{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:30Z","timestamp":1750309350436,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2054911"],"award-info":[{"award-number":["CNS-2054911"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Air Force Office for Scientific Research","award":["FA8650-19-1-1741"],"award-info":[{"award-number":["FA8650-19-1-1741"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1145\/3599691.3603403","type":"proceedings-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T13:18:39Z","timestamp":1688995119000},"page":"51-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7211-6761","authenticated-orcid":false,"given":"Jennifer","family":"Sheldon","sequence":"first","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9812-6634","authenticated-orcid":false,"given":"Weidong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8565-7210","authenticated-orcid":false,"given":"Adnan","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7498-4239","authenticated-orcid":false,"given":"Kevin","family":"Butler","sequence":"additional","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, Gainesville, Florida, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7211-2675","authenticated-orcid":false,"given":"Md Jahidul","family":"Islam","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Florida, Gainesville, Florida, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3630-6269","authenticated-orcid":false,"given":"Sara","family":"Rampazzi","sequence":"additional","affiliation":[{"name":"Computer and Information Science and Engineering, University of Florida, Gainesville, Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Install Ubuntu Server 16.04. https:\/\/ubuntu.com\/tutorials\/install-ubuntu-server-1604#1-overview.  2021. Install Ubuntu Server 16.04. https:\/\/ubuntu.com\/tutorials\/install-ubuntu-server-1604#1-overview."},{"key":"e_1_3_2_1_2_1","volume-title":"2018 IEEE 11th international conference on cloud computing (CLOUD). IEEE, 162--169","author":"Abdelsalam Mahmoud","year":"2018","unstructured":"Mahmoud Abdelsalam , Ram Krishnan , Yufei Huang , and Ravi Sandhu . 2018 . Malware detection in cloud infrastructures using convolutional neural networks . In 2018 IEEE 11th international conference on cloud computing (CLOUD). IEEE, 162--169 . Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang, and Ravi Sandhu. 2018. Malware detection in cloud infrastructures using convolutional neural networks. In 2018 IEEE 11th international conference on cloud computing (CLOUD). IEEE, 162--169."},{"key":"e_1_3_2_1_3_1","unstructured":"Adrien Ramirez. [n. d.]. What's The difference Between A Hard Drive And A Solid State Drive? https:\/\/reviewed.usatoday.com\/laptops\/features\/ssd-vs-hdd.  Adrien Ramirez. [n. d.]. What's The difference Between A Hard Drive And A Solid State Drive? https:\/\/reviewed.usatoday.com\/laptops\/features\/ssd-vs-hdd."},{"key":"e_1_3_2_1_4_1","unstructured":"Alexander Gillis and Sarah Wilson. 2021. Hard Disk Drive (HDD). https:\/\/www.techtarget.com\/searchstorage\/definition\/hard-disk-drive#:~:text=Hard%20disk%20drive%20components%20include arm%20and%20read%2Fwrite%20head.  Alexander Gillis and Sarah Wilson. 2021. Hard Disk Drive (HDD). https:\/\/www.techtarget.com\/searchstorage\/definition\/hard-disk-drive#:~:text=Hard%20disk%20drive%20components%20include arm%20and%20read%2Fwrite%20head."},{"key":"e_1_3_2_1_5_1","unstructured":"A.R. Collins. [n. d.]. Underwater sound pressure levels. https:\/\/www.arc.id.au\/SoundLevels.html.  A.R. Collins. [n. d.]. Underwater sound pressure levels. https:\/\/www.arc.id.au\/SoundLevels.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00050"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region. 202--209","author":"Chen Ming-Hung","year":"2018","unstructured":"Ming-Hung Chen , Jyun-Yan Ciou , I- Hsin Chung , and Cheng-Fu Chou . 