{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:08:48Z","timestamp":1775912928853,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swiss National Science Foundation","award":["166132"],"award-info":[{"award-number":["166132"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1139158"],"award-info":[{"award-number":["CCF-1139158"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["HSHQDC-16-3-00083"],"award-info":[{"award-number":["HSHQDC-16-3-00083"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3132747.3132764","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"121-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":464,"title":["NetCache"],"prefix":"10.1145","author":[{"given":"Xin","family":"Jin","sequence":"first","affiliation":[{"name":"Johns Hopkins University"}]},{"given":"Xiaozhou","family":"Li","sequence":"additional","affiliation":[{"name":"Barefoot Networks"}]},{"given":"Haoyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Robert","family":"Soul\u00e9","sequence":"additional","affiliation":[{"name":"Barefoot Networks and Universit\u00e0 della Svizzera italiana"}]},{"given":"Jeongkeun","family":"Lee","sequence":"additional","affiliation":[{"name":"Barefoot Networks"}]},{"given":"Nate","family":"Foster","sequence":"additional","affiliation":[{"name":"Barefoot Networks and Cornell University"}]},{"given":"Changhoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Barefoot Networks"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629577"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/www.barefootnetworks.com\/technology\/#capilano","author":"Capilano Barefoot","year":"2017","unstructured":"Barefoot. 2017. Barefoot Capilano . ( 2017 ). https:\/\/www.barefootnetworks.com\/technology\/#capilano . Barefoot. 2017. Barefoot Capilano. (2017). https:\/\/www.barefootnetworks.com\/technology\/#capilano."},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/www.barefootnetworks.com\/technology\/#tofino","author":"Tofino Barefoot","year":"2017","unstructured":"Barefoot. 2017. Barefoot Tofino . ( 2017 ). https:\/\/www.barefootnetworks.com\/technology\/#tofino . Barefoot. 2017. Barefoot Tofino. (2017). https:\/\/www.barefootnetworks.com\/technology\/#tofino."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IGCC.2011.6008565"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_7_1","unstructured":"Broadcom. 2017. Broadcom Tomahawk II. (2017). https:\/\/www.broadcom.com\/.  Broadcom. 2017. Broadcom Tomahawk II. (2017). https:\/\/www.broadcom.com\/."},{"key":"e_1_3_2_2_8_1","volume-title":"Network applications of Bloom filters: A survey. Internet mathematics","author":"Broder Andrei","year":"2004","unstructured":"Andrei Broder and Michael Mitzenmacher . 2004. Network applications of Bloom filters: A survey. Internet mathematics ( 2004 ). Andrei Broder and Michael Mitzenmacher. 2004. Network applications of Bloom filters: A survey. Internet mathematics (2004)."},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/www.cavium.com\/","author":"Pliant Cavium","year":"2017","unstructured":"Cavium. 2017. Cavium X Pliant . ( 2017 ). https:\/\/www.cavium.com\/ . Cavium. 2017. Cavium XPliant. (2017). https:\/\/www.cavium.com\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741967"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502054"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"e_1_3_2_2_15_1","unstructured":"Aleksandar Dragojevi\u0107 Dushyanth Narayanan Miguel Castro and Orion Hodson. 2014. FaRM: Fast Remote Memory. In USENIX NSDI.   Aleksandar Dragojevi\u0107 Dushyanth Narayanan Miguel Castro and Orion Hodson. 2014. FaRM: Fast Remote Memory. In USENIX NSDI."},{"key":"e_1_3_2_2_16_1","unstructured":"Bin Fan David G. Andersen and Michael Kaminsky. 2013. MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing. In USENIX NSDI.   Bin Fan David G. Andersen and Michael Kaminsky. 2013. MemC3: Compact and Concurrent MemCache with Dumber Caching and Smarter Hashing. In USENIX NSDI."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038939"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191886"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673882"},{"key":"e_1_3_2_2_20_1","unstructured":"Intel. 2017. Intel Data Plane Development Kit (DPDK). (2017). http:\/\/dpdk.org\/.  Intel. 2017. Intel Data Plane Development Kit (DPDK). (2017). http:\/\/dpdk.org\/."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511485"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626299"},{"key":"e_1_3_2_2_23_1","volume-title":"Andersen","author":"Kalia Anuj","year":"2016","unstructured":"Anuj Kalia , Michael Kaminsky , and David G . Andersen . 