1. N. Binkert B. Beckmann and G. Black. 2011. The gem5 simulator. ACM SIGARCH computer architecture news (2011) 1--7. N. Binkert B. Beckmann and G. Black. 2011. The gem5 simulator. ACM SIGARCH computer architecture news (2011) 1--7.
2. Z. Cao S. Dong S. Vemuri and D. Du. 2020. Characterizing modeling and benchmarking rocksdb key-value workloads at facebook. In FAST. 209--223. Z. Cao S. Dong S. Vemuri and D. Du. 2020. Characterizing modeling and benchmarking rocksdb key-value workloads at facebook. In FAST. 209--223.
3. Bin Fan , Dave G. Andersen , Michael Kaminsky , and Michael D. Mitzenmacher . 2014 . Cuckoo Filter: Practically Better Than Bloom. In ACM International on Conference on Emerging Networking Experiments and Technologies. 75--88 . Bin Fan, Dave G. Andersen, Michael Kaminsky, and Michael D. Mitzenmacher. 2014. Cuckoo Filter: Practically Better Than Bloom. In ACM International on Conference on Emerging Networking Experiments and Technologies. 75--88.
4. S. Han D. Jiang and Jin X. 2020. LightKV: A Cross Media Key Value Store with Persistent Memory to Cut Long Tail Latency. In MSST. S. Han D. Jiang and Jin X. 2020. LightKV: A Cross Media Key Value Store with Persistent Memory to Cut Long Tail Latency. In MSST.
5. J. Im J. Bae C. Chung S. Lee etal 2020. PinK: High-speed in-storage key-value store with bounded tails. In ATC. 173--187. J. Im J. Bae C. Chung S. Lee et al. 2020. PinK: High-speed in-storage key-value store with bounded tails. In ATC. 173--187.