IEEE Xplore Search Results

Showing 1-25 of 228 resultsfor

Filter Results

Show

Results

There exist numerous erasure codes for RAID-6, of which MDS codes are popular due to the optimal storage efficiency. Although vertical MDS codes have better load balancing compared to horizontal MDS codes, unbalancing problem still exists in some vertical codes, e.g., P-Code. To address this issue, we propose a novel efficient RAID-6 code to support highly balanced I/Os among disk arrays - Balance...Show More

A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os

;;;;

The Computer Journal
Year: 2015 | Volume: 58, Issue: 8 | Journal Article |
Cited by: Papers (1)
RAID-6 is widely applied to tolerate double concurrent disk failures in both disk arrays and storage clusters. Among numerous erasure codes developed to implement RAID-6, Maximum Distance Separable (MDS) Codes are highly popular. Owing to the limitation of parity generating schemes used in MDS codes, RAID-6-based storage systems suffer from unbalance I/Os and low reconstruction performance. Out of...Show More

A New Non-MDS RAID-6 Code to Support Fast Reconstruction and Balanced I/Os

;;;;

Year: 2015 | Volume: 58, Issue: 8 | Journal Article |
New types of specialized network applications are being created that need to be able to transmit large amounts of data across dedicated network links. TCP fails to be a suitable method of bulk data transfer in many of these applications, giving rise to new classes of protocols designed to circumvent TCP's shortcomings. It is typical in these high-performance applications, however, that the system ...Show More
In Internet Certification Service (ICS), we use the content associated sensitive data extraction technology to increase the security of High Definition video copyright for ICS disc. An important item of ICS is to evaluate the Video Destruction Level (VDL) after extracting sensitive data. This paper presents a flexible and easy simulation environment to calculate the VDL based on DirectShow and Mat...Show More
It is indispensable to scale erasure-coded storage clusters to meet requirements of increased storage capacity and I/O performance. In this study, we propose an efficient scaling scheme for Reed-Solomon-coded storage clusters called Scale-RS, which has three salient features. First, Scale-RS achieves uniform data distribution by equally placing data blocks among old and new chunks using a transpos...Show More
An aging population has inspired the marketing of advanced real-time ambient assisted living solutions. However, the accurate collection of behavior information, recognition of human activities and implementation of this scheme in a real living environment is a challenging task. In this paper, we propose a feasible extended framework which is compatible with common devices and protocols. Specifica...Show More
RAID-6 is widely used to tolerate concurrent failures of any two disks in both disk arrays and storage clusters. Numerous erasure codes have been developed to implement RAID-6, of which MDS Codes are popular. Due to the limitation of parity generating schemes used in MDS codes, RAID-6-based storage systems suffer from low reconstruction performance. To address this issue, we propose a new class of...Show More
3D charge trap (CT) triple-level cell (TLC) NAND flash gradually becomes a mainstream storage component due to high storage capacity and performance, but introducing a concern about reliability. Fault tolerance and data management schemes are capable of improving reliability. Designing a more efficient solution, however, needs to understand the reliability characteristics of 3D CT TLC NAND flash. ...Show More
NAND flash memory has decreasing storage reliability, as the density or program/erase (P/E) cycle increases. To ensure data integrity, error correction codes (ECCs) are widely employed and typically stored in the out-of-band area (OOB) of flash pages. However, the worst-case oriented ECC is largely under-utilized in the early stage (small P/E cycles), and the required ECC redundancy may be too lar...Show More
3D NAND flash memory faces unprecedented complicated interference than planar NAND flash memory, resulting in more concern regarding reliability and performance. Stronger error correction code (ECC) and adaptive reading strategies are proposed to improve the reliability and performance taking a threshold voltage (Vth) distribution model as the backbone. However, the existing modeling methods are c...Show More
Dim moving target detection from hyperspectral image sequences, which contains temporal information as well as spectral information, has attracted researchers' interest for its crucial role in civil and military application. In this paper, we propose a novel spatio-temporal anomaly approach to solve the dim moving target detection problem. This approach calculates spatial anomaly map, temporal ano...Show More
Wear leveling scheme has became a fundamental issue in the design of Solid State Disk (SSD) based on NAND Flash memory. Existing schemes aim to equalize the number of programming/erase (P/E) cycles and memory raw bit error rates (BER) among all the flash blocks. However, due to fabrication process variation, different blocks of the same flash chip usually have largely different endurance in terms ...Show More
