{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T04:45:56Z","timestamp":1659069956249},"reference-count":70,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2022,5,26]]},"abstract":"LSM-tree-based key-value stores like RocksDB are widely used to support many applications. However, configuring a RocksDB instance is challenging for the following reasons: 1) RocksDB has a massive parameter space to configure; 2) there are inherent trade-offs and dependencies between parameters; 3) right configurations are dependent on workload and hardware; and 4) evaluating configurations is time-consuming. Prior works struggle with handling the curse of dimensionality, capturing relationships between parameters, adapting configurations to workload and hardware, and evaluating quickly. In this work, we present a system, Dremel, to adaptively and quickly configure RocksDB with strategies based on the Multi-Armed Bandit model. To handle the massive parameter space, we propose using fused features, which encode domain-specific knowledge, to work as a compact and powerful representation for configurations. To adapt to the workload and hardware, we build an online bandit model to identify the best configuration. To evaluate quickly, we enable multi-fidelity evaluation and upper-confidence-bound sampling to speed up identifying the best configuration. Dremel not only achieves up to \u00d72.61 higher IOPS and 57% less latency than default configurations but also achieves up to 63% improvements over prior works on 18 different settings with the same or less time budget.<\/jats:p>","DOI":"10.1145\/3530903","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T17:16:18Z","timestamp":1654535778000},"page":"1-30","source":"Crossref","is-referenced-by-count":2,"title":["Dremel"],"prefix":"10.1145","volume":"6","author":[{"given":"Chenxingyu","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Tapan","family":"Chugh","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Jaehong","family":"Min","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Ming","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437984.3458841"},{"key":"e_1_2_1_2_1","unstructured":"Apache. 2021. Flink . https:\/\/flink.apache.org\/. Apache. 2021. Flink . https:\/\/flink.apache.org\/."},{"key":"e_1_2_1_3_1","unstructured":"Apache. 2022. Cassandra . https:\/\/cassandra.apache.org\/. Apache. 2022. Cassandra . https:\/\/cassandra.apache.org\/."},{"key":"e_1_2_1_4_1","unstructured":"Jean-Yves Audibert S\u00e9bastien Bubeck and R\u00e9mi Munos. 2010. Best arm identification in multi-armed bandits.. In COLT. Citeseer 41--53. Jean-Yves Audibert S\u00e9bastien Bubeck and R\u00e9mi Munos. 2010. Best arm identification in multi-armed bandits.. In COLT. Citeseer 41--53."},{"key":"e_1_2_1_5_1","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration trade-offs","volume":"3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer . 2002 . Using confidence bounds for exploitation-exploration trade-offs . Journal of Machine Learning Research , Vol. 3 , Nov (2002), 397 -- 422 . Peter Auer. 2002. Using confidence bounds for exploitation-exploration trade-offs. Journal of Machine Learning Research , Vol. 3, Nov (2002), 397--422.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_6_1","volume-title":"Andrew Gordon Wilson, and Eytan Bakshy","author":"Balandat Maximilian","year":"2020","unstructured":"Maximilian Balandat , Brian Karrer , Daniel R. Jiang , Samuel Daulton , Benjamin Letham , Andrew Gordon Wilson, and Eytan Bakshy . 2020 . BoTorch: A Framework for Efficient Monte-Carlo Bayesian Optimization. In Advances in Neural Information Processing Systems 33 . http:\/\/arxiv.org\/abs\/1910.06403 Maximilian Balandat, Brian Karrer, Daniel R. Jiang, Samuel Daulton, Benjamin Letham, Andrew Gordon Wilson, and Eytan Bakshy. 