{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:22Z","timestamp":1750308202241,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,9,19]],"date-time":"2004-09-19T00:00:00Z","timestamp":1095552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,9,19]]},"DOI":"10.1145\/1133572.1133593","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Position"],"prefix":"10.1145","author":[{"given":"Fred","family":"Douglis","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"John","family":"Palmer","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center"}]},{"given":"Elizabeth S.","family":"Richards","sequence":"additional","affiliation":[{"name":"U.S. Department of Defense"}]},{"given":"David","family":"Tao","sequence":"additional","affiliation":[{"name":"U.S. Department of Defense"}]},{"given":"William H.","family":"Tetzlaff","sequence":"additional","affiliation":[{"name":"IBM Almaden Research Center"}]},{"given":"John M.","family":"Tracey","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2004,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the","author":"Blackwell T.","year":"1995","unstructured":"T. Blackwell , J. Harris , and M. Seltzer . Heuristic Cleaning Algorithms in Log-Structured File Systems . In Proceedings of the Winter 1995 USENIX Conference , January 1995.]] T. Blackwell, J. Harris, and M. Seltzer. Heuristic Cleaning Algorithms in Log-Structured File Systems. In Proceedings of the Winter 1995 USENIX Conference, January 1995.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the First Biennial Conference on Innovative Data Systems Research (CIDR)","author":"S. Chandrasekaran","year":"2003","unstructured":"S. Chandrasekaran et al. TelegraphCQ : Continuous dataflow processing for an uncertain world . In Proceedings of the First Biennial Conference on Innovative Data Systems Research (CIDR) , 2003 .]] S. Chandrasekaran et al. TelegraphCQ: Continuous dataflow processing for an uncertain world. In Proceedings of the First Biennial Conference on Innovative Data Systems Research (CIDR), 2003.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645484.656532"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75583"},{"key":"e_1_3_2_1_5_1","unstructured":"Raxco Software Inc. A tutorial on disk defragmentation for windows nt\/2000\/xp and windows server 2003. http:\/\/www.raxco.com\/products\/perfectdisk2k\/whitepapers\/defrag_tutorial%.pdf May 2003.]]  Raxco Software Inc. A tutorial on disk defragmentation for windows nt\/2000\/xp and windows server 2003. http:\/\/www.raxco.com\/products\/perfectdisk2k\/whitepapers\/defrag_tutorial%.pdf May 2003.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502046"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/989.990"},{"key":"e_1_3_2_1_8_1","first-page":"10120","article-title":"An age-threshold algorithm for garbage collection in log-structured arrays and file systems","author":"Menon J.","year":"1998","unstructured":"J. Menon and L. Stockmeyer . An age-threshold algorithm for garbage collection in log-structured arrays and file systems . IBM Research Report RJ 10120 , 1998 .]] J. Menon and L. Stockmeyer. An age-threshold algorithm for garbage collection in log-structured arrays and file systems. IBM Research Report RJ 10120, 1998.]]","journal-title":"IBM Research Report RJ"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/65762.65765"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224064"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319159"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the","author":"Seltzer M.","year":"1993","unstructured":"M. Seltzer , K. Bostic , M. McKusick , and C. Staelin . An Implementation of a Log-Structured File System for UNIX . In Proceedings of the Winter 1993 USENIX Conference, pages 307- -326, January 1993.]] M. Seltzer, K. Bostic, M. McKusick, and C. Staelin. An Implementation of a Log-Structured File System for UNIX. In Proceedings of the Winter 1993 USENIX Conference, pages 307--326, January 1993.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083323.1083329"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224065"},{"key":"e_1_3_2_1_16_1","first-page":"3","volume-title":"Bulletin of the Technical Committee on Data Engineering","author":"Stan","year":"2003","unstructured":"Stan Zdonik et al. The aurora and medusa projects . Bulletin of the Technical Committee on Data Engineering , pages 3 -- 10 , March 2003 .]] Stan Zdonik et al. The aurora and medusa projects. Bulletin of the Technical Committee on Data Engineering, pages 3--10, March 2003.]]"}],"event":{"name":"EW04: ACM SIGOPS European Workshop 2004","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Leuven Belgium","acronym":"EW04"},"container-title":["Proceedings of the 11th workshop on ACM SIGOPS European workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1133572.1133593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1133572.1133593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:05Z","timestamp":1750263905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1133572.1133593"}},"subtitle":["short object lifetimes require a delete-optimized storage system"],"short-title":[],"issued":{"date-parts":[[2004,9,19]]},"references-count":16,"alternative-id":["10.1145\/1133572.1133593","10.1145\/1133572"],"URL":"https:\/\/doi.org\/10.1145\/1133572.1133593","relation":{},"subject":[],"published":{"date-parts":[[2004,9,19]]},"assertion":[{"value":"2004-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}