{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T06:39:06Z","timestamp":1722753546506},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Hasso Plattner Institute Research School, the Israel Science Foundation","doi-asserted-by":"publisher","award":["1119\/19"],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018707","name":"Technion Hiroshi Fujiwara Cyber Security Research Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018707","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Israel Cyber Bureau"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1109\/tnet.2020.3039547","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T02:13:00Z","timestamp":1607566380000},"page":"517-528","source":"Crossref","is-referenced-by-count":12,"title":["AnchorHash: A Scalable Consistent Hash"],"prefix":"10.1109","volume":"29","author":[{"given":"Gal","family":"Mendelson","sequence":"first","affiliation":[]},{"given":"Shay","family":"Vargaftik","sequence":"additional","affiliation":[]},{"given":"Katherine","family":"Barabash","sequence":"additional","affiliation":[]},{"given":"Dean H.","family":"Lorenz","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Keslassy","sequence":"additional","affiliation":[]},{"given":"Ariel","family":"Orda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00055-9"},{"key":"ref12","article-title":"Multi-probe consistent hashing","author":"appleton","year":"2015","journal-title":"arXiv 1505 00062"},{"key":"ref13","article-title":"Perfect consistent hashing","author":"sackman","year":"2015","journal-title":"arXiv 1503 04988"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/90.663936"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0144-3"},{"key":"ref16","first-page":"1","article-title":"Scale and performance in the CoBlitz large-file distribution service","author":"park","year":"2006","journal-title":"Proc USENIX NSDI"},{"key":"ref17","article-title":"A fast, minimal memory, consistent hash algorithm","author":"lamping","year":"2014","journal-title":"arXiv 1406 2294"},{"key":"ref18","first-page":"1","article-title":"Fast robust hashing","author":"uruena","year":"2006","journal-title":"IEEE GLOBECOM"},{"key":"ref19","year":"2020","journal-title":"AnchorHash Code"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2594530"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"ref5","first-page":"329","article-title":"Beacon vector routing: Scalable point-to-point routing in wireless sensornets","author":"fonseca","year":"2005","journal-title":"Proc USENIX NSDI"},{"key":"ref8","first-page":"125","article-title":"Stateless datacenter load-balancing with Beamer","author":"olteanu","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2017.49"},{"key":"ref1","first-page":"523","article-title":"Maglev: A fast and reliable software network load balancer","author":"eisenbud","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref9","first-page":"111","article-title":"Balancing on the edge: Transport affinity without network state","author":"araujo","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref20","author":"gonnet","year":"1991","journal-title":"Handbook of Algorithms and Data Structures in Pascal and C"},{"key":"ref22","year":"2020","journal-title":"xxHash for Small Keys The Impressive Power of Modern Compilers"},{"key":"ref21","volume":"3","author":"knuth","year":"1998","journal-title":"The Art of Computer Programming Sorting and Searching"},{"key":"ref24","author":"hick","year":"0","journal-title":"CAIDA Anonymized 2016 Internet Trace equinix-chicago 2016-02-18 13 00-13 05 UTC Direction A"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2008.7476555"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9405508\/09288994.pdf?arnumber=9288994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:52:07Z","timestamp":1642006327000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9288994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":24,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2020.3039547","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]}}}