{"id":3064,"date":"2021-09-01T07:05:30","date_gmt":"2021-09-01T07:05:30","guid":{"rendered":"https:\/\/www.systor.org\/wp\/2022\/?page_id=3064"},"modified":"2022-06-06T19:51:45","modified_gmt":"2022-06-06T19:51:45","slug":"accepted-posters","status":"publish","type":"page","link":"https:\/\/www.systor.org\/2022\/accepted-posters\/","title":{"rendered":"Accepted Posters"},"content":{"rendered":"<p>[vc_section][vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; tm_responsive_css=&#8221;60233685|colbreak_no|||||||||colbreak_no|||||55px||25px||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1650194862095{padding-top: 111px !important;padding-bottom: 0px !important;}&#8221;][vc_column reduce_extra_padding=&#8221;991&#8243; tm_responsive_css=&#8221;22114509|colbreak_no|||||||||colbreak_no|||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1626073647852{padding-right: 100px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1630480753375{margin-top: -50px !important;}&#8221;]We are delighted to announce the posters that have been accepted to ACM SYSTOR\u201922.[\/vc_column_text][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3534996\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline;\"><span class=\"taghl\"><span class=\"ptitle\">Integrity Verification in Cloud Key-Value Stores<\/span><\/span><\/span><\/strong><\/a><\/p>\n<p class=\"paptitle has-tag-classes\"><b><\/b>Grisha Weintraub, Leonid Rise, Alon Kadosh (IBM Security)<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1630481509682-917fc1c7-0e7d&#8221;][vc_column_text]Database-as-a-Service (DBaaS) is a common approach for storing data in the cloud. However, this approach introduces several concerns regarding data integrity. As a client does not maintain the data, its completeness and correctness might be compromised by the cloud provider or a malicious entity that penetrated the cloud. We are introducing a novel method for verifying data integrity in cloud databases with a focus on key-value stores.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1630481509716-e374be02-f17b&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3534997\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Selective scrubbing based on algorithmic randomness<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Rahul Vishwakarma, Peter Gatsby, Jinha Hwang <span class=\"auaff\">(California State University Long Beach), Bing Liu\u00a0(Dell Technologies)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1630482835121-31ef82a8-bd1f&#8221;][vc_column_text]Disk scrubbing is a background process ton fix read errors by reading the disks (e.g., hard disk drive and solid-state drive). The best practice is intelligently scheduling the scrubbing process for the entire disks in the storage array. However, running scrubbing for all the disks can significantly increase the system load and degrade system performance when there is high incoming IO on the system. Deciding &#8220;which disk to scrub&#8221; complemented with &#8220;when to scrub&#8221; can significantly improve the overall reliability of the storage system along with the resource and power saving of the data center. We present a solution on an open-source SMART dataset that performs selective scrubbing and designs a scrub frequency based on the scrub cycle. The method leverages an algorithmic randomness framework to quantify the health of the concerned drives and ranks them for selective scrubbing.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1630482835210-d43121ac-6c8b&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3534998\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">An End-to-end Framework for Privacy Risk Assessment of AI Models<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Abigail Goldsteen, Shlomit Shachor, Natalia Raznikov <span class=\"auaff\">(IBM Research)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195853496-cd80dba9-b73e&#8221;][vc_column_text]We present a first-of-a-kind end-to-end framework for running privacy risk assessments of AI models that enables assessing models from multiple ML frameworks, using a variety of low-level privacy attacks and metrics. The tool automatically selects which attacks and metrics to run based on answers to questions, runs the attacks, summarizes and visualizes the results in an easy-to-consume manner.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195853542-52488047-afbd&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3534999\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Implementing secure, policy-driven data access in a cloud environment<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p><span class=\"auaff\">Eliot Salant\u00a0(IBM Research), Klaas Baert\u00a0(VRT Innovatie)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195875869-306b556a-82cc&#8221;][vc_column_text]The last several years have given rise to an increased emphasis on the protection of personal digital data. Businesses realize the value that their data hold \u2013 if they can provide the right set of data for a specified purpose to a specified user entity according to policy. For example, the European Union\u2019s General Data Protection Regulation (GDPR) went into effect in 2018, and strictly defines rules on the access, storage and transfer of personal data.