├── README.md
├── paper_figure
├── 1522721106458.png
├── 1522938283913.png
├── 1523241524030.png
├── 1523329925719.png
├── 1526027787768.png
├── 1526305327024.png
├── 1526389148656.png
├── 1531322452717.png
├── 1531501985565.png
├── 1533545264630.png
├── 1533558772424.png
├── 1533559666806.png
├── 1533632589963.png
├── 1533635551383.png
├── 1533713900014.png
├── 1533716802051.png
├── 1533785674947.png
├── 1533801963837.png
├── 1533803970846.png
├── 1533832651101.png
├── 1533909218190.png
├── 1533978994514.png
├── 1533991845908.png
├── 1533992512318.png
├── 1534147681755.png
├── 1534231184704.png
├── 1534231209288.png
├── 1534322692743.png
├── 1534324237488.png
├── 1534491739567.png
├── 1534491996294.png
├── 1534492052150.png
├── 1534492144193.png
├── 1534493095149.png
├── 1534493102024.png
├── 1534514760021.png
├── 1534820931384.png
├── 1534843008014.png
├── 1534859524747.png
├── 1534927153524.png
├── 1534941877505.png
├── 1535025690952.png
├── 1535080941866.png
├── 1535118132918.png
├── 1535424966773.png
├── 1535509143693.png
├── 1535529964676.png
├── 1535530049894.png
├── 1535630992315.png
├── 1535718654925.png
├── 1536304812187.png
├── 1536304821166.png
├── 1536311837927.png
├── 1536314355540.png
├── 1536411514566.png
├── 1536422986790.png
├── 1537101426419.png
├── 1537113167500.png
├── 1537156395887.png
├── 1537170968620.png
├── 1537502009449.png
├── 1537519750596.png
├── 1537523583894.png
├── 1537620570242.png
├── 1537856398909.png
├── 1537856407481.png
├── 1538214740187.png
├── 1538237284824.png
├── 1538364574274.png
├── 1539263939506.png
├── 1539311866259.png
├── 1546917876953.png
├── 1546918149839.png
├── 1546932031713.png
├── 1546937172649.png
├── 1546937279046.png
├── 1547042229954.png
├── 1547437042911.png
├── 1547437239206.png
├── 1547449080194.png
├── 1547719418272.png
├── 1547724806425.png
├── 1548039339341.png
├── 1550132357894.png
├── 1550132390502.png
├── 1550133510605.png
├── 1550145505105.png
├── 1550738798721.png
├── 1551686443341.png
├── 1551708715146.png
├── 1551708732566.png
├── 1552535525593.png
├── 1552545363095.png
├── 1552878709205.png
├── 1552893983832.png
├── 1552911506553.png
├── 1552912503121.png
├── 1553325398564.png
├── 1553325419379.png
├── 1553335463524.png
├── 1553335487753.png
├── 1553497729383.png
├── 1553516953870.png
├── 1554376060947.png
├── 1554865684235.png
├── 1555763466457.png
├── 1555765487674.png
├── 1555769164180.png
├── 1555770525391.png
├── 1556250344815.png
├── 1556250623415.png
├── 1556280764754.png
├── 1557370885604.png
├── 1557642537365.png
├── 1557673345371.png
├── 1557997523898.png
├── 1557997548672.png
├── 1558079145575.png
├── 1558494722437.png
├── 1558513853943.png
├── 1558519202625.png
├── 1558614526597.png
├── 1558614554155.png
├── 1558623033915.png
├── 1558962484711.png
├── 1558962790911.png
├── 1559037152377.png
├── 1559037213718.png
├── 1559037217373.png
├── 1559318184036.png
├── 1559318207399.png
├── 1559372865123.png
├── 1559378652026.png
├── 1559549453140.png
├── 1559551516676.png
├── 1559566271088.png
├── 1559919212428.png
├── 1560000228134.png
├── 1560135727490.png
├── 1560174931404.png
├── 1560175081156.png
├── 1560263818057.png
├── 1560263846164.png
├── 1560321278256.png
├── 1560321327144.png
├── 1560321404408.png
├── 1560328097317.png
├── 1560328134020.png
├── 1560329084025.png
├── 1560441378608.png
├── 1560668911327.png
├── 1560672462328.png
├── 1560684390577.png
├── 1560764288518.png
├── 1560779509995.png
├── 1561021159924.png
├── 1561195550827.png
├── 1561365990754.png
├── 1561383117771.png
├── 1561383159912.png
├── 1561385818759.png
├── 1561621592254.png
├── 1561707845616.png
├── 1561708816690.png
├── 1561714450649.png
├── 1561970185538.png
├── 1561973214857.png
├── 1562167485203.png
├── 1562229396844.png
├── 1562232295413.png
├── 1562405070274.png
├── 1562591190121.png
├── 1562596227030.png
├── 1564405750463.png
├── 1564457932100.png
├── 1564909153784.png
├── 1565180832447.png
├── 1565186648789.png
├── 1565186677190.png
├── 1565942057872.png
├── 1565946348305.png
├── 1568705054880.png
├── 1569071462061.png
├── 1569076126086.png
├── 1569251146102.png
├── 1570072565254.png
├── 1570362198248.png
├── image-20191106114728286.png
├── image-20191118003954646.png
├── image-20191122113840773.png
├── image-20191122113917775.png
├── image-20191123134134016.png
├── image-20191124230639274.png
├── image-20191126100315199.png
├── image-20191127151115458.png
├── image-20191128142955079.png
├── image-20191128153143279.png
├── image-20191128160533652.png
├── image-20191205195055060.png
├── image-20191209162702042.png
├── image-20191217204932349.png
├── image-20191217205029441.png
├── image-20191223162054823.png
├── image-20191224214842931.png
├── image-20191224214916387.png
├── image-20200130153405675.png
├── image-20200306224943511.png
├── image-20200308183445934.png
├── image-20200714012030378.png
├── image-20200714142649199.png
├── image-20200717161721279.png
├── image-20200717175301020.png
├── image-20200717223501471.png
├── image-20200718163048858.png
├── image-20200731155149662.png
├── image-20200914021803963.png
├── image-20200916145707212.png
├── image-20200916150327642.png
├── image-20200916152327699.png
├── image-20200918215222896.png
├── image-20200918215434370.png
├── image-20200918224123859.png
├── image-20200919014910600.png
├── image-20200923153618230.png
├── image-20200923153649390.png
├── image-20201029020046029.png
├── image-20201110121332322.png
├── image-20201110154834949.png
├── image-20201128184758932.png
├── image-20201128194505744.png
├── image-20201220224404400.png
├── image-20201221014051897.png
├── image-20210223233822225.png
├── image-20210223234507807.png
├── image-20210302202326671.png
├── image-20210304160351467.png
├── image-20210529210747569.png
├── image-20210604111024132.png
├── image-20210604120837514.png
├── image-20210928000837995.png
├── image-20210929143733993.png
├── image-20210929143735643.png
├── image-20210929150541422.png
├── image-20211103001651759.png
├── image-20211122232836344.png
├── image-20211123000856695.png
├── image-20211129000800270.png
├── image-20211129001332809.png
├── image-20211213011550369.png
├── image-20211213022458420.png
├── image-20211213022829073.png
├── image-20220116023316997.png
├── image-20220116030809631.png
├── image-20220225024908395.png
├── image-20220316134336877.png
├── image-20220316134407739.png
├── image-20220526171832531.png
├── image-20220615220333487.png
├── image-20220615221046364.png
├── image-20220912232446270.png
├── image-20220924003433635.png
├── image-20221127004323847.png
├── image-20221127011509981.png
├── image-20230402232037481.png
├── image-20230409234734929.png
├── image-20230410002227037.png
├── image-20230805235704150.png
├── image-20230806152854636.png
├── image-20230806200735934.png
├── image-20240305223437449.png
├── image-20240306000128456.png
├── image-20240306004919044.png
├── image-20240319012231775.png
├── image-20240321001530743.png
├── image-20240321002025742.png
├── image-20240321204347685.png
├── image-20240321210826877.png
├── image-20240805014222417.png
└── image-20240807011652739.png
└── storage_paper_note
├── CRUSH-SC'06.md
├── Ceph-OSDI'06.md
├── IDEA-FAST'24.md
├── Useful Matrial
├── ceph_dedup-ICDCS'18.md
├── deduplication
├── CodePlugin-HotCloud'15.md
├── cache_dedup
│ ├── AustereCache-ATC'20.md
│ └── LIPA-MSST'19.md
├── chunking
│ ├── FastCDC-ATC'16.md
│ ├── FrequencyBasedChunking-MASCOTS'10.md
│ ├── RapidCDC-SoCC'19.md
│ └── SSCDC-SYSTOR'19.md
├── dedup_estimation
│ ├── ContentBasedSampling-ATC'13.md
│ ├── EstimateDedupRatio-MSST'12.md
│ ├── Rangoli-SYSTOR'13.md
│ ├── SketchDeduplication-FAST'19.md
│ └── UnseenDeduplication-FAST'16.md
├── dedup_in_nvm
│ └── LightDedup-ATC'23.md
├── dedup_system_design
│ ├── CloudTier-ATC'19.md
│ ├── Dedup-ATC'11.md
│ ├── DedupDesignTradeoff-FAST'15.md
│ ├── DiskBottleneck-FAST'08.md
│ ├── ExtremeBining-MASCOTS'09.md
│ ├── InftyDedup-FAST'23.md
│ ├── MFDedup-FAST'21.md
│ ├── Redesigning-ATC'18.md
│ ├── SparseIndex-FAST'09.md
│ ├── dedupv1-MSST'10.md
│ ├── iDedup-FAST'12-zryang-HP-Z440-Workstation-2.md
│ └── iDedup-FAST'12-zryang-HP-Z440-Workstation.md
├── distributed_dedup
│ ├── ClusterSingle-ToS'18.md
│ ├── EDP-IWQoS'15.md
│ ├── GoSeed-FAST'20.md
│ ├── MigrationGame-FAST'22.md
│ ├── Produck-SoCC'12.md
│ └── TradeoffDataRouting-FAST'11.md
├── gc
│ ├── AcceleratingRestore-ATC'14.md
│ ├── GC-FAST'17.md
│ └── MemorySanitization-FAST'13.md
├── mem_block_dedup
│ ├── CAFTL-FAST'11.md
│ ├── HintsDeduplication-FAST'16.md
│ └── UKSM-FAST'18.md
├── metadate_management
│ ├── FileRecipeCompression-FAST'13.md
│ ├── MetadataHarmful-HotStorage'15.md
│ ├── Metadedup.md
│ └── REED-DSN'16.md
├── post_dedup
│ ├── CompressionEst-FAST'13.md
│ ├── DUPEFS-FAST'22.md
│ ├── DedupSearch-FAST'22.md
│ ├── DeepSketch-FAST'22.md
│ ├── DeltaCompression-DCC'14.md
│ ├── Finesse-FAST'19.md
│ ├── Gdelta-CLUSTER'20.md
│ ├── IDEA-FAST'24.md
│ ├── LPC-SYSTOR'21.md
│ ├── MeGA-ATC'22.md
│ ├── MigratoryCompression-FAST'14.md
│ ├── deltaStore-HotStorage'12.md
│ └── deltaWAN-FAST'12.md
├── restore_performance
│ ├── ALACC-FAST'18.md
│ ├── HiDeStore-Middleware'20.md
│ ├── ImproveRestore-FAST'13.md
│ ├── LookBackWindow-FAST'19.md
│ └── RevDedup-APSys'13.md
├── secure_dedup
│ ├── BloomFilterDedup-ICSP'19.md
│ ├── CAONT-RS-HotStorage'14.md
│ ├── CDStore-ATC'15.md
│ ├── ClearBox-CCS'15.md
│ ├── DUPEFS-FAST'22.md
│ ├── DistributedKeyGen-CCSW'14.md
│ ├── DupLESS-Security'13.md
│ ├── EnhancedThreshold-TDSC'16.md
│ ├── FeatureSync-ICDCS'21.md
│ ├── FrequencyAnalysis-DSN'17.md
│ ├── IndependentServer-CCS'15.md
│ ├── InformationLeakage-CCSW'16.md
│ ├── MLE-EuroCrypto'13.md
│ ├── MinHash-DSN'17.md
│ ├── MitigatingSideChannel-IPDPS'18.md
│ ├── PoWSGX-ACNS'20.md
│ ├── PrivacyPreservingDedup-CLOUD'17.md
│ ├── RARE-INFOCOM'18.md
│ ├── S2Dedup-SYSTOR'21.md
│ ├── SideChannel-S&P'10.md
│ ├── SideChannelTradeOffs-AsiaCCS'17.md
│ ├── TappingPotential-CNS'18.md
│ └── UWare-DSC'18.md
├── summary
│ └── 99DeduplicationProblem-HotStorage'16.md
└── workload_analysis
│ ├── BackupWorkloads-FAST'12.md
│ ├── CapacityForecasting-LISA'11.md
│ ├── PracticalDedup-FAST'11.md
│ └── SimRedundancy-TC'18.md
├── erasure_coding
├── Background
│ ├── Availability-OSDI'10.md
│ ├── Erasure-Code-Summary.md
│ ├── Facebook Warehouse Cluster-HotStorage'13.md
│ └── Raft-ATC'14.md
├── Comparison
│ └── LRC-Comparison-ATC'18.md
├── EC Update
│ ├── CAU-ICPP'18.md
│ └── ParIX-ATC'17.md
├── EC-System
│ └── Giza-ATC'17.md
├── Erasure Coding Basics
│ ├── Dimakis-TIT'09.md
│ ├── Plank-FAST'09.md
│ └── Plank-USENIX login'13.md
├── Erasure Coding Deployment
│ ├── Alpha-Entanglement-Codes-DSN'18.md
│ ├── ButterflyCode-FAST'16.md
│ ├── DRC-ISIT'16.md
│ ├── Galloper-ICDCS'18.md
│ ├── Hitchhiker-SIGCOMM'14.md
│ ├── LRC-ATC'12.md
│ ├── NCCloud-FAST'12.md
│ ├── Pyramid Codes-ToS'13.md
│ ├── XORing-PVLDB'13.md
│ └── product-matrix-MSR-FAST'15.md
├── JunLi's paper
│ ├── Beehive-HotStorage'15.md
│ ├── Carousel-ICDCS'17.md
│ ├── JunLi-INFOCOM'14.md
│ ├── Pipelined_Regeneration-NetCod'11.md
│ └── Zebra-IWQoS'16.md
└── Techniques for Erasure Coding
│ ├── CAR-DSN'16.md
│ ├── CORE-TC'15.md
│ ├── Clay Codes-FAST'18.md
│ ├── Degraded-First-Scheduling-DSN'14.md
│ ├── EC Store-ICDCS'18.md
│ ├── ECPipe-ATC'17.md
│ ├── Encoding-aware-DSN'15.md
│ ├── Lazy Means Smart-SYSTOR'14.md
│ ├── OpenEC-FAST'19.md
│ ├── ProactiveLatency-SoCC'17.md
│ ├── RAFI-ATC'18.md
│ ├── RotatedReed-SolomonCodes-FAST'12.md
│ ├── SpeedupXOR-MSST'12 .md
│ └── Two_Tale_in_HDFS-FAST'15.md
├── general_storage
├── BlockStorage
│ ├── BlockHead-HotOS'21.md
│ └── FEMU-FAST'18.md
├── Cache
│ └── Cache-HotStorage'20.md
├── CloudStorageSystem
│ ├── Cumulus-FAST'09.md
│ ├── Duplicacy-ToCC'20.md
│ ├── HDFS-MSST'10.md
│ ├── Kurma-SYSTOR'19.md
│ └── SPANStore-SOSP'13.md
├── Hash
│ └── CompareByHash-ATC'06.md
├── OC_ZNS
│ └── ZNS_SSD_Cache-HotStorage'24.md
├── PM
│ ├── NoveLSM-ATC'18.md
│ └── SLMDB-FAST'19.md
├── ceph_related
│ └── BlueStore-SOSP'19.md
├── hpc_storage
│ └── Lustre_BIO_DIO-FAST'24.md
└── io_optimization
│ └── BPFStorage-HotOS'21.md
├── paper_figure
├── 1522721106458.png
├── 1522938283913.png
├── 1523241524030.png
├── 1523329925719.png
├── 1526027787768.png
├── 1526305327024.png
├── 1526389148656.png
├── 1531322452717.png
├── 1531501985565.png
├── 1533545264630.png
├── 1533558772424.png
├── 1533559666806.png
├── 1533632589963.png
├── 1533635551383.png
├── 1533713900014.png
├── 1533716802051.png
├── 1533785674947.png
├── 1533801963837.png
├── 1533803970846.png
├── 1533832651101.png
├── 1533909218190.png
├── 1533978994514.png
├── 1533991845908.png
├── 1533992512318.png
├── 1534147681755.png
├── 1534231184704.png
├── 1534231209288.png
├── 1534322692743.png
├── 1534324237488.png
├── 1534491739567.png
├── 1534491996294.png
├── 1534492052150.png
├── 1534492144193.png
├── 1534493095149.png
├── 1534493102024.png
├── 1534514760021.png
├── 1534820931384.png
├── 1534843008014.png
├── 1534859524747.png
├── 1534927153524.png
├── 1534941877505.png
├── 1535025690952.png
├── 1535080941866.png
├── 1535118132918.png
├── 1535424966773.png
├── 1535509143693.png
├── 1535529964676.png
├── 1535530049894.png
├── 1535630992315.png
├── 1535718654925.png
├── 1536304812187.png
├── 1536304821166.png
├── 1536311837927.png
├── 1536314355540.png
├── 1536411514566.png
├── 1536422986790.png
├── 1537101426419.png
├── 1537113167500.png
├── 1537156395887.png
├── 1537170968620.png
├── 1537502009449.png
├── 1537519750596.png
├── 1537523583894.png
├── 1537620570242.png
├── 1537856398909.png
├── 1537856407481.png
├── 1538214740187.png
├── 1538237284824.png
├── 1538364574274.png
├── 1539263939506.png
├── 1539311866259.png
├── 1546917876953.png
├── 1546918149839.png
├── 1546932031713.png
├── 1546937172649.png
├── 1546937279046.png
├── 1547042229954.png
├── 1547437042911.png
├── 1547437239206.png
├── 1547449080194.png
├── 1547719418272.png
├── 1547724806425.png
├── 1548039339341.png
├── 1550132357894.png
├── 1550132390502.png
├── 1550133510605.png
├── 1550145505105.png
├── 1550738798721.png
├── 1551686443341.png
├── 1551708715146.png
├── 1551708732566.png
├── 1552535525593.png
├── 1552545363095.png
├── 1552878709205.png
├── 1552893983832.png
├── 1552911506553.png
├── 1552912503121.png
├── 1553325398564.png
├── 1553325419379.png
├── 1553335463524.png
├── 1553335487753.png
├── 1553497729383.png
├── 1553516953870.png
├── 1554376060947.png
├── 1554865684235.png
├── 1555763466457.png
├── 1555765487674.png
├── 1555769164180.png
├── 1555770525391.png
├── 1556250344815.png
├── 1556250623415.png
├── 1556280764754.png
├── 1557370885604.png
├── 1557642537365.png
├── 1557673345371.png
├── 1557997523898.png
├── 1557997548672.png
├── 1558079145575.png
├── 1558494722437.png
├── 1558513853943.png
├── 1558519202625.png
├── 1558614526597.png
├── 1558614554155.png
├── 1558623033915.png
├── 1558962484711.png
├── 1558962790911.png
├── 1559037152377.png
├── 1560441378608.png
├── 1562405070274.png
├── 1564405750463.png
├── 1564457932100.png
└── image-20201029020046029.png
├── security
├── CompareByHash-ATC'06.md
├── Data-Encryption
│ └── BlockEnc-HotStorage'22.md
├── DeRef-TrustCom'11.md
├── DifferentialPrivacy-INFOCOM'18.md
├── FADE-TDSC'12.md
├── FrequencyHiding-CCS'15.md
├── FrequencySmoothing-ICAR'17.md
├── NetworkSecurity
│ └── DeRef-TrustCom'11.md
├── ORAM-CCSW'16.md
├── OverheadConfidentiality-UCC'19.md
├── QuantifyingInformationLeakage-CCSW'19.md
├── SGX-Storage
│ ├── EnclaveCache-Middleware'19-zryang-HP-Z440-Workstation.md
│ ├── SPEED-ICDCS'19.md
│ ├── SPEICHER-FAST'19.md
│ ├── SeGShare-DSN'20.md
│ ├── ShieldStore-EuroSys'19.md
│ └── StorageDataPathSGX-arxiv.md
├── SGX-Technique
│ ├── SGXExplained-IACR'16.md
│ ├── SGXPerf-Middleware'18.md
│ ├── SGXPerformance-SIGMETRICS'19.md
│ ├── SwitchLess-SysTEX'18.md
│ └── talos-arxiv'17.md
├── Secret-Sharing
│ ├── AONT-RS-FAST'11.md
│ ├── SSSS-ACMCommunication'79.md
│ └── SecretSharing-Summary.md
├── SecretSharing
│ ├── AONT-RS-FAST'11.md
│ ├── SSSS-ACMCommunication'79.md
│ ├── SecretSharing-Summary.md
│ └── ShareBigSecret-SYSTOR'18.md
├── SecureDeletion
│ └── FADE-TDSC'12.md
├── ShareBigSecret-SYSTOR'18.md
└── Splinter-NSDI'17.md
├── sketch
└── Count-MinSketch.md
├── survey
└── Deduplcation-Survey'18.md
└── template.md
/paper_figure/1522721106458.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1522721106458.png
--------------------------------------------------------------------------------
/paper_figure/1522938283913.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1522938283913.png
--------------------------------------------------------------------------------
/paper_figure/1523241524030.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1523241524030.png
--------------------------------------------------------------------------------
/paper_figure/1523329925719.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1523329925719.png
--------------------------------------------------------------------------------
/paper_figure/1526027787768.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1526027787768.png
--------------------------------------------------------------------------------
/paper_figure/1526305327024.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1526305327024.png
--------------------------------------------------------------------------------
/paper_figure/1526389148656.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1526389148656.png
--------------------------------------------------------------------------------
/paper_figure/1531322452717.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1531322452717.png
--------------------------------------------------------------------------------
/paper_figure/1531501985565.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1531501985565.png
--------------------------------------------------------------------------------
/paper_figure/1533545264630.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533545264630.png
--------------------------------------------------------------------------------
/paper_figure/1533558772424.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533558772424.png
--------------------------------------------------------------------------------
/paper_figure/1533559666806.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533559666806.png
--------------------------------------------------------------------------------
/paper_figure/1533632589963.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533632589963.png
--------------------------------------------------------------------------------
/paper_figure/1533635551383.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533635551383.png
--------------------------------------------------------------------------------
/paper_figure/1533713900014.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533713900014.png
--------------------------------------------------------------------------------
/paper_figure/1533716802051.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533716802051.png
--------------------------------------------------------------------------------
/paper_figure/1533785674947.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533785674947.png
--------------------------------------------------------------------------------
/paper_figure/1533801963837.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533801963837.png
--------------------------------------------------------------------------------
/paper_figure/1533803970846.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533803970846.png
--------------------------------------------------------------------------------
/paper_figure/1533832651101.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533832651101.png
--------------------------------------------------------------------------------
/paper_figure/1533909218190.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533909218190.png
--------------------------------------------------------------------------------
/paper_figure/1533978994514.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533978994514.png
--------------------------------------------------------------------------------
/paper_figure/1533991845908.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533991845908.png
--------------------------------------------------------------------------------
/paper_figure/1533992512318.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1533992512318.png
--------------------------------------------------------------------------------
/paper_figure/1534147681755.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534147681755.png
--------------------------------------------------------------------------------
/paper_figure/1534231184704.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534231184704.png
--------------------------------------------------------------------------------
/paper_figure/1534231209288.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534231209288.png
--------------------------------------------------------------------------------
/paper_figure/1534322692743.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534322692743.png
--------------------------------------------------------------------------------
/paper_figure/1534324237488.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534324237488.png
--------------------------------------------------------------------------------
/paper_figure/1534491739567.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534491739567.png
--------------------------------------------------------------------------------
/paper_figure/1534491996294.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534491996294.png
--------------------------------------------------------------------------------
/paper_figure/1534492052150.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534492052150.png
--------------------------------------------------------------------------------
/paper_figure/1534492144193.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534492144193.png
--------------------------------------------------------------------------------
/paper_figure/1534493095149.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534493095149.png
--------------------------------------------------------------------------------
/paper_figure/1534493102024.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534493102024.png
--------------------------------------------------------------------------------
/paper_figure/1534514760021.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534514760021.png
--------------------------------------------------------------------------------
/paper_figure/1534820931384.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534820931384.png
--------------------------------------------------------------------------------
/paper_figure/1534843008014.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534843008014.png
--------------------------------------------------------------------------------
/paper_figure/1534859524747.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534859524747.png
--------------------------------------------------------------------------------
/paper_figure/1534927153524.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534927153524.png
--------------------------------------------------------------------------------
/paper_figure/1534941877505.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1534941877505.png
--------------------------------------------------------------------------------
/paper_figure/1535025690952.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535025690952.png
--------------------------------------------------------------------------------
/paper_figure/1535080941866.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535080941866.png
--------------------------------------------------------------------------------
