{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:58:31Z","timestamp":1762210711837,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,4]],"date-time":"2012-06-04T00:00:00Z","timestamp":1338768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,4]]},"DOI":"10.1145\/2367589.2367600","type":"proceedings-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T13:01:27Z","timestamp":1347454887000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Reducing impact of data fragmentation caused by in-line deduplication"],"prefix":"10.1145","author":[{"given":"Michal","family":"Kaczmarczyk","sequence":"first","affiliation":[{"name":"9LivesData, LLC"}]},{"given":"Marcin","family":"Barczynski","sequence":"additional","affiliation":[{"name":"9LivesData, LLC"}]},{"given":"Wojciech","family":"Kilian","sequence":"additional","affiliation":[{"name":"9LivesData, LLC"}]},{"given":"Cezary","family":"Dubnicki","sequence":"additional","affiliation":[{"name":"9LivesData, LLC"}]}],"member":"320","published-online":{"date-parts":[[2012,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534539"},{"key":"e_1_3_2_1_2_1","volume-title":"Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations","author":"Asaro T.","year":"2007","unstructured":"T. Asaro and H. Biggar . Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations , 2007 . The Enterprise Strategy Group . T. Asaro and H. Biggar. Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations, 2007. The Enterprise Strategy Group."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2009.5366623"},{"key":"e_1_3_2_1_4_1","volume-title":"Experiencing Data De-Duplication: Improving Efficiency and Reducing Capacity Requirements","author":"Biggar H.","year":"2007","unstructured":"H. Biggar . Experiencing Data De-Duplication: Improving Efficiency and Reducing Capacity Requirements , 2007 . The Enterprise Strategy Group . H. Biggar. Experiencing Data De-Duplication: Improving Efficiency and Reducing Capacity Requirements, 2007. The Enterprise Strategy Group."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060316"},{"key":"e_1_3_2_1_7_1","volume-title":"2010 USENIX Annual Technical Conference","author":"Debnath B.","year":"2010","unstructured":"B. Debnath , S. Sengupta , and J. Li . Chunkstash: Speeding up inline storage deduplication using flash memory . In 2010 USENIX Annual Technical Conference , June 2010 . B. Debnath, S. Sengupta, and J. Li. Chunkstash: Speeding up inline storage deduplication using flash memory. In 2010 USENIX Annual Technical Conference, June 2010."},{"key":"e_1_3_2_1_8_1","first-page":"15","volume-title":"Proceedings of the 9th USENIX conference on File and Storage Technologies, FAST'11","author":"Dong W.","year":"2011","unstructured":"W. Dong , F. Douglis , K. Li , H. Patterson , S. Reddy , and P. Shilane . Tradeoffs in scalable data routing for deduplication clusters . In Proceedings of the 9th USENIX conference on File and Storage Technologies, FAST'11 , pages 15 -- 29 , Berkeley, CA, USA , 2011 . USENIX Association. W. Dong, F. Douglis, K. Li, H. Patterson, S. Reddy, and P. Shilane. Tradeoffs in scalable data routing for deduplication clusters. In Proceedings of the 9th USENIX conference on File and Storage Technologies, FAST'11, pages 15--29, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_9_1","first-page":"197","volume-title":"FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies","author":"Dubnicki C.","year":"2009","unstructured":"C. Dubnicki , L. Gryz , L. Heldt , M. Kaczmarczyk , W. Kilian , P. Strzelczak , J. Szczepkowski , C. Ungureanu , and M. Welnicki . HYDRAstor: a Scalable Secondary Storage . In FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies , pages 197 -- 210 , Berkeley, CA, USA , 2009 . USENIX Association. C. Dubnicki, L. Gryz, L. Heldt, M. Kaczmarczyk, W. Kilian, P. Strzelczak, J. Szczepkowski, C. Ungureanu, and M. Welnicki. HYDRAstor: a Scalable Secondary Storage. In FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies, pages 197--210, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032647.1033298"},{"key":"e_1_3_2_1_11_1","volume-title":"September","author":"Eastlake D. E.","year":"2001","unstructured":"D. E. Eastlake and P. E. Jones . US Secure Hash Algorithm 1 (SHA1). RFC 3174 (Informational) , September 2001 . D. E. Eastlake and P. E. Jones. US Secure Hash Algorithm 1 (SHA1). RFC 3174 (Informational), September 2001."},{"key":"e_1_3_2_1_12_1","volume-title":"Backup and recovery with global deduplication","author":"Avamar EMC","year":"2008","unstructured":"EMC Avamar : Backup and recovery with global deduplication , 2008 . http:\/\/www.emc.com\/avamar. EMC Avamar: Backup and recovery with global deduplication, 2008. http:\/\/www.emc.com\/avamar."