{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:08:36Z","timestamp":1775912916992,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T00:00:00Z","timestamp":1495411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,22]]},"DOI":"10.1145\/3078468.3078470","type":"proceedings-article","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T18:17:22Z","timestamp":1495217842000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Erasure coding for small objects in in-memory KV storage"],"prefix":"10.1145","author":[{"given":"Matt M. T.","family":"Yiu","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Helen H. W.","family":"Chan","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2017,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Advanced Traffic Control. https:\/\/wiki.archlinux.org\/index.php\/Advanced_traffic_control.  Advanced Traffic Control. https:\/\/wiki.archlinux.org\/index.php\/Advanced_traffic_control."},{"key":"e_1_3_2_1_2_1","unstructured":"Aerospike. http:\/\/www.aerospike.com\/.  Aerospike. http:\/\/www.aerospike.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon ElastiCache. http:\/\/aws.amazon.com\/elasticache\/.  Amazon ElastiCache. http:\/\/aws.amazon.com\/elasticache\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Couchbase Server. http:\/\/www.couchbase.com\/nosql-databases\/couchbase-server.  Couchbase Server. http:\/\/www.couchbase.com\/nosql-databases\/couchbase-server."},{"key":"e_1_3_2_1_5_1","unstructured":"Erasure Code - Ceph Documentation. http:\/\/docs.ceph.com\/docs\/master\/rados\/operations\/erasure-code\/.  Erasure Code - Ceph Documentation. http:\/\/docs.ceph.com\/docs\/master\/rados\/operations\/erasure-code\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel\u00ae Storage Acceleration Library (open source version). https:\/\/01.org\/intel%C2%AE-storage-acceleration-library-open-source-version.  Intel\u00ae Storage Acceleration Library (open source version). https:\/\/01.org\/intel%C2%AE-storage-acceleration-library-open-source-version."},{"key":"e_1_3_2_1_7_1","unstructured":"Memcached. http:\/\/memcached.org.  Memcached. http:\/\/memcached.org."},{"key":"e_1_3_2_1_8_1","unstructured":"Redis. http:\/\/redis.io.  Redis. http:\/\/redis.io."},{"key":"e_1_3_2_1_9_1","unstructured":"Redis Latency Problems Troubleshotting. http:\/\/redis.io\/topics\/latency.  Redis Latency Problems Troubleshotting. http:\/\/redis.io\/topics\/latency."},{"key":"e_1_3_2_1_10_1","unstructured":"Repcached. http:\/\/repcached.lab.klab.org.  Repcached. http:\/\/repcached.lab.klab.org."},{"key":"e_1_3_2_1_11_1","unstructured":"Spread Toolkit. http:\/\/www.spread.org.  Spread Toolkit. http:\/\/www.spread.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.96"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544926"},{"key":"e_1_3_2_1_14_1","unstructured":"C. Aniszczyk. Caching with Twemcache. https:\/\/blog.twitter.com\/2012\/caching-with-twemcache.  C. Aniszczyk. Caching with Twemcache. https:\/\/blog.twitter.com\/2012\/caching-with-twemcache."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_1_16_1","first-page":"163","volume-title":"Chan. Parity Logging with Reserved Space: Towards Efficient Updates and Recovery in Erasure-Coded Clustered Storage. In Proc. of USENIX FAST","author":"Chan J. C. W.","year":"2014"},{"key":"e_1_3_2_1_17_1","first-page":"103","volume-title":"Proc. of USENIX FAST","author":"Chang F.","year":"2002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/176979.176981"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741967"},{"key":"e_1_3_2_1_20_1","first-page":"45","volume-title":"Proc. of USENIX NSDI","author":"Chun B.-G.","year":"2006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2006.41"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.10.013"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"Proc. of USENIX FAST","author":"Corbett P.","year":"2004"},{"key":"e_1_3_2_1_25_1","first-page":"85","volume-title":"Proc. of USENIX NSDI","author":"Dabek F.","year":"2004"},{"key":"e_1_3_2_1_26_1","first-page":"371","volume-title":"Proc. of USENIX NSDI","author":"Fan B.","year":"2013"},{"issue":"124","key":"e_1_3_2_1_27_1","article-title":"Distributed Caching with Memcached","volume":"2004","author":"Fitzpatrick B.","year":"2004","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_28_1","first-page":"61","volume-title":"Proc. of USENIX OSDI","author":"Ford D.","year":"2010"},{"key":"e_1_3_2_1_29_1","volume-title":"Hidden Scalability Gotchas in Memcached and Friends. In VELOCITY Web Performance and Operations Conference","author":"Gunther N.","year":"2010"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2525970"},{"key":"e_1_3_2_1_31_1","first-page":"15","volume-title":"Proc. of USENIX ATC","author":"Huang C.","year":"2012"},{"key":"e_1_3_2_1_32_1","first-page":"11","volume-title":"Proc. of USENIX ATC","author":"Hunt P.","year":"2010"},{"key":"e_1_3_2_1_33_1","unstructured":"M. Kerrisk. The Linux Programming Interface. No Starch Press 2010.  M. Kerrisk. The Linux Programming Interface. No Starch Press 2010."},{"key":"e_1_3_2_1_34_1","first-page":"251","volume-title":"Proc. of USENIX FAST","author":"Khan O.","year":"2012"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2014.6968771"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208288"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741956"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1093382.1093386"},{"key":"e_1_3_2_1_39_1","first-page":"383","volume-title":"Proc. of USENIX OSDI","author":"Muralidhar S.","year":"2014"},{"key":"e_1_3_2_1_40_1","first-page":"385","volume-title":"Proc. of USENIX NSDI","author":"Nishtala R.","year":"2013"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806887"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_1_43_1","first-page":"253","volume-title":"Proc. of USENIX FAST","author":"Plank J.","year":"2009"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488339"},{"key":"e_1_3_2_1_47_1","first-page":"101","volume-title":"Proc. of USENIX FAST","author":"Soundararajan G.","year":"2010"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2427795"},{"key":"e_1_3_2_1_50_1","first-page":"167","volume-title":"Proc. of USENIX FAST","author":"Zhang H.","year":"2016"}],"event":{"name":"SYSTOR'17: International Systems and Storage Conference","location":"Haifa Israel","acronym":"SYSTOR'17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","TCE Technion Computer Engineering Center","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 10th ACM International Systems and Storage Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078468.3078470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078468.3078470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:33Z","timestamp":1750215813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078468.3078470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,22]]},"references-count":50,"alternative-id":["10.1145\/3078468.3078470","10.1145\/3078468"],"URL":"https:\/\/doi.org\/10.1145\/3078468.3078470","relation":{},"subject":[],"published":{"date-parts":[[2017,5,22]]},"assertion":[{"value":"2017-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}