{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:10:50Z","timestamp":1766268650624,"version":"3.37.3"},"reference-count":73,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Fundamental Research Funds","award":["2018KFYXKJC037"],"award-info":[{"award-number":["2018KFYXKJC037"]}]},{"DOI":"10.13039\/100000001","name":"US NSF","doi-asserted-by":"crossref","award":["CCF-1704504","CCF-1629625"],"award-info":[{"award-number":["CCF-1704504","CCF-1629625"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2019,2,1]]},"DOI":"10.1109\/tpds.2018.2864209","type":"journal-article","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T18:50:32Z","timestamp":1533667832000},"page":"400-414","source":"Crossref","is-referenced-by-count":14,"title":["LSM-Tree Managed Storage for Large-Scale Key-Value Store"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2397-6589","authenticated-orcid":false,"given":"Fei","family":"Mei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9124-0533","authenticated-orcid":false,"given":"Qiang","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1477-9751","authenticated-orcid":false,"given":"Hong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742798"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592804"},{"key":"ref71","article-title":"The multi-streamed solid-state drive","author":"kang","year":"2014","journal-title":"Proceedings of 4th USENIX Workshop on Hot Topics in Storage and File Systems"},{"key":"ref70","first-page":"207","article-title":"Nvmkv: A scalable, lightweight, ftl-aware key-value store","author":"marmol","year":"2015","journal-title":"Proc USENIX Annu Tech Conf"},{"year":"2017","key":"ref39","article-title":"Linux programmer's manual"},{"key":"ref38","first-page":"71","article-title":"Lsm-trie: An lsm-tree-based ultra-large key-value store for small data","author":"wu","year":"2015","journal-title":"Proc USENIX Annu Tech Conf"},{"journal-title":"SQLite","year":"2010","author":"owens","key":"ref33"},{"key":"ref32","first-page":"309","article-title":"I\/o stack optimization for smartphones","author":"jeong","year":"2013","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872392"},{"year":"2007","key":"ref30","article-title":"Atomic commit in sqlite"},{"key":"ref37","first-page":"385","article-title":"Scaling memcache at facebook","author":"nishtala","year":"2013","journal-title":"Proc 10th USENIX Symp Netw Syst Des Implementation"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254766"},{"key":"ref35","first-page":"133","article-title":"Wisckey: Separating keys from values in ssd-conscious storage","author":"lu","year":"2016","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213862"},{"year":"2013","key":"ref60","article-title":"Tokudb: MySQL performance, mariadb performance"},{"key":"ref62","first-page":"17","article-title":"Building workload-independent storage with vt-trees","author":"shetty","year":"2013","journal-title":"Proc 11th USENIX Conf File Storage Technol"},{"key":"ref61","first-page":"145","article-title":"Tablefs: Enhancing metadata efficiency in the local file system","author":"ren","year":"2013","journal-title":"Proc USENIX Annu Tech Conf"},{"article-title":"Bitcask: A log-structured hash table for fast key\/value data","year":"2010","author":"sheehy","key":"ref63"},{"key":"ref28","article-title":"Don't stack your log on my log","author":"yang","year":"2014","journal-title":"Proc Workshop Interactions NVM\/FLASH Operating Syst Workloads"},{"key":"ref64","first-page":"363","article-title":"Triad: Creating synergies between memory, disk and log in log structured key-value stores","author":"balmau","year":"2017","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1151374.1151375"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/320521.320540"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/358699.358703"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1995.513459"},{"key":"ref68","first-page":"537","article-title":"Tucana: Design and implementation of a fast and efficient scale-up key-value store","author":"papagiannis","year":"2016","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3041710.3041713"},{"year":"0","key":"ref2","article-title":"Rocksdb."