2020. BoTorch: A Framework for Efficient Monte-Carlo Bayesian Optimization. In Advances in Neural Information Processing Systems 33 . http:\/\/arxiv.org\/abs\/1910.06403"},{"key":"e_1_2_1_7_1","volume-title":"SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Balmau Oana","year":"2019","unstructured":"Oana Balmau , Florin Dinu , Willy Zwaenepoel , Karan Gupta , Ravishankar Chandhiramoorthi , and Diego Didona . 2019 . SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 753--766. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/balmau Oana Balmau, Florin Dinu, Willy Zwaenepoel, Karan Gupta, Ravishankar Chandhiramoorthi, and Diego Didona. 2019. SILK: Preventing Latency Spikes in Log-Structured Merge Key-Value Stores. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 753--766. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/balmau"},{"key":"e_1_2_1_8_1","article-title":"Random search for hyper-parameter optimization","volume":"13","author":"Bergstra James","year":"2012","unstructured":"James Bergstra and Yoshua Bengio . 2012 . Random search for hyper-parameter optimization . Journal of machine learning research , Vol. 13 , 2 (2012). James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter optimization. Journal of machine learning research , Vol. 13, 2 (2012).","journal-title":"Journal of machine learning research"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781601986276"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813231.1813240"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3386691.3386712"},{"key":"e_1_2_1_13_1","volume-title":"et almbox","author":"Janice Chen Yu-Zhen","year":"2021","unstructured":"Yu-Zhen Janice Chen , Stephen Pasteris , Mohammad Hajiesmaili , John Lui , Don Towsley , et almbox . 2021 . Cooperative Stochastic Bandits with Asynchronous Agents and Constrained Feedback. Advances in Neural Information Processing Systems , Vol. 34 (2021). Yu-Zhen Janice Chen, Stephen Pasteris, Mohammad Hajiesmaili, John Lui, Don Towsley, et almbox. 2021. Cooperative Stochastic Bandits with Asynchronous Agents and Constrained Feedback. Advances in Neural Information Processing Systems , Vol. 34 (2021)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_2_1_15_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Dai Yifan","year":"2020","unstructured":"Yifan Dai , Yien Xu , Aishwarya Ganesan , Ramnatthan Alagappan , Brian Kroth , Andrea Arpaci-Dusseau , and Remzi Arpaci-Dusseau . 2020 . From wisckey to bourbon: A learned index for log-structured merge trees . In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . 155--171. Yifan Dai, Yien Xu, Aishwarya Ganesan, Ramnatthan Alagappan, Brian Kroth, Andrea Arpaci-Dusseau, and Remzi Arpaci-Dusseau. 2020. From wisckey to bourbon: A learned index for log-structured merge trees. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . 155--171."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052662"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064054"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196927"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319903"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_2_1_21_1","volume-title":"International Conference on Machine Learning. PMLR, 1587--1595","author":"Degenne R\u00e9my","year":"2016","unstructured":"R\u00e9my Degenne and Vianney Perchet . 2016 . Anytime optimal algorithms in stochastic multi-armed bandits . In International Conference on Machine Learning. PMLR, 1587--1595 . R\u00e9my Degenne and Vianney Perchet. 2016. Anytime optimal algorithms in stochastic multi-armed bandits. In International Conference on Machine Learning. PMLR, 1587--1595."},{"key":"e_1_2_1_22_1","volume-title":"Toward a better understanding and evaluation of tree structures on flash ssds. arXiv preprint arXiv:2006.04658","author":"Didona Diego","year":"2020","unstructured":"Diego Didona , Nikolas Ioannou , Radu Stoica , and Kornilios Kourtis . 