The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] file(200hit)

61-80hit(200hit)

  • On Improving the Reliability and Performance of the YAFFS Flash File System

    Seungjae BAEK  Heekwon PARK  Jongmoo CHOI  

     
    LETTER-Software System

      Vol:
    E94-D No:12
      Page(s):
    2528-2532

    In this paper, we propose three techniques to improve the performance of YAFFS (Yet Another Flash File System), while enhancing the reliability of the system. Specifically, we first propose to manage metadata and user data separately on segregated blocks. This modification not only leads to the reduction of the mount time but also reduces the garbage collection time. Second, we tailor the wear-leveling to the segregated metadata and user data blocks. That is, worn out blocks between the segregated blocks are swapped, which leads to more evenly worn out blocks increasing the lifetime of the system. Finally, we devise an analytic model to predict the expected garbage collection time. By accurately predicting the garbage collection time, the system can perform garbage collection at more opportune times when the user's perceived performance may not be negatively affected. Performance evaluation results based on real implementations show that our modifications enhance performance and reliability without incurring additional overheads. Specifically, the YAFFS with our proposed techniques outperforms the original YAFFS by six times in terms of mount speed and five times in terms of benchmark performance, while reducing the average erase count of blocks by 14%.

  • Amortized Linux Ext3 File System with Fast Writing after Editing for WinXP-Based Multimedia Application

    Seung-Wan JUNG  Young Jin NAM  Dae-Wha SEO  

     
    PAPER-Image Processing and Video Processing

      Vol:
    E94-D No:11
      Page(s):
    2259-2270

    Recently, the need for multimedia devices, such as mobile phones, digital TV, PMP, digital camcorders, digital cameras has increased. These devices provide various services for multimedia file manipulation, allowing multimedia contents playback, multimedia file editing, etc. Additionally, digital TV provides a recorded multimedia file copy to a portable USB disk. However, Linux Ext3 file system, as employed by these devices, has a lot of drawbacks, as it required a considerable amount of time and disk I/Os to store large-size edited multimedia files, and it is hard to access for typical PC users. Therefore, in this paper a design and implementation of an amortized Ext3 with FWAE (Fast Writing-After-Editing) for WinXP-based multimedia applications is described. The FWAE is a fast and efficient multimedia file editing/storing technique for the Ext3 that exploits inode block pointer re-setting and shared data blocks by simply modifying metadata information. Individual experiments in this research show that the amortized Ext3 with FWAE for WinXP not only dramatically improves written performance of the Ext3 by 16 times on average with various types of edited multimedia files but also notably reduces the amount of consumed disk space through data block sharing. Also, it provides ease and comfort to use for typical PC users unfamiliar with Linux OS.

  • Query-Trail-Mediated Cooperative Behaviors of Peers in Unstructured P2P File Sharing Networks

    Kei OHNISHI  Hiroshi YAMAMOTO  Masato UCHIDA  Yuji OIE  

     
    PAPER-Information Network

      Vol:
    E94-D No:10
      Page(s):
    1966-1980

    We propose two types of autonomic and distributed cooperative behaviors of peers for peer-to-peer (P2P) file-sharing networks. Cooperative behaviors of peers are mediated by query trails, and allows the exploration of better trade-off points between file search and storage load balancing performance. Query trails represent previous successful search paths and indicate which peers contributed to previous file searches and were at the same time exposed to the storage load. The first type of cooperative behavior is to determine the locations of replicas of files through the medium of query trails. Placement of replicas of files on strong query trails contributes to improvement of search performance, but a heavy load is generated due to writing files in storage to peers on the strong query trails. Therefore, we attempt to achieve storage load balancing between peers, while avoiding significant degradation of the search performance by creating replicas of files in peers adjacent to peers on strong query trails. The second type of cooperative behavior is to determine whether peers provide requested files through the medium of query trails. Provision of files by peers holding requested files on strong query trails contributes to better search performance, but such provision of files generates a heavy load for reading files from storage to peers on the strong query trails. Therefore, we attempt to achieve storage load balancing while making only small sacrifices in search performance by having peers on strong query trails refuse to provide files. Simulation results show that the first type of cooperative behavior provides equal or improved ability to explore trade-off points between storage load balancing and search performance in a static and nearly homogeneous P2P environment, without the need for fine tuning parameter values, compared to replication methods that require fine tuning of their parameters values. In addition, the combination of the second type and the first type of cooperative behavior yields better storage load balancing performance with little degradation of search performance. Moreover, even in a dynamic and heterogeneous P2P environment, the two types of cooperative behaviors yield good ability to explore trade-off points between storage load balancing and search performance.

