{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:57Z","timestamp":1750220577823,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1407470,1526791,1563826,1704941,1817115,2028832,2029037"],"award-info":[{"award-number":["1407470,1526791,1563826,1704941,1817115,2028832,2029037"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,4]]},"DOI":"10.1145\/3422604.3425927","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:50:36Z","timestamp":1604019036000},"page":"53-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Bertha: Tunneling through the Network API"],"prefix":"10.1145","author":[{"given":"Akshay","family":"Narayan","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Aurojit","family":"Panda","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"given":"Mohammad","family":"Alizadeh","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"University of California Berkeley &amp; ICSI, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OSDI","author":"Abadi M.","year":"2016","unstructured":"M. Abadi , P. Barham , J. Chen , Z. Chen , A. Davis , J. Dean , M. Devin , S. Ghemawat , G. Irving , M. Isard , : A System for Large-Scale Machine Learning . In OSDI , 2016 . M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. Tensorflow: A System for Large-Scale Machine Learning. In OSDI, 2016."},{"unstructured":"Amazon. Elastic Load Balancing. https:\/\/aws.amazon.com\/elasticloadbalancing\/.  Amazon. Elastic Load Balancing. https:\/\/aws.amazon.com\/elasticloadbalancing\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"Andrew Morgan. How MySQL is able to scale to 200 Million QPS - MySQL Cluster. http:\/\/highscalability.com\/blog\/2015\/5\/18\/how-mysql-is-able-to-scale-to-200-million-qps-mysql-cluster.html.  Andrew Morgan. How MySQL is able to scale to 200 Million QPS - MySQL Cluster. http:\/\/highscalability.com\/blog\/2015\/5\/18\/how-mysql-is-able-to-scale-to-200-million-qps-mysql-cluster.html.","key":"e_1_3_2_1_3_1"},{"unstructured":"Apache. Arrow. https:\/\/arrow.apache.org\/.  Apache. Arrow. https:\/\/arrow.apache.org\/.","key":"e_1_3_2_1_4_1"},{"unstructured":"Apache. Thrift. https:\/\/thrift.apache.org\/.  Apache. Thrift. https:\/\/thrift.apache.org\/.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"NSDI","author":"Arashloo M. T.","year":"2020","unstructured":"M. T. Arashloo , A. Lavrov , M. Ghobadi , J. Rexford , D. Walker , and D. Wentzlaff . Enabling Programmable Transport Protocols in High-Speed NICs . In NSDI , 2020 . M. T. Arashloo, A. Lavrov, M. Ghobadi, J. Rexford, D. Walker, and D. Wentzlaff. Enabling Programmable Transport Protocols in High-Speed NICs. In NSDI, 2020."},{"unstructured":"C. P. Authors. Cap'n Proto Cerealization Protocol. https:\/\/capnproto.org\/.  C. P. Authors. Cap'n Proto Cerealization Protocol. https:\/\/capnproto.org\/.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2594291.2594317"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2799647"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2486001.2486011"},{"unstructured":"Bruce Curtis. net-tcp: TCP\/IP stack bypass for loopback connections. https:\/\/www.spinics.net\/lists\/netdev\/msg210741.html.  Bruce Curtis. net-tcp: TCP\/IP stack bypass for loopback connections. https:\/\/www.spinics.net\/lists\/netdev\/msg210741.html.","key":"e_1_3_2_1_11_1"},{"unstructured":"Chelsio Communications. TCP Offload Engine (TOE). http:\/\/www.chelsio.com\/nic\/tcp-offload-engine\/.  Chelsio Communications. TCP Offload Engine (TOE). http:\/\/www.chelsio.com\/nic\/tcp-offload-engine\/.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_14_1","volume-title":"CACM","author":"Dally W. J.","year":"2020","unstructured":"W. J. Dally , Y. Turakhia , and S. Han . Domain-specific hardware accelerators . CACM , July 2020 . W. J. Dally, Y. Turakhia, and S. Han. Domain-specific hardware accelerators. CACM, July 2020."},{"unstructured":"DPDK Authors. DPDK. https:\/\/www.dpdk.org\/.  DPDK Authors. DPDK. https:\/\/www.dpdk.org\/.","key":"e_1_3_2_1_15_1"},{"unstructured":"ETSI. Network Functions Virtualisation. http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf.  