{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:17Z","timestamp":1750220237640,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2114319, CNS-1909099, CCF-1717877"],"award-info":[{"award-number":["CCF-2114319, CNS-1909099, CCF-1717877"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1145\/3488423.3519331","type":"proceedings-article","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T15:02:51Z","timestamp":1652108571000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Writeback Modeling: Theory and Application to Zipfian Workloads"],"prefix":"10.1145","author":[{"given":"Wesley","family":"Smith","sequence":"first","affiliation":[{"name":"University of Rochester, United States"}]},{"given":"Daniel","family":"Byrne","sequence":"additional","affiliation":[{"name":"Michigan Technological University, United States"}]},{"given":"Chen","family":"Ding","sequence":"additional","affiliation":[{"name":"University of Rochester, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. memcached. https:\/\/memcached.org.  2018. memcached. https:\/\/memcached.org."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. RGSL Library. https:\/\/docs.rs\/GSL\/1.1.0\/rgsl\/index.html.  2020. RGSL Library. https:\/\/docs.rs\/GSL\/1.1.0\/rgsl\/index.html."},{"key":"e_1_3_2_1_3_1","volume-title":"Zipf\u2019s law and the Internet.Glottometrics 3, 1","author":"Adamic A","year":"2002","unstructured":"Lada\u00a0 A Adamic and Bernardo\u00a0 A Huberman . 2002. Zipf\u2019s law and the Internet.Glottometrics 3, 1 ( 2002 ), 143\u2013150. Lada\u00a0A Adamic and Bernardo\u00a0A Huberman. 2002. Zipf\u2019s law and the Internet.Glottometrics 3, 1 (2002), 143\u2013150."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976021.1"},{"key":"e_1_3_2_1_5_1","unstructured":"Christian Berthet. 2017. Approximation of LRU Caches Miss Rate: Application to Power-law Popularities. CoRR abs\/1705.10738(2017). arxiv:1705.10738http:\/\/arxiv.org\/abs\/1705.10738  Christian Berthet. 2017. Approximation of LRU Caches Miss Rate: Application to Power-law Popularities. CoRR abs\/1705.10738(2017). arxiv:1705.10738http:\/\/arxiv.org\/abs\/1705.10738"},{"key":"e_1_3_2_1_7_1","volume-title":"2011 23rd International Teletraffic Congress (ITC). 111\u2013118","author":"Carofiglio Giovanna","year":"2011","unstructured":"Giovanna Carofiglio , Massimo Gallo , Luca Muscariello , and Diego Perino . 2011 . Modeling data transfer in content-centric networking . In 2011 23rd International Teletraffic Congress (ITC). 111\u2013118 . Giovanna Carofiglio, Massimo Gallo, Luca Muscariello, and Diego Perino. 2011. Modeling data transfer in content-centric networking. In 2011 23rd International Teletraffic Congress (ITC). 111\u2013118."},{"volume-title":"2014 IEEE International Conference on Communications (ICC \u201914)","author":"Carra D.","key":"e_1_3_2_1_8_1","unstructured":"D. Carra and P. Michiardi . 2014. Memory partitioning in Memcached: An experimental performance analysis . In 2014 IEEE International Conference on Communications (ICC \u201914) . 1154\u20131159. D. Carra and P. Michiardi. 2014. Memory partitioning in Memcached: An experimental performance analysis. In 2014 IEEE International Conference on Communications (ICC \u201914). 1154\u20131159."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192402"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989081.2989119"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2019.106838"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(77)80014-7"},{"volume-title":"Workload Modeling for Computer Systems Performance Evaluation","author":"Feitelson Dror","key":"e_1_3_2_1_13_1","unstructured":"Dror Feitelson . 2014. Workload Modeling for Computer Systems Performance Evaluation . Cambridge University Press . Dror Feitelson. 2014. Workload Modeling for Computer Systems Performance Evaluation. Cambridge University Press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193511"},{"key":"e_1_3_2_1_16_1","volume-title":"LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache. In 2015 USENIX Annual Technical Conference (USENIX ATC 15)","author":"Hu Xiameng","year":"2015","unstructured":"Xiameng Hu , Xiaolin Wang , Yechen Li , Lan Zhou , Yingwei Luo , Chen Ding , Song Jiang , and Zhenlin Wang . 2015 . LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache. In 2015 USENIX Annual Technical Conference (USENIX ATC 15) . USENIX Association, Santa Clara, CA, 57\u201369. Xiameng Hu, Xiaolin Wang, Yechen Li, Lan Zhou, Yingwei Luo, Chen Ding, Song Jiang, and Zhenlin Wang. 2015. LAMA: Optimized Locality-aware Memory Allocation for Key-value Cache. In 2015 USENIX Annual Technical Conference (USENIX ATC 15). USENIX Association, Santa Clara, CA, 57\u201369."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026959.3026992"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185751"},{"key":"e_1_3_2_1_19_1","unstructured":"Joseph Izraelevitz Jian Yang Lu Zhang Juno Kim Xiao Liu Amirsaman Memaripour Yun\u00a0Joon Soh Zixuan Wang Yi Xu Subramanya\u00a0R. Dulloor Jishen Zhao and Steven Swanson. 