2018 . FlexProtect: A SDN-based DDoS attack protection architecture for multi-tenant data centers . In Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region. 202--209 . Ming-Hung Chen, Jyun-Yan Ciou, I-Hsin Chung, and Cheng-Fu Chou. 2018. FlexProtect: A SDN-based DDoS attack protection architecture for multi-tenant data centers. In Proceedings of the International Conference on High Performance Computing in Asia-Pacific Region. 202--209."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1109\/TPDS.2015.2486772","article-title":"Eavesdropping prevention for network coding encrypted cloud storage systems","volume":"27","author":"Chen Yu-Jia","year":"2015","unstructured":"Yu-Jia Chen , Li-Chun Wang , and Chen-Hung Liao . 2015 . Eavesdropping prevention for network coding encrypted cloud storage systems . IEEE Transactions on Parallel and Distributed Systems 27 , 8 (2015), 2261 -- 2273 . Yu-Jia Chen, Li-Chun Wang, and Chen-Hung Liao. 2015. Eavesdropping prevention for network coding encrypted cloud storage systems. IEEE Transactions on Parallel and Distributed Systems 27, 8 (2015), 2261--2273.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3311041"},{"key":"e_1_3_2_1_10_1","unstructured":"Clark Synthesis. [n. d.]. AQ339 Diluvio Underwater Loudspeaker. https:\/\/clarksynthesis.com\/aq339\/.  Clark Synthesis. [n. d.]. AQ339 Diluvio Underwater Loudspeaker. https:\/\/clarksynthesis.com\/aq339\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.7864753"},{"key":"e_1_3_2_1_12_1","unstructured":"David Both. 2021. An introduction to Linux's EXT4 filesystem. https:\/\/opensource.com\/article\/17\/5\/introduction-ext4-filesystem.  David Both. 2021. An introduction to Linux's EXT4 filesystem. https:\/\/opensource.com\/article\/17\/5\/introduction-ext4-filesystem."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.12720\/jcm.9.2.135-143","article-title":"Study on denial of service against underwater acoustic networks","volume":"9","author":"Dong Yangze","year":"2014","unstructured":"Yangze Dong , Hefeng Dong , and Gangqiang Zhang . 2014 . Study on denial of service against underwater acoustic networks . J. Commun. 9 , 2 (2014), 135 -- 143 . Yangze Dong, Hefeng Dong, and Gangqiang Zhang. 2014. Study on denial of service against underwater acoustic networks. J. Commun. 9, 2 (2014), 135--143.","journal-title":"J. Commun."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM2015 Conferences-Volume 9415","author":"Fischer Andreas","year":"2015","unstructured":"Andreas Fischer , Thomas Kittel , Bojan Kolosnjaji , Tamas K Lengyel , Waseem Mandarawi , Hermann Meer , Tilo M\u00fcller , Mykola Protsenko , Hans P Reiser , Benjamin Taubmann , 2015 . CloudIDEA: A Malware Defense Architecture for Cloud Data Centers . In Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM2015 Conferences-Volume 9415 . 594--611. Andreas Fischer, Thomas Kittel, Bojan Kolosnjaji, Tamas K Lengyel, Waseem Mandarawi, Hermann Meer, Tilo M\u00fcller, Mykola Protsenko, Hans P Reiser, Benjamin Taubmann, et al. 2015. CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. In Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM2015 Conferences-Volume 9415. 594--611."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.381574"},{"key":"e_1_3_2_1_16_1","first-page":"208","article-title":"Investigating security vulnerabilities in a hot data center with reduced cooling redundancy","volume":"19","author":"Gao Xing","year":"2020","unstructured":"Xing Gao , Guannan Liu , Zhang Xu , Haining Wang , Li Li , and Xiaorui Wang . 2020 . Investigating security vulnerabilities in a hot data center with reduced cooling redundancy . IEEE Transactions on Dependable and Secure Computing 19 , 1 (2020), 208 -- 226 . Xing Gao, Guannan Liu, Zhang Xu, Haining Wang, Li Li, and Xiaorui Wang. 2020. Investigating security vulnerabilities in a hot data center with reduced cooling redundancy. IEEE Transactions on Dependable and Secure Computing 19, 1 (2020), 208--226.