{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:49:19Z","timestamp":1773834559277,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T00:00:00Z","timestamp":1432598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,26]]},"DOI":"10.1145\/2757667.2757678","type":"proceedings-article","created":{"date-parts":[[2015,5,19]],"date-time":"2015-05-19T13:49:03Z","timestamp":1432043343000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Reducing fragmentation impact with forward knowledge in backup systems with deduplication"],"prefix":"10.1145","author":[{"given":"Michal","family":"Kaczmarczyk","sequence":"first","affiliation":[{"name":"9LivesData, LLC"}]},{"given":"Cezary","family":"Dubnicki","sequence":"additional","affiliation":[{"name":"9LivesData, LLC"}]}],"member":"320","published-online":{"date-parts":[[2015,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Worldwide Purpose-Built Backup Appliance 2012--2016 Forecast and 2011 Vendor Shares","author":"Amatruda R.","year":"2012","unstructured":"R. Amatruda . Worldwide Purpose-Built Backup Appliance 2012--2016 Forecast and 2011 Vendor Shares . International Data Corporation , April 2012 . URL http:\/\/www.emc.com\/collateral\/analyst-reports\/idc-worldwide-purpose-built-backup-appliance.pdf. R. Amatruda. Worldwide Purpose-Built Backup Appliance 2012--2016 Forecast and 2011 Vendor Shares. International Data Corporation, April 2012. URL http:\/\/www.emc.com\/collateral\/analyst-reports\/idc-worldwide-purpose-built-backup-appliance.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534539"},{"key":"e_1_3_2_1_3_1","volume-title":"Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations","author":"Asaro T.","year":"2007","unstructured":"T. Asaro and H. Biggar . Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations . Enterprise Strategy Group , July 2007 . T. Asaro and H. Biggar. Data De-duplication and Disk-to-Disk Backup Systems: Technical and Business Considerations. Enterprise Strategy Group, July 2007."},{"key":"e_1_3_2_1_4_1","volume-title":"Deduplication's Business Imperatives","author":"Babineau B.","year":"2010","unstructured":"B. Babineau and D. A. Chapa . Deduplication's Business Imperatives . Enterprise Strategy Group, December 2010 . Sponsored by EMC Corporation . B. Babineau and D. A. Chapa. Deduplication's Business Imperatives. Enterprise Strategy Group, December 2010. Sponsored by EMC Corporation."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.52.0078"},{"key":"e_1_3_2_1_6_1","first-page":"197","volume-title":"Proccedings of the 7th Conference on File and Storage Technologies, FAST '09","author":"Dubnicki C.","year":"2009","unstructured":"C. Dubnicki , L. Gryz , L. Heldt , M. Kaczmarczyk , W. Kilian , P. Strzelczak , J. Szczepkowski , C. Ungureanu , and M. Welnicki . Hydrastor: A scalable secondary storage . In Proccedings of the 7th Conference on File and Storage Technologies, FAST '09 , pages 197 -- 210 , Berkeley, CA, USA , 2009 . USENIX Association. URL http:\/\/dl.acm.org\/citation.cfm?id=1525908.1525923. C. Dubnicki, L. Gryz, L. Heldt, M. Kaczmarczyk, W. Kilian, P. Strzelczak, J. Szczepkowski, C. Ungureanu, and M. Welnicki. Hydrastor: A scalable secondary storage. In Proccedings of the 7th Conference on File and Storage Technologies, FAST '09, pages 197--210, Berkeley, CA, USA, 2009. USENIX Association. URL http:\/\/dl.acm.org\/citation.cfm?id=1525908.1525923."},{"key":"e_1_3_2_1_7_1","unstructured":"EMC. DataDomain - Deduplication Storage for Backup Archiving and Disaster Recovery. URL http:\/\/www.datadomain.com.  EMC. DataDomain - Deduplication Storage for Backup Archiving and Disaster Recovery. URL http:\/\/www.datadomain.com."},{"key":"e_1_3_2_1_8_1","unstructured":"ExaGrid. Exagrid. URL http:\/\/www.exagrid.com.  ExaGrid. Exagrid. URL http:\/\/www.exagrid.com."