2020. Toward a better understanding and evaluation of tree structures on flash ssds. arXiv preprint arXiv:2006.04658 ( 2020 ). Diego Didona, Nikolas Ioannou, Radu Stoica, and Kornilios Kourtis. 2020. Toward a better understanding and evaluation of tree structures on flash ssds. arXiv preprint arXiv:2006.04658 (2020)."},{"key":"e_1_2_1_23_1","volume-title":"Jost Tobias Springenberg, and Frank Hutter","author":"Domhan Tobias","year":"2015","unstructured":"Tobias Domhan , Jost Tobias Springenberg, and Frank Hutter . 2015 . Speeding up automatic hyperparameter optimization of deep neural networks by extrapolation of learning curves. In Twenty-fourth international joint conference on artificial intelligence . Tobias Domhan, Jost Tobias Springenberg, and Frank Hutter. 2015. Speeding up automatic hyperparameter optimization of deep neural networks by extrapolation of learning curves. In Twenty-fourth international joint conference on artificial intelligence ."},{"key":"e_1_2_1_24_1","first-page":"3","article-title":"Optimizing Space Amplification in RocksDB","volume":"3","author":"Dong Siying","year":"2017","unstructured":"Siying Dong , Mark Callaghan , Leonidas Galanis , Dhruba Borthakur , Tony Savor , and Michael Strum . 2017 . Optimizing Space Amplification in RocksDB .. In CIDR , Vol. 3. 3 . Siying Dong, Mark Callaghan, Leonidas Galanis, Dhruba Borthakur, Tony Savor, and Michael Strum. 2017. Optimizing Space Amplification in RocksDB.. In CIDR, Vol. 3. 3.","journal-title":"CIDR"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3483840"},{"key":"e_1_2_1_26_1","volume-title":"Advances in Neural Information Processing Systems","volume":"34","author":"Du Yihan","year":"2021","unstructured":"Yihan Du , Siwei Wang , Zhixuan Fang , and Longbo Huang . 2021 . Continuous Mean-Covariance Bandits . Advances in Neural Information Processing Systems , Vol. 34 (2021). Yihan Du, Siwei Wang, Zhixuan Fang, and Longbo Huang. 2021. Continuous Mean-Covariance Bandits. Advances in Neural Information Processing Systems , Vol. 34 (2021)."},{"key":"e_1_2_1_27_1","article-title":"Action Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems","volume":"7","author":"Even-Dar Eyal","year":"2006","unstructured":"Eyal Even-Dar , Shie Mannor , Yishay Mansour , and Sridhar Mahadevan . 2006 . Action Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems . Journal of machine learning research , Vol. 7 , 6 (2006). Eyal Even-Dar, Shie Mannor, Yishay Mansour, and Sridhar Mahadevan. 2006. Action Elimination and Stopping Conditions for the Multi-Armed Bandit and Reinforcement Learning Problems. Journal of machine learning research , Vol. 7, 6 (2006).","journal-title":"Journal of machine learning research"},{"key":"e_1_2_1_28_1","unstructured":"Facebook. 2021. RocksDB . https:\/\/github.com\/facebook\/rocksdb . Facebook. 2021. RocksDB . https:\/\/github.com\/facebook\/rocksdb ."},{"key":"e_1_2_1_29_1","volume-title":"Gpytorch: Blackbox matrix-matrix gaussian process inference with gpu acceleration. arXiv preprint arXiv:1809.11165","author":"Gardner Jacob R","year":"2018","unstructured":"Jacob R Gardner , Geoff Pleiss , David Bindel , Kilian Q Weinberger , and Andrew Gordon Wilson . 2018 . Gpytorch: Blackbox matrix-matrix gaussian process inference with gpu acceleration. arXiv preprint arXiv:1809.11165 (2018). Jacob R Gardner, Geoff Pleiss, David Bindel, Kilian Q Weinberger, and Andrew Gordon Wilson. 2018. Gpytorch: Blackbox matrix-matrix gaussian process inference with gpu acceleration. arXiv preprint arXiv:1809.11165 (2018)."},{"key":"e_1_2_1_30_1","volume-title":"Model free reinforcement learning algorithm for stationary mean field equilibrium for multiple types of agents. arXiv preprint arXiv:2012.15377","author":"Ghosh Arnob","year":"2020","unstructured":"Arnob Ghosh and Vaneet Aggarwal . 