No abstract available.
Proceeding Downloads

To move or not to move?: page migration for irregular applications in over-subscribed GPU memory systems with DynaMap
This paper focuses on the severe page thrashing problem that can arise when running large irregular memory access applications on limited GPU memory systems. Such memory over-subscription causes very poor performance in the currently on demand (eager) ...
Lossless instruction-to-object memory tracing in the Linux kernel
The lack of visibility into Linux's behavior makes it hard to refactor and maintain. To peer inside the box, we present Memorizer, a self-contained, low-level tracing framework that tracks (most) object allocations, data accesses, and function calls ...
KVRAID: high performance, write efficient, update friendly erasure coding scheme for KV-SSDs
Key-value (KV) stores have been widely deployed in a variety of scale-out enterprise applications such as online retail, big data analytics, social networks, etc. Key-Value SSDs (KVSSDs) provide a key-value interface directly from the device aiming at ...
Fine-grained control of concurrency within KV-SSDs
The development of KV-SSDs allows simplifying the I/O stack compared to the traditional block-based SSDs. We propose a novel Key-Value-based Storage infrastructure for Parallel Computing(KV-SiPC)-a framework for multi-thread OpenMP applications to use ...
KVCG: a heterogeneous key-value store for skewed workloads
We present KVCG, a novel heterogeneous key-value store whose primary objective is to serve client requests targeting frequently accessed (hot) keys at sub-millisecond latency and requests targeting less frequently accessed (cold) keys with high ...
A study of persistent memory bugs in the Linux kernel
Persistent memory (PM) technologies have inspired a wide range of PM-based system optimizations. However, building correct PM-based systems is difficult due to the unique characteristics of PM hardware. To better understand the challenges as well as the ...
UniHeap: managing persistent objects across managed runtimes for non-volatile memory
Byte-addressable, non-volatile memory (NVM) is emerging as a promising technology. To facilitate its wide adoption, employing NVM in managed runtimes like JVM has proven to be an effective approach (i.e., managed NVM). However, such an approach is ...

BDUS: implementing block devices in user space
Modern general-purpose operating systems implement major parts of their storage stacks in the kernel. Although this bolsters performance, it also complicates development and stifles innovation for today's increasingly complex storage systems. In ...
IMG-DNA: approximate DNA storage for images
Deoxyribonucleic Acid (DNA) as a storage medium with high density and long-term preservation properties can satisfy the requirement of archival storage for rapidly increased digital volume. The read and write processes of DNA storage are error-prone. ...
The case for adding privacy-related offloading to smart storage
It is important to ensure that personally identifiable information (PII) is protected within large distributed systems and is used only for intended purposes. Achieving this is challenging and several techniques have been proposed for privacy-preserving ...
Reducing write amplification in flash by death-time prediction of logical block addresses
Flash-based solid state drives lack support for in-place updates, and hence deploy a flash translation layer to absorb the writes. For this purpose, SSDs implement a log-structured storage system introducing garbage collection and write-amplification ...
Dissecting self-describing data formats to enable advanced querying of file metadata
In times of continuously growing data sizes, performing insightful analysis is increasingly difficult. I/O libraries such as NetCDF and ADIOS2 offer options to manage additional metadata to make the data retrieval more efficient. However, queries on ...
Dealing with (some of) the fallout from meltdown
The meltdown vulnerability allows users to read kernel memory by exploiting a hardware flaw in speculative execution. Processor vendors recommend "page table isolation" (PTI) as a software fix, but PTI can significantly degrade the performance of system-...

