22
0
0.5
1
1.5
2
2.5
Base
Shuffle
Front Load
Threading
Run Clustering
Compare
Compare w bad
Application
Application w bad
Dependency
Dependency w bad
(a) 92 Users.
0
0.5
1
1.5
2
2.5
Base
Shuffle
Front Load
Threading
Run Clustering
Compare
Compare w bad
Application
Application w bad
Dependency
Dependency w bad
(b) 92 News.
Figure 9: Learner evaluation 92 traces The evaluation results from the 92 traces. Note that none of the learners matches the
best heuristic.
performs better. Because they both use non-optimal approaches, it is reasonable that one works better in
some cases and another in others.
However, the dependency learner does handle the addition of the bad heuristic better than the other
learners; this makes sense because the dependency learner is more aware of context. The bad heuristic is
bad in two ways: first, it adds constraints which will perform poorly. Second, it makes other constraints
look bad, causing the learner to discard what could be useful constraints. Because the dependency learner is
careful about context, it can avoid discarding useful constraints due to influence from constraints from the
bad heuristic.
It is also interesting to notice that sometimes the bad heuristic actually improves performance for the
dependency learner. This may be due to the fact that the learner is better at determining interdependencies,
and can thus pick out the occasional good suggestion among the bad. It is also possible that in some cases
the spread of data that the bad heuristic performs may be beneficial in concert with the other heuristics.
It is also interesting to note the difference between the Cello92 and Cello99 traces. The heuristics
perform fairly well on the Cello92 traces, giving reasonable gains. However, the heuristics perform poorly
on the Cello99 trace, usually causing degraded performance. This is probably due to the fact that the Cello99
traces are much larger, more intricate, and have a larger rate of change. The 99 Reference trace is interesting
in particular, because it is evident that the high rate of change in constraint worth showed in Figure 8 leads
23
0
0.5
1
1.5
2
2.5
Base
Shuffle
Front Load
Threading
Run Clustering
Compare
Compare w bad
Application
Application w bad
Dependency
Dependency w bad
(a) 99 Source.
0
0.5
1
1.5
2
2.5
Base
Shuffle
Front Load
Threading
Run Clustering
Compare
Compare w bad
Application
Application w bad
Dependency
Dependency w bad
(b) 99 Reference.
0
0.5
1
1.5
2
2.5
Base
Shuffle
Front Load
Threading
Run Clustering
Compare
Compare w bad
Application
Application w bad
Dependency
Dependency w bad
(c) 99 Development.
Figure 10: Learner evaluation 99 traces The results of the learner evaluations for the 99 traces. Note that none of the learners
matches the best heuristic.
to poor performance of the learners.
Overall the learners do not perform very well. The learners are never better than the best heuristic,
although they are sometimes close. In addition, the addition of the bad heuristic usually causes significant
degradation in performance.
24
9 Future Work
There are a large number of future directions one could take with this work. We have tried several ad-hoc
approaches to solving the learner problem, but a variety of other methods could applied, including genetic
algorithms or other statistical methods. Extending the dependency learner to sort the list after placing each
constraint would be one interesting option to explore. The fairly short lengths of conflicts suggest that an
extension to the greedy method of conflict resolution which looks forward a few steps before placing each
constraint may also be promising. In addition, thinking about the problem from a block-centric view point
may lead to alternate optimization methods.
As mentioned in the paper, exploration into the granularity of the optimization would also be interesting.
Doing reorganization at a file or other larger granularity may shrink the problem to a more manageable
size.
The heuristic list could also be expanded; the current list is far from exhaustive. It would be interesting
to see how the learner fares with more heuristics, including heuristics using knowledge of data structure,
such as file system information. It could also be useful to further tune the existing heuristics, to improve
their performance.
Additional exploration into the performance analyzer could also be useful. The current analyzer is very
computationally intensive, limiting the number of iterations that can be performed. A faster, less accurate
performance analyzer might yield better results due to its ability to look at more options. Some methods
of performance analysis may also allow efficient evaluation of individual constraint addition or removal,
allowing a more targeted approach to evaluating constraint value. More exploration into the optimal disk
size could also be useful.
