{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:38:24Z","timestamp":1760027904857,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T00:00:00Z","timestamp":1384992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-09-1-0100"],"award-info":[{"award-number":["FA9550-09-1-0100"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-12-1-0757"],"award-info":[{"award-number":["N00014-12-1-0757"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1111698"],"award-info":[{"award-number":["CNS-1111698"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,21]]},"DOI":"10.1145\/2535771.2535792","type":"proceedings-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T19:50:52Z","timestamp":1387569052000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Managing the network with Merlin"],"prefix":"10.1145","author":[{"given":"Robert","family":"Soul\u00e9","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"given":"Shrutarshi","family":"Basu","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Robert","family":"Kleinberg","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Emin G\u00fcn","family":"Sirer","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Nate","family":"Foster","sequence":"additional","affiliation":[{"name":"Cornell University"}]}],"member":"320","published-online":{"date-parts":[[2013,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"Ahuja R. K.","year":"1993","unstructured":"R. K. Ahuja , T. L. Magnanti , and J. B. Orlin . Network Flows: Theory, Algorithms, and Applications . Prentice-Hall, Inc. , 1993 . R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc., 1993."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018465"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.48.2.318.12378"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342459"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646689.703115"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.54"},{"key":"e_1_3_2_1_11_1","first-page":"137","volume-title":"OSDI","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: Simplified Data Processing on Large Clusters . In OSDI , pages 137 -- 150 , Dec. 2004 . J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, pages 137--150, Dec. 2004."},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"17","volume":"19","author":"Dinitz Y.","year":"1999","unstructured":"Y. Dinitz , N. Garg , and M. X. Goemans . On the Single-Source Unsplittable Flow Problem. Combinatorica , 19 ( 1 ): 17 -- 41 , Jan. 1999 . Y. Dinitz, N. Garg, and M. X. Goemans. On the Single-Source Unsplittable Flow Problem. Combinatorica, 19(1): 17--41, Jan. 1999.","journal-title":"On the Single-Source Unsplittable Flow Problem. Combinatorica"},{"key":"e_1_3_2_1_13_1","first-page":"7","volume-title":"NSDI","author":"Dixon C.","year":"2011","unstructured":"C. Dixon , H. Uppal , V. Brajkovic , D. Brandon , T. Anderson , and A. Krishnamurthy . ETTM: A Scalable Fault Tolerant Network Manager . In NSDI , pages 7 -- 21 , Mar. 2011 . C. Dixon, H. Uppal, V. Brajkovic, D. Brandon, T. Anderson, and A. Krishnamurthy. ETTM: A Scalable Fault Tolerant Network Manager. In NSDI, pages 7--21, Mar. 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486003"},{"key":"e_1_3_2_1_16_1","volume-title":"The Frenetic Network Controller. In The OCaml Users and Developers Workshop","author":"Foster N.","year":"2013","unstructured":"N. Foster , A. Guha , The Frenetic Network Controller. In The OCaml Users and Developers Workshop , Sept. 2013 . N. Foster, A. Guha, et al. The Frenetic Network Controller. In The OCaml Users and Developers Workshop, Sept. 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390233"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592583"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"e_1_3_2_1_21_1","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft J.","year":"1979","unstructured":"J. Hopcroft and J. Ullman . Introduction to Automata Theory, Languages, and Computation . Addison-Wesley , 1979 . J. Hopcroft and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 1979."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"e_1_3_2_1_24_1","first-page":"297","volume-title":"NSDI","author":"Jeyakumar V.","year":"2013","unstructured":"V. Jeyakumar , M. Alizadeh , D. Mazi\u00e8res , B. Prabhakar , A. Greenberg , and C. Kim . EyeQ: Practical Network Performance Isolation at the Edge . In NSDI , pages 297 -- 312 , Apr. 2013 . V. Jeyakumar, M. Alizadeh, D. Mazi\u00e8res, B. Prabhakar, A. Greenberg, and C. Kim. EyeQ: Practical Network Performance Isolation at the Edge. In NSDI, pages 297--312, Apr. 2013."},{"key":"e_1_3_2_1_25_1","first-page":"68","volume-title":"FOCS","author":"Kleinberg J. M.","year":"1996","unstructured":"J. M. Kleinberg . Single-Source Unsplittable Flow . In FOCS , pages 68 -- 77 , Oct. 1996 . J. M. Kleinberg. Single-Source Unsplittable Flow. In FOCS, pages 68--77, Oct. 1996."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539799355314"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103685"},{"key":"e_1_3_2_1_31_1","first-page":"1","volume-title":"NSDI","author":"Monsanto C.","year":"2013","unstructured":"C. Monsanto , J. Reich , N. Foster , J. Rexford , and D. Walker . Composing Software-Defined Networks . In NSDI , pages 1 -- 13 , Apr. 2013 . C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing Software-Defined Networks. In NSDI, pages 1--13, Apr. 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342396"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_1_34_1","first-page":"229","volume-title":"LISA","author":"Roesch M.","year":"1999","unstructured":"M. Roesch . Snort---Lightweight Intrusion Detection for Networks. In LISA , pages 229 -- 238 , Nov. 1999 . M. Roesch. Snort---Lightweight Intrusion Detection for Networks. In LISA, pages 229--238, Nov. 1999."},{"key":"e_1_3_2_1_35_1","first-page":"24","volume-title":"NSDI","author":"Sekar V.","year":"2012","unstructured":"V. Sekar , N. Egi , S. Ratnasamy , M. K. Reiter , and G. Shi . Design and Implementation of a Consolidated Middlebox Architecture . In NSDI , pages 24 -- 38 , Apr. 2012 . V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. Design and Implementation of a Consolidated Middlebox Architecture. In NSDI, pages 24--38, Apr. 2012."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"e_1_3_2_1_37_1","first-page":"1","volume-title":"HotCloud","author":"Shieh A.","year":"2010","unstructured":"A. Shieh , S. Kandula , A. Greenberg , and C. Kim . Seawall: Performance Isolation for Cloud Datacenter Networks . In HotCloud , pages 1 -- 8 , June 2010 . A. Shieh, S. Kandula, A. Greenberg, and C. Kim. Seawall: Performance Isolation for Cloud Datacenter Networks. In HotCloud, pages 1--8, June 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868468"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755949"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486030"}],"event":{"name":"HotNets-XII: Twelfth ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"College Park Maryland","acronym":"HotNets-XII"},"container-title":["Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535792","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2535771.2535792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:24Z","timestamp":1750235964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,21]]},"references-count":40,"alternative-id":["10.1145\/2535771.2535792","10.1145\/2535771"],"URL":"https:\/\/doi.org\/10.1145\/2535771.2535792","relation":{},"subject":[],"published":{"date-parts":[[2013,11,21]]},"assertion":[{"value":"2013-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}