Abstract: Though various applications such as flash memory, cache, storage systems, and even indexing for enterprise big data search, adopt hot data identification schemes, relatively little research ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results