StRoM: smart remote memory

D Sidler, Z Wang, M Chiosa, A Kulkarni… - Proceedings of the …, 2020 - dl.acm.org
Big data applications often incur large costs in I/O, data transfer and copying overhead,
especially when operating in cloud environments. Since most such computations are …

A Survey of Storage Systems in the RDMA era

S Ma, T Ma, K Chen, Y Wu - IEEE Transactions on Parallel and …, 2022 - ieeexplore.ieee.org
Remote Direct Memory Access (RDMA) based network devices are increasingly being
deployed in modern data centers. RDMA brings significant performance improvements over …

{FUSEE}: A fully {Memory-Disaggregated}{Key-Value} store

J Shen, P Zuo, X Luo, T Yang, Y Su, Y Zhou… - … USENIX Conference on …, 2023 - usenix.org
Distributed in-memory key-value (KV) stores are embracing the disaggregated memory (DM)
architecture for higher resource utilization. However, existing KV stores on DM employ …

Assise: Performance and availability via client-local {NVM} in a distributed file system

TE Anderson, M Canini, J Kim, D Kostić… - … USENIX Symposium on …, 2020 - usenix.org
The adoption of low latency persistent memory modules (PMMs) upends the long-
established model of remote storage for distributed file systems. Instead, by colocating …

Aria: a fast and practical deterministic OLTP database

Y Lu, X Yu, L Cao, S Madden - 2020 - dspace.mit.edu
© 2020, VLDB Endowment. Deterministic databases are able to efficiently run transactions
across different replicas without coordination. However, existing state-of-the-art deterministic …

Avocado: A Secure {In-Memory} Distributed Storage System

M Bailleu, D Giantsidi, V Gavrielatos… - 2021 USENIX Annual …, 2021 - usenix.org
We introduce Avocado, a secure in-memory distributed storage system that provides strong
security, fault-tolerance, consistency (linearizability) and performance for untrusted cloud …

Rethinking database high availability with RDMA networks

E Zamanian, X Yu, M Stonebraker… - Proceedings of the VLDB …, 2019 - dl.acm.org
Highly available database systems rely on data replication to tolerate machine failures. Both
classes of existing replication algorithms, active-passive and active-active, were designed in …