2020. Model free reinforcement learning algorithm for stationary mean field equilibrium for multiple types of agents. arXiv preprint arXiv:2012.15377 ( 2020 ). Arnob Ghosh and Vaneet Aggarwal. 2020. Model free reinforcement learning algorithm for stationary mean field equilibrium for multiple types of agents. arXiv preprint arXiv:2012.15377 (2020)."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098043"},{"key":"e_1_2_1_32_1","unstructured":"Google. 2021. LevelDB . https:\/\/github.com\/google\/leveldb\/. Google. 2021. LevelDB . https:\/\/github.com\/google\/leveldb\/."},{"key":"e_1_2_1_33_1","volume-title":"Architecture of a database system","author":"Hellerstein Joseph M","unstructured":"Joseph M Hellerstein , Michael Stonebraker , and James Hamilton . 2007. Architecture of a database system . Now Publishers Inc . Joseph M Hellerstein, Michael Stonebraker, and James Hamilton. 2007. Architecture of a database system .Now Publishers Inc."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415535"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3314041"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457297"},{"key":"e_1_2_1_37_1","volume-title":"Real-Time Business Intelligence and Analytics","author":"Idreos Stratos","unstructured":"Stratos Idreos , Manos Athanassoulis , Niv Dayan , Demi Guo , Mike S Kester , Lukas Maas , and Kostas Zoumpatianos . 2015. Past and future steps for adaptive storage data systems: From shallow to deep adaptivity . In Real-Time Business Intelligence and Analytics . Springer , 85--94. Stratos Idreos, Manos Athanassoulis, Niv Dayan, Demi Guo, Mike S Kester, Lukas Maas, and Kostas Zoumpatianos. 2015. Past and future steps for adaptive storage data systems: From shallow to deep adaptivity. In Real-Time Business Intelligence and Analytics. Springer, 85--94."},{"key":"e_1_2_1_38_1","volume-title":"et almbox","author":"Idreos Stratos","year":"2019","unstructured":"Stratos Idreos , Niv Dayan , Wilson Qin , Mali Akmanalp , Sophie Hilgard , Andrew Ross , James Lennon , Varun Jain , Harshita Gupta , David Li , et almbox . 2019 . Design Continuums and the Path Toward Self-Designing Key-Value Stores that Know and Learn.. In CIDR . Stratos Idreos, Niv Dayan, Wilson Qin, Mali Akmanalp, Sophie Hilgard, Andrew Ross, James Lennon, Varun Jain, Harshita Gupta, David Li, et almbox. 2019. Design Continuums and the Path Toward Self-Designing Key-Value Stores that Know and Learn.. In CIDR ."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3199671"},{"key":"e_1_2_1_40_1","volume-title":"Kill Two Birds with One Stone: Auto-tuning RocksDB for High Bandwidth and Low Latency. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) . IEEE, 652--664","author":"Jia Yichen","year":"2020","unstructured":"Yichen Jia and Feng Chen . 2020 . Kill Two Birds with One Stone: Auto-tuning RocksDB for High Bandwidth and Low Latency. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) . IEEE, 652--664 . Yichen Jia and Feng Chen. 2020. Kill Two Birds with One Stone: Auto-tuning RocksDB for High Bandwidth and Low Latency. In 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS) . IEEE, 652--664."},{"key":"e_1_2_1_41_1","volume-title":"AutoLRS: Automatic Learning-Rate Schedule by Bayesian Optimization on the Fly. arXiv preprint arXiv:2105.10762","author":"Jin Yuchen","year":"2021","unstructured":"Yuchen Jin , Tianyi Zhou , Liangyu Zhao , Yibo Zhu , Chuanxiong Guo , Marco Canini , and Arvind Krishnamurthy . 2021. AutoLRS: Automatic Learning-Rate Schedule by Bayesian Optimization on the Fly. arXiv preprint arXiv:2105.10762 ( 2021 ). Yuchen Jin, Tianyi Zhou, Liangyu Zhao, Yibo Zhu, Chuanxiong Guo, Marco Canini, and Arvind Krishnamurthy. 2021. AutoLRS: Automatic Learning-Rate Schedule by Bayesian Optimization on the Fly. arXiv preprint arXiv:2105.10762 (2021)."