{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:46:42Z","timestamp":1730281602807,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/medcomnet49392.2020.9191475","type":"proceedings-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:21:21Z","timestamp":1599772881000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Back to the Future: Towards Hardware \"Netputing\" Architectures (position paper)"],"prefix":"10.1109","author":[{"given":"Giuseppe","family":"Bianchi","sequence":"first","affiliation":[]},{"given":"Marco","family":"Faltelli","sequence":"additional","affiliation":[]},{"given":"Valerio","family":"Bruschi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MCOM.2015.7045396"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JPROC.2019.2896848"},{"key":"ref12","article-title":"Netbricks: Taking the v out of NFV","author":"panda","year":"0","journal-title":"USENIX OSDI 2016"},{"year":"1996","author":"callon","article-title":"Rfc 1925: The twelve networking truths","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2534169.2486011"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2656877.2656890"},{"key":"ref16","article-title":"Compiling packet programs to reconfigurable switches","volume":"15","author":"jose","year":"0","journal-title":"NSDI"},{"key":"ref17","article-title":"FlowBlaze: Stateful Packet Processing in Hardware","author":"pontarelli","year":"0","journal-title":"NSDI&#x2019;13"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-0-85729-277-3_7"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/157485.164585","article-title":"automatic functional test generation using the extended finite state machine model","author":"cheng","year":"1993","journal-title":"30th ACM\/IEEE Design Automation Conference"},{"key":"ref4","article-title":"Domain-specific architectures","author":"hennessy","year":"2017","journal-title":"Computer Architecture Sixth Edition A Quantitative Approach"},{"year":"2016","author":"simonite","article-title":"Moore&#x2019;s law is dead. now what?","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/HOTCHIPS.2019.8875654"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3079856.3080246"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2602204.2602219"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1355734.1355746"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3282307"},{"key":"ref9","article-title":"Using block ram for high performance read\/write cams","volume":"204","author":"brelet","year":"2000","journal-title":"Xilinx Inc Application Notes"},{"year":"0","article-title":"Gartner top 10 strategic technology trends for 2019","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/EuCNC.2019.8802031"},{"year":"0","author":"siracusano","article-title":"Deep learning inference on commodity network interface cards","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICIN48450.2020.9059417"},{"key":"ref24","article-title":"Azure accelerated networking: Smartnics in the public cloud","author":"firestone","year":"0","journal-title":"USENIX NSDI 2018"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1002\/nem.1957"},{"key":"ref26","article-title":"Beyond smartnics: Towards a fully programmable cloud","author":"caulfield","year":"2018","journal-title":"Proceedings of IEEE HPSR 2018"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNSM.2019.2948467"}],"event":{"name":"2020 Mediterranean Communication and Computer Networking Conference (MedComNet)","start":{"date-parts":[[2020,6,17]]},"location":"Arona, Italy","end":{"date-parts":[[2020,6,19]]}},"container-title":["2020 Mediterranean Communication and Computer Networking Conference (MedComNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9186748\/9191448\/09191475.pdf?arnumber=9191475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:00Z","timestamp":1656453180000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9191475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/medcomnet49392.2020.9191475","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}