Three-dimensional (3D) NAND flash memory has high capacity and cell storage density by using the multi-bit technology and vertical stack architecture, but degrading data reliability due to high raw bit error rates (RBER) caused by program/erase (P/E) cycles and retention periods. Low-density parity-check (LDPC) codes become more popular error-correcting technologies to improve data reliability due...Show More
As NAND flash memory chips become denser, they are more vulnerable to random errors caused by ageing, read or write interference, and erase operations. These errors compromise both the data integrity and lifetime of flash memory so that error correction codes (ECC) are employed by the flash controller to strengthen the fault tolerance. The BCH (Bose Chaudhuri Hochquenghem) code is a widely used EC...Show More
Low-density parity-check (LDPC) codes have been widely adopted in NAND flash in recent years to improve data reliability. However, their error-correction capability degrades due to inaccurate log-likelihood ratio (LLR). To improve LLR accuracy of LDPC decoding, this paper proposes a threshold voltage distribution aware LLR optimization scheme, called VaLLR. Firstly, we build a threshold voltage di...Show More
With the growing scale of storage system, its requirements of performance, reliability, availability, and security are getting more and more complicated. The costs to manage storage systems will keep increasing and finally be higher than the systems themselves if this trend continues. Thus, intelligent and self-managing systems are required to automatically address the needs of these requirements....Show More
In this paper, an efficient moving object segmentation algorithm in the wavelet domain is proposed using three successive frames. The change detection method, which employs fuzzy C-means clustering technique to classify motion features of four wavelet sub-bands, is used twice to separate significant change pixels in the wavelet domain from the background. After applying the intersect operation, th...Show More
Cache plays an essential role in modern computer systems to smooth the performance gap between memory and CPU. Most existing cache replacement algorithms use three stacks: recency stack, frequency stack and history stack. The balance and design of those stacks is a key to achieve high hit ratio, thus improving the buffer cache efficiency. In this paper we propose a new cache replacement algorithm,...Show More
Recently many studies have found that the self-similarity in nature brings about the long range burstiness of the traffic across the wide range of time scales. The updated experimental evidences reveal that the heavy tailness is the key cause for the self-similar of the network traffic. Future fourth-generation (4G) wireless networks will be characterized by a 3G core network architecture. The mul...Show More
The paper provides WiMAX BS (base station) MAC design, implementation discussion with performance analysis based on Intel IXP2350, which include MAC design key issues discussion, base station usage model and architecture, MAC hardware and software high level design and relevant performance analysis. Especially, the WiMAX base station is user-specific, and WiMAX MAC software is one of the most impo...Show More
Quality of Service (QoS) play very important role in web service recommendation system. The precision of service recommendation depends on the credible QoS. So people begin to find better method for calculating the credibility of QoS. We can count the execution result and user comment to calculate the QoS credibility of single web service. But how to calculate the QoS credibility of web service co...Show More
Personal recommendation based on bipartite network has gained sustained attention in recent years due to its performance outperforms the traditional collaborative filtering approach, and it is rapidly becoming an important and promising technology for constructing recommender systems. Current viewpoint is focusing on improving precision of the algorithm. In this paper, we present an improved netwo...Show More
In block motion estimation, search patterns with different shapes or sizes have a large impact on the searching speed and quality of performance. In this paper, we propose an improved cross-diamond search algorithm (ICDS), using large/small cross-search pattern as the initial step for fast block motion estimation in according to center-biased characteristics of motion-vector distribution. In addit...Show More
Data security has become an increasingly important factor in routine work with the development of applications, and users trend to obtain high security with maximum comfort. In this article a cryptographic file system called NAS_CFS used for NAS is designed. NAS_CFS has some characteristics as below: adding encryption function to file-system layer allows users to encrypt data transparently, obtain...Show More
In this paper, we mainly concern about the channel switch delay of multi-channel P2P live streaming system. After study the essential aspects of multi-channel video systems, including channel switching, peer churn, and channel popularity, we develop a new user behavior oriented and content oriented pre-buffer mechanism to improve the user experience in live streaming borrowing the idea of user beh...Show More