{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:45Z","timestamp":1750306605549,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natinoal Science Foundation","award":["NSF grant TC-1111520 and the NSF Career Award No.0953622"],"award-info":[{"award-number":["NSF grant TC-1111520 and the NSF Career Award No.0953622"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1145\/2716281.2836092","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T18:16:29Z","timestamp":1476209789000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Alpaca"],"prefix":"10.1145","author":[{"given":"Nanxi","family":"Kang","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Sanjay","family":"Rao","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Jennifer","family":"Rexford","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2015,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936161"},{"key":"e_1_3_2_1_2_1","unstructured":"\"Production quality multilayer open virtual switch.\" http:\/\/openvswitch.org\/.  \"Production quality multilayer open virtual switch.\" http:\/\/openvswitch.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2026415"},{"key":"e_1_3_2_1_4_1","volume-title":"Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags,\" in NSDI","author":"Fayazbakhsh S. K.","year":"2014","unstructured":"S. K. Fayazbakhsh , L. Chiang , V. Sekar , M. Yu , and J. C. Mogul , \" Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags,\" in NSDI , 2014 . S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul, \"Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags,\" in NSDI, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"e_1_3_2_1_8_1","unstructured":"R. Ozdag \"Intel\u00aeEthernet Switch FM6000 Series-Software Defined Networking \" Intel Corporation 2012.  R. Ozdag \"Intel\u00aeEthernet Switch FM6000 Series-Software Defined Networking \" Intel Corporation 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"Performance analysis of OpenFlow hardware,\" tech. rep","author":"Appelman M.","year":"2012","unstructured":"M. Appelman and M. D. Boer , \" Performance analysis of OpenFlow hardware,\" tech. rep ., University of Amsterdam , Feb 2012 . http:\/\/www.delaat.net\/rp\/2011-2012\/p18\/report.pdf. M. Appelman and M. D. Boer, \"Performance analysis of OpenFlow hardware,\" tech. rep., University of Amsterdam, Feb 2012. http:\/\/www.delaat.net\/rp\/2011-2012\/p18\/report.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491188"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644909"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535377"},{"key":"e_1_3_2_1_13_1","volume-title":"ACM SIGCOMM","author":"Zave P.","year":"2013","unstructured":"P. Zave and J. Rexford , \" The design space of network mobility,\" in Recent Advances in Networking . ACM SIGCOMM , 2013 . P. Zave and J. Rexford, \"The design space of network mobility,\" in Recent Advances in Networking. ACM SIGCOMM, 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"Serval: An end-host stack for service-centric networking,\" in USENIX NSDI","author":"Nordstr\u00f6m E.","year":"2012","unstructured":"E. Nordstr\u00f6m , D. Shue , P. Gopalan , R. Kiefer , M. Arye , S. Ko , J. Rexford , and M. J. Freedman , \" Serval: An end-host stack for service-centric networking,\" in USENIX NSDI , 2012 . E. Nordstr\u00f6m, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Ko, J. Rexford, and M. J. Freedman, \"Serval: An end-host stack for service-centric networking,\" in USENIX NSDI, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2030188"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2165323"},{"key":"e_1_3_2_1_17_1","volume-title":"Minimizing rulesets for TCAM implementation,\" in IEEE INFOCOM","author":"McGeer R.","year":"2009","unstructured":"R. McGeer and P. Yalagandula , \" Minimizing rulesets for TCAM implementation,\" in IEEE INFOCOM , 2009 . R. McGeer and P. Yalagandula, \"Minimizing rulesets for TCAM implementation,\" in IEEE INFOCOM, 2009."