecked by fetching data from remote storage. Recognizing that many samples' sizes diminish during data preprocessing, we explore selectively offloading...
详细信息
ISBN:
(纸本)9798400706301
Deep learning (DL) training is data-intensive and often bottlenecked by fetching data from remote storage. Recognizing that many samples' sizes diminish during data preprocessing, we explore selectively offloading preprocessing to remote storage to mitigate data traffic. We conduct a case study to uncover the potential benefits and challenges of this approach. We then propose SOPHON, a framework that selectively offloads preprocessing tasks at a fine granularity in order to reduce data traffic, utilizing online profiling and adaptive algorithms to optimize for every sample in every training scenario. Our results show that SOPHON can reduce data traffic and training time by 1.2-2.2x over existing solutions.
Archival systems are often tasked with storing highly valuable data that may be targeted by malicious actors. When the lifetime of the secret data is on the order of decades to centuries, the threat of improved crypta...
详细信息
ISBN:
(纸本)9798400706301
Archival systems are often tasked with storing highly valuable data that may be targeted by malicious actors. When the lifetime of the secret data is on the order of decades to centuries, the threat of improved cryptanalysis casts doubt on the long-term security of cryptographic techniques, which rely on hardness assumptions that are hard to prove over archival time scales. this threat makes the design of secure archival systems exceptionally difficult. Some archival systems turn a blind eye to this issue, hoping that current cryptographic techniques will not be broken;others often use techniques-such as secret sharing-that are impractical at scale. this position paper sheds light on the core challenges behind building practically viable secure long-term archives;we identify promising research avenues towards this goal.
Power is becoming a scarce resource for data centers, raising the need for power adaptive system design-the ability to dynamically change power consumption-to match available power. storage makes up an increasing frac...
详细信息
ISBN:
(纸本)9798400706301
Power is becoming a scarce resource for data centers, raising the need for power adaptive system design-the ability to dynamically change power consumption-to match available power. storage makes up an increasing fraction of total data center power consumption. As such, it holds great potential to contribute to data center power adaptivity. To this end, we conduct a measurement study of power control mechanisms on a variety of modern data center storage devices. By changing device power states and shaping IO, we achieve a power dynamic range of up to 59.4% of the device's maximum operating power. We also study power control trade-offs, including throughput and latency. Based on our observations, we construct storage device power-throughput models and discuss the implications on power adaptive storage system design.
We present ContextPrefetcher, a host-guided high-performant prefetching framework for near-storage accelerators that prefetches data blocks from storage (e.g., NAND) to device-level RAM. Efficiently prefetching data b...
详细信息
ISBN:
(纸本)9798400706301
We present ContextPrefetcher, a host-guided high-performant prefetching framework for near-storage accelerators that prefetches data blocks from storage (e.g., NAND) to device-level RAM. Efficiently prefetching data blocks to device-level RAM reduces storage access costs and improves I/O performance. We introduce a novel abstraction, Cross-layered Context (CLC), a virtual entity that spans across the host and the device and is used for identifying, managing, and tracking active and inactive data such as files, objects (within object stores), or a range of blocks. To support efficient prefetching of actively used CLCs to device memory without incurring near-device resource (memory and compute) bottlenecks, ContextPrefetcher delegates prefetching management to the host, guiding near-device compute to prefetch blocks of active CLC. Finally, ContextPrefetcher facilitates the swift reclamation of blocks associated with inactive CLC. Preliminary evaluation against state-of-the-art near-storage accelerator designs demonstrates performance gains of up to 1.34x.
Block-layer caching systems improve the I/O performance by using hybrid storage devices;the advent of fast, byteaddressable storage enables caching systems to further leverage new storage tiers (e.g., with persistent ...
详细信息
ISBN:
(纸本)9798400702242
Block-layer caching systems improve the I/O performance by using hybrid storage devices;the advent of fast, byteaddressable storage enables caching systems to further leverage new storage tiers (e.g., with persistent memory as the cache device and SSD as the backend device) to achieve better caching performance. However, the new storage devices also challenge the design and implementation of existing block-based caching systems. this paper conducts a comprehensive performance study of a popular caching system, Open CAS, and identifies new, unrevealed software bottlenecks. Our observations and root cause analysis cast light on optimizing the software stack of caching systems to incorporate emerging storage technologies.
暂无评论