{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:36:09Z","timestamp":1725622569736},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,23]]},"DOI":"10.1145\/1383422.1383428","type":"proceedings-article","created":{"date-parts":[[2008,6,24]],"date-time":"2008-06-24T12:49:13Z","timestamp":1214311753000},"page":"35-44","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Evaluating the usefulness of content addressable storage for high-performance data intensive applications"],"prefix":"10.1145","author":[{"given":"Partho","family":"Nath","sequence":"first","affiliation":[{"name":"Cisco Systems, Inc., San Jose, CA, USA"}]},{"given":"Bhuvan","family":"Urgaonkar","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Anand","family":"Sivasubramaniam","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BSSN Pugh Benchmark. http:\/\/www.cactuscode.org\/Benchmarks\/bench_bssn_pugh.]] BSSN Pugh Benchmark. http:\/\/www.cactuscode.org\/Benchmarks\/bench_bssn_pugh.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"NAS PARALLEL BENCHMARKS. http:\/\/www.nas.nasa.gov\/Resources\/Software\/npb.html.]] NAS PARALLEL BENCHMARKS. http:\/\/www.nas.nasa.gov\/Resources\/Software\/npb.html.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"Oracle berkeley db. http:\/\/www.oracle.com\/database\/berkeley-db.html.]] Oracle berkeley db. http:\/\/www.oracle.com\/database\/berkeley-db.html.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/567112.567116"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/567112.567116"},{"key":"e_1_3_2_1_6_1","unstructured":"Belle. http:\/\/belle.kek.jp\/.]] Belle. http:\/\/belle.kek.jp\/.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2006.42"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06)","author":"Black J. R.","year":"2006","unstructured":"J. R. Black . Compare-by-hash : A reasoned analysis . In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06) , Boston, MA , June 2006 .]] J. R. Black. Compare-by-hash: A reasoned analysis. In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06), Boston, MA, June 2006.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267102.1267104"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/345063.339345"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9323-8_11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647819.736184"},{"key":"e_1_3_2_1_13_1","volume-title":"Fingerprinting using polynomial (rabin's method)","author":"Chan C.","year":"2001","unstructured":"C. Chan and H. Lu . Fingerprinting using polynomial (rabin's method) . Faculty of Science, University of Alberta , CMPUT690 Term Project, December 2001 .]] C. Chan and H. Lu. Fingerprinting using polynomial (rabin's method). Faculty of Science, University of Alberta, CMPUT690 Term Project, December 2001.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844155"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502054"},{"key":"e_1_3_2_1_16_1","unstructured":"Data Domain. http:\/\/www.datadomain.com.]] Data Domain. http:\/\/www.datadomain.com.]]"},{"key":"e_1_3_2_1_17_1","unstructured":"OSDL Database Test 2. http:\/\/www.osdl.org\/.]] OSDL Database Test 2. http:\/\/www.osdl.org\/.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851884"},{"key":"e_1_3_2_1_19_1","volume-title":"EMC Centera Content Addressed Storage System","author":"EMC Corp.","year":"2003","unstructured":"EMC Corp. EMC Centera Content Addressed Storage System , 2003 . http:\/\/www.emc.com\/.]] EMC Corp. EMC Centera Content Addressed Storage System, 2003. http:\/\/www.emc.com\/.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_1_21_1","first-page":"13","volume-title":"Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX)","author":"Henson V.","year":"2003","unstructured":"V. Henson . An analysis of compare-by-hash . In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX) , pages 13 -- 18 , May 2003 .]] V. Henson. An analysis of compare-by-hash. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems (HotOS IX), pages 13--18, May 2003.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Conference onf File and Storage Technologies (FAST05)","author":"Jain N.","year":"2005","unstructured":"N. Jain , M. Dahlin , and R. Tewari . Taper: Tiered approach for eliminating redundancy in replicas . In USENIX Conference onf File and Storage Technologies (FAST05) , 2005 .]] N. Jain, M. Dahlin, and R. Tewari. Taper: Tiered approach for eliminating redundancy in replicas. In USENIX Conference onf File and Storage Technologies (FAST05), 2005.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"Internet Suspend\/Resume. In Proceedings of the Workshop on Mobile Computing Systems and Applications","author":"Kozuch M.","year":"2002","unstructured":"M. Kozuch and M. Satyanarayanan . Internet Suspend\/Resume. In Proceedings of the Workshop on Mobile Computing Systems and Applications , 2002 .]] M. Kozuch and M. Satyanarayanan. Internet Suspend\/Resume. In Proceedings of the Workshop on Mobile Computing Systems and Applications, 2002.]]"