callback( { "result":{ "query":":facetid:toc:\"db/conf/systor/systor2019.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.32" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"35", "@dc":"35", "@oc":"35", "@id":"43428100", "text":":facetid:toc:db/conf/systor/systor2019.bht" } }, "hits":{ "@total":"35", "@computed":"35", "@sent":"35", "@first":"0", "hit":[{ "@score":"1", "@id":"2280807", "info":{"authors":{"author":[{"@pid":"159/2333","text":"Amogh Akshintala"},{"@pid":"07/10441","text":"Bhushan Jain"},{"@pid":"08/10015","text":"Chia-che Tsai"},{"@pid":"46/4377","text":"Michael Ferdman"},{"@pid":"08/4732","text":"Donald E. Porter"}]},"title":"x86-64 instruction usage among C/C++ applications.","venue":"SYSTOR","pages":"68-79","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/AkshintalaJTFP19","doi":"10.1145/3319647.3325833","ee":"https://doi.org/10.1145/3319647.3325833","url":"https://dblp.org/rec/conf/systor/AkshintalaJTFP19"}, "url":"URL#2280807" }, { "@score":"1", "@id":"2280808", "info":{"authors":{"author":[{"@pid":"241/5829","text":"Ido Ben-Yair"},{"@pid":"241/5850","text":"Pavel Rogovoy"},{"@pid":"29/10161","text":"Nezer Zaidenberg"}]},"title":"AI & eBPF based performance anomaly detection system.","venue":"SYSTOR","pages":"180","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/Ben-YairRZ19","doi":"10.1145/3319647.3325842","ee":"https://doi.org/10.1145/3319647.3325842","url":"https://dblp.org/rec/conf/systor/Ben-YairRZ19"}, "url":"URL#2280808" }, { "@score":"1", "@id":"2280809", "info":{"authors":{"author":[{"@pid":"94/2509","text":"Daniel Berend"},{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"46/7652","text":"Marina Kogan-Sadetsky"}]},"title":"AdaptiveClimb: adaptive policy for cache replacement.","venue":"SYSTOR","pages":"187","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/BerendDK19","doi":"10.1145/3319647.3325848","ee":"https://doi.org/10.1145/3319647.3325848","url":"https://dblp.org/rec/conf/systor/BerendDK19"}, "url":"URL#2280809" }, { "@score":"1", "@id":"2280810", "info":{"authors":{"author":[{"@pid":"241/5832","text":"Aviram Berg"},{"@pid":"241/5857","text":"Elin Tulchinsky"},{"@pid":"29/10161","text":"Nezer Jacob Zaidenberg"}]},"title":"Deadversarial multiverse network: a defense architecture against adversarial attacks.","venue":"SYSTOR","pages":"190","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/BergTZ19","doi":"10.1145/3319647.3325851","ee":"https://doi.org/10.1145/3319647.3325851","url":"https://dblp.org/rec/conf/systor/BergTZ19"}, "url":"URL#2280810" }, { "@score":"1", "@id":"2280811", "info":{"authors":{"author":[{"@pid":"130/2908","text":"Stefan Brenner"},{"@pid":"27/2697","text":"RĂ¼diger Kapitza"}]},"title":"Trust more, serverless.","venue":"SYSTOR","pages":"33-43","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/BrennerK19","doi":"10.1145/3319647.3325825","ee":"https://doi.org/10.1145/3319647.3325825","url":"https://dblp.org/rec/conf/systor/BrennerK19"}, "url":"URL#2280811" }, { "@score":"1", "@id":"2280812", "info":{"authors":{"author":[{"@pid":"99/311-0013","text":"Ming Chen 0013"},{"@pid":"71/1341","text":"Erez Zadok"}]},"title":"Kurma: secure geo-distributed multi-cloud storage