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 30th\/International Conference on Advances in Neural Information Processing Systems (NIPS'30)","author":"Kandasamy Kirthevasan","year":"2016","unstructured":"Kirthevasan Kandasamy , Gautam Dasarathy , Junier Oliva , Jeff Schneider , and Barnab\u00e1s P\u00f3czos . 2016 a. Gaussian process optimisation with multi-fidelity evaluations . In Proceedings of the 30th\/International Conference on Advances in Neural Information Processing Systems (NIPS'30) . Kirthevasan Kandasamy, Gautam Dasarathy, Junier Oliva, Jeff Schneider, and Barnab\u00e1s P\u00f3czos. 2016a. Gaussian process optimisation with multi-fidelity evaluations. In Proceedings of the 30th\/International Conference on Advances in Neural Information Processing Systems (NIPS'30) ."},{"key":"e_1_2_1_43_1","volume-title":"The multi-fidelity multi-armed bandit. Advances in neural information processing systems","author":"Kandasamy Kirthevasan","year":"2016","unstructured":"Kirthevasan Kandasamy , Gautam Dasarathy , Barnabas Poczos , and Jeff Schneider . 2016b. The multi-fidelity multi-armed bandit. Advances in neural information processing systems , Vol. 29 ( 2016 ), 1777--1785. Kirthevasan Kandasamy, Gautam Dasarathy, Barnabas Poczos, and Jeff Schneider. 2016b. The multi-fidelity multi-armed bandit. Advances in neural information processing systems , Vol. 29 (2016), 1777--1785."},{"key":"e_1_2_1_44_1","volume-title":"International Conference on Machine Learning . PMLR, 1238--1246","author":"Karnin Zohar","year":"2013","unstructured":"Zohar Karnin , Tomer Koren , and Oren Somekh . 2013 . Almost optimal exploration in multi-armed bandits . In International Conference on Machine Learning . PMLR, 1238--1246 . Zohar Karnin, Tomer Koren, and Oren Somekh. 2013. Almost optimal exploration in multi-armed bandits. In International Conference on Machine Learning . PMLR, 1238--1246."},{"key":"e_1_2_1_45_1","unstructured":"Aaron Klein Stefan Falkner Simon Bartels Philipp Hennig and Frank Hutter. 2017. Fast bayesian optimization of machine learning hyperparameters on large datasets. In Artificial Intelligence and Statistics. PMLR 528--536. Aaron Klein Stefan Falkner Simon Bartels Philipp Hennig and Frank Hutter. 2017. Fast bayesian optimization of machine learning hyperparameters on large datasets. In Artificial Intelligence and Statistics. PMLR 528--536."},{"key":"e_1_2_1_46_1","volume-title":"Jost Tobias Springenberg, and Frank Hutter","author":"Klein Aaron","year":"2016","unstructured":"Aaron Klein , Stefan Falkner , Jost Tobias Springenberg, and Frank Hutter . 2016 . Learning curve prediction with Bayesian neural networks. (2016). Aaron Klein, Stefan Falkner, Jost Tobias Springenberg, and Frank Hutter. 2016. Learning curve prediction with Bayesian neural networks. (2016)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359628"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352129"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3242042"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2930583.2930595"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033273"},{"key":"e_1_2_1_53_1","volume-title":"On performance stability in LSM-based storage systems (extended version). arXiv preprint arXiv:1906.09667","author":"Luo Chen","year":"2019","unstructured":"Chen Luo and Michael J Carey . 2019. On performance stability in LSM-based storage systems (extended version). arXiv preprint arXiv:1906.09667 ( 2019 ). Chen Luo and Michael J Carey. 2019. On performance stability in LSM-based storage systems (extended version). arXiv preprint arXiv:1906.09667 (2019)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430916"},{"key":"e_1_2_1_55_1","volume-title":"Hwan Doh, and Arvind Krishnamurthy. 2021. Gimbal: Enabling Multi-Tenant Storage Disaggregation on SmartNIC JBOFs. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference","author":"Min Jaehong","unstructured":"Jaehong Min , Ming Liu , Tapan Chugh , Chenxingyu Zhao , Andrew Wei , In Hwan Doh, and Arvind Krishnamurthy. 