{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:15:35Z","timestamp":1768680935411,"version":"3.49.0"},"reference-count":78,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/icnp49622.2020.9259414","type":"proceedings-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:56:20Z","timestamp":1605905780000},"page":"1-12","source":"Crossref","is-referenced-by-count":20,"title":["ApproSync: Approximate State Synchronization for Programmable Networks"],"prefix":"10.1109","author":[{"given":"Xiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806778"},{"key":"ref72","first-page":"583","article-title":"Scaling distributed machine learning with the parameter server","author":"li","year":"2014","journal-title":"OSDI"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465355"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3341558.3342202"},{"key":"ref76","article-title":"Blinkdb and g-ola: Supporting continuous answers with error bars in sparksql","author":"agarwal","year":"2015","journal-title":"Spark Summit"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.14778\/3021924.3021925"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2015.2472014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/863965.863966"},{"key":"ref75","first-page":"275","article-title":"Aggregation and degradation in jetstream: Streaming analytics in the wide area","author":"rabkin","year":"2014","journal-title":"NSDI"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-019-00565-w"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018466"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879186"},{"key":"ref31","year":"0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117548"},{"key":"ref34","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"NSDI"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.025"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956987"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref67","first-page":"90","article-title":"P4nfv: An nfv architecture with flexible data plane reconfiguration","author":"he","year":"2018","journal-title":"CNSM"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050233"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405822"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229586"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref24","first-page":"61","article-title":"Flow-level state transition as a new switch primitive for sdn","author":"moshref","year":"2014","journal-title":"HotSDN"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005762"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316230"},{"key":"ref25","year":"0","journal-title":"The CAIDA anonymized internet traces 2018 dataset"},{"key":"ref50","article-title":"A quorum-based commit protocol","author":"skeen","year":"1982"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732955"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848076"},{"key":"ref58","first-page":"365","article-title":"Chimera: A declarative language for streaming network traffic analysis","author":"borders","year":"2012","journal-title":"Security"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref56","year":"0"},{"key":"ref55","year":"0"},{"key":"ref54","year":"0"},{"key":"ref53","year":"0"},{"key":"ref52","year":"0","journal-title":"Data-Plane Development Kit"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref12","first-page":"823","article-title":"Scaling hardware accelerated network monitoring to concurrent and dynamic queries with *flow","author":"sonchack","year":"2018","journal-title":"ATC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"ref14","year":"0","journal-title":"Barefoot tofino"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787508"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3265723.3265731"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"ref3","first-page":"311","article-title":"Flowradar: a better netflow for data centers","author":"li","year":"2016","journal-title":"NSDI"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref5","first-page":"817","article-title":"Bohatei: Flexible and elastic ddos defense","author":"fayaz","year":"2015","journal-title":"Security"},{"key":"ref8","year":"0"},{"key":"ref7","year":"0"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582339"},{"key":"ref9","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14778\/3358701.3358702"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055548"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319567"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/356842.356846"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00045"},{"key":"ref41","article-title":"The p4-14 language specification, version 1.0.4","year":"2017"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735511"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737383"}],"event":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","location":"Madrid, Spain","start":{"date-parts":[[2020,10,13]]},"end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 28th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9259328\/9259327\/09259414.pdf?arnumber=9259414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:23:23Z","timestamp":1656375803000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9259414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/icnp49622.2020.9259414","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}