{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T04:45:16Z","timestamp":1761972316800,"version":"build-2065373602"},"reference-count":24,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,11,1]]},"DOI":"10.1587\/transfun.2024eap1148","type":"journal-article","created":{"date-parts":[[2025,5,11]],"date-time":"2025-05-11T18:06:19Z","timestamp":1746986779000},"page":"1461-1470","source":"Crossref","is-referenced-by-count":0,"title":["A General Scheme for Solving Device Heterogeneity in Consistent Hash Algorithms"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Meiting","family":"XUE","sequence":"first","affiliation":[{"name":"College of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Jinbo","family":"ZHANG","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University"}]},{"given":"Yixuan","family":"ZHANG","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, CAS"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences"}]},{"given":"Huan","family":"ZHANG","sequence":"additional","affiliation":[{"name":"College of Communication Engineering, Hangzhou Dianzi University"}]},{"given":"Chenpu","family":"LI","sequence":"additional","affiliation":[{"name":"College of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Bei","family":"ZHAO","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hangzhou Dianzi University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin, \u201cConsistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web,\u201d Proc. twenty-ninth Annual ACM Symposium on Theory of Computing, pp.654-663, 1997. 10.1145\/258533.258660","DOI":"10.1145\/258533.258660"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, \u201cChord: A scalable peer-to-peer lookup protocol for Internet applications,\u201d IEEE\/ACM Trans. Netw., vol.11, no.1, pp.17-32, 2003. 10.1109\/tnet.2002.808407","DOI":"10.1109\/TNET.2002.808407"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] N. Zuo, Y. Chen, and Y. Zheng, \u201cRaft consensus grouping mechanism based on affinity propagation clustering algorithm,\u201d 2024 4th International Conference on Consumer Electronics and Computer Engineering (ICCECE), pp.15-19, 2024. 10.1109\/iccece61317.2024.10504245","DOI":"10.1109\/ICCECE61317.2024.10504245"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] B. Li, X. Ma, R. Li, J. Zhong, and P. Guo, \u201cDistributed service registration and discovery of core network,\u201d 2023 IEEE International Conference on Satellite Computing (Satellite), pp.43-48, 2023. 10.1109\/satellite59115.2023.00016","DOI":"10.1109\/Satellite59115.2023.00016"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] C. Wang, Y. Chen, J. Wang, and B. Wang, \u201cA dynamic weights consistent hashing load balancing method based on heuristic optimization,\u201d 2023 3rd International Conference on Electronic Information Engineering and Computer Science (EIECS), pp.492-496, 2023. 10.1109\/eiecs59936.2023.10435520","DOI":"10.1109\/EIECS59936.2023.10435520"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, \u201cDynamo: Amazon\u2019s highly available key-value store,\u201d ACM SIGOPS Oper. Syst. Rev., vol.41, no.6, pp.205-220, 2007. 10.1145\/1323293.1294281","DOI":"10.1145\/1323293.1294281"},{"key":"7","unstructured":"[7] D.E. Eisenbud, C. Yi, C. Contavalli, C. Smith, R. Kononov, E. Mann-Hielscher, A. Cilingiroglu, B. Cheyney, W. Shang, and J.D. Hosein, \u201cMaglev: A fast and reliable software network load balancer,\u201d 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp.523-535, 2016."},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] P. Goel, K. Rishabh, and V. Varma, \u201cAn alternate load distribution scheme in DHTs,\u201d 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), IEEE, pp.218-222, 2017. 10.1109\/cloudcom.2017.49","DOI":"10.1109\/CloudCom.2017.49"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] D. Halperin, V.T. de Almeida, L.L. Choo, S. Chu, P. Koutris, D. Moritz, J. Ortiz, V. Ruamviboonsuk, J. Wang, A. Whitaker, S. Xu, M. Balazinska, B. Howe, and D. Suciu, \u201cDemonstration of the Myria big data management service,\u201d Proc. 2014 ACM SIGMOD International Conference on Management of Data, pp.881-884, 2014. 10.1145\/2588555.2594530","DOI":"10.1145\/2588555.2594530"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] P. Maymounkov and D. Mazi\u00e9res, \u201cKademlia: A peer-to-peer information system based on the xor metric,\u201d Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, Revised Papers, Springer, pp.53-65, 2002. 10.1007\/3-540-45748-8_5","DOI":"10.1007\/3-540-45748-8_5"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] V. Mirrokni, M. Thorup, and M. Zadimoghaddam, \u201cConsistent hashing with bounded loads,\u201d Proc. Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, pp.587-604, 2018. 10.1137\/1.9781611975031.39","DOI":"10.1137\/1.9781611975031.39"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] D. Karger, A. Sherman, A. Berkheimer, B. Bogstad, R. Dhanidina, K. Iwamoto, B. Kim, L. Matkins, and Y. Yerushalmi, \u201cWeb caching with consistent hashing,\u201d Computer Networks, vol.31, no.11-16, pp.1203-1213, 1999. 10.1016\/s1389-1286(99)00055-9","DOI":"10.1016\/S1389-1286(99)00055-9"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] A.S. Shaik, R.K. Karsh, M. Islam, and S. Bhakta, \u201cContent authentication and tampered localization using ring partition and CSLBP-based image hashing,\u201d IEEE Access, vol.11, pp.126791-126802, 2023. 10.1109\/access.2023.3330969","DOI":"10.1109\/ACCESS.2023.3330969"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Y. Levi and I. Keslassy, \u201cBeyond the ring: Quantized heterogeneous consistent hashing,\u201d 2023 IEEE 31st International Conference on Network Protocols (ICNP), pp.1-12, 2023. 10.1109\/icnp59255.2023.10355577","DOI":"10.1109\/ICNP59255.2023.10355577"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] D.G. Thaler and C.V. Ravishankar, \u201cUsing name-based mappings to increase hit rates,\u201d IEEE\/ACM Trans. Netw., vol.6, no.1, pp.1-14, 1998. 10.1109\/90.663936","DOI":"10.1109\/90.663936"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] D. Halperin, V. Teixeira de Almeida, L.L. Choo, S. Chu, P. Koutris, D. Moritz, J. Ortiz, V. Ruamviboonsuk, J. Wang, A. Whitaker, S. Xu, M. Balazinska, B. Howe, and D. Suciu, \u201cDemonstration of the Myria big data management service,\u201d Proc. 2014 ACM SIGMOD International Conference on Management of Data, pp.881-884, 2014. 10.1145\/2588555.2594530","DOI":"10.1145\/2588555.2594530"},{"key":"17","unstructured":"[17] C. Dong and F. Wang, \u201cDxHash: A scalable consistent hash based on the pseudo-random sequence,\u201d arXiv preprint arXiv:2107.07930, 2021. 10.48550\/arXiv.2107.07930"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] G. Mendelson, S. Vargaftik, K. Barabash, D.H. Lorenz, I. Keslassy, and A. Orda, \u201cAnchorHash: A scalable consistent hash,\u201d IEEE\/ACM Trans. Netw., vol.29, no.2, pp.517-528, 2020. 10.1109\/tnet.2020.3039547","DOI":"10.1109\/TNET.2020.3039547"},{"key":"19","unstructured":"[19] B. Appleton and M. O\u2019Reilly, \u201cMulti-probe consistent hashing,\u201d arXiv preprint arXiv:1505.00062, 2015. 10.48550\/arXiv.1505.00062"},{"key":"20","unstructured":"[20] M. Sackman, \u201cPerfect consistent hashing,\u201d arXiv preprint arXiv:1503.04988, 2015. 10.48550\/arXiv.1503.04988"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] Y. Nakatani, \u201cStructured allocation-based consistent hashing with improved balancing for cloud infrastructure,\u201d IEEE Trans. Parallel Distrib. Syst., vol.32, no.9, pp.2248-2261, 2021. 10.1109\/tpds.2021.3058963","DOI":"10.1109\/TPDS.2021.3058963"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] Y. Zeng, J. Zhang, M. Xue, J. Wan, J. Zhang, and L. Zhou, \u201cAreaHash: A balanced and fully scalable consistency hashing algorithm,\u201d 2022 IEEE 24th Int Conf on High Performance Computing &amp; Communications; 8th Int Conf on Data Science &amp; Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud &amp; Big Data Systems &amp; Application (HPCC\/DSS\/SmartCity\/DependSys), IEEE, pp.857-862, 2022. 10.1109\/hpcc-dss-smartcity-dependsys57074.2022.00139","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00139"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] R. Singhal, \u201cInside Intel\u00ae Core microarchitecture (Nehalem),\u201d 2008 IEEE Hot Chips 20 Symposium (HCS), IEEE, pp.1-25, 2008. 10.1109\/hotchips.2008.7476555","DOI":"10.1109\/HOTCHIPS.2008.7476555"},{"key":"24","unstructured":"[24] F. Glenn, C.N. Landon, and V. Phong, \u201cFowler-noll-vo,\u201d http:\/\/en.wikipedia.org\/wiki\/Fowler-NollVo_hash_function, 1991."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/11\/E108.A_2024EAP1148\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T03:39:19Z","timestamp":1761968359000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/11\/E108.A_2024EAP1148\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024eap1148","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"type":"print","value":"0916-8508"},{"type":"electronic","value":"1745-1337"}],"subject":[],"published":{"date-parts":[[2025,11,1]]},"article-number":"2024EAP1148"}}