{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:02:54Z","timestamp":1730343774197,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.23919\/ifipnetworking.2017.8264855","type":"proceedings-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T17:40:12Z","timestamp":1516642812000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Load balancing memcached traffic using software defined networking"],"prefix":"10.23919","author":[{"given":"Anat","family":"Bremler-Barr","sequence":"first","affiliation":[]},{"given":"David","family":"Hay","sequence":"additional","affiliation":[]},{"given":"Idan","family":"Moyal","sequence":"additional","affiliation":[]},{"given":"Liron","family":"Schiff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838404"},{"journal-title":"Tumblr memkeys","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927487"},{"journal-title":"Google cloud platoform memcache","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486012"},{"journal-title":"Locating Performance-Degrading Hot Keys In Memcached","year":"0","key":"ref13"},{"key":"ref14","volume":"38","author":"jain","year":"1984","journal-title":"A quantitative measure of fairness and discrimination for resource allocation in shared computer system"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535373"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566832"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref19","article-title":"Be fast, cheap and in control with switchkv","volume":"16","author":"li","year":"2016","journal-title":"USENIX NSDI"},{"journal-title":"Redislabs memcached cloud","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/258492.258522"},{"key":"ref27","first-page":"159","article-title":"Balls into Bins","author":"raab","year":"1998","journal-title":"A Simple and Tight Analysis"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"journal-title":"Ryu Sdn Framework","year":"2015","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref8","first-page":"373","article-title":"MemC3: compact and concurrent memcache with dumber caching and smarter hashing","author":"fan","year":"2013","journal-title":"USENIX NSDI"},{"key":"ref7","first-page":"1","article-title":"A sophisticated packet forwarding scheme with deep packet inspection in an openflow switch","author":"choonghee","year":"2016","journal-title":"International Conference on Software Networking"},{"journal-title":"Amazon ElastiCache","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038939"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PDIS.1996.568672"},{"key":"ref20","article-title":"mctop-a tool for analyzing memcache get traffic","author":"marcus","year":"2012","journal-title":"Code as Craft"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620735"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"volume":"1 5 0","journal-title":"OpenFlow Switch Specification","year":"2014","key":"ref24"},{"key":"ref23","first-page":"385","article-title":"Scaling memcache at facebook","author":"nishtala","year":"2013","journal-title":"USENIX NSDI"},{"key":"ref26","first-page":"131","author":"pitoura","year":"2006","journal-title":"Replication Load Balancing and Efficient Range Query Processing in DHTs"},{"journal-title":"P4 model repository (p4factory)","year":"0","key":"ref25"}],"event":{"name":"2017 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2017,6,12]]},"location":"Stockholm, Sweden","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253906\/8264823\/08264855.pdf?arnumber=8264855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T22:07:55Z","timestamp":1518041275000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8264855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2017.8264855","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}