{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:32Z","timestamp":1761621392523,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,23]]},"DOI":"10.1145\/3230718.3230722","type":"proceedings-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T16:08:49Z","timestamp":1531498129000},"page":"89-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Characterizing the algorithmic complexity of reconfigurable data center architectures"],"prefix":"10.1145","author":[{"given":"Klaus-Tycho","family":"Foerster","sequence":"first","affiliation":[{"name":"University of Vienna, Austria"}]},{"given":"Manya","family":"Ghobadi","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Orlin","author":"Ahuja Ravindra K.","year":"1993","unstructured":"Ravindra K. Ahuja , Thomas L. Magnanti , and James B . Orlin . 1993 . Network flows - theory, algorithms and applications. Prentice Hall . Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin. 1993. Network flows - theory, algorithms and applications. Prentice Hall."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2790035"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2017.12.008"},{"key":"e_1_3_2_1_5_1","volume-title":"DISC (LIPIcs)","volume":"91","author":"Avin Chen","year":"2017","unstructured":"Chen Avin , Kaushik Mondal , and Stefan Schmid . 2017 . Demand-Aware Network Designs of Bounded Degree . In DISC (LIPIcs) , Vol. 91 . Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 5:1--5:16. Chen Avin, Kaushik Mondal, and Stefan Schmid. 2017. Demand-Aware Network Designs of Bounded Degree. In DISC (LIPIcs), Vol. 91. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 5:1--5:16."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626328"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.34"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2253120"},{"volume-title":"Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch","author":"Chen Li","key":"e_1_3_2_1_9_1","unstructured":"Li Chen , Kai Chen , Zhonghua Zhu , Minlan Yu , George Porter , Chunming Qiao , and Shan Zhong . 2017. Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch . In NSDI. USENIX Association , 577--593. Li Chen, Kai Chen, Zhonghua Zhu, Minlan Yu, George Porter, Chunming Qiao, and Shan Zhong. 2017. Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. In NSDI. USENIX Association, 577--593."},{"key":"e_1_3_2_1_10_1","first-page":"2015","article-title":"Cisco Global Cloud Index","year":"2015","unstructured":"Cisco. 2015 . Cisco Global Cloud Index : Forecast and Methodology , 2015 - 2020 . White Paper (2015). Cisco. 2015. Cisco Global Cloud Index: Forecast and Methodology, 2015-2020. White Paper (2015).","journal-title":"Forecast and Methodology"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-015-9354-8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0269-x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1965-045-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851223"},{"key":"e_1_3_2_1_16_1","volume-title":"Survey of Consistent Network Updates. CoRR abs\/1609.02305v2","author":"Foerster Klaus-Tycho","year":"2018","unstructured":"Klaus-Tycho Foerster , Stefan Schmid , and Stefano Vissicchio . 2018. Survey of Consistent Network Updates. CoRR abs\/1609.02305v2 ( 2018 ). Klaus-Tycho Foerster, Stefan Schmid, and Stefano Vissicchio. 2018. Survey of Consistent Network Updates. CoRR abs\/1609.02305v2 (2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"Johnson","author":"Garey M. R.","year":"1979","unstructured":"M. R. Garey and David S . Johnson . 1979 . Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman . M. R. Garey and David S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934911"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592577"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402968"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018442"},{"volume-title":"Competitive analysis for online scheduling in software-defined optical WAN","author":"Jia Su","key":"e_1_3_2_1_24_1","unstructured":"Su Jia , Xin Jin , Golnaz Ghasemiesfeh , Jiaxin Ding , and Jie Gao . 2017. Competitive analysis for online scheduling in software-defined optical WAN . In INFOCOM. IEEE , 1--9. Su Jia, Xin Jin, Golnaz Ghasemiesfeh, Jiaxin Ding, and Jie Gao. 2017. Competitive analysis for online scheduling in software-defined optical WAN. In INFOCOM. IEEE, 1--9."