<\/p>\n<p>Based on the world of video production, we demonstrate how we can extended the Open Source Fybrik platform (<a href=\"https:\/\/fybrik.io\/\" rel=\"noreferrer\">https:\/\/fybrik.io\/<\/a>) to create a secure workflow between an authenticated data requester and a backend data store, allowing for on-the-fly data redaction based on policy rules and runtime evaluation of requester attributes and context.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195875921-c6a600ee-f25a&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535000\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">pmAddr &#8211; a Persistent Memory Centric Computing Architecture<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Shai Taharlev, Amit Golander, Yigal Korman <span class=\"auaff\">(TogaNetworks\/Huawei)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195875037-ac6d9dc5-b5b5&#8243;][vc_column_text]Memory-centric architectures provide extreme low latency to a shared memory pool. They should also be elastic, reliable, load balanced, cheaper than DRAM, thinly provisioned and support multi-tenancy. We present pmAddr, a persistent memory-centric solution with the above features, that serves random access reads and writes at 4us and 10us respectively. This is 2-3 orders-of-magnitude lower latency compared to modern storage, and proof that PM-centric processing is possible even today, using 2021 off-the-shelf hardware.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195875085-17bc3b56-ccde&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535001\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Sharp Behavioral Changes in Preemptible Instance Pricing<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Danielle Movsowitz Davidow, Orna Agmon Ben-Yehuda, Orr Dunkelman \u00a0<span class=\"auaff\">(University of Haifa)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195873871-0023a479-d0f4&#8243;][vc_column_text]Alibaba cloud was the second cloud provider to offer preemptible (spot) instances, and yet their price traces have never been analyzed. We analyzed thousands of prices traces collected for over 3 years, to find sharp and coordinated behavioral changes in the pricing.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195873919-ac09b765-c764&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535003\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Smart Network Metrics Derivation from Flow Logs<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Kalman Meth, Eran Raichstein, Ronen Schaffer <span class=\"auaff\">(IBM Research), Mario Macias, Joel Takvorian (Redhat), Katherine Barabash (IBM Research)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195871003-ca925059-f458&#8243;][vc_column_text]Flow-Logs Pipeline is an observability tool that consumes raw network flow-logs and transforms them from their original format (e.g. NetFlow or IPFIX) into numeric metrics format. FLP allows to define transformations of data to generate condensed metrics that encapsulate network domain knowledge.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195871045-26636e32-1d2f&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535004\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Auctioning Cluster Resources<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Lee-or Alon, Sigal Oren <span class=\"auaff\">(Ben-Gurion Universirty), Orna Agmon Ben-Yehuda\u00a0(University of Haifa),\u00a0<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195870203-520c4676-aa7f&#8221;][vc_column_text]Organizational clusters are often shared among users who compete over resources, but the organization&#8217;s goal is to increase the overall utility gathered from the cluster. That is, to maximize the aggregate benefit drawn from the cluster. To overcome this problem, we enhanced SLURM with an auctioning system. We evaluated our work on several real cluster traces. Our auctioning scheduler reduces the weight of the queued jobs by 3X&#8211;11X compared with backfilling.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195870241-327156e0-2fde&#8221;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535005\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">WeRLman: To Tackle Whale (Transactions), Go Deep (RL)<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Roi Bar-Zur, Ameer Abu-Hanna, Ittay Eyal, Aviv Tamar <span class=\"auaff\">(Technion)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650195868412-085e1b93-dcd8&#8243;][vc_column_text]Blockchain technology is responsible for the emergence of cryptocurrencies, such as Bitcoin and Ethereum. The security of a blockchain protocol relies on the incentives of its participants. Selfish mining is a form of deviation from the protocol where a participant can gain more than her fair share. Previous analyses of selfish mining make easing, nonrealistic assumptions. We introduce a more realistic model which takes transaction fees into consideration. However, this comes at the cost of an intractable state space. To solve the complex model, we use deep Reinforcement Learning (deep RL). Our method can then serve to analyze more realistic models or more blockchain protocols, leading to the design of more secure blockchains in the future.