{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:42Z","timestamp":1750309362809,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing University","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"name":"Jiangsu High-level Innovation and Entrepreneurship (Shuangchuang) Program","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}]},{"name":"National Natural Science Foundation of China","award":["62272223"],"award-info":[{"award-number":["62272223"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,5]]},"DOI":"10.1145\/3674399.3674418","type":"proceedings-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T22:26:48Z","timestamp":1722378408000},"page":"23-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Rethinking Hash Tables: Challenges and Opportunities with Compute Express Link (CXL)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0679-1563","authenticated-orcid":false,"given":"Hancheng","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0545-8187","authenticated-orcid":false,"given":"Haipeng","family":"Dai","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9606-1593","authenticated-orcid":false,"given":"Shusen","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2024. AWS Lambda. https:\/\/aws.amazon.com\/lambda\/ Accessed: 2024-06-06."},{"key":"e_1_3_2_1_2_1","unstructured":"2024. Azure Functions. https:\/\/azure.microsoft.com\/en-us\/products\/functions Accessed: 2024-06-06."},{"key":"e_1_3_2_1_3_1","unstructured":"2024. CXL-based memory | Micron Technology Inc.https:\/\/sg.micron.com\/products\/memory\/cxl-memory Accessed: 2024-06-09."},{"key":"e_1_3_2_1_4_1","unstructured":"2024. Expanding the Limits of Memory Bandwidth and Density: Samsung\u2019s CXL Memory Expander. https:\/\/semiconductor.samsung.com\/news-events\/tech-blog\/expanding-the-limits-of-memory-bandwidth-and-density-samsungs-cxl-dram-memory-expander\/ Accessed: 2024-06-09."},{"key":"e_1_3_2_1_5_1","unstructured":"2024. Partitioned Index\/Filters. https:\/\/rocksdb.org\/blog\/2017\/05\/12\/partitioned-index-filter.html Accessed: 2024-06-09."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350275"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/3529337.3529344"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00109"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-023-00812-1"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Annual Technical Conference. USENIX Association, 799\u2013812","author":"Chen Zhangyu","year":"2020","unstructured":"Zhangyu Chen, Yu Hua, Bo Ding, and Pengfei Zuo. 2020. Lock-free Concurrent Level Hashing for Persistent Memory. In Proceedings of the Annual Technical Conference. USENIX Association, 799\u2013812."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/3025111.3025112"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM58522.2023.00015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2819001.2819002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674994"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.851975"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of Annual Technical Conference. USENIX, 467\u2013484","author":"Gu Rong","year":"2023","unstructured":"Rong Gu, Simian Li, Haipeng Dai, Hancheng Wang, Yili Luo, Bin Fan, Ran\u00a0Ben Basat, Ke Wang, Zhenyu Song, Shouwei Chen, Beinan Wang, Yihua Huang, and Guihai Chen. 2023. Adaptive Online Cache Capacity Optimization via Lightweight Working Set Size Estimation at Scale. In Proceedings of Annual Technical Conference. USENIX, 467\u2013484."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457333"},{"key":"e_1_3_2_1_19_1","volume-title":"Hopscotch Hashing. In Proceedings of International Symposium on Distributed Computing. Springer, 350\u2013364","author":"Herlihy Maurice","year":"2008","unstructured":"Maurice Herlihy, Nir Shavit, and Moran Tzafrir. 2008. Hopscotch Hashing. In Proceedings of International Symposium on Distributed Computing. Springer, 350\u2013364."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517884"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3446095.3446101"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/3554821.3554897"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976021.4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359635"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40495-5_51"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of Symposium on Networked Systems Design and Implementation. USENIX, 267\u2013280","author":"Li Tianlong","year":"2024","unstructured":"Tianlong Li, Tian Song, and Yating Yang. 2024. iStack: A General and Stateful Name-based Protocol Stack for Named Data Networking. In Proceedings of Symposium on Networked Systems Design and Implementation. USENIX, 267\u2013280."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30637-2_5"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of International Conference on Very Large Data Bases. ACM, 212\u2013223","author":"Litwin Witold","year":"1980","unstructured":"Witold Litwin. 1980. Linear Hashing: A New Tool for File and Table Addressing. In Proceedings of International Conference on Very Large Data Bases. ACM, 212\u2013223."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512019"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of International Conference on Knowledge Discovery and Data Mining. ACM, 1\u201312","author":"Liu Shizhe","year":"2024","unstructured":"Shizhe Liu, Haipeng Dai, Shaoxu Song, Meng Li, Jingsong Dai, Rong Gu, and Guihai Chen. 2024. ACER: Accelerating Complex Event Recognition via Two-Phase Filtering under Range Bitmap-Based Indexes. In Proceedings of International Conference on Knowledge Discovery and Data Mining. ACM, 1\u201312."},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Pea Hash: A Performant Extendible Adaptive Hashing Index","volume":"1","author":"Liu Zhuoxuan","year":"2023","unstructured":"Zhuoxuan Liu and Shimin Chen. 2023. Pea Hash: A Performant Extendible Adaptive Hashing Index. Proceedings of the ACM on Management of Data 1, 1 (2023), 1\u201325.","journal-title":"Proceedings of the ACM on Management of Data"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389134"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3606557.3606562"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582063"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3572848.3577507"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Conference on File and Storage Technologies. USENIX Association, 31\u201344","author":"Nam Moohyeon","year":"2019","unstructured":"Moohyeon Nam, Hokeun Cha, Young-ri Choi, Sam\u00a0H. Noh, and Beomseok Nam. 2019. Write-Optimized Dynamic Hashing for Persistent Memory. In Proceedings of the Conference on File and Storage Technologies. USENIX Association, 31\u201344."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588727"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159917"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of International Conference on Management of Data. ACM, 79\u201394","author":"Salihoglu Semih","year":"2017","unstructured":"Semih Salihoglu, Wenchao Zhou, Rada Chirkova, Jun Yang, and Dan Suciu. 2017. Monkey: Optimal Navigable Key-Value Store. In Proceedings of International Conference on Management of Data. ACM, 79\u201394."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2803140.2803144"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3650061"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3551793.3551839"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX Association, 479\u2013495","author":"Wang Chao","year":"2023","unstructured":"Chao Wang, Junliang Hu, Tsun-Yu Yang, Yuhong Liang, and Ming-Chang Yang. 2023. SEPH: Scalable, Efficient, and Predictable Hashing on Persistent Memory. In Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX Association, 479\u2013495."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3403997"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629590"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00078"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544239"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2782251"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX Association, 461\u2013476","author":"Zuo Pengfei","year":"2018","unstructured":"Pengfei Zuo, Yu Hua, and Jie Wu. 2018. Write-Optimized and High-Performance Hashing Index Scheme for Persistent Memory. In Proceedings of the Symposium on Operating Systems Design and Implementation. USENIX Association, 461\u2013476."}],"event":{"name":"ACM-TURC '24: ACM Turing Award Celebration Conference 2024","acronym":"ACM-TURC '24","location":"Changsha China"},"container-title":["ACM Turing Award Celebration Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674399.3674418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:03Z","timestamp":1750291563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,5]]},"references-count":49,"alternative-id":["10.1145\/3674399.3674418","10.1145\/3674399"],"URL":"https:\/\/doi.org\/10.1145\/3674399.3674418","relation":{},"subject":[],"published":{"date-parts":[[2024,7,5]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}