{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:20Z","timestamp":1772164040293,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,14]],"date-time":"2015-03-14T00:00:00Z","timestamp":1426291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91118008"],"award-info":[{"award-number":["91118008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China HGJ Program","award":["2013ZX01039-002-001"],"award-info":[{"award-number":["2013ZX01039-002-001"]}]},{"name":"China 973 Program","award":["2011CB302602"],"award-info":[{"award-number":["2011CB302602"]}]},{"name":"China 863 Program","award":["2013AA01A213"],"award-info":[{"award-number":["2013AA01A213"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,14]]},"DOI":"10.1145\/2731186.2731190","type":"proceedings-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T08:27:54Z","timestamp":1426580874000},"page":"215-228","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PARS"],"prefix":"10.1145","author":[{"given":"Lei","family":"Cui","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Tianyu","family":"Wo","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Jianxin","family":"Li","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Bin","family":"Shi","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Jinpeng","family":"Huai","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"National center for biotechnology information. ftp:\/\/ftp.ncbi.nih.gov.  National center for biotechnology information. ftp:\/\/ftp.ncbi.nih.gov."},{"key":"e_1_3_2_1_2_1","unstructured":"Elasticsearch. http:\/\/www.elasticsearch.org\/.  Elasticsearch. http:\/\/www.elasticsearch.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Hdfs. http:\/\/hadoop.apache.org\/.  Hdfs. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Mummer. http:\/\/mummer.sourceforge.net\/.  Mummer. http:\/\/mummer.sourceforge.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Mysql. http:\/\/www.mysql.com\/.  Mysql. http:\/\/www.mysql.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Sysbench. http:\/\/sysbench.sourceforge.net\/.  Sysbench. http:\/\/sysbench.sourceforge.net\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Weibo. http:\/\/weibo.com.  Weibo. http:\/\/weibo.com."},{"key":"e_1_3_2_1_8_1","unstructured":"libhdfs. http:\/\/hadoop.apache.org\/docs\/r1.2.1\/libhdfs.html.  libhdfs. http:\/\/hadoop.apache.org\/docs\/r1.2.1\/libhdfs.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Salesforce 1999. http:\/\/www.salesforce.com.  Salesforce 1999. http:\/\/www.salesforce.com."},{"key":"e_1_3_2_1_10_1","unstructured":"Using the snapshot 2003. https:\/\/www.vmware.com\/support\/ws4\/doc\/preserve_snapshot_ws.html.  Using the snapshot 2003. https:\/\/www.vmware.com\/support\/ws4\/doc\/preserve_snapshot_ws.html."},{"key":"e_1_3_2_1_11_1","unstructured":"readahead 2005. https:\/\/lwn.net\/Articles\/155510\/.  readahead 2005. https:\/\/lwn.net\/Articles\/155510\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Amazon ec2 2006. http:\/\/aws.amazon.com\/ec2\/.  Amazon ec2 2006. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Superfetch 2007. http:\/\/en.wikipedia.org\/wiki\/Windows_Vista_I\/O_technologies.  Superfetch 2007. http:\/\/en.wikipedia.org\/wiki\/Windows_Vista_I\/O_technologies."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2013.57"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541969"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451512.2451525"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655022"},{"key":"e_1_3_2_1_19_1","first-page":"251","volume-title":"Proceedings of OSDI","author":"Corbett J. C.","year":"2012","unstructured":"J. C. Corbett , J. Dean , and M. E. et al. Spanner: Google's globally-distributed database . In Proceedings of OSDI , pages 251 -- 264 , 2012 . J. C. Corbett, J. Dean, and M. E. et al. Spanner: Google's globally-distributed database. In Proceedings of OSDI, pages 251--264, 2012."