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_17_1","unstructured":"GNU Radio Project. [n.d.]. GNU Radio. https:\/\/www.gnuradio.org\/  GNU Radio Project. [n.d.]. GNU Radio. https:\/\/www.gnuradio.org\/"},{"key":"e_1_3_2_1_18_1","volume-title":"22nd European Symposium on Research in Computer Security, (ESORICS","author":"Guri Mordechai","year":"2017","unstructured":"Mordechai Guri , Yosef Solewicz , Andrey Daidakulov , and Yuval Elovici . 2017 . Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('DiskFiltration') . In 22nd European Symposium on Research in Computer Security, (ESORICS 2017). Springer, 98--115. Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. 2017. Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('DiskFiltration'). In 22nd European Symposium on Research in Computer Security, (ESORICS 2017). Springer, 98--115."},{"volume-title":"Fundamentals of physics","author":"Halliday David","key":"e_1_3_2_1_19_1","unstructured":"David Halliday , Robert Resnick , and Jearl Walker 2013. Fundamentals of physics . John Wiley & Sons . David Halliday, Robert Resnick, and Jearl Walker 2013. Fundamentals of physics. John Wiley & Sons."},{"key":"e_1_3_2_1_20_1","unstructured":"Jens Axboe. [n.d.]. Flexible I\/O Tester https:\/\/github.com\/axboe\/fio.  Jens Axboe. [n.d.]. Flexible I\/O Tester https:\/\/github.com\/axboe\/fio."},{"key":"e_1_3_2_1_21_1","volume-title":"2021 IEEE Symposium on Security and Privacy (SP). IEEE, 160--175","author":"Ji Xiaoyu","year":"2021","unstructured":"Xiaoyu Ji , Yushi Cheng , Yuepeng Zhang , Kai Wang , Chen Yan , Wenyuan Xu , and Kevin Fu . 2021 . Poltergeist: Acoustic adversarial machine learning against cameras and computer vision . In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 160--175 . Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, and Kevin Fu. 2021. Poltergeist: Acoustic adversarial machine learning against cameras and computer vision. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 160--175."},{"key":"e_1_3_2_1_22_1","unstructured":"John Roach. 2020. Microsoft finds underwater datacenters are reliable practical and use energy sustainably. https:\/\/news.microsoft.com\/source\/features\/sustainability\/project-natick-underwater-datacenter\/.  John Roach. 2020. Microsoft finds underwater datacenters are reliable practical and use energy sustainably. https:\/\/news.microsoft.com\/source\/features\/sustainability\/project-natick-underwater-datacenter\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Underwater acoustics","author":"Kuperman William","year":"2007","unstructured":"William Kuperman and Philippe Roux . 2007. Underwater acoustics . Springer Handbook of Acoustics ( 2007 ), 149--204. William Kuperman and Philippe Roux. 2007. Underwater acoustics. Springer Handbook of Acoustics (2007), 149--204."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"9589","DOI":"10.1109\/JIOT.2020.2986702","article-title":"pAElla: Edge AI-based real-time malware detection in data centers","volume":"7","author":"Libri Antonio","year":"2020","unstructured":"Antonio Libri , Andrea Bartolini , and Luca Benini . 2020 . pAElla: Edge AI-based real-time malware detection in data centers . IEEE Internet of Things Journal 7 , 10 (2020), 9589 -- 9599 . Antonio Libri, Andrea Bartolini, and Luca Benini. 2020. pAElla: Edge AI-based real-time malware detection in data centers. IEEE Internet of Things Journal 7, 10 (2020), 9589--9599.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_26_1","unstructured":"Litton Power. 2021. The Ongoing Value of Hard Disk Drives in Data Centers. https:\/\/www.enterprisestorageforum.com\/news\/hard-disk-drives-data-centers\/.  Litton Power. 2021. The Ongoing Value of Hard Disk Drives in Data Centers. https:\/\/www.enterprisestorageforum.com\/news\/hard-disk-drives-data-centers\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.370550"},{"volume-title":"An introduction to underwater acoustics: principles and applications","author":"Lurton Xavier","key":"e_1_3_2_1_28_1","unstructured":"Xavier Lurton . 