ETSI. Network Functions Virtualisation. http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2034773.2034812"},{"key":"e_1_3_2_1_18_1","volume-title":"NSDI","author":"Ghodsi A.","year":"2011","unstructured":"A. Ghodsi , M. Zaharia , B. Hindman , A. Konwinski , S. Shenker , and I. Stoica . Dominant Resource Fairness: Fair Allocation of Multiple Resource Types . In NSDI , 2011 . A. Ghodsi, M. Zaharia, B. Hindman, A. Konwinski, S. Shenker, and I. Stoica. Dominant Resource Fairness: Fair Allocation of Multiple Resource Types. In NSDI, 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"OSDI","author":"Gog I.","year":"2016","unstructured":"I. Gog , M. Schwarzkopf , A. Gleave , R. N. M. Watson , and S. Hand . Firmament: Fast, Centralized Cluster Scheduling at Scale . In OSDI , 2016 . I. Gog, M. Schwarzkopf, A. Gleave, R. N. M. Watson, and S. Hand. Firmament: Fast, Centralized Cluster Scheduling at Scale. In OSDI, 2016."},{"unstructured":"Google. Flatbuffers. https:\/\/google.github.io\/flatbuffers\/.  Google. Flatbuffers. https:\/\/google.github.io\/flatbuffers\/.","key":"e_1_3_2_1_20_1"},{"unstructured":"Google. gRPC. https:\/\/grpc.io\/.  Google. gRPC. https:\/\/grpc.io\/.","key":"e_1_3_2_1_21_1"},{"unstructured":"Google. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers\/.  Google. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers\/.","key":"e_1_3_2_1_22_1"},{"unstructured":"Google. XLA: Optimizing Compiler for Machine Learning. https:\/\/www.tensorflow.org\/xla\/.  Google. XLA: Optimizing Compiler for Machine Learning. https:\/\/www.tensorflow.org\/xla\/.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2999572.2999607"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3281411.3281443"},{"key":"e_1_3_2_1_26_1","first-page":"31","volume":"2018","author":"Jakobsson M.","year":"2018","unstructured":"M. Jakobsson . Secure remote attestation. IACR Cryptol . e Print Arch. , 2018 : 31 , 2018 . M. Jakobsson. Secure remote attestation. IACR Cryptol. ePrint Arch., 2018:31, 2018.","journal-title":"Print Arch."},{"key":"e_1_3_2_1_27_1","volume-title":"ISCA","author":"Jang J.","year":"2020","unstructured":"J. Jang , S. J. Jung , S. Jeong , J. Heo , H. Shin , T. J. Ham , and J. W. Lee . A specialized architecture for object serialization with applications to big data analytics . In ISCA , 2020 . J. Jang, S. J. Jung, S. Jeong, J. Heo, H. Shin, T. J. Ham, and J. W. Lee. A specialized architecture for object serialization with applications to big data analytics. In ISCA, 2020."},{"unstructured":"Jeff Barr. New -- Advanced Request Routing for AWS Application Load Balancers. https:\/\/aws.amazon.com\/blogs\/aws\/new-advanced-request-routing-for-aws-application-load-balancers\/.  Jeff Barr. New -- Advanced Request Routing for AWS Application Load Balancers. https:\/\/aws.amazon.com\/blogs\/aws\/new-advanced-request-routing-for-aws-application-load-balancers\/.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"NSDI","author":"Jeong E. Y.","year":"2014","unstructured":"E. Y. Jeong , S. Woo , M. Jamshed , H. Jeong , S. Ihm , D. Han , and K. Park . MTCP: A Highly Scalable User-Level TCP Stack for Multicore Systems . In NSDI , 2014 . E. Y. Jeong, S. Woo, M. Jamshed, H. Jeong, S. Ihm, D. Han, and K. Park. MTCP: A Highly Scalable User-Level TCP Stack for Multicore Systems. In NSDI, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/3132747.3132764"},{"key":"e_1_3_2_1_31_1","volume-title":"OSDI","author":"Khawaja A.","year":"2018","unstructured":"A. Khawaja , J. Landgraf , R. Prakash , M. Wei , E. Schkufza , and C. J. Rossbach . Sharing, Protection, and Compatibility for Reconfigurable Fabric with AmorphOS . In OSDI , 2018 . A. Khawaja, J. Landgraf, R. Prakash, M. Wei, E. Schkufza, and C. J. Rossbach. Sharing, Protection, and Compatibility for Reconfigurable Fabric with AmorphOS. In OSDI, 2018."},{"key":"e_1_3_2_1_32_1","volume-title":"NSDI","author":"Kim D.","year":"2019","unstructured":"D. Kim , T. Yu , H. H. Liu , Y. Zhu , J. Padhye , S. Raindel , C. Guo , V. Sekar , and S. Seshan . FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds . In NSDI , 2019 . D. Kim, T. Yu, H. H. Liu, Y. Zhu, J. Padhye, S. Raindel, C. Guo, V. Sekar, and S. Seshan. FreeFlow: Software-based Virtual RDMA Networking for Containerized Clouds. In NSDI, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3341302.3342093"},{"unstructured":"F. Labs. Intelligent Application traffic Management. https:\/\/www.f5.com\/products\/big-ip-services\/local-traffic-manager.  