},{"key":"e_1_3_2_1_13_1","volume-title":"January","author":"EMC Center","year":"2008","unstructured":"EMC Center a : Content addressed storage system , January 2008 . http:\/\/www.emc.com\/centera. EMC Centera: Content addressed storage system, January 2008. http:\/\/www.emc.com\/centera."},{"key":"e_1_3_2_1_14_1","volume-title":"Data Domain Global Deduplication Array","author":"EMC Corporation","year":"2011","unstructured":"EMC Corporation : Data Domain Global Deduplication Array , 2011 . http:\/\/www.datadomain.com\/products\/global-deduplication-array.html. EMC Corporation: Data Domain Global Deduplication Array, 2011. http:\/\/www.datadomain.com\/products\/global-deduplication-array.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Archiving and Disaster Recovery","author":"EMC Corporation","year":"2011","unstructured":"EMC Corporation : DataDomain - Deduplication Storage for Backup , Archiving and Disaster Recovery , 2011 . http:\/\/www.datadomain.com. EMC Corporation: DataDomain - Deduplication Storage for Backup, Archiving and Disaster Recovery, 2011. http:\/\/www.datadomain.com."},{"key":"e_1_3_2_1_16_1","unstructured":"Exagrid. http:\/\/www.exagrid.com.  Exagrid. http:\/\/www.exagrid.com."},{"key":"e_1_3_2_1_17_1","volume-title":"May","author":"Floyer D.","year":"2011","unstructured":"D. Floyer . Wikibon Data De-duplication Performance Tables. Wikibon.org , May 2011 . http:\/\/wikibon.org\/wiki\/v\/Wikibon_Data_De-duplication_Performance_Tables. D. Floyer. Wikibon Data De-duplication Performance Tables. Wikibon.org, May 2011. http:\/\/wikibon.org\/wiki\/v\/Wikibon_Data_De-duplication_Performance_Tables."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837915.1837921"},{"key":"e_1_3_2_1_19_1","first-page":"239","volume-title":"Proceedings of the 8th USENIX conference on File and Storage Technologies, FAST'10","author":"Kruus E.","year":"2010","unstructured":"E. Kruus , C. Ungureanu , and C. Dubnicki . Bimodal content defined chunking for backup streams . In Proceedings of the 8th USENIX conference on File and Storage Technologies, FAST'10 , pages 239 -- 252 , Berkeley, CA, USA , 2010 . USENIX Association. E. Kruus, C. Ungureanu, and C. Dubnicki. Bimodal content defined chunking for backup streams. In Proceedings of the 8th USENIX conference on File and Storage Technologies, FAST'10, pages 239--252, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_20_1","first-page":"111","volume-title":"FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies","author":"Lillibridge M.","year":"2009","unstructured":"M. Lillibridge , K. Eshghi , D. Bhagwat , V. Deolalikar , G. Trezis , and P. Camble . Sparse indexing: Large scale, inline deduplication using sampling and locality . In FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies , pages 111 -- 123 , 2009 . M. Lillibridge, K. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezis, and P. Camble. Sparse indexing: Large scale, inline deduplication using sampling and locality. In FAST'09: Proceedings of the 7th USENIX Conference on File and Storage Technologies, pages 111--123, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"January","author":"Livens J.","year":"2009","unstructured":"J. Livens . Deduplication and restore performance. Wikibon.org , January 2009 . http:\/\/wikibon.org\/wiki\/v\/Deduplication_and_restore_performance. J. Livens. Deduplication and restore performance. Wikibon.org, January 2009. http:\/\/wikibon.org\/wiki\/v\/Deduplication_and_restore_performance."},{"key":"e_1_3_2_1_22_1","volume-title":"June","author":"Livens J.","year":"2009","unstructured":"J. Livens . Defragmentation , rehydration and deduplication. AboutRestore.com , June 2009 . http:\/\/www.aboutrestore.com\/2009\/06\/24\/defragmentation-rehydration-and-deduplication\/. J. Livens. Defragmentation, rehydration and deduplication. AboutRestore.com, June 2009. http:\/\/www.aboutrestore.com\/2009\/06\/24\/defragmentation-rehydration-and-deduplication\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496992"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1383422.1383428"},{"key":"e_1_3_2_1_26_1","volume-title":"HYDRAstor Grid Storage System","author":"NEC Corporation","year":"2008","unstructured":"NEC Corporation . HYDRAstor Grid Storage System , 2008 . http:\/\/www.hydrastor.com. NEC Corporation. HYDRAstor Grid Storage System, 2008. http:\/\/www.hydrastor.com."},{"key":"e_1_3_2_1_27_1","volume-title":"June","author":"Preston W. C.","year":"2009","unstructured":"W. C. Preston . The Rehydration Myth. BackupCentral.com , June 2009 . http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/247-rehydration-myth.html\/. W. C. Preston. The Rehydration Myth. BackupCentral.com, June 2009. http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/247-rehydration-myth.html\/."