{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T19:56:21Z","timestamp":1773258981838,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["DAAD19-02-1-0389"],"award-info":[{"award-number":["DAAD19-02-1-0389"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0964474"],"award-info":[{"award-number":["CCF-0964474"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043558","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":225,"title":["SILT"],"prefix":"10.1145","author":[{"given":"Hyeontaek","family":"Lim","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Bin","family":"Fan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"David G.","family":"Andersen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Michael","family":"Kaminsky","sequence":"additional","affiliation":[{"name":"Intel Labs"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855711.1855740"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629577"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(93)90068-K"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. 6th USENIX NSDI","author":"Badam A.","year":"2009","unstructured":"A. Badam , K. Park , V. S. Pai , and L. L. Peterson . HashCache: Cache storage for the next billion . In Proc. 6th USENIX NSDI , Apr. 2009 . A. Badam, K. Park, V. S. Pai, and L. L. Peterson. HashCache: Cache storage for the next billion. In Proc. 6th USENIX NSDI, Apr. 2009."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755916"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.oracle.com\/technetwork\/database\/berkeleydb\/","author":"Berkeley","year":"2011","unstructured":"Berkeley DB. http:\/\/www.oracle.com\/technetwork\/database\/berkeleydb\/ , 2011 . Berkeley DB. http:\/\/www.oracle.com\/technetwork\/database\/berkeleydb\/, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. 9th USENIX OSDI","author":"Beaver D.","year":"2010","unstructured":"D. Beaver , S. Kumar , H. C. Li , J. Sobel , and P. Vajgel . Finding a needle in Haystack: Facebook's photo storage . In Proc. 9th USENIX OSDI , Oct. 2010 . D. Beaver, S. Kumar, H. C. Li, J. Sobel, and P. Vajgel. Finding a needle in Haystack: Facebook's photo storage. In Proc. 9th USENIX OSDI, Oct. 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972894.13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496770.1496856"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04128-0_61"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. 6th Workshop on Algorithm Engineering and Experiments, ALENEX '04","author":"Blandford D. K.","year":"2004","unstructured":"D. K. Blandford , G. E. Blelloch , and I. A. Kash . An experimental analysis of a compact graph representation . In Proc. 6th Workshop on Algorithm Engineering and Experiments, ALENEX '04 , 2004 . D. K. Blandford, G. E. Blelloch, and I. A. Kash. An experimental analysis of a compact graph representation. In Proc. 6th Workshop on Algorithm Engineering and Experiments, ALENEX '04, 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.12.003"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. 7th USENIX OSDI","author":"Chang F.","year":"2006","unstructured":"F. Chang , J. Dean , S. Ghemawat , W. C. Hsieh , D. A. Wallach , M. Burrows , T. Chandra , A. Fikes , and R. E. Gruber . Bigtable: A distributed storage system for structured data . In Proc. 7th USENIX OSDI , Nov. 2006 . F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. In Proc. 7th USENIX OSDI, Nov. 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244248"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502054"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921015"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989327"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/582353.582375"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055349"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. 7th Workshop on Distributed Data and Structures (WDAS'06)","author":"Manasse M.","year":"2006","unstructured":"\u00da. Erlingsson, M. Manasse , and F. Mcsherry . A cool and practical alternative to traditional hash tables . In Proc. 7th Workshop on Distributed Data and Structures (WDAS'06) , 2006 . \u00da. Erlingsson, M. Manasse, and F. Mcsherry. A cool and practical alternative to traditional hash tables. In Proc. 7th Workshop on Distributed Data and Structures (WDAS'06), 2006."