F. Labs. Intelligent Application traffic Management. https:\/\/www.f5.com\/products\/big-ip-services\/local-traffic-manager.","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/3098822.3098842"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_37_1","volume-title":"OSDI","author":"Li J.","year":"2016","unstructured":"J. Li , E. Michael , N. K. Sharma , A. Szekeres , and D. R. K. Ports . Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering . In OSDI , 2016 . J. Li, E. Michael, N. K. Sharma, A. Szekeres, and D. R. K. Ports. Just Say NO to Paxos Overhead: Replacing Consensus with Network Ordering. In OSDI, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2805789.2805800"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/3341302.3342080"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/1355734.1355746"},{"unstructured":"Microsoft. Fast TCP Loopback Performance and Low Latency with Windows Server 2012 TCP Loopback Fast Path. https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/wincat\/fast-tcp-loopback-performance-and-low-latency-with-windows-server-2012-tcp-loopback-fast-path.  Microsoft. Fast TCP Loopback Performance and Low Latency with Windows Server 2012 TCP Loopback Fast Path. https:\/\/docs.microsoft.com\/en-us\/archive\/blogs\/wincat\/fast-tcp-loopback-performance-and-low-latency-with-windows-server-2012-tcp-loopback-fast-path.","key":"e_1_3_2_1_41_1"},{"unstructured":"Microsoft. Introduction to Hyper-V on Windows 10. https:\/\/docs.microsoft.com\/en-us\/virtualization\/hyper-v-on-windows\/about\/.  Microsoft. Introduction to Hyper-V on Windows 10. https:\/\/docs.microsoft.com\/en-us\/virtualization\/hyper-v-on-windows\/about\/.","key":"e_1_3_2_1_42_1"},{"key":"e_1_3_2_1_43_1","volume-title":"POPL","author":"Necula G. C.","year":"1997","unstructured":"G. C. Necula . Proof-carrying code. In POPL , 1997 . G. C. Necula. Proof-carrying code. In POPL, 1997."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/238721.238781"},{"key":"e_1_3_2_1_45_1","volume-title":"NSDI","author":"Nelson T.","year":"2014","unstructured":"T. Nelson , A. D. Ferguson , M. J. Scheer , and S. Krishnamurthi . Tierless Programming and Reasoning for Software-Defined Networks . In NSDI , 2014 . T. Nelson, A. D. Ferguson, M. J. Scheer, and S. Krishnamurthi. Tierless Programming and Reasoning for Software-Defined Networks. In NSDI, 2014."},{"key":"e_1_3_2_1_46_1","volume-title":"NSDI","author":"Nishtala R.","year":"2013","unstructured":"R. Nishtala , H. Fugal , S. Grimm , M. Kwiatkowski , H. Lee , H. C. Li , R. McElroy , M. Paleczny , D. Peek , P. Saab , D. Stafford , T. Tung , and V. Venkataramani . Scaling Memcache at Facebook . In NSDI , 2013 . R. Nishtala, H. Fugal, S. Grimm, M. Kwiatkowski, H. Lee, H. C. Li, R. McElroy, M. Paleczny, D. Peek, P. Saab, D. Stafford, T. Tung, and V. Venkataramani. Scaling Memcache at Facebook. In NSDI, 2013."},{"key":"e_1_3_2_1_47_1","volume-title":"NSDI","author":"Nordstr\u00f6m E.","year":"2012","unstructured":"E. Nordstr\u00f6m , D. Shue , P. Gopalan , R. Kiefer , M. Arye , S. Y. Ko , J. Rexford , and M. J. Freedman . Serval: An end-host stack for service-centric networking . In NSDI , 2012 . E. Nordstr\u00f6m, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Y. Ko, J. Rexford, and M. J. Freedman. Serval: An end-host stack for service-centric networking. In NSDI, 2012."},{"key":"e_1_3_2_1_48_1","author":"Nygren E.","year":"2010","unstructured":"E. Nygren , R. K. Sitaraman , and J. Sun . The Akamai Network: A Platform for High-Performance Internet Applications. SIGOPS Oper. Syst. Rev. , August 2010 . E. Nygren, R. K. Sitaraman, and J. Sun. The Akamai Network: A Platform for High-Performance Internet Applications. SIGOPS Oper. Syst. Rev., August 2010.","journal-title":"SIGOPS Oper. Syst. Rev."},{"unstructured":"ONNX. Open Neural Network Exchange. https:\/\/onnx.ai\/.  ONNX. Open Neural Network Exchange. https:\/\/onnx.ai\/.","key":"e_1_3_2_1_49_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.14778\/3213880.3213890"},{"key":"e_1_3_2_1_51_1","volume-title":"OSDI","author":"Phothilimthana P. M.","year":"2018","unstructured":"P. M. Phothilimthana , M. Liu , A. Kaufmann , S. Peter , R. Bodik , and T. Anderson . Floem: A Programming System for NIC-Accelerated Network Applications . In OSDI , 2018 . P. M. Phothilimthana, M. Liu, A. Kaufmann, S. Peter, R. Bodik, and T. Anderson. Floem: A Programming System for NIC-Accelerated Network Applications. In OSDI, 2018."},{"key":"e_1_3_2_1_52_1","volume-title":"NSDI","author":"Ports D. R. K.","year":"2015","unstructured":"D. R. K. Ports , J. Li , V. Liu , N. K. Sharma , and A. Krishnamurthy . Designing Distributed Systems Using Approximate Synchrony in Data Center Networks . In NSDI , 2015 . D. R. K. Ports, J. Li, V. Liu, N. K. Sharma, and A. Krishnamurthy. Designing Distributed Systems Using Approximate Synchrony in Data Center Networks. In NSDI, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/3317550.3321439"},{"unstructured":"ProxySQL. ProxySQL: A High Performance Open Source MySQL Proxy. https:\/\/proxysql.com\/.  ProxySQL. ProxySQL: A High Performance Open Source MySQL Proxy. https:\/\/proxysql.com\/.","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX ATC","author":"Rizzo L.","year":"2012","unstructured":"L. Rizzo . netmap : A Novel Framework for Fast Packet I\/O . In USENIX ATC , 2012 . L. Rizzo. netmap: A Novel Framework for Fast Packet I\/O. In USENIX ATC, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_58_1","author":"Sivaraman A.","year":"2016","unstructured":"A. Sivaraman , A. Cheung , M. Budiu , C. Kim , M. Alizadeh , H. Balakrishnan , G. Varghese , N. McKeown , and S. Licking . Packet Transactions: High-Level Programming for Line-Rate Switches. In SIGCOMM , 2016 . A. Sivaraman, A. Cheung, M. Budiu, C. Kim, M. Alizadeh, H. Balakrishnan, G. Varghese, N. McKeown, and S. Licking. Packet Transactions: High-Level Programming for Line-Rate Switches. In SIGCOMM, 2016.","journal-title":"Packet Transactions: High-Level Programming for Line-Rate Switches. In SIGCOMM"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_59_1","DOI":"10.1145\/2674005.2674989"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/1290168.1290180"},{"key":"e_1_3_2_1_61_1","volume-title":"OSDI","author":"Walfish M.","year":"2004","unstructured":"M. Walfish , J. Stribling , M. N. Krohn , H. Balakrishnan , R. T. Morris , and S. Shenker . Middleboxes no longer considered harmful . In OSDI , 2004 . M. Walfish, J. Stribling, M. N. Krohn, H. Balakrishnan, R. T. Morris, and S. Shenker. Middleboxes no longer considered harmful. In OSDI, 2004."},{"key":"e_1_3_2_1_62_1","volume-title":"HotCloud","author":"Wang T.","year":"2020","unstructured":"T. Wang , H. Zhu , F. Ruffy , X. Jin , A. Sivaraman , D. Ports , and A. Panda . Multitenancy for Fast and Programmable Networks in the Cloud . In HotCloud , 2020 . T. Wang, H. Zhu, F. Ruffy, X. Jin, A. Sivaraman, D. Ports, and A. Panda. Multitenancy for Fast and Programmable Networks in the Cloud. In HotCloud, 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_63_1","DOI":"10.1145\/3373376.3378466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1145\/3281411.3281436"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.1145\/3281411.3281436"},{"key":"e_1_3_2_1_66_1","volume-title":"NSDI","author":"Zhuo D.","year":"2019","unstructured":"D. Zhuo , K. Zhang , Y. Zhu , H. H. Liu , M. Rockett , A. Krishnamurthy , and T. Anderson . Slim: OS Kernel Support for a Low-Overhead Container Overlay Network . In NSDI , 2019 . D. Zhuo, K. Zhang, Y. Zhu, H. H. Liu, M. Rockett, A. Krishnamurthy, and T. Anderson. Slim: OS Kernel Support for a Low-Overhead Container Overlay Network. In NSDI, 2019."}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"HotNets '20","name":"HotNets '20: The 19th ACM Workshop on Hot Topics in Networks","location":"Virtual Event USA"},"container-title":["Proceedings of the 19th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422604.3425927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422604.3425927","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422604.3425927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:28Z","timestamp":1750195888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422604.3425927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":65,"alternative-id":["10.1145\/3422604.3425927","10.1145\/3422604"],"URL":"https:\/\/doi.org\/10.1145\/3422604.3425927","relation":{},"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"2020-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}