{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:02:47Z","timestamp":1766484167836,"version":"3.37.3"},"reference-count":92,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,13]]},"DOI":"10.1109\/icnp49622.2020.9259415","type":"proceedings-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T20:56:20Z","timestamp":1605905780000},"page":"1-12","source":"Crossref","is-referenced-by-count":22,"title":["Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs"],"prefix":"10.1109","author":[{"given":"Shuhe","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zili","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Minhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiamin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Masoud","family":"Moshref","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Gong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1145\/2619239.2626310"},{"key":"ref72","first-page":"117","article-title":"The design and implementation of open vswitch","author":"pfaff","year":"2015","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1145\/2740070.2626309"},{"year":"1997","author":"oppenheim","journal-title":"Signals and Systems","key":"ref70"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1145\/1028788.1028814"},{"key":"ref77","first-page":"233","article-title":"csamp: A system for network-wide flow monitoring","volume":"8","author":"sekar","year":"2008","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.14722\/ndss.2014.23233"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1145\/2716281.2836121"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1145\/2785956.2787472"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/S0167-5060(08)70343-1"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1145\/2535372.2535397"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1145\/2556610.2556621"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3098822.3098839"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/90.251892"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/0022-0000(85)90041-8"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/90.929850"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/3230543.3230555"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3230543.3230555"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3005745.3005748"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/1811099.1811056"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1145\/1355734.1355746"},{"key":"ref62","first-page":"1","article-title":"Composing software defined networks","volume":"13","author":"monsanto","year":"2013","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1145\/3098822.3098824"},{"key":"ref63","article-title":"Flow-level state transition as a new switch primitive for sdn","author":"moshref","year":"2014","journal-title":"HotSDN"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/INFCOM.2013.6567015"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1145\/2740070.2626291","article-title":"Dream: dynamic resource allocation for software-defined measurement","volume":"44","author":"moshref","year":"2015","journal-title":"SIGCOMM"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2018436.2018466"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1145\/2716281.2836099"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1145\/2934872.2934879"},{"key":"ref29","article-title":"Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags","author":"fayazbakhsh","year":"2014","journal-title":"NSDI"},{"key":"ref67","first-page":"157","article-title":"Scalable rule management for data centers","volume":"13","author":"moshref","year":"2013","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1145\/3098822.3098829"},{"year":"2017","author":"networks","article-title":"Barefoot: The world&#x2019;s fastest and most programmable networks","key":"ref69"},{"key":"ref2","first-page":"19","article-title":"Hedera: Dynamic flow scheduling for data center networks","volume":"10","author":"al-fares","year":"2010","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1402958.1402967"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/1764873.1764885"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3050220.3050237"},{"year":"2016","article-title":"The caida anonymized internet traces 2016 dataset","key":"ref21"},{"year":"2017","article-title":"Spirent testcenter","key":"ref24"},{"year":"2007","author":"claise","article-title":"Rfc 3954: Cisco systems netflow services export version 9 (2004)","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TNET.2005.860096"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.jalgor.2003.12.001"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/2890955.2890968"},{"key":"ref51","first-page":"113","article-title":"Header space analysis: Static checking for networks","volume":"12","author":"kazemian","year":"2012","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1145\/2592798.2592803"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1145\/2535372.2535411"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1145\/3131365.3131375"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/2934872.2934906"},{"year":"2016","journal-title":"Optimization Model and Lingo","key":"ref58"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1145\/2999572.2999609"},{"key":"ref56","first-page":"311","article-title":"Flowradar: A better netflow for data centers","author":"li","year":"2016","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/2674005.2675011"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1145\/1012888.1005709"},{"key":"ref53","first-page":"111","article-title":"Exit from hell? reducing the impact of amplification ddos attacks","author":"k\u00fchrer","year":"2014","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref10","first-page":"455","article-title":"Information-agnostic flow scheduling for commodity data centers","author":"bai","year":"2015","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1592681.1592692"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/3185467.3185476"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2079296.2079304"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2602204.2602211"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/362686.362692"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1159913.1159950"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1145\/3050220.3063772"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2656877.2656890"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1145\/2508859.2516684"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/2486001.2486011"},{"key":"ref84","first-page":"407","article-title":"Let it flow: Resilient asymmetric load balancing with flowlet switching","author":"vanini","year":"2017","journal-title":"NSDI"},{"year":"2013","author":"bright","article-title":"Spamhaus ddos grows to internet-threatening size","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1109\/TNET.2017.2726550"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.comnet.2010.06.018"},{"key":"ref80","first-page":"67","article-title":"Evaluating the power of flexible packet processing for network resource allocation","author":"sharma","year":"2017","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/INFCOM.2011.5934923"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ALLERTON.2008.4797706"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2834050.2834064"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1851182.1851192"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2619239.2626316"},{"key":"ref85","first-page":"149","article-title":"New streaming algorithms for fast detection of superspreaders","author":"venkataraman","year":"2005","journal-title":"NDSS"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2578855.2535862"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"ref7","first-page":"19","article-title":"Less is more: trading a little bandwidth for ultra-low latency in the data center","author":"alizadeh","year":"2012","journal-title":"NSDI"},{"key":"ref49","article-title":"Metron: Nfv service chains at the true speed of the underlying hardware","author":"katsikas","year":"2018","journal-title":"NSDI"},{"key":"ref87","first-page":"29","article-title":"Software defined traffic measurement with opensketch","volume":"13","author":"yu","year":"2013","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.1145\/3098822.3098830"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2934872.2934892"},{"key":"ref46","first-page":"103","article-title":"Compiling packet programs to reconfigurable switches","author":"jose","year":"2015","journal-title":"NSDI"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3098822.3098831"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2535372.2535373"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/SECPRI.2004.1301325"},{"year":"2010","author":"hintjens","article-title":"Zeromq: The guide","key":"ref42"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/2774993.2775069"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/2491185.2491188"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.17487\/rfc2992"}],"event":{"name":"2020 IEEE 28th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2020,10,13]]},"location":"Madrid, Spain","end":{"date-parts":[[2020,10,16]]}},"container-title":["2020 IEEE 28th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9259328\/9259327\/09259415.pdf?arnumber=9259415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:21:55Z","timestamp":1656375715000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9259415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/icnp49622.2020.9259415","relation":{},"subject":[],"published":{"date-parts":[[2020,10,13]]}}}