},{"key":"e_1_3_2_1_28_1","volume-title":"April","author":"Preston W. C.","year":"2010","unstructured":"W. C. Preston . Restoring deduped data in deduplication systems. SearchDataBackup.com , April 2010 . http:\/\/searchdatabackup.techtarget.com\/feature\/Restoring-deduped-data-in-deduplication-systems. W. C. Preston. Restoring deduped data in deduplication systems. SearchDataBackup.com, April 2010. http:\/\/searchdatabackup.techtarget.com\/feature\/Restoring-deduped-data-in-deduplication-systems."},{"key":"e_1_3_2_1_29_1","volume-title":"November","author":"Preston W. C.","year":"2010","unstructured":"W. C. Preston . Solving common data deduplication system problems. SearchDataBackup.com , November 2010 . http:\/\/searchdatabackup.techtarget.com\/feature\/Solving-common-data-deduplication-system-problems. W. C. Preston. Solving common data deduplication system problems. SearchDataBackup.com, November 2010. http:\/\/searchdatabackup.techtarget.com\/feature\/Solving-common-data-deduplication-system-problems."},{"key":"e_1_3_2_1_30_1","volume-title":"October","author":"Preston W. C.","year":"2010","unstructured":"W. C. Preston . Target deduplication appliance performance comparison. BackupCentral.com , October 2010 . http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/348-target-deduplication-appliance-performance-comparison.html. W. C. Preston. Target deduplication appliance performance comparison. BackupCentral.com, October 2010. http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/348-target-deduplication-appliance-performance-comparison.html."},{"key":"e_1_3_2_1_31_1","volume-title":"DXi Deduplication Solution","author":"Quantum Corporation","year":"2011","unstructured":"Quantum Corporation : DXi Deduplication Solution , 2011 . http:\/\/www.quantum.com. Quantum Corporation: DXi Deduplication Solution, 2011. http:\/\/www.quantum.com."},{"key":"e_1_3_2_1_32_1","first-page":"89","volume-title":"FAST'02: Proceedings of the Conference on File and Storage Technologies","author":"Quinlan S.","year":"2002","unstructured":"S. Quinlan and S. Dorward . Venti: A new approach to archival storage . In FAST'02: Proceedings of the Conference on File and Storage Technologies , pages 89 -- 101 , Berkeley, CA, USA , 2002 . USENIX Association. S. Quinlan and S. Dorward. Venti: A new approach to archival storage. In FAST'02: Proceedings of the Conference on File and Storage Technologies, pages 89--101, Berkeley, CA, USA, 2002. USENIX Association."},{"key":"e_1_3_2_1_33_1","volume-title":"Harvard University","author":"Rabin M.","year":"1981","unstructured":"M. Rabin . Fingerprinting by random polynomials. Technical report, Center for Research in Computing Technology , Harvard University , New York, NY, USA , 1981 . M. Rabin. Fingerprinting by random polynomials. Technical report, Center for Research in Computing Technology, Harvard University, New York, NY, USA, 1981."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1987816.1987837"},{"key":"e_1_3_2_1_35_1","unstructured":"SEPATON Scalable Data Deduplication Solutions. http:\/\/sepaton.com\/solutions\/data-deduplication.  SEPATON Scalable Data Deduplication Solutions. http:\/\/sepaton.com\/solutions\/data-deduplication."},{"key":"e_1_3_2_1_36_1","volume-title":"August","author":"Whitehouse L.","year":"2008","unstructured":"L. Whitehouse . Restoring deduped data. searchdatabackup.techtarget.com , August 2008 . http:\/\/searchdatabackup.techtarget.com\/tip\/Restoring-deduped-data. L. Whitehouse. Restoring deduped data. searchdatabackup.techtarget.com, August 2008. http:\/\/searchdatabackup.techtarget.com\/tip\/Restoring-deduped-data."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1364813.1364831"}],"event":{"name":"SYSTOR '12: The 5th Annual International Systems and Storage Conference","sponsor":["The Technion - Israel Institute of Techn. The Technion - Israel Institute of Technology"],"location":"Haifa Israel","acronym":"SYSTOR '12"},"container-title":["Proceedings of the 5th Annual International Systems and Storage Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2367589.2367600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2367589.2367600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:49Z","timestamp":1750236529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2367589.2367600"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,4]]},"references-count":37,"alternative-id":["10.1145\/2367589.2367600","10.1145\/2367589"],"URL":"https:\/\/doi.org\/10.1145\/2367589.2367600","relation":{},"subject":[],"published":{"date-parts":[[2012,6,4]]},"assertion":[{"value":"2012-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}