{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T17:00:10Z","timestamp":1725642010101},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642255748"},{"type":"electronic","value":"9783642255755"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25575-5_6","type":"book-chapter","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T01:05:26Z","timestamp":1323651926000},"page":"61-72","source":"Crossref","is-referenced-by-count":0,"title":["Predicting Disk Scheduling Performance with Virtual Machines"],"prefix":"10.1007","author":[{"given":"Robert","family":"Geist","sequence":"first","affiliation":[]},{"given":"Zachary H.","family":"Jones","sequence":"additional","affiliation":[]},{"given":"James","family":"Westall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1147\/rd.255.0483","volume":"25","author":"R. Creasy","year":"1981","unstructured":"Creasy, R.: The origin of the VM\/370 time-sharing system. IBM Journal of Research & Development\u00a025, 483\u2013490 (1981)","journal-title":"IBM Journal of Research & Development"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1145\/361011.361073","volume":"17","author":"G.J. Popek","year":"1974","unstructured":"Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Commun. ACM\u00a017, 412\u2013421 (1974)","journal-title":"Commun. ACM"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Robin, J.S., Irvine, C.E.: Analysis of the Intel\u00aePentium\u2019sTMability to support a secure virtual machine monitor. In: Proc. of the 9th Conf. on USENIX Security Symposium (SSYM 2000), pp. 10\u201310. USENIX Assoc., Berkeley (2000)","DOI":"10.21236\/ADA423654"},{"key":"6_CR4","unstructured":"VMWare, Inc.: Understanding full virtualization, paravirtualization, and hardware assist (2007), http:\/\/www.vmware.com\/files\/pdf\/VMware_paravirtualization.pdf"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauery, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proc. 19th ACM Symp. on Operating System Principles, Bolton Landing, New York, pp. 164\u2013177 (2003)","DOI":"10.1145\/945445.945462"},{"key":"6_CR6","unstructured":"Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: kvm: the Linux virtual machine monitor. In: Proceedings of the Linux Symposium, Ottawa, Ontario, Canada, pp. 225\u2013230 (2007)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Geist, R., Jones, Z., Westall, J.: Virtualizing high-performance graphics cards for driver design and development. In: Proc. 19th Annual Int. Conf. of the IBM Centers for Advanced Studies (CASCON 2009), Toronto, Ontario, Canada (2009)","DOI":"10.1145\/1723028.1723058"},{"key":"6_CR8","unstructured":"Geist, R., Jones, Z., Westall, J.: Virtualization of an advanced course in operating systems. In: Proc. 3rd Int. Conf. on the Virtual Computing Initiative (ICVCI3), Raleigh, North Carolina (2009)"},{"key":"6_CR9","unstructured":"Jones, Z.H.: A Framework for Virtual Device Driver Development and Virtual Device-Based Performance Modeling. PhD thesis, Clemson University (2010)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1137\/0211005","volume":"11","author":"E. Coffman","year":"1982","unstructured":"Coffman, E., Hofri, M.: On the expected performance of scanning disks. SIAM J. on Computing\u00a011, 60\u201370 (1982)","journal-title":"SIAM J. on Computing"},{"key":"6_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/BF01158396","volume":"2","author":"E.G. Coffman","year":"1987","unstructured":"Coffman Jr., E.G., Gilbert, E.N.: Polling and greedy servers on a line. Queueing Syst. 2, 115\u2013145 (1987)","journal-title":"Queueing Syst."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/7351.8929","volume":"5","author":"R. Geist","year":"1987","unstructured":"Geist, R., Daniel, S.: A continuum of disk scheduling algorithms. ACM TOCS\u00a05, 77\u201392 (1987)","journal-title":"ACM TOCS"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Worthington, B.L., Ganger, G.R., Patt, Y.N.: Scheduling algorithms for modern disk drives. In: Proceedings of the 1994 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems, Nashville, TN, USA, pp. 241\u2013251 (1994)","DOI":"10.1145\/183018.183045"},{"key":"6_CR14","unstructured":"Pratt, S., Heger, D.A.: Workload dependent performance evaluation of the Linux 2.6 i\/o schedulers. In: Proc. of the Linux Symposium, Ottawa, Ontario, vol.\u00a02, pp. 425\u2013448 (2004)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Geist, R., Ross, R.: Disk scheduling revisited: Can o(n 2) algorithms compete? In: Proc. of the 35th Annual ACM SE Conf., Murfreesboro, Tennessee, pp. 51\u201356 (1997)","DOI":"10.1145\/2817460.2817473"},{"key":"6_CR16","unstructured":"Bellman, R.E.: Dynamic Programming. Dover Publications (2003) (incorporated)"},{"key":"6_CR17","unstructured":"Geist, R., Steele, J., Westall, J.: Enhancing webserver performance through the use of a drop-in, statically optimal, disk scheduler. In: Proc. of the 31st Annual Int. Conf. of the Computer Measurement Group (CMG 2005), Orlando, Florida, pp. 697\u2013706 (2005)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1145\/502034.502046","volume-title":"SOSP 2001: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles","author":"S. Iyer","year":"2001","unstructured":"Iyer, S., Druschel, P.: Anticipatory scheduling: a disk scheduling framework to overcome deceptive idleness in synchronous i\/o. In: SOSP 2001: Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, pp. 117\u2013130. ACM, New York (2001)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Barford, P., Crovella, M.: Generating representative web workloads for network and server performance evaluation. In: Proc. ACM SIGMETRICS Measurement and Modeling of Computer Systems, pp. 151\u2013160 (1998)","DOI":"10.1145\/277851.277897"},{"key":"6_CR20","unstructured":"Douglas Gilbert: sdparm utility 1.03 (2008), http:\/\/sg.danny.cz\/sg\/sdparm.html"},{"key":"6_CR21","unstructured":"Qian, J., Meyers, C.R., Wang, A.I.A.: A Linux implementation validation of track-aligned extents and track-aligned raids. In: USENIX Annual Technical Conference, Boston, MA, pp. 261\u2013266 (2008)"},{"key":"6_CR22","unstructured":"Seagate Technology LLC: Product Manual Cheetah 15K.4 SCSI. Pub. no. 100220456, rev. d edn., Scotts Valley, CA (2005)"}],"container-title":["Lecture Notes in Computer Science","Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25575-5_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:26:14Z","timestamp":1606188374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25575-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642255748","9783642255755"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25575-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}