{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:31:07Z","timestamp":1740148267109,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132011","62221003"],"award-info":[{"award-number":["62132011","62221003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnsm.2024.3422092","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T17:32:20Z","timestamp":1720027940000},"page":"4830-4843","source":"Crossref","is-referenced-by-count":1,"title":["Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4366-4777","authenticated-orcid":false,"given":"Xinhao","family":"Deng","sequence":"first","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-4585","authenticated-orcid":false,"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8776-8730","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]},{"given":"Weijie","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3481-8447","authenticated-orcid":false,"given":"Yuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5274-5512","authenticated-orcid":false,"given":"Menghao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3469-0906","authenticated-orcid":false,"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"System Department, StepFun Inc., Palo Alto, CA, USA"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2656877.2656890"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3341302.3342085"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3387514.3405852"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/2890955.2890968"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3098822.3098824"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.14722\/ndss.2020.24007"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/INFOCOM41043.2020.9155470"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP46215.2023.10179464"},{"key":"ref9","first-page":"1","article-title":"Robust and reliable early-stage Website fingerprinting attacks via spatial-temporal distribution analysis","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Security","author":"Deng"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.14722\/ndss.2024.23081"},{"key":"ref11","first-page":"1","article-title":"Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns","volume-title":"Proc. ACM SIGSAC Conf. Comput. Commun. Secur.","author":"Fu"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2022.3142995"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/icsai.2012.6223254"},{"key":"ref14","first-page":"1359","article-title":"Scaling open {vSwitch} with a computational cache","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Design Implement. (NSDI 22)","author":"Rashelbach"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2890955.2890969"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3337821.3337896"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TNSM.2019.2951426"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1269899.1254914"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/INFCOM.2010.5461930"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2491185.2491188"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2740070.2626307"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ISCC.2018.8538355"},{"volume-title":"The CAIDA UCSD Anonymized Internet traces sampler","year":"2018","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TNET.2007.893156"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNET.2017.2776565"},{"key":"ref26","first-page":"1066","article-title":"Compressing rectilinear pictures and minimizing access control lists","volume-title":"Proc. 18th Annu. ACM-SIAM Symp. Discrete Algorithms","author":"Applegate"},{"volume-title":"Hot Interconnects VII","author":"Gupta","article-title":"Packet classification using hierarchical intelligent cuttings","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/INFOCOM.2018.8485947"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3341302.3342221"},{"issue":"5","key":"ref30","first-page":"1124","article-title":"An improved support vector machines with balanced binary decision tree for multi-class classification","volume":"35","author":"Lin","year":"2014","journal-title":"J. Chin. Comput. Syst."},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICDCS.2016.41"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3409109"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.4324\/9780203450994_chapter_10"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/863955.863980"},{"volume-title":"Stanford backbone router forwarding configuration","year":"2014","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/EWSDN.2014.33"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/978-3-642-35668-1_32"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TNET.2009.2030188"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TNET.2010.2061864"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TNET.2016.2611482"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/3387514.3405886"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TNSM.2021.3132275"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/2342356.2342424"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/1140277.1140313"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/INFCOM.2004.1354643"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/INFCOM.2000.832542"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TNSM.2016.2530687"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/CloudNet51028.2020.9335795"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/2535372.2535373"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/GLOCOM.2018.8647259"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/3050220.3050237"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10643497\/10582912.pdf?arnumber=10582912","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:44:02Z","timestamp":1725079442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10582912\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3422092","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}