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650195868457-a0f0005d-0599&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535006\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Evaluating Compressed Indexes in DBMS<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Oz Anani <span class=\"auaff\">(Tel-Aviv University)<\/span>, Gal Lushi <span class=\"auaff\">(Tel-Aviv University)<\/span>, Moshik Hershcovitch (IBM Research\/ Tel-Aviv University), Adam Morrison <span class=\"auaff\">(Tel-Aviv University)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650440096563-2c5a2047-835b&#8221;][vc_column_text]In-memory database management systems (DBMSs) are an essential part of real-world applications.<\/p>\n<p>The memory footprint is the essential resource in such systems, while the database indexes consume a large portion of the memory and can reach up to 50% of total memory consumption.<\/p>\n<p>B+tree is the most popular default index supported in these systems. There has been intensive work to create compressed B+tree indexes to lower the memory footprint<\/p>\n<p>This paper evaluates two state-of-the-art compressed B+tree implementations, a Hybrid Index and Blind Trie implementation called SeqTree. We evaluate these compressed indexing on the system level. We integrated those indexing into HSTORE and evaluated them with TPC-C workload.<\/p>\n<p>In our evaluation, SeqTree is more attractive since it consumes 30% less space than the Hybrid Index with the same throughput. We confirmed the potential of compressed B+-tree indexes. We see a 60%-75% reduction in the memory consumption of compressed B+-tree indexes compared to vanilla B+tree for 10%-15% in performance degradation.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650440096630-eb2c5bda-dc84&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535007\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">A Hybrid Attribute Based Access Control Model Applied to Data in a Hybrid Cloud Environment<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Grant Miller\u00a0<span class=\"auaff\">(IBM)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650440093925-e50edbb0-773c&#8221;][vc_column_text]Attribute Based Access Control (ABAC) has started to be more broadly adopted by enterprises around the world to provide more dynamic controls to accessing data that Role Based Access Control (RBAC) cannot [1]. The challenge is that RBAC is still widely used inside the same enterprises and ABAC has several limitations reducing its benefits. This poster will look at a hybrid implementation that overcomes disadvantages of ABAC while leveraging and integrating with RBAC managed systems.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650440094016-e9eace68-63f3&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535008\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">System-level Crash Safe Sorting on Persistent Memory<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Omri Arad , Yoav Ben Shimon, Ron Zadicario <span class=\"auaff\">(Tel-Aviv University)<\/span>, <span class=\"auaff\">Daniel Waddington (IBM Research), <\/span>Moshik Hershcovitch (IBM Research\/ Tel-Aviv University), Adam Morrison <span class=\"auaff\">(Tel-Aviv University)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650440524937-c9c412dc-b9b9&#8243;][vc_column_text]Sorting is a fundamental operation in software systems. An example for that is a prepossessing phase before executing analytics operations.<\/p>\n<p>Persistent memory (PM) is a nonvolatile device with low latency and byte-addressable access. Our experiments used Intel&#8217;s first commercially device called Intel Optane DC.<\/p>\n<p>In this paper, we evaluate system-level Crash Safe Sorting trade-offs while running with PM. We choose the merge-sort algorithm, which is widely used to organize and search for information. We integrated our sorting algorithm into MCAS (Memory Centric Active Storage), which is a high-performance client-server key-value store explicitly designed for PM.<\/p>\n<p>Our evaluation shows that Sorting fully on PM is only 1.58 slower than sorting on DRAM while giving persistent ability. In addition, the time for persisting the data is the bottleneck in the crash-safe implementation. This bottleneck can indicate the potential for utilizing a trade-off between performance and persistence.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650440525030-78e9448e-dbd5&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535009\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">SQUAD: Combining Sketching and Sampling Is Better than Either for Per-item Quantile Estimation<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Rana Shahout, Roy Friedman <span class=\"auaff\">(Technion), Ran Ben Basat\u00a0(University College London)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650440636810-80e6e857-d57e&#8221;][vc_column_text]Stream monitoring is fundamental in many data stream applications, such as financial data trackers, security, anomaly detection, and load balancing. In that respect, quantiles are of particular interest, as they often capture the user\u2019s utility. For example, if a video connection has high tail latency, the perceived quality will suffer, even if the average and median latencies are low. In this work, we consider the problem of approximating the per-item quantiles. Elements in our stream are (ID, latency) tuples, and we wish to track the latency quantiles for each ID. Existing quantile sketches are designed for a single number stream (e.g., containing just the latency). While one could allocate a separate sketch instance