A similarity study of I/O traces via string kernels
Impacte
![Google Scholar](/xmlui/themes/Mirage2/images/uji/logo_google.png)
![Microsoft Academico](/xmlui/themes/Mirage2/images/uji/logo_microsoft.png)
Metadades
Mostra el registre complet de l'elementcomunitat-uji-handle:10234/9
comunitat-uji-handle2:10234/7036
comunitat-uji-handle3:10234/8620
comunitat-uji-handle4:
INVESTIGACIONAquest recurs és restringit
https://doi.org/10.1007/s11227-018-2471-x |
Metadades
Títol
A similarity study of I/O traces via string kernelsData de publicació
2018-07Editor
SpringerCita bibliogràfica
Torres, R., Kunkel, J.M., Dolz, M.F. et al. J Supercomput (2018). https://doi.org/10.1007/s11227-018-2471-xTipus de document
info:eu-repo/semantics/articleVersió de l'editorial
https://link.springer.com/article/10.1007/s11227-018-2471-xVersió
info:eu-repo/semantics/publishedVersionParaules clau / Matèries
Resum
Understanding I/O for data-intense applications is the foundation for the optimization of these applications. The classification of the applications according to the expressed I/O access pattern eases the analysis. ... [+]
Understanding I/O for data-intense applications is the foundation for the optimization of these applications. The classification of the applications according to the expressed I/O access pattern eases the analysis. An access pattern can be seen as fingerprint of an application. In this paper, we address the classification of traces. Firstly, we convert them first into a weighted string representation. Due to the fact that string objects can be easily compared using kernel methods, we explore their use for fingerprinting I/O patterns. To improve accuracy, we propose a novel string kernel function called kast2 spectrum kernel. The similarity matrices, obtained after applying the mentioned kernel over a set of examples from a real application, were analyzed using kernel principal component analysis and hierarchical clustering. The evaluation showed that two out of four I/O access pattern groups were completely identified, while the other two groups conformed a single cluster due to the intrinsic similarity of their members. The proposed strategy can be promisingly applied to other similarity problems involving tree-like structured data. [-]
Drets d'accés
© Springer Science+Business Media, LLC, part of Springer Nature 2018
http://rightsstatements.org/vocab/InC/1.0/
info:eu-repo/semantics/restrictedAccess
http://rightsstatements.org/vocab/InC/1.0/
info:eu-repo/semantics/restrictedAccess
Apareix a les col.leccions
- ICC_Articles [427]