{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:28:13Z","timestamp":1743136093317,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319635637"},{"type":"electronic","value":"9783319635644"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63564-4_17","type":"book-chapter","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T00:23:01Z","timestamp":1501633381000},"page":"210-218","source":"Crossref","is-referenced-by-count":1,"title":["Precise Data Access on Distributed Log-Structured Merge-Tree"],"prefix":"10.1007","author":[{"given":"Tao","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Huiqi","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Weining","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Aoying","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Mengzhan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,3]]},"reference":[{"key":"17_CR1","unstructured":"PTP. https:\/\/en.wikipedia.org\/wiki\/Precision_Time_Protocol"},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time trade-offs in hash coding with allowable errors. CACM 13, 422\u2013426 (1970)","journal-title":"CACM"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"DeWitt, D., Katz, R., et al.: Implementation techniques for main memory database systems. In: SIGMOD, pp. 1\u20138 (1984)","DOI":"10.1145\/602259.602261"},{"key":"17_CR4","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/128765.128770","volume":"17","author":"C Mohan","year":"1992","unstructured":"Mohan, C., Haderle, D., et al.: ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. TODS 17, 94\u2013162 (1992)","journal-title":"TODS"},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s002360050048","volume":"33","author":"P O\u2019Neil","year":"1996","unstructured":"O\u2019Neil, P., Cheng, E., Gawlick, D., O\u2019Neil, E.: The log-structured merge-tree (LSM-tree). Acta Informatica 33, 351\u2013385 (1996)","journal-title":"Acta Informatica"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Gray, J., Helland, P., O\u2019Neil, P., Shasha, D.: The dangers of replication and a solution. In: SIGMOD, pp. 173\u2013182 (1996)","DOI":"10.1145\/233269.233330"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.T.: The Google file system. In: SOSP, pp. 29\u201343 (2003)","DOI":"10.1145\/945445.945450"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Chang, F., Dean, J., et al.: Bigtable: a distributed storage system for structured data. In: OSDI, pp. 4:1\u20134:26 (2008)","DOI":"10.1145\/1365815.1365816"},{"key":"17_CR9","unstructured":"Peng, D., Dabek, F.: Large-scale incremental processing using distributed transactions and notifications. In: OSDI, pp. 1\u201315 (2010)"},{"key":"17_CR10","unstructured":"Baker, J., Bond, C., et al.: Megastore: providing scalable, highly available storage for interactive services. In: CIDR, pp. 223\u2013234 (2011)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Sears, R., Ramakrishnan, R.: bLSM: a general purpose log structured merge tree. In: SIGMOD, pp. 217\u2013228 (2012)","DOI":"10.1145\/2213836.2213862"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Kemme, B.: Compaction management in distributed key-value datastores. In: PVLDB, pp. 850\u2013861 (2015)","DOI":"10.14778\/2757807.2757810"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63564-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T19:04:51Z","timestamp":1569956691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63564-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319635637","9783319635644"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63564-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}