Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Log structure"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mária Kozlovská, Jozef Švajlenka
Publikováno v:
Sustainability
Volume 13
Issue 5
Sustainability, Vol 13, Iss 2994, p 2994 (2021)
Volume 13
Issue 5
Sustainability, Vol 13, Iss 2994, p 2994 (2021)
“Ecological buildings” and “energy-efficient buildings” are concepts which we encounter on a daily basis and which define modern trends. The purpose of their design is to create an optimal thermal microclimate by means of heat flows that form
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ICDE
In recent years, Log-Structured Merge Tree (LSMtree) based key-value stores, such as LevelDB and RocksDB, have been widely adopted in data center systems. Though optimized for high-speed write processing, the severe I/O amplification remains a critic
Publikováno v:
2020 IEEE International Conference on Web Services (ICWS)
IEEE International Conference on Web Services (ICWS 2020)
IEEE International Conference on Web Services (ICWS 2020), Oct 2020, Beijing, China. pp.84-88, ⟨10.1109/ICWS49710.2020.00018⟩
ICWS
IEEE International Conference on Web Services (ICWS 2020)
IEEE International Conference on Web Services (ICWS 2020), Oct 2020, Beijing, China. pp.84-88, ⟨10.1109/ICWS49710.2020.00018⟩
ICWS
International audience; Execution logs are a pervasive resource to monitor modern information systems. Due to the lack of structure in raw log datasets, log parsing methods are used to automatically retrieve the structure of logs and gather logs of c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4de9da93c53cee96a00ff9dc0174c09e
https://hal.archives-ouvertes.fr/hal-03117077/document
https://hal.archives-ouvertes.fr/hal-03117077/document
Publikováno v:
ASPLOS
Emerging hardware like persistent memory (PM) and high-speed NICs are promising to build efficient key-value stores. However, we observe that the small-sized access pattern in key-value stores doesn't match with the persistence granularity in PMs, le
Autor:
Heer Zhao
Publikováno v:
Kyoto J. Math. 60, no. 3 (2020), 895-910
For a semi-stable abelian variety A_K over a complete discrete valuation field K, we show that every finite subgroup scheme of A_K extends to a log finite flat group scheme over the valuation ring of K endowed with the canonical log structure. To ach
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::57a26b1bceccc45ab7488141887359af
http://arxiv.org/abs/1909.01038
http://arxiv.org/abs/1909.01038
Currently, HPC storage systems still use hard disk drive (HDD) as their dominant storage device. Solid state drive (SSD) is widely deployed as the buffer to HDDs. Burst buffer has also been proposed to manage the SSD buffering of bursty write request
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::682d220377a51efbbb171ff79a5fa33f
Autor:
Mikhail B. Uspenskij
Publikováno v:
E3S Web of Conferences, Vol 140, p 03006 (2019)
Modern data storage systems have a sophisticated hardware and software architecture, including multiple storage processors, storage fabrics, network equipment and storage media and contain information, which can be damaged or lost because of hardware