for each ID, this may require an infeasible amount of memory. Instead, we consider tracking the quantiles for the heavy hitters (most frequent items), which are often considered particularly important, without knowing them beforehand. We first present a simple sampling algorithm that serves as a benchmark. Then, we design an algorithm that augments a quantile sketch within each entry of a heavy hitter algorithm, resulting in similar space complexity but with a deterministic error guarantee. Finally, we present SQUAD, a method that combines sampling and sketching while improving the asymptotic space complexity. Intuitively, SQUAD uses a background sampling process to capture the behaviour of the latencies of an item before it is allocated with a sketch, thereby allowing us to use fewer samples and sketches. Our solutions are rigorously analyzed, and we demonstrate the superiority of our approach using extensive simulations.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650440636894-ca81e9e4-4674&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<\/p>\n<p class=\"paptitle has-tag-classes\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3534056.3535010\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span class=\"taghl\"><span class=\"ptitle\">Model-Based Simulation for SMT Cores<\/span><\/span><\/strong><\/span><\/a><\/p>\n<p>Idan Raz , Maxim Barsky, Ella Sheory, Idan Yaniv, Dan Tsafrir <span class=\"auaff\">(Technion &#8212; Israel Institute of Technology)<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1650440751458-c504e773-41e1&#8243;][vc_column_text]Studies that evaluate new architectural designs of virtual memory typically employ a &#8220;model-based\u2019\u2019 methodology that relies on simulations of the translation lookaside buffer (TLB) coupled with empirical performance models. We observe that this methodology is limited in that each simulated thread of execution has its own dedicated TLB, whereas modern processors share a single TLB among multiple threads through simultaneous multithreading (SMT). Existing model-based research is thus unable to explore virtual memory designs in SMT context. We address this problem: (1) by showing that the behavior of different multiprogrammed thread combinations varies over time nontrivially, and by introducing a systematic approach for measuring this behavior with bounded error; (2) by developing a TLB simulator capable of realistically combining multiple memory-reference streams of the SMT threads into one; (3) by validating the simulator\u2019s accuracy against real (Intel) processors to ensure the correctness of our approach, which required us to reverse engineer their TLB eviction policy; and (4) by showing how to build empirical models that predict runtimes of different SMT workloads from their combined simulated TLB miss rate. We demonstrate our methodology\u2019s usefulness by evaluating a new TLB partitioning mechanism for SMT processor cores.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1650440751548-39b7878a-e9e1&#8243;][\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; disable_element=&#8221;yes&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text]<b><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3456727.3463828\">Indexing cloud data lakes within the lakes <\/a><\/b><br \/>\nGrisha Weintraub, Ehud Gudes, and Shlomi Dolev (Ben Gurion University of the Negev)[\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Abstract&#8221; tab_id=&#8221;1630483066174-e8969c7e-4840&#8243;][vc_column_text]Estimators reduce the memory footprint of maintaining network statistics, while keeping the estimation error of each flow proportional to its size. This is unlike sketches and other approximate algorithms that only guarantee an error proportional to the entire stream size. In this work we present the CELL algorithm that combines estimators with efficient flow representation to obtain superior memory reduction compared to the state of the art. We also extend CELL to the sliding window model, which priorities recent data over old one, by presenting two variants named RAND-CELL and SHIFT-CELL.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Poster&#8221; tab_id=&#8221;1630483066247-513d4d1b-c40e&#8221;]<div class=\"tm-vc_icon_element tm-vc_icon_element-outer tm-vc_icon_element-align-left \"><div class=\"tm-vc_icon_element-inner  tm-vc_icon_element-color-skincolor tm-vc_icon_element-size-md tm-vc_icon_element-style- tm-vc_icon_element-background-color-grey\" ><span class=\"tm-vc_icon_element-icon fa fa-file-pdf-o\" ><\/span><a class=\"tm-vc_icon_element-link\" href=\"https:\/\/www.systor.org\/2021\/posters\/systor21posters-paper2-poster_file.pdf\" title=\"\" target=\"_self\"><\/a><\/div><\/div>[\/vc_tta_section][\/vc_tta_accordion][vc_empty_space height=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; tm_responsive_css=&#8221;60233685|colbreak_no|||||||||colbreak_no|||||55px||25px||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1626073880162{padding-top: 111px !important;padding-bottom: 0px !important;}&#8221;][vc_column reduce_extra_padding=&#8221;991&#8243; tm_responsive_css=&#8221;22114509|colbreak_no|||||||||colbreak_no|||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1626073647852{padding-right: 100px !important;}&#8221;][vc_empty_space height=&#8221;50px&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_row