gateways.","venue":"SYSTOR","pages":"109-120","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/ChenZ19","doi":"10.1145/3319647.3325830","ee":"https://doi.org/10.1145/3319647.3325830","url":"https://dblp.org/rec/conf/systor/ChenZ19"}, "url":"URL#2280812" }, { "@score":"1", "@id":"2280813", "info":{"authors":{"author":[{"@pid":"45/3968","text":"Itai Dabran"},{"@pid":"241/5838","text":"Shahar Shalev"},{"@pid":"241/5824","text":"Aviad Shiber"},{"@pid":"241/5800","text":"Oded Raitzes"}]},"title":"A smart outdoor navigation system for visually impaired people.","venue":"SYSTOR","pages":"184","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/DabranSSR19","doi":"10.1145/3319647.3325845","ee":"https://doi.org/10.1145/3319647.3325845","url":"https://dblp.org/rec/conf/systor/DabranSSR19"}, "url":"URL#2280813" }, { "@score":"1", "@id":"2280814", "info":{"authors":{"author":[{"@pid":"151/5044","text":"Oshrit Feder"},{"@pid":"241/5858","text":"Guy Khazma"},{"@pid":"241/5845","text":"Gal Lushi"},{"@pid":"28/3824","text":"Yosef Moatti"},{"@pid":"38/1877","text":"Paula Ta-Shma"}]},"title":"Big data skipping in the cloud.","venue":"SYSTOR","pages":"193","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/FederKLMT19","doi":"10.1145/3319647.3325854","ee":"https://doi.org/10.1145/3319647.3325854","url":"https://dblp.org/rec/conf/systor/FederKLMT19"}, "url":"URL#2280814" }, { "@score":"1", "@id":"2280815", "info":{"authors":{"author":[{"@pid":"162/9757","text":"Eran Gilad"},{"@pid":"241/5833","text":"Aviad Rozenknof"},{"@pid":"241/5851","text":"Mark Erlich"},{"@pid":"241/5849","text":"Ophir Katz"},{"@pid":"241/5810","text":"Eliad Ben Yishay"},{"@pid":"241/5805","text":"Yaniv Baldinger"},{"@pid":"176/5328","text":"Oren Kalinsky"}]},"title":"Keydomet: faster prefix-based key comparison.","venue":"SYSTOR","pages":"183","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/GiladREKYBK19","doi":"10.1145/3319647.3325844","ee":"https://doi.org/10.1145/3319647.3325844","url":"https://dblp.org/rec/conf/systor/GiladREKYBK19"}, "url":"URL#2280815" }, { "@score":"1", "@id":"2280816", "info":{"authors":{"author":[{"@pid":"09/4293","text":"Alex Glikson"},{"@pid":"241/5822","text":"Shichao Nie"},{"@pid":"59/4355","text":"David Breitgand"}]},"title":"Runbox: serverless interactive computing platform.","venue":"SYSTOR","pages":"191","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/GliksonNB19","doi":"10.1145/3319647.3325852","ee":"https://doi.org/10.1145/3319647.3325852","url":"https://dblp.org/rec/conf/systor/GliksonNB19"}, "url":"URL#2280816" }, { "@score":"1", "@id":"2280817", "info":{"authors":{"author":[{"@pid":"36/7454","text":"Yangwook Kang"},{"@pid":"119/1624","text":"Rekha Pitchumani"},{"@pid":"183/1608","text":"Pratik Mishra"},{"@pid":"81/5871","text":"Yang-Suk Kee"},{"@pid":"241/5816","text":"Francisco Londono"},{"@pid":"65/912-2","text":"Sangyoon Oh 0002"},{"@pid":"235/5253","text":"Jongyeol Lee"},{"@pid":"184/1420","text":"Daniel D. G. Lee"}]},"title":"Towards building a high-performance, scale-in key-value storage system.","venue":"SYSTOR","pages":"144-154","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/KangPMKLOLL19","doi":"10.1145/3319647.3325831","ee":"https://doi.org/10.1145/3319647.3325831","url":"https://dblp.org/rec/conf/systor/KangPMKLOLL19"}, "url":"URL#2280817" }, { "@score":"1", "@id":"2280818", "info":{"authors":{"author":[{"@pid":"224/0000","text":"Kevin Kremer"},{"@pid":"84/2504","text":"AndrĂ© Brinkmann"}]},"title":"FADaC: a self-adapting data classifier for flash memory.","venue":"SYSTOR","pages":"167-178","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/KremerB19","doi":"10.1145/3319647.3325829","ee":"https://doi.org/10.1145/3319647.3325829","url":"https://dblp.org/rec/conf/systor/KremerB19"}, "url":"URL#2280818" }, { "@score":"1", "@id":"2280819", "info":{"authors":{"author":[{"@pid":"164/2565","text":"Simon Kuenzer"},{"@pid":"145/0605","text":"Sharan Santhanam"},{"@pid":"198/8365","text":"Yuri Volchkov"},{"@pid":"08/1834","text":"F. Schmidt"},{"@pid":"80/5046","text":"Felipe Huici"},{"@pid":"176/1026","text":"Joel Nider"},{"@pid":"145/7338","text":"Mike Rapoport"},{"@pid":"207/1847","text":"Costin Lupu"}]},"title":"Unleashing the power of unikernels with unikraft.","venue":"SYSTOR","pages":"195","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/KuenzerSVSHNRL19","doi":"10.1145/3319647.3325856","ee":"https://doi.org/10.1145/3319647.3325856","url":"https://dblp.org/rec/conf/systor/KuenzerSVSHNRL19"}, "url":"URL#2280819" }, { "@score":"1", "@id":"2280820", "info":{"authors":{"author":[{"@pid":"241/5820","text":"Tomer Lange"},{"@pid":"125/8655","text":"Aidan Shribman"},{"@pid":"32/8210","text":"Eran Raichstein"},{"@pid":"96/6314","text":"Katherine Barabash"}]},"title":"Exploring and troubleshooting istio issues.","venue":"SYSTOR","pages":"196","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/LangeSRB19","doi":"10.1145/3319647.3325857","ee":"https://doi.org/10.1145/3319647.3325857","url":"https://dblp.org/rec/conf/systor/LangeSRB19"}, "url":"URL#2280820" }, { "@score":"1", "@id":"2280821", "info":{"authors":{"author":[{"@pid":"65/11460","text":"Chang-Gyu Lee"},{"@pid":"217/2141","text":"Hyunki Byun"},{"@pid":"241/5802","text":"Sunghyun Noh"},{"@pid":"241/5836","text":"Hyeongu Kang"},{"@pid":"19/5848","text":"Youngjae Kim 0001"}]},"title":"Write optimization of log-structured flash file system for parallel I/O on manycore servers.","venue":"SYSTOR","pages":"21-32","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/LeeBNK019","doi":"10.1145/3319647.3325828","ee":"https://doi.org/10.1145/3319647.3325828","url":"https://dblp.org/rec/conf/systor/LeeBNK019"}, "url":"URL#2280821" }, { "@score":"1", "@id":"2280822", "info":{"authors":{"author":{"@pid":"74/3487","text":"Cong Li"}},"title":"CLOCK-pro+: improving CLOCK-pro cache replacement with utility-driven adaptation.","venue":"SYSTOR","pages":"1-7","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/Li19","doi":"10.1145/3319647.3325838","ee":"https://doi.org/10.1145/3319647.3325838","url":"https://dblp.org/rec/conf/systor/Li19"}, "url":"URL#2280822" }, { "@score":"1", "@id":"2280823", "info":{"authors":{"author":{"@pid":"12/1073","text":"Paul E. McKenney"}},"title":"A critical RCU safety property is... ease of use!","venue":"SYSTOR","pages":"132-143","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/McKenney19","doi":"10.1145/3319647.3325836","ee":"https://doi.org/10.1145/3319647.3325836","url":"https://dblp.org/rec/conf/systor/McKenney19"}, "url":"URL#2280823" }, { "@score":"1", "@id":"2280824", "info":{"authors":{"author":[{"@pid":"177/8621","text":"Hagar Meir"},{"@pid":"46/10055","text":"Artem Barger"},{"@pid":"200/1306","text":"Yacov Manevich"}]},"title":"Increasing concurrency in hyperledger