{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:23Z","timestamp":1750306163670,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CERNET Innovation Project","award":["NGII20150108"],"award-info":[{"award-number":["NGII20150108"]}]},{"name":"National High-tech R&D Program of P. R. China (863 program)","award":["2015AA015603"],"award-info":[{"award-number":["2015AA015603"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935670","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"7-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform"],"prefix":"10.1145","author":[{"given":"Mian","family":"Dai","sequence":"first","affiliation":[{"name":"Southeast University, China"}]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[{"name":"Southeast University, China"}]},{"given":"Yuxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University, China"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/JPROC.2014.2371999"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/SURV.2014.012214.00180"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/COMST.2014.2326417"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.comnet.2015.02.014"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2740070.2626291"},{"volume-title":"Software Defined Traffic Measurement with OpenSketch{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 29--42","author":"Yu M.","unstructured":"Yu M. , Jose L. , Miao R. Software Defined Traffic Measurement with OpenSketch{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 29--42 . Yu M., Jose L., Miao R. Software Defined Traffic Measurement with OpenSketch{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 29--42.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2620728.2620756"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2774993.2775066"},{"unstructured":"Handigol N. Heller B. Jeyakumar V. et. al. I know what your packet did last hop: Using packet histories to troubleshoot networks{C}\/\/11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 71--85.   Handigol N. Heller B. Jeyakumar V. et. al. I know what your packet did last hop: Using packet histories to troubleshoot networks{C}\/\/11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 71--85.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"A Software Defined Sketch System for Traffic Monitoring{C}\/\/Proceedings of the Eleventh ACM\/IEEE Symposium on Architectures for networking and communications systems","author":"Wellem T.","year":"2015","unstructured":"Wellem T. , Lai Y. K. , Chung W. Y. A Software Defined Sketch System for Traffic Monitoring{C}\/\/Proceedings of the Eleventh ACM\/IEEE Symposium on Architectures for networking and communications systems . IEEE Computer Society , 2015 : 197--198. Wellem T., Lai Y. K., Chung W. Y. A Software Defined Sketch System for Traffic Monitoring{C}\/\/Proceedings of the Eleventh ACM\/IEEE Symposium on Architectures for networking and communications systems. IEEE Computer Society, 2015: 197--198."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2620728.2620736"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2620728.2620742"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.micpro.2014.04.005"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2342441.2342453"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2043164.2018466"},{"unstructured":"Zeng H. Zhang S. Ye F. et. al. Libra: Divide and conquer to verify forwarding tables in huge networks{C}\/\/11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 87--99.   Zeng H. Zhang S. Ye F. et. al. Libra: Divide and conquer to verify forwarding tables in huge networks{C}\/\/11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). 2014: 87--99.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2413176.2413205"},{"volume-title":"et. al. Veriflow: Verifying network-wide invariants in real time{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 15--27","author":"Khurshid A.","unstructured":"Khurshid A. , Zou X. , Zhou W. , et. al. Veriflow: Verifying network-wide invariants in real time{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 15--27 Khurshid A., Zou X., Zhou W., et. al. Veriflow: Verifying network-wide invariants in real time{C}\/\/Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 2013: 15--27","key":"e_1_3_2_1_18_1"}],"event":{"sponsor":["AsiaFI Asia Future Internet"],"acronym":"CFI '16","name":"CFI '16: The 11th International Conference on Future Internet Technologies","location":"Nanjing China"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:56Z","timestamp":1750217996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":18,"alternative-id":["10.1145\/2935663.2935670","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935670","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}