{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:52:31Z","timestamp":1730285551143,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/noms59830.2024.10575383","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T17:23:51Z","timestamp":1719941031000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["An Innovative Bridge Layer Access Control Method to Improve SSD Utilization"],"prefix":"10.1109","author":[{"given":"Feng","family":"Jiang","sequence":"first","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China"}]},{"given":"Yongyang","family":"Cheng","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2019.02.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2679490"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EMSOFT.2013.6658584"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3001262"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDL8076"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2492101.1555371"},{"article-title":"uflip: Understanding flash io patterns","year":"2009","author":"Bouganim","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1275986.1275990"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508271"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1453775.1453783"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3476886.3477520"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319647.3325840"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3060146"},{"key":"ref14","first-page":"1","article-title":"Sfs: random write considered harmful in solid state drives","volume":"12","author":"Min","year":"2012","journal-title":"FAST"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIMUL.2009.17"}],"event":{"name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2024,5,6]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2024,5,10]]}},"container-title":["NOMS 2024-2024 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10574855\/10574897\/10575383.pdf?arnumber=10575383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T06:41:28Z","timestamp":1719988888000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10575383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/noms59830.2024.10575383","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}