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2643634.2643653"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2750482.2750507"},{"key":"e_1_3_2_1_11_1","first-page":"141","volume-title":"How caching affects hashing","author":"Heileman G. L.","year":"2005","unstructured":"G. L. Heileman and W. Luo . How caching affects hashing . In C. Demetrescu, R. Sedgewick, and R. Tamassia, editors, ALENEX\/ANALCO, pages 141 -- 154 . SIAM , 2005 . ISBN 0-89871-596-2. URL http:\/\/www.siam.org\/meetings\/alenex05\/papers\/13gheileman.pdf. G. L. Heileman and W. Luo. How caching affects hashing. In C. Demetrescu, R. Sedgewick, and R. Tamassia, editors, ALENEX\/ANALCO, pages 141--154. SIAM, 2005. ISBN 0-89871-596-2. URL http:\/\/www.siam.org\/meetings\/alenex05\/papers\/13gheileman.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"HP. HP StoreOnce Backup. URL http:\/\/www8.hp.com\/us\/en\/products\/data-storage\/storage-backup-archive.html.  HP. HP StoreOnce Backup. URL http:\/\/www8.hp.com\/us\/en\/products\/data-storage\/storage-backup-archive.html."},{"key":"e_1_3_2_1_13_1","unstructured":"IBM. IBM ProtecTIER Deduplication Solution. URL http:\/\/www-03.ibm.com\/systems\/storage\/tape\/ts7650g\/.  IBM. IBM ProtecTIER Deduplication Solution. URL http:\/\/www-03.ibm.com\/systems\/storage\/tape\/ts7650g\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2367589.2367600"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2591272.2591292"},{"key":"e_1_3_2_1_17_1","volume-title":"January","author":"Livens J.","year":"2009","unstructured":"J. Livens . Deduplication and restore performance. Wikibon.org , January 2009 a. URL http:\/\/wikibon.org\/wiki\/v\/Deduplication_and_restore_performance. J. Livens. Deduplication and restore performance. Wikibon.org, January 2009a. URL http:\/\/wikibon.org\/wiki\/v\/Deduplication_and_restore_performance."},{"key":"e_1_3_2_1_18_1","volume-title":"June","author":"Livens J.","year":"2009","unstructured":"J. Livens . Defragmentation , rehydration and deduplication. AboutRestore.com , June 2009 b. URL http:\/\/www.aboutrestore.com\/2009\/06\/24\/defragmentation-rehydration-and-deduplication\/. J. Livens. Defragmentation, rehydration and deduplication. AboutRestore.com, June 2009b. URL http:\/\/www.aboutrestore.com\/2009\/06\/24\/defragmentation-rehydration-and-deduplication\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.82"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2012.32"},{"key":"e_1_3_2_1_22_1","unstructured":"NEC. HYDRAstor Grid Storage System. URL http:\/\/www.hydrastor.com.  NEC. HYDRAstor Grid Storage System. URL http:\/\/www.hydrastor.com."},{"key":"e_1_3_2_1_23_1","volume-title":"NEC HYDRAstor HS8-4000 Specification","author":"NEC","year":"2013","unstructured":"NEC HS8-4000. NEC HYDRAstor HS8-4000 Specification , 2013 . URL http:\/\/www.necam.com\/HYDRAstor\/doc.cfm?t=HS8-4000. NEC HS8-4000. NEC HYDRAstor HS8-4000 Specification, 2013. URL http:\/\/www.necam.com\/HYDRAstor\/doc.cfm?t=HS8-4000."},{"key":"e_1_3_2_1_24_1","unstructured":"W. C. Preston. Target deduplication appliance performance comparison. BackupCentral.com October 2010a. URL http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/348-target-deduplication-appliance-performance-comparison.html.  W. C. Preston. Target deduplication appliance performance comparison. BackupCentral.com October 2010a. URL http:\/\/www.backupcentral.com\/mr-backup-blog-mainmenu-47\/13-mr-backup-blog\/348-target-deduplication-appliance-performance-comparison.html."},{"key":"e_1_3_2_1_25_1","volume-title":"April","author":"Preston W. C.","year":"2010","unstructured":"W. C. Preston . Restoring deduped data in deduplication systems. SearchDataBackup.com , April 2010 b. URL http:\/\/searchdatabackup.techtarget.com\/feature\/Restoring-deduped-data-in-deduplication-systems. W. C. Preston. Restoring deduped data in deduplication systems. SearchDataBackup.com, April 2010b. URL http:\/\/searchdatabackup.techtarget.com\/feature\/Restoring-deduped-data-in-deduplication-systems."},{"key":"e_1_3_2_1_26_1","unstructured":"Quantum. DXi Deduplication Solution. URL http:\/\/www.quantum.com\/products\/disk-basedbackup\/index.aspxm.  Quantum. DXi Deduplication Solution. URL http:\/\/www.quantum.com\/products\/disk-basedbackup\/index.aspxm."