  • Short Term Cell-Flipping Technique for Mitigating SNM Degradation Due to NBTI

    Yuji KUNITAKE  Toshinori SATO  Hiroto YASUURA  

     
    PAPER

      Vol:
    E94-C No:4
      Page(s):
    520-529

    Negative Bias Temperature Instability (NBTI) is one of the major reliability problems in advanced technologies. NBTI causes threshold voltage shift in a PMOS transistor. When the PMOS transistor is biased to negative voltage, threshold voltage shifts to negatively. On the other hand, the threshold voltage recovers if the PMOS transistor is positively biased. In an SRAM cell, due to NBTI, threshold voltage degrades in the load PMOS transistors. The degradation has the impact on Static Noise Margin (SNM), which is a measure of read stability of a 6-T SRAM cell. In this paper, we discuss the relationship between NBTI degradation in an SRAM cell and the dynamic stress and recovery condition. There are two important characteristics. One is a stress probability, which is defined as the rate that the PMOS transistor is negatively biased. The other is a stress and recovery cycle, which is defined as the switching interval of an SRAM value. In our observations, in order to mitigate the NBTI degradation, the stress probability should be small and the stress and recovery cycle should be shorter than 10 msec. Based on the observations, we propose a novel cell-flipping technique, which makes the stress probability close to 50%. In addition, we show results of the case studies, which apply the cell-flipping technique to register file and cache memories.

  • Communication Synthesis for Interconnect Minimization Targeting Distributed Register-File Microarchitecture

    Juinn-Dar HUANG  Chia-I CHEN  Yen-Ting LIN  Wan-Ling HSU  

     
    LETTER-VLSI Design Technology and CAD

      Vol:
    E94-A No:4
      Page(s):
    1151-1155

    In deep-submicron era, wire delay is becoming a bottleneck while pursuing even higher system clock speed. Several distributed register (DR) architectures have been proposed to cope with this problem by keeping most wires local. In this article, we propose a new resource-constrained communication synthesis algorithm for optimizing both inter-island connections (IICs) and latency targeting on distributed register-file microarchitecture (DRFM). The experimental results show that up to 24.7% and 12.7% reduction on IIC and latency can be achieved respectively as compared to the previous work.

  • Register File Size Reduction through Instruction Pre-Execution Incorporating Value Prediction

    Yusuke TANAKA  Hideki ANDO  

     
    PAPER-Computer System

      Vol:
    E93-D No:12
      Page(s):
    3294-3305

    Two-step physical register deallocation (TSD) is an architectural scheme that enhances memory-level parallelism (MLP) by pre-executing instructions. Ideally, TSD allows exploitation of MLP under an unlimited number of physical registers, and consequently only a small register file is needed for MLP. In practice, however, the amount of MLP exploitable is limited, because there are cases where either 1) pre-execution is not performed; or 2) the timing of pre-execution is delayed. Both are due to data dependencies among the pre-executed instructions. This paper proposes the use of value prediction to solve these problems. This paper proposes the use of value prediction to solve these problems. Evaluation results using the SPECfp2000 benchmark confirm that the proposed scheme with value prediction for predicting addresses achieves equivalent IPC, with a smaller register file, to the previous TSD scheme. The reduction rate of the register file size is 21%.

  • Planar Waveguide Arrays for Millimeter Wave Systems Open Access

    Makoto ANDO  

     
    INVITED PAPER

      Vol:
    E93-B No:10
      Page(s):
    2504-2513

    Design of high gain and high efficiency antennas is one of the key challenges in antenna engineering and especially in millimeter wave communication systems. Various types of planar waveguide arrays with series-fed traveling wave operation have been developed in Tokyo Tech with the special focus upon efficiency enhancement as well as reduction of fabrication cost. In this review, four kinds of single layer waveguide arrays characterized with the series fed travelling wave operation are surveyed first. To cope with the bandwidth narrowing effects due to long line effects associated with the series fed operation, authors have introduced partially corporate feed embedded in the single layer waveguide. They further extended the study to cover fully corporate feed arrays with multiple layer waveguide as well; a new fabrication technique of diffusion bonding of laminated thin plates has the potential to realize the low cost mass production of multi-layer structures for the millimeter wave application. Secondly, the novel methods for loss evaluation of copper plate substrate are established for the design of post-wall waveguide arrays where dielectric loss and conductor loss is determined in wide range of millimeter wave band, by using the Whispering gallery mode resonator. This enables us to design the planar arrays with the loss taken into account. Finally, the planar arrays are now applied to two kinds of systems in the Tokyo Tech millimeter wave project; the indoor short range file-transfer systems and the outdoor communication systems for the medium range backhaul links. The latter has been field-tested in the model network built in Tokyo Tech Ookayama campus. Early stage progress of the project including unique propagation data is also reported.

