{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:29Z","timestamp":1763468249435,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T00:00:00Z","timestamp":1420761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2015,1,9]]},"abstract":"<jats:p>\n            The most striking ideas in systems are abstractions such as virtual memory, sockets, or packet scheduling. Algorithmics is the servant of abstraction, allowing the performance of the system to approach that of the underlying hardware. I survey the trajectory of network algorithmics, starting with a focus on speed and scale in the 1990s to measurement and security in the 2000s, using what I call the\n            <jats:italic>confluence lens<\/jats:italic>\n            .\n          <\/jats:p>\n          <jats:p>Confluence sees interdisciplinary work as a merger of two or more disciplines made compelling by an inflection point in the real world, while also producing genuinely transformed ideas. I attempt to show that Network Algorithmics represented a confluence in the 1990s between computer systems, algorithms, and networking. I suggest confluence diagrams as a means to identify future interdisciplinary opportunities, and describe the emerging field of network verification as a new confluence between networking and programming languages.<\/jats:p>","DOI":"10.1145\/2717646.2717651","type":"journal-article","created":{"date-parts":[[2015,1,12]],"date-time":"2015-01-12T20:02:10Z","timestamp":1421092930000},"page":"19-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Life in the Fast Lane"],"prefix":"10.1145","volume":"45","author":[{"given":"George","family":"Varghese","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,1,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Netflow. http:\/\/en.wikipedia.org\/wiki\/NetFlow.  Netflow. http:\/\/en.wikipedia.org\/wiki\/NetFlow."},{"key":"e_1_2_1_2_1","unstructured":"Network Functions Virtualization http:\/\/en.wikipedia.org\/wiki\/Network_Functions_Virtualization.  Network Functions Virtualization http:\/\/en.wikipedia.org\/wiki\/Network_Functions_Virtualization."},{"key":"e_1_2_1_3_1","unstructured":"Remote direct memory access. http:\/\/en.wikipedia.org\/wiki\/Remote_direct_memory_access.  Remote direct memory access. http:\/\/en.wikipedia.org\/wiki\/Remote_direct_memory_access."},{"key":"e_1_2_1_4_1","unstructured":"V. Jacobson's notes on TCP header prediction. http:\/\/yangchi.me\/v-jacobsons-notes-on-tcp-header-prediction.html.  V. Jacobson's notes on TCP header prediction. http:\/\/yangchi.me\/v-jacobsons-notes-on-tcp-header-prediction.html."},{"key":"e_1_2_1_5_1","unstructured":"Virtual interface architecture. http:\/\/en.wikipedia.org\/wiki\/Virtual_Interface_Architecture.  Virtual interface architecture. http:\/\/en.wikipedia.org\/wiki\/Virtual_Interface_Architecture."},{"key":"e_1_2_1_6_1","unstructured":"Zero-copy. http:\/\/en.wikipedia.org\/wiki\/Zero-copy.  Zero-copy. http:\/\/en.wikipedia.org\/wiki\/Zero-copy."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/161541.161736"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168634"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190315"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633056"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 4th USENIX NSDI","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , G. Porter , R. Katz , S. Shenker , and I. Stoica . X-trace: A pervasive network tracing framework . In Proceedings of the 4th USENIX NSDI , 2007 . R. Fonseca, G. Porter, R. Katz, S. Shenker, and I. Stoica. X-trace: A pervasive network tracing framework. In Proceedings of the 4th USENIX NSDI, 2007."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491463"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276334"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402977"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium","author":"Handley M.","year":"2001","unstructured":"M. Handley , V. Paxson , and C. Kreibich . Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics . In Proceedings of the 10th Conference on USENIX Security Symposium , 2001 . M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th Conference on USENIX Security Symposium, 2001."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535373"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, 2012."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_2_1_21_1","volume-title":"Theory","author":"Kleinrock L.","year":"1975","unstructured":"L. Kleinrock . Theory , Volume 2 , Computer Applications. Wiley-Interscience , 1975 . L. Kleinrock. Theory, Volume 2, Computer Applications. Wiley-Interscience, 1975."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/214419.214421"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1012888.1005709"},{"key":"e_1_2_1_24_1","unstructured":"N. McKeown. Mind the gap. http:\/\/conferences.sigcomm.org\/sigcomm\/2012\/slides\/opening\/01-keynote-McKeownSigcomm2012.pdf.  N. McKeown. Mind the gap. http:\/\/conferences.sigcomm.org\/sigcomm\/2012\/slides\/opening\/01-keynote-McKeownSigcomm2012.pdf."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.769767"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/231699.231703"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251258"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1975.26"},{"key":"e_1_2_1_29_1","unstructured":"G. Varghese. Life in the fast lane. http:\/\/conferences.sigcomm.org\/sigcomm\/2014\/doc\/slides\/2.pdf.  G. Varghese. Life in the fast lane. http:\/\/conferences.sigcomm.org\/sigcomm\/2014\/doc\/slides\/2.pdf."},{"key":"e_1_2_1_30_1","volume-title":"Network Algorithmics. Morgan-Kaufman","author":"Varghese G.","year":"2004","unstructured":"G. Varghese . Network Algorithmics. Morgan-Kaufman , 2004 . G. Varghese. Network Algorithmics. Morgan-Kaufman, 2004."},{"key":"e_1_2_1_31_1","volume-title":"in Proceedings of 15th IEEE Symposium on High Performance Interconnects","author":"Venkataraman S.","year":"2007","unstructured":"S. Venkataraman , D. Song , P. Gibbons , and A. Blum . New streaming algorithms for fast detection of superspreaders . In in Proceedings of 15th IEEE Symposium on High Performance Interconnects , 2007 . S. Venkataraman, D. Song, P. Gibbons, and A. Blum. New streaming algorithms for fast detection of superspreaders. In in Proceedings of 15th IEEE Symposium on High Performance Interconnects, 2007."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/146628.140382"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263136"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2717646.2717651","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2717646.2717651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:44Z","timestamp":1750230044000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2717646.2717651"}},"subtitle":["Viewed from the Confluence Lens"],"short-title":[],"issued":{"date-parts":[[2015,1,9]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1,9]]}},"alternative-id":["10.1145\/2717646.2717651"],"URL":"https:\/\/doi.org\/10.1145\/2717646.2717651","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2015,1,9]]},"assertion":[{"value":"2015-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}