Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3456727acmconferencesBook PagePublication PagessystorConference Proceedingsconference-collections
SYSTOR '21: Proceedings of the 14th ACM International Conference on Systems and Storage
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SYSTOR '21: The 14th ACM International Systems and Storage Conference Haifa Israel June 14 - 16, 2021
ISBN:
978-1-4503-8398-1
Published:
14 June 2021
Sponsors:
In-Cooperation:
Technion, USENIX Assoc
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 20 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
SESSION: Memory
research-article
Best Paper
Best Paper
To move or not to move?: page migration for irregular applications in over-subscribed GPU memory systems with DynaMap
Article No.: 1, Pages 1–12https://doi.org/10.1145/3456727.3463766

This paper focuses on the severe page thrashing problem that can arise when running large irregular memory access applications on limited GPU memory systems. Such memory over-subscription causes very poor performance in the currently on demand (eager) ...

research-article
Open Access
Lossless instruction-to-object memory tracing in the Linux kernel
Article No.: 2, Pages 1–12https://doi.org/10.1145/3456727.3463767

The lack of visibility into Linux's behavior makes it hard to refactor and maintain. To peer inside the box, we present Memorizer, a self-contained, low-level tracing framework that tracks (most) object allocations, data accesses, and function calls ...

SESSION: Key-value stores
research-article
KVRAID: high performance, write efficient, update friendly erasure coding scheme for KV-SSDs
Article No.: 3, Pages 1–12https://doi.org/10.1145/3456727.3463781

Key-value (KV) stores have been widely deployed in a variety of scale-out enterprise applications such as online retail, big data analytics, social networks, etc. Key-Value SSDs (KVSSDs) provide a key-value interface directly from the device aiming at ...

research-article
Public Access
Fine-grained control of concurrency within KV-SSDs
Article No.: 4, Pages 1–12https://doi.org/10.1145/3456727.3463777

The development of KV-SSDs allows simplifying the I/O stack compared to the traditional block-based SSDs. We propose a novel Key-Value-based Storage infrastructure for Parallel Computing(KV-SiPC)-a framework for multi-thread OpenMP applications to use ...

research-article
Open Access
KVCG: a heterogeneous key-value store for skewed workloads
Article No.: 5, Pages 1–12https://doi.org/10.1145/3456727.3463779

We present KVCG, a novel heterogeneous key-value store whose primary objective is to serve client requests targeting frequently accessed (hot) keys at sub-millisecond latency and requests targeting less frequently accessed (cold) keys with high ...

SESSION: NVM part 1
research-article
Open Access
A study of persistent memory bugs in the Linux kernel
Article No.: 6, Pages 1–6https://doi.org/10.1145/3456727.3463783

Persistent memory (PM) technologies have inspired a wide range of PM-based system optimizations. However, building correct PM-based systems is difficult due to the unique characteristics of PM hardware. To better understand the challenges as well as the ...

research-article
Public Access
UniHeap: managing persistent objects across managed runtimes for non-volatile memory
Article No.: 7, Pages 1–12https://doi.org/10.1145/3456727.3463775

Byte-addressable, non-volatile memory (NVM) is emerging as a promising technology. To facilitate its wide adoption, employing NVM in managed runtimes like JVM has proven to be an effective approach (i.e., managed NVM). However, such an approach is ...

SESSION: Storage
research-article
Honorable Mention
Honorable Mention
BDUS: implementing block devices in user space
Article No.: 8, Pages 1–11https://doi.org/10.1145/3456727.3463768

Modern general-purpose operating systems implement major parts of their storage stacks in the kernel. Although this bolsters performance, it also complicates development and stifles innovation for today's increasingly complex storage systems. In ...

research-article
Public Access
IMG-DNA: approximate DNA storage for images
Article No.: 9, Pages 1–9https://doi.org/10.1145/3456727.3463771

Deoxyribonucleic Acid (DNA) as a storage medium with high density and long-term preservation properties can satisfy the requirement of archival storage for rapidly increased digital volume. The read and write processes of DNA storage are error-prone. ...

research-article
The case for adding privacy-related offloading to smart storage
Article No.: 10, Pages 1–11https://doi.org/10.1145/3456727.3463769

It is important to ensure that personally identifiable information (PII) is protected within large distributed systems and is used only for intended purposes. Achieving this is challenging and several techniques have been proposed for privacy-preserving ...

research-article
Open Access
Reducing write amplification in flash by death-time prediction of logical block addresses
Article No.: 11, Pages 1–12https://doi.org/10.1145/3456727.3463784

Flash-based solid state drives lack support for in-place updates, and hence deploy a flash translation layer to absorb the writes. For this purpose, SSDs implement a log-structured storage system introducing garbage collection and write-amplification ...

research-article
Open Access
Dissecting self-describing data formats to enable advanced querying of file metadata
Article No.: 12, Pages 1–7https://doi.org/10.1145/3456727.3463778

In times of continuously growing data sizes, performing insightful analysis is increasingly difficult. I/O libraries such as NetCDF and ADIOS2 offer options to manage additional metadata to make the data retrieval more efficient. However, queries on ...