},{"article-title":"Leveldb","year":"2011","author":"ghemawat","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522726"},{"key":"ref22","first-page":"21","article-title":"The new ext4 filesystem: Current status and future plans","author":"mathur","year":"2007","journal-title":"Proc Linux Symp"},{"key":"ref21","first-page":"433","article-title":"All file systems are not created equal: On the complexity of crafting crash-consistent applications","author":"pillai","year":"2014","journal-title":"Proc 11th USENIX Conf Operating Syst Des Implementation"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2501620.2501623"},{"key":"ref23","first-page":"273","article-title":"F2fs: A new file system for flash storage","author":"lee","year":"2015","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"article-title":"Crash consistency: Fsck and journaling","year":"2015","author":"arpaci-dusseau","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732960"},{"journal-title":"Linux Kernel Development","year":"2005","author":"love","key":"ref51"},{"key":"ref59","first-page":"546","article-title":"Lower bounds for external memory dictionaries","author":"brodal","year":"2003","journal-title":"Proc 14th Annu ACM-SIAM Symp Discrete Algorithms"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1248377.1248393"},{"key":"ref57","first-page":"859","article-title":"On external memory graph traversal","author":"buchsbaum","year":"2000","journal-title":"Proc 11th Annu ACM-SIAM Symp Discrete Algorithms"},{"journal-title":"Data Mining with SQL Server 2005","year":"2005","author":"tang","key":"ref56"},{"year":"2017","key":"ref55","article-title":"Hyperleveldb performance benchmarks"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1145\/3132747.3132765","article-title":"PebblesDB: Simultaneously increasing write throughput and decreasing write amplification in key-value stores","author":"raju","year":"2017","journal-title":"Proc ACM Symp Operat Syst Principles"},{"year":"2009","key":"ref53","article-title":"Linux 2 6 32 - linux kernel newbies"},{"year":"0","key":"ref52","article-title":"The pdflush daemon."},{"key":"ref10","article-title":"Garbage collection","author":"smith","year":"2011","journal-title":"Flash Memory Summit"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534544"},{"key":"ref40","first-page":"339","article-title":"Application-managed flash","author":"lee","year":"2016","journal-title":"Proc USENIX Conf File Storage Technol"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-0647-8_8"},{"year":"2016","key":"ref13","article-title":"SQLite4: LSM Design Overview"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050048"},{"key":"ref15","article-title":"Assert (! defined (sequential i\/o))","author":"li","year":"2014","journal-title":"Proceedings of 4th USENIX Workshop on Hot Topics in Storage and File Systems"},{"key":"ref16","first-page":"49","article-title":"Metadata update performance in file systems","author":"ganger","year":"1994","journal-title":"Proc of the 1st USENIX Conf on Operating Systems Design and Implementation"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/37499.37518"},{"key":"ref18","first-page":"581","article-title":"Fsck - the unix file system check program","author":"kowalski","year":"1990","journal-title":"UNIX Vol II"},{"key":"ref19","article-title":"Consistency without ordering","author":"chidambaram","year":"2012","journal-title":"10th USENIX Symp File Storage Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"ref3","first-page":"601","article-title":"Hadoop-hbase for large-scale data","author":"vora","year":"2011","journal-title":"Proc Int Conf Comput Sci Netw Technol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454167"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"ref8","first-page":"1","article-title":"Sfs: Random write considered harmful in solid state drives","author":"min","year":"2012","journal-title":"Proc 10th USENIX Conf File Storage Technol"},{"year":"2017","key":"ref7","article-title":"The modern engine for metrics and events."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2070050"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2385603.2385607"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2560011"},{"article-title":"Analyzing IO amplification in Linux file systems","year":"2017","author":"mohan","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2005.1609379"},{"article-title":"Data placement for copy-on-write using virtual contiguity","year":"2002","author":"peterson","key":"ref47"},{"article-title":"Life of an ext4 write request","year":"2011","author":"wiki","key":"ref42"},{"year":"2017","key":"ref41","article-title":"Dse 5.1 administrator guide: Changing logging locations"},{"article-title":"From big data to big intelligence","year":"2017","author":"storage","key":"ref44"},{"year":"2016","key":"ref43","article-title":"Types of compaction"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/8613032\/08428463.pdf?arnumber=8428463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:43:49Z","timestamp":1657745029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8428463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,1]]},"references-count":73,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2018.2864209","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"type":"print","value":"1045-9219"},{"type":"electronic","value":"1558-2183"},{"type":"electronic","value":"2161-9883"}],"subject":[],"published":{"date-parts":[[2019,2,1]]}}}