{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T08:05:44Z","timestamp":1774080344138,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnet.2024.3364173","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T20:01:56Z","timestamp":1710792116000},"page":"2858-2874","source":"Crossref","is-referenced-by-count":2,"title":["Edge-Disjoint Tree Allocation for Multi-Tenant Cloud Security in Datacenter Topologies"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-1238","authenticated-orcid":false,"given":"Ori","family":"Rottenstreich","sequence":"first","affiliation":[{"name":"Mellanox Technologies (Nvidia), Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3724-4311","authenticated-orcid":false,"given":"Jose","family":"Yallouz","sequence":"additional","affiliation":[{"name":"Mellanox Technologies (Nvidia), Haifa, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211860"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018465"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2012.6388058"},{"key":"ref4","article-title":"An analysis of the cloud computing security problem","author":"Almorsy","year":"2016","journal-title":"arXiv:1609.01107"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2010.127"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3317550.3321436"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3405672.3405807"},{"key":"ref10","article-title":"In-network aggregation for shared machine learning clusters","volume-title":"Proc. Conf. Mach. Learn. Syst. (MLSys)","author":"Gebara"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-8534-821"},{"key":"ref12","article-title":"Scaling distributed machine learning with in-network aggregation","volume-title":"Proc. USENIX NSDI","author":"Sapio"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674996"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152461"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMHPC.2016.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906747"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HiPINEB.2017.11"},{"key":"ref20","article-title":"On the diversity of cluster workloads and its impact on research results","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Amvrosiadis"},{"key":"ref21","article-title":"Packing Steiner trees","volume-title":"Proc. ACM-SIAM","author":"Jain"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018444"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524341"},{"key":"ref24","article-title":"Seawall: Performance isolation for cloud datacenter networks","volume-title":"Proc. USENIX HotCloud","author":"Shieh"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185493"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018448"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.87"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2017.91"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00029"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787479"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494853"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446760"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322620"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2015.96"},{"key":"ref35","volume-title":"Introduction to Algorithms","author":"Cormen","year":"2009"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1112\/jlms\/s1-36.1.445"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1112\/jlms\/s1-36.1.221"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0095-8956(74)90087-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1287\/moor.10.4.701"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0120910"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2438254"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2823912"},{"key":"ref43","article-title":"Improved Steiner tree approximation in graphs","volume-title":"Proc. ACM-SIAM SODA","author":"Robins"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806769"},{"key":"ref45","volume-title":"The Design and Analysis of Computer Algorithms","author":"Aho","year":"1974"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2007.v003a006"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480101393155"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.6028\/jres.084.024"},{"issue":"4","key":"ref49","article-title":"The Atlas cluster trace repository","volume":"43","author":"Amvrosiadis","year":"2018","journal-title":"USENIX Login"},{"key":"ref50","first-page":"1","article-title":"MLaaS in the wild: Workload analysis and scheduling in large-scale heterogeneous GPU clusters","volume-title":"Proc. USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Weng"},{"key":"ref51","volume-title":"Alibaba Cluster Trace Program","year":"2021"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10640200\/10474209.pdf?arnumber=10474209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:46:30Z","timestamp":1724960790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10474209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3364173","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}