Proceedings of the 3rd Workshop on Interactions of NVM/FLASH With Operating Systems and Workloads 2015
DOI: 10.1145/2819001.2819002
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting hash table design for phase change memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…Level hashing is a variant of Bucketized Cuckoo hashing (BCH) [18], [30], [31]. It is designed to reduce write operations in consideration of the PM characteristics.…”
Section: ) Hash-based Index Structuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Level hashing is a variant of Bucketized Cuckoo hashing (BCH) [18], [30], [31]. It is designed to reduce write operations in consideration of the PM characteristics.…”
Section: ) Hash-based Index Structuresmentioning
confidence: 99%
“…To recover from system failure, the index structure of an IMDB should be able to reconstruct the consistent state from the remaining data in memory at any point. For this, several PM-aware index structures have been proposed [2]- [18]. However, the PM-aware indexes commonly send writes down to the PM using the explicit cache flush and memory fence instructions to ensure write-ordering whenever the structure is modified.…”
Section: Introductionmentioning
confidence: 99%
“…Memristors have also been proposed for building byteaddressable non-volatile memories. There have been various works centered around system support for non-volatile memory, including file systems [30], memory allocators [11,83], programming models [16,27,106], durable data structures [31,55,113], representation of pointers [18,28,34,35], and architecture support [60,80,82,99].…”
Section: Related Workmentioning
confidence: 99%
“…There has been additional work on indices that reduce writes to byte-addressable NVM, to reduce its wear [11,14,18,32]. Prior research has also explored using using differential logging [10,20,21], to only log modified bytes to avoid excessive writes in NVM.…”
Section: Nvm For Key-value Storesmentioning
confidence: 99%