fabric.","venue":"SYSTOR","pages":"179","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/MeirBM19","doi":"10.1145/3319647.3325841","ee":"https://doi.org/10.1145/3319647.3325841","url":"https://dblp.org/rec/conf/systor/MeirBM19"}, "url":"URL#2280824" }, { "@score":"1", "@id":"2280825", "info":{"authors":{"author":[{"@pid":"241/5855","text":"Theodore Michailidis"},{"@pid":"d/AlexDelis","text":"Alex Delis"},{"@pid":"r/MRoussopoulos","text":"Mema Roussopoulos"}]},"title":"MEGA: overcoming traditional problems with OS huge page management.","venue":"SYSTOR","pages":"121-131","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/MichailidisDR19","doi":"10.1145/3319647.3325839","ee":"https://doi.org/10.1145/3319647.3325839","url":"https://dblp.org/rec/conf/systor/MichailidisDR19"}, "url":"URL#2280825" }, { "@score":"1", "@id":"2280826", "info":{"authors":{"author":[{"@pid":"27/6504","text":"Kenneth Nagin"},{"@pid":"234/5908","text":"Andre Kassis"},{"@pid":"49/2478","text":"Dean H. Lorenz"},{"@pid":"96/6314","text":"Katherine Barabash"},{"@pid":"32/8210","text":"Eran Raichstein"}]},"title":"Estimating client QoE from measured network QoS.","venue":"SYSTOR","pages":"188","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/NaginKLBR19","doi":"10.1145/3319647.3325849","ee":"https://doi.org/10.1145/3319647.3325849","url":"https://dblp.org/rec/conf/systor/NaginKLBR19"}, "url":"URL#2280826" }, { "@score":"1", "@id":"2280827", "info":{"authors":{"author":[{"@pid":"07/10954","text":"Iyswarya Narayanan"},{"@pid":"150/3388","text":"Aishwarya Ganesan"},{"@pid":"51/8142","text":"Anirudh Badam"},{"@pid":"18/4286","text":"Sriram Govindan"},{"@pid":"24/7446","text":"Bikash Sharma"},{"@pid":"72/3356","text":"Anand Sivasubramaniam"}]},"title":"Getting more performance with polymorphism from emerging memory technologies.","venue":"SYSTOR","pages":"8-20","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/NarayananGBGSS19","doi":"10.1145/3319647.3325826","ee":"https://doi.org/10.1145/3319647.3325826","url":"https://dblp.org/rec/conf/systor/NarayananGBGSS19"}, "url":"URL#2280827" }, { "@score":"1", "@id":"2280828", "info":{"authors":{"author":[{"@pid":"133/6961","text":"Fan Ni"},{"@pid":"17/418","text":"Xing Lin"},{"@pid":"08/237-1","text":"Song Jiang 0001"}]},"title":"SS-CDC: a two-stage parallel content-defined chunking for deduplicating backup storage.","venue":"SYSTOR","pages":"86-96","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/NiLJ19","doi":"10.1145/3319647.3325834","ee":"https://doi.org/10.1145/3319647.3325834","url":"https://dblp.org/rec/conf/systor/NiLJ19"}, "url":"URL#2280828" }, { "@score":"1", "@id":"2280829", "info":{"authors":{"author":[{"@pid":"176/1026","text":"Joel Nider"},{"@pid":"145/7338","text":"Mike Rapoport"},{"@pid":"145/7322","text":"James Bottomley"}]},"title":"Address space isolation in the linux kernel.","venue":"SYSTOR","pages":"194","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/NiderRB19","doi":"10.1145/3319647.3325855","ee":"https://doi.org/10.1145/3319647.3325855","url":"https://dblp.org/rec/conf/systor/NiderRB19"}, "url":"URL#2280829" }, { "@score":"1", "@id":"2280830", "info":{"authors":{"author":[{"@pid":"142/3209","text":"Stanko Novakovic"},{"@pid":"206/4531","text":"Yizhou Shan"},{"@pid":"138/4146","text":"Aasheesh Kolli"},{"@pid":"204/3004","text":"Michael Cui"},{"@pid":"64/3770-5","text":"Yiying Zhang 0005"},{"@pid":"25/3649","text":"Haggai Eran"},{"@pid":"241/5842","text":"Boris Pismenny"},{"@pid":"17/179","text":"Liran Liss"},{"@pid":"132/0329","text":"Michael Wei"},{"@pid":"26/914","text":"Dan Tsafrir"},{"@pid":"10/553","text":"Marcos K. Aguilera"}]},"title":"Storm: a fast transactional dataplane for remote data structures.","venue":"SYSTOR","pages":"97-108","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/NovakovicSKCZEP19","doi":"10.1145/3319647.3325827","ee":"https://doi.org/10.1145/3319647.3325827","url":"https://dblp.org/rec/conf/systor/NovakovicSKCZEP19"}, "url":"URL#2280830" }, { "@score":"1", "@id":"2280831", "info":{"authors":{"author":[{"@pid":"241/5847","text":"Yihan Pang"},{"@pid":"60/10663","text":"Robert Lyerly"},{"@pid":"61/2985","text":"Binoy Ravindran"}]},"title":"Cross-ISA execution of SIMD regions for improved performance.","venue":"SYSTOR","pages":"55-67","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/PangLR19","doi":"10.1145/3319647.3325832","ee":"https://doi.org/10.1145/3319647.3325832","url":"https://dblp.org/rec/conf/systor/PangLR19"}, "url":"URL#2280831" }, { "@score":"1", "@id":"2280832", "info":{"authors":{"author":[{"@pid":"241/5799","text":"Liat Pele"},{"@pid":"241/5792","text":"Udi Buczko"},{"@pid":"241/5817","text":"Oren Galor"},{"@pid":"241/5796","text":"Nokia Israel"},{"@pid":"139/7090","text":"Gil Einziger"},{"@pid":"38/10633","text":"Ben Gurion"}]},"title":"Detecting traffic anomalies with adaptive sampling.","venue":"SYSTOR","pages":"186","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/PeleBGIEG19","doi":"10.1145/3319647.3325847","ee":"https://doi.org/10.1145/3319647.3325847","url":"https://dblp.org/rec/conf/systor/PeleBGIEG19"}, "url":"URL#2280832" }, { "@score":"1", "@id":"2280833", "info":{"authors":{"author":[{"@pid":"241/5840","text":"Gil Peleg"},{"@pid":"241/5843","text":"Offer Baruch"},{"@pid":"241/5841","text":"Dori Polotsky"}]},"title":"Backup mainframe data to object storage systems.","venue":"SYSTOR","pages":"185","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/PelegBP19","doi":"10.1145/3319647.3325846","ee":"https://doi.org/10.1145/3319647.3325846","url":"https://dblp.org/rec/conf/systor/PelegBP19"}, "url":"URL#2280833" }, { "@score":"1", "@id":"2280834", "info":{"authors":{"author":[{"@pid":"225/5260","text":"Alon Riesenberg"},{"@pid":"225/5219","text":"Yonnie Kirzon"},{"@pid":"225/5246","text":"Michael Bunin"},{"@pid":"225/5276","text":"Elad Galili"},{"@pid":"225/5247","text":"Gidi Navon"},{"@pid":"81/4474","text":"Tal Mizrahi"}]},"title":"Time-multiplexed parsing in marking-based network telemetry.","venue":"SYSTOR","pages":"80-85","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/RiesenbergKBGNM19","doi":"10.1145/3319647.3325837","ee":"https://doi.org/10.1145/3319647.3325837","url":"https://dblp.org/rec/conf/systor/RiesenbergKBGNM19"}, "url":"URL#2280834" }, { "@score":"1", "@id":"2280835", "info":{"authors":{"author":[{"@pid":"24/4507","text":"Eliot E. Salant"},{"@pid":"03/1992","text":"Gidon Gershinsky"}]},"title":"End-to-end secure insurance telematics.","venue":"SYSTOR","pages":"182","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/SalantG19","doi":"10.1145/3319647.3326466","ee":"https://doi.org/10.1145/3319647.3326466","url":"https://dblp.org/rec/conf/systor/SalantG19"}, "url":"URL#2280835" }, { "@score":"1", "@id":"2280836", "info":{"authors":{"author":[{"@pid":"189/0114","text":"Bohdan