{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:28:35Z","timestamp":1763389715043,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,25]],"date-time":"2023-03-25T00:00:00Z","timestamp":1679702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Network Programming Initiative","award":[""],"award-info":[{"award-number":[""]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2008048,1837030,2107138,2019302,1910796"],"award-info":[{"award-number":["2008048,1837030,2107138,2019302,1910796"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,25]]},"DOI":"10.1145\/3582016.3582036","type":"proceedings-article","created":{"date-parts":[[2023,3,20]],"date-time":"2023-03-20T16:59:03Z","timestamp":1679331543000},"page":"72-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["CaT: A Solver-Aided Compiler for Packet-Processing Pipelines"],"prefix":"10.1145","author":[{"given":"Xiangyu","family":"Gao","sequence":"first","affiliation":[{"name":"New York University, USA"}]},{"given":"Divya","family":"Raghunathan","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Ruijie","family":"Fang","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"New York University, USA"}]},{"given":"Xiaotong","family":"Zhu","sequence":"additional","affiliation":[{"name":"New York University, USA"}]},{"given":"Anirudh","family":"Sivaraman","sequence":"additional","affiliation":[{"name":"New York University, USA"}]},{"given":"Srinivas","family":"Narayana","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]},{"given":"Aarti","family":"Gupta","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMD Pensando Infrastructure Accelerators. https:\/\/www.amd.com\/en\/accelerators\/pensando. \t\t\t\t  AMD Pensando Infrastructure Accelerators. https:\/\/www.amd.com\/en\/accelerators\/pensando."},{"key":"e_1_3_2_1_2_1","unstructured":"Benchmarks used to show resource transformation difference. https:\/\/anonymous.4open.science\/r\/program_transformation_ex-6EE7. \t\t\t\t  Benchmarks used to show resource transformation difference. https:\/\/anonymous.4open.science\/r\/program_transformation_ex-6EE7."},{"key":"e_1_3_2_1_3_1","unstructured":"Broadcom Jericho2 Ethernet Switch Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/stratadnx\/bcm88690. \t\t\t\t  Broadcom Jericho2 Ethernet Switch Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/stratadnx\/bcm88690."},{"key":"e_1_3_2_1_4_1","unstructured":"Broadcom Trident Ethernet Switch Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/strataxgs\/bcm56880-series. \t\t\t\t  Broadcom Trident Ethernet Switch Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/strataxgs\/bcm56880-series."},{"key":"e_1_3_2_1_5_1","unstructured":"Gurobi Optimizer. https:\/\/www.gurobi.com\/. \t\t\t\t  Gurobi Optimizer. https:\/\/www.gurobi.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"HPCC++: Enhanced High Precision Congestion Control. https:\/\/www.ietf.org\/id\/draft-miao-tsv-hpcc-01.html. \t\t\t\t  HPCC++: Enhanced High Precision Congestion Control. https:\/\/www.ietf.org\/id\/draft-miao-tsv-hpcc-01.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel FPGA\u2019s High Level Synthesis Compiler. https:\/\/www.intel.com\/content\/www\/us\/en\/software\/programmable\/quartus-prime\/hls-compiler.html. \t\t\t\t  Intel FPGA\u2019s High Level Synthesis Compiler. https:\/\/www.intel.com\/content\/www\/us\/en\/software\/programmable\/quartus-prime\/hls-compiler.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel Infrastructure Processing Unit (Intel IPU). https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/smartnic.html. \t\t\t\t  Intel Infrastructure Processing Unit (Intel IPU). https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/smartnic.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Tofino Programmable Ethernet Switch ASIC. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html. \t\t\t\t  Intel Tofino Programmable Ethernet Switch ASIC. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network-io\/programmable-ethernet-switch\/tofino-series.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Menshen: An Isolation Mechanism for High-Speed Packet-Processing Pipelines. https:\/\/isolation.quest\/. \t\t\t\t  Menshen: An Isolation Mechanism for High-Speed Packet-Processing Pipelines. https:\/\/isolation.quest\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Open-source p4c compiler. https:\/\/github.com\/p4lang\/p4c. \t\t\t\t  Open-source p4c compiler. https:\/\/github.com\/p4lang\/p4c."},{"key":"e_1_3_2_1_12_1","unstructured":"P4-16 language specification. https:\/\/p4.org\/p4-spec\/docs\/P4-16-v1.1.0-spec.html. \t\t\t\t  P4-16 language specification. https:\/\/p4.org\/p4-spec\/docs\/P4-16-v1.1.0-spec.html."},{"key":"e_1_3_2_1_13_1","unstructured":"P4_16 language specification. https:\/\/p4lang.github.io\/p4-spec\/docs\/P4-16-v1.2.2.html#sec-concurrency. \t\t\t\t  P4_16 language specification. https:\/\/p4lang.github.io\/p4-spec\/docs\/P4-16-v1.2.2.html#sec-concurrency."},{"key":"e_1_3_2_1_14_1","unstructured":"Rate enforcer P4 program github repo. https:\/\/github.com\/Princeton-Cabernet\/AHAB\/blob\/7c3b1bb\/p4src\/include\/rate_enforcer.p4#L366. \t\t\t\t  Rate enforcer P4 program github repo. https:\/\/github.com\/Princeton-Cabernet\/AHAB\/blob\/7c3b1bb\/p4src\/include\/rate_enforcer.p4#L366."},{"key":"e_1_3_2_1_15_1","unstructured":"SipHash P4 program github repo. https:\/\/github.com\/Princeton-Cabernet\/p4-projects\/blob\/master\/SipHash-tofino\/p4src\/siphash24_ingressonly.p4#L587. \t\t\t\t  SipHash P4 program github repo. https:\/\/github.com\/Princeton-Cabernet\/p4-projects\/blob\/master\/SipHash-tofino\/p4src\/siphash24_ingressonly.p4#L587."},{"key":"e_1_3_2_1_16_1","unