{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:58:40Z","timestamp":1773277120111,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T00:00:00Z","timestamp":1740700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of Fujian Province of China","award":["2023J06001"],"award-info":[{"award-number":["2023J06001"]}]},{"name":"Natural Science Foundation of China","award":["62072381"],"award-info":[{"award-number":["62072381"]}]},{"name":"Major Research Plan of the National Natural Science Foundation of China","award":["92373114"],"award-info":[{"award-number":["92373114"]}]},{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024YFB 4504400"],"award-info":[{"award-number":["2024YFB 4504400"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Xiaomi Young Scholar"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,28]]},"DOI":"10.1145\/3710848.3710856","type":"proceedings-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T06:20:57Z","timestamp":1740723657000},"page":"142-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["AC-Cache: A Memory-Efficient Caching System for Small Objects via Exploiting Access Correlations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7762-3252","authenticated-orcid":false,"given":"Fulin","family":"Nan","sequence":"first","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9008-5401","authenticated-orcid":false,"given":"Ronglong","family":"Wu","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2673-5868","authenticated-orcid":false,"given":"Zhirong","family":"Shen","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2591-2683","authenticated-orcid":false,"given":"Jiahui","family":"Yang","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4070-135X","authenticated-orcid":false,"given":"Li","family":"Cheng","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0172-7977","authenticated-orcid":false,"given":"Zheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Tencent Inc., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6450-8485","authenticated-orcid":false,"given":"Yiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7362-2789","authenticated-orcid":false,"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Inc. Alluxio. 2024. Alluxio. https:\/\/www.alluxio.io\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966472"},{"key":"e_1_3_2_1_3_1","volume-title":"Engineering Blog","author":"Aniszczyk Chris","year":"2012","unstructured":"Chris Aniszczyk. 2012. Caching with twemcache. Twitter Blog, Engineering Blog (2012), 1--7."},{"key":"e_1_3_2_1_4_1","unstructured":"Caching at reddit. 2017. https:\/\/redditblog.com\/2017\/1\/17\/caching-at-reddit\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"e_1_3_2_1_6_1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein Philip A.","unstructured":"Philip A. Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_1_8_1","unstructured":"CacheLib. 2024. Evaluating SSD hardware for Facebook workloads. https:\/\/cachelib.org\/docs\/Cache_Library_User_Guides\/Cachebench_FB_HW_eval."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291036"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of the 18th USENIX Conference on File and Storage Technologies (FAST 20)","author":"Cao Zhichao","unstructured":"Zhichao Cao, Siying Dong, Sagar Vemuri, and David H. C. Du. 2020. Characterizing, Modeling, and Benchmarking {RocksDB} Key-Value Workloads at Facebook. In Proc. of the 18th USENIX Conference on File and Storage Technologies (FAST 20). 209--223."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196898"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2921760"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3480852"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of the ACM Symposium on Cloud Computing (SoCC '19)","author":"Cheng Liangfeng","unstructured":"Liangfeng Cheng, Yuchong Hu, and Patrick P. C. Lee. 2019. Coupling Decentralized Key-Value Stores with Erasure Coding. In Proc. of the ACM Symposium on Cloud Computing (SoCC '19). 377--389."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Tenth European Conference on Computer Systems (EuroSys '15)","author":"Cheng Yue","unstructured":"Yue Cheng, Aayush Gupta, and Ali R. Butt. 2015. An In-Memory Object Caching Framework with Adaptive Load Balancing. In Proceedings of the Tenth European Conference on Computer Systems (EuroSys '15). 1--16."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Cidon Asaf","year":"2017","unstructured":"Asaf Cidon, Daniel Rushton, Stephen M. Rumble, and Ryan Stutsman. 2017. Memshare: A Dynamic Multi-tenant Key-value Cache. In Proc. of the 2017 USENIX Annual Technical Conference (USENIX ATC 17). 321--334."},{"key":"e_1_3_2_1_17_1","volume-title":"Alibaba Cloud: Cloud Computing Services. https:\/\/www.alibabacloud.com.","author":"Cloud Alibaba","year":"2023","unstructured":"Alibaba Cloud. 2023. Alibaba Cloud: Cloud Computing Services. https:\/\/www.alibabacloud.com."},{"key":"e_1_3_2_1_18_1","unstructured":"Alibaba Cloud. 2024. Tair. https:\/\/github.com\/alibaba\/tair."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE INFOCOM 2004 - 23rd Annual Joint Conference on Computer Communications. 1534--1545","author":"Cormode Graham","unstructured":"Graham Cormode and S. Muthukrishnan. 2004. What's New: Finding Significant Fifferences in Network Data Streams. In IEEE INFOCOM 2004 - 23rd Annual Joint Conference on Computer Communications. 1534--1545."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920853"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Didona Diego","year":"2019","unstructured":"Diego Didona and Willy Zwaenepoel. 2019. Size-Aware Sharding For Improving Tail Latencies in In-Memory Key-Value Stores. In Proc. of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) (2019). 79--94."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Yefim Dinitz. 2006. Dinitz' Algorithm: The Original Version and Even's Version. In Theoretical Computer Science: Essays in Memory of Shimon Even. 218--240.","DOI":"10.1007\/11685654_10"},{"key":"e_1_3_2_1_25_1","unstructured":"EVCache. 2023. https:\/\/github.com\/Netflix\/EVCache."},{"key":"e_1_3_2_1_26_1","unstructured":"Brad Fitzpatrick. 2022. Memcached - a Distributed Memory Object Caching System. https:\/\/www.memcached.org\/."},{"key":"e_1_3_2_1_27_1","first-page":"12","article-title":"Community Structure in Social and Biological Networks","volume":"99","author":"Girvan M.","year":"2002","unstructured":"M. Girvan and M. E. J. Newman. 2002. Community Structure in Social and Biological Networks. in Proc. of the National Academy of Sciences of the United States of America 99, 12 (June 2002), 7821--7826.","journal-title":"Proc. of the National Academy of Sciences of the United States of America"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/330249.330254"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2525970"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. of USENIX Annual Technical Conference (USENIX ATC 12)","author":"Huang Cheng","year":"2012","unstructured":"Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin. 2012. Erasure Coding in Windows Azure Storage. In Proc. of USENIX Annual Technical Conference (USENIX ATC 12). 15--26."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673882"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"e_1_3_2_1_33_1","unstructured":"Bert Hubert Jacco Geul and Simon S\u00e9hier. 2023. Wonder-Shaper: Command-line utility for limiting an adapter's bandwidth. https:\/\/github.com\/magnific0\/wondershaper."},{"key":"e_1_3_2_1_34_1","unstructured":"IBM. 2022. IBM ILOG CPLEX Optimization Studio 22.1.1 documentation. https:\/\/www.ibm.com\/docs\/en\/icos\/22.1.1."},{"key":"e_1_3_2_1_35_1","unstructured":"Aerospike Inc. 2024. Aerospike. https:\/\/aerospike.com\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508010"},{"key":"e_1_3_2_1_37_1","volume-title":"2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Kalia Anuj","unstructured":"Anuj Kalia, Michael Kaminsky, and David G. Andersen. 2016. Design Guidelines for High Performance {RDMA} Systems. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). 437--450."},{"key":"e_1_3_2_1_38_1","volume-title":"Niazi","author":"Khan Bisma S.","year":"2017","unstructured":"Bisma S. Khan and Muaz A. Niazi. 2017. Network Community Detection: A Review and Visual Survey."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of USENIX Annual Technical Conference (USENIX ATC 17)","author":"Li Huiba","year":"2017","unstructured":"Huiba Li, Yiming Zhang, Zhiming Zhang, Shengyun Liu, Dongsheng Li, Xiaohui Liu, and Yuxing Peng. 2017. PARIX: Speculative Partial Writes in Erasure-Coded Systems. In Proc. of USENIX Annual Technical Conference (USENIX ATC 17). 581--587."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474393"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of the 3rd USENIX Conference on File and Storage Technologies (FAST 04)","author":"Li Zhenmin","year":"2004","unstructured":"Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, and Yuanyuan Zhou. 2004. C-Miner: Mining Block Correlations in Storage. In Proc. of the 3rd USENIX Conference on File and Storage Technologies (FAST 04). 173--186."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Lim Hyeontaek","year":"2014","unstructured":"Hyeontaek Lim, Dongsu Han, David G. Andersen, and Michael Kaminsky. 2014. MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. In Proc. of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) (2014). 429--444."},{"key":"e_1_3_2_1_44_1","unstructured":"Redis Ltd. 2022. Redis. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. of the ACM SIGOPS 28th Symposium on Operating Systems Principles (SOSP 21)","author":"McAllister Sara","unstructured":"Sara McAllister, Benjamin Berg, Julian Tutuncu-Macias, Juncheng Yang, Sathya Gunasekar, Jimmy Lu, Daniel S. Berger, Nathan Beckmann, and Gregory R. Ganger. 2021. Kangaroo: Caching Billions of Tiny Objects on Flash. In Proc. of the ACM SIGOPS 28th Symposium on Operating Systems Principles (SOSP 21). 243--262."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Nishtala Rajesh","year":"2013","unstructured":"Rajesh Nishtala, Hans Fugal, Steven Grimm, Marc Kwiatkowski, Herman Lee, Harry C. Li, Ryan McElroy, Mike Paleczny, Daniel Peek, Paul Saab, David Stafford, Tony Tung, and Venkateshwaran Venkataramani. 2013. Scaling Memcache at Facebook. In Proc. of 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 385--398."},{"key":"e_1_3_2_1_47_1","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). 305--319."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation (PLDI '90)","author":"Pettis Karl","unstructured":"Karl Pettis and Robert C. Hansen. 1990. Profile guided code positioning. In Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation (PLDI '90). 16----27."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/643470.643474"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Rashmi K. V.","year":"2016","unstructured":"K. V. Rashmi, Mosharaf Chowdhury, Jack Kosaian, Ion Stoica, and Kannan Ramchandran. 2016. EC-Cache: Load-Balanced, Low-Latency Cluster Caching with Online Erasure Coding. In Proc. of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 401--417."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896150"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2890635"},{"key":"e_1_3_2_1_53_1","unstructured":"SoftwareAG. 2024. EHCache - Java's most widely used cache. https:\/\/www.ehcache.org\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604849"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404014.1404045"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3695794.3695820"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Robert Endre Tarjan. 1983. Data structures and network algorithms. SIAM.","DOI":"10.1137\/1.9781611970265"},{"key":"e_1_3_2_1_58_1","unstructured":"Twitter. 2023. Pelikan Cache. https:\/\/pelikan.io\/."},{"key":"e_1_3_2_1_59_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Wei Xingda","year":"2020","unstructured":"Xingda Wei, Rong Chen, and Haibo Chen. 2020. Fast {RDMA-based} Ordered {Key-Value} Store Using Remote Learned Cache. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 117--135."},{"key":"e_1_3_2_1_60_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Wei Xingda","year":"2018","unstructured":"Xingda Wei, Zhiyuan Dong, Rong Chen, and Haibo Chen. 2018. Deconstructing {RDMA-enabled} Distributed Transactions: Hybrid Is Better!. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). 233--251."},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Yang Juncheng","unstructured":"Juncheng Yang, Yao Yue, and K. V. Rashmi. 2020. A Large Scale Analysis of Hundreds of In-Memory Cache Clusters at Twitter. In Proc. of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 191--208."},{"key":"e_1_3_2_1_62_1","volume-title":"Segcache: A Memory-Efficient and Scalable In-Memory Key-Value Cache for Small Objects. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Yang Juncheng","year":"2021","unstructured":"Juncheng Yang, Yao Yue, and Rashmi Vinayak. 2021. Segcache: A Memory-Efficient and Scalable In-Memory Key-Value Cache for Small Objects. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 503--518."},{"key":"e_1_3_2_1_63_1","volume-title":"Proc. of the 10th ACM International Systems and Storage Conference (SYSTOR 17)","author":"Yiu Matt M. T.","unstructured":"Matt M. T. Yiu, Helen H. W. Chan, and Patrick P. C. Lee. 2017. Erasure Coding for Small Objects in In-Memory KV Storage. In Proc. of the 10th ACM International Systems and Storage Conference (SYSTOR 17). 1--12."},{"key":"e_1_3_2_1_64_1","volume-title":"Shuffle-Free Cluster Caching for Structured Data. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. 954--963","author":"Yu Minchen","year":"2020","unstructured":"Minchen Yu, Yinghao Yu, Yunchuan Zheng, Baichen Yang, and Wei Wang. 2020. RepBun: Load-Balanced, Shuffle-Free Cluster Caching for Structured Data. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. 954--963."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00004"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111040"},{"key":"e_1_3_2_1_67_1","volume-title":"Online Phase-Adaptive Data Layout Selection. In ECOOP 2008 - Object-Oriented Programming, Jan Vitek (Ed.). 309--334","author":"Zhang Chengliang","year":"2008","unstructured":"Chengliang Zhang and Martin Hirzel. 2008. Online Phase-Adaptive Data Layout Selection. In ECOOP 2008 - Object-Oriented Programming, Jan Vitek (Ed.). 309--334."},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. of the 35th Symposium on Mass Storage Systems and Technologies (MSST 19)","author":"Zhang Mi","unstructured":"Mi Zhang, Qiuping Wang, Zhirong Shen, and Patrick P. C. Lee. 2019. Parity-Only Caching for Robust Straggler Tolerance. In Proc. of the 35th Symposium on Mass Storage Systems and Technologies (MSST 19). 257--268."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996872"}],"event":{"name":"PPoPP '25: The 30th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming","location":"Las Vegas NV USA","acronym":"PPoPP '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"]},"container-title":["Proceedings of the 30th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710848.3710856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3710848.3710856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:15:20Z","timestamp":1755875720000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3710848.3710856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,28]]},"references-count":69,"alternative-id":["10.1145\/3710848.3710856","10.1145\/3710848"],"URL":"https:\/\/doi.org\/10.1145\/3710848.3710856","relation":{},"subject":[],"published":{"date-parts":[[2025,2,28]]},"assertion":[{"value":"2025-02-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}