{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:02:48Z","timestamp":1775638968636,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,3,1]],"date-time":"2020-03-01T00:00:00Z","timestamp":1583020800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672479"],"award-info":[{"award-number":["61672479"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472376"],"award-info":[{"award-number":["61472376"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2020,3,1]]},"DOI":"10.1109\/tkde.2018.2884714","type":"journal-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T00:17:40Z","timestamp":1544141860000},"page":"519-532","source":"Crossref","is-referenced-by-count":6,"title":["SAL-Hashing: A Self-Adaptive Linear Hashing Index for SSDs"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3871-0548","authenticated-orcid":false,"given":"Peiquan","family":"Jin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5128-8882","authenticated-orcid":false,"given":"Chengcheng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaoliang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Dezhi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"349","article-title":"HiKV: A hybrid index key-value store for DRAM-NVM memory systems","author":"xia","year":"2017","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915251"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1565694.1565698"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511340"},{"key":"ref31","volume":"3","author":"knuth","year":"1973","journal-title":"The art of computer programming"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2463710"},{"key":"ref37","first-page":"167","article-title":"NV-Tree: Reducing consistency cost for NVM-based single level systems","volume":"15","author":"yang","year":"2015","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref36","first-page":"662","article-title":"Optimizing B+-Tree for PCM-based hybrid memory","author":"li","year":"2016","journal-title":"Proc Int Conf Extending Database Technol"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308199"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2011.5749735"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2883591.2883597"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095688"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498260"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247488"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544834"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14778\/2536206.2536215"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0410-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035958"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807614"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236412"},{"key":"ref28","article-title":"Oracle database backup and recovery using dell storage snapshot technologies","author":"mc","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1275986.1275991"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.107"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0406-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E92.A.1716"},{"key":"ref29","article-title":"Using flasharrays for oracle backup and recovery","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920990"},{"key":"ref8","first-page":"3","article-title":"Microhash: An efficient index structure for flash-based sensor devices","author":"zeinalipour-yazti","year":"2005","journal-title":"Proc 4th Usenix Conf File Storage Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICINFA.2010.5512045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WAIM.2008.53"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126615501285"},{"key":"ref1","volume":"654","author":"garcia-molina","year":"2000","journal-title":"Database System Implementation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22922-0_10"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF01762111"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref24","first-page":"301","article-title":"Competitive randomized algorithms for nonuniform problems","author":"karlin","year":"1990","journal-title":"Proc Annu ACM-SIAM Symp Discrete Algorithm"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335385"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/289.291"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8985136\/08565887.pdf?arnumber=8565887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:41:57Z","timestamp":1651070517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8565887\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,1]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2018.2884714","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,1]]}}}