},{"key":"e_1_3_2_1_24_1","volume-title":"Redundancy Elimination Within Large Collections of Files. In USENIX Annual Technical Conference","author":"Kulkarni P.","year":"2004","unstructured":"P. Kulkarni , F. Douglis , J. D. LaVoie , and J. M. Tracey . Redundancy Elimination Within Large Collections of Files. In USENIX Annual Technical Conference , General Track , 2004 .]] P. Kulkarni, F. Douglis, J. D. LaVoie, and J. M. Tracey. Redundancy Elimination Within Large Collections of Files. In USENIX Annual Technical Conference, General Track, 2004.]]"},{"key":"e_1_3_2_1_25_1","first-page":"91","volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazier\u00e8res , and D. Shasha . Secure untrusted data repository (SUNDR) . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation , pages 91 -- 106 , December 2004 .]] J. Li, M. Krohn, D. Mazier\u00e8res, and D. Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 91--106, December 2004.]]"},{"key":"e_1_3_2_1_26_1","volume-title":"Digital archiving: End-user survey and market forecast 2006-2010","author":"McKnight J.","year":"2006","unstructured":"J. McKnight , T. Asaro , and B. Babineau . Digital archiving: End-user survey and market forecast 2006-2010 . The Enterprise Strategy Group , Jan 2006 .]] J. McKnight, T. Asaro, and B. Babineau. Digital archiving: End-user survey and market forecast 2006-2010. The Enterprise Strategy Group, Jan 2006.]]"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the First Symposium on Networked Systems Design and Implementation","author":"Mogul J. C.","year":"2004","unstructured":"J. C. Mogul , Y. M. Chan , and T. Kelly . Design, Implementation, and Evaluation of Duplicate Transfer Detection in HTTP . In Proceedings of the First Symposium on Networked Systems Design and Implementation , San Francisco, CA , March 2004 .]] J. C. Mogul, Y. M. Chan, and T. Kelly. Design, Implementation, and Evaluation of Duplicate Transfer Detection in HTTP. In Proceedings of the First Symposium on Networked Systems Design and Implementation, San Francisco, CA, March 2004.]]"},{"key":"e_1_3_2_1_28_1","unstructured":"http:\/\/www.venge.net\/monotone\/docs\/Hash-Integrity.html.]] http:\/\/www.venge.net\/monotone\/docs\/Hash-Integrity.html.]]"},{"key":"e_1_3_2_1_29_1","volume-title":"Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing","author":"Moreton T. D.","year":"2002","unstructured":"T. D. Moreton , I. A. Pratt , and T. L. Harris . Storage, Mutability and Naming in Pasta . In Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing , 2002 .]] T. D. Moreton, I. A. Pratt, and T. L. Harris. Storage, Mutability and Naming in Pasta. In Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing, 2002.]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502052"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844132"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06)","author":"Nath P.","year":"2006","unstructured":"P. Nath , M. Kozuch , D. O'Hallaron , J. Harkes , M. Satyanarayanan , N. Tolia , and M. Toups . Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines . In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06) , Boston, MA , June 2006 .]] P. Nath, M. Kozuch, D. O'Hallaron, J. Harkes, M. Satyanarayanan, N. Tolia, and M. Toups. Design tradeoffs in applying content addressable storage to enterprise-scale systems based on virtual machines. In Proceedings of the 2006 USENIX Annual Technical Conference (USENIX'06), Boston, MA, June 2006.]]"},{"key":"e_1_3_2_1_33_1","unstructured":"NCBI GenBank. http:\/\/www.ncbi.nlm.nih.gov\/Genbank\/.]] NCBI GenBank. http:\/\/www.ncbi.nlm.nih.gov\/Genbank\/.]]"},{"volume-title":"Proceedings of the TeraGrid 2006 Conference.]]","author":"Olsen K.","key":"e_1_3_2_1_34_1","unstructured":"K. Olsen , J. B. Minster , Y. Cui , A. Chourasia , R. Moore , Y. Hu , J. Zhu , P. Maechling , and T. Jordan . SCEC TeraShake Simulations: High Resolution Simulations of Large Southern San Andreas Earthquakes Using the TeraGrid . In Proceedings of the TeraGrid 2006 Conference.]] K. Olsen, J. B. Minster, Y. Cui, A. Chourasia, R. Moore, Y. Hu, J. Zhu, P. Maechling, and T. Jordan. SCEC TeraShake Simulations: High Resolution Simulations of Large Southern San Andreas Earthquakes Using the TeraGrid. In Proceedings of the TeraGrid 2006 Conference.]]"},{"key":"e_1_3_2_1_35_1","unstructured":"TeraByte Scale Enterprise databases. http:\/\/members.microsoft.com\/customerevidence\/Common\/FileOpen.aspx?FileName=7405_FirstPremier_TDM_SQL_Server_Case_Study_Final.doc.]] TeraByte Scale Enterprise databases. http:\/\/members.microsoft.com\/customerevidence\/Common\/FileOpen.aspx?FileName=7405_FirstPremier_TDM_SQL_Server_Case_Study_Final.doc.]]"