10 Conclusion
The concept of a two-tiered learning architecture provides the promise of a flexible and robust way of
combining optimization approaches. However, building a learning agent for such a system has proved
difficult. Unfortunately, constraints are not independent; significant dependency exists both in the value
of constraints and in conflicts between constraints. Our approaches have had some nominal success, but
better approaches will be necessary for a full solution. We have outlined a structure for a two-tiered learning
architecture for disk layout, analyzed the key challenges in building such a system, and suggested directions
for further research. This research also suggests a higher level point; that the problem of policy automation
is difficult in practice.
25
11 Acknowledgements
I would like to thank my advisor Greg Ganger. I would also like to thank the many people who have helped
me with ideas, discussions, and writing code. I especially thank Craig Soules, Eno Thereska, John Strunk,
James Hendricks and Shobha Venkataraman. I am funded by an NSF fellowship.
Links

RAID data recovery, Mac data recovery, Unix data recovery, Linux data recovery, Oracle data recovery, CD data recovery, Zip data recovery, DVD data recovery , Flash data recovery, Laptop data recovery, PDA data recovery, Ipaq data recovery, Maxtor HDD, Hitachi HDD, Fujitsi HDD, Seagate HDD, Hewlett-Packard HDD, HP HDD, IBM HDD, MP3 data recovery, DVD data recovery, CD-RW datbr> action, for example, to decide on the finished product. With
a batchactive scheduler, the key frames would run before
speculative, remaining frames. If upon seeing these frames
the artist changes lighting attributes or moves objects, spec-
ulative frames would be canceled and would not have un-
necessarily competed against the key frames of other team
artists.
1Over a nine month production period, Weta digital em-
ployed 3,200 processors to create Lord of the Rings: The,
Compact flash data recovery, Hard drive data recovery, IDE data recovery, SCSI data recovery, Deskstar data recovery, Maxtor data recovery, Fujitsu HDD data recovery, Samsung data recovery, IBM data recovery, Seagate data recovery, Hitachi data recovery, Western Digital data recovery, Quantum data recovery, Microdrives data recovery, Easy Recovery, Recover deleted data , Data Recovery, Data Recovery Software, Undelete data, Recover, Recovery, Restore data, Unerase deleted data, unformat, Deleted, Data Destorer, fat recovery, Data, Recovery Software, File recovery, Drive Recovery, Recovery Disk , Easy data recovery, Partition recovery, Data Recovery Program, File Recovery, Disaster Recovery, Undelete File, Hard Disk Rrecovery, Win95 Data Recovery, Win98 Data Recovery, WinME data recovery, WinNT 4.x data recovery, WinXP data recovery, Windows2000 data recovery, System Utilities data recovery, File data recovery, Disk Management recovery, BitMart 2000 data recovery, Hard Drive Data Recovery, CompactFlash I, CompactFlash II, CF Compact Flash Type I Card,CF Compact Flash Type II Card, MD Micro Drive Card, XD Picture Card, SM Smart Media Card, MMC I Multi Media Type I Card, MMC II Multi Media Type II Card, RS-MMC Reduced Size Multi Media Card, SD Secure Digital Card, Mini SD Mini Secure Digital Card, TFlash T-Flash Card, MS Memory Stick Card, MS DUO Memory Stick Duo Card, MS PRO Memory Stick PRO Card, MS PRO DUO Memory Stick PRO Duo Card, MS Memory Stick Card MagicGate, MS DUO Memory Stick Duo Card MagicGate, MS PRO Memory Stick PRO Card MagicGate, MS PRO DUO Memory Stick PRO Duo Card MagicGate, MicroDrive Card and TFlash Memory Cards, Digital Camera Memory Card, RS-MMC, ATAPI Drive, JVC JY-HD10U, Secured Data Deletion, IT Security Firewall & Antiviruses, PocketPC Recocery, System File Recovery , RAID