{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:38:59Z","timestamp":1774539539439,"version":"3.50.1"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/netsoft51509.2021.9492531","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:30:02Z","timestamp":1627345802000},"page":"79-87","source":"Crossref","is-referenced-by-count":8,"title":["Revisiting Heavy-Hitter Detection on Commodity Programmable Switches"],"prefix":"10.1109","author":[{"given":"Xin Zhe","family":"Khooi","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Levente","family":"Csikor","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Jialin","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]},{"given":"Min Suk","family":"Kang","sequence":"additional","affiliation":[{"name":"Kaist"}]},{"given":"Dinil Mon","family":"Divakaran","sequence":"additional","affiliation":[{"name":"Trustwave"}]}],"member":"263","reference":[{"key":"ref39","article-title":"The Aurora and Medusa Projects","volume":"26","author":"sbz","year":"2003","journal-title":"IEEE Data Eng Bull ser"},{"key":"ref38","article-title":"Memento: Making Sliding Windows Efficient for Heavy Hitters","author":"ben-basat","year":"2018","journal-title":"ACM CoNeXT"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.04.025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674989"},{"key":"ref31","article-title":"Effective DDoS Mitigation in Distributed Peering Environments","year":"2018","journal-title":"White Paper"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633055"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524364"},{"key":"ref36","article-title":"Open-Tofino","year":"0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425928"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref60","article-title":"Agilio CX SmartNICs","year":"0"},{"key":"ref28","article-title":"A Deeper Dive Into Barefoot Networks Technology","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref29","article-title":"dSketch","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486031"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982739"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365408"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3432729"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref50","article-title":"FCM P4","author":"song","year":"2020"},{"key":"ref51","article-title":"The CAIDA UCSD Anonymized Internet Traces - 2016 March","year":"0"},{"key":"ref59","article-title":"Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware","author":"turkovic","year":"2020","journal-title":"IFIP Networking"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234226"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110307"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405872"},{"key":"ref55","article-title":"P8: P4 with Predictable Packet Processing Performance","author":"harkous","year":"2020","journal-title":"IEEE TNSM"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"ref53","article-title":"The CAIDA UCSD Anonymized Internet Traces - 2019 January","year":"0"},{"key":"ref52","article-title":"The CAIDA UCSD Anonymized Internet Traces - 2018 March","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637226"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107108"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"ref12","article-title":"On Providing Low-cost Flow Monitoring for SDN Networks","author":"yahyaoui","year":"2020","journal-title":"IEEE Cloudnet"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254759"},{"key":"ref14","article-title":"sFlow Sampling Rates","author":"phaal","year":"2009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863992"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-020-00272-w"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref18","article-title":"Intel &#x00AE; Tofino_TM","year":"0"},{"key":"ref19","article-title":"Intel &#x00AE; Tofino_TM2","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626316"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890969"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref5","article-title":"Revisiting Heavy-Hitters: Don&#x2019;t Count Packets, Compute Flow Inter-packet Metrics in the Data Plane","author":"singh","year":"2020","journal-title":"ACM SIGCOMM Posters and Demos"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165488"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2765719"},{"key":"ref49","article-title":"Princeton Cabernet","year":"0"},{"key":"ref9","article-title":"Defeating Protocol Abuse with P4: Application to Explicit Congestion Notification","author":"laraba","year":"2020","journal-title":"IFIP Networking"},{"key":"ref46","article-title":"Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs","author":"wang","year":"2020","journal-title":"IEEE ICNP"},{"key":"ref45","article-title":"Enabling Event-Triggered Data Plane Monitoring","author":"ku?era","year":"2020","journal-title":"ACM SOSR"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431295"},{"key":"ref47","article-title":"Programmable Calendar Queues for High-speed Packet Scheduling","author":"sharma","year":"2020","journal-title":"USENIX NSDI"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.65"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"ref44","article-title":"PSA","year":"2018"},{"key":"ref43","article-title":"Towards In-Network Time-Decaying Aggregates for Heavy-Hitter Detection","author":"khooi","year":"2020","journal-title":"ACM SIGCOMM Posters and Demos"}],"event":{"name":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","location":"Tokyo, Japan","start":{"date-parts":[[2021,6,28]]},"end":{"date-parts":[[2021,7,2]]}},"container-title":["2021 IEEE 7th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9492309\/9492525\/09492531.pdf?arnumber=9492531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T21:25:02Z","timestamp":1653341102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/netsoft51509.2021.9492531","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}