{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:38:45Z","timestamp":1774539525810,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T00:00:00Z","timestamp":1655078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,13]]},"DOI":"10.23919\/ifipnetworking55013.2022.9829799","type":"proceedings-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T12:42:14Z","timestamp":1658493734000},"page":"1-9","source":"Crossref","is-referenced-by-count":6,"title":["Revisiting Application Offloads on Programmable Switches"],"prefix":"10.23919","author":[{"given":"Cha Hwan","family":"Song","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Xin Zhe","family":"Khooi","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Trustwave"}]},{"given":"Mun Choon","family":"Chan","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"263","reference":[{"key":"ref39","first-page":"503","article-title":"SegCache: A memory-efficient and scalable in-memory key-value cache for small objects","author":"yang","year":"2021","journal-title":"NSDI"},{"key":"ref38","first-page":"499","article-title":"Hyperbolic caching: Flexible caching for web applications","author":"blankstein","year":"2017","journal-title":"ATC"},{"key":"ref33","author":"russell","year":"2002","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref32","first-page":"487","article-title":"Cache modeling and optimization using miniature simulations","author":"waldspurger","year":"2017","journal-title":"ATC"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3149371"},{"key":"ref30","year":"0","journal-title":"Portable switch architecture"},{"key":"ref37","year":"0","journal-title":"DySO Implementation"},{"key":"ref36","year":"2021","journal-title":"Intel data plane development kit (dpdk)"},{"key":"ref35","year":"2021","journal-title":"PcapPlusPlus"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref10","article-title":"Tiara: A scalable and efficient hardware acceleration architecture for stateful layer-4 load balancing","author":"zeng","year":"2022","journal-title":"NSDI"},{"key":"ref40","year":"0","journal-title":"Statistics of cache traces in twitter production"},{"key":"ref11","year":"0","journal-title":"Intel Tofino2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref14","first-page":"14","article-title":"Enabling event-triggered data plane monitoring","author":"kucera","year":"0","journal-title":"Proceedings of the Symposium on SDN Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259415"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405870"},{"key":"ref17","first-page":"31","article-title":"Be fast, cheap and in control with SwitchKV","author":"li","year":"2016","journal-title":"NSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405883"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219627"},{"key":"ref28","first-page":"483","article-title":"Adaptsize: Orchestrating the hot object memory cache in a content delivery network","author":"berger","year":"2017","journal-title":"NSDI"},{"key":"ref4","first-page":"277","article-title":"Concordia: Distributed shared memory with in-network cache coherence","author":"wang","year":"2021","journal-title":"FAST"},{"key":"ref27","first-page":"389","article-title":"LHD: Improving cache hit rate by maximizing hit density","author":"beckmann","year":"2018","journal-title":"NSDI"},{"key":"ref3","first-page":"387","article-title":"Pegasus: Tolerating skewed workloads in distributed storage with in-network coherence directories","author":"li","year":"2020","journal-title":"OSDI"},{"key":"ref6","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","author":"liu","year":"2021","journal-title":"Security"},{"key":"ref29","first-page":"115","article-title":"ARC: A self-tuning, low overhead replacement cache","volume":"3","author":"megiddo","year":"2003","journal-title":"FAST"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472889"},{"key":"ref8","first-page":"191","article-title":"A large scale analysis of hundreds of in-memory cache clusters at Twitter","author":"yang","year":"2020","journal-title":"OSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405855"},{"key":"ref2","first-page":"143","article-title":"Distcache: Provable load balancing for large-scale storage systems with distributed caching","author":"liu","year":"2019","journal-title":"FAST"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254766"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref46","first-page":"741","article-title":"Efficient miss ratio curve computation for heterogeneous content popularity","author":"carra","year":"2020","journal-title":"ATC"},{"key":"ref20","year":"0","journal-title":"The CAIDA UCSD Anonymized Internet Traces - 20190117"},{"key":"ref45","year":"2021","journal-title":"Gurobi Optimizer"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1147\/sj.52.0078"},{"key":"ref21","year":"2020","journal-title":"Anonymized Cache Request Traces from Twitter Production"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-014-0585-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/4236.806998"},{"key":"ref41","year":"0","journal-title":"Netcache in p4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1965.264263"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44666-4_6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1273440.1250709"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394229"},{"key":"ref25","article-title":"LRFU: A spectrum of policies that subsumes the least recently used and least frequently used policies","author":"lee","year":"2001","journal-title":"IEEE Computer Architecture Letters"}],"event":{"name":"2022 IFIP Networking Conference (IFIP Networking)","location":"Catania, Italy","start":{"date-parts":[[2022,6,13]]},"end":{"date-parts":[[2022,6,16]]}},"container-title":["2022 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9829715\/9829755\/09829799.pdf?arnumber=9829799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T17:50:11Z","timestamp":1661795411000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9829799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,13]]},"references-count":46,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking55013.2022.9829799","relation":{},"subject":[],"published":{"date-parts":[[2022,6,13]]}}}