  • A Low-Profile Dual-Polarized Directional Antenna for Enhancing Channel Capacity in Indoor MIMO Systems

    Daisuke UCHIDA  Hiroyuki ARAI  Yuki INOUE  Keizo CHO  

     
    PAPER-Antennas

      Vol:
    E93-B No:10
      Page(s):
    2570-2577

    The use of directional antenna and polarization diversity techniques has been reported to achieve good MIMO performance. Low-profile, small structures are required to configure the MIMO antenna with these techniques. First, we assume downlink transmission in indoor MIMO systems and present the design guidelines for the radiation pattern to obtain large channel capacity by the ray-tracing method. We then propose a uni-directional, dual-polarized MIMO antenna with a thickness of 0.24λ based on the design guidelines. The proposed antenna consists of dipole antennas mounted horizontally to the ground plane and cavity backed slot antennas for vertical polarization. We apply the proposed antenna to 2 2 MIMO transmission and demonstrate the effectiveness of channel capacity enhancement in an actual environment. The improvement factor is revealed to be +16.2% with place averaged value compared to sleeve antenna configuration.

  • An Empirical Study of FTL Performance in Conjunction with File System Pursuing Data Integrity

    In Hwan DOH  Myoung Sub SHIM  Eunsam KIM  Jongmoo CHOI  Donghee LEE  Sam H. NOH  

     
    LETTER-Software System

      Vol:
    E93-D No:8
      Page(s):
    2302-2305

    Due to the detachability of Flash storage, which is a dominant portable storage, data integrity stored in Flash storages becomes an important issue. This study considers the performance of Flash Translation Layer (FTL) schemes embedded in Flash storages in conjunction with file system behavior that pursue high data integrity. To assure extreme data integrity, file systems synchronously write all file data to storage accompanying hot write references. In this study, we concentrate on the effect of hot write references on Flash storage, and we consider the effect of absorbing the hot write references via nonvolatile write cache on the performance of the FTL schemes in Flash storage. In so doing, we quantify the performance of typical FTL schemes for a realistic digital camera workload that contains hot write references through experiments on a real system environment. Results show that for the workload with hot write references FTL performance does not conform with previously reported studies. We also conclude that the impact of the underlying FTL schemes on the performance of Flash storage is dramatically reduced by absorbing the hot write references via nonvolatile write cache.

  • A Buffer Management Issue in Designing SSDs for LFSs

    Jaegeuk KIM  Jinho SEOL  Seungryoul MAENG  

     
    LETTER-Computer System

      Vol:
    E93-D No:6
      Page(s):
    1644-1647

    This letter introduces a buffer management issue in designing SSDs for log-structured file systems (LFSs). We implemented a novel trace-driven SSD simulator in SystemC language, and simulated several SSD architectures with the NILFS2 trace. From the results, we give two major considerations related to the buffer management as follows. (1) The write buffer is used as a buffer not a cache, since all write requests are sequential in NILFS2. (2) For better performance, the main architectural factor is the bus bandwidth, but 332 MHz is enough. Instead, the read buffer makes a key role in performance improvement while caching data. To enhance SSDs, accordingly, it is an effective way to make efficient read buffer management policies, and one of the examples is tracking the valid data zone in NILFS2, which can increase the data hit ratio in read buffers significantly.

  • NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its Metadata

    In Hwan DOH  Hyo J. LEE  Young Je MOON  Eunsam KIM  Jongmoo CHOI  Donghee LEE  Sam H. NOH  

     
    PAPER-Software Systems

      Vol:
    E93-D No:5
      Page(s):
    1137-1146

    File systems make use of the buffer cache to enhance their performance. Traditionally, part of DRAM, which is volatile memory, is used as the buffer cache. In this paper, we consider the use of of Non-Volatile RAM (NVRAM) as a write cache for metadata of the file system in embedded systems. NVRAM is a state-of-the-art memory that provides characteristics of both non-volatility and random byte addressability. By employing NVRAM as a write cache for dirty metadata, we retain the same integrity of a file system that always synchronously writes its metadata to storage, while at the same time improving file system performance to the level of a file system that always writes asynchronously. To show quantitative results, we developed an embedded board with NVRAM and modify the VFAT file system provided in Linux 2.6.11 to accommodate the NVRAM write cache. We performed a wide range of experiments on this platform for various synthetic and realistic workloads. The results show that substantial reductions in execution time are possible from an application viewpoint. Another consequence of the write cache is its benefits at the FTL layer, leading to improved wear leveling of Flash memory and increased energy savings, which are important measures in embedded systems. From the real numbers obtained through our experiments, we show that wear leveling is improved considerably and also quantify the improvements in terms of energy.