tm_bgcolor=&#8221;grey&#8221; tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; full_width=&#8221;stretch_row&#8221; tm_responsive_css=&#8221;14235946|colbreak_no|||||||||colbreak_no|||||50px||25px||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1630834239056{padding-bottom: 0px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >\/\/ Sponsored by<\/h4>\n<\/div><div class=\"heading-seperator\"><span><\/span><\/div><\/header><\/div><\/div><\/div><\/section><div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-three themetechmount-boxes-sortable- themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrow-round tm-boxes-carousel-arrows-above tm-boxes-txtalign-left vc_custom_1629205448515\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"above\" data-tm-centermode=\"0\" data-tm-arrowtype=\"round\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \">\n\t\t\t\t\n\t\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"ACM\"><a class=\"tm-client-logo-link\" href=\"http:\/\/www.sigops.org\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-sigops-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-sigops-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >\/\/ in cooperation with<\/h4>\n<\/div><div class=\"heading-seperator\"><span><\/span><\/div><\/header><\/div><\/div><\/div><\/section><div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-three themetechmount-boxes-sortable- themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrow-round tm-boxes-carousel-arrows-above tm-boxes-txtalign-left vc_custom_1641414232275\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"above\" data-tm-centermode=\"0\" data-tm-arrowtype=\"round\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \">\n\t\t\t\t\n\t\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-4 col-sm-6 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"USENIX\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.usenix.org\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-usenix-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-usenix-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >\/\/ Platinum Sponsors<\/h4>\n<\/div><div class=\"heading-seperator\"><span><\/span><\/div><\/header><\/div><\/div><\/div><\/section><div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-six themetechmount-boxes-sortable- themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrow-round tm-boxes-carousel-arrows-above tm-boxes-txtalign-left vc_custom_1630832915816\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"above\" data-tm-centermode=\"0\" data-tm-arrowtype=\"round\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \">\n\t\t\t\t\n\t\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Technion\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.technion.ac.il\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-Technion-1-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-Technion-1-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Red Hat\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.redhat.com\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/09\/logo-redhat-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Red Hat\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/09\/logo-redhat-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Red Hat\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"IBM\"><a class=\"tm-client-logo-link\" href=\"http:\/\/www.ibm.com\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-IBM-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2021\/05\/logo-IBM-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >\/\/ Gold Sponsors<\/h4>\n<\/div><div class=\"heading-seperator\"><span><\/span><\/div><\/header><\/div><\/div><\/div><\/section><div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-six themetechmount-boxes-sortable- themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrow-round tm-boxes-carousel-arrows-above tm-boxes-txtalign-left vc_custom_1630832927810\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"above\" data-tm-centermode=\"0\" data-tm-arrowtype=\"round\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \">\n\t\t\t\t\n\t\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Huawei\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.huawei.com\/en\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/05\/logo-huawei40.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/05\/logo-huawei40.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Yahoo\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.yahooinc.com\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-yahoo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"yahoo!\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-yahoo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"yahoo!