SESSION: Security
research-article
Dealing with (some of) the fallout from meltdown
Article No.: 13, Pages 1–6https://doi.org/10.1145/3456727.3463776

The meltdown vulnerability allows users to read kernel memory by exploiting a hardware flaw in speculative execution. Processor vendors recommend "page table isolation" (PTI) as a software fix, but PTI can significantly degrade the performance of system-...

research-article
Honorable Mention
Honorable Mention
S2Dedup: SGX-enabled secure deduplication
Article No.: 14, Pages 1–12https://doi.org/10.1145/3456727.3463773

Secure deduplication allows removing duplicate content at third-party storage services while preserving the privacy of users' data. However, current solutions are built with strict designs that cannot be adapted to storage service and applications with ...

research-article
Length preserving compression: marrying encryption with compression
Article No.: 15, Pages 1–12https://doi.org/10.1145/3456727.3463780

This work tackles an inherent conflict between two important trends. The first is the integration of data compression capabilities into many storage systems supporting random I/O on the compressed data. The second is encrypting data at the host, before ...

SESSION: NVM part 2
research-article
Public Access
HeuristicDB: a hybrid storage database system using a non-volatile memory block device
Article No.: 16, Pages 1–12https://doi.org/10.1145/3456727.3463774

Hybrid storage systems are widely used in big data fields to balance system performance and cost. However, due to a poor understanding of the characteristics of database block requests, past studies in this area cannot fully utilize the performance gain ...

research-article
SIMD-MIMD cocktail in a hybrid memory glass: shaken, not stirred
Article No.: 17, Pages 1–12https://doi.org/10.1145/3456727.3463782

Hybrid memory systems consisting of DRAM and NVRAM offer a great opportunity for column-oriented data systems to persistently store and to efficiently process columnar data completely in main memory. While vectorization (SIMD) of query operators is ...

SESSION: Potpourri
research-article
Jumpgate: automating integration of network connected accelerators
Article No.: 18, Pages 1–12https://doi.org/10.1145/3456727.3463770

Network-connected accelerators (NCA), such as programmable switches, ASICs, and FPGAs can speed up operations in data analytics. But so far, integration of NCAs into data analytics systems required manual effort.

We present Jumpgate, a system that ...

research-article
Open Access
LIRS2: an improved LIRS replacement algorithm
Article No.: 19, Pages 1–12https://doi.org/10.1145/3456727.3463772

A block replacement algorithm keeps receiving attention on improvement of its hit ratio. Many replacement algorithms have been proposed, among which LIRS stands out with its consistently higher hit ratio across various workloads with low time and space ...

POSTER SESSION: Posters
research-article
CELL: counter estimation for per-flow traffic over sliding windows

Estimators reduce the memory footprint of maintaining network statistics, while keeping the estimation error of each flow proportional to its size. This is unlike sketches and other approximate algorithms that only guarantee an error proportional to the ...

research-article
DeCorus-NSA: detection and correlation of unusual signals for network syslog analytics

The management of large data centre (DC) network infrastructure confronts Network Reliability Engineers (NRE) with challenges. A single DC at a modern cloud services provider can host thousands of network devices. The syslog messages generated by these ...

research-article
Indexing cloud data lakes within the lakes

Cloud data lakes are a modern approach for storing large amounts of data in a convenient and inexpensive way. The main idea is the separation of compute and storage layers. However, to perform analytics on the data in this architecture, the data should ...

research-article
HPC application optimisation in SODALITE

We propose to tackle the complexity of deploying and operating modern applications onto heterogeneous HPC and cloud-based systems by providing application developers and infrastructure operators with tools to abstract their application and ...

research-article
Intelligent re-deployment feedback loop for hybrid applications

We propose enabling continuous performance optimisation of distributed hybrid applications in heterogeneous cloud, Edge, and HPC environments by employing an intelligent re-deployment feedback loop.

research-article
An investigation of performance problems with msync() system calls on filesystem DAX

Persistent Memory (PM) is a new device which provides faster access than conventional storage devices, such as SSDs. Among several methods prepared for accessing files on PM, a combination of filesystem direct access (DAX) and mmap() is used to take ...

research-article
Enabling manycore scalability in F2FS metadata for unlink() operation

Manycore systems enable massive parallel I/O in a single server due to the number of cores. Among file I/O operations in a file system, C. Lee et al. [1] applied range lock in F2FS for parallel data I/O, and showed scalable performance. However, little ...

research-article
Self managed data protection for containers

Container frameworks have been gaining popularity in recent years, with container native storage being one of the fastest growing segment. According to IDC report [1], 90% of applications on cloud platforms and over 95% of new microservices are being ...

research-article
Sentinel: ransomware detection in file storage

Ransomware is software that uses encryption to disable access to data until a ransom is paid and such attacks have increased steeply in recent times. The best current practice to minimize the impact of ransomware attacks include periodic backups and ...

research-article
Secure store for FHIR resources with Parquet encryption

The ability for medical professionals to efficiently process vast amounts of data is critical. We present a solution which offers cloud-secure analytics on healthcare data, utilizing FHIR, the latest standard from the HL7 organization, for the exchange ...

Contributors
  • IBM Research - Haifa
  • IBM Research
  • The University of Texas at Austin
  • Technion - Israel Institute of Technology
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

SYSTOR '21 Paper Acceptance Rate 18 of 63 submissions, 29%;
Overall Acceptance Rate 108 of 323 submissions, 33%
YearSubmittedAcceptedRate
SYSTOR '24381437%
SYSTOR '23301240%
SYSTOR '22411229%
SYSTOR '21631829%
SYSTOR '16491633%
SYSTOR '13492041%
SYSTOR '11531630%
Overall32310833%