},{"key":"e_1_3_2_1_20_1","first-page":"59","volume-title":"Proceedings of USENIX LISA","author":"Cui L.","year":"2013","unstructured":"L. Cui , B. Li , Y. Zhang , and J. Li . Hotsnap: A hot distributed snapshot system for virtual machine cluster . In Proceedings of USENIX LISA , pages 59 -- 73 , 2013 . L. Cui, B. Li, Y. Zhang, and J. Li. Hotsnap: A hot distributed snapshot system for virtual machine cluster. In Proceedings of USENIX LISA, pages 59--73, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451512.2451528"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1996130.1996151"},{"key":"e_1_3_2_1_23_1","first-page":"197","volume-title":"Proceedings of FAST","author":"Dubnicki C.","year":"2009","unstructured":"C. Dubnicki , L. Gryz , L. Heldt , and M. Kaczmarczyk . Hydrastor: A scalable secondary storage . In Proceedings of FAST , pages 197 -- 210 , 2009 . C. Dubnicki, L. Gryz, L. Heldt, and M. Kaczmarczyk. Hydrastor: A scalable secondary storage. In Proceedings of FAST, pages 197--210, 2009."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"Proceedings of OSDI","author":"Ford D.","year":"2010","unstructured":"D. Ford , F. Labelle , F. I. Popovici , M. Stokely , V.-A. Truong , L. Barroso , C. Grimes , and S. Quinlan . Availability in globally distributed storage systems . In Proceedings of OSDI , pages 1 -- 14 , 2010 . D. Ford, F. Labelle, F. I. Popovici, M. Stokely, V.-A. Truong, L. Barroso, C. Grimes, and S.Quinlan. Availability in globally distributed storage systems. In Proceedings of OSDI, pages 1--14, 2010."},{"key":"e_1_3_2_1_25_1","first-page":"191","volume-title":"Proceedings of NDSS","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Proceedings of NDSS , pages 191 -- 206 , 2003 . T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings of NDSS, pages 191--206, 2003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2012.6232381"},{"key":"e_1_3_2_1_28_1","first-page":"113","volume-title":"USENIX Annual Technical Conference","author":"Hibler M.","year":"2008","unstructured":"M. Hibler , R. Ricci , L. Stoller , J. Duerig , S. Guruprasad , T. Stack , K. Webb , and J. Lepreau . Large-scale virtualization in the emulab network testbed . In USENIX Annual Technical Conference , pages 113 -- 128 , 2008 . M. Hibler, R. Ricci, L. Stoller, J. Duerig, S. Guruprasad, T. Stack, K. Webb, and J. Lepreau. Large-scale virtualization in the emulab network testbed. In USENIX Annual Technical Conference, pages 113--128, 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30566-8_107"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2009.5289170"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168861"},{"key":"e_1_3_2_1_32_1","first-page":"87","volume-title":"Proceedings of DSN","author":"Kangarlou A.","year":"2011","unstructured":"A. Kangarlou , P. Eugster , and D. Xu . Vnsnap: Taking snapshots of virtual networked environments with minimal downtime . In Proceedings of DSN , pages 87 -- 98 , 2011 . A. Kangarlou, P. Eugster, and D. Xu. Vnsnap: Taking snapshots of virtual networked environments with minimal downtime. In Proceedings of DSN, pages 87--98, 2011."},{"key":"e_1_3_2_1_33_1","first-page":"225","volume-title":"Proceedings of the Linux Symposium","author":"Kivity A.","year":"2007","unstructured":"A. Kivity , Y. Kamay , D. Laor , U. Lublin , and A. Liguori . Kvm: the linux virtual machine monitor . In Proceedings of the Linux Symposium , pages 225 -- 230 , 2007 . A. Kivity, Y. Kamay, D. Laor, U. Lublin, and A. Liguori. Kvm: the linux virtual machine monitor. In Proceedings of the Linux Symposium, pages 225--230, 2007."},{"key":"e_1_3_2_1_34_1","volume-title":"Determining the use of interdomain shareable","author":"Kloster J. F.","year":"2007","unstructured":"J. F. Kloster , J. Kristensen , and A. Mejlholm . Determining the use of interdomain shareable pages using kernel introspection. Technical report, Aalborg University , 2007 . J. F. Kloster, J. Kristensen, and A.Mejlholm. Determining the use of interdomain shareable pages using kernel introspection. Technical report, Aalborg University, 2007."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11549468_51"},{"key":"e_1_3_2_1_36_1","first-page":"127","volume-title":"Proceedings of ATC","author":"Kotla R.","year":"2007","unstructured":"R. Kotla , L. Alvisi , and M. Dahlin . Safestore: A durable and practical storage system . In Proceedings of ATC , pages 127 -- 142 , 2007 . R. Kotla, L. Alvisi, and M. Dahlin. Safestore: A durable and practical storage system. In Proceedings of ATC, pages 127--142, 2007."