},{"key":"e_1_3_2_1_27_1","first-page":"7","volume-title":"Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST'02","author":"Quinlan S.","year":"2002","unstructured":"S. Quinlan and S. Dorward . Venti: A new approach to archival storage . In Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST'02 , pages 7 -- 7 , Berkeley, CA, USA , 2002 . USENIX Association. URL http:\/\/dl.acm.org\/citation.cfm?id=1973333.1973340. S. Quinlan and S. Dorward. Venti: A new approach to archival storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies, FAST'02, pages 7--7, Berkeley, CA, USA, 2002. USENIX Association. URL http:\/\/dl.acm.org\/citation.cfm?id=1973333.1973340."},{"key":"e_1_3_2_1_28_1","volume-title":"Harvard University","author":"Rabin M.","year":"1981","unstructured":"M. Rabin . Fingerprinting by random polynomials. Technical report, Center for Research in Computing Technology , Harvard University , New York, NY, USA , 1981 . URL http:\/\/www.xmailserver.org\/rabin.pdf. M. Rabin. Fingerprinting by random polynomials. Technical report, Center for Research in Computing Technology, Harvard University, New York, NY, USA, 1981. URL http:\/\/www.xmailserver.org\/rabin.pdf."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1987816.1987837"},{"key":"e_1_3_2_1_30_1","volume-title":"Common enterprise disk specification (based on Seagate Constellation ES.3 4TB, model","year":"2012","unstructured":"Seagate. Common enterprise disk specification (based on Seagate Constellation ES.3 4TB, model 2012 ). URL http:\/\/www.seagate.com\/www-content\/product-content\/constellation-fam\/constellation-es\/constellation-es-3\/en-us\/docs\/constellation-es-3-data-sheet-ds1769-1-1210us.pdf. Seagate. Common enterprise disk specification (based on Seagate Constellation ES.3 4TB, model 2012). URL http:\/\/www.seagate.com\/www-content\/product-content\/constellation-fam\/constellation-es\/constellation-es-3\/en-us\/docs\/constellation-es-3-data-sheet-ds1769-1-1210us.pdf."},{"key":"e_1_3_2_1_31_1","unstructured":"Symantec. NetBackup Appliances. URL http:\/\/www.symantec.com\/backup-appliance.  Symantec. NetBackup Appliances. URL http:\/\/www.symantec.com\/backup-appliance."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208461.2208465"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687814"},{"key":"e_1_3_2_1_34_1","volume-title":"August","author":"Whitehouse L.","year":"2008","unstructured":"L. Whitehouse . Restoring deduped data. searchdatabackup.techtarget.com , August 2008 . URL http:\/\/searchdatabackup.techtarget.com\/tip\/Restoring-deduped-data. L. Whitehouse. Restoring deduped data. searchdatabackup.techtarget.com, August 2008. URL http:\/\/searchdatabackup.techtarget.com\/tip\/Restoring-deduped-data."},{"key":"e_1_3_2_1_35_1","volume-title":"2010 Data Protection Trends","author":"Whitehouse L.","year":"2010","unstructured":"L. Whitehouse , B. Lundell , J. McKnight , and J. Gahm . 2010 Data Protection Trends . Enterprise Strategy Group , April 2010 . L. Whitehouse, B. Lundell, J. McKnight, and J. Gahm. 2010 Data Protection Trends. Enterprise Strategy Group, April 2010."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1364813.1364831"}],"event":{"name":"SYSTOR 2015: International Conference on Systems and Storage","location":"Haifa Israel","acronym":"SYSTOR 2015","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 8th ACM International Systems and Storage Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2757667.2757678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2757667.2757678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:28Z","timestamp":1750227388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2757667.2757678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,26]]},"references-count":35,"alternative-id":["10.1145\/2757667.2757678","10.1145\/2757667"],"URL":"https:\/\/doi.org\/10.1145\/2757667.2757678","relation":{},"subject":[],"published":{"date-parts":[[2015,5,26]]},"assertion":[{"value":"2015-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}