2021. Gimbal: Enabling Multi-Tenant Storage Disaggregation on SmartNIC JBOFs. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference ( Virtual Event, USA) (SIGCOMM '21). Association for Computing Machinery, New York, NY, USA, 106--122. https:\/\/doi.org\/10.1145\/3452296.3472940 Jaehong Min, Ming Liu, Tapan Chugh, Chenxingyu Zhao, Andrew Wei, In Hwan Doh, and Arvind Krishnamurthy. 2021. Gimbal: Enabling Multi-Tenant Storage Disaggregation on SmartNIC JBOFs. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference (Virtual Event, USA) (SIGCOMM '21). Association for Computing Machinery, New York, NY, USA, 106--122. https:\/\/doi.org\/10.1145\/3452296.3472940"},{"key":"e_1_2_1_56_1","unstructured":"MongoDB. 2021. WiredTiger . https:\/\/github.com\/wiredtiger\/wiredtiger . MongoDB. 2021. WiredTiger . https:\/\/github.com\/wiredtiger\/wiredtiger ."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512798.3512817"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3390\/app112411842"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002360050048"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-016-0472-z"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132765"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1952-09620-8"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366701"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476274"},{"key":"e_1_2_1_65_1","volume-title":"Gaussian process optimization in the bandit setting: No regret and experimental design. arXiv preprint arXiv:0912.3995","author":"Srinivas Niranjan","year":"2009","unstructured":"Niranjan Srinivas , Andreas Krause , Sham M Kakade , and Matthias Seeger . 2009. Gaussian process optimization in the bandit setting: No regret and experimental design. arXiv preprint arXiv:0912.3995 ( 2009 ). Niranjan Srinivas, Andreas Krause, Sham M Kakade, and Matthias Seeger. 2009. Gaussian process optimization in the bandit setting: No regret and experimental design. arXiv preprint arXiv:0912.3995 (2009)."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14778\/3339490.3339503"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064029"},{"key":"e_1_2_1_68_1","volume-title":"MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM. In 2020 USENIX Annual Technical Conference (USENIXATC 20)","author":"Yao Ting","year":"2020","unstructured":"Ting Yao , Yiwen Zhang , Jiguang Wan , Qiu Cui , Liu Tang , Hong Jiang , Changsheng Xie , and Xubin He . 2020 . MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM. In 2020 USENIX Annual Technical Conference (USENIXATC 20) . 17--31. Ting Yao, Yiwen Zhang, Jiguang Wan, Qiu Cui, Liu Tang, Hong Jiang, Changsheng Xie, and Xubin He. 2020. MatrixKV: Reducing Write Stalls and Write Amplification in LSM-tree Based KV Stores with Matrix Container in NVM. In 2020 USENIX Annual Technical Conference (USENIXATC 20) . 17--31."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300085"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457291"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3530903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T22:18:35Z","timestamp":1659046715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3530903"}},"subtitle":["Adaptive Configuration Tuning of RocksDB KV-Store"],"short-title":[],"issued":{"date-parts":[[2022,5,26]]},"references-count":70,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5,26]]}},"alternative-id":["10.1145\/3530903"],"URL":"http:\/\/dx.doi.org\/10.1145\/3530903","relation":{},"ISSN":["2476-1249"],"issn-type":[{"value":"2476-1249","type":"electronic"}],"subject":["Computer Networks and Communications","Hardware and Architecture","Safety, Risk, Reliability and Quality","Computer Science (miscellaneous)"],"published":{"date-parts":[[2022,5,26]]}}}