\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"VMware\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.vmware.com\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-vmware.png\" class=\"attachment-full size-full wp-post-image\" alt=\"VMWare research\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-vmware.png\" class=\"attachment-full size-full wp-post-image\" alt=\"VMWare research\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<section class=\"tm-vc_cta3-container\"><div class=\"tm-vc_general tm-vc_cta3 tm-cta3-only tm-vc_cta3-style-classic tm-vc_cta3-shape-rounded tm-vc_cta3-align-left tm-vc_cta3-color-transparent tm-vc_cta3-icon-size-md tm-cta3-without-desc\"><div class=\"tm-vc_cta3_content-container\"><div class=\"tm-vc_cta3-content\"><header class=\"tm-vc_cta3-content-header tm-wrap\"><div class=\"tm-vc_cta3-headers tm-wrap-cell\"><h4 class=\"tm-custom-heading \" >\/\/ Silver Sponsors<\/h4>\n<\/div><div class=\"heading-seperator\"><span><\/span><\/div><\/header><\/div><\/div><\/div><\/section><div class=\"themetechmount-boxes themetechmount-boxes-client themetechmount-boxes-view-carousel themetechmount-boxes-col-six themetechmount-boxes-sortable- themetechmount-boxes-textalign-left tm-cta3-rev-heading tm-boxes-carousel-arrow-round tm-boxes-carousel-arrows-above tm-boxes-txtalign-left vc_custom_1630832937258\" data-tm-speed=\"1500\" data-tm-autoplay=\"1\" data-tm-autoplayspeed=\"4500\" data-tm-loop=\"1\" data-tm-dots=\"0\" data-tm-nav=\"above\" data-tm-centermode=\"0\" data-tm-arrowtype=\"round\" data-tm-pauseonfocus=\"1\" data-tm-pauseonhover=\"1\" data-tm-slidestoscroll=\"column\" data-tm-effecttype=\"slide\">\n\t\t<div class=\"themetechmount-boxes-inner themetechmount-boxes-client-inner \">\n\t\t\t\t\n\t\t\t\t<div class=\"row multi-columns-row themetechmount-boxes-row-wrapper\">\n\t\t\t\t\t<div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Google\"><a class=\"tm-client-logo-link\" href=\"https:\/\/about.google\/products\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/06\/logo-google.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/06\/logo-google.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"MTA\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.int.mta.ac.il\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/05\/logo-MTA.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/05\/logo-MTA.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"Oracle\"><a class=\"tm-client-logo-link\" href=\"https:\/\/www.oracle.com\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/02\/logo-oracle-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Oracle\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/02\/logo-oracle-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Oracle\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div><div class=\"tm-box-col-wrapper col-lg-2 col-sm-4 col-md-4 col-xs-12 \"><div class=\"tm-client-logo-box-w\"><div class=\"tm-client-logo-tooltip\" data-tooltip=\"TAU\"><a class=\"tm-client-logo-link\" href=\"https:\/\/english.tau.ac.il\/\"><div class=\"themetechmount-box themetechmount-box-client themetechmount-box-view-simple-logo2 themetechmount-client-box-view-simple-logo2\">\n\t<div class=\"themetechmount-hover-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-tau-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n\t<div class=\"themetechmount-featured-img\">\n\t\t<span class=\"themetechmount-item-thumbnail\">\n\t\t\t<span class=\"themetechmount-item-thumbnail-inner\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"244\" height=\"150\" src=\"https:\/\/www.systor.org\/2022\/wp-content\/uploads\/sites\/2\/2022\/01\/logo-tau-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" \/>\n\t\t\t<\/span>\n\t\t<\/span><\/div>\n<\/div>\n<\/a><\/div><\/div><!-- .tm-client-logo-box-w --> <\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div><!-- .themetechmount-boxes-inner -->   <\/div><!-- .themetechmount-boxes -->  [\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section][vc_row tm_bgimagefixed=&#8221;&#8221; break_in_responsive=&#8221;991&#8243; tm_zindex=&#8221;2&#8243; full_width=&#8221;stretch_row&#8221; tm_responsive_css=&#8221;60233685|colbreak_no|||||||||colbreak_no|||||55px||25px||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1650194862095{padding-top: 111px !important;padding-bottom: 0px !important;}&#8221;][vc_column reduce_extra_padding=&#8221;991&#8243; tm_responsive_css=&#8221;22114509|colbreak_no|||||||||colbreak_no|||||||||colbreak_no||||||||||colbreak_no|||||||||&#8221; css=&#8221;.vc_custom_1626073647852{padding-right: 100px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1630480753375{margin-top: -50px !important;}&#8221;]We are delighted to announce the posters that have been accepted to ACM SYSTOR\u201922.[\/vc_column_text][\/vc_column][\/vc_row][vc_row tm_bgimagefixed=&#8221;&#8221;][vc_column width=&#8221;7\/12&#8243;][vc_column_text] Integrity Verification in Cloud Key-Value Stores Grisha Weintraub, Leonid Rise, Alon Kadosh (IBM Security) [\/vc_column_text][\/vc_column][vc_column width=&#8221;5\/12&#8243;][vc_tta_accordion color=&#8221;grey&#8221; c_icon=&#8221;chevron&#8221; c_position=&#8221;right&#8221; active_section=&#8221;0&#8243; collapsible_all=&#8221;true&#8221;][vc_tta_section &hellip; <a href=\"https:\/\/www.systor.org\/2022\/client\/ibm-caption-copy-copy-2-copy-copy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">TAU<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3064","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/pages\/3064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/comments?post=3064"}],"version-history":[{"count":36,"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/pages\/3064\/revisions"}],"predecessor-version":[{"id":3670,"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/pages\/3064\/revisions\/3670"}],"wp:attachment":[{"href":"https:\/\/www.systor.org\/2022\/wp-json\/wp\/v2\/media?parent=3064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}