{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:58:40Z","timestamp":1767085120335},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1109\/ipccc59175.2023.10253863","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T17:44:32Z","timestamp":1697651072000},"page":"52-59","source":"Crossref","is-referenced-by-count":1,"title":["CORN: Cloud-optimized RDMA Networking"],"prefix":"10.1109","volume":"1","author":[{"given":"Jung-Hwan","family":"Cha","sequence":"first","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Shinhyeok","family":"Kang","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Yewon","family":"Kang","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Hansaem","family":"Seo","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Jungeun","family":"Lee","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Jongsung","family":"Kim","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]},{"given":"Minsung","family":"Jang","sequence":"additional","affiliation":[{"name":"Cloud Research Team, SAMSUNG SDS,Seoul,South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787484"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2936519"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.3016891"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787510"},{"key":"ref7","volume-title":"TCP\/IP illustrated","volume":"1","author":"Fall","year":"2011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"ref10","article-title":"Power and deterministic rules of thumb for probabilistic problems in computer communications","volume-title":"ICC\u201979; International Conference on Communications","volume":"3","author":"Kleinrock"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2019.8846946"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230557"},{"article-title":"PowerTCP: Pushing the performance limits of datacenter networks","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Addanki","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934903"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3375235.3375239"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796803"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651938"},{"article-title":"Re-architecting congestion management in lossless ethernet","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Cheng","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267826"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230553"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3098583.3098588"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005760"},{"volume-title":"IEEE. 802.11Qbb. Priority based flow control","year":"2011","key":"ref26"},{"volume-title":"Network Simulator 3 (ns-3)","key":"ref27"},{"volume-title":"Ultra Ethernet Consortium","key":"ref28"}],"event":{"name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","start":{"date-parts":[[2023,11,17]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2023,11,19]]}},"container-title":["2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10253817\/10253818\/10253863.pdf?arnumber=10253863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:35:35Z","timestamp":1709346935000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10253863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ipccc59175.2023.10253863","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]}}}