{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:20:55Z","timestamp":1762431655449,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Gift donation by Huawei"},{"name":"Gift donation by Google"},{"name":"This work was supported in part by CRISP one of six centers in JUMP a Semiconductor Research Corporation (SRC) program sponsor"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,25]]},"DOI":"10.1145\/3299869.3300075","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T17:41:43Z","timestamp":1560879703000},"page":"36-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Efficiently Searching In-Memory Sorted Arrays"],"prefix":"10.1145","author":[{"given":"Peter","family":"Van Sandt","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Yannis","family":"Chronis","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Jignesh M.","family":"Patel","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195906001951"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989328"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jda.2014.12.007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409360.1409380"},{"key":"e_1_3_2_1_5_1","volume-title":"Linux CPUFreq--CPUFreq governors. Linux Kernel.{Online}: http:\/\/www. mjmwired. net\/kernel\/Documentation\/cpufreq\/governors. txt","author":"Brodowski Dominik","year":"2016","unstructured":"Dominik Brodowski and N Golde . 2016. Linux CPUFreq--CPUFreq governors. Linux Kernel.{Online}: http:\/\/www. mjmwired. net\/kernel\/Documentation\/cpufreq\/governors. txt ( 2016 ). Dominik Brodowski and N Golde. 2016. Linux CPUFreq--CPUFreq governors. Linux Kernel.{Online}: http:\/\/www. mjmwired. net\/kernel\/Documentation\/cpufreq\/governors. txt (2016)."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of IEEE International Conference on Control and Automation .","author":"Carvalho Carlos","year":"2002","unstructured":"Carlos Carvalho . 2002 . The gap between processor and memory speeds . In Proc. of IEEE International Conference on Control and Automation . Carlos Carvalho. 2002. The gap between processor and memory speeds. In Proc. of IEEE International Conference on Control and Automation ."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_8_1","volume-title":"Etats-Unis Math\u00e9maticien, Carl De Boor, and Carl De Boor.","author":"Boor Carl De","year":"1978","unstructured":"Carl De Boor , Carl De Boor , Etats-Unis Math\u00e9maticien, Carl De Boor, and Carl De Boor. 1978 . A practical guide to splines . Vol. 27 . Springer-Verlag New York . Carl De Boor, Carl De Boor, Etats-Unis Math\u00e9maticien, Carl De Boor, and Carl De Boor. 1978. A practical guide to splines . Vol. 27. Springer-Verlag New York."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Paul M. Dorfman. 1999. Array Lookup Tecnhiques. https:\/\/analytics.ncsu.edu\/sesug\/1999\/016.pdf Retrieved 11\/01\/2018 from Paul M. Dorfman. 1999. Array Lookup Tecnhiques. https:\/\/analytics.ncsu.edu\/sesug\/1999\/016.pdf Retrieved 11\/01\/2018 from","DOI":"10.1088\/1126-6708\/1999\/01\/016"},{"key":"e_1_3_2_1_10_1","unstructured":"Christos Faloutsos and HV Jagadish. 1992. On B-tree indices for skewed distributions. (1992). Christos Faloutsos and HV Jagadish. 1992. On B-tree indices for skewed distributions. (1992)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833840"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(77)90028-X"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288534"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140402.1140409"},{"volume-title":"Computer architecture: a quantitative approach","author":"Hennessy John L","key":"e_1_3_2_1_16_1","unstructured":"John L Hennessy and David A Patterson . 2011. Computer architecture: a quantitative approach . Elsevier . John L Hennessy and David A Patterson. 2011. Computer architecture: a quantitative approach .Elsevier."},{"key":"e_1_3_2_1_17_1","unstructured":"Julian Huxley Richard E Strauss and Frederick B Churchill. 1932. Problems of relative growth. (1932). Julian Huxley Richard E Strauss and Frederick B Churchill. 1932. Problems of relative growth. (1932)."},{"volume-title":"IACA: Intel\u00ae Architecture Code Analyzer. https:\/\/software.intel.com\/en-us\/articles\/intel-architecture-code-analyzer Retrieved 11\/01\/2018 from","year":"2017","key":"e_1_3_2_1_18_1","unstructured":"Intel. 2017 . IACA: Intel\u00ae Architecture Code Analyzer. https:\/\/software.intel.com\/en-us\/articles\/intel-architecture-code-analyzer Retrieved 11\/01\/2018 from Intel. 2017. IACA: Intel\u00ae Architecture Code Analyzer. https:\/\/software.intel.com\/en-us\/articles\/intel-architecture-code-analyzer Retrieved 11\/01\/2018 from"},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2018. Inteltextsuperscript\u00ae 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm Retrieved 11\/01\/2018 from Intel. 2018. Inteltextsuperscript\u00ae 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm Retrieved 11\/01\/2018 from"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/8.1.62"},{"volume-title":"Memory-Driven Computing","author":"Keeton Kimberly","key":"e_1_3_2_1_21_1","unstructured":"Kimberly Keeton . 