A survey and classification of storage deduplication systems

J Paulo, J Pereira - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
The automatic elimination of duplicate data in a storage system, commonly known as
deduplication, is increasingly accepted as an effective technique to reduce storage costs …

Characterizing, modeling, and benchmarking {RocksDB}{Key-Value} workloads at facebook

Z Cao, S Dong, S Vemuri, DHC Du - 18th USENIX Conference on File …, 2020 - usenix.org
Persistent key-value stores are widely used as building blocks in today's IT infrastructure for
managing and storing large amounts of data. However, studies of characterizing real-world …

Elastic sketch: Adaptive and fast network-wide measurements

T Yang, J Jiang, P Liu, Q Huang, J Gong… - Proceedings of the …, 2018 - dl.acm.org
When network is undergoing problems such as congestion, scan attack, DDoS attack, etc.,
measurements are much more important than usual. In this case, traffic characteristics …

Netcache: Balancing key-value stores with fast in-network caching

X Jin, X Li, H Zhang, R Soulé, J Lee, N Foster… - Proceedings of the 26th …, 2017 - dl.acm.org
We present NetCache, a new key-value store architecture that leverages the power and
flexibility of new-generation programmable switches to handle queries on hot items and …

Cuckoo filter: Practically better than bloom

B Fan, DG Andersen, M Kaminsky… - Proceedings of the 10th …, 2014 - dl.acm.org
In many networking systems, Bloom filters are used for high-speed set membership tests.
They permit a small fraction of false positive answers with very good space efficiency …

Wisckey: Separating keys from values in ssd-conscious storage

L Lu, TS Pillai, H Gopalakrishnan… - ACM Transactions On …, 2017 - dl.acm.org
We present WiscKey, a persistent LSM-tree-based key-value store with a performance-
oriented data layout that separates keys from values to minimize I/O amplification. The …

Pebblesdb: Building key-value stores using fragmented log-structured merge trees

P Raju, R Kadekodi, V Chidambaram… - Proceedings of the 26th …, 2017 - dl.acm.org
Key-value stores such as LevelDB and RocksDB offer excellent write throughput, but suffer
high write amplification. The write amplification problem is due to the Log-Structured Merge …

[图书][B] The stuff of bits: An essay on the materialities of information

P Dourish - 2022 - books.google.com
An argument that the material arrangements of information—how it is represented and
interpreted—matter significantly for our experience of information and information systems …

In-memory big data management and processing: A survey

H Zhang, G Chen, BC Ooi, KL Tan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Growing main memory capacity has fueled the development of in-memory big data
management and processing. By eliminating disk I/O bottleneck, it is now possible to support …

Using RDMA efficiently for key-value services

A Kalia, M Kaminsky, DG Andersen - … of the 2014 ACM Conference on …, 2014 - dl.acm.org
This paper describes the design and implementation of HERD, a key-value system designed
to make the best use of an RDMA network. Unlike prior RDMA-based key-value systems …