  • An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use Profile

    Yizhong XIN  Xiangshi REN  

     
    PAPER-Human-computer Interaction

      Vol:
    E93-D No:5
      Page(s):
    1205-1213

    Continuous pen pressure can be used to operate multi-state widgets such as menus in pen based user interfaces. The number of levels into which the pen pressure space is divided determines the number of states in the multi-state widgets. To increase the optimal number of divisions of the pen pressure space and achieve greater pen pressure usability, we propose a new discretization method which divides the pen pressure space according to a personal pen pressure use profile. We present here four variations of the method: discretization according to personal/aggregation pen pressure use profile with/without visual feedback of uniform level widths and the traditional even discretization method. Two experiments were conducted respectively to investigate pen pressure use profile and to comparatively evaluate the performance of these methods. Results indicate that the subjects performed fastest and with the fewest errors when the pen pressure space was divided according to personal profile with visual feedback of uniform level widths (PU) and performed worst when the pen pressure space was divided evenly. With PU method, the optimal number of divisions of the pen pressure space was 8. Visual feedback of uniform level widths enhanced performance of uneven discretization. The findings of this study have implications for human-oriented pen pressure use in pen pressure based user interface designs.

  • Access Load Balancing with Analogy to Thermal Diffusion for Dynamic P2P File-Sharing Environments

    Masanori TAKAOKA  Masato UCHIDA  Kei OHNISHI  Yuji OIE  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1140-1150

    In this paper, we propose a file replication method to achieve load balancing in terms of write access to storage device ("write storage access load balancing" for short) in unstructured peer-to-peer (P2P) file-sharing networks in which the popularity trend of queried files varies dynamically. The proposed method uses a write storage access ratio as a load balance index value in order to stabilize dynamic P2P file-sharing environments adaptively. In the proposed method, each peer autonomously controls the file replication ratio, which is defined as a probability to create the replica of the file in order to uniform write storage access loads in the similar way to thermal diffusion phenomena. Theoretical analysis results show that the behavior of the proposed method actually has an analogy to a thermal diffusion equation. In addition, simulation results reveal that the proposed method has an ability to realize write storage access load balancing in the dynamic P2P file-sharing environments.

  • A Trust Management Model Based on Bi-evaluation in P2P Networks

    Jingyu FENG  Yuqing ZHANG  Hong WANG  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    466-472

    The security of P2P networks depends on building trust management among peers. However, current trust management models focus on preventing untrustworthy resources from spreading by malicious providers, but have few effects on reducing denial-of-service attacks of malicious consumers and free riding of selfish peers. Pointing to these problems, a bi-evaluation trust management model, called BiTrust, is proposed. In this model, the trustworthiness of a peer is divided into service and request trustworthiness. Service trustworthiness shows the resources reliability of providers, and request trustworthiness is used to deal with requests from consumers, which can keep away malicious consumers and encourage selfish peers to share resources. A generic method for evaluating service and request trustworthiness is described. Furthermore, the implementation strategies of the model are also depicted in this paper. The following analysis and simulation show that BiTrust is more effective on enhancing high-quality resources sharing among peers and more advanced in successful exchanges rate.

  • Dynamic and Decentralized Storage Load Balancing with Analogy to Thermal Diffusion for P2P File Sharing

    Masato UCHIDA  Kei OHNISHI  Kento ICHIKAWA  Masato TSURU  Yuji OIE  

     
    PAPER

      Vol:
    E93-B No:3
      Page(s):
    525-535

    In this paper we propose a file replication scheme inspired by a thermal diffusion phenomenon for storage load balancing in unstructured peer-to-peer (P2P) file sharing networks. The proposed scheme is designed such that the storage utilization ratios of peers will be uniform, in the same way that the temperature in a field becomes uniform in a thermal diffusion phenomenon. The proposed scheme creates replicas of files in peers probabilistically, where the probability is controlled by using parameters that can be used to find the trade-off between storage load balancing and search performance in unstructured P2P file sharing networks. First, we show through theoretical analysis that the statistical behavior of the storage load balancing controlled by the proposed scheme has an analogy with the thermal diffusion phenomenon. We then show through simulation that the proposed scheme not only has superior performance with respect to balancing the storage load among peers (the primary objective of the present proposal) but also allows the performance trade-off to be widely found. Finally, we qualitatively discuss a guideline for setting the parameter values in order to widely find the performance trade-off from the simulation results.

