{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:50:58Z","timestamp":1773481858794,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,23]],"date-time":"2017-04-23T00:00:00Z","timestamp":1492905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research & Development Program of China","award":["2016YFB1000504"],"award-info":[{"award-number":["2016YFB1000504"]}]},{"name":"National Basic Research (973) Program of China","award":["2014CB340402"],"award-info":[{"award-number":["2014CB340402"]}]},{"name":"Natural Science Foundation of China","award":["61433008, 61373145, 61572280, 61133004, 61502019, U1435216"],"award-info":[{"award-number":["61433008, 61373145, 61572280, 61133004, 61502019, U1435216"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,23]]},"DOI":"10.1145\/3064176.3064189","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T12:27:04Z","timestamp":1492432024000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["RFP"],"prefix":"10.1145","author":[{"given":"Maomeng","family":"Su","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNLIST), Tsinghua University, Beijing, China and Research Institute of Tsinghua University in Shenzhen, Guangdong, China"}]},{"given":"Mingxing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNLIST), Tsinghua University, Beijing, China and Research Institute of Tsinghua University in Shenzhen, Guangdong, China"}]},{"given":"Kang","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNLIST), Tsinghua University, Beijing, China and Research Institute of Tsinghua University in Shenzhen, Guangdong, China"}]},{"given":"Zhenyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Yongwei","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua National Laboratory for Information Science and Technology (TNLIST), Tsinghua University, Beijing, China and Research Institute of Tsinghua University in Shenzhen, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2017,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2080.357392"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_4_1","first-page":"401","volume-title":"Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Dragojevi\u0107 A.","year":"2014","unstructured":"A. Dragojevi\u0107 , D. Narayanan , O. Hodson , and M. Castro . Farm: Fast remote memory . In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI) , pages 401 -- 414 , 2014 . A. Dragojevi\u0107, D. Narayanan, O. Hodson, and M. Castro. Farm: Fast remote memory. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI), pages 401--414, 2014."},{"key":"e_1_3_2_1_5_1","first-page":"371","volume-title":"Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Fan B.","year":"2013","unstructured":"B. Fan , D. G. Andersen , and M. Kaminsky . MemC3: Compact and concurrent Memcache with dumber caching and smarter hashing . In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI) , pages 371 -- 384 , 2013 . B. Fan, D. G. Andersen, and M. Kaminsky. MemC3: Compact and concurrent Memcache with dumber caching and smarter hashing. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI), pages 371--384, 2013."},{"key":"e_1_3_2_1_6_1","unstructured":"gRPC. https:\/\/github.com\/grpc\/grpc.  gRPC. https:\/\/github.com\/grpc\/grpc."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.74"},{"key":"e_1_3_2_1_8_1","unstructured":"InfiniBand in Data-Centers. http:\/\/www.mellanox.com\/pdf\/whitepapers\/InfiniBand_EDS.pdf.  InfiniBand in Data-Centers. http:\/\/www.mellanox.com\/pdf\/whitepapers\/InfiniBand_EDS.pdf."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.65"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.37"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626299"},{"key":"e_1_3_2_1_12_1","first-page":"185","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kalia A.","year":"2016","unstructured":"A. Kalia , M. Kaminsky , and D. G. Andersen . FaSST: Fast, scalable and simple distributed transactions with two-sided (RDMA) datagram RPCs . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) , pages 185 -- 201 , 2016 . A. Kalia, M. Kaminsky, and D. G. Andersen. FaSST: Fast, scalable and simple distributed transactions with two-sided (RDMA) datagram RPCs. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 185--201, 2016."},{"key":"e_1_3_2_1_13_1","first-page":"437","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC)","author":"Kalia A.","year":"2016","unstructured":"A. Kalia , M. Kaminsky , and D. G. Andersen . Design guidelines for high performance RDMA systems . In Proceedings of the USENIX Annual Technical Conference (ATC) , pages 437 -- 450 , 2016 . A. Kalia, M. Kaminsky, and D. G. Andersen. Design guidelines for high performance RDMA systems. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 437--450, 2016."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815416"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741965"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750416"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592820"},{"key":"e_1_3_2_1_18_1","first-page":"429","volume-title":"Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Lim H.","year":"2014","unstructured":"H. Lim , D. Han , D. G. Andersen , and M. Kaminsky . MICA: A holistic approach to fast in-memory key-value storage . In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI) , pages 429 -- 444 , 2014 . H. Lim, D. Han, D. G. Andersen, and M. Kaminsky. MICA: A holistic approach to fast in-memory key-value storage. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI), pages 429--444, 2014."},{"key":"e_1_3_2_1_19_1","first-page":"16","volume-title":"Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS)","author":"Liu J.","year":"2004","unstructured":"J. Liu , W. Jiang , P. Wyckoff , D. K. Panda , D. Ashton , D. Buntinas , W. Gropp , and B. Toonen . Design and implementation of MPICH2 over InfiniBand with RDMA support . In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS) , pages 16 -- 27 . IEEE, 2004 . J. Liu, W. Jiang, P. Wyckoff, D. K. Panda, D. Ashton, D. Buntinas, W. Gropp, and B. Toonen. Design and implementation of MPICH2 over InfiniBand with RDMA support. In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS), pages 16--27. IEEE, 2004."