/paper_figure/1535118132918.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535118132918.png
--------------------------------------------------------------------------------
/paper_figure/1535424966773.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535424966773.png
--------------------------------------------------------------------------------
/paper_figure/1535509143693.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535509143693.png
--------------------------------------------------------------------------------
/paper_figure/1535529964676.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535529964676.png
--------------------------------------------------------------------------------
/paper_figure/1535530049894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535530049894.png
--------------------------------------------------------------------------------
/paper_figure/1535630992315.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535630992315.png
--------------------------------------------------------------------------------
/paper_figure/1535718654925.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1535718654925.png
--------------------------------------------------------------------------------
/paper_figure/1536304812187.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536304812187.png
--------------------------------------------------------------------------------
/paper_figure/1536304821166.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536304821166.png
--------------------------------------------------------------------------------
/paper_figure/1536311837927.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536311837927.png
--------------------------------------------------------------------------------
/paper_figure/1536314355540.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536314355540.png
--------------------------------------------------------------------------------
/paper_figure/1536411514566.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536411514566.png
--------------------------------------------------------------------------------
/paper_figure/1536422986790.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1536422986790.png
--------------------------------------------------------------------------------
/paper_figure/1537101426419.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537101426419.png
--------------------------------------------------------------------------------
/paper_figure/1537113167500.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537113167500.png
--------------------------------------------------------------------------------
/paper_figure/1537156395887.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537156395887.png
--------------------------------------------------------------------------------
/paper_figure/1537170968620.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537170968620.png
--------------------------------------------------------------------------------
/paper_figure/1537502009449.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537502009449.png
--------------------------------------------------------------------------------
/paper_figure/1537519750596.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537519750596.png
--------------------------------------------------------------------------------
/paper_figure/1537523583894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537523583894.png
--------------------------------------------------------------------------------
/paper_figure/1537620570242.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537620570242.png
--------------------------------------------------------------------------------
/paper_figure/1537856398909.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537856398909.png
--------------------------------------------------------------------------------
/paper_figure/1537856407481.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1537856407481.png
--------------------------------------------------------------------------------
/paper_figure/1538214740187.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1538214740187.png
--------------------------------------------------------------------------------
/paper_figure/1538237284824.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1538237284824.png
--------------------------------------------------------------------------------
/paper_figure/1538364574274.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1538364574274.png
--------------------------------------------------------------------------------
/paper_figure/1539263939506.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1539263939506.png
--------------------------------------------------------------------------------
/paper_figure/1539311866259.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1539311866259.png
--------------------------------------------------------------------------------
/paper_figure/1546917876953.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1546917876953.png
--------------------------------------------------------------------------------
/paper_figure/1546918149839.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1546918149839.png
--------------------------------------------------------------------------------
/paper_figure/1546932031713.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1546932031713.png
--------------------------------------------------------------------------------
/paper_figure/1546937172649.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1546937172649.png
--------------------------------------------------------------------------------
/paper_figure/1546937279046.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1546937279046.png
--------------------------------------------------------------------------------
/paper_figure/1547042229954.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547042229954.png
--------------------------------------------------------------------------------
/paper_figure/1547437042911.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547437042911.png
--------------------------------------------------------------------------------
/paper_figure/1547437239206.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547437239206.png
--------------------------------------------------------------------------------
/paper_figure/1547449080194.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547449080194.png
--------------------------------------------------------------------------------
/paper_figure/1547719418272.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547719418272.png
--------------------------------------------------------------------------------
/paper_figure/1547724806425.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1547724806425.png
--------------------------------------------------------------------------------
/paper_figure/1548039339341.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1548039339341.png
--------------------------------------------------------------------------------
/paper_figure/1550132357894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1550132357894.png
--------------------------------------------------------------------------------
/paper_figure/1550132390502.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1550132390502.png
--------------------------------------------------------------------------------
/paper_figure/1550133510605.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1550133510605.png
--------------------------------------------------------------------------------
/paper_figure/1550145505105.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1550145505105.png
--------------------------------------------------------------------------------
/paper_figure/1550738798721.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1550738798721.png
--------------------------------------------------------------------------------
/paper_figure/1551686443341.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1551686443341.png
--------------------------------------------------------------------------------
/paper_figure/1551708715146.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1551708715146.png
--------------------------------------------------------------------------------
/paper_figure/1551708732566.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1551708732566.png
--------------------------------------------------------------------------------
/paper_figure/1552535525593.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552535525593.png
--------------------------------------------------------------------------------
/paper_figure/1552545363095.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552545363095.png
--------------------------------------------------------------------------------
/paper_figure/1552878709205.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552878709205.png
--------------------------------------------------------------------------------
/paper_figure/1552893983832.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552893983832.png
--------------------------------------------------------------------------------
/paper_figure/1552911506553.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552911506553.png
--------------------------------------------------------------------------------
/paper_figure/1552912503121.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1552912503121.png
--------------------------------------------------------------------------------
/paper_figure/1553325398564.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553325398564.png
--------------------------------------------------------------------------------
/paper_figure/1553325419379.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553325419379.png
--------------------------------------------------------------------------------
/paper_figure/1553335463524.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553335463524.png
--------------------------------------------------------------------------------
/paper_figure/1553335487753.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553335487753.png
--------------------------------------------------------------------------------
/paper_figure/1553497729383.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553497729383.png
--------------------------------------------------------------------------------
/paper_figure/1553516953870.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1553516953870.png
--------------------------------------------------------------------------------
/paper_figure/1554376060947.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1554376060947.png
--------------------------------------------------------------------------------
/paper_figure/1554865684235.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1554865684235.png
--------------------------------------------------------------------------------
/paper_figure/1555763466457.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1555763466457.png
--------------------------------------------------------------------------------
/paper_figure/1555765487674.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1555765487674.png
--------------------------------------------------------------------------------
/paper_figure/1555769164180.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1555769164180.png
--------------------------------------------------------------------------------
/paper_figure/1555770525391.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1555770525391.png
--------------------------------------------------------------------------------
/paper_figure/1556250344815.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1556250344815.png
--------------------------------------------------------------------------------
/paper_figure/1556250623415.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1556250623415.png
--------------------------------------------------------------------------------
/paper_figure/1556280764754.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1556280764754.png
--------------------------------------------------------------------------------
/paper_figure/1557370885604.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1557370885604.png
--------------------------------------------------------------------------------
/paper_figure/1557642537365.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1557642537365.png
--------------------------------------------------------------------------------
/paper_figure/1557673345371.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1557673345371.png
--------------------------------------------------------------------------------
/paper_figure/1557997523898.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1557997523898.png
--------------------------------------------------------------------------------
/paper_figure/1557997548672.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1557997548672.png
--------------------------------------------------------------------------------
/paper_figure/1558079145575.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558079145575.png
--------------------------------------------------------------------------------
/paper_figure/1558494722437.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558494722437.png
--------------------------------------------------------------------------------
/paper_figure/1558513853943.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558513853943.png
--------------------------------------------------------------------------------
/paper_figure/1558519202625.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558519202625.png
--------------------------------------------------------------------------------
/paper_figure/1558614526597.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558614526597.png
--------------------------------------------------------------------------------
/paper_figure/1558614554155.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558614554155.png
--------------------------------------------------------------------------------
/paper_figure/1558623033915.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558623033915.png
--------------------------------------------------------------------------------
/paper_figure/1558962484711.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558962484711.png
--------------------------------------------------------------------------------
/paper_figure/1558962790911.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1558962790911.png
--------------------------------------------------------------------------------
/paper_figure/1559037152377.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559037152377.png
--------------------------------------------------------------------------------
/paper_figure/1559037213718.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559037213718.png
--------------------------------------------------------------------------------
/paper_figure/1559037217373.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559037217373.png
--------------------------------------------------------------------------------
/paper_figure/1559318184036.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559318184036.png
--------------------------------------------------------------------------------
/paper_figure/1559318207399.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559318207399.png
--------------------------------------------------------------------------------
/paper_figure/1559372865123.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559372865123.png
--------------------------------------------------------------------------------
/paper_figure/1559378652026.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559378652026.png
--------------------------------------------------------------------------------
/paper_figure/1559549453140.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559549453140.png
--------------------------------------------------------------------------------
/paper_figure/1559551516676.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559551516676.png
--------------------------------------------------------------------------------
/paper_figure/1559566271088.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559566271088.png
--------------------------------------------------------------------------------
/paper_figure/1559919212428.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1559919212428.png
--------------------------------------------------------------------------------
/paper_figure/1560000228134.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560000228134.png
--------------------------------------------------------------------------------
/paper_figure/1560135727490.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560135727490.png
--------------------------------------------------------------------------------
/paper_figure/1560174931404.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560174931404.png
--------------------------------------------------------------------------------
/paper_figure/1560175081156.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560175081156.png
--------------------------------------------------------------------------------
/paper_figure/1560263818057.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560263818057.png
--------------------------------------------------------------------------------
/paper_figure/1560263846164.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560263846164.png
--------------------------------------------------------------------------------
/paper_figure/1560321278256.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560321278256.png
--------------------------------------------------------------------------------
/paper_figure/1560321327144.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560321327144.png
--------------------------------------------------------------------------------
/paper_figure/1560321404408.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560321404408.png
--------------------------------------------------------------------------------
/paper_figure/1560328097317.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560328097317.png
--------------------------------------------------------------------------------
/paper_figure/1560328134020.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560328134020.png
--------------------------------------------------------------------------------
/paper_figure/1560329084025.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560329084025.png
--------------------------------------------------------------------------------
/paper_figure/1560441378608.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560441378608.png
--------------------------------------------------------------------------------
/paper_figure/1560668911327.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560668911327.png
--------------------------------------------------------------------------------
/paper_figure/1560672462328.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560672462328.png
--------------------------------------------------------------------------------
/paper_figure/1560684390577.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560684390577.png
--------------------------------------------------------------------------------
/paper_figure/1560764288518.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560764288518.png
--------------------------------------------------------------------------------
/paper_figure/1560779509995.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1560779509995.png
--------------------------------------------------------------------------------
/paper_figure/1561021159924.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561021159924.png
--------------------------------------------------------------------------------
/paper_figure/1561195550827.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561195550827.png
--------------------------------------------------------------------------------
/paper_figure/1561365990754.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561365990754.png
--------------------------------------------------------------------------------
/paper_figure/1561383117771.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561383117771.png
--------------------------------------------------------------------------------
/paper_figure/1561383159912.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561383159912.png
--------------------------------------------------------------------------------
/paper_figure/1561385818759.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561385818759.png
--------------------------------------------------------------------------------
/paper_figure/1561621592254.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561621592254.png
--------------------------------------------------------------------------------
/paper_figure/1561707845616.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561707845616.png
--------------------------------------------------------------------------------
/paper_figure/1561708816690.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561708816690.png
--------------------------------------------------------------------------------
/paper_figure/1561714450649.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561714450649.png
--------------------------------------------------------------------------------
/paper_figure/1561970185538.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561970185538.png
--------------------------------------------------------------------------------
/paper_figure/1561973214857.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1561973214857.png
--------------------------------------------------------------------------------
/paper_figure/1562167485203.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562167485203.png
--------------------------------------------------------------------------------
/paper_figure/1562229396844.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562229396844.png
--------------------------------------------------------------------------------
/paper_figure/1562232295413.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562232295413.png
--------------------------------------------------------------------------------
/paper_figure/1562405070274.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562405070274.png
--------------------------------------------------------------------------------
/paper_figure/1562591190121.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562591190121.png
--------------------------------------------------------------------------------
/paper_figure/1562596227030.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1562596227030.png
--------------------------------------------------------------------------------
/paper_figure/1564405750463.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1564405750463.png
--------------------------------------------------------------------------------
/paper_figure/1564457932100.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1564457932100.png
--------------------------------------------------------------------------------
/paper_figure/1564909153784.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1564909153784.png
--------------------------------------------------------------------------------
