Yuxia Cheng

  • Citations Per Year
Learn More
Hybrid storage systems that consist of flash-based solid state drives (SSDs) and traditional disks are now widely used. In hybrid storage systems, there exists a two-level cache hierarchy that regard dynamic random access memory (DRAM) as the first level cache and SSD as the second level cache for disk storage. However, this two-level cache hierarchy(More)
An increasing number of new multicore server systems use the Non-uniform Memory Access (NUMA) architecture due to its scalable memory performance. However, the multicore NUMA systems introduce complex interplay among data locality, contention on shared resources, and inter-socket data sharing overhead, which makes the achievement of an optimal and(More)
The fault-tolerance property in most cloud storage systems are designed within the scale of a single datacenter. The single datacenter as a whole may be unreachable or crashed due to severe problems, such as broken network links, power supply interruptions, and natural disasters, etc. Therefore, the design of an effective cross-datacenter fault-tolerant(More)
When the applications are running in the virtual machine (VM), the virtual address of VM are translated into physical address in host. To improve the quality of address translation, huge page mechanism is introduced to increase Translation Lookaside Buffer (TLB) hit rates and reduce page faults. In this paper, we discuss and investigate the impact(More)
In the situation of CPU and memory overcommit, it is inevitable that some NUMA nodes will be overloaded or hotspotted and become hot nodes, leading to the VM application performance degradation in virtualized NUMA (vNUMA) systems. However, the virtual machine monitor (VMM) can not be aware of the NUMA feature and the distribution array of hot memory pages(More)
With the rapid development of Internet of Things technology and the promotion of embedded devices’ computation performance, smart devices are probably open to security threats and attacks while connecting with rich and novel Internet. Attracting lots of attention in embedded system security community recently, Trusted Execution Environment (TEE), allows for(More)
  • 1