2016 . Design Guidelines for High Performance RDMA Systems. In USENIX ATC. Anuj Kalia, Michael Kaminsky, and David G. Andersen. 2016. Design Guidelines for High Performance RDMA Systems. In USENIX ATC."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390021.2390028"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750416"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592820"},{"key":"e_1_3_2_2_28_1","volume":"201","author":"Li Xiaozhou","unstructured":"Xiaozhou Li , Raghav Sethi , Michael Kaminsky , David G. Andersen , and Michael J. Freedman. 201 6. Be Fast, Cheap and in Control with SwitchKV. In USENIX NSDI. Xiaozhou Li, Raghav Sethi, Michael Kaminsky, David G. Andersen, and Michael J. Freedman. 2016. Be Fast, Cheap and in Control with SwitchKV. In USENIX NSDI.","journal-title":"Michael J. Freedman."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043558"},{"key":"e_1_3_2_2_30_1","volume-title":"MICA: A Holistic Approach to Fast In-memory Key-value Storage. In USENIX NSDI.","author":"Lim Hyeontaek","year":"2014","unstructured":"Hyeontaek Lim , Dongsu Han , David G. Andersen , and Michael Kaminsky . 2014 . MICA: A Holistic Approach to Fast In-memory Key-value Storage. In USENIX NSDI. Hyeontaek Lim, Dongsu Han, David G. Andersen, and Michael Kaminsky. 2014. MICA: A Holistic Approach to Fast In-memory Key-value Storage. In USENIX NSDI."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037731"},{"key":"e_1_3_2_2_32_1","unstructured":"Memcached. 2017. Memcached key-value store. (2017). https:\/\/memcached.org\/.  Memcached. 2017. Memcached key-value store. (2017). https:\/\/memcached.org\/."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"e_1_3_2_2_34_1","unstructured":"Rajesh Nishtala Hans Fugal Steven Grimm Marc Kwiatkowski Herman Lee Harry C. Li Ryan McElroy Mike Paleczny Daniel Peek Paul Saab David Stafford Tony Tung and Venkateshwaran Venkataramani. 2013. Scaling Memcache at Facebook. In USENIX NSDI.   Rajesh Nishtala Hans Fugal Steven Grimm Marc Kwiatkowski Herman Lee Harry C. Li Ryan McElroy Mike Paleczny Daniel Peek Paul Saab David Stafford Tony Tung and Venkateshwaran Venkataramani. 2013. Scaling Memcache at Facebook. In USENIX NSDI."},{"key":"e_1_3_2_2_35_1","unstructured":"NoviFlow. 2017. NoviFlow NoviSwitch. (2017). http:\/\/noviflow.com\/products\/noviswitch\/.  NoviFlow. 2017. NoviFlow NoviSwitch. (2017). http:\/\/noviflow.com\/products\/noviswitch\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806887"},{"key":"e_1_3_2_2_37_1","unstructured":"K. V. Rashmi Mosharaf Chowdhury Jack Kosaian Ion Stoica and Kannan Ramchandran. 2016. EC-Cache: Load-Balanced Low-Latency Cluster Caching with Online Erasure Coding. In USENIX OSDI.   K. V. Rashmi Mosharaf Chowdhury Jack Kosaian Ion Stoica and Kannan Ramchandran. 2016. EC-Cache: Load-Balanced Low-Latency Cluster Caching with Online Erasure Coding. In USENIX OSDI."},{"key":"e_1_3_2_2_38_1","unstructured":"Redis. 2017. Redis data structure store. (2017). https:\/\/redis.io\/.  Redis. 2017. Redis data structure store. (2017). https:\/\/redis.io\/."},{"key":"e_1_3_2_2_39_1","unstructured":"Redis. 2017. Using Redis as an LRU cache. (2017). https:\/\/redis.io\/topics\/lru-cache.  Redis. 2017. Using Redis as an LRU cache. (2017). https:\/\/redis.io\/topics\/lru-cache."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735514"},{"key":"e_1_3_2_2_41_1","unstructured":"TommyDS. 2017. TommyDS C library. (2017). http\/\/:www.tommyds.it\/.  TommyDS. 2017. TommyDS C library. (2017). http\/\/:www.tommyds.it\/."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391237"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213957"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","location":"Shanghai China","acronym":"SOSP '17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 26th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132764","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132764","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:57Z","timestamp":1750212657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132764"}},"subtitle":["Balancing Key-Value Stores with Fast In-Network Caching"],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":43,"alternative-id":["10.1145\/3132747.3132764","10.1145\/3132747"],"URL":"https:\/\/doi.org\/10.1145\/3132747.3132764","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}