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934904"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122111.00069"},{"key":"e_1_3_2_1_27_1","unstructured":"Srikanth Kandula Jitendra Padhye and Paramvir Bahl. 2009. Flyways To De-Congest Data Center Networks. In HotNets. ACM SIGCOMM.  Srikanth Kandula Jitendra Padhye and Paramvir Bahl. 2009. Flyways To De-Congest Data Center Networks. In HotNets. ACM SIGCOMM."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098836"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(90)90024-7"},{"volume-title":"Circuit Switching Under the Radar with REACToR","author":"Liu He","key":"e_1_3_2_1_30_1","unstructured":"He Liu , Feng Lu , Alex Forencich , Rishi Kapoor , Malveeka Tewari , Geoffrey M. Voelker , George Papen , Alex C. Snoeren , and George Porter . 2014. Circuit Switching Under the Radar with REACToR . In NSDI. USENIX Association , 1--15. He Liu, Feng Lu, Alex Forencich, Rishi Kapoor, Malveeka Tewari, Geoffrey M. Voelker, George Papen, Alex C. Snoeren, and George Porter. 2014. Circuit Switching Under the Radar with REACToR. In NSDI. USENIX Association, 1--15."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836126"},{"key":"e_1_3_2_1_32_1","volume-title":"Anderson","author":"Liu Vincent","year":"2013","unstructured":"Vincent Liu , Daniel Halperin , Arvind Krishnamurthy , and Thomas E . Anderson . 2013 . F10: A Fault-Tolerant Engineered Network. In NSDI. USENIX Association , 399--412. Vincent Liu, Daniel Halperin, Arvind Krishnamurthy, and Thomas E. Anderson. 2013. F10: A Fault-Tolerant Engineered Network. In NSDI. USENIX Association, 399--412."},{"volume-title":"Matching theory","author":"Lov\u00e1sz L\u00e1szl\u00f3","key":"e_1_3_2_1_33_1","unstructured":"L\u00e1szl\u00f3 Lov\u00e1sz and Michael D Plummer . 2009. Matching theory . Vol. 367 . American Mathematical Soc . L\u00e1szl\u00f3 Lov\u00e1sz and Michael D Plummer. 2009. Matching theory. Vol. 367. American Mathematical Soc."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098838"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2410313"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787508"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230570"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005747"},{"key":"e_1_3_2_1_39_1","volume-title":"Philip Brighten Godfrey, and Alexandra Kolla","author":"Singla Ankit","year":"2014","unstructured":"Ankit Singla , Philip Brighten Godfrey, and Alexandra Kolla . 2014 . High Throughput Data Center Topology Design. In NSDI. USENIX Association , 29--41. Ankit Singla, Philip Brighten Godfrey, and Alexandra Kolla. 2014. High Throughput Data Center Topology Design. In NSDI. USENIX Association, 29--41."},{"key":"e_1_3_2_1_40_1","volume-title":"Jellyfish: Networking Data Centers Randomly","author":"Singla Ankit","year":"2012","unstructured":"Ankit Singla , Chi-Yao Hong , Lucian Popa , and Philip Brighten Godfrey . 2012 . Jellyfish: Networking Data Centers Randomly . In NSDI. USENIX Association , 225--238. Ankit Singla, Chi-Yao Hong, Lucian Popa, and Philip Brighten Godfrey. 2012. Jellyfish: Networking Data Centers Randomly. In NSDI. USENIX Association, 225--238."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868455"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999580"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1137\/0211027"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896377.2901479"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851222"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658943"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2626784"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098837"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342440"}],"event":{"name":"ANCS '18: Symposium on Architectures for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"],"location":"Ithaca New York","acronym":"ANCS '18"},"container-title":["Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230718.3230722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:29Z","timestamp":1750208249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":48,"alternative-id":["10.1145\/3230718.3230722","10.1145\/3230718"],"URL":"https:\/\/doi.org\/10.1145\/3230718.3230722","relation":{},"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"2018-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}