  • Randomized Online File Allocation on Uniform Cactus Graphs

    Yasuyuki KAWAMURA  Akira MATSUBAYASHI  

     
    PAPER-Algorithm Theory

      Vol:
    E92-D No:12
      Page(s):
    2416-2421

    We study the online file allocation problem on ring networks. In this paper, we present a 7-competitive randomized algorithm against an adaptive online adversary on uniform cactus graphs. The algorithm is deterministic if the file size is 1. Moreover, we obtain lower bounds of 4.25 and 3.833 for a deterministic algorithm and a randomized algorithm against an adaptive online adversary, respectively, on ring networks.

  • Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags

    Kei OHNISHI  Kaori YOSHIDA  Yuji OIE  

     
    PAPER-Computation and Computational Models

      Vol:
    E92-D No:12
      Page(s):
    2402-2415

    We present the concept of folksonomical peer-to-peer (P2P) file sharing networks that allow participants (peers) to freely assign structured search tags to files. These networks are similar to folksonomies in the present Web from the point of view that users assign search tags to information distributed over a network. As a concrete example, we consider an unstructured P2P network using vectorized Kansei (human sensitivity) information as structured search tags for file search. Vectorized Kansei information as search tags indicates what participants feel about their files and is assigned by the participant to each of their files. A search query also has the same form of search tags and indicates what participants want to feel about files that they will eventually obtain. A method that enables file search using vectorized Kansei information is the Kansei query-forwarding method, which probabilistically propagates a search query to peers that are likely to hold more files having search tags that are similar to the query. The similarity between the search query and the search tags is measured in terms of their dot product. The simulation experiments examine if the Kansei query-forwarding method can provide equal search performance for all peers in a network in which only the Kansei information and the tendency with respect to file collection are different among all of the peers. The simulation results show that the Kansei query forwarding method and a random-walk-based query forwarding method, for comparison, work effectively in different situations and are complementary. Furthermore, the Kansei query forwarding method is shown, through simulations, to be superior to or equal to the random-walk based one in terms of search speed.

  • Beam Profile Tailoring of Laser Diodes Using Lloyd's Mirror Interference

    Takehiro FUKUSHIMA  Kunihiro MIYAHARA  Naoki NAKATA  

     
    LETTER-Lasers, Quantum Electronics

      Vol:
    E92-C No:8
      Page(s):
    1095-1097

    A novel method for tailoring the beam profile of laser diodes that employs Lloyd's mirror interference is investigated. The beam profile in the vertical direction is controlled by inserting a GaAs mirror below the active layer. The experimentally obtained trends are successfully modeled by numerical calculations using Huygens' integral.

  • A File Fetching Method to Avoid Performance Deterioration on BitTorrent-Like P2P Networks

    Junichi FUNASAKA  Akihiko ISHIZU  Kenji ISHIDA  

     
    PAPER-Network

      Vol:
    E92-B No:8
      Page(s):
    2591-2599

    Most P2P systems divide a file into many pieces and fetch different pieces from many peers simultaneously. If one of the last few pieces is requested from an extremely slow peer, the overall download time may become excessive. The end-game mode was proposed to solve this problem. This method requests the last piece from all the connected peers at the same time. Unfortunately, the duplicated requests generate redundant traffic. This paper proposes a requesting method that does not increase overall download time as well as avoiding the redundant traffic. We also propose a combination of our requesting method and the end-game mode. The proposed methods are compared to the existing method with the end-game mode in simulations that use BitTorrent as a typical instance of the parallel retrieving P2P system. The results confirm that our requesting method can match the download times of the end-game mode while suppressing the redundant traffic. Our method enhances network performance by absorbing the difference in peer performance and providing steady download times without wasting traffic resources. Moreover, it is also confirmed that our combination method can distribute a file more quickly than other methods.

  • Design and Implementation of a Metadata Management Scheme for Large Distributed File Systems

    Jong Hyeon YUN  Yong Hun PARK  Dong Min SEO  Seok Jae LEE  Jae Soo YOO  

     
    LETTER-Dependable Computing

      Vol:
    E92-D No:7
      Page(s):
    1475-1478

    Most large-scale distributed file systems decouple a metadata operation from read and write operations for a file. In the distributed file systems, a certain server named a metadata server (MDS) is responsible for maintaining the metadata information of the file systems. In this paper, we propose a new metadata management scheme in order to provide the high metadata throughput and scalability for a cluster of MDSs. First, we derive a new metadata distribution technique. Then, we present a load balancing technique based on the distribution technique. Several experiments show that our scheme outperforms existing metadata management scheme in terms of scalability and load balancing.

61-80hit(200hit)