{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:49:06Z","timestamp":1770338946985,"version":"3.49.0"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB2901504"],"award-info":[{"award-number":["2022YFB2901504"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20179"],"award-info":[{"award-number":["U20A20179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tpds.2023.3295454","type":"journal-article","created":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T17:45:30Z","timestamp":1689356730000},"page":"932-949","source":"Crossref","is-referenced-by-count":10,"title":["BurstBalancer: Do Less, Better Balance for Large-Scale Data Center Traffic"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9062-6565","authenticated-orcid":false,"given":"Zirui","family":"Liu","sequence":"first","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2495-7774","authenticated-orcid":false,"given":"Yikai","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0042-1828","authenticated-orcid":false,"given":"Zhuochen","family":"Fan","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2402-5854","authenticated-orcid":false,"given":"Tong","family":"Yang","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3534-8045","authenticated-orcid":false,"given":"Xiaodong","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6102-9195","authenticated-orcid":false,"given":"Ruwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6381-4026","authenticated-orcid":false,"given":"Kaicheng","family":"Yang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1160-1058","authenticated-orcid":false,"given":"Zihan","family":"Jiang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"given":"Zheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6741-6751","authenticated-orcid":false,"given":"Yi","family":"Huang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"given":"Cong","family":"Liu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"given":"Jing","family":"Hu","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company Ltd., Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4964-1135","authenticated-orcid":false,"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1681-4677","authenticated-orcid":false,"given":"Bin","family":"Cui","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP55882.2022.9940372"},{"key":"ref2","first-page":"407","article-title":"Let it flow: Resilient asymmetric load balancing with flowlet switching","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Des. Implementation","author":"Vanini"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2816042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2579622"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2988231"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2769458.2769474"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2011.44"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658640"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2017.8071533"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11925071_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098825"},{"key":"ref16","first-page":"357","article-title":"Multi-path transport for RDMA in datacenters","volume-title":"Proc. 15th USENIX Conf. Netw. Syst. Des. Implementation","author":"Lu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535375"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342390"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626309"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2992"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592803"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674985"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230551"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485847"},{"key":"ref25","first-page":"89","article-title":"Hedera: Dynamic flow scheduling for data center networks","volume-title":"Proc. 7th USENIX Conf. Netw. Syst. Des. Implementation","author":"Al-Fares"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934956"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232925"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737650"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190531"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005751"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787507"},{"key":"ref34","article-title":"Harnessing tcps burstiness with flowlet switching","volume-title":"Proc. 3rd ACM Workshop Hot Topics Netw.","author":"Sinha"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.43"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"ref37","first-page":"419","article-title":"007: Democratically finding the cause of packet drops","volume-title":"Proc. 15th USENIX Symp. Netw. Syst. Des. Implementation","author":"Arzani"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.146"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2431684"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098853"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775066"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"key":"ref48","first-page":"267","article-title":"Closed-loop network performance monitoring and diagnosis with SpiderMon","volume-title":"Proc. USENIX Conf. Netw. Syst. Des. Implementation","author":"Wang"},{"key":"ref49","first-page":"233","article-title":"Simplifying datacenter network debugging with PathDump","volume-title":"Proc. 12th USENIX Conf. Operating Syst. Des. Implementation","author":"Tammana"},{"key":"ref50","first-page":"453","article-title":"Distributed network monitoring and debugging with SwitchPointer","volume-title":"Proc. 15th USENIX Conf. Netw. Syst. Des. Implementation","author":"Tammana"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.72"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486031"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057080"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2858815"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098841"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018467"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117566"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380841"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/115992.116006"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209205"},{"key":"ref67","first-page":"701","article-title":"Contra: A programmable system for performance-aware routing","volume-title":"Proc. 17th USENIX Conf. Netw. Syst. Des. Implementation","author":"Hsu"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633056"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568017"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2987609"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009071"},{"key":"ref80","first-page":"81","article-title":"Exploiting a natural network effect for scalable, fine-grained clock synchronization","volume-title":"Proc. 15th USENIX Conf. Netw. Syst. Des. Implementation","author":"Geng"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314353"},{"key":"ref82","first-page":"991","article-title":"LightGuardian: A full-visibility, lightweight, in-band telemetry system using sketchlets","volume-title":"Proc. 18th USENIX Symp. Netw. Syst. Des. Implementation","author":"Zhao"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544248"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4297"},{"key":"ref91","first-page":"537","article-title":"Enabling ECN in multi-service multi-queue data centers","volume-title":"Proc. 13th USENIX Symp. Netw. Syst. Des. Implementation","author":"Bai"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/71\/10494199\/10184046.pdf?arnumber=10184046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T17:39:55Z","timestamp":1715621995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10184046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":83,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2023.3295454","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}