Home > Publications database > Inspection of I/O Operations from System Call Traces using Directly-Follows-Graph > print |
001 | 1037189 | ||
005 | 20250804115242.0 | ||
024 | 7 | _ | |a 10.1109/SCW63240.2024.00196 |2 doi |
024 | 7 | _ | |a 10.34734/FZJ-2025-00534 |2 datacite_doi |
024 | 7 | _ | |a WOS:001451792300160 |2 WOS |
037 | _ | _ | |a FZJ-2025-00534 |
100 | 1 | _ | |a Sankaran, Aravind |0 P:(DE-Juel1)200513 |b 0 |e Corresponding author |u fzj |
111 | 2 | _ | |a SC24-W: Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis |g SC24 |c Atlanta |d 2024-11-17 - 2024-11-22 |w GA |
245 | _ | _ | |a Inspection of I/O Operations from System Call Traces using Directly-Follows-Graph |
260 | _ | _ | |c 2024 |b IEEE |
295 | 1 | 0 | |a SC24-W: Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis : [Proceedings] |
300 | _ | _ | |a 1562-1575 |
336 | 7 | _ | |a CONFERENCE_PAPER |2 ORCID |
336 | 7 | _ | |a Conference Paper |0 33 |2 EndNote |
336 | 7 | _ | |a INPROCEEDINGS |2 BibTeX |
336 | 7 | _ | |a conferenceObject |2 DRIVER |
336 | 7 | _ | |a Output Types/Conference Paper |2 DataCite |
336 | 7 | _ | |a Contribution to a conference proceedings |b contrib |m contrib |0 PUB:(DE-HGF)8 |s 1736839638_548 |2 PUB:(DE-HGF) |
336 | 7 | _ | |a Contribution to a book |0 PUB:(DE-HGF)7 |2 PUB:(DE-HGF) |m contb |
520 | _ | _ | |a We aim to identify the differences in Input/Output (I/O) behavior between multiple user programs through the inspection of system calls (i.e., requests made to the operating system). A typical program issues a large number of I/O requests to the operating system, thereby making the process of inspection challenging. In this paper, we address this challenge by presenting a methodology to synthesize I/O system call traces into a specific type of directed graph, known as the Directly-Follows-Graph (DFG). Based on the DFG, we present a technique to compare the traces from multiple programs or different configurations of the same program, such that it is possible to identify the differences in the I/O behavior. We apply our methodology to the IOR benchmark, and compare the contentions for file accesses when the benchmark is run with different options for file output and software interface. |
536 | _ | _ | |a 5112 - Cross-Domain Algorithms, Tools, Methods Labs (ATMLs) and Research Groups (POF4-511) |0 G:(DE-HGF)POF4-5112 |c POF4-511 |f POF IV |x 0 |
536 | _ | _ | |a BMBF 01 1H1 6013, NRW 325 – 8.03 – 133340 - SiVeGCS (DB001492) |0 G:(DE-Juel-1)DB001492 |c DB001492 |x 1 |
536 | _ | _ | |a GRK 2379 - GRK 2379: Hierarchische und hybride Ansätze für moderne inverse Probleme (333849990) |0 G:(GEPRIS)333849990 |c 333849990 |x 2 |
536 | _ | _ | |0 G:(DE-Juel-1)ATMLAO |a ATMLAO - ATML Application Optimization and User Service Tools (ATMLAO) |c ATMLAO |x 3 |
588 | _ | _ | |a Dataset connected to CrossRef Conference |
700 | 1 | _ | |a Zhukov, Ilya |0 P:(DE-Juel1)144419 |b 1 |u fzj |
700 | 1 | _ | |a Frings, Wolfgang |0 P:(DE-Juel1)132108 |b 2 |u fzj |
700 | 1 | _ | |a Bientinesi, Paolo |0 P:(DE-HGF)0 |b 3 |
770 | _ | _ | |z 979-8-3503-5554-3 |
773 | _ | _ | |a 10.1109/SCW63240.2024.00196 |
856 | 4 | _ | |u https://ieeexplore.ieee.org/abstract/document/10820572/figures#figures |
856 | 4 | _ | |u https://juser.fz-juelich.de/record/1037189/files/Slides.pdf |y OpenAccess |
856 | 4 | _ | |u https://juser.fz-juelich.de/record/1037189/files/preprint.pdf |y OpenAccess |
909 | C | O | |o oai:juser.fz-juelich.de:1037189 |p openaire |p open_access |p VDB |p driver |p dnbdelivery |
910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 0 |6 P:(DE-Juel1)200513 |
910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 1 |6 P:(DE-Juel1)144419 |
910 | 1 | _ | |a Forschungszentrum Jülich |0 I:(DE-588b)5008462-8 |k FZJ |b 2 |6 P:(DE-Juel1)132108 |
913 | 1 | _ | |a DE-HGF |b Key Technologies |l Engineering Digital Futures – Supercomputing, Data Management and Information Security for Knowledge and Action |1 G:(DE-HGF)POF4-510 |0 G:(DE-HGF)POF4-511 |3 G:(DE-HGF)POF4 |2 G:(DE-HGF)POF4-500 |4 G:(DE-HGF)POF |v Enabling Computational- & Data-Intensive Science and Engineering |9 G:(DE-HGF)POF4-5112 |x 0 |
914 | 1 | _ | |y 2024 |
915 | _ | _ | |a OpenAccess |0 StatID:(DE-HGF)0510 |2 StatID |
920 | _ | _ | |l yes |
920 | 1 | _ | |0 I:(DE-Juel1)JSC-20090406 |k JSC |l Jülich Supercomputing Center |x 0 |
980 | _ | _ | |a contrib |
980 | _ | _ | |a VDB |
980 | _ | _ | |a UNRESTRICTED |
980 | _ | _ | |a contb |
980 | _ | _ | |a I:(DE-Juel1)JSC-20090406 |
980 | 1 | _ | |a FullTexts |
Library | Collection | CLSMajor | CLSMinor | Language | Author |
---|