Strategy to reduce I/O access time of applications in virtual machines
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jaemyoun | - |
dc.contributor.author | Han, Sanghwa | - |
dc.contributor.author | Ryu, Junhee | - |
dc.contributor.author | Kang, Kyungtae | - |
dc.date.accessioned | 2021-06-23T05:23:58Z | - |
dc.date.available | 2021-06-23T05:23:58Z | - |
dc.date.created | 2021-01-22 | - |
dc.date.issued | 2013-12 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/30539 | - |
dc.description.abstract | An input/output (I/O) device can incorporate mechanical devices that require physical movements, such as a hard drive seeking a track for a data read or write. Hence I/O operations on a computer can be extremely slow compared to data processing. When a program conducts many I/O operations, the processor often spends most idling as it waits for the I/O operations to complete. The same holds true for a virtual machine (VM), and to improve the overall performance of a VM, this problem needs to be addressed. In this paper, we propose a pinning technique, which migrates frequently accessed disk blocks from hard disks to flash memories, to reduce the I/O waiting time. Experimental results show that the start-up times dramatically decrease by up to 38% on average when using this method. © 2013 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | Strategy to reduce I/O access time of applications in virtual machines | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kang, Kyungtae | - |
dc.identifier.doi | 10.1109/ICITCS.2013.6717888 | - |
dc.identifier.scopusid | 2-s2.0-84894160163 | - |
dc.identifier.wosid | 000345618800120 | - |
dc.identifier.bibliographicCitation | 2013 International Conference on IT Convergence and Security, ICITCS 2013, pp.1 - 2 | - |
dc.relation.isPartOf | 2013 International Conference on IT Convergence and Security, ICITCS 2013 | - |
dc.citation.title | 2013 International Conference on IT Convergence and Security, ICITCS 2013 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 2 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 3 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/6717888/ | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.