},{"key":"e_1_3_2_1_18_1","volume-title":"Constructing optimal IP routing tables,\" in IEEE INFOCOM","author":"Draves R.","year":"1999","unstructured":"R. Draves , C. King , S. Venkatachary , and B. Zill , \" Constructing optimal IP routing tables,\" in IEEE INFOCOM , 1999 . R. Draves, C. King, S. Venkatachary, and B. Zill, \"Constructing optimal IP routing tables,\" in IEEE INFOCOM, 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-002-1000-7"},{"key":"e_1_3_2_1_20_1","first-page":"1066","volume-title":"Compressing rectilinear pictures and minimizing access control lists,\" in ACM-SIAM SODA","author":"Applegate D. L.","year":"2007","unstructured":"D. L. Applegate , G. Calinescu , D. S. Johnson , H. Karloff , K. Ligett , and J. Wang , \" Compressing rectilinear pictures and minimizing access control lists,\" in ACM-SIAM SODA , pp. 1066 -- 1075 , 2007 . D. L. Applegate, G. Calinescu, D. S. Johnson, H. Karloff, K. Ligett, and J. Wang, \"Compressing rectilinear pictures and minimizing access control lists,\" in ACM-SIAM SODA, pp. 1066--1075, 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"On the code length of TCAM coding schemes,\" in IEEE ISIT","author":"Rottenstreich O.","year":"2010","unstructured":"O. Rottenstreich and I. Keslassy , \" On the code length of TCAM coding schemes,\" in IEEE ISIT , 2010 . O. Rottenstreich and I. Keslassy, \"On the code length of TCAM coding schemes,\" in IEEE ISIT, 2010."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2382031"},{"key":"e_1_3_2_1_23_1","article-title":"Exploiting order independence for scalable and expressive packet classification","author":"Kogan K.","year":"2015","unstructured":"K. Kogan , S. I. Nikolenko , O. Rottenstreich , W. Culhane , and P. Eugster , \" Exploiting order independence for scalable and expressive packet classification ,\" IEEE\/ACM Trans. Netw. , 2015 . K. Kogan, S. I. Nikolenko, O. Rottenstreich, W. Culhane, and P. Eugster, \"Exploiting order independence for scalable and expressive packet classification,\" IEEE\/ACM Trans. Netw., 2015.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"e_1_3_2_1_24_1","volume-title":"Lossy compression of packet classifiers,\" in ACM\/IEEE ANCS","author":"Rottenstreich O.","year":"2015","unstructured":"O. Rottenstreich and J. Tapolcai , \" Lossy compression of packet classifiers,\" in ACM\/IEEE ANCS , 2015 . O. Rottenstreich and J. Tapolcai, \"Lossy compression of packet classifiers,\" in ACM\/IEEE ANCS, 2015."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.36"},{"key":"e_1_3_2_1_26_1","volume-title":"Block permutations in boolean space to minimize TCAM for packet classification,\" in IEEE INFOCOM","author":"Wei R.","year":"2012","unstructured":"R. Wei , Y. Xu , and H. J. Chao , \" Block permutations in boolean space to minimize TCAM for packet classification,\" in IEEE INFOCOM , 2012 . R. Wei, Y. Xu, and H. J. Chao, \"Block permutations in boolean space to minimize TCAM for packet classification,\" in IEEE INFOCOM, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140113"},{"key":"e_1_3_2_1_28_1","volume-title":"Compression for fixed-width memories,\" in IEEE ISIT","author":"Rottenstreich O.","year":"2013","unstructured":"O. Rottenstreich , A. Berman , Y. Cassuto , and I. Keslassy , \" Compression for fixed-width memories,\" in IEEE ISIT , 2013 . O. Rottenstreich, A. Berman, Y. Cassuto, and I. Keslassy, \"Compression for fixed-width memories,\" in IEEE ISIT, 2013."},{"key":"e_1_3_2_1_29_1","volume-title":"NetAssay: Providing new monitoring primitives for network operators,\" in ACM HotNets","author":"Donovan S.","year":"2014","unstructured":"S. Donovan and N. Feamster , \" NetAssay: Providing new monitoring primitives for network operators,\" in ACM HotNets , 2014 . S. Donovan and N. Feamster, \"NetAssay: Providing new monitoring primitives for network operators,\" in ACM HotNets, 2014."}],"event":{"name":"CoNEXT '15: Conference on emerging Networking Experiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Heidelberg Germany","acronym":"CoNEXT '15"},"container-title":["Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2716281.2836092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2716281.2836092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:55Z","timestamp":1750227415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2716281.2836092"}},"subtitle":["compact network policies with attribute-carrying addresses"],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":29,"alternative-id":["10.1145\/2716281.2836092","10.1145\/2716281"],"URL":"https:\/\/doi.org\/10.1145\/2716281.2836092","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"2015-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}