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2349896.2349903"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925019.1925021"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/APCSAC.2008.4625441"},{"key":"e_1_3_2_1_41_1","volume-title":"Efficient and safe data backup with arrow. Technical report","author":"Marshall C.","year":"2008","unstructured":"C. Marshall . Efficient and safe data backup with arrow. Technical report , 2008 . C. Marshall. Efficient and safe data backup with arrow. Technical report, 2008."},{"key":"e_1_3_2_1_42_1","first-page":"71","volume-title":"Proceedings of ATC","author":"Nath P.","year":"2006","unstructured":"P. Nath , M. A. Kozuch , D. R. O Hallaron , and J. Harkes . Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines . In Proceedings of ATC , pages 71 -- 84 , 2006 . P. Nath, M. A. Kozuch, D. R. OHallaron, and J. Harkes. Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines. In Proceedings of ATC, pages 71--84, 2006."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952694"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508301"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/78\/1\/012022"},{"key":"e_1_3_2_1_47_1","first-page":"1","volume-title":"Proceedings of FAST","author":"Schroeder B.","year":"2007","unstructured":"B. Schroeder and G. A. Gibson . Disk failures in the real world what does an mttf of 1,000,000 hours mean to you . In Proceedings of FAST , pages 1 -- 16 , 2007 . B. Schroeder and G. A. Gibson. Disk failures in the real world what does an mttf of 1,000,000 hours mean to you. In Proceedings of FAST, pages 1--16, 2007."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523631"},{"key":"e_1_3_2_1_49_1","volume-title":"Fast, lightweight virtual machine checkpointing. Technical report","author":"Sun M. H.","year":"2010","unstructured":"M. H. Sun and D. M. Blough . Fast, lightweight virtual machine checkpointing. Technical report , 2010 . M. H. Sun and D. M. Blough. Fast, lightweight virtual machine checkpointing. Technical report, 2010."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523620"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.47"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952695"},{"key":"e_1_3_2_1_53_1","first-page":"1","volume-title":"Proceedings of USENIX ATC","author":"Zhang I.","year":"2013","unstructured":"I. Zhang , T. Denniston , Y. Baskakov , and A. Garthwaite . Optimizing vm checkpointing for restore performance in VMware esxi . In Proceedings of USENIX ATC , pages 1 -- 12 , 2013 . I. Zhang, T. Denniston, Y. Baskakov, and A. Garthwaite. Optimizing vm checkpointing for restore performance in VMware esxi. In Proceedings of USENIX ATC, pages 1--12, 2013."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.78"},{"key":"e_1_3_2_1_55_1","first-page":"1","volume-title":"Proceedings of FAST","author":"Zhu B.","year":"2008","unstructured":"B. Zhu , K. Li , and H. Patterson . Avoiding the disk bottleneck in the data domain deduplication file system . In Proceedings of FAST , pages 1 -- 14 , 2008 . B. Zhu, K. Li, and H. Patterson. Avoiding the disk bottleneck in the data domain deduplication file system. In Proceedings of FAST, pages 1--14, 2008."}],"event":{"name":"VEE '15: 11th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","location":"Istanbul Turkey","acronym":"VEE '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 11th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2731186.2731190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2731186.2731190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:48:17Z","timestamp":1750211297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2731186.2731190"}},"subtitle":["A Page-Aware Replication System for Efficiently Storing Virtual Machine Snapshots"],"short-title":[],"issued":{"date-parts":[[2015,3,14]]},"references-count":55,"alternative-id":["10.1145\/2731186.2731190","10.1145\/2731186"],"URL":"https:\/\/doi.org\/10.1145\/2731186.2731190","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2817817.2731190","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,3,14]]},"assertion":[{"value":"2015-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}