{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:07Z","timestamp":1767340027886,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1407470"],"award-info":[{"award-number":["1407470"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA","award":["HR001117C0048"],"award-info":[{"award-number":["HR001117C0048"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3230543.3230553","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"30-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Restructuring endpoint congestion control"],"prefix":"10.1145","author":[{"given":"Akshay","family":"Narayan","sequence":"first","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Frank","family":"Cangialosi","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Deepti","family":"Raghavan","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Prateesh","family":"Goyal","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Srinivas","family":"Narayana","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Radhika","family":"Mittal","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Mohammad","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152457"},{"volume-title":"NSDI","year":"2018","author":"Arun V.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316220"},{"volume-title":"OSDI","year":"2014","author":"Belay A.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"L. Brakmo. TCP-BPF: Programmatically tuning TCP behavior through BPF. https:\/\/www.netdevconf.org\/2.2\/papers\/brakmo-tcpbpf-talk.pdf.  L. Brakmo. TCP-BPF: Programmatically tuning TCP behavior through BPF. https:\/\/www.netdevconf.org\/2.2\/papers\/brakmo-tcpbpf-talk.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"CAIDA. The CAIDA Anonymized Internet Traces 2016 Dataset - 2016-01-21. http:\/\/www.caida.org\/data\/passive\/passive_2016_dataset.xml 2016.  CAIDA. The CAIDA Anonymized Internet Traces 2016 Dataset - 2016-01-21. http:\/\/www.caida.org\/data\/passive\/passive_2016_dataset.xml 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_10_1","unstructured":"J. Corbet. Pluggable congestion avoidance modules. https:\/\/lwn.net\/Articles\/128681\/ 2005.  J. Corbet. Pluggable congestion avoidance modules. https:\/\/lwn.net\/Articles\/128681\/ 2005."},{"volume-title":"NSDI","year":"2015","author":"Dong M.","key":"e_1_3_2_1_11_1"},{"volume-title":"NSDI","year":"2018","author":"Dong M.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"DPDK. http:\/\/dpdk.org\/.  DPDK. http:\/\/dpdk.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Linux Socket Filtering aka Berkeley Packet Filter (BPF). https:\/\/www.kernel.org\/doc\/Documentation\/networking\/filter.txt.  Linux Socket Filtering aka Berkeley Packet Filter (BPF). https:\/\/www.kernel.org\/doc\/Documentation\/networking\/filter.txt."},{"key":"e_1_3_2_1_15_1","first-page":"15","volume-title":"USITS","volume":"1","author":"Ely D.","year":"2001"},{"volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation","year":"2006","author":"Erlingsson U.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282421"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152434.3152437"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Goyal A. Narayan F. Cangialosi D. Raghavan S. Narayana M. Alizadeh and H. Balakrishnan. Elasticity Detection: A Building Block for Delay-Sensitive Congestion Control. ArXiv e-prints Feb. 2018.  P. Goyal A. Narayan F. Cangialosi D. Raghavan S. Narayana M. Alizadeh and H. Balakrishnan. Elasticity Detection: A Building Block for Delay-Sensitive Congestion Control. ArXiv e-prints Feb. 2018.","DOI":"10.1145\/3232755.3232772"},{"volume-title":"OSDI","year":"2004","author":"Gunawi H. S.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248180"},{"volume-title":"NSDI","year":"2014","author":"Jeong E.","key":"e_1_3_2_1_23_1"},{"volume-title":"Digital Codex LLC","year":"2012","author":"Johnston A. B.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043568"},{"volume-title":"USENIX ATC","year":"2015","author":"Netravali R.","key":"e_1_3_2_1_27_1"},{"volume-title":"Retrieved","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"The Network Simulator. https:\/\/www.isi.edu\/nsnam\/ns\/.  The Network Simulator. https:\/\/www.isi.edu\/nsnam\/ns\/."},{"volume-title":"OSDI","year":"2014","author":"Peter S.","key":"e_1_3_2_1_30_1"},{"volume-title":"Proceedings of the 12th Usenix Security Symposium","year":"2002","author":"Provos N.","key":"e_1_3_2_1_31_1"},{"journal-title":"D. Ritchie. A Stream Input-Output System. AT&T Bell Laboratories Technical Journal","first-page":"63","year":"1984","key":"e_1_3_2_1_32_1"},{"volume-title":"USENIX ATC","year":"2012","author":"Rizzo L.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"rustfft. https:\/\/crates.io\/crates\/rustfft.  rustfft. https:\/\/crates.io\/crates\/rustfft."},{"key":"e_1_3_2_1_35_1","first-page":"3819","author":"Salim J.","year":"2003","journal-title":"Linux Netlink as an IP Services Protocol"},{"volume-title":"Proceedings of the 6th conference on USENIX Security Symposium","year":"2001","author":"Thomas I.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","unstructured":"A. Tirumala F. Qin J. Dugan J. Ferguson and K. Gibbs. Iperf: The tcp\/udp bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects 2005.  A. Tirumala F. Qin J. Dugan J. Ferguson and K. Gibbs. Iperf: The tcp\/udp bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects 2005."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"volume-title":"Mosh: An Interactive Remote Shell for Mobile Clients. In USENIX Annual Technical Conference","year":"2012","author":"Winstein K.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"volume-title":"NSDI","year":"2013","author":"Winstein K.","key":"e_1_3_2_1_41_1"},{"volume-title":"Implementation and Evaluation of Congestion Control for Multipath TCP. In NSDI","year":"2011","author":"Wischik D.","key":"e_1_3_2_1_42_1"},{"volume-title":"USENIX ATC","year":"2018","author":"Yan F. Y.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787484"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230553","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:46Z","timestamp":1750210786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":45,"alternative-id":["10.1145\/3230543.3230553","10.1145\/3230543"],"URL":"https:\/\/doi.org\/10.1145\/3230543.3230553","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}