Learn More
User I/O intensity can significantly impact the performance of on-line RAID reconstruction due to contention for the shared disk bandwidth. Based on this observation , this paper proposes a novel scheme, called WorkOut (I/O Workload Outsourcing), to significantly boost RAID reconstruction performance. WorkOut effectively out-sources all write requests and(More)
Flash-based Solid State Drive (SSD) has been productively shipped and deployed in large scale storage systems. However, a single flash-based SSD cannot satisfy the capacity, performance and reliability requirements of the modern storage systems that support increasingly demanding data-intensive computing applications. Applying RAID schemes to SSDs to meet(More)
Though increasing lines of evidence suggest that iron accumulation and iron-induced oxidative stress might be important pathological factors responsible for substantia nigra (SN) cell death in Parkinson's disease (PD), it is still unknown whether iron accumulation is a primary cause or consequence of nigral cell death. Using nuclear microscopy, iron(More)
Data deduplication has been demonstrated to be an effective technique in reducing the total data transferred over the network and the storage space in cloud backup, archiving, and primary storage systems, such as VM (virtual machine) platforms. However, the performance of restore operations from a deduplicated backup can be significantly lower than that(More)
OBJECTIVE To investigate the clinical efficacy of individual endovascular management for the treatment of different traumatic pseudoaneurysms presenting as intractable epistaxis. MATERIALS AND METHODS For 14 consecutive patients with traumatic pseudoaneurysm presenting as refractory epistaxes, 15 endovascular procedures were performed. Digital subtraction(More)
Collaborative filtering (CF) technique is capable of generating personalized recommendations. However, the recommender systems utilizing CF as their key algorithms are vulnerable to shilling attacks which insert malicious user profiles into the systems to push or nuke the reputations of targeted items. There are only a small number of labeled users in most(More)
Collaborative filtering (CF) based recommender systems are vulnerable to shilling attacks. In some leading e-commerce sites, there exists a large number of unlabeled users, and it is expensive to obtain their identities. Existing research efforts on shilling attack detection fail to exploit these unlabeled users. In this article, Semi-SAD, a new(More)