2002. An introduction to underwater acoustics: principles and applications . Vol. 2 . Springer . Xavier Lurton. 2002. An introduction to underwater acoustics: principles and applications. Vol. 2. Springer."},{"key":"e_1_3_2_1_29_1","unstructured":"Mark Shaw and Martin Goldstein. 2015. Open CloudServer JBOD specification. https:\/\/www.opencompute.org\/documents\/microsoft-ocs-v1-jbod-blade.  Mark Shaw and Martin Goldstein. 2015. Open CloudServer JBOD specification. https:\/\/www.opencompute.org\/documents\/microsoft-ocs-v1-jbod-blade."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.380790"},{"key":"e_1_3_2_1_31_1","volume-title":"2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"1","author":"Meng Bi","year":"2017","unstructured":"Bi Meng , Wang Andi , Xu Jian , and Zhou Fucai . 2017 . Ddos attack detection system based on analysis of users' behaviors for application layer . In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC) , Vol. 1 . IEEE, 596--599. Bi Meng, Wang Andi, Xu Jian, and Zhou Fucai. 2017. Ddos attack detection system based on analysis of users' behaviors for application layer. In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Vol. 1. IEEE, 596--599."},{"key":"e_1_3_2_1_32_1","unstructured":"Meta. [n. d.]. A persistent key-value database for fast storage environments. https:\/\/rocksdb.org\/.  Meta. [n. d.]. A persistent key-value database for fast storage environments. https:\/\/rocksdb.org\/."},{"volume-title":"d.]. Microsoft's Project NATICK","author":"Agarwal Mukund","key":"e_1_3_2_1_33_1","unstructured":"Mukund Agarwal . [n. d.]. Microsoft's Project NATICK ( Underwater Data Center)) . https:\/\/vdocuments.mx\/microsofts-project-natickunderwater-datacentre.html?page=1. Mukund Agarwal. [n. d.]. Microsoft's Project NATICK(Underwater Data Center)). https:\/\/vdocuments.mx\/microsofts-project-natickunderwater-datacentre.html?page=1."},{"key":"e_1_3_2_1_34_1","unstructured":"Peter Judge. 2022. Subsea Cloud announces three underwater data center projects. https:\/\/www.datacenterdynamics.com\/en\/news\/subsea-cloud-announces-three-underwater-data-center-projects\/.  Peter Judge. 2022. Subsea Cloud announces three underwater data center projects. https:\/\/www.datacenterdynamics.com\/en\/news\/subsea-cloud-announces-three-underwater-data-center-projects\/."},{"key":"e_1_3_2_1_35_1","unstructured":"Peter Judge. 2022. Work begins on Chinese underwater data center. https:\/\/www.datacenterdynamics.com\/en\/news\/work-begins-on-chinese-underwater-data-center\/.  Peter Judge. 2022. Work begins on Chinese underwater data center. https:\/\/www.datacenterdynamics.com\/en\/news\/work-begins-on-chinese-underwater-data-center\/."},{"volume-title":"Acoustics: an introduction to its physical principles and applications","author":"Pierce Allan D","key":"e_1_3_2_1_36_1","unstructured":"Allan D Pierce . 2019. Acoustics: an introduction to its physical principles and applications . Springer . Allan D Pierce. 2019. Acoustics: an introduction to its physical principles and applications. Springer."},{"key":"e_1_3_2_1_37_1","unstructured":"William John Richardson. 1991. Effects of noise on marine mammals. Number 93. The Region.  William John Richardson. 1991. Effects of noise on marine mammals. Number 93. The Region."},{"key":"e_1_3_2_1_38_1","unstructured":"Seagate. 2015. Desktop HDD Product Manual. https:\/\/www.seagate.com\/www-content\/product-content\/desktop-hdd-fam\/en-us\/docs\/100768625b.pdf.  Seagate. 2015. Desktop HDD Product Manual. https:\/\/www.seagate.com\/www-content\/product-content\/desktop-hdd-fam\/en-us\/docs\/100768625b.pdf."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266448"},{"volume-title":"24th {USENIX} Security Symposium ({USENIX} Security 15). 