2019. Basic Performance Measurements of the Intel Optane DC Persistent Memory Module. CoRR abs\/1903.05714(2019). arxiv:1903.05714http:\/\/arxiv.org\/abs\/1903.05714  Joseph Izraelevitz Jian Yang Lu Zhang Juno Kim Xiao Liu Amirsaman Memaripour Yun\u00a0Joon Soh Zixuan Wang Yi Xu Subramanya\u00a0R. Dulloor Jishen Zhao and Steven Swanson. 2019. Basic Performance Measurements of the Intel Optane DC Persistent Memory Module. CoRR abs\/1903.05714(2019). arxiv:1903.05714http:\/\/arxiv.org\/abs\/1903.05714"},{"key":"e_1_3_2_1_20_1","volume-title":"Asymptotic approximation of the move-to-front search cost distribution and least-recently used caching fault probabilities. Ann. Appl. Probab. 9, 2 (05","author":"Jelenkovi\u0107 R.","year":"1999","unstructured":"Predrag\u00a0 R. Jelenkovi\u0107 . 1999. Asymptotic approximation of the move-to-front search cost distribution and least-recently used caching fault probabilities. Ann. Appl. Probab. 9, 2 (05 1999 ), 430\u2013464. https:\/\/doi.org\/10.1214\/aoap\/1029962750 10.1214\/aoap Predrag\u00a0R. Jelenkovi\u0107. 1999. Asymptotic approximation of the move-to-front search cost distribution and least-recently used caching fault probabilities. Ann. Appl. Probab. 9, 2 (05 1999), 430\u2013464. https:\/\/doi.org\/10.1214\/aoap\/1029962750"},{"key":"e_1_3_2_1_21_1","volume-title":"Modeling Hierarchical Caches in Content-Centric Networks. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1\u20137. https:\/\/doi.org\/10","author":"Jia Zixiao","year":"2013","unstructured":"Zixiao Jia , Peng Zhang , Jiwei Huang , Chuang Lin , and John C . \u00a0S. Lui. 2013 . Modeling Hierarchical Caches in Content-Centric Networks. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1\u20137. https:\/\/doi.org\/10 .1109\/ICCCN. 2013 .6614153 10.1109\/ICCCN.2013.6614153 Zixiao Jia, Peng Zhang, Jiwei Huang, Chuang Lin, and John C.\u00a0S. Lui. 2013. Modeling Hierarchical Caches in Content-Centric Networks. In 2013 22nd International Conference on Computer Communication and Networks (ICCCN). 1\u20137. https:\/\/doi.org\/10.1109\/ICCCN.2013.6614153"},{"key":"e_1_3_2_1_22_1","volume-title":"Estimation of Invalidation and Writeback Rates in Multiple Processor Systems. (04","author":"Kant Krishna","year":"2009","unstructured":"Krishna Kant . 2009. Estimation of Invalidation and Writeback Rates in Multiple Processor Systems. (04 2009 ). Krishna Kant. 2009. Estimation of Invalidation and Writeback Rates in Multiple Processor Systems. (04 2009)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894837"},{"key":"e_1_3_2_1_24_1","volume-title":"Probabilistic Directed Writebacks for Exclusive Caches. 44, 1 (jul","author":"Olson Lena","year":"2016","unstructured":"Lena Olson and Mark Hill . 2016. Probabilistic Directed Writebacks for Exclusive Caches. 44, 1 (jul 2016 ). https:\/\/doi.org\/10.1145\/2971331.2971334 10.1145\/2971331.2971334 Lena Olson and Mark Hill. 2016. Probabilistic Directed Writebacks for Exclusive Caches. 44, 1 (jul 2016). https:\/\/doi.org\/10.1145\/2971331.2971334"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357526.3357568"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"David\u00a0MW Powers. 1998. Applications and explanations of Zipf\u2019s law. In New methods in language processing and computational natural language learning.  David\u00a0MW Powers. 1998. Applications and explanations of Zipf\u2019s law. In New methods in language processing and computational natural language learning.","DOI":"10.3115\/1603899.1603924"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566740"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2906597"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2000.871464"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357526.3357528"},{"key":"e_1_3_2_1_31_1","unstructured":"Carl\u00a0A. Waldspurger Trausti Saemundsson Irfan Ahmad and Nohhyun Park. 2017. Cache Modeling and Optimization using Miniature Simulations. 487\u2013498. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/waldspurger  Carl\u00a0A. Waldspurger Trausti Saemundsson Irfan Ahmad and Nohhyun Park. 2017. Cache Modeling and Optimization using Miniature Simulations. 487\u2013498. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/waldspurger"},{"key":"e_1_3_2_1_32_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Independent_Reference_Model&oldid=959913121 [Online","author":"Wikipedia","year":"2021","unstructured":"Wikipedia contributors. 2020. Independent Reference Model \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Independent_Reference_Model&oldid=959913121 [Online ; accessed 7- April - 2021 ]. Wikipedia contributors. 2020. Independent Reference Model \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Independent_Reference_Model&oldid=959913121 [Online; accessed 7-April-2021]."