2017. Memory-Driven Computing . USENIX Association , Santa Clara, CA . Kimberly Keeton. 2017. Memory-Driven Computing. USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3053370"},{"volume-title":"The art of computer programming","author":"Knuth Donald Ervin","key":"e_1_3_2_1_23_1","unstructured":"Donald Ervin Knuth . 1997. The art of computer programming . Vol. 3 . Pearson Education . Donald Ervin Knuth. 1997. The art of computer programming . Vol. 3. Pearson Education."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196909"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"LevelDB. 2018. http:\/\/leveldb.org\/ Retrieved 11\/01\/2018 from LevelDB. 2018. http:\/\/leveldb.org\/ Retrieved 11\/01\/2018 from","DOI":"10.1055\/s-0043-120130"},{"key":"e_1_3_2_1_26_1","first-page":"14","article-title":"Zipf's Law everywhere","volume":"5","author":"Li Wentian","year":"2002","unstructured":"Wentian Li . 2002 . Zipf's Law everywhere . Glottometrics , Vol. 5 (2002), 14 -- 21 . Wentian Li. 2002. Zipf's Law everywhere. Glottometrics, Vol. 5 (2002), 14--21.","journal-title":"Glottometrics"},{"key":"e_1_3_2_1_27_1","volume-title":"Invited talk at SC16","author":"McCalpin J.","year":"2016","unstructured":"J. McCalpin . Invited talk at SC16 , 2016 . Memory Bandwidth and System Balance in HPC Systems. https:\/\/tinyurl.com\/yanlv29r Retrieved 11\/01\/2018 from J. McCalpin. Invited talk at SC16, 2016. Memory Bandwidth and System Balance in HPC Systems. https:\/\/tinyurl.com\/yanlv29r Retrieved 11\/01\/2018 from"},{"volume-title":"Studies in Computational Mathematics .","author":"McNamee JM","key":"e_1_3_2_1_28_1","unstructured":"JM McNamee and VY Pan . 2013. Bisection and Interpolation Methods . In Studies in Computational Mathematics . Vol. 16 . Elsevier , 1--138. JM McNamee and VY Pan. 2013. Bisection and Interpolation Methods. In Studies in Computational Mathematics . Vol. 16. Elsevier, 1--138."},{"key":"e_1_3_2_1_29_1","unstructured":"Numpy. 2018. Sorted Search. https:\/\/docs.scipy.org\/doc\/numpy\/reference\/generated\/numpy.searchsorted.html#numpy.searchsorted Retrieved 11\/01\/2018 from Numpy. 2018. Sorted Search. https:\/\/docs.scipy.org\/doc\/numpy\/reference\/generated\/numpy.searchsorted.html#numpy.searchsorted Retrieved 11\/01\/2018 from"},{"key":"e_1_3_2_1_30_1","unstructured":"Pandas. 2018. Sorted Search. https:\/\/pandas.pydata.org\/pandas-docs\/stable\/generated\/pandas.Series.searchsorted.html Retrieved 11\/01\/2018 from Pandas. 2018. Sorted Search. https:\/\/pandas.pydata.org\/pandas-docs\/stable\/generated\/pandas.Series.searchsorted.html Retrieved 11\/01\/2018 from"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359557"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233342"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1603899.1603924"},{"volume-title":"Numerical recipes in Fortran 90","author":"Press William H","key":"e_1_3_2_1_34_1","unstructured":"William H Press , Saul A Teukolsky , William T Vetterling , and Brian P Flannery . 1996. Numerical recipes in Fortran 90 . Vol. 2 . Cambridge university press Cambridge . William H Press, Saul A Teukolsky, William T Vetterling, and Brian P Flannery. 1996. Numerical recipes in Fortran 90 . Vol. 2. Cambridge university press Cambridge."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/356586.356587"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCS.1979.1084682"},{"key":"e_1_3_2_1_37_1","volume-title":"Interpolation-binary search. Information processing letters","author":"Santoro Nicola","year":"1985","unstructured":"Nicola Santoro and Jeffrey B Sidney . 1985. Interpolation-binary search. Information processing letters , Vol. 20 , 4 ( 1985 ), 179--181. Nicola Santoro and Jeffrey B Sidney. 1985. Interpolation-binary search. Information processing letters, Vol. 20, 4 (1985), 179--181."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/216585.216588"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.32"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487663"}],"event":{"name":"SIGMOD\/PODS '19: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Amsterdam Netherlands","acronym":"SIGMOD\/PODS '19"},"container-title":["Proceedings of the 2019 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299869.3300075","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299869.3300075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:16Z","timestamp":1750208536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299869.3300075"}},"subtitle":["Revenge of the Interpolation Search?"],"short-title":[],"issued":{"date-parts":[[2019,6,25]]},"references-count":40,"alternative-id":["10.1145\/3299869.3300075","10.1145\/3299869"],"URL":"https:\/\/doi.org\/10.1145\/3299869.3300075","relation":{},"subject":[],"published":{"date-parts":[[2019,6,25]]},"assertion":[{"value":"2019-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}