/paper_figure/1565180832447.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1565180832447.png
--------------------------------------------------------------------------------
/paper_figure/1565186648789.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1565186648789.png
--------------------------------------------------------------------------------
/paper_figure/1565186677190.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1565186677190.png
--------------------------------------------------------------------------------
/paper_figure/1565942057872.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1565942057872.png
--------------------------------------------------------------------------------
/paper_figure/1565946348305.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1565946348305.png
--------------------------------------------------------------------------------
/paper_figure/1568705054880.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1568705054880.png
--------------------------------------------------------------------------------
/paper_figure/1569071462061.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1569071462061.png
--------------------------------------------------------------------------------
/paper_figure/1569076126086.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1569076126086.png
--------------------------------------------------------------------------------
/paper_figure/1569251146102.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1569251146102.png
--------------------------------------------------------------------------------
/paper_figure/1570072565254.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1570072565254.png
--------------------------------------------------------------------------------
/paper_figure/1570362198248.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/1570362198248.png
--------------------------------------------------------------------------------
/paper_figure/image-20191106114728286.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191106114728286.png
--------------------------------------------------------------------------------
/paper_figure/image-20191118003954646.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191118003954646.png
--------------------------------------------------------------------------------
/paper_figure/image-20191122113840773.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191122113840773.png
--------------------------------------------------------------------------------
/paper_figure/image-20191122113917775.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191122113917775.png
--------------------------------------------------------------------------------
/paper_figure/image-20191123134134016.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191123134134016.png
--------------------------------------------------------------------------------
/paper_figure/image-20191124230639274.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191124230639274.png
--------------------------------------------------------------------------------
/paper_figure/image-20191126100315199.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191126100315199.png
--------------------------------------------------------------------------------
/paper_figure/image-20191127151115458.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191127151115458.png
--------------------------------------------------------------------------------
/paper_figure/image-20191128142955079.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191128142955079.png
--------------------------------------------------------------------------------
/paper_figure/image-20191128153143279.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191128153143279.png
--------------------------------------------------------------------------------
/paper_figure/image-20191128160533652.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191128160533652.png
--------------------------------------------------------------------------------
/paper_figure/image-20191205195055060.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191205195055060.png
--------------------------------------------------------------------------------
/paper_figure/image-20191209162702042.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191209162702042.png
--------------------------------------------------------------------------------
/paper_figure/image-20191217204932349.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191217204932349.png
--------------------------------------------------------------------------------
/paper_figure/image-20191217205029441.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191217205029441.png
--------------------------------------------------------------------------------
/paper_figure/image-20191223162054823.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191223162054823.png
--------------------------------------------------------------------------------
/paper_figure/image-20191224214842931.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191224214842931.png
--------------------------------------------------------------------------------
/paper_figure/image-20191224214916387.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20191224214916387.png
--------------------------------------------------------------------------------
/paper_figure/image-20200130153405675.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200130153405675.png
--------------------------------------------------------------------------------
/paper_figure/image-20200306224943511.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200306224943511.png
--------------------------------------------------------------------------------
/paper_figure/image-20200308183445934.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200308183445934.png
--------------------------------------------------------------------------------
/paper_figure/image-20200714012030378.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200714012030378.png
--------------------------------------------------------------------------------
/paper_figure/image-20200714142649199.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200714142649199.png
--------------------------------------------------------------------------------
/paper_figure/image-20200717161721279.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200717161721279.png
--------------------------------------------------------------------------------
/paper_figure/image-20200717175301020.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200717175301020.png
--------------------------------------------------------------------------------
/paper_figure/image-20200717223501471.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200717223501471.png
--------------------------------------------------------------------------------
/paper_figure/image-20200718163048858.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200718163048858.png
--------------------------------------------------------------------------------
/paper_figure/image-20200731155149662.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200731155149662.png
--------------------------------------------------------------------------------
/paper_figure/image-20200914021803963.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200914021803963.png
--------------------------------------------------------------------------------
/paper_figure/image-20200916145707212.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200916145707212.png
--------------------------------------------------------------------------------
/paper_figure/image-20200916150327642.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200916150327642.png
--------------------------------------------------------------------------------
/paper_figure/image-20200916152327699.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200916152327699.png
--------------------------------------------------------------------------------
/paper_figure/image-20200918215222896.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200918215222896.png
--------------------------------------------------------------------------------
/paper_figure/image-20200918215434370.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200918215434370.png
--------------------------------------------------------------------------------
/paper_figure/image-20200918224123859.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200918224123859.png
--------------------------------------------------------------------------------
/paper_figure/image-20200919014910600.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200919014910600.png
--------------------------------------------------------------------------------
/paper_figure/image-20200923153618230.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200923153618230.png
--------------------------------------------------------------------------------
/paper_figure/image-20200923153649390.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20200923153649390.png
--------------------------------------------------------------------------------
/paper_figure/image-20201029020046029.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201029020046029.png
--------------------------------------------------------------------------------
/paper_figure/image-20201110121332322.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201110121332322.png
--------------------------------------------------------------------------------
/paper_figure/image-20201110154834949.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201110154834949.png
--------------------------------------------------------------------------------
/paper_figure/image-20201128184758932.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201128184758932.png
--------------------------------------------------------------------------------
/paper_figure/image-20201128194505744.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201128194505744.png
--------------------------------------------------------------------------------
/paper_figure/image-20201220224404400.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201220224404400.png
--------------------------------------------------------------------------------
/paper_figure/image-20201221014051897.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20201221014051897.png
--------------------------------------------------------------------------------
/paper_figure/image-20210223233822225.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210223233822225.png
--------------------------------------------------------------------------------
/paper_figure/image-20210223234507807.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210223234507807.png
--------------------------------------------------------------------------------
/paper_figure/image-20210302202326671.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210302202326671.png
--------------------------------------------------------------------------------
/paper_figure/image-20210304160351467.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210304160351467.png
--------------------------------------------------------------------------------
/paper_figure/image-20210529210747569.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210529210747569.png
--------------------------------------------------------------------------------
/paper_figure/image-20210604111024132.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210604111024132.png
--------------------------------------------------------------------------------
/paper_figure/image-20210604120837514.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210604120837514.png
--------------------------------------------------------------------------------
/paper_figure/image-20210928000837995.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210928000837995.png
--------------------------------------------------------------------------------
/paper_figure/image-20210929143733993.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210929143733993.png
--------------------------------------------------------------------------------
/paper_figure/image-20210929143735643.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210929143735643.png
--------------------------------------------------------------------------------
/paper_figure/image-20210929150541422.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20210929150541422.png
--------------------------------------------------------------------------------
/paper_figure/image-20211103001651759.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211103001651759.png
--------------------------------------------------------------------------------
/paper_figure/image-20211122232836344.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211122232836344.png
--------------------------------------------------------------------------------
/paper_figure/image-20211123000856695.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211123000856695.png
--------------------------------------------------------------------------------
/paper_figure/image-20211129000800270.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211129000800270.png
--------------------------------------------------------------------------------
/paper_figure/image-20211129001332809.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211129001332809.png
--------------------------------------------------------------------------------
/paper_figure/image-20211213011550369.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211213011550369.png
--------------------------------------------------------------------------------
/paper_figure/image-20211213022458420.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211213022458420.png
--------------------------------------------------------------------------------
/paper_figure/image-20211213022829073.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20211213022829073.png
--------------------------------------------------------------------------------
/paper_figure/image-20220116023316997.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220116023316997.png
--------------------------------------------------------------------------------
/paper_figure/image-20220116030809631.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220116030809631.png
--------------------------------------------------------------------------------
/paper_figure/image-20220225024908395.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220225024908395.png
--------------------------------------------------------------------------------
/paper_figure/image-20220316134336877.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220316134336877.png
--------------------------------------------------------------------------------
/paper_figure/image-20220316134407739.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220316134407739.png
--------------------------------------------------------------------------------
/paper_figure/image-20220526171832531.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220526171832531.png
--------------------------------------------------------------------------------
/paper_figure/image-20220615220333487.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220615220333487.png
--------------------------------------------------------------------------------
/paper_figure/image-20220615221046364.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220615221046364.png
--------------------------------------------------------------------------------
/paper_figure/image-20220912232446270.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220912232446270.png
--------------------------------------------------------------------------------
/paper_figure/image-20220924003433635.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20220924003433635.png
--------------------------------------------------------------------------------
/paper_figure/image-20221127004323847.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20221127004323847.png
--------------------------------------------------------------------------------
/paper_figure/image-20221127011509981.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20221127011509981.png
--------------------------------------------------------------------------------
/paper_figure/image-20230402232037481.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230402232037481.png
--------------------------------------------------------------------------------
/paper_figure/image-20230409234734929.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230409234734929.png
--------------------------------------------------------------------------------
/paper_figure/image-20230410002227037.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230410002227037.png
--------------------------------------------------------------------------------
/paper_figure/image-20230805235704150.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230805235704150.png
--------------------------------------------------------------------------------
/paper_figure/image-20230806152854636.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230806152854636.png
--------------------------------------------------------------------------------
/paper_figure/image-20230806200735934.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20230806200735934.png
--------------------------------------------------------------------------------
/paper_figure/image-20240305223437449.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240305223437449.png
--------------------------------------------------------------------------------
/paper_figure/image-20240306000128456.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240306000128456.png
--------------------------------------------------------------------------------
/paper_figure/image-20240306004919044.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240306004919044.png
--------------------------------------------------------------------------------
/paper_figure/image-20240319012231775.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240319012231775.png
--------------------------------------------------------------------------------
/paper_figure/image-20240321001530743.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240321001530743.png
--------------------------------------------------------------------------------
/paper_figure/image-20240321002025742.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240321002025742.png
--------------------------------------------------------------------------------
/paper_figure/image-20240321204347685.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240321204347685.png
--------------------------------------------------------------------------------
/paper_figure/image-20240321210826877.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240321210826877.png
--------------------------------------------------------------------------------
/paper_figure/image-20240805014222417.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240805014222417.png
--------------------------------------------------------------------------------
/paper_figure/image-20240807011652739.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/paper_figure/image-20240807011652739.png
--------------------------------------------------------------------------------
/storage_paper_note/CRUSH-SC'06.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | # CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data
5 |
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | SC'06 | Ceph |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | - distributing petabytes of data among tens or hundreds of thousands of storage devices
15 | - efficiently **map data objects to storage devices**
16 | - without relying on a **central** directory
17 | - main problem
18 | - facilitate the **addition and removal of storage** while **minimizing unnecessary data movement**
19 |
20 | ### CRUSH
21 |
22 | ### Implementation and Evaluation
23 |
24 | ## 2. Strength (Contributions of the paper)
25 |
26 | ## 3. Weakness (Limitations of the paper)
27 |
28 | ## 4. Some Insights (Future work)
29 |
30 | - object-based storage
31 | - unlike conventional block-based hard drives
32 | - object-based storage devices (**OSDs**) manage disk block allocation **internally**, exposing an interface that allows others to **read and write to variably-sized, named objects**
33 | - replace large block lists with **small object lists** and distributing the low-level block allocation problem
34 |
--------------------------------------------------------------------------------
/storage_paper_note/Ceph-OSDI'06.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | # Ceph: A Scalable, High-Performance Distributed File System
5 |
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | OSDI'06 | deployed systems |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | ### Method Name
15 |
16 | ### Implementation and Evaluation
17 |
18 | ## 2. Strength (Contributions of the paper)
19 |
20 | ## 3. Weakness (Limitations of the paper)
21 |
22 | ## 4. Some Insights (Future work)
23 |
--------------------------------------------------------------------------------
/storage_paper_note/Useful Matrial:
--------------------------------------------------------------------------------
1 | link: http://web.eecs.utk.edu/~plank/plank/www/software.html
2 | link: https://bitbucket.org/jimplank/
3 |
--------------------------------------------------------------------------------
/storage_paper_note/ceph_dedup-ICDCS'18.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | # Design of Global Data Deduplication for A Scale-out Distributed Storage System
5 |
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | ICDCS'18 | Ceph |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | ### Method Name
15 |
16 | ### Implementation and Evaluation
17 |
18 | ## 2. Strength (Contributions of the paper)
19 |
20 | ## 3. Weakness (Limitations of the paper)
21 |
22 | ## 4. Some Insights (Future work)
23 |
--------------------------------------------------------------------------------
/storage_paper_note/deduplication/dedup_estimation/ContentBasedSampling-ATC'13.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Estimating Duplication by Content-based Sampling
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----: | :------------------: |
8 | | ATC'13 | Deduplication Sample |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | The benefit of deduplication in a primary storage system varies for different workloads.
14 | > For a certain workload that have a low level of deduplication, one would to turn off the deduplication feature to avoid its effect on **I/O performance** and to avoid the **metadata overhead** of deduplication.
15 |
16 | It is necessary for the estimator to allow customers to quickly estimate the deduplication benefit on their primary data.
17 | > existing deduplication estimators are either not fast enough or not accurate enough.
18 |
19 | ### Content-based Sample
20 |
21 | - Theory
22 | Assume a hash function that generates a fingerprint for each data block. The proposed **content-based sampling** applies a modulo-based filter to all the block fingerprints of a data set.
23 | > A block fingerprint passes the filter and is added to the sample
24 | > $Fingerprint$ Mod $M$ == $X$, $M$ is the filter divisor.
25 |
26 | **Idea**: split the fingerprint space into $M$ partitions, and to use one of the partitions in the estimation.
27 |
28 | > The estimation of distinct block size in the whole data set: $S^* = M \times S_{sample}$
29 | > can also consider the case where the size of block is different.
30 |
31 | 
32 |
33 | - How to set $M$?
34 | Define a $\alpha-\beta$ accuracy notion, to prove how to choose $M$ under the given $\alpha$ and $\beta$.
35 |
36 | ### Implementation and Evaluation
37 | - Changing logging module: samples data blocks during the consistency point. (for update)
38 | - Disk Scanner: sample existing blocks in the volume.
39 | - All the sample will store in a fingerprint sample file (FPS).
40 | - Estimation Operation:
41 | merges the sample from change logging to the FPS, and update the estimate accordingly.
42 |
43 | - Experiment
44 | 1. Accuracy
45 | 2. Performance degradation: increase the rate of random access for counting module.
46 |
47 |
48 | ## 2. Strength (Contributions of the paper)
49 | 1. this work provides a **single-scan-pass** method for estimating deduplication ratio in a large dataset, also, with statistically guaranteed accuracy.
50 | 2. This work also consider to tackle the rapid change of dataset.
51 | 3. It implements this technique in a real commercial storage system for real world dataset. It also verifies the impact of performance (less than a few percent).
52 | ## 3. Weakness (Limitations of the paper)
53 | 1. Theory of proving the correctness bound of is not very clear, I cannot understand the rationale behind them.
54 |
55 | ## 4. Future Works
56 | This paper provides a very simple sample method based on fingerprint, i.e., content-based, this is not very novel from my perspective. And this paper also presents the whole theory to support its idea. The insight is for large dataset, it is possible to estimate the deduplication ratio with sampling.
--------------------------------------------------------------------------------
/storage_paper_note/deduplication/post_dedup/DUPEFS-FAST'22.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | FAST'22 | secure deduplication |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | -
15 |
16 | ### Method Name
17 |
18 | ### Implementation and Evaluation
19 |
20 | ## 2. Strength (Contributions of the paper)
21 |
22 | ## 3. Weakness (Limitations of the paper)
23 |
24 | ## 4. Some Insights (Future work)
25 |
26 |
--------------------------------------------------------------------------------
/storage_paper_note/deduplication/secure_dedup/CAONT-RS-HotStorage'14.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of Clouds
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :-----: | :------------------: |
8 | | HotStorage'14 | dispersal, deduplication |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | The keyless security of existing dispersal algorithms relies on embedded random information which breaks data deduplication of the dispersed data. This paper proposes convergent dispersal, which replaces the original random information with deterministic cryptographic hash which is derived from the original data.
14 |
15 | The Summary of existing dispersal algorithm
16 | 
17 |
18 |
19 | ### Convergent Dispersal
20 | This paper contains two convergent dispersal algorithms
21 | > CRSSS and CAONT-RS
22 | > both of them augment existing dispersal algorithms with the deduplication property.
23 |
24 | - Target Deployment Scenario
25 | Each compute server performs the cross-user deduplication.
26 |
27 | The security of existing dispersal algorithms depends on the embedded **random information**. Due to randomness, distinct secrets with identical content lead to different sets of shares (impede data deduplication)
28 |
29 | - Key idea
30 | replace the original random information in existing dispersal algorithms with **deterministic hashes** generated from the secret.
31 | - Convergent RSSS (CRSSS)
32 | 
33 | Given a secret, it splits it into a number of words which has the **same size** as hashes (e.g., SHA-256 $\rightarrow$ 32 bytes word size).
34 | Each time, it processes $k - r$ words, and generates $r$ hashes from the $k - r$ words uising $r$ different hashes.
35 | $$
36 | h_i = H(D, i), for \space i = 0,1,...,r-1
37 | $$
38 |
39 | - Convergent AONT-RS (CAONT-RS)
40 | Key idea:
41 | replace the random key employed in the AONT step of AONT-RS with a cryptographic hash generated from the secret.
42 | 
43 | $$
44 | c_i = d_i \oplus E(h_{key}, i), for \space i = 0, 1, ..., s-1
45 | $$
46 |
47 | ### Implementation and Evaluation
48 | - Investigate the throughput of CRSSS and CAONT-RS
49 | > measure the total amount of processed secret data divided by the computational time of generating all shares.
50 | > SHA-256: for default hash
51 | > AES-256: for default encryption function
52 |
53 | - Evaluate this performance
54 | > In local machine
55 |
56 | Insight: CRSSS can achieve a more flexible tradeoff between security and performance than CAONT-RS.
57 |
58 | ## 2. Strength (Contributions of the paper)
59 |
60 | ## 3. Weakness (Limitations of the paper)
61 |
62 | ## 4. Future Works
63 | This paper does not analyze how the secret size affects the deduplication ratios for different dispersal algorithms. For CRSSS and CAONT-RS, since there are some constrains on the its secret sizes.
64 |
--------------------------------------------------------------------------------
/storage_paper_note/deduplication/secure_dedup/DupLESS-Security'13.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | DupLESS: Server-Aided Encryption for Deduplicated Storage
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----------------: | :------------------: |
8 | | USENIX Security'13 | Secure Deduplication |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper:
13 | In cloud deduplication, Message-locked encryption (MLE) is inherently subject to brute-force attacks that can recover files falling into a know set. This paper proposes an key-server based architecture that can provides secure deduplicated storage resisting brute-force attacks.
14 | > The weakness of **convergent encryption** (CE): deterministic and keyless, security only is possible when the target message is too **large** to exhaust. (unpredictable)
15 |
16 | - Secure deduplication: Dedup with strong security against untrusted storage
17 | - Compromise resilience: under client compromise
18 |
19 | ### DupLESS (Duplicateless Encryption for Simple Storage)
20 | - It contains a group of affiliated clients, a key server
21 | > Goal: make DupLESS work **transparently** with existing Storage Service system. (Site as a layer on top of existing simple storage service interfaces)
22 |
23 | - Oblivious PRF (OPRF) protocol (Server-aided encryption)
24 | $F$: A pseudorandom function (PRF)
25 | $K \leftarrow F(K_s, H(f))$ ($f$ is the file)
26 | > OPRF: server learns nothing, client learns on $K$
27 |
28 | - Against online brute-force attack:
29 | Goal: slow down online brute-force trials from attacker controlled clients
30 | > limit clients to send $q$ queries per epoch.
31 |
32 | - System Overview
33 | 
34 | > Encrypt and decrypt files
35 | > Handle file names and paths
36 | > Run Transparently: low overhead, still can run when KS is down, no client-side state
37 |
38 | ### Implementation and Evaluation
39 | - DupLESS client: python, support **Dropbox** and **Google Drive**. (command-line interface)
40 | - Evaluation
41 | > 1. Bandwidth overhead: DupLESS bandwidth overhead compared to plain Dropbox
42 | > 2. Retrieval latency: vary file size, compare with plain Dropbox and Covergent Encryption.
43 | > 3. Storage Overhead: DupLESS storage overhead compared to dedup over plaintexts
44 |
45 | ## 2. Strength (Contributions of the paper)
46 | 1. The system design is very considerable. When authors design DupLESS, they consider deduplication, compromise resilience and brute-force attack resilience.
47 | 2. To achieve low performance overhead, this paper also considers the optimization in client-to-KS OPRF protocol.
48 | 3. To guarantee the performance, DupLESS aims to work as a transparent layer over the storage service system.
49 | ## 3. Weakness (Limitations of the paper)
50 | 1. Compared with plain Dropbox or Google Drive, DupLESS incurs the higher overhead on storage overhead (encrypted user key from user) so as to gain the improvement in security.
51 | ## 4. Future Works
52 | 1. How about do the deduplication over the metadata (e.g., the *key* used to encrypt data and be encrypted by user's private key)? Although the size of this part of data may be very small, they also store in back-end storage service.
53 | 2. Can it leveage the characteristic of the data workload to further optimize the deduplication process?
54 |
--------------------------------------------------------------------------------
/storage_paper_note/deduplication/secure_dedup/FrequencyAnalysis-DSN'17.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Information Leakage in Encrypted Deduplication via Frequency Analysis
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----: | :------------------: |
8 | | DSN'17 | Secure Deduplication |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | Existing MLE implementations still cannot fully protect against content leakage, mainly because their encryption approaches are deterministic.
14 | Previous stduies have addressed the possibility of launching frequency analysis MLE-based storage and also proposed cryptographic mechanisms to mitigate the issue.
15 | > Those investigations are theoretically driven.
16 |
17 | ### Locality Based Attack
18 | - Chunk Locality
19 | This is very prevalent in backup workloads that chunks are likely to re-occur together with their neighboring chunks across backups.
20 | > rationale: changes to backups often appear in few clustered regions of chunks.
21 |
22 | In security perspective: if a plaintext chunk $M$ corresponds to a ciphertext chunk $C$, then the neighboring plaintext chunks of $M$ are likely to correspond to the neighboring ciphertext chunks of $C$.
23 |
24 | - Threat Model
25 | An attacker may obtain the auxiliary information (as the plaintext chunks of a prior backup).
26 | > Ciphertext-only mode: can only access the ciphertext chunks
27 | > Known-plaintext mode: a more powerful adversary that knows a small fraction of the ciphertext-plaintext chunks pairs about the latest backup.
28 |
29 |
30 | - Attack Model
31 | Message, ciphertext model:
32 | > $M_1, M_2, ....$, $C_1, C_2, ...$ shows the logical order for message chunks and ciphertext chunks.
33 |
34 | **Basic Attack**:
35 | It takes in $C$ and $M$ as input, and returns the result set of all inferred ciphertext-plaintext chunk pairs.
36 | > just counting the frequency of each kind of chunks, and sort them to generate ranking, and find the message and ciphertext chunks with the same ranking.
37 |
38 | This kind of attack is sensitive to data updates that occur across different versions of backups over time.
39 | > it exists many ties, i.e., chunks have the same frequency. How to break ties during sorting also affects the frequency rank.
40 |
41 | ### Implementation and Evaluation
42 |
43 | ## 2. Strength (Contributions of the paper)
44 |
45 | ## 3. Weakness (Limitations of the paper)
46 |
47 | ## 4. Future Works
48 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Background/Availability-OSDI'10.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Availability in Globally Distributed Storage System
5 | @OSDI'10 @Background
6 | [TOC]
7 |
8 | ## Summary
9 |
10 | ***Availability***
11 | **Part 1**
12 | 
13 | The vast majority of such unavailability events are transient and do not result in permanent data loss. Less than 10% of events last longer than 15 minutes.
14 |
15 | - Two metrics throughout this paper:
16 |
17 | 1. **The average availability** of all $N$ nodes in a cell
18 | $$
19 | A_N = \frac{\sum_{N_i \in N}uptime(N_i)}{\sum_{N_i \in N}(uptime(N_i)+downtime(N_i))}
20 | $$
21 | $uptime(N_i)$ and $downtime(N_i)$ refer to the lengths of time a node $N_i$ is available or unavailable.
22 |
23 | 2. **Mean time to failure (MTTF)**:
24 | the measurements of availability
25 | $$
26 | MTTF = \frac{uptime}{number \quad failures}
27 | $$
28 |
29 | **Failure Bursts**
30 | This paper presents a simple time-window-based method to group failure events into failure bursts which, despite its simplicity, successfully identifies bursts with a common cause.
31 |
32 | **Key findings from the fleetwide data**
33 | 1. Most unavailability periods are transient
34 | 2. Unavailability durations differ significantly by cause
35 | > Median duration between 1 and 30 minutes depending on the cause
36 |
37 | 3. Correlated failures matter
38 | > 37% of all failures of at least 15 minutes in duration in Google datacenters are part of a correlated failure burst.
39 |
40 | 4. Largest correlated failures share common failure domains
41 | > Large failure bursts almost always have significant **rack-corelation**.
42 |
43 | ## Feedback and Recommendations
44 | 1. Determining the acceptable rate of successful transfers to battery power for individual machines upon a power outage.
45 | 2. Focusing on reducing reboot times, because planned kernel upgrades are major source of related failures.
46 | 3. Moving towards a dynamic delay before initiating recoveries, based on failure classification and recent history of failures on the cell.
47 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Background/Facebook Warehouse Cluster-HotStorage'13.md:
--------------------------------------------------------------------------------
1 | # A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A study on the Facebook Warehouse Cluster
2 | @HotStorage'13 @Study on Data-center Network @Note
3 | [TOC]
4 |
5 | ## Summary
6 | ***Background from Facebook's warehouse cluster***:
7 | - The warehouse cluster at Facebook employs an RS code with parameters ($k=10, r=4$), thus resulting in a $1.4 \times$ storage requirement, as compared to $3 \times$ under conventional replication, for a similar level fo reliability.
8 | - The most frequently accessed data is stored as 3 replicas, to allow for efficient scheduling of the map-reduce jobs.
9 | - For the data which has not been accessed for more than three months is stored as a $(10,4)$ RS code.
10 |
11 | ***Data Recovery***
12 | - In Facebook warehouse cluster, the median is more than 50 machines-unavailability events per day.
13 | > This reasserts the necessity of redundancy in the data for reliability and availability.
14 |
15 | - Number of missing blocks in a stripe:
16 | > one block missing: 98.08% (most common)
17 | > two blocks missing: 1.87%
18 | > three or more blocks missing: 0.05%
19 |
20 | - Cross-rack bandwidth consumed:
21 | > A median of more than 180TB of data is transferred through the TOR switches every day for RS-coded data recovery.
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/EC Update/ParIX-ATC'17.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | PARIX: Speculative Partial Writes in Erasure-Coded Systems
5 | --------------------------------
6 |
7 | @ATC'17 @Erasure Coded writes
8 | [TOC]
9 |
10 | ## 1. Summary
11 | ### Motivation of this paper:
12 | - This paper aims to solve the problem of partial write in EC. The main problem of partial write of EC is the high I/O amplification. Although this can can be mitigate by leveaging parity logging to append incremental change log (update the delta of parity), it agrues the cost of **in-place read-and-write** is still expensive (its latency is equivalent to that of random seek).
13 |
14 | - This paper wants to further optimize parity logging by eliminating the read. (i.e., the key to improve the performance of partial writes is to reduce the number of reads)
15 |
16 | ### PariX
17 | - The key idea of PariX
18 | > 1. Each parity records $m$ series of changes logs of $m$ data blocks.
19 | > > The rationale: $d^{(0)}_i \leftarrow d^{(1)}_i, d^{(2)}_i, d^{(3)}_i, ... ,d^{(r)}_i$,
20 | > > $p_j^{(r)} = p_j^{(0)} + a_{ij} \times (d_i^{(r)} - d_i^{(0)})$
21 | > 2. The Speculation:
22 | > > In this paper, its speculation means whether the parities need $d_i^{(0)}$ or not.
23 | > > it speculates that
24 | > > 1) Assume $d_i^{(0)}$ is NOT needed (mostly right)
25 | > > 2) Send $d_i^{(0)}$ only when it actually needed (sometimes only)
26 |
27 | - PariX's overhead is a disk write, while previous parity log schemes's overhead is **a disk write after a disk read**, assuming the read cache is missed.
28 |
29 | - The whole workflow of PariX:
30 |
31 | 
32 |
33 | **Note that**: For the case in replication, it is also (1 loop + 1 RTT)
34 |
35 | ### Implementation and Evaluation
36 | - Based on a previous block store of this group, master server is implemented by **MySQL** and **Redis**. (refer to Usra (Open Source partly))
37 | - Random I/O lantency
38 | - Recovery time
39 |
40 | ## 2. Strength (Contributions of the paper)
41 | - the idea of this paper is not very complex, but can really work. Reducing the time of read is an intitutive method to impove the performance of writing.
42 | - the method can truly work in the scenario of
43 | ## 3. Weakness (Limitations of the paper)
44 | - When there are too many one-shot write in a workload, PariX cannot work well. Because it cannot fit its speculation.
45 | - When PariX speculation fails, it needs to send $d_i^{(0)}$ to all parities, this penatly would introduce high network traffic overhead. (Although it argues that parities writes are small)
46 | - In its evaluation, it just test this prototype in a small testbed (with 10 machines), with EC (4, 2). This setting cannot prove the scalability of it.
47 |
48 | ## 4. Future Works
49 | - In this method, its speculation is very simple, which cannot fit the one-shot write well. How to handle the large sequential one-shot write workload? Maybe it is a point can be extended.
50 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Basics/Plank-FAST'09.md:
--------------------------------------------------------------------------------
1 | #A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage
2 | @James S. Plank @FAST'09
3 | [TOC]
4 |
5 | ## Summary
6 | - This paper's goals are to
7 | > 1. compare codes and implementations to discern whether **theroy matches practice**
8 | > 2. demonstrate how parameter selection can lead to good coding performance
9 |
10 | It firstly demonstrates the **Nomenclature** of a Erasure Coded Storage System, then gives brief introductions of different kinds of Erasure Codes
11 | > 1. *Reed-Solomon (RS) Codes*: strip unit is a $w-bit$ word, where $w$ must be large enough that $n \leq 2^w+1$ (Most implementations find $w=8$ performs the best). The multiplication in $GF(2^w)$ implemented with multiplication tables or discrete logarithm tables so that it is more **complex**. For this reason, Reed-Solomon codes are considered expensive.
12 | > 2. *Cauchy Reed-Solomon (CRS) Codes*: this code extends RS codes in two points. First, the Generatir matrix uses Cauchy matrices instead of Vandermonde matrices. Second,
13 | it eliminates the expensive multiplications of RS codes by converting them to extra XOR operations.
14 |
15 | Next, this paper tests five open source erasure coding libraries (i.e., **Luby**, **Zfec**, **Jerasure**, **Cleversafe**, **EBENODD/RDP**) and do the **Encoding Experiment** and **Decoding Experiment** to measure their performances. When it does the experiment, it uses speeds of **memcpy()** and **XOR** as the baseline.
16 | > 1. Encoding Time VS. Data Buffer Size: using **gettimeofday()** to measure the times of all coding activities.
17 | > **Conclusion**: the size of the data buffer can impact performance, with the I/O removed, the effects of modifying the buffer size are negligible.
18 | > 2. Encoding Speed VS. Packet Size: **lower** packet sizes have less tight XOR loops, but better cache behavior. **higher** packet sizes perform XORs over larger regions, but cause more cache misses.
19 | > **Conclusion**: higher packet sizes perform better than lower ones. It also performs **a search algorithm** to find optimal packet size.
20 |
21 | In addition, it also mentions that **the unit of XOR** used by the encoding/decoding software should match the the largest possible XOR unit of the machine.
22 |
23 | In Conclusion, it summaries:
24 | > 1. how to choose $w$ in RAID-6 code, CSR, RS.
25 | > 2. the packets sizes of the codes should be chosen to yield **good cache behavior**.
26 | > 3. the implementation must pay attention to **memory and cache**. It will be paramount for high performance.
27 |
28 | ## Strength
29 | 1. This paper presents a full evaluation and examination of the current Open-Source Erasure Coding Libraries in Storage System, which can help the readers get a great perspective of erasure codes.
30 | ## Weakness
31 | Because this paper just evaluuates the Open-Source Erasure Coding Libraries, so it cannot say that there exists obvious weakness in this paper.
32 | ## Future Work
33 | 1. This paper mentions that the modern architectures shift more universally toward **multicore**. So it can further investigate how open source libraries to exploit the opportunities of multiple processors on a board. (this is an additional challenge)
34 | 2. More research needs to be performed on **special-purpose codes** beyond RAID-6, and implementations need to take advantage of the special-purpose codes that already exist.
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Deployment/Alpha-Entanglement-Codes-DSN'18.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments
5 | @DSN'18 @ Redundancy Propagation
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: this paper intends to design flexible and practical erasure codes with high fault-tolerance to improve data durability and availability even in catastrophic scenarios.
10 |
11 | ***Alpha Entanglement Codes (AEC) $(\alpha, s, p)$***: The idea of AE code is to create redundancy by **tangling (mixing)** new data and blocks with old ones, building entangled data chains that are woven into a growing mesh of interdependent content.
12 | >1. $\alpha$: determine the local connectivity, the number of parities created per data block.
13 | >2. $s$ amd $p$: determin the global connectiviry of data blocks in the grid. $p$ defines the number of helical strands. $s$ the number of horizontal strands
14 |
15 | Each node belongs to $\alpha$ strands each edge belongs to only one strand.
16 |
17 | - Alpha Entanglements permit changes in the paramenters without the need to encode the content again (**dynamic** fault-tolerance, long-term storage system)
18 | - The encoder builds block chains, strands, that alternate data and redundant blocks.
19 | > The entanglement function computes the exclusive-or (XOR) of two consecutive blocks at the head of a strand and inserts the output adjacent to the last block.
20 |
21 | - The interwined graph of AEC:
22 | 
23 | 
24 |
25 | - The decoder repairs a node using two adjacent edges that belong to the same strand, thus, there are $\alpha$ options.
26 |
27 | ***Implementation and Evaluation***:
28 | **Implementation**: It mentions two use cases of entangled storage system
29 | >1. A Geo-Replicated Backup
30 | >2. Disk Arrays
31 |
32 | **Evaluation**: It examines the design of AE codes to understand how the code settings impact on fault tolerance and write performance.
33 | >1. Code Parameters and Write Performance
34 | >2. Code Parameters and Fault Tolerance
35 |
36 | ## Strength (Contributions of the paper)
37 | 1. These mechanisms based on the novel redundancy propagation, which are robust and sound, but they are also efficient and easily implementable in real system.
38 | 2. The encoder and decoder are lightweight, based on exclusive-or operations, and offer promising trade-offs between security, resource usage and performance.
39 | 3. This paper also mentions the use cases for distributed and centralised storage systems.
40 | ## Weakness (Limitations of the paper)
41 | 1. This paper does not mention how to improve the efficiency of repairs. It just focuses on reducing the maximum possible storage overhead.
42 |
43 | ## Future Works
44 | 1. A point that can be considered is how to improve its efficiency of repairs.
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Deployment/ButterflyCode-FAST'16.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Opening the Chrysalis: On the Real Reapir Performance of MSR Codes
5 | @FAST'16 @MSR Code
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: The implementation of RGCs in production systems requires dealing with complex and bug-prone algorithms. In this paper, it focuses on managing the drawbacks of RGC-MSR codes.
10 |
11 | ***Butterfly Codes***:
12 | **Encode**: The key point in Butterfly Codes is its **recursive** construction approach, which can have a simplified design that results in a simpler implementation, and allow for a better reuse of precomputed values, leading to better cache locality.
13 | 
14 | Because of the double vertical flip in equations above, the recursion can be simplified
15 | 
16 |
17 | **Decode**: In the case of one failure, the lost column can be regenerated by communicating an amount of data equal to 1/2 of the remaining data.
18 | > If the lost column is not the butterfly parity, the amount of communicated data is exactly equal to the amount read from suriving disk. (**optimal I/O access**)
19 |
20 | ***Implementation and Evaluation***:
21 | **Ceph**: RADOS uses an erasure code plug-in infrastructure that allows dynamical use of external erasure code libraries. Third-party developers can provide independent erasure code implementation.Efficient integration of Butterfly code with Ceph requires **re-defining** the plug-in interface. It also implements a **proxy plug-in** that dynamically links with existing plug-ins.
22 |
23 | **Evaluation**: In HDFS and Ceph
24 | >1. Repair Throughput:
25 | >2. CPU Utilization
26 | >3. Network Traffic
27 | >4. Storage Traffic
28 |
29 | ## Strength (Contributions of the paper)
30 |
31 | 1. design a recursive Butterfly code construction (two parity MSR code) and implement it in two real-world distributed storage systems (HDFS and Ceph).
32 | 2. compare two major approaches when using erasure codes in distributed storage systems (**online** and **batch-based** encoding) and point the major tradeoffs between the two approaches.
33 | 3. examine the performance of Butterfly code and draw a comparison between the theoretical results of MSR codes and the performance achievable in real systems.
34 |
35 | ## Weakness (Limitations of the paper)
36 | 1. Butterfly Code is not very general, it can just tolerate that any two of the codeword columns are missing
37 |
38 | ## Future Work
39 | 1. How to make Butterfly codes more general is another issue that can be extended in the future.
40 |
41 |
42 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Deployment/DRC-ISIT'16.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Double Regenerating Codes for Hierarchical Data Centers
5 | @ISIT'16 @Regenerating Codes
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: Deploying erasure coding in data center remains challenging due to the hierarchical nature of data centers (multiple racks, each comprising multiple nodes for storage). And the cross-rack bandwidth is heavily oversubscribed. Thus, this paper's goal is to minimize the cross-rack repair bandwidth in hierarchical data center.
10 |
11 | ***Double Regenerating Codes***
12 | The core idea of DRC is to perform regeneration **twice**: first within a rack and the across multiple racks. So it calls this approach **double regeneration**.
13 | > repair design targets the unbalanced nature of inner-rack and cross-rack capacities in hierarchical data centers.
14 | 
15 |
16 | - Double Regeneration makes two trade-offs:
17 | >1. It can only tolerate a single-rack failure
18 | >2. the sum of the inner-rack and cross-rack repair bandwidth is higher than that in MSR codes. (trade the inner-rack repair bandwidth for the cross-rack repair bandwidth)
19 |
20 | - DRC exploits node cooperation within a rack to minimize the cross-rack repair bandwidth.
21 |
22 | ***Implementation and Evaluation***:
23 | **Implementation**
24 | None
25 | **Evaluation**
26 | Compared with RS, MSR, IEE
27 |
28 | ## Strength (Contributions of the paper)
29 | 1. prove that there exists a DRC construction that minimizes the cross-rack repair bandwidth for a single-node repair , while preserving the MDS property.
30 | 2. show via quantitative comparisons that DRC reduces the cross-rack repair bandwidth of state-of-the-art MSR codes by up to 45.5%.
31 | ## Weakness (Limitations of the paper)
32 | 1. DRC can only tolerate a single-rack failure (as opposed to the nomal code)
33 | ## Future Works
34 | 1. How about leveraging the special topological structure of rack-based data center to further reduce the repair overhead?
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Deployment/NCCloud-FAST'12.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # NCCloud: A Network-Coding-Based Storage System in a Cloud-of Clouds
5 | @FAST'12 @ Regenerating Code
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: It is important to do the repair in multiple cloud storage. This paper's objective is to minimize the cost of storage repair (due to the maintain of data over the clouds) for a permanent sing-cloud failure.
10 |
11 |
12 | ***Functional Minimum-Storage Regenerating Code (FMSR)***:
13 | This paper present a **proxy-based**, multiple-cloud storage system, called NCCloud, which can practically address the reliability of today's cloud backup storage. NCCloud implements FMSR, which eliminates the encoding requirement if storage nodes during repair, while ensuring the new set of stored chunks after each round of repair preserves the required fault tolerance.
14 | 
15 | Code chunk $P_i$ equals to linear combination of original data chunks. For the repair in FMSR, it downloads one code chunk from each surviving node and reconstructs new code chunks (via random linear combination) in new node.
16 | However, FMSR codes is not systematic, FMSR codes are acceptable for **long-term** archival applications, where the read frequency is typically low.
17 |
18 | **Iterative Repairs**:
19 | FMSR codes regenerates different chunks in each repair, so it is necessary to ensure **MDS property** still holds even after iterative repairs. To achieve this, it also proposes a **two-phase** checking method.
20 | >1. **MDS property check**: current repair maintains MDS property.
21 | >2. **Repair MDS property check**: next repair for any possible failure maintains MDS property.
22 |
23 |
24 | ***Implementation and Evaluation***:
25 | It implements NCCloud as a proxy that bridges user applications and multiple clouds including three layers:
26 | >1. file system layer
27 | >2. coding layer (both RAID-6 and FMSR)
28 | >3. storage layer
29 |
30 | **Evaluation**:
31 | Response time: both in Local Cloud (OpenStack Swift) and Commercial Cloud (multiple containers in Azure) with different file sizes.
32 |
33 | ## Strength (Contributions of the paper)
34 | 1. design FMSR code that can be deployed in thin-cloud setting as they do require storage nodes to perform encoding during repair.
35 | 2. implement FMSR code with a two-phase checking scheme, which ensures that double-fault tolerance is maintained in the current and next round of repair.
36 | 3. conduct monetary cost analysis and extensive experiments on both local cloud and commercial cloud settings.
37 |
38 | ## Weakness (Limitations of the paper)
39 | 1. FMSR code is not a systematic code that it only stores encoded chunks formed by the linear combination of the original data chunks, and does not keep the original data. Thus, the overhead of frequent reading is high.
40 | 2. In this paper, it just considers an FMSR code implementation with double-fault tolerance.
41 |
42 | ## Future Work
43 | 1. consider how to reduce the encoding overhead of FMSR code
44 | 2. make the FMSR code more general, beyond double-fault tolerance
45 |
46 |
47 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Erasure Coding Deployment/XORing-PVLDB'13.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # XORing Elephants: Novel Erasure Codes for Big Data
5 | @PVLDB'13 @New Erasure Code @Repair problem
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: This paper wants to overcome the high repair cost of RS code. It presents a novel family of erasure codes that are efficiently repairable and offer higher reliability compared to Reed-Solomon codes.
10 |
11 | ***Locally Repairable Codes (LRC)***:
12 | - The main idea of this code is to sacrifice storage efficiency to gain well performance. And it is inspired by "MDS code with parameters $(k, n-k)$ cannot have locality smaller than $k$". Because it is exactly the cost of **optimal fault tolerance**. Thus, it tries to construct a **near-MDS** code with non-trivial locality.
13 | - LRCs are constructed on the top of MDS codes: MDS encoded blocks are grouped in logarithmic sized sets and then are combined together to obtain parity blocks or **logarithmic** degree. For the distance:
14 | $$
15 | \lim\limits_{k \rightarrow \infty} \frac{d_{LRC}}{d_{MDS}}=1
16 | $$
17 | It makes repair efficient by adding additional **local parities**.
18 | 
19 |
20 | ***Implementation and Evaluation***:
21 | Its system is a modification of **HDFS-RAID** that incorporates LRC. The **RaidNode** and **BlockFixer** classes were also subject to modifications.
22 | **Evaluation**: both in Amazon's Elastic Compute Cloud (EC2) and a test cluster in Facebook
23 | >1. HDFS Bytes Read: total amount of data read
24 | >2. Network Traffic: total amount of data communicated from nodes (Amazon's AWS Cloudwatch monitoring tools)
25 | >3. Repair Duration: the time interval between the starting time of the first repair job and the ending time of the last repair job.
26 |
27 | ## Strength (Contributions of the paper)
28 | 1. introduce a now family of erasure code called **Locally Repairable Codes** (LRCs), which are efficiently repairable both in terms of network bandwidth and disk I/O.
29 | 2. present both randomized and explicit LRC constructions starting from generalized Reed-Solomon parities.
30 | 3. design and implement a module that replaces Reed-Solomon codes with LRCs in HDFS-RAID.
31 | 4. The part of **impartance of repair** is well-written
32 | ## Weakness (Limitations of the paper)
33 | 1. The disadvantage of adding these local parities is the extra storage requirement
34 | ## Future Work
35 | 1. For the part of Reliability Analysis, this paper cannot solve the issue fo measuring the availability tradeoffs of coded storage systems. Thus, this can be a future research direction.
36 |
37 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/JunLi's paper/Beehive-HotStorage'15.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Beehive: Erasure Codes for Fixing Multiple Failures in Distributed Storage Systems
5 | @HotStorage'15 @Multiple Failure @MSR code
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: Generally, distributed storage systems will reconstruct multiple failure blocks separately. However, data unavailability events can be **correlated**, specifically, many disks fail at similar ages. To leveage the advantage of the correlated failures, this paper wants to reconstruct multiple missing blocks in batches, to save both network transfer and disk I/O during reconstruction.
10 |
11 | ***Beehive***:
12 | - An instant benefit of Beehive is each block will only be **read once** to reconstruct multiple blocks.
13 | 
14 | - The construction of Beehive codes is built on top of product-matrix MSR codes, based on one particular *product-matrix* construction proposed by Rashmi.
15 | > 1. MSR codes constructed are systematic
16 | > 2. Unlike other constructions that impose constraints on specific values of $d$ or $k$, the construction proposed in product-matrix is much more general by only requiring $d \geq 2k-2$
17 |
18 | **Encode**:
19 | It divides one generation of the original data into two parts that contains $k$ and $k-1$ blocks. In first part each block contains $d-k+1$ segments. In second par each block contains $t-1$ segments.
20 | From the original data, Beehive computes $n$ blocks. each block contains the $d-k+1$ segments from $g_iF$ and the $t-1$ segments from $\sum_{l=1}^{k-1}a_{i,l}c_l$
21 | 
22 |
23 | **Decode**:
24 | - The helpers computes the decoding information and sends it to newcomer $j$.
25 | - At the side of newcomers, it can divide their operation into two stages. In the first stage, it will receive $d$ segments from helpers and do the calculation. In the second stage, it will send the calculation result to another newcomer $j^{'}$, and it will receive $t-1$ segments from other newcomers as well.
26 | - During reconstruction, each newcomer will receive $d+t-1$ segments, achieving the optimal network transfer to reconstruct $t$ blocks.
27 |
28 |
29 | ***Implementation and Evaluation***:
30 | Implement Beehive in C++ by using the Intel storage acceleration library (ISA-L) for the finite field arithmetic.
31 | ## Strength (Contributions of the paper)
32 | 1. this paper propose a new family of erasure codes that can reconstruct multiple blocks at same time. And each block will only be read once to reconstrcut multiple blocks.
33 | ## Weakness (Limitations of the paper)
34 | 1. Need additional storage overhead
35 | 2. Its encoding process is based on MSR code, so Beehive's encoding operation is bit slower than MSR codes
36 | ## Future Works
37 | 1. A very improtant issue I consider is how to combine Beehive with practical distributed storage system.
38 |
39 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/JunLi's paper/Carousel-ICDCS'17.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # On Data Parallelism of Erasure Coding in Distributed Storage Systems
5 | @ICDCS'17 @Data Parallelism
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: Data paralleism, which refers to the number of blocks that can be read by different processes simultaneously, is limited by existing **systematic** erasure code. This paper is designed to extend data parallelism from reading $k$ data blocks in parallel to reading all $n$ blocks. Therefore, it can have a higher overall throughput.
10 | 
11 |
12 | ***Carousel Codes***:
13 | - Carousel codes achieve a flexible trade-off between **data parallelism** and **data availability**.
14 | The process of the construction is shown below:
15 | 
16 | - How to achieve flexible parallelism: This paper also allows users to flexibly specify the degree of data parallelism by controlling the number of blocks that contains the original data.
17 |
18 |
19 | ***Implementation and Evaluation***:
20 | This paper implements the Carousel Code in C++. All operations, including encoding, decoding, and reconstruction are implemented by using ISA-L.
21 | - The advantage of the **sparsity** of the generating matrix in Carousel codes
22 | > Even though the size of the generating matrix is expaned the complexity of encoding and output bit does not change.
23 |
24 | **Evaluation**
25 | >1. The comparison of the encoding and decoding throughput for various values of $k$.
26 | >2. Completion time of reconstruction operations for various values of $k$.
27 | >3. Comparison of Hadoop jobs running on data encoded with systematic RS codes and Carousel codes. (terasort and wordcount in Hadoop)
28 | >4. Comparsion of the time of retrieving a 3GB file from HDFS with systematic RS code and Carousel codes
29 |
30 |
31 | ## Strength (Contributions of the paper)
32 | 1. This paper presents **Carousel Codes**, which has a higher data parallelism $\rightarrow$ a higher overall throughput.
33 | 2. It also shows the besides the MDS property and the configurable data parallelism, Carousel codes can achieve such optimal network transfer during reconstruction as well.
34 | 3. It also implemented Carousel codes in C++ and developed its prototype in Apache Hadoop.
35 | ## Weakness (Limitations of the paper)
36 | 1. I think a important issue of this code is the overhead of reconstruction, including the data re-distribution and re-encoding, which is much higher than the systematic RS code.
37 | ## Future Works
38 | 1. For the first weakness, I consider how to decrease this kind of overhead is a potential research direction.
39 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/JunLi's paper/JunLi-INFOCOM'14.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Cooperative Pipelined Regeneration in Distributed Storage Systems
5 | @INFOCOM'14 @Cooperative Regeneration
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: In regenerating codes, it needs to engage a large number of nodes during regeneration, which is not desirable in practical system. Although, some techniques have been proposed to reduce the number of participating nodes during regeneration, they either fail to maintain the recoverability property, or are not designed for regenerating **multiple data losses**. Thus, this paper proposes a cooperative pipelined regeneration process to regenerate multiple data looses in batches.
10 |
11 | ***Cooperative Pipelined Regeneration***:
12 | 1. Newcomers recevive data from other participating nodes and encode received data into partially regenerated coded blocks.
13 | 2. After this round of regeneration, newcomers will be partially regenerated and become **apprentices**.
14 | 3. In the next round of cooperative pipelined regeneration, apprentices and $r$ new newcomers receive data from other participating nodes with another set of $v$ providers.
15 | 
16 |
17 | ## Strength (Contributions of the paper)
18 | 1. This paper illustrates the pipelined regeneration with both **Random Linear Codes** and **Regenerating Codes**.
19 | ## Weakness (Limitations of the paper)
20 | 1. The apprentices introbduce additional storage overhead in this code
21 | 2. This paper just gives the theroical analysis of this code, not includes the implementation
22 | 3. It needs to do the experiments in a practical distribution storage system.
23 | ## Future Works
24 | 1. This work is really theorical, I think it should discuss more on how to implement it in a practical distribution system.
25 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/JunLi's paper/Pipelined_Regeneration-NetCod'11.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Pipelined Regeneration with Regenerating Codes for Distributed Storage Systems
5 | @NetCod'11 @Regenerating Code
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: In regenerating codes, minimum-storage regenerating codes require the newcomer to receive $\frac{M}{k} \times \frac{d}{d-k+1}$. However, in practical distributed storage system, it is not favorable to let a large number of nodes work cooperatively. This paper proposes a pipelined regeneration process that can reduce the number of participating nodes required by regenerating codes **without sacrificing data integrity**.
10 |
11 | ***Pipelined Regeneration***:
12 | The *independent regeneration* and *cooperative regeneration*
13 | 
14 | In some practical distributed storage system, the regeneration process will not be triggered until the number of failed storage node has reached a **certain threshold** and they can be regenerated in batches. (many newcomers)
15 | 
16 | This paper engages much fewer participating nodes by dividing one round of cooperative regeneration into several rounds of pipelined regeneration. In each round of pipelined regeneration, both the newcomer and apprentices are partially regenerated, such that there are fewer than $d$ providers. Suppose there are one newcomer, $\alpha$ apprentices, $v$ providers, during pipelined regeneration, all providers send $\alpha+1$ ($\alpha$ apprentices and one newcomer). A newcomer will be fully regenerated after $\alpha+1$ rounds of pipelined regeneration.
17 |
18 | ## Strength (Contributions of the paper)
19 | 1. This paper proposes the pipelined regeneration process, which can consume a smaller amount of traffic that would have been achieved by the conventional regeneration process with a much higher number of participating nodes.
20 | ## Weakness (Limitations of the paper)
21 | 1. It just consider the case of single failure and fails to utilize multiple newcomers cooperatively, and can only support MSR codes.
22 | 2. I feel the implementation of this code maybe very hard. So how to combine it with a practical distributed storage system is a issue.
23 | ## Future Works
24 | 1. How to utilize multiple newcomers in cooperatice fashion, such that it can further saving the bandwidth consumption
25 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/Clay Codes-FAST'18.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-root-url: paper_figure
3 |
4 | ---
5 |
6 | # Clay Codes: Moulding MDS Codes to Yield an MSR Code
7 | @FAST'18 @erasure code @Ceph @SMSR Codes
8 | [TOC]
9 |
10 | ## Summary
11 |
12 | ***Motivation of this paper***: There is a strong need for erasure codes that can efficiently recovery from single-code. However, the conventional repair of an RS code is inefficient. This paper will deal with Minimum Storage Regeneration (MSR) codes, which has least possible repair bandwidth and three additional properties. It proposes the Coupled-layer (Clay) Code by extending the theoretical construction of Ye and Brag with practical considerations.
13 |
14 | > 1. minimal disk read
15 | > 2. minimize sub-packetization level $\alpha$
16 | > 3. small field size, low-complexity implementation
17 |
18 | ***Clay Code Construction***: Here is the example with a (4, 2) scalar RS Code.
19 | 
20 |
21 | 
22 |
23 | ***Decoding***: For decoding, it introduces the notion of an Intersection Score (IS) to indicate the number of the vertices that correspond to erased bytes and which are at the same time colored red. Decoding is carried out sequentially, layer-by-layer, in order of increasing IS.
24 |
25 | For example:
26 | 
27 |
28 |
29 | ***Implementation and Evaluation***: This work introduce the notion of **sub-chunking** to enable use of **vector erasure codes** with Ceph. For implementations of various MDS codes and Galois-field arithmetic, it uses **Jerasure** and **GF-Complete** libraries.
30 | In its experiments, it does evaluations in Amazon EC2. Those experiments are carried out on both **fixed** and **variable object-size** workloads. Measurements are made of:
31 |
32 | > 1. repair network traffic
33 | > 2. repair disk read
34 | > 3. repair time
35 | > 4. encoding time
36 | > 5. I/O performance for degraded, normal operations.
37 |
38 | ## Strength (Contributions of the paper)
39 | 1. introduce the construction of Clay codes
40 | 2. do the modification of Ceph to support any vector code
41 | 3. the integration of Clay codes as a plugin to Ceph
42 |
43 | ## Weakness (Limitations of the paper)
44 |
45 |
46 | ## Future Work
47 |
48 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/Degraded-First-Scheduling-DSN'14.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Degraded-First Scheduling for MapReduce in Erasure-Coded Storage System
5 | @DSN'14 @degraded read schedule
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: There remains an open issue of how to customize the data analytics paradigm (e.g. MapReduce) when they operate in failure mode and need to perform degraded read.
10 | > Based on the observation: while the local tasks are running, the MapReduce job does not fully utilize the available network resources.
11 |
12 |
13 | ***Degraded-first scheduling***
14 | - **Main idea**: schedule some degraded tasks at the earlier stages of a MapReduce job and allow them to download data first using the unused network resources.
15 | >1. to move the launch of some degraded tasks ahead to take advantage of the unused network resources, so as to relieve the competition for network resources among degraded tasks later.
16 | >2. the default locality-first scheduling launches degraded tasks at the end, thereby making them **compete for network resources**.
17 |
18 | - This paper conducts simple mathematical analysis to compare the default locality-first scheduling and its basic degraded-first scheduling in terms of the runtime of a MapReduce job.
19 | > provide preliminary insights into the potnetial improvement of degraded-first scheduling in failure mode.
20 |
21 | ***Implementation and Evaluation***:
22 | **Implementation**:
23 | This paper implements degraded-first scheduling by modifying the source code of Hadoop 0.22.0.
24 | **Evaluation**:
25 | 1. Comparison of MapReduce Runtime
26 | > Single-job scenario vs Multi-job scenario
27 |
28 | ## Strength (Contributions of the paper)
29 | 1. This paper porposes the degraded-first scheduling, a new MapReduce scheduling scheme that improves MapReduce performance in erasure-coded clustered storage system operating in failure mode.
30 | 2. It also implements a discrete event simulator for MapReduce to explore the performance gain of degraded-first scheduling in a large-scale cluster.
31 | 3. This paper implements degraded-first scheduling on Hadoop and compare the performance of locality-first scheduling and degraded-first scheduling in a 13-node Hadoop cluster.
32 |
33 | ## Weakness (Limitations of the paper)
34 | 1. I think the idea of this paper is not very novel and intutive.
35 | 2. This experiment of this paper is not very enough.
36 |
37 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/Encoding-aware-DSN'15.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems
5 | @DSN'15 @Encoding-aware replication
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: When data blocks are first stored with replication, replica placement plays a critical role in determining both performance and availability of the subsequent encoding operation,
10 | > *random replication (RR)* brings both performance and availability issues to the subsequent encoding operation.
11 |
12 | ***Encoding-Aware Replication***
13 | - **Main Idea**: For each group of data blocks to be encoded together, EAR keeps one replica of each data block in the same rack, while storing the remaining replicas in other racks by equivalently solving a maximum matching problem.
14 | > It assumes that cross-rack data transfer is the performance bottleneck in a CFS architecture.
15 |
16 | - RR potentially harms performance and availability.
17 | > The primary reason is the replica layout of each data block is independently determined, while the data blocks are actually related when they are encoded together.
18 | > 
19 |
20 | **Eliminate Cross-Rack Downloads**
21 | 1. Formation of a stripe: blocks with at least one replica stored in the same rack.\
22 | > call this rack the **core rack**.
23 |
24 | **Guarantee the reliability requirements without relocation**
25 | 1. Model the replica layout to a bipartite graph.
26 | 2. Modeling Reliability problem to a **Max matching** $\rightarrow$ a **Max flow problem** in bipartite graph.
27 |
28 | ***Implementation and Evaluation***:
29 | **Implementation**:
30 | 
31 | **Evaluation**:
32 | 1. Testbed Experiment: 13-nodes Hadoop cluster
33 | >a. Encoding Throughput
34 | >b. Write Reponse Time
35 | >c. Impact on MapReduce Jobs
36 |
37 | 2. Discrete-Event Simulations
38 | ## Strength (Contributions of the paper)
39 | 1. This paper presents EAR, a new replica placement algorithm that addresses both performance and availability issues encoding operation.
40 | 2. It implements EAR on HDFS implementation, with only a few modification to the source code.
41 | 3. It conducts testbed experiments on a 13-machine cluster and discrete-event simulations based on CSIM 20.
42 | 4. Examine the replica distribution of EAR, and show that it maintains load balancing in storage and read requests as in RR.
43 | ## Weakness (Limitations of the paper)
44 | 1. This paper considers a very simple scenarios, and ignores the heterogeneous workloads and hardware resources.
45 | ## Future Works
46 | 1. I think it can further study the scenarios with heterogeneous workload and hardware resources.
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/OpenEC-FAST'19.md:
--------------------------------------------------------------------------------
1 | # OpenEC: Toward Unified and Configurable Erasure Coding Management in Distributed Storage Systems
2 | @Erasure code @ongoing work
3 | [TOC]
4 |
5 | ## Summary
6 | ***Motivation of this paper***:
7 | Integrating new erasure coding solutions into existing distributed storage systems is arguably a challenging task that requires non-trivial re-engineering of the underlying storage workflows.
8 | Limitation of EC management
9 | >1. Limited support for adding advanced erasure codes
10 | >2. Limited configurability for workflows of coding operations
11 | >3. Limited configurability for placement of coding operations
12 |
13 | ***OpenEC***:
14 | - Main Idea:
15 | Its main idea is to decouple erasure coding management from the underlying DSS operations
16 | First, this paper design a new erasure coding programming model which is not based on low-level data buffers but based on high-level abstractions, called **ECDAG**. ECDAG is a directed graph to describe the erasure coding process. It has freedom to be enforced with different underlined physical meanings. ECDAG provides the opportunity for control flow and data flow design in erasure coding process.
17 | > Centralized application, distributed application
18 |
19 | For the OpenEC design, it foucs on two types design: **Online EC design** and **Offline EC design**. And it also provides three levels of optimimzation to custom ECDAG designs for offline erasure coding.
20 | >1. Level 0: leverage the **Bind** to avoid the redundant traffic in distributed application of ECDAG.
21 | >2. Level 1: In offline erasure coding, OpenEC leverages the **AddConstraint** takes the locality into consideration and choose location from the locations of all the childs.
22 | >3. Level 2: The optimization works in **hierarchical data center**. OpenEC applies pipelining technique. And it can sort the children according to their regions to check whether layering can be applied to reduce the cross region network traffic.
23 |
24 | ## Strength (Contributions of the paper)
25 | 1. this paper propose a new programming model for EC implementation and deployment **ECDAG**, which defines the flows if erasure coding operations as a directed acyclic graph.
26 | 2. this paper also designs OpenEC, which translates ECDAGs into erasure coding operations atop a DSS. In particular, OpenEC can self-customize ECDAGs for hierarchical topologies to improve repair performance.
27 | 3. it also prototypes OpenEC on HDFS-RAID and Hadoop 3.0 HDFS.
28 | 4. It conducts extensive experiments on OpenEC in a local cluster and Amazon EC2.
29 |
30 | ## Weakness (Limitations of the paper)
31 |
32 | ## Future Work
33 |
34 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/RotatedReed-SolomonCodes-FAST'12.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | # Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads
5 | @FAST'12 @ Minimizing Recovery I/O
6 | [TOC]
7 |
8 | ## Summary
9 | ***Motivation of this paper***: Existing erasure codes are not designed with recovery I/O optimization in mind. So it needs
10 | >1. optimize existing codes for these operations
11 | >2. new codes which are intrinsically designed for these operations
12 |
13 | ***Algorithm for minimizing number of symbols***:
14 | The algorithm takes as input a **Generator matrix** whose symbols are single bits and the identity of a failed disk and outputs equations to decode each failed symbol.
15 | This algorithm firstly finds a decoding equation for each failed bit while minimizing the number of total symbols accessed. Given a **code generator matrix** and a list of failed symbols, the algorithm outputs **decoding equations** to recover each failed symbol.
16 | > 1. enumerate all valid decoding equations for each failed symbol
17 | > 2. **directed graph** formulation of problem makes it convenient to solve.*(convert this NP-Hard problem to finding the shortest path through the graph)*
18 | >
19 |
20 | For the expensive computational overhead, solutions to all common failure common failure combinations may be computed offline **a prior** and stored for future use.
21 |
22 | ***Rotated Reed-Solomon Codes***: Rotated Reed-Solomon Codes have the modification to standard Reed-Solomon codes. These codes have been designed to optimize the performance of degraded reads for single disk failures. (**improve the penalty of degraded reads**)
23 | 
24 | 
25 |
26 | ***Analysis and Evaluation***:
27 | 1. Reading from the $P$ drive or using standard Reed-Solomon codes is not a good idea in cloud storage system.
28 | 2. Generally, optimally-sparse and minimum-density codes perform best for disk reconstruction.
29 | **Evaluation**:
30 | 1. Data Recovery Rate v.s. Symbol Size
31 | 2. Data Recovery Rate v.s. Different erasure code
32 |
33 |
34 | ## Strength (Contributions of the paper)
35 | 1. Algorithm minimizes the amount of data needed for recovery and it is applicable to **any XOR** based erasure code.
36 | 2. Its implementation and evaluation of this algorithm demonstrates that minimizing recovery data translates directly into improved I/O performance for cloud file systems.
37 | 3. It develops a new class of codes, called Rotated Reed-Solomon codes. A new class of Reed-Solomon Codes which optimize degraded read performance. Better choice than standard Reed-Solomon codes for the cloud. (**arbitrary numbers of disks and failures**)
38 |
39 | ## Weakness (Limitations of the paper)
40 | 1. This paper mentions that its algorithm is computationally expensive (from seconds to hours of compute-time)
41 |
42 | ## Future Work
43 | 1. This paper can be extended by considering how to decrease the computation overhead instead of computing offline **a prior** and storing it for future use.
44 |
45 |
--------------------------------------------------------------------------------
/storage_paper_note/erasure_coding/Techniques for Erasure Coding/Two_Tale_in_HDFS-FAST'15.md:
--------------------------------------------------------------------------------
1 | # A Tale of Two Erasure Codes in HDFS
2 |
3 | @FAST'15 @Techniques for Erasure Codes @Adaptive Coding
4 |
5 | [TOC]
6 |
7 | ## Summary
8 |
9 | ***Motivation of this paper***: The increase in the amount of data to be read and transferred during recovery for an erasure-coded system results in two major problems: **high degraded read** and **longer reconstruction time**. This paper wants to exploit the **data access characteristics** of Hadoop workloads to achieve better recovery cost and storage efficiency than the existing HDFS architecture.
10 | 
11 | ***Hadoop Adaptively-Coded Distributed File System (HACFS)***:
12 | HACFS is the first sustem that uses a combination of two codes to dynamically adapt with workload changes and provide both low recovery cost and storage overhead.
13 |
14 | - Adaptive coding:
15 | It designs an adaptive coding module in HDFS and uses a **state machine** to describe the state transitions in HDFS. To maintain this state machine, HAFCS also accounts for the read accesses to data blocks in a file.
16 |
17 | > Read hot files with a high read count are encoded with a *fast code*.
18 | > Read cold files with a low read count are encoded with a *compact code*.
19 | > 
20 |
21 | ***Implementation and Evaluation***:
22 |
23 | 1. Implementation
24 | This paper has implemented HACFS as an extension to the HDFS-RAID module in the Hadoop Distributed File System. Its key module is the adaptive coding module, which tracks the system states and invokes the different coding interfaces. It includes about 3000 LOCs.
25 | 
26 | 2. Evaluation
27 | Compare with Colossus FS, FB HDFS, Azure
28 |
29 | - Degraded read latency
30 | - Reconstruction time
31 | - Storage overhead
32 |
33 | ## Strength (Contributions of the paper)
34 |
35 | 1. This paper designs the Hadoop Adaptively-Coded Distributed File System (HACFS) that adapts to workload changes by using two different erasure codes.
36 |
37 | > **fast code**: optimize recovery cost of degraded reads and reconstruction
38 | > **compact code**: provide low and bounded storage overhead
39 |
40 | 1. A novel conversion mechanism in HACFS to efficiently up/down-code data blocks between the two codes.
41 | 2. Implement HACFS as an extension to HDFS and demonstrate its efficacy using two cases studies with Product and LRC family codes.
42 |
43 | ## Weakness (Limitations of the paper)
44 |
45 | 1. This paper mentions that the conversion cost is high when the HACFS system aggressively converts blocks to limit the storage overhead by upcoding hot files into compact code. So this can be a issue
46 |
47 | ## Future Work
48 |
49 | 1. The paper can be extended by solving the problem of how to reduce the conversion cost.
50 |
51 |
--------------------------------------------------------------------------------
/storage_paper_note/general_storage/Hash/CompareByHash-ATC'06.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | Compare-by-Hash: A Reasoned Analysis
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | ATC'06 | Hash |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | This paper investigates the digest of a cryptographic hash function is equal on two distinct files.
14 | > instead of comparing them byte-by-byte.
15 | > can quickly check the files for equality by once again comparing only a few bytes rather than reading through them byte-by-byte.
16 |
17 | In rsync and LBFS, the goal of the designers was not to provide **security** via the use of cryptographic hash functions.
18 |
19 | This paper intends to against the work of Henson in HotOS'03, and suggests that it is certainly fine to use a 160-bit hash function like SHA1 with compare-by-hash.
20 |
21 |
22 | ### Method Name
23 | - The basic of hash functions
24 | 1. collision-resistant
25 | 2. inversion-resistant
26 | 3. second-preimage-resistant
27 |
28 | In the context of compare-by-hash, collision resistant is the main concern.
29 | > if it is given a list of $b$-bit independent random strings, it is expected to see the collision after about $2^{\frac{b}{2}}$. (**birthday bound**)
30 | > For example, for MD5, there should begin showing collisions after $2^{64}$ hash values.
31 |
32 | - The central theme in Henson's paper
33 | Her opposition to the notion that digests can be treated as unique ids for blocks of data.
34 |
35 | - Key property
36 | > Most file-system data are in fact **not uniform** over any domain.
37 | > SHA-1 does a very good job at mapping corelated inputs to uncorrelated outputs. (**differential cryptanalysis**).
38 |
39 |
40 | - The probability of collision
41 |
42 | - Attack model
43 | 1. Bad luck attacker:
44 | The chance that two files will have the same hash is about $2^{-160}$ for a 160-bit hash function like SHA-1.
45 |
46 | 2. An intelligent attacker
47 | try to cause collision, may substitute the blocks with same hash value.
48 |
49 | Compare-by-hash holds up well in both attack models.
50 | > In typical compare-by-hash setting there is no adversary
51 |
52 | ### Implementation and Evaluation
53 |
54 | ## 2. Strength (Contributions of the paper)
55 |
56 | ## 3. Weakness (Limitations of the paper)
57 |
58 | ## 4. Future Works
59 | 1. Two practical applications of compare-by-hash
60 | > rsync, Low-Bandwidth File System (LBFS)
61 |
62 | 2. The security of SHA-1
63 | > this paper estimates it would cost 80,000,000 USD and 2 years to find a collision in SHA-1
64 |
65 | 3. Cryptographic hash function in digitial signature
66 | > a document being digitally signed is first hashed with a cryptographic hash function, and the signature is applied to the hash value
67 | > applying a computationlly-expensive digital signature to a large file would be prohibitive.
68 |
--------------------------------------------------------------------------------
/storage_paper_note/general_storage/PM/SLMDB-FAST'19.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | SLM-DB: Single Level Merge Key-Value Store with Persistent Memory
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | FAST'19 | PM |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | - LSM-Tree
15 | - Optimized for heavy write application usage
16 | - Designed for slow hard drives
17 | - LSM-Tree limitations
18 | - Large overhead to locate needed data
19 | - scan multiple levels
20 | - High disk write amplification
21 |
22 | ### SLD-DB
23 |
24 | - Persistent Memory + Disk
25 | - B+tree in PM to manage data stored in the disk
26 | - single disk component C1 that does self-merging
27 | - Architecture
28 | - 
29 | - Persistent MemTable
30 | - No write-ahead-logging (WAL)
31 | - Stronger consistency compared to LevelDB
32 | - Key-index insertion into B+-tree happens during immutable Memtable flush to disk
33 | - Persistent B+-tree Index (FAST-FAIR B+-tree)
34 | - Per-key index for fast search
35 | - No multi-leveled merge structure
36 | - Selective compaction
37 | - why compaction?
38 | - need GC for obsolete KV-pairs
39 | - need to improve **sequentiality** for **RangQuery**
40 | - Selectively pick SSTable files
41 | - Make those files as compaction candidates
42 | - Merge together most overlapping compaction candidates
43 | - Selection schemes for compaction candidates:
44 | - Live-key ratio selection of an SSTable
45 | - Leaf node scans in the B+-tree
46 | - Degree of sequentiality per range query
47 | - Compaction triggered when there are too many compaction candidate files
48 |
49 | ### Implementation and Evaluation
50 |
51 | - Evaluation
52 | - PM simulator: PM write latency 500ns (5x of DRAM write latency)
53 | - PM read latency & bandwidth same same as DRAM’s
54 | - Intel’s PMDK used to control PM pool
55 | - db_bench and YCSB
56 | - microbenchmark
57 | - PM sensitivity
58 | - PM write latency sensitivity
59 | - PM bandwidth sensitivity
60 |
61 | ## 2. Strength (Contributions of the paper)
62 |
63 | - A new design of KV-stores with persistent memory
64 | - High write/read performance compared to LevelDB
65 | - Low write amplification and near-optimal read amplification
66 |
67 | ## 3. Weakness (Limitations of the paper)
68 |
69 | ## 4. Some Insights (Future work)
70 |
71 | - Level-DB
72 | - Memory:
73 | - MemTable, Immutable MemTable
74 | - In-memory skiplist to buffer updates, mark immutable when becoming full
75 | - flush to disk
76 | - update the **write-ahead-log** (**no fsync**)
77 | - sequential write to the disk
78 | - Disk:
79 | - MANIFEST: store file organization and metadata
80 | - Sorted string tables (SST): merge from Level N to N+1
81 | - LSM-tree optimizations
82 | - Improve parallelism: RocksDB, HyperLevelDB
83 | - Reduce write amplification: PebblesDB
84 | - Optimize for hardware (SSD): VT-tree, WiscKey
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1522721106458.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1522721106458.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1522938283913.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1522938283913.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1523241524030.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1523241524030.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1523329925719.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1523329925719.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1526027787768.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1526027787768.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1526305327024.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1526305327024.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1526389148656.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1526389148656.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1531322452717.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1531322452717.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1531501985565.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1531501985565.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533545264630.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533545264630.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533558772424.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533558772424.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533559666806.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533559666806.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533632589963.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533632589963.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533635551383.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533635551383.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533713900014.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533713900014.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533716802051.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533716802051.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533785674947.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533785674947.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533801963837.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533801963837.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533803970846.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533803970846.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533832651101.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533832651101.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533909218190.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533909218190.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533978994514.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533978994514.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533991845908.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533991845908.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1533992512318.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1533992512318.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534147681755.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534147681755.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534231184704.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534231184704.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534231209288.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534231209288.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534322692743.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534322692743.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534324237488.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534324237488.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534491739567.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534491739567.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534491996294.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534491996294.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534492052150.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534492052150.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534492144193.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534492144193.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534493095149.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534493095149.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534493102024.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534493102024.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534514760021.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534514760021.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534820931384.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534820931384.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534843008014.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534843008014.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534859524747.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534859524747.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534927153524.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534927153524.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1534941877505.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1534941877505.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535025690952.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535025690952.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535080941866.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535080941866.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535118132918.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535118132918.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535424966773.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535424966773.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535509143693.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535509143693.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535529964676.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535529964676.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535530049894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535530049894.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535630992315.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535630992315.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1535718654925.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1535718654925.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536304812187.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536304812187.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536304821166.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536304821166.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536311837927.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536311837927.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536314355540.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536314355540.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536411514566.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536411514566.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1536422986790.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1536422986790.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537101426419.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537101426419.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537113167500.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537113167500.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537156395887.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537156395887.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537170968620.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537170968620.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537502009449.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537502009449.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537519750596.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537519750596.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537523583894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537523583894.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537620570242.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537620570242.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537856398909.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537856398909.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1537856407481.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1537856407481.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1538214740187.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1538214740187.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1538237284824.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1538237284824.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1538364574274.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1538364574274.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1539263939506.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1539263939506.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1539311866259.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1539311866259.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1546917876953.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1546917876953.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1546918149839.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1546918149839.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1546932031713.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1546932031713.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1546937172649.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1546937172649.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1546937279046.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1546937279046.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547042229954.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547042229954.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547437042911.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547437042911.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547437239206.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547437239206.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547449080194.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547449080194.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547719418272.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547719418272.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1547724806425.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1547724806425.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1548039339341.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1548039339341.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1550132357894.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1550132357894.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1550132390502.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1550132390502.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1550133510605.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1550133510605.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1550145505105.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1550145505105.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1550738798721.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1550738798721.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1551686443341.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1551686443341.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1551708715146.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1551708715146.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1551708732566.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1551708732566.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552535525593.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552535525593.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552545363095.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552545363095.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552878709205.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552878709205.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552893983832.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552893983832.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552911506553.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552911506553.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1552912503121.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1552912503121.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553325398564.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553325398564.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553325419379.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553325419379.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553335463524.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553335463524.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553335487753.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553335487753.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553497729383.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553497729383.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1553516953870.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1553516953870.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1554376060947.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1554376060947.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1554865684235.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1554865684235.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1555763466457.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1555763466457.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1555765487674.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1555765487674.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1555769164180.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1555769164180.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1555770525391.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1555770525391.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1556250344815.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1556250344815.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1556250623415.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1556250623415.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1556280764754.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1556280764754.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1557370885604.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1557370885604.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1557642537365.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1557642537365.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1557673345371.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1557673345371.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1557997523898.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1557997523898.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1557997548672.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1557997548672.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558079145575.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558079145575.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558494722437.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558494722437.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558513853943.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558513853943.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558519202625.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558519202625.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558614526597.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558614526597.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558614554155.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558614554155.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558623033915.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558623033915.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558962484711.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558962484711.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1558962790911.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1558962790911.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1559037152377.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1559037152377.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1560441378608.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1560441378608.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1562405070274.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1562405070274.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1564405750463.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1564405750463.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/1564457932100.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/1564457932100.png
--------------------------------------------------------------------------------
/storage_paper_note/paper_figure/image-20201029020046029.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/yzr95924/storage_paper_list/ac73b26bbf75167ef4e250c4cd5848a3bd36f4d2/storage_paper_note/paper_figure/image-20201029020046029.png
--------------------------------------------------------------------------------
/storage_paper_note/security/CompareByHash-ATC'06.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | Compare-by-Hash: A Reasoned Analysis
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | ATC'06 | Hash |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | This paper investigates the digest of a cryptographic hash function is equal on two distinct files.
14 | > instead of comparing them byte-by-byte.
15 | > can quickly check the files for equality by once again comparing only a few bytes rather than reading through them byte-by-byte.
16 |
17 | In rsync and LBFS, the goal of the designers was not to provide **security** via the use of cryptographic hash functions.
18 |
19 | This paper intends to against the work of Henson in HotOS'03, and suggests that it is certainly fine to use a 160-bit hash function like SHA1 with compare-by-hash.
20 |
21 |
22 | ### Method Name
23 | - The basic of hash functions
24 | 1. collision-resistant
25 | 2. inversion-resistant
26 | 3. second-preimage-resistant
27 |
28 | In the context of compare-by-hash, collision resistant is the main concern.
29 | > if it is given a list of $b$-bit independent random strings, it is expected to see the collision after about $2^{\frac{b}{2}}$. (**birthday bound**)
30 | > For example, for MD5, there should begin showing collisions after $2^{64}$ hash values.
31 |
32 | - The central theme in Henson's paper
33 | Her opposition to the notion that digests can be treated as unique ids for blocks of data.
34 |
35 | - Key property
36 | > Most file-system data are in fact **not uniform** over any domain.
37 | > SHA-1 does a very good job at mapping corelated inputs to uncorrelated outputs. (**differential cryptanalysis**).
38 |
39 |
40 | - The probability of collision
41 |
42 | - Attack model
43 | 1. Bad luck attacker:
44 | The chance that two files will have the same hash is about $2^{-160}$ for a 160-bit hash function like SHA-1.
45 |
46 | 2. An intelligent attacker
47 | try to cause collision, may substitute the blocks with same hash value.
48 |
49 | Compare-by-hash holds up well in both attack models.
50 | > In typical compare-by-hash setting there is no adversary
51 |
52 | ### Implementation and Evaluation
53 |
54 | ## 2. Strength (Contributions of the paper)
55 |
56 | ## 3. Weakness (Limitations of the paper)
57 |
58 | ## 4. Future Works
59 | 1. Two practical applications of compare-by-hash
60 | > rsync, Low-Bandwidth File System (LBFS)
61 |
62 | 2. The security of SHA-1
63 | > this paper estimates it would cost 80,000,000 USD and 2 years to find a collision in SHA-1
64 |
65 | 3. Cryptographic hash function in digitial signature
66 | > a document being digitally signed is first hashed with a cryptographic hash function, and the signature is applied to the hash value
67 | > applying a computationlly-expensive digital signature to a large file would be prohibitive.
68 |
--------------------------------------------------------------------------------
/storage_paper_note/security/FrequencyHiding-CCS'15.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Frequency-Hiding Order-Preserving Encryption
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----: | :--------------------------------------------------: |
8 | | CCS'15 | Frequency Encryption, Property Preserving Encryption |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | This paper wants to do a new trade-off. It can clearly increase security while preserving the functionality for most queries relying on the order information.
14 |
15 | It needs to increase **client storage size** and introduce **a small error in some queries**.
16 |
17 | - Application of order-preserving encryption
18 | > Order-preserving encryption enables to perform range queries over an encrypted database without any changes to the database management system.
19 |
20 | **Security notion**: indistinguishability under *frequency-analyzing*
21 |
22 | ### Frequency-Hiding Order-preseving Encryption
23 | 1. Main idea: present an order-preserving encryption scheme that is randomized.
24 | > Repeated plaintexts will (or can) become different ciphertexts.
25 |
26 | 2. It also employs a number of data compression techniques to reduce the amount of information stored on the client.
27 | > make this scheme somewhat practical while still improving the security of ciphertexts.
28 |
29 |
30 |
31 | ### Implementation and Evaluation
32 |
33 | ## 2. Strength (Contributions of the paper)
34 |
35 | ## 3. Weakness (Limitations of the paper)
36 |
37 | ## 4. Future Works
38 | 1. This paper mentions that if the ciphertexts can approximate a uniform distribution, it would improve against frequency-analyzing attacks.
39 |
40 | 2. Some related notions in this area
41 | > Searchable encryption, homomorphic encryption, functional encryption
--------------------------------------------------------------------------------
/storage_paper_note/security/OverheadConfidentiality-UCC'19.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | UCC'19 | Data Encryption |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | Many cloud storage services are fairly blunt regarding the lack of confidentiality they provide.
15 | > a solution to provide confidential cloud storage is to use client-side encryption (CSE).
16 |
17 | - The issue of CSE
18 | CSE complicates file synchronization techniques, such as deduplication and delta encoding, commonly used to reduce the traffic overheads associated with personal cloud storage systems.
19 |
20 | - The goal of this paper
21 | this paper presents empirical experiments and analysis of CSE-related overheads.
22 | > compare and contrast the security and bandwidth saving features implemented by CSE services and non-CSE services.
23 | > compression, delta encoding, and deduplication
24 |
25 | ### Data confidentiality overhead
26 | This paper focuses on pure CSEs.
27 |
28 | - Service
29 | 1. CSEs
30 | Mega, Sync.com, SpiderOak, Tresorit
31 | > Mega: AES-128
32 | > SpiderOak: AES-256-CFB
33 | > Password-Based Key Derivation Function 2 (PBKDF2)
34 |
35 | 2. non-CSEs
36 | Dropbox, iCloud, Google Drive, Microsoft OneDrive
37 | > This was selected base on recommendations in online reviews
38 | > https://www.cloudwards.net/comparison/
39 |
40 | - Baseline methodology
41 | adding files to the cloud services' sync folders and performing targeted system and network measurements during the sync process.
42 |
43 | 1. Network traffic
44 | using Python modules **netifaces** and **pcapy** among others.
45 | 2. CPU memory overhead
46 | using Python modules **psutil**
47 |
48 |
49 | - Bandwidth saving feature
50 | 
51 | 1. Client-side deduplication
52 | Dropbox, iCloud, Mega, SpiderOak, and Sync.com
53 | 2. Other
54 | Google drive, One Drive and Tresorit
55 |
56 | 
57 |
58 | ### Implementation and Evaluation
59 |
60 | - Evaluation
61 | Setting: Macbook Air, high-speed university network through 10Gb/s.
62 |
63 | ## 2. Strength (Contributions of the paper)
64 |
65 | 1. This paper presents a comprehensive analysis of state-of-art cloud storage services
66 |
67 | ## 3. Weakness (Limitations of the paper)
68 |
69 | ## 4. Future Works
70 | 1. how to combine delta encoding with CSEs
71 | the development of optimized delta encoding policies for CSEs, which minimize the bandwidth and storage overhead associated with CSE.
--------------------------------------------------------------------------------
/storage_paper_note/security/QuantifyingInformationLeakage-CCSW'19.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | Quantifying Information Leakage of Deterministic Encryption
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | CCSW'19 | Deterministic Encryption |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | - Deterministic encryption
14 | ensures that the same plaintext encrypted under the same key will produce the same ciphertext.
15 | > enable clients to make queries on sensitive data.
16 | > the security implications of deterministic encryption are not well understood.
17 |
18 |
19 | - Deterministic encryption is controversial
20 | - CryptoDB claims that: deterministic encryption is safe to use for sensitive field if every value in a column appears only once.
21 | - Deterministic encryption for non-unique fields is described as **allowing some leakage**. (there does not currently exist a clear understanding of the leakage)
22 |
23 | This paper provides a leakage analysis of deterministic encryption through the application of the framework of **quantitative information flow**.
24 |
25 | ### Quantitative Information Flow (QIF)
26 | - Key Insight:
27 | there is no one "correct" way to measure leakage without a given operational scenario
28 | > different operational scenarios require different leakage measures.
29 |
30 | - QIF definition
31 | - prior g-vulnerability
32 | - posterior g-vulnerability
33 | 
34 |
35 | it is natural to measure the leakage of the channel by comparing the prior g-vulnerability with the posterior g-vulnerability.
36 |
37 | - Model of deterministic encryption
38 | - Bayes vulnerability
39 | the adversary attempts to guess the entire column. consider different distributions(three kinds of values):
40 | > 1. uniform distribution
41 | > 2. an arbitrarily chosen non-uniform distribution
42 | > 3. a distribution in which two values has the same probability
43 | > 4. a distribution in which two values' probabilities are very close but not the same.
44 |
45 | ### Implementation and Evaluation
46 |
47 | ## 2. Strength (Contributions of the paper)
48 | 1. This paper provides a comprehensive information leakage analysis via considering different distribution and different operational scenarios of the adversary.
49 |
50 | ## 3. Weakness (Limitations of the paper)
51 |
52 | ## 4. Some Insights
53 | 1. This paper mentions the way to mitigate inference attack by inserting fake entries prior to uploading the database to the cloud.
54 | > For encrypted deduplication, can we insert fake chunk to the original workload to mitigate the attack?
55 |
56 | 2. This paper considers different distribution and analyzes the information leakage in different cases.
57 | > In our paper, we do not provide a fine-grain information leakage analysis, we just use KLD as a coarse measurement for information leakage.
--------------------------------------------------------------------------------
/storage_paper_note/security/Secret-Sharing/SSSS-ACMCommunication'79.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | How to Share a Secret
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----------------------: | :----------------------: |
8 | | Communication of the ACM 1979 | Secret Sharing Algorithm |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | Goal: design a convenient secret sharing algorithm $(k, n)$ *threshold scheme*.
14 | ### Shamir Secret Sharing
15 | Based on **polynimial interpolation**, for a $(k, n)$ scheme, and data $D$
16 | 1. pick a random $k - 1$ degree polynomial,
17 | $$
18 | q(x) = a_0 + a_1x + a_2x^2 + a_3x^3 + ...... + a_{k-1}x^{k-1}
19 | $$
20 | 2. Generate $n$ shares
21 | $$
22 | a_0 = D, D_1 = q(1), D_2 = q(2), ......, D_n = q(n)
23 | $$
24 | 3. Given any subset of $k$ of there $D_i$ values, with their identifying indices, it can calculate the coefficients of $q(x)$ by interpolation, and then evaluate $a_0 = q(0) = D$
25 |
26 | The efficiency of polynomial evaluation and interpolation
27 | > $O(nlog^2n)$
28 |
29 | - To make the claim more precise, it can use **modular arithmetic** instead of real arithmetic.
30 |
31 | - If $D$ is long, it is advisable to break it into shorter blocks of bits (can be handled separately.)
32 |
33 | ## 2. Strength (Contributions of the paper)
34 | 1. When $k$ is kept fixed, $D_i$ pieces can be dynamically added or deleted *without affecting the other $D_i$ pieces*.
35 |
36 | 2. It is easy to change the $D_i$ pieces without changing the original data $D$.
37 |
38 | ## 3. Weakness (Limitations of the paper)
39 | 1. The storage overhead (Storage space blow up) is very large.
40 |
41 | ## 4. Future Works
42 |
--------------------------------------------------------------------------------
/storage_paper_note/security/Secret-Sharing/SecretSharing-Summary.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Secret Sharing Algorithm Summary
5 | ------------------------------------------
6 |
7 | [TOC]
8 |
9 | ## Summary
10 | - Comparison of Secret Sharing Algorithms
11 |
12 | | Algorithm | Confidentiality Degree | Storage Blowup |
13 | | --------- | ---------------------- | -------------- |
14 | | SSSS | $r=k-1$ | $n$ |
15 | | IDA | $r=0$ | $\frac{n}{k}$ |
16 | | RSSS | $r \in [0, k-1]$ | $\frac{n}{k-r}$ |
17 | | SSMS | $r = k -1$ | $\frac{n}{k} + n \times \frac{S_{key}}{S_{sec}}$ |
18 | | AONT-RS | $r = k -1$ | $\frac{n}{k} + n \times \frac{S_{key}}{S_{sec}}$ |
19 |
20 | Formally, a secret sharing algorithm is based on three parameters $(n, k, r)$ where $n > k > r \geq 0$,
21 | > $n, k$ define the fault tolerance degree of a secret.
22 | > $r$ defines the confidentiality degree of a secret.
23 |
24 | Storage blowup: the ratio of of the total size of $n$ shares to the size of the original size of the original secret.
25 |
26 | > the storage blowup must be at least $\frac{n}{k}$.'
27 |
28 | ## How to Share a Secret (SSSS)
29 |
30 |
31 |
32 |
33 |
34 |
35 |
--------------------------------------------------------------------------------
/storage_paper_note/security/SecretSharing/SSSS-ACMCommunication'79.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | How to Share a Secret
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :----------------------: | :----------------------: |
8 | | Communication of the ACM 1979 | Secret Sharing Algorithm |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | Goal: design a convenient secret sharing algorithm $(k, n)$ *threshold scheme*.
14 | ### Shamir Secret Sharing
15 | Based on **polynimial interpolation**, for a $(k, n)$ scheme, and data $D$
16 | 1. pick a random $k - 1$ degree polynomial,
17 | $$
18 | q(x) = a_0 + a_1x + a_2x^2 + a_3x^3 + ...... + a_{k-1}x^{k-1}
19 | $$
20 | 2. Generate $n$ shares
21 | $$
22 | a_0 = D, D_1 = q(1), D_2 = q(2), ......, D_n = q(n)
23 | $$
24 | 3. Given any subset of $k$ of there $D_i$ values, with their identifying indices, it can calculate the coefficients of $q(x)$ by interpolation, and then evaluate $a_0 = q(0) = D$
25 |
26 | The efficiency of polynomial evaluation and interpolation
27 | > $O(nlog^2n)$
28 |
29 | - To make the claim more precise, it can use **modular arithmetic** instead of real arithmetic.
30 |
31 | - If $D$ is long, it is advisable to break it into shorter blocks of bits (can be handled separately.)
32 |
33 | ## 2. Strength (Contributions of the paper)
34 | 1. When $k$ is kept fixed, $D_i$ pieces can be dynamically added or deleted *without affecting the other $D_i$ pieces*.
35 |
36 | 2. It is easy to change the $D_i$ pieces without changing the original data $D$.
37 |
38 | ## 3. Weakness (Limitations of the paper)
39 | 1. The storage overhead (Storage space blow up) is very large.
40 |
41 | ## 4. Future Works
42 |
--------------------------------------------------------------------------------
/storage_paper_note/security/SecretSharing/SecretSharing-Summary.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | Secret Sharing Algorithm Summary
5 | ------------------------------------------
6 |
7 | [TOC]
8 |
9 | ## Summary
10 | - Comparison of Secret Sharing Algorithms
11 |
12 | | Algorithm | Confidentiality Degree | Storage Blowup |
13 | | --------- | ---------------------- | -------------- |
14 | | SSSS | $r=k-1$ | $n$ |
15 | | IDA | $r=0$ | $\frac{n}{k}$ |
16 | | RSSS | $r \in [0, k-1]$ | $\frac{n}{k-r}$ |
17 | | SSMS | $r = k -1$ | $\frac{n}{k} + n \times \frac{S_{key}}{S_{sec}}$ |
18 | | AONT-RS | $r = k -1$ | $\frac{n}{k} + n \times \frac{S_{key}}{S_{sec}}$ |
19 |
20 | Formally, a secret sharing algorithm is based on three parameters $(n, k, r)$ where $n > k > r \geq 0$,
21 | > $n, k$ define the fault tolerance degree of a secret.
22 | > $r$ defines the confidentiality degree of a secret.
23 |
24 | Storage blowup: the ratio of of the total size of $n$ shares to the size of the original size of the original secret.
25 |
26 | > the storage blowup must be at least $\frac{n}{k}$.'
27 |
28 | ## How to Share a Secret (SSSS)
29 |
30 |
31 |
32 |
33 |
34 |
35 |
--------------------------------------------------------------------------------
/storage_paper_note/sketch/Count-MinSketch.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | An improved data stream summary: the count-min sketch and its applications
5 | ------------------------------------------
6 | | Venue | Category |
7 | | :------------------------: | :------: |
8 | | Journal of Algorithms 2003 | sketch |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 | In data stream scenario, algorithm for computing data stream context needs to satisfy the following requirement:
14 | 1. the space used by the algorithm should be small, at most polylogarithmic in $n$.
15 | 2. processing an update should be fast and simple, with a usable accuracy guarantees.
16 |
17 | This paper proposes a new sketch construction with
18 | >1. space used is proportional to $\frac{1}{\varepsilon}$
19 | >2. the update time is sublinear in the size of the sketch
20 | >3. improve the space bounds of previous results from $\frac{1}{{\varepsilon}^2}$ to $\frac{1}{\varepsilon}$
21 | >4. improve the time bounds from $\frac{1}{{\varepsilon}^2}$ to 1.
22 |
23 | ### Count-Min Sketch
24 | Two parameters:
25 | > $\varepsilon$ and $\delta$: the error in answering a query is within a factor of $\varepsilon$ with probability $1 - \delta$
26 |
27 | The space and update time will consequently depend on $\varepsilon$ and $\delta$.
28 |
29 | It is named after the two basic operations used to answer point queries, counting first and computing the minimum next.
30 |
31 | - Three types:
32 | >1. a point query
33 | >2. a range query
34 | >3. an inner product query
35 |
36 | - Data structure
37 | Two-dimensional array counts with width $w$ and depth $d$, set $w = \frac{e}{\varepsilon}$, and $d = ln(\frac{1}{\delta})$
38 | $d$ hash functions:
39 | $$
40 | h_1,..., h_d \space (\{1,...,n\} \rightarrow \{1,...,w\})
41 | $$
42 |
43 | - Update procedure
44 | An update $(i_t, c_t)$ arrives, i.e., item $a_{i_t}$ is updated by a quantity of $c_t$
45 | > 1. $c_t$ is added to one count in each row, and the counter is determined by hash function $h_j$.
46 | > 2. the array of $w \times d$ counts
47 | $$
48 | count[j, h_j(i_t)] \leftarrow count[j, h_j(i_t)] + c_t, \forall 1 \leq j \leq d
49 | $$
50 | 
51 |
52 | - The analysis of point query
53 |
54 |
55 |
56 | ### Implementation and Evaluation
57 |
58 | ## 2. Strength (Contributions of the paper)
59 |
60 | ## 3. Weakness (Limitations of the paper)
61 |
62 | ## 4. Future Works
63 |
--------------------------------------------------------------------------------
/storage_paper_note/survey/Deduplcation-Survey'18.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: paper_figure
3 | ---
4 | A Comprehensive Study of the Past, Present, and Future of Data Deduplication
5 | ------------------------------------------
6 | @Survey
7 | [TOC]
8 |
9 | ## 1. Summary
10 | ### Motivation of this paper:
11 |
12 |
13 |
14 | ### Name of the Work
15 |
16 |
17 |
18 | ### Implementation and Evaluation
19 |
20 | ## 2. Strength (Contributions of the paper)
21 |
22 | ## 3. Weakness (Limitations of the paper)
23 |
24 | ## 4. Future Works
25 |
--------------------------------------------------------------------------------
/storage_paper_note/template.md:
--------------------------------------------------------------------------------
1 | ---
2 | typora-copy-images-to: ../paper_figure
3 | ---
4 | # Physical vs. Logical Indexing with IDEA: Inverted Deduplication-Aware Index
5 |
6 | | Venue | Category |
7 | | :------------------------: | :------------------: |
8 | | FAST'24 | Deduplicated System Design, post-deduplication application |
9 | [TOC]
10 |
11 | ## 1. Summary
12 | ### Motivation of this paper
13 |
14 | ### Method Name
15 |
16 | ### Implementation and Evaluation
17 |
18 | ## 2. Strength (Contributions of the paper)
19 |
20 | ## 3. Weakness (Limitations of the paper)
21 |
22 | ## 4. Some Insights (Future work)
23 |
--------------------------------------------------------------------------------