{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:58:25Z","timestamp":1740131905345,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61232008","61272158","61328201","61472008","61672053"],"award-info":[{"award-number":["61232008","61272158","61328201","61472008","61672053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"863 Program of China","award":["2015AA015305"],"award-info":[{"award-number":["2015AA015305"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1629376","CNS-1319617","CNS-1527076","CSR-1618384","CSR-1422342"],"award-info":[{"award-number":["CCF-1629376","CNS-1319617","CNS-1527076","CSR-1618384","CSR-1422342"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004316","name":"IBM","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004316","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006296","name":"CAS","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006296","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2017,5,1]]},"DOI":"10.1109\/tc.2016.2618920","type":"journal-article","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T18:18:03Z","timestamp":1476901083000},"page":"862-875","source":"Crossref","is-referenced-by-count":11,"title":["Optimizing Locality-Aware Memory Management of Key-Value Caches"],"prefix":"10.1109","volume":"66","author":[{"given":"Xiameng","family":"Hu","sequence":"first","affiliation":[]},{"given":"Xiaolin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yingwei","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Song","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhenlin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519076"},{"key":"ref38","first-page":"1","article-title":"Analytical cache models with applications to cache partitioning","author":"suh","year":"0","journal-title":"Proc 15th Int'l Conf Supercomputing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1854273.1854286"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/11847366_23","article-title":"Discovery of locality-improving refactorings by reuse path analysis","author":"beyls","year":"2006","journal-title":"High Performance Computing and Communications"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2528521.1508259"},{"key":"ref30","first-page":"339","article-title":"Multiple page size modeling and optimization","author":"torrellas","year":"0","journal-title":"Proc Int Conf Parallel Archit Compilation Tech"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.117"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1016\/j.jpdc.2013.01.010","article-title":"Locality principle revisited: A probability-based quantitative approach","volume":"73","author":"gupta","year":"2013","journal-title":"J Parallel Distrib Comput"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.100"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1375634.1375648"},{"key":"ref10","first-page":"33","article-title":"Adaptive performance-aware distributed memory caching","author":"hwang","year":"0","journal-title":"Proc Int Conf Autonomic Comput"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2005.32"},{"key":"ref11","first-page":"1","article-title":"Load balancing of heterogeneous workloads in Memcached clusters","author":"zhang","year":"0","journal-title":"Proc 9th Int Workshop Feedback Comput (Feedback Comput )"},{"year":"2014","key":"ref12"},{"year":"2014","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883477"},{"key":"ref15","first-page":"385","article-title":"Scaling memcache at Facebook","author":"nishtala et","year":"0","journal-title":"Proc 10th USENIX Conf Networked Syst Des Implementation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.66"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/2318857.2254766","article-title":"Workload analysis of a large-scale key-value store","volume":"40","author":"atikoglu","year":"2012","journal-title":"ACM SIGMETRICS Performance Eval Rev"},{"year":"2014","key":"ref18"},{"key":"ref19","first-page":"749","article-title":"Optimal cache partition-sharing: Don&#x2019;t ever take a fence down until you know why it was put up.-Robert Frost","author":"brock","year":"0","journal-title":"Proc Int Conf Parallel Process"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1147\/sj.92.0078"},{"article-title":"A dynamic caching mechanism for Hadoop using Memcached","year":"0","author":"singh","key":"ref4"},{"year":"2014","key":"ref27"},{"key":"ref3","first-page":"53","article-title":"Mortar: Filling the gaps in data center memory","author":"hwang","year":"0","journal-title":"Proceedings of ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2527081"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1552309.1552310"},{"key":"ref5","article-title":"Predicting Memcached throughput using simulation and modeling","author":"hart","year":"0","journal-title":"Proc Symp Theory Model Simul DEVS Integr M&S Symp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2012.141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485926"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2009.88"},{"key":"ref9","first-page":"371","article-title":"MemC3: Compact and concurrent MemCache with dumber caching and smarter hashing","author":"fan","year":"0","journal-title":"Proc 10th USENIX Conf Networked Syst Des Implementation"},{"key":"ref1","article-title":"Distributed caching with Memcached","volume":"2004","author":"fitzpatrick","year":"2004","journal-title":"Linux J"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451153"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1023\/B:SUPE.0000014800.27383.8f"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-015-0384-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363141"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/107972.107995"},{"year":"2014","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1037949.1024415"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663317"},{"key":"ref44","first-page":"335","article-title":"Characterizing storage workloads with counter stacks","author":"wires","year":"0","journal-title":"Proc 11th USENIX Conf Operating Syst Des Implementation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/12.165388"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.153"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150982"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/12\/7893086\/7593218-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7893086\/07593218.pdf?arnumber=7593218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:56:05Z","timestamp":1649444165000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7593218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,1]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tc.2016.2618920","relation":{},"ISSN":["0018-9340"],"issn-type":[{"type":"print","value":"0018-9340"}],"subject":[],"published":{"date-parts":[[2017,5,1]]}}}