881--896.","author":"Son Yunmok","key":"e_1_3_2_1_40_1","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Youngseok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , and Yongdae Kim . 2015. Rocking drones with intentional sound noise on gyroscopic sensors . In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881--896. Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. 2015. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th {USENIX} Security Symposium ({USENIX} Security 15). 881--896."},{"volume-title":"Sound and vibration damping with polymers: Basic viscoelastic definitions and concepts","author":"Sperling Leslie Howard","key":"e_1_3_2_1_41_1","unstructured":"Leslie Howard Sperling . 1990. Sound and vibration damping with polymers: Basic viscoelastic definitions and concepts . ACS Publications . Leslie Howard Sperling. 1990. Sound and vibration damping with polymers: Basic viscoelastic definitions and concepts. ACS Publications."},{"key":"e_1_3_2_1_42_1","volume-title":"d.]. Data Center Storage Market Size is projected to reach USD 74.02 Billion by","author":"Research Straits","year":"2030","unstructured":"Straits Research . [n. d.]. Data Center Storage Market Size is projected to reach USD 74.02 Billion by 2030 , growing at a CAGR of 4.4%: Straits Research . https:\/\/www.globenewswire.com\/news-release\/2023\/03\/14\/2626744\/0\/en\/Data-Center-Storage-Market-Size-is-projected-to-reach-USD-74-02-Billion-by-2030-growing-at-a-CAGR-of-4-4-Straits-Research.html. Straits Research. [n. d.]. Data Center Storage Market Size is projected to reach USD 74.02 Billion by 2030, growing at a CAGR of 4.4%: Straits Research. https:\/\/www.globenewswire.com\/news-release\/2023\/03\/14\/2626744\/0\/en\/Data-Center-Storage-Market-Size-is-projected-to-reach-USD-74-02-Billion-by-2030-growing-at-a-CAGR-of-4-4-Straits-Research.html."},{"key":"e_1_3_2_1_43_1","unstructured":"Supermicro. [n.d.]. Mobile Rack CSE-M35TQB. https:\/\/www.supermicro.com\/en\/products\/accessories\/mobilerack\/CSE-M35TQB.php.  Supermicro. [n.d.]. Mobile Rack CSE-M35TQB. https:\/\/www.supermicro.com\/en\/products\/accessories\/mobilerack\/CSE-M35TQB.php."},{"key":"e_1_3_2_1_44_1","unstructured":"TOA Electronics. [n.d.]. Mixer \/ Amplifier - 120W. https:\/\/toaelectronics.com\/product\/BG-2120.  TOA Electronics. [n.d.]. Mixer \/ Amplifier - 120W. https:\/\/toaelectronics.com\/product\/BG-2120."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354195"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JOE.2009.2027800"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831296.2831320"},{"key":"e_1_3_2_1_49_1","unstructured":"Yevgeniy Sverdlik. [n.d.]. Mcrosoft's Project NATICK (Underwater Datacenter). https:\/\/www.datacenterknowledge.com\/archives\/2017\/01\/09\/microsoft-wants-to-patent-an-underwater-data-center-reef.  Yevgeniy Sverdlik. [n.d.]. Mcrosoft's Project NATICK (Underwater Datacenter). https:\/\/www.datacenterknowledge.com\/archives\/2017\/01\/09\/microsoft-wants-to-patent-an-underwater-data-center-reef."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076569.2076581"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.507"}],"event":{"name":"HotStorage '23: 15th ACM Workshop on Hot Topics in Storage and File Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"],"location":"Boston MA USA","acronym":"HotStorage '23"},"container-title":["Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599691.3603403","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3599691.3603403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:41Z","timestamp":1750291541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3599691.3603403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":51,"alternative-id":["10.1145\/3599691.3603403","10.1145\/3599691"],"URL":"https:\/\/doi.org\/10.1145\/3599691.3603403","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}