Peephole Log Optimization
dc.contributor.author | Huston, L. B. | en_US |
dc.contributor.author | Honeyman, P. | en_US |
dc.date.accessioned | 2014-07-18T18:12:00Z | |
dc.date.available | 2014-07-18T18:12:00Z | |
dc.date.issued | 1995-01-26 | en_US |
dc.identifier.citation | L.B. Huston and P. Honeyman, "Peephole Log Optimization," January 1995. [IEEE Computer Society Bulletin of the Technical Committee on Operating Systems and Application Environments 1:7 (Spring 1995). Presented at IEEE Workshop on Mobile Computing Applications and Systems, Santa Cruz (December 1994).] <http://hdl.handle.net/2027.42/107933> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/107933 | |
dc.description.abstract | The log files generated while operating a file system in disconnected mode grow to substantial sizes. Eliminating redundant or useless operations in these logs can free up scarce disk space on laptops, reduce replay times, and reduce the frequency of data conflict. Our approach uses a rule-based portable peephole optimizer for compilers. This work suggests a general method of optimization for any system that performs logging at the vnode layer. | en_US |
dc.publisher | Center for Information Technology Integration | en_US |
dc.title | Peephole Log Optimization | en_US |
dc.type | Technical Report | en_US |
dc.subject.hlbsecondlevel | Computer Science | en_US |
dc.subject.hlbtoplevel | Engineering | en_US |
dc.contributor.affiliationum | Center for Information Technology Integration | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/107933/1/citi-tr-95-3.pdf | |
dc.owningcollname | Electrical Engineering and Computer Science, Department of (EECS) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.