},{"key":"e_1_3_2_1_36_1","unstructured":"Terabyte scale enterprise databases. http:\/\/www.wintercorp.com\/VLDB\/2005_TopTen_Survey\/2005TopTenWinners.pdf.]] Terabyte scale enterprise databases. http:\/\/www.wintercorp.com\/VLDB\/2005_TopTen_Survey\/2005TopTenWinners.pdf.]]"},{"key":"e_1_3_2_1_37_1","unstructured":"Terabyte scale enterprise databases. http:\/\/www.webtechniques.com\/archives\/1999\/02\/data\/.]] Terabyte scale enterprise databases. http:\/\/www.webtechniques.com\/archives\/1999\/02\/data\/.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the FAST 2002 Conference on File and Storage Technologies","author":"Quinlan S.","year":"2002","unstructured":"S. Quinlan and S. Dorward . Venti: A New Approach to Archival Storage . In Proceedings of the FAST 2002 Conference on File and Storage Technologies , January 2002 .]] S. Quinlan and S. Dorward. Venti: A New Approach to Archival Storage. In Proceedings of the FAST 2002 Conference on File and Storage Technologies, January 2002.]]"},{"key":"e_1_3_2_1_39_1","unstructured":"S. Quinlan J. McKie and R. Cox. Fossil an archival file-server. http:\/\/www.cs.bell-labs.com\/sys\/doc\/fossil.pdf.]] S. Quinlan J. McKie and R. Cox. Fossil an archival file-server. http:\/\/www.cs.bell-labs.com\/sys\/doc\/fossil.pdf.]]"},{"key":"e_1_3_2_1_40_1","volume-title":"Harvard University Center for Research in Computing Technology Technical Report TR-15-81","author":"Rabin M.","year":"1981","unstructured":"M. Rabin . Fingerprinting by Random Polynomials . In Harvard University Center for Research in Computing Technology Technical Report TR-15-81 , 1981 .]] M. Rabin. Fingerprinting by Random Polynomials. In Harvard University Center for Research in Computing Technology Technical Report TR-15-81, 1981.]]"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775239"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_43_1","volume-title":"Improved file synchronization techniques for maintaining large replicated collections over slow networks. icde, 00","author":"Suel T.","year":"2004","unstructured":"T. Suel , P. Noel , and D. Trendafilov . Improved file synchronization techniques for maintaining large replicated collections over slow networks. icde, 00 , 2004 .]] T. Suel, P. Noel, and D. Trendafilov. Improved file synchronization techniques for maintaining large replicated collections over slow networks. icde, 00, 2004.]]"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 3rd USENIX Conference on File and Storage Technologies","author":"Tolia N.","year":"2004","unstructured":"N. Tolia , J. Harkes , M. Kozuch , and M. Satyanarayanan . Integrating Portable and Distributed Storage . In Proceedings of the 3rd USENIX Conference on File and Storage Technologies , 2004 .]] N. Tolia, J. Harkes, M. Kozuch, and M. Satyanarayanan. Integrating Portable and Distributed Storage. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies, 2004.]]"},{"volume-title":"A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proceedings of the 2003 USENIX Annual Technical Conference","year":"2003","key":"e_1_3_2_1_45_1","unstructured":"Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., Perrig , A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proceedings of the 2003 USENIX Annual Technical Conference , San Antonio, TX , June 2003 .]] Tolia, N., Kozuch, M., Satyanarayanan, M., Karp, B., Bressoud, T., Perrig, A. Opportunistic Use of Content-Addressable Storage for Distributed File Systems. In Proceedings of the 2003 USENIX Annual Technical Conference, San Antonio, TX, June 2003.]]"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST'05)","author":"Vilayannur M.","year":"2005","unstructured":"M. Vilayannur , P. Nath , and A. Sivasubramaniam . Providing Tunable Consistency for a Parallel File Store . In Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST'05) , 2005 .]] M. Vilayannur, P. Nath, and A. Sivasubramaniam. Providing Tunable Consistency for a Parallel File Store. In Proceedings of the Fourth USENIX Conference on File and Storage Technologies (FAST'05), 2005.]]"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.47"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"}],"event":{"name":"HPDC '08: International Symposium on High Performance Distributed Computing","sponsor":["ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Boston MA USA","acronym":"HPDC '08"},"container-title":["Proceedings of the 17th international symposium on High performance distributed computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1383422.1383428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T00:52:07Z","timestamp":1673398327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1383422.1383428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,23]]},"references-count":48,"alternative-id":["10.1145\/1383422.1383428","10.1145\/1383422"],"URL":"https:\/\/doi.org\/10.1145\/1383422.1383428","relation":{},"subject":[],"published":{"date-parts":[[2008,6,23]]},"assertion":[{"value":"2008-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}