},{"key":"e_1_3_2_1_25_1","volume-title":"http:\/\/www.facebook.com\/","year":"2011","unstructured":"Facebook. http:\/\/www.facebook.com\/ , 2011 . Facebook. http:\/\/www.facebook.com\/, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"http:\/\/www.flickr.com\/","year":"2011","unstructured":"Flickr. http:\/\/www.flickr.com\/ , 2011 . Flickr. http:\/\/www.flickr.com\/, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/129617.129623"},{"key":"e_1_3_2_1_28_1","volume-title":"LevelDB. https:\/\/code.google. com\/p\/leveldb\/","author":"Ghemawat S.","year":"2011","unstructured":"S. Ghemawat and J. Dean . LevelDB. https:\/\/code.google. com\/p\/leveldb\/ , 2011 . S. Ghemawat and J. Dean. LevelDB. https:\/\/code.google. com\/p\/leveldb\/, 2011."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629590"},{"key":"e_1_3_2_1_30_1","unstructured":"Memcached: A distributed memory object caching system. http:\/\/www.danga.com\/memcached\/ 2011.  Memcached: A distributed memory object caching system. http:\/\/www.danga.com\/memcached\/ 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453961"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236412"},{"key":"e_1_3_2_1_33_1","unstructured":"C. Nyberg and C. Koester. Ordinal Technology - NSort. http:\/\/www.ordinal.com\/ 2011.  C. Nyberg and C. Koester. Ordinal Technology - NSort. http:\/\/www.ordinal.com\/ 2011."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. Workshop on Integrating Solid-state Memory into the Storage Hierarchy","author":"Polte M.","year":"2009","unstructured":"M. Polte , J. Simsa , and G. Gibson . Enabling enterprise solid state disks performance . In Proc. Workshop on Integrating Solid-state Memory into the Storage Hierarchy , Mar. 2009 . M. Polte, J. Simsa, and G. Gibson. Enabling enterprise solid state disks performance. In Proc. Workshop on Integrating Solid-state Memory into the Storage Hierarchy, Mar. 2009."},{"key":"e_1_3_2_1_36_1","first-page":"89","volume-title":"Proc. USENIX Conference on File and Storage Technologies (FAST)","author":"Quinlan S.","year":"2002","unstructured":"S. Quinlan and S. Dorward . Venti: A new approach to archival storage . In Proc. USENIX Conference on File and Storage Technologies (FAST) , pages 89 -- 101 , Jan. 2002 . S. Quinlan and S. Dorward. Venti: A new approach to archival storage. In Proc. USENIX Conference on File and Storage Technologies (FAST), pages 89--101, Jan. 2002."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_38_1","volume-title":"http:\/\/www.twitter.com\/","year":"2011","unstructured":"Twitter. http:\/\/www.twitter.com\/ , 2011 . Twitter. http:\/\/www.twitter.com\/, 2011."},{"key":"e_1_3_2_1_39_1","series-title":"Lecture Notes in Computer Science","volume-title":"Dynamic storage allocation: A survey and critical review","author":"Wilson P.","year":"1995","unstructured":"P. Wilson , M. Johnstone , M. Neely , and D. Boles . Dynamic storage allocation: A survey and critical review . Lecture Notes in Computer Science , 1995 . P. Wilson, M. Johnstone, M. Neely, and D. Boles. Dynamic storage allocation: A survey and critical review. Lecture Notes in Computer Science, 1995."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. 4th USENIX Conference on File and Storage Technologies","author":"Zeinalipour-Yazti D.","year":"2005","unstructured":"D. Zeinalipour-Yazti , S. Lin , V. Kalogeraki , D. Gunopulos , and W. A. Najjar . MicroHash: An efficient index structure for flash-based sensor devices . In Proc. 4th USENIX Conference on File and Storage Technologies , Dec. 2005 . D. Zeinalipour-Yazti, S. Lin, V. Kalogeraki, D. Gunopulos, and W. A. Najjar. MicroHash: An efficient index structure for flash-based sensor devices. In Proc. 4th USENIX Conference on File and Storage Technologies, Dec. 2005."}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043558"}},"subtitle":["a memory-efficient, high-performance key-value store"],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":39,"alternative-id":["10.1145\/2043556.2043558","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043558","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}