{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:25Z","timestamp":1761402025595,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T00:00:00Z","timestamp":1552003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development program","award":["No.2016YFB1000400"],"award-info":[{"award-number":["No.2016YFB1000400"]}]},{"name":"National Nature Science Foundation of China under NSFC","award":["No. 61872377, 61802417, 61802420 and 61502509"],"award-info":[{"award-number":["No. 61872377, 61802417, 61802420 and 61502509"]}]},{"name":"National Key Program","award":["JZX2017-1585\/Y479"],"award-info":[{"award-number":["JZX2017-1585\/Y479"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,8]]},"DOI":"10.1145\/3318265.3318280","type":"proceedings-article","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T12:34:06Z","timestamp":1554813246000},"page":"84-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SWAP"],"prefix":"10.1145","author":[{"given":"Zijun","family":"Hang","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Yang","family":"Shi","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Mei","family":"Wen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Wei","family":"Quan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]},{"given":"Chunyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2019,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Barefoot Networks. Barefoot Tofino. https:\/\/www.barefootnetworks.com\/technologv\/.  Barefoot Networks. Barefoot Tofino. https:\/\/www.barefootnetworks.com\/technologv\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934899"},{"key":"e_1_3_2_1_3_1","unstructured":"Cisco Networks. Netflow. http:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ios-net-ow\/index.html.  Cisco Networks. Netflow. http:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ios-net-ow\/index.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_1_5_1","volume-title":"Version 1.1.0 - Release Candidate","author":"The P4 Language Consortium","year":"2016","unstructured":"The P4 Language Consortium . The P4 Language Specification , Version 1.1.0 - Release Candidate , January 2016 . http:\/\/p4.org\/wp-content\/uploads\/2016\/03\/p4_v1.1.pdf. The P4 Language Consortium. The P4 Language Specification, Version 1.1.0 - Release Candidate, January 2016. http:\/\/p4.org\/wp-content\/uploads\/2016\/03\/p4_v1.1.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"P4 Language Consortium. P4 Switch Behavioral Model. https:\/\/github.com\/p4lang\/behavioral-model.  P4 Language Consortium. P4 Switch Behavioral Model. https:\/\/github.com\/p4lang\/behavioral-model."},{"volume-title":"2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE","author":"Ben-Basat R","key":"e_1_3_2_1_7_1","unstructured":"Ben-Basat R , Chen X , Einziger G , Efficient Measurement on Programmable Switches Using Probabilistic Recirculation{C} . 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE , 2018: 313--323. Ben-Basat R, Chen X, Einziger G, et al. Efficient Measurement on Programmable Switches Using Probabilistic Recirculation{C}. 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 2018: 313--323."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/511399.511376"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_10_1","unstructured":"Wikipedia Poisson distribution https:\/\/en.wikipedia.org\/wiki\/Poisson_distribution  Wikipedia Poisson distribution https:\/\/en.wikipedia.org\/wiki\/Poisson_distribution"},{"key":"e_1_3_2_1_11_1","unstructured":"Wikipedia Discrete uniform distribution https:\/\/en.wikipedia.org\/wiki\/Discrete_uniform_distribution  Wikipedia Discrete uniform distribution https:\/\/en.wikipedia.org\/wiki\/Discrete_uniform_distribution"},{"volume-title":"INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE","author":"Basat R B","key":"e_1_3_2_1_12_1","unstructured":"Basat R B , Einziger G , Friedman R , Randomized admission policy for efficient top-k and frequency estimation{C} . INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE , 2017: 1--9. Basat R B, Einziger G, Friedman R, et al. Randomized admission policy for efficient top-k and frequency estimation{C}. INFOCOM 2017-IEEE Conference on Computer Communications, IEEE. IEEE, 2017: 1--9."},{"key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Heavy hitters in streams and sliding windows{C}","volume":"2016","author":"Ben-Basat R","unstructured":"Ben-Basat R , Einziger G , Friedman R , Heavy hitters in streams and sliding windows{C} . INFOCOM. 2016 : 1 -- 9 . Ben-Basat R, Einziger G, Friedman R, et al. Heavy hitters in streams and sliding windows{C}. INFOCOM. 2016: 1--9.","journal-title":"INFOCOM."},{"issue":"3","key":"e_1_3_2_1_14_1","first-page":"1701","article-title":"A Survey on the Security of Stateful SDN Data Planes{C}","volume":"19","author":"Dargahi A.","year":"2017","unstructured":"T. Dargahi , A. Caponi , M. Ambrosin , et al. A Survey on the Security of Stateful SDN Data Planes{C} . IEEE , 2017 , 19 ( 3 ): 1701 -- 1725 , thirdquarter. T. Dargahi, A. Caponi, M. Ambrosin, et al. A Survey on the Security of Stateful SDN Data Planes{C}. IEEE, 2017, 19(3): 1701--1725, thirdquarter.","journal-title":"IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"e_1_3_2_1_16_1","unstructured":"SFlow. http:\/\/sflow.org\/.  SFlow. http:\/\/sflow.org\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Scapy.https:\/\/scapy.net\/  Scapy.https:\/\/scapy.net\/"}],"event":{"name":"HP3C '19: 2019 the 3rd International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C '19","location":"Xi'an China"},"container-title":["Proceedings of the 3rd International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318265.3318280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318265.3318280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:23Z","timestamp":1750208543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318265.3318280"}},"subtitle":["a sliding window algorithm for in-network packet measurement"],"short-title":[],"issued":{"date-parts":[[2019,3,8]]},"references-count":17,"alternative-id":["10.1145\/3318265.3318280","10.1145\/3318265"],"URL":"https:\/\/doi.org\/10.1145\/3318265.3318280","relation":{},"subject":[],"published":{"date-parts":[[2019,3,8]]},"assertion":[{"value":"2019-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}