{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:34Z","timestamp":1750306054931,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T00:00:00Z","timestamp":1495411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,22]]},"DOI":"10.1145\/3078468.3078500","type":"proceedings-article","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T18:17:22Z","timestamp":1495217842000},"page":"1-1","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Big data analysis of cloud storage logs using spark"],"prefix":"10.1145","author":[{"given":"Shelly","family":"Garion","sequence":"first","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Hillel","family":"Kolodner","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Allon","family":"Adir","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Ehud","family":"Aharoni","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Lev","family":"Greenberg","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2017,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2011.2165675"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2013.6823956"},{"key":"e_1_3_2_1_3_1","unstructured":"I. Stoica and V. Ha \"Analysing Apache Access Logs with Databricks\" https:\/\/databricks.com\/blog\/2015\/04\/21\/analyzing-apache-access-logs-with-databricks-cloud.html  I. Stoica and V. Ha \"Analysing Apache Access Logs with Databricks\" https:\/\/databricks.com\/blog\/2015\/04\/21\/analyzing-apache-access-logs-with-databricks-cloud.html"}],"event":{"name":"SYSTOR'17: International Systems and Storage Conference","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","TCE Technion Computer Engineering Center","USENIX Assoc USENIX Assoc"],"location":"Haifa Israel","acronym":"SYSTOR'17"},"container-title":["Proceedings of the 10th ACM International Systems and Storage Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078468.3078500","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078468.3078500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:33Z","timestamp":1750215813000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078468.3078500"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,22]]},"references-count":3,"alternative-id":["10.1145\/3078468.3078500","10.1145\/3078468"],"URL":"https:\/\/doi.org\/10.1145\/3078468.3078500","relation":{},"subject":[],"published":{"date-parts":[[2017,5,22]]},"assertion":[{"value":"2017-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}