{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:39:42Z","timestamp":1764020382646,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1845749"],"award-info":[{"award-number":["1845749"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001117C0047"],"award-info":[{"award-number":["HR001117C0047"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405870","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"296-309","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Mantis"],"prefix":"10.1145","author":[{"given":"Liangcheng","family":"Yu","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"John","family":"Sonchack","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Vincent","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"volume-title":"Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM '08)","author":"Alimi Richard","key":"e_1_3_2_2_1_1","unstructured":"Richard Alimi , Ye Wang , and Y. Richard Yang . 2008. Shadow Configuration as a Network Management Primitive . In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM '08) . Association for Computing Machinery, New York, NY, USA, 111--122. Richard Alimi, Ye Wang, and Y. Richard Yang. 2008. Shadow Configuration as a Network Management Primitive. In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication (SIGCOMM '08). Association for Computing Machinery, New York, NY, USA, 111--122."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"volume-title":"Efficient Measurement on Programmable Switches Using Probabilistic Recirculation. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). 313--323","author":"Ben-Basat R.","key":"e_1_3_2_2_4_1","unstructured":"R. Ben-Basat , X. Chen , G. Einziger , and O. Rottenstreich . 2018 . Efficient Measurement on Programmable Switches Using Probabilistic Recirculation. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). 313--323 . R. Ben-Basat, X. Chen, G. Einziger, and O. Rottenstreich. 2018. Efficient Measurement on Programmable Switches Using Probabilistic Recirculation. In 2018 IEEE 26th International Conference on Network Protocols (ICNP). 313--323."},{"volume-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10)","author":"Benson Theophilus","key":"e_1_3_2_2_5_1","unstructured":"Theophilus Benson , Aditya Akella , and David A. Maltz . 2010. Network Traffic Characteristics of Data Centers in the Wild . In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10) . Association for Computing Machinery, New York, NY, USA, 267--280. Theophilus Benson, Aditya Akella, and David A. Maltz. 2010. Network Traffic Characteristics of Data Centers in the Wild. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC '10). Association for Computing Machinery, New York, NY, USA, 267--280."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_7_1","unstructured":"Caida. 2019. The CAIDA UCSD Statistical information for the CAIDA Anonymized Internet Traces. https:\/\/www.caida.org\/data\/passive\/passive_trace_statistics.xml. (2019).  Caida. 2019. The CAIDA UCSD Statistical information for the CAIDA Anonymized Internet Traces. https:\/\/www.caida.org\/data\/passive\/passive_trace_statistics.xml. (2019)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143391"},{"key":"e_1_3_2_2_9_1","volume-title":"Somesh Chaturmohta, Jack Lavier","author":"Firestone Daniel","year":"2018","unstructured":"Daniel Firestone , Andrew Putnam , Hari Angepat , Derek Chiou , Adrian Caulfield , Eric Chung , Matt Humphrey , Kalin Ovtcharov , Jitu Padhye , Doug Burger , Dave Maltz , Albert Greenberg , Sambhrama Mundkur , Alireza Dabagh , Mike Andrewartha , Vivek Bhanu , Harish Kumar Chandrappa , Somesh Chaturmohta, Jack Lavier , Norman Lam , Fengfen Liu, Gautham Popuri, Shachar Raindel, Tejas Sapre, Mark Shaw, Gabriel Silva, Madhan Sivakumar, Nisheeth Srivastava, Anshuman Verma, Qasim Zuhair, Deepak Bansal, Kushagra Vaid, and David A. Maltz. 2018 . Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX Association . Daniel Firestone, Andrew Putnam, Hari Angepat, Derek Chiou, Adrian Caulfield, Eric Chung, Matt Humphrey, Kalin Ovtcharov, Jitu Padhye, Doug Burger, Dave Maltz, Albert Greenberg, Sambhrama Mundkur, Alireza Dabagh, Mike Andrewartha, Vivek Bhanu, Harish Kumar Chandrappa, Somesh Chaturmohta, Jack Lavier, Norman Lam, Fengfen Liu, Gautham Popuri, Shachar Raindel, Tejas Sapre, Mark Shaw, Gabriel Silva, Madhan Sivakumar, Nisheeth Srivastava, Anshuman Verma, Qasim Zuhair, Deepak Bansal, Kushagra Vaid, and David A. Maltz. 2018. Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX Association."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2876749"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"volume-title":"Proceedings of the 12th International on Conference on Emerging Networking EXperiments and Technologies (CoNEXT '16)","author":"Hancock David","key":"e_1_3_2_2_13_1","unstructured":"David Hancock and Jacobus van der Merwe. 2016. HyPer4: Using P4 to Virtualize the Programmable Data Plane . In Proceedings of the 12th International on Conference on Emerging Networking EXperiments and Technologies (CoNEXT '16) . Association for Computing Machinery, New York, NY, USA, 35--49. https:\/\/doi.org\/10.1145\/2999572.2999607 David Hancock and Jacobus van der Merwe. 2016. HyPer4: Using P4 to Virtualize the Programmable Data Plane. In Proceedings of the 12th International on Conference on Emerging Networking EXperiments and Technologies (CoNEXT '16). Association for Computing Machinery, New York, NY, USA, 35--49. https:\/\/doi.org\/10.1145\/2999572.2999607"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098825"},{"key":"e_1_3_2_2_15_1","volume-title":"Contra: A Programmable System for Performance-aware Routing. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hsu Kuo-Feng","year":"2020","unstructured":"Kuo-Feng Hsu , Ryan Beckett , Ang Chen , Jennifer Rexford , and David Walker . 2020 . Contra: A Programmable System for Performance-aware Routing. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 701--721. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/hsu Kuo-Feng Hsu, Ryan Beckett, Ang Chen, Jennifer Rexford, and David Walker. 2020. Contra: A Programmable System for Performance-aware Routing. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 701--721. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/hsu"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365848"},{"volume-title":"Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13)","author":"Jain Sushant","key":"e_1_3_2_2_17_1","unstructured":"Sushant Jain , Alok Kumar , Subhasree Mandal , Joon Ong , Leon Poutievski , Arjun Singh , Subbaiah Venkata , Jim Wanderer , Junlan Zhou , Min Zhu , and et al. 2013. B4: Experience with a Globally-Deployed Software Defined Wan . In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13) . Association for Computing Machinery, New York, NY, USA, 3--14. Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, and et al. 2013. B4: Experience with a Globally-Deployed Software Defined Wan. In Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM (SIGCOMM '13). Association for Computing Machinery, New York, NY, USA, 3--14."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626292"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08)","author":"John John P.","year":"2008","unstructured":"John P. John , Ethan Katz-Bassett , Arvind Krishnamurthy , Thomas Anderson , and Arun Venkataramani . 2008 . Consensus Routing: The Internet as a Distributed System . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08) . USENIX Association, USA, 351--364. John P. John, Ethan Katz-Bassett, Arvind Krishnamurthy, Thomas Anderson, and Arun Venkataramani. 2008. Consensus Routing: The Internet as a Distributed System. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08). USENIX Association, USA, 351--364."},{"key":"e_1_3_2_2_20_1","volume-title":"Programmable In-Network Security for Context-aware BYOD Policies. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Kang Qiao","year":"2020","unstructured":"Qiao Kang , Lei Xue , Adam Morrison , Yuxin Tang , Ang Chen , and Xiapu Luo . 2020 . Programmable In-Network Security for Context-aware BYOD Policies. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, and Xiapu Luo. 2020. Programmable In-Network Security for Context-aware BYOD Policies. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA."},{"key":"e_1_3_2_2_21_1","volume-title":"Design Guidelines for Domain Specific Languages. CoRR abs\/1409.2378","author":"Karsai Gabor","year":"2014","unstructured":"Gabor Karsai , Holger Krahn , Claas Pinkernell , Bernhard Rumpe , Martin Schindler , and Steven V\u00f6lkel . 2014. Design Guidelines for Domain Specific Languages. CoRR abs\/1409.2378 ( 2014 ). arXiv:1409.2378 Gabor Karsai, Holger Krahn, Claas Pinkernell, Bernhard Rumpe, Martin Schindler, and Steven V\u00f6lkel. 2014. Design Guidelines for Domain Specific Languages. CoRR abs\/1409.2378 (2014). arXiv:1409.2378"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491191"},{"key":"e_1_3_2_2_24_1","volume-title":"Correctness and Performance for Stateful Chained Network Functions. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Khalid Junaid","year":"2019","unstructured":"Junaid Khalid and Aditya Akella . 2019 . Correctness and Performance for Stateful Chained Network Functions. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 501--516. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/khalid Junaid Khalid and Aditya Akella. 2019. Correctness and Performance for Stateful Chained Network Functions. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 501--516. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/khalid"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322259"},{"key":"e_1_3_2_2_27_1","first-page":"113","article-title":"Ensuring Connectivity via Data Plane Mechanisms. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13). USENIX Association","author":"Liu Junda","year":"2013","unstructured":"Junda Liu , Aurojit Panda , Ankit Singla , Brighten Godfrey , Michael Schapira , and Scott Shenker . 2013 . Ensuring Connectivity via Data Plane Mechanisms. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13). USENIX Association , Lombard , IL , 113 -- 126 . Junda Liu, Aurojit Panda, Ankit Singla, Brighten Godfrey, Michael Schapira, and Scott Shenker. 2013. Ensuring Connectivity via Data Plane Mechanisms. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI'13). USENIX Association, Lombard, IL, 113--126.","journal-title":"Lombard"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI'13)","author":"Liu Vincent","year":"2013","unstructured":"Vincent Liu , Daniel Halperin , Arvind Krishnamurthy , and Thomas Anderson . 2013 . F10: A Fault-Tolerant Engineered Network . In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI'13) . USENIX Association, USA, 399--412. Vincent Liu, Daniel Halperin, Arvind Krishnamurthy, and Thomas Anderson. 2013. F10: A Fault-Tolerant Engineered Network. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI'13). USENIX Association, USA, 399--412."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSE.2007.69"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"P. Phaal S. Panchen and N. McKee. 2001. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176 (Informational). (2001).  P. Phaal S. Panchen and N. McKee. 2001. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176 (Informational). (2001).","DOI":"10.17487\/rfc3176"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342427"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070569"},{"volume-title":"Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15)","author":"Roy Arjun","key":"e_1_3_2_2_37_1","unstructured":"Arjun Roy , Hongyi Zeng , Jasmeet Bagga , George Porter , and Alex C. Snoeren . 2015. Inside the Social Network's (Datacenter) Network . In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15) . Association for Computing Machinery, New York, NY, USA, 123--137. Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, and Alex C. Snoeren. 2015. Inside the Social Network's (Datacenter) Network. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15). Association for Computing Machinery, New York, NY, USA, 123--137."},{"key":"e_1_3_2_2_38_1","unstructured":"shabbychef (https:\/\/stats.stackexchange.com\/users\/795\/shabbychef). [n. d.]. Online algorithm for mean absolute deviation and large data set. Cross Validated. ([n. d.]). https:\/\/stats.stackexchange.com\/q\/3378 URL:https:\/\/stats.stackexchange.com\/q\/3378 (version: 2010-10-07).  shabbychef (https:\/\/stats.stackexchange.com\/users\/795\/shabbychef). [n. d.]. Online algorithm for mean absolute deviation and large data set. Cross Validated. ([n. d.]). https:\/\/stats.stackexchange.com\/q\/3378 URL:https:\/\/stats.stackexchange.com\/q\/3378 (version: 2010-10-07)."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3154630.3154637"},{"key":"e_1_3_2_2_40_1","volume-title":"Approximating Fair Queueing on Reconfigurable Switches. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Sharma Naveen Kr.","year":"2018","unstructured":"Naveen Kr. Sharma , Ming Liu , Kishore Atreya , and Arvind Krishnamurthy . 2018 . Approximating Fair Queueing on Reconfigurable Switches. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) . USENIX Association, Renton, WA, 1--16. Naveen Kr. Sharma, Ming Liu, Kishore Atreya, and Arvind Krishnamurthy. 2018. Approximating Fair Queueing on Reconfigurable Switches. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA, 1--16."},{"key":"e_1_3_2_2_41_1","volume-title":"Programmable Calendar Queues for High-speed Packet Scheduling. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI20)","author":"Sharma Naveen Kr.","year":"2020","unstructured":"Naveen Kr. Sharma , Chenxingyu Zhao , Ming Liu , Pravein G Kannan , Changhoon Kim , Arvind Krishnamurthy , and Anirudh Sivaraman . 2020 . Programmable Calendar Queues for High-speed Packet Scheduling. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI20) . USENIX Association, Santa Clara, CA, 685--699. Naveen Kr. Sharma, Chenxingyu Zhao, Ming Liu, Pravein G Kannan, Changhoon Kim, Arvind Krishnamurthy, and Anirudh Sivaraman. 2020. Programmable Calendar Queues for High-speed Packet Scheduling. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI20). USENIX Association, Santa Clara, CA, 685--699."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_2_45_1","volume-title":"Enabling Practical Software-defined Networking Security Applications with OFX. In 23rd Annual Network and Distributed System Security Symposium (NDSS '16)","author":"Sonchack John","year":"2016","unstructured":"John Sonchack , Jonathan M. Smith , Adam J. Aviv , and Eric Keller . 2016 . Enabling Practical Software-defined Networking Security Applications with OFX. In 23rd Annual Network and Distributed System Security Symposium (NDSS '16) . Internet Society. John Sonchack, Jonathan M. Smith, Adam J. Aviv, and Eric Keller. 2016. Enabling Practical Software-defined Networking Security Applications with OFX. In 23rd Annual Network and Distributed System Security Symposium (NDSS '16). Internet Society."},{"volume-title":"[n. d.]. Introduction to reinforcement learning","author":"Sutton Richard S","key":"e_1_3_2_2_46_1","unstructured":"Richard S Sutton [n. d.]. Introduction to reinforcement learning . Vol. 135 . Richard S Sutton et al. [n. d.]. Introduction to reinforcement learning. Vol. 135."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.568214"},{"key":"e_1_3_2_2_48_1","unstructured":"The P4 Language Consortium. 2018. The P4 Language Specification. (2018). https:\/\/p4.org\/p4-spec\/p4-14\/v1.0.5\/tex\/p4.pdf  The P4 Language Consortium. 2018. The P4 Language Specification. (2018). https:\/\/p4.org\/p4-spec\/p4-14\/v1.0.5\/tex\/p4.pdf"},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (NSDI'17)","author":"Vanini Erico","year":"2017","unstructured":"Erico Vanini , Rong Pan , Mohammad Alizadeh , Parvin Taheri , and Tom Edsall . 2017 . Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching . In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (NSDI'17) . USENIX Association, USA, 407--420. Erico Vanini, Rong Pan, Mohammad Alizadeh, Parvin Taheri, and Tom Edsall. 2017. Let It Flow: Resilient Asymmetric Load Balancing with Flowlet Switching. In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (NSDI'17). USENIX Association, USA, 407--420."},{"key":"e_1_3_2_2_50_1","unstructured":"WG802.1. 2011. IEEE 802.1Qbb: Priority-based flow control. (2011). https:\/\/1.ieee802.org\/dcb\/802-1qbb\/  WG802.1. 2011. IEEE 802.1Qbb: Priority-based flow control. (2011). https:\/\/1.ieee802.org\/dcb\/802-1qbb\/"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365849"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365860"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230552"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038396"},{"key":"e_1_3_2_2_55_1","unstructured":"Irene Y. Zhang. 2017. Operation Ordering in Systems. (2017). https:\/\/irenezhang.net\/research\/consistency.html  Irene Y. Zhang. 2017. Operation Ordering in Systems. (2017). https:\/\/irenezhang.net\/research\/consistency.html"},{"key":"e_1_3_2_2_56_1","volume-title":"Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.","author":"Zhang Menghao","year":"2020","unstructured":"Menghao Zhang , Guan-Yu Li , Shicheng Wang , Chang Liu , Ang Chen , Hongxin Hu , Guofei Gu , Qianqian Li , Mingwei Xu , and Jianping Wu . 2020 . Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. Menghao Zhang, Guan-Yu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qianqian Li, Mingwei Xu, and Jianping Wu. 2020. Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event USA","acronym":"SIGCOMM '20"},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405870","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405870","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405870"}},"subtitle":["Reactive Programmable Switches"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":57,"alternative-id":["10.1145\/3387514.3405870","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405870","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}