{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:46:29Z","timestamp":1760028389666,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T00:00:00Z","timestamp":1542240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,15]]},"DOI":"10.1145\/3286062.3286083","type":"proceedings-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T13:09:55Z","timestamp":1542028195000},"page":"141-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Fast Network Simulation Through Approximation or"],"prefix":"10.1145","author":[{"given":"Charles W.","family":"Kazer","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Jo\u00e3o","family":"Sedoc","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Kelvin K.W.","family":"Ng","sequence":"additional","affiliation":[{"name":"CUHK"}]},{"given":"Vincent","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Lyle H.","family":"Ungar","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2018,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396567"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"volume-title":"Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Alizadeh Mohammad","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"e_1_3_2_2_6_1","unstructured":"Junyoung Chung Sungjin Ahn and Yoshua Bengio. 2016. Hierarchical Multiscale Recurrent Neural Networks. CoRR abs\/1609.01704 (2016). arXiv:1609.01704 http:\/\/arxiv.org\/abs\/1609.01704  Junyoung Chung Sungjin Ahn and Yoshua Bengio. 2016. Hierarchical Multiscale Recurrent Neural Networks. CoRR abs\/1609.01704 (2016). arXiv:1609.01704 http:\/\/arxiv.org\/abs\/1609.01704"},{"volume":"1","volume-title":"Proceedings of the 25th International Conference on Neural Information Processing Systems -","author":"Dean Jeffrey","key":"e_1_3_2_2_7_1"},{"volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI'04)","year":"2004","author":"Dean Jeffrey","key":"e_1_3_2_2_8_1"},{"volume-title":"PCC Vivace: Online-Learning Congestion Control. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","year":"2018","author":"Dong Mo","key":"e_1_3_2_2_9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/84537.84545"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"key":"e_1_3_2_2_12_1","unstructured":"J. B. Heaton Nicholas G. Polson and J. H. Witte. 2016. Deep Learning in Finance. CoRR abs\/1602.06561 (2016) 20. arXiv:1602.06561 http:\/\/arxiv.org\/abs\/1602.06561  J. B. Heaton Nicholas G. Polson and J. H. Witte. 2016. Deep Learning in Finance. CoRR abs\/1602.06561 (2016) 20. arXiv:1602.06561 http:\/\/arxiv.org\/abs\/1602.06561"},{"key":"e_1_3_2_2_13_1","unstructured":"Thomas R. Henderson Mathieu Lacage and George F. Riley. 2008. Network simulations with the ns-3 simulator.  Thomas R. Henderson Mathieu Lacage and George F. Riley. 2008. Network simulations with the ns-3 simulator."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_15_1","unstructured":"Nan Rosemary Ke Konrad Zolna Alessandro Sordoni Zhouhan Lin Adam Trischler Yoshua Bengio Joelle Pineau Laurent Charlin and Christopher Joseph Pal. 2018. Focused Hierarchical RNNs for Conditional Sequence Processing. CoRR abs\/1806.04342 (2018).  Nan Rosemary Ke Konrad Zolna Alessandro Sordoni Zhouhan Lin Adam Trischler Yoshua Bengio Joelle Pineau Laurent Charlin and Christopher Joseph Pal. 2018. Focused Hierarchical RNNs for Conditional Sequence Processing. CoRR abs\/1806.04342 (2018)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_2_17_1","unstructured":"LBNL. {n. d.}. network simulator man page. https:\/\/ee.lbl.gov\/ns\/man.html.  LBNL. {n. d.}. network simulator man page. https:\/\/ee.lbl.gov\/ns\/man.html."},{"key":"e_1_3_2_2_18_1","unstructured":"OpenSim Ltd. 2018. OMNeT++. http:\/\/omnetpp.org.  OpenSim Ltd. 2018. OMNeT++. http:\/\/omnetpp.org."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2012.6189204"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347421"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787510"},{"key":"e_1_3_2_2_22_1","unstructured":"nsnam. 2017. ns-3. http:\/\/www.nsnam.org.  nsnam. 2017. ns-3. http:\/\/www.nsnam.org."},{"key":"e_1_3_2_2_23_1","unstructured":"Cristopher Olah. 2015. Understanding LSTM Networks. http:\/\/colah.github.io\/posts\/2015-08-Understanding-LSTMs.  Cristopher Olah. 2015. Understanding LSTM Networks. http:\/\/colah.github.io\/posts\/2015-08-Understanding-LSTMs."},{"volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (NSDI'17)","year":"2017","author":"Ousterhout Amy","key":"e_1_3_2_2_24_1"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018467"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11840817_66"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787508"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694362"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844154"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Andr\u00e1s Varga. 2009. Parallel Simulation Made Easy With OMNeT++.  Andr\u00e1s Varga. 2009. Parallel Simulation Made Easy With OMNeT++.","DOI":"10.32913\/mic-ict-research.v3.n5.320"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2733548"}],"event":{"name":"HotNets '18: The 17th ACM workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Redmond WA USA","acronym":"HotNets '18"},"container-title":["Proceedings of the 17th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286062.3286083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:15Z","timestamp":1750207455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286083"}},"subtitle":["How Blind Men Can Describe Elephants"],"short-title":[],"issued":{"date-parts":[[2018,11,15]]},"references-count":33,"alternative-id":["10.1145\/3286062.3286083","10.1145\/3286062"],"URL":"https:\/\/doi.org\/10.1145\/3286062.3286083","relation":{},"subject":[],"published":{"date-parts":[[2018,11,15]]},"assertion":[{"value":"2018-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}