Trach"},{"@pid":"166/4142","text":"Oleksii Oleksenko"},{"@pid":"188/9991","text":"Franz Gregor"},{"@pid":"35/8319","text":"Pramod Bhatotia"},{"@pid":"f/ChristofFetzer","text":"Christof Fetzer"}]},"title":"Clemmys: towards secure remote execution in FaaS.","venue":"SYSTOR","pages":"44-54","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/TrachOGBF19","doi":"10.1145/3319647.3325835","ee":"https://doi.org/10.1145/3319647.3325835","url":"https://dblp.org/rec/conf/systor/TrachOGBF19"}, "url":"URL#2280836" }, { "@score":"1", "@id":"2280837", "info":{"authors":{"author":[{"@pid":"62/5839","text":"Jing Yang"},{"@pid":"207/0319","text":"Shuyi Pei"},{"@pid":"47/3749-1","text":"Qing Yang 0001"}]},"title":"WARCIP: write amplification reduction by clustering I/O pages.","venue":"SYSTOR","pages":"155-166","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/YangPY19","doi":"10.1145/3319647.3325840","ee":"https://doi.org/10.1145/3319647.3325840","url":"https://dblp.org/rec/conf/systor/YangPY19"}, "url":"URL#2280837" }, { "@score":"1", "@id":"2280838", "info":{"authors":{"author":[{"@pid":"221/1514","text":"Raz Ben Yehuda"},{"@pid":"241/5797","text":"Dean Kevorkian"},{"@pid":"241/5835","text":"Gil Leon Zamir"},{"@pid":"241/5861","text":"Maor Yakov Walter"},{"@pid":"241/5813","text":"Liron Levy"}]},"title":"Virtual USB honeypot.","venue":"SYSTOR","pages":"181","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/YehudaKZWL19","doi":"10.1145/3319647.3325843","ee":"https://doi.org/10.1145/3319647.3325843","url":"https://dblp.org/rec/conf/systor/YehudaKZWL19"}, "url":"URL#2280838" }, { "@score":"1", "@id":"2280839", "info":{"authors":{"author":[{"@pid":"241/5803","text":"Ofir Zeilig"},{"@pid":"241/5807","text":"Noa Bratman"},{"@pid":"241/5808","text":"Itzik Ashkenazi"},{"@pid":"32/8210","text":"Eran Raichstein"},{"@pid":"13/8087","text":"Anna Levin"},{"@pid":"96/6314","text":"Katherine Barabash"}]},"title":"Noisy neighbor detection using skydive.","venue":"SYSTOR","pages":"189","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/ZeiligBARLB19","doi":"10.1145/3319647.3325850","ee":"https://doi.org/10.1145/3319647.3325850","url":"https://dblp.org/rec/conf/systor/ZeiligBARLB19"}, "url":"URL#2280839" }, { "@score":"1", "@id":"2280840", "info":{"authors":{"author":{"@pid":"241/5856","text":"Itai Ben Zion"}},"title":"Key-value FTL over open channel SSD.","venue":"SYSTOR","pages":"192","year":"2019","type":"Conference and Workshop Papers","access":"closed","key":"conf/systor/Zion19","doi":"10.1145/3319647.3325853","ee":"https://doi.org/10.1145/3319647.3325853","url":"https://dblp.org/rec/conf/systor/Zion19"}, "url":"URL#2280840" }, { "@score":"1", "@id":"2299110", "info":{"authors":{"author":[{"@pid":"97/5500","text":"Moshik Hershcovitch"},{"@pid":"g/AshvinGoel","text":"Ashvin Goel"},{"@pid":"40/944","text":"Adam Morrison 0001"}]},"title":"Proceedings of the 12th ACM International Conference on Systems and Storage, SYSTOR 2019, Haifa, Israel, June 3-5, 2019","venue":"SYSTOR","publisher":"ACM","year":"2019","type":"Editorship","key":"conf/systor/2019","doi":"10.1145/3319647","ee":"https://doi.org/10.1145/3319647","url":"https://dblp.org/rec/conf/systor/2019"}, "url":"URL#2299110" } ] } } } )