{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:59:18Z","timestamp":1762210758406,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/msst.2013.6558437","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T14:59:15Z","timestamp":1374764355000},"page":"1-6","source":"Crossref","is-referenced-by-count":12,"title":["A deduplication study for host-side caches in virtualized data center environments"],"prefix":"10.1109","author":[{"given":"Jingxin","family":"Feng","sequence":"first","affiliation":[]},{"given":"Jiri","family":"Schindler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A comparison of file system workloads","author":"roselli","year":"2000","journal-title":"USENIX ATC"},{"key":"17","article-title":"Venti: A new approach to archival storage","author":"quinlan","year":"2002","journal-title":"FAST"},{"key":"18","article-title":"Fingerprinting by random polynomials","author":"rabin","year":"1981","journal-title":"Technical Report Center for Research in Computing Technology"},{"key":"15","article-title":"Supporting practical content-addressable caching with CZIP compression","author":"park","year":"2007","journal-title":"USENIX Annual Technical Conference"},{"key":"16","article-title":"Alternatives for detecting redundancy in storage systems data","author":"policroniades","year":"2004","journal-title":"USENIX ATC"},{"key":"13","article-title":"Satori: Enlightened page sharing","author":"mi?o?s","year":"2009","journal-title":"USENIX Annual Technical Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534541"},{"key":"12","article-title":"A study of practical deduplication","author":"meyer","year":"2011","journal-title":"FAST"},{"key":"21","article-title":"Idedup: Latency-aware, inline data deduplication for primary storage","author":"srinivasan","year":"2012","journal-title":"FAST"},{"key":"20","article-title":"A protocol-independent technique for eliminating redundant network traffic","author":"spring","year":"2000","journal-title":"Applications Technologies Architectures and Protocols for Computer Communication"},{"key":"22","article-title":"Generating realistic datasets for deduplication analysis","author":"tarasov","year":"2012","journal-title":"USENIX ATC"},{"key":"23","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/844128.844146","article-title":"Memory resource management in VMware ESX server","volume":"36","author":"waldspurger","year":"2002","journal-title":"SIGOPS Oper Syst Rev"},{"key":"24","article-title":"Characteristics of backup workloads in production systems","author":"wallace","year":"2012","journal-title":"FAST"},{"key":"25","article-title":"Avoiding the disk bottleneck in the data domain deduplication file system","author":"zhu","year":"2008","journal-title":"FAST"},{"key":"3","article-title":"Decentralized deduplication in SAN cluster file systems","author":"clements","year":"2009","journal-title":"USENIX Annual Technical Conference"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2012.6232368"},{"key":"10","article-title":"Measurement and analysis of large-scale network file system workloads","author":"leung","year":"2008","journal-title":"USENIX ATC"},{"key":"1","article-title":"Increasing memory density by using KSM","author":"arcangeli","year":"2009","journal-title":"OLS 09 Proceedings of the Linux Symposium"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2090181.2090187"},{"key":"6","article-title":"Duplicate data elimination in a san file system","author":"hong","year":"2004","journal-title":"MSST"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1831407.1831429"},{"journal-title":"Proceedings of the ASPLOS Workshop on Runtime Environments Systems Layering and Virtualized Environments","article-title":"Ksm++: Using i\/o-based hints to make memorydeduplication scanners more efficient","year":"2012","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2011.49"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534540"}],"event":{"name":"2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST)","start":{"date-parts":[[2013,5,6]]},"location":"Long Beach, CA, USA","end":{"date-parts":[[2013,5,10]]}},"container-title":["2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6554307\/6558419\/06558437.pdf?arnumber=6558437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:49:23Z","timestamp":1498049363000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6558437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/msst.2013.6558437","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}