{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T07:10:27Z","timestamp":1737443427229,"version":"3.33.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:00:00Z","timestamp":1728172800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,6]]},"DOI":"10.1109\/smc54092.2024.10831430","type":"proceedings-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:39:20Z","timestamp":1737398360000},"page":"4778-4783","source":"Crossref","is-referenced-by-count":0,"title":["On the Modification of Ring Consistent Hash Uniformity: A Case Study"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Waqas","sequence":"first","affiliation":[{"name":"School of Cyber Security, University of Science and Technology of China,Anhui Province Key Laboratory of Digital Security,Hefei,Anhui,China"}]},{"given":"Sian-Jheng","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Science and Technology of China,Anhui Province Key Laboratory of Digital Security,Hefei,Anhui,China"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Science and Technology of China,Anhui Province Key Laboratory of Digital Security,Hefei,Anhui,China"}]},{"given":"Adnan","family":"Fazi","sequence":"additional","affiliation":[{"name":"Air University University,Department of Avionics Engineering,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2969"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767261"},{"article-title":"OpenS tack","volume-title":"OpenStack Swift Object Storage Service","author":"Technology","key":"ref4"},{"article-title":"Gluster","volume-title":"GlusterFS Algorithms: Distribution","author":"Gluster","key":"ref5"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/11530657_2","volume-title":"Peer-to-peer systems and applications","volume":"3485","author":"Steinmetz","year":"2005"},{"key":"ref7","first-page":"205","article-title":"Dy-namo: Amazon\u2019s highly available key-value store","author":"Giuseppe","year":"2007","journal-title":"ACM SIGOPS operating systems review"},{"key":"ref8","first-page":"35","article-title":"Cassandra: a decentralized structured storage system","author":"Avinash","journal-title":"ACM SIGOPS operating systems review, 2010"},{"key":"ref9","article-title":"Benchmarking Failover Characteristics of Large-Scale Data Storage Applications: Cassandra and Voldemort","author":"Alexander","year":"2013","journal-title":"Alexanderpokluda. Ca"},{"article-title":"Riak","volume-title":"Riak: Enterprise NoSQL Database","author":"Riak","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref12","first-page":"02","article-title":"Consistently faster: A survey and fair comparison of consistent hashing algorithms","author":"Massimo","year":"2023","journal-title":"In Proceedings of SEBD"},{"key":"ref13","first-page":"517","article-title":"Anchorhash: A scalable consistent hash","author":"Gal","year":"2020","journal-title":"IEEEIACM Transactions on networking"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(99)00055-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2367589.2367594"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3631708"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SUMMA57301.2022.9974024"},{"key":"ref19","first-page":"857","article-title":"AreaHash: A Balanced and fully scalable consistency hashing algorithm","author":"Yan","year":"2022","journal-title":"In 2022 IEEE 24th Int Conf on High Performance Computing and Communications(HPCCIDSSISmartCityIDependSys)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893881"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IMCEC.2018.8469341"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2009.96"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.34"},{"key":"ref24","first-page":"139","article-title":"Distribution of data items among peers with equal-sized intervals","volume-title":"Peer to Peer Systems and Applications","author":"Ralf","year":"2006"}],"event":{"name":"2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2024,10,6]]},"location":"Kuching, Malaysia","end":{"date-parts":[[2024,10,10]]}},"container-title":["2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10830919\/10830920\/10831430.pdf?arnumber=10831430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:39:47Z","timestamp":1737441587000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10831430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/smc54092.2024.10831430","relation":{},"subject":[],"published":{"date-parts":[[2024,10,6]]}}}