},{"key":"e_1_3_2_1_33_1","volume-title":"The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Write_amplification&oldid=1015893909 [Online","author":"Wikipedia","year":"2021","unstructured":"Wikipedia contributors. 2021. Write amplification \u2014 Wikipedia , The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Write_amplification&oldid=1015893909 [Online ; accessed 19- April - 2021 ]. Wikipedia contributors. 2021. Write amplification \u2014 Wikipedia, The Free Encyclopedia. https:\/\/en.wikipedia.org\/w\/index.php?title=Write_amplification&oldid=1015893909 [Online; accessed 19-April-2021]."},{"key":"e_1_3_2_1_34_1","volume-title":"Characterizing Storage Workloads with Counter Stacks. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"Wires Jake","year":"2014","unstructured":"Jake Wires , Stephen Ingram , Zachary Drudi , Nicholas J.\u00a0A. Harvey , and Andrew Warfield . 2014 . Characterizing Storage Workloads with Counter Stacks. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) . USENIX Association, Broomfield, CO, 335\u2013349. Jake Wires, Stephen Ingram, Zachary Drudi, Nicholas J.\u00a0A. Harvey, and Andrew Warfield. 2014. Characterizing Storage Workloads with Counter Stacks. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). USENIX Association, Broomfield, CO, 335\u2013349."},{"key":"e_1_3_2_1_35_1","unstructured":"Cong Xie Ling Yan Wu-Jun Li and Zhihua Zhang. 2014. Distributed Power-law Graph Computing: Theoretical and Empirical Analysis.. In Nips Vol.\u00a027. 1673\u20131681.  Cong Xie Ling Yan Wu-Jun Li and Zhihua Zhang. 2014. Distributed Power-law Graph Computing: Theoretical and Empirical Analysis.. In Nips Vol.\u00a027. 1673\u20131681."},{"key":"e_1_3_2_1_36_1","volume-title":"Retrieved","author":"Yang Juncheng","year":"2021","unstructured":"Juncheng Yang . 2021 . libCacheSim - a library for cache simulation, profiling, and analysis . Retrieved May, 2021 from https:\/\/github.com\/1a1a11a\/libCacheSim Juncheng Yang. 2021. libCacheSim - a library for cache simulation, profiling, and analysis. Retrieved May, 2021 from https:\/\/github.com\/1a1a11a\/libCacheSim"},{"key":"e_1_3_2_1_37_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Yang Juncheng","year":"2020","unstructured":"Juncheng Yang , Yao Yue , and K.\u00a0 V. Rashmi . 2020 . A large scale analysis of hundreds of in-memory cache clusters at Twitter . In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . USENIX Association, 191\u2013208. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/yang Juncheng Yang, Yao Yue, and K.\u00a0V. Rashmi. 2020. A large scale analysis of hundreds of in-memory cache clusters at Twitter. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 191\u2013208. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/yang"},{"key":"e_1_3_2_1_38_1","article-title":"Write Skew and Zipf Distribution","volume":"12","author":"Yang Yue","year":"2016","unstructured":"Yue Yang and Jianwen Zhu . 2016 . Write Skew and Zipf Distribution : Evidence and Implications. ACM Trans. Storage 12 , 4, Article 21 (June 2016), 19\u00a0pages. https:\/\/doi.org\/10.1145\/2908557 10.1145\/2908557 Yue Yang and Jianwen Zhu. 2016. Write Skew and Zipf Distribution: Evidence and Implications. ACM Trans. Storage 12, 4, Article 21 (June 2016), 19\u00a0pages. https:\/\/doi.org\/10.1145\/2908557","journal-title":"Evidence and Implications. ACM Trans. Storage"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341109"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/3386691.3386713"},{"key":"e_1_3_2_1_41_1","volume-title":"Article 20 (Aug.","author":"Zhong Yutao","year":"2009","unstructured":"Yutao Zhong , Xipeng Shen , and Chen Ding . 2009. Program Locality Analysis Using Reuse Distance. ACM Trans. Program. Lang. Syst. (TOPLAS \u201909) 31, 6 , Article 20 (Aug. 2009 ), 39\u00a0pages. Yutao Zhong, Xipeng Shen, and Chen Ding. 2009. Program Locality Analysis Using Reuse Distance. ACM Trans. Program. Lang. Syst. (TOPLAS \u201909) 31, 6, Article 20 (Aug. 2009), 39\u00a0pages."}],"event":{"name":"MEMSYS 2021: The International Symposium on Memory Systems","acronym":"MEMSYS 2021","location":"Washington DC DC USA"},"container-title":["The International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488423.3519331","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488423.3519331","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488423.3519331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:24Z","timestamp":1750188624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488423.3519331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":39,"alternative-id":["10.1145\/3488423.3519331","10.1145\/3488423"],"URL":"https:\/\/doi.org\/10.1145\/3488423.3519331","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]},"assertion":[{"value":"2022-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}