},{"key":"e_1_3_2_1_20_1","unstructured":"Mellanox. http:\/\/www.mellanox.com\/.  Mellanox. http:\/\/www.mellanox.com\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Memcached. http:\/\/memcached.org\/.  Memcached. http:\/\/memcached.org\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145816.2145874"},{"key":"e_1_3_2_1_23_1","first-page":"103","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC)","author":"Mitchell C.","year":"2013","unstructured":"C. Mitchell , Y. Geng , and J. Li . Using one-sided RDMA reads to build a fast, CPU-efficient key-value store . In Proceedings of the USENIX Annual Technical Conference (ATC) , pages 103 -- 114 , 2013 . C. Mitchell, Y. Geng, and J. Li. Using one-sided RDMA reads to build a fast, CPU-efficient key-value store. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 103--114, 2013."},{"key":"e_1_3_2_1_24_1","first-page":"451","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC)","author":"Mitchell C.","year":"2016","unstructured":"C. Mitchell , K. Montgomery , L. Nelson , S. Sen , and J. Li . Balancing CPU and network in the cell distributed B-Tree store . In Proceedings of the USENIX Annual Technical Conference (ATC) , pages 451 -- 464 , 2016 . C. Mitchell, K. Montgomery, L. Nelson, S. Sen, and J. Li. Balancing CPU and network in the cell distributed B-Tree store. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 451--464, 2016."},{"key":"e_1_3_2_1_25_1","first-page":"479","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Mu S.","year":"2014","unstructured":"S. Mu , Y. Cui , Y. Zhang , W. Lloyd , and J. Li . Extracting more concurrency from distributed transactions . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) , pages 479 -- 494 , 2014 . S. Mu, Y. Cui, Y. Zhang, W. Lloyd, and J. Li. Extracting more concurrency from distributed transactions. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 479--494, 2014."},{"key":"e_1_3_2_1_26_1","first-page":"385","volume-title":"Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Nishtala R.","year":"2013","unstructured":"R. Nishtala , H. Fugal , S. Grimm , M. Kwiatkowski , H. Lee , H. C. Li , R. McElroy , M. Paleczny , D. Peek , P. Saab , Scaling Memcache at Facebook . In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI) , pages 385 -- 398 , 2013 . R. Nishtala, H. Fugal, S. Grimm, M. Kwiatkowski, H. Lee, H. C. Li, R. McElroy, M. Paleczny, D. Peek, P. Saab, et al. Scaling Memcache at Facebook. In Proceedings of the USENIX Conference on Networked Systems Design and Implementation (NSDI), pages 385--398, 2013."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043560"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749267"},{"key":"e_1_3_2_1_29_1","first-page":"347","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC)","author":"Stuedi P.","year":"2012","unstructured":"P. Stuedi , A. Trivedi , and B. Metzler . Wimpy nodes with 10GbE: Leveraging one-sided operations in soft-RDMA to boost Memcached . In Proceedings of the USENIX Annual Technical Conference (ATC) , pages 347 -- 353 , 2012 . P. Stuedi, A. Trivedi, and B. Metzler. Wimpy nodes with 10GbE: Leveraging one-sided operations in soft-RDMA to boost Memcached. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 347--353, 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671002"},{"key":"e_1_3_2_1_31_1","first-page":"291","volume-title":"Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS)","author":"Rahman M.","year":"2015","unstructured":"M. Wasi-ur Rahman , X. Lu , N. S. Islam , R. Rajachandrasekar , and D. K. Panda . High-performance design of YARN MapReduce on modern HPC clusters with Lustre and RDMA . In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS) , pages 291 -- 300 . IEEE, 2015 . M. Wasi-ur Rahman, X. Lu, N. S. Islam, R. Rajachandrasekar, and D. K. Panda. High-performance design of YARN MapReduce on modern HPC clusters with Lustre and RDMA. In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS), pages 291--300. IEEE, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815419"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2003.1240573"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806849"},{"key":"e_1_3_2_1_35_1","first-page":"71","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC)","author":"Wu X.","year":"2015","unstructured":"X. Wu , Y. Xu , Z. Shao , and S. Jiang . LSM-trie: An LSM-tree-based ultra-large key-value store for small data items . In Proceedings of the USENIX Annual Technical Conference (ATC) , pages 71 -- 82 , 2015 . X. Wu, Y. Xu, Z. Shao, and S. Jiang. LSM-trie: An LSM-tree-based ultra-large key-value store for small data items. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 71--82, 2015."}],"event":{"name":"EuroSys '17: Twelfth EuroSys Conference 2017","location":"Belgrade Serbia","acronym":"EuroSys '17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twelfth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064189","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3064176.3064189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:15Z","timestamp":1750217775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3064176.3064189"}},"subtitle":["When RPC is Faster than Server-Bypass with RDMA"],"short-title":[],"issued":{"date-parts":[[2017,4,23]]},"references-count":35,"alternative-id":["10.1145\/3064176.3064189","10.1145\/3064176"],"URL":"https:\/\/doi.org\/10.1145\/3064176.3064189","relation":{},"subject":[],"published":{"date-parts":[[2017,4,23]]},"assertion":[{"value":"2017-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}