{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:53:57Z","timestamp":1761663237045},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/cloudnet.2013.6710553","type":"proceedings-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T19:14:04Z","timestamp":1390590844000},"page":"18-24","source":"Crossref","is-referenced-by-count":34,"title":["An efficient flow cache algorithm with improved fairness in Software-Defined Data Center Networks"],"prefix":"10.1109","author":[{"given":"Bu-Sung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Renuga","family":"Kanagavelu","sequence":"additional","affiliation":[]},{"given":"Khin Mi Mi","family":"Aung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2012.6506562"},{"journal-title":"Ostinato - Packet\/traffic Genarator and Analyzer","year":"0","key":"18"},{"journal-title":"FIPS 180-1 Secure hash standard","year":"1995","key":"15"},{"journal-title":"Open Networking Foundation","year":"2012","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851224"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934956"},{"key":"11","article-title":"Power aware tcams for routing table look up","author":"wu","year":"2010","journal-title":"Proc of IEEE GreenCom"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/320083.320092"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868448"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1289292"},{"key":"7","article-title":"Evolution of cache replacement policies to track heavy-hitter flows","author":"zadnik","year":"2011","journal-title":"Proc of PAM'11"},{"journal-title":"OpenFlow Reference System","year":"0","key":"6"},{"key":"5","article-title":"Applying nox to data center","author":"tavakoli","year":"2009","journal-title":"Proc of 8th ACM Workshop on Hot Topics in Networks"},{"key":"4","article-title":"A power benchmarking framework for network devices","author":"mahadevan","year":"2009","journal-title":"Proceedings of the 8th International IFIP-TC 6 Networking Conference NETWORKING '09"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208657"},{"key":"8","article-title":"Altf: A replacement policy to cache elephant flows in th presence of mice flooding","author":"pan","year":"0","journal-title":"Proc of ICC'12"}],"event":{"name":"2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)","start":{"date-parts":[[2013,11,11]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,11,13]]}},"container-title":["2013 IEEE 2nd International Conference on Cloud Networking (CloudNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693291\/6710549\/06710553.pdf?arnumber=6710553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:26:23Z","timestamp":1490221583000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6710553\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cloudnet.2013.6710553","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}