S2Dedup: SGX-enabled secure deduplication
Secure deduplication allows removing duplicate content at third-party storage services while preserving the privacy of users' data. However, current solutions are built with strict designs that cannot be adapted to storage service and applications with ...
Length preserving compression: marrying encryption with compression
This work tackles an inherent conflict between two important trends. The first is the integration of data compression capabilities into many storage systems supporting random I/O on the compressed data. The second is encrypting data at the host, before ...
HeuristicDB: a hybrid storage database system using a non-volatile memory block device
Hybrid storage systems are widely used in big data fields to balance system performance and cost. However, due to a poor understanding of the characteristics of database block requests, past studies in this area cannot fully utilize the performance gain ...
SIMD-MIMD cocktail in a hybrid memory glass: shaken, not stirred
Hybrid memory systems consisting of DRAM and NVRAM offer a great opportunity for column-oriented data systems to persistently store and to efficiently process columnar data completely in main memory. While vectorization (SIMD) of query operators is ...
Jumpgate: automating integration of network connected accelerators
Network-connected accelerators (NCA), such as programmable switches, ASICs, and FPGAs can speed up operations in data analytics. But so far, integration of NCAs into data analytics systems required manual effort.
We present Jumpgate, a system that ...
LIRS2: an improved LIRS replacement algorithm
A block replacement algorithm keeps receiving attention on improvement of its hit ratio. Many replacement algorithms have been proposed, among which LIRS stands out with its consistently higher hit ratio across various workloads with low time and space ...
CELL: counter estimation for per-flow traffic over sliding windows
Estimators reduce the memory footprint of maintaining network statistics, while keeping the estimation error of each flow proportional to its size. This is unlike sketches and other approximate algorithms that only guarantee an error proportional to the ...
DeCorus-NSA: detection and correlation of unusual signals for network syslog analytics
- David Ohana,
- Bruno Wassermann,
- Moshik Hershcovitch,
- Elliot K. Kolodner,
- Michal Malka,
- Eran Raichstein,
- Ronen Schaffer,
- Robert Shahla
The management of large data centre (DC) network infrastructure confronts Network Reliability Engineers (NRE) with challenges. A single DC at a modern cloud services provider can host thousands of network devices. The syslog messages generated by these ...
Indexing cloud data lakes within the lakes
Cloud data lakes are a modern approach for storing large amounts of data in a convenient and inexpensive way. The main idea is the separation of compute and storage layers. However, to perform analytics on the data in this architecture, the data should ...
HPC application optimisation in SODALITE
- Daniel Vladusic,
- Joao Pita Costa,
- Dragan Radolovic,
- Kalman Meth,
- Elisabetta Di Nitto,
- Alfio Lazzaro,
- Nina Mujkanovic,
- Maria Carbonell
We propose to tackle the complexity of deploying and operating modern applications onto heterogeneous HPC and cloud-based systems by providing application developers and infrastructure operators with tools to abstract their application and ...
Intelligent re-deployment feedback loop for hybrid applications
We propose enabling continuous performance optimisation of distributed hybrid applications in heterogeneous cloud, Edge, and HPC environments by employing an intelligent re-deployment feedback loop.
An investigation of performance problems with msync() system calls on filesystem DAX
Persistent Memory (PM) is a new device which provides faster access than conventional storage devices, such as SSDs. Among several methods prepared for accessing files on PM, a combination of filesystem direct access (DAX) and mmap() is used to take ...
Enabling manycore scalability in F2FS metadata for unlink() operation
Manycore systems enable massive parallel I/O in a single server due to the number of cores. Among file I/O operations in a file system, C. Lee et al. [1] applied range lock in F2FS for parallel data I/O, and showed scalable performance. However, little ...
Self managed data protection for containers
Container frameworks have been gaining popularity in recent years, with container native storage being one of the fastest growing segment. According to IDC report [1], 90% of applications on cloud platforms and over 95% of new microservices are being ...
Sentinel: ransomware detection in file storage
Ransomware is software that uses encryption to disable access to data until a ransom is paid and such attacks have increased steeply in recent times. The best current practice to minimize the impact of ransomware attacks include periodic backups and ...
Secure store for FHIR resources with Parquet encryption
The ability for medical professionals to efficiently process vast amounts of data is critical. We present a solution which offers cloud-secure analytics on healthcare data, utilizing FHIR, the latest standard from the HL7 organization, for the exchange ...
Index Terms
- Proceedings of the 14th ACM International Conference on Systems and Storage
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SYSTOR '24 | 38 | 14 | 37% |
SYSTOR '23 | 30 | 12 | 40% |
SYSTOR '22 | 41 | 12 | 29% |
SYSTOR '21 | 63 | 18 | 29% |
SYSTOR '16 | 49 | 16 | 33% |
SYSTOR '13 | 49 | 20 | 41% |
SYSTOR '11 | 53 | 16 | 30% |
Overall | 323 | 108 | 33% |