{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T16:32:52Z","timestamp":1754152372905,"version":"3.41.2"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation (DFG)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002014","name":"Collaborative Research Center (CRC) 1053","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1109\/netsoft64993.2025.11080623","type":"proceedings-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T18:02:32Z","timestamp":1753120952000},"page":"468-476","source":"Crossref","is-referenced-by-count":0,"title":["Slicing Match-Action Pipeline Resources for Multitenancy on Programmable Switches"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Krude","sequence":"first","affiliation":[{"name":"RWTH Aachen University,Germany"}]},{"given":"Felix","family":"Frei","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Germany"}]},{"given":"Pedram","family":"Ahmadiyeh","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Germany"}]},{"given":"Ren\u00e9","family":"Glebke","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Germany"}]},{"given":"Mirko","family":"Stoffers","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599726"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3234200.3234251"},{"key":"ref3","article-title":"Programmable In-Network security for context-aware BYOD policies","author":"Kang","year":"2020","journal-title":"USENIX Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3527974.3545725"},{"key":"ref6","article-title":"Scaling Distributed Machine Learning with In-Network Aggregation","author":"Sapio","year":"2021","journal-title":"NSDI"},{"key":"ref7","article-title":"NetChain: Scale-Free Sub-RTT Coordination","author":"Jin","year":"2018","journal-title":"NSDI"},{"key":"ref8","article-title":"The Case for NetworkAccelerated Query Processing","author":"Lernen","year":"2019","journal-title":"CIDR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref10","article-title":"Isolation Mechanisms for High-Speed Packet-Processing Pipelines","author":"Wang","year":"2022","journal-title":"NSDI"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431329"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2953031"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483353"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281436"},{"key":"ref15","article-title":"Multitenancy for Fast and Programmable Networks in the Cloud","author":"Wang","year":"2020","journal-title":"HotCloud"},{"volume-title":"P4Bricks: Enabling multiprocessing using Linker-based network data plane architecture","year":"2018","author":"Soni","key":"ref16"},{"key":"ref17","article-title":"Compiling Packet Programs to Reconfigurable Switches","author":"Jose","year":"2015","journal-title":"NSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999607"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894308"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604864"},{"key":"ref21","article-title":"Multitenant In-Network Acceleration with SwitchVM","author":"Khashab","year":"2024","journal-title":"NSDI"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672230"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3242072"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604835"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405879"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446760"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3237244"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228974"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185497"},{"volume-title":"Leveraging Stratum and Tofino Fast Refresh for Software Upgrades","year":"2018","author":"Bas","key":"ref30"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1109\/NetSoft57336.2023.10175468","article-title":"State4: State-preserving Reconfiguration of P4programmable Switches","volume-title":"NetSoft","author":"Ji","year":"2023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3359993.3366643"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487377"},{"key":"ref34","article-title":"Runtime Programmable Switches","author":"Xing","year":"2022","journal-title":"NSDI"},{"key":"ref35","article-title":"Synthesizing Runtime Programmable Switch Updates","author":"Qiu","year":"2023","journal-title":"NSDI"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487367"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494842"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405819"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365408"},{"volume-title":"P4 Learning","author":"Molero","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405823"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS49255.2021.9468247"},{"volume-title":"P4 Tutorial","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3472873.3472881"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110246"},{"volume-title":"Intel\u2019s tofino p4 software is now open source","year":"2025","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431332"}],"event":{"name":"2025 IEEE 11th International Conference on Network Softwarization (NetSoft)","start":{"date-parts":[[2025,6,23]]},"location":"Budapest, Hungary","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE 11th International Conference on Network Softwarization (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11080530\/11080531\/11080623.pdf?arnumber=11080623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T04:50:04Z","timestamp":1753159804000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11080623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/netsoft64993.2025.11080623","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]}}}