LESS: Logging Exploiting SnapShot

H Sung, M Jin, M Shin, H Roh, W Choi… - … Conference on Big …, 2019 - ieeexplore.ieee.org
… called Logging Exploiting SnapShot (LESS) for troubleshooting problems when performing
an AOF Rewrite. LESS is a persistence method that exploits … of log records. Furthermore, the …

Exploiting Snapshot for Web Applications

오진석 - 2016 - s-space.snu.ac.kr
… during loading time as a log. When restoring snapshot, log is replayed to restore DOM tree …
it appears that the ARM Chrome browser is less optimized than the x86 Chrome browser. The …

FlashLogging: exploiting flash devices for synchronous logging performance

S Chen - Proceedings of the 2009 ACM SIGMOD International …, 2009 - dl.acm.org
… sizes: 82.9% of the write sizes are less than 10KB large, 90.5% of the write sizes are less
than 15KB large, and 99.0% of the write sizes are less than 36KB. Compared to the track size …

Adaptive logging: Optimizing logging and recovery costs in distributed in-memory databases

C Yao, D Agrawal, G Chen, BC Ooi, S Wu - Proceedings of the 2016 …, 2016 - dl.acm.org
… last snapshot and redo all the transactions in the command log to … It consumes less storage
space than ARIES log (on average, … For the online algorithm, we exploit historical statistics to …

Efficient logging in non-volatile memory by exploiting coherency protocols

N Cohen, M Friedman, JR Larus - Proceedings of the ACM on …, 2017 - dl.acm.org
… them, which complicates capturing a consistent snapshot in durable storage. To simplify
software … The cow-array benchmark uses the log less frequently, so it does not benefit from the …

Write-behind logging

J Arulraj, M Perron, A Pavlo - Proceedings of the VLDB Endowment, 2016 - dl.acm.org
… of NVM, and does not exploit its ability to efficiently support … timestamps less than cp before
recording cp in the log. … All the transactions execute with the same snapshot isolation level …

HyPer: A hybrid OLTP&OLAP main memory database system based on virtual memory snapshots

A Kemper, T Neumann - 2011 IEEE 27th International …, 2011 - ieeexplore.ieee.org
… We follow the lock-less approach first advocated in [5] whereby all … the undo log to convert
an action consistent snapshot (… We can also exploit the VM snapshots for creating backup …

DecLog: Decentralized Logging in Non-Volatile Memory for Time Series Database Systems

B Zheng, Y Gao, J Wan, L Yan, L Hu, B Liu… - Proceedings of the …, 2023 - dl.acm.org
… We propose a data-driven LSN approach that exploits the … • We propose a thread snapshot
based parallel logging method … of persisting logs to NVM in multiple threads with less thread …

Multi-snapshot spectrum sensing for cognitive radar via block-sparsity exploitation

A Aubry, V Carotenuto, A De Maio… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… -time sensing signal model formally accounting for multiple snapshots of observations is
introduced. Hence, a new signal processing strategy exploiting the inherent block-sparsity of the …

Clobber-NVM: log less, re-execute more

Y Xu, J Izraelevitz, S Swanson - Proceedings of the 26th ACM …, 2021 - dl.acm.org
… Subsequent work in iDO logging [42] dramatically increased performance by exploiting re…
entries at each boundary require a snapshot of most registers, plus a flush and fence for any …