{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:55:33Z","timestamp":1743022533382,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319220468"},{"type":"electronic","value":"9783319220475"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22047-5_20","type":"book-chapter","created":{"date-parts":[[2015,7,23]],"date-time":"2015-07-23T12:37:05Z","timestamp":1437655025000},"page":"243-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["R-Memcached: A Reliable In-Memory Cache System for Big Key-Value Stores"],"prefix":"10.1007","author":[{"given":"Chengjian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Kai","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Xiaowen","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yiu-Wing","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,24]]},"reference":[{"key":"20_CR1","unstructured":"Fitzpatrick, B.: Distributed caching with memcached. Linux Journal 2004(124) (2004)"},{"key":"20_CR2","unstructured":"Nishtala, R., Fugal, H., Grimm, S., Kwiatkowski, M., Lee, H., Li, H.C., McElroy, R., et al.: Scaling memcache at facebook. In: NSDI, pp. 385\u2013398 (2013)"},{"key":"20_CR3","unstructured":"Morgan, T.P.: Facebook opens up tools to scale memcached. http:\/\/www.enterprisetech.com\/2014\/09\/15\/facebook-opens-tools-scale-memcached\/"},{"key":"20_CR4","unstructured":"Andrew, T., Maarten, V.S.: Distributed systems. Pearson Prentice Hall (2007)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/176979.176981","volume":"26","author":"PM Chen","year":"1994","unstructured":"Chen, P.M., Lee, E.K., Gibson, G.A., Katz, R.H., Patterson, D.A.: Raid: High-performance, reliable secondary storage. CSUR 26, 145\u2013185 (1994)","journal-title":"CSUR"},{"issue":"11","key":"20_CR6","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1016\/S1389-1286(99)00055-9","volume":"31","author":"D Karger","year":"1999","unstructured":"Karger, D., Sherman, A., Berkheimer, A., Bogstad, B., et al.: Web caching with consistent hashing. Computer Networks 31(11), 1203\u20131213 (1999)","journal-title":"Computer Networks"},{"issue":"4","key":"20_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., et al.: A view of cloud computing. Communications of the ACM 53(4), 50\u201358 (2010)","journal-title":"Communications of the ACM"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Thusoo, A., Sarma, J.S., Jain, N., Shao, Z., Chakka, P., Zhang, N., et al.: Hive-a petabyte scale data warehouse using hadoop. In: ICDE (2010)","DOI":"10.1109\/ICDE.2010.5447738"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13818-8_1","volume-title":"Scientific and Statistical Database Management","author":"DJ Abadi","year":"2010","unstructured":"Abadi, D.J.: Tradeoffs between parallel database systems, hadoop, and hadoopdb as platforms for petabyte-scale analysis. In: Gertz, M., Lud\u00e4scher, B. (eds.) SSDBM 2010. LNCS, vol. 6187, pp. 1\u20133. Springer, Heidelberg (2010)"},{"key":"20_CR10","unstructured":"Cheng, H., Huseyin, S., Yikang, X., Aaron, O., Brad, C., Parikshit, G., Jin, L., Sergey, Y.: Erasure coding in windows azure storage. In: USENIX ATC (2012)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Berezecki, M., Frachtenberg, E., Paleczny, M., Steele, K.: Power and performance evaluation of memcached on the tilepro64 architecture. Sustainable Computing: Informatics and Systems (2012)","DOI":"10.1016\/j.suscom.2012.01.006"},{"key":"20_CR12","unstructured":"Meaney, P.J., Lastras-Montao, L.A., Papazova, V.K., Stephens, E., Johnson, J.S., Alves, L.C., et al.: Ibm zenterprise redundant array of independent memory subsystem. IBM Journal of Research and Development (2012)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Atikoglu, B., Xu, Y., Frachtenberg, E., Jiang, S., Paleczny, M.: Workload analysis of a large-scale key-value store. In: ACM SIGMETRICS, pp. 53\u201364 (2012)","DOI":"10.1145\/2318857.2254766"},{"key":"20_CR14","unstructured":"Plank, J.S., Greenan, K.M.: Jerasure: A library in c facilitating erasure coding for storage applications-version 2.0. Technical Report UT-EECS-14-721 (2014)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Chu, X., Liu, C., Ouyang, K., Yung, L.S., Liu, H., Leung, Y.-W.: Perasure: a parallel cauchy reed-solomon coding library for gpus. In: IEEE ICC (2015)","DOI":"10.1109\/ICC.2015.7248360"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Ousterhout, J., Agrawal, P., Erickson, D., Kozyrakis, C., Leverich, J., Mazires, D., et al.: The case for ramclouds: scalable high-performance storage entirely in dram. In: ACM SIGOPS, pp. 92\u2013105 (2010)","DOI":"10.1145\/1713254.1713276"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Lim, H., Fan, B., Andersen, D. G., Kaminsky, M.: Silt: A memory-efficient, high-performance key-value store. In: SOSP, pp. 1\u201313 (2011)","DOI":"10.1145\/2043556.2043558"}],"container-title":["Lecture Notes in Computer Science","Big Data Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22047-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T05:55:23Z","timestamp":1676958923000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22047-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319220468","9783319220475"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22047-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}