Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 11, Issue 4November 2015Special Issue USENIX FAST 2015
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:1553-3077
EISSN:1553-3093
Reflects downloads up to 03 Oct 2024Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue USENIX FAST 2015
editorial
Free
Introduction to the Special Issue on USENIX FAST 2015
Article No.: 15, Page 1https://doi.org/10.1145/2825000
research-article
Skylight—A Window on Shingled Disk Operation
Article No.: 16, Pages 1–28https://doi.org/10.1145/2821511

We introduce Skylight, a novel methodology that combines software and hardware techniques to reverse engineer key properties of drive-managed Shingled Magnetic Recording (SMR) drives. The software part of Skylight measures the latency of controlled I/O ...

research-article
RAIDShield: Characterizing, Monitoring, and Proactively Protecting Against Disk Failures
Article No.: 17, Pages 1–28https://doi.org/10.1145/2820615

Modern storage systems orchestrate a group of disks to achieve their performance and reliability goals. Even though such systems are designed to withstand the failure of individual disks, failure of multiple disks poses a unique set of challenges. We ...

research-article
Free
BetrFS: Write-Optimization in a Kernel File System
Article No.: 18, Pages 1–29https://doi.org/10.1145/2798729

The Bε-tree File System, or BetrFS (pronounced “better eff ess”), is the first in-kernel file system to use a write-optimized data structure (WODS). WODS are promising building blocks for storage systems because they support both microwrites and large ...

research-article
Shuffle Index: Efficient and Private Access to Outsourced Data
Article No.: 19, Pages 1–55https://doi.org/10.1145/2747878

Data outsourcing and cloud computing have been emerging at an ever-growing rate as successful approaches for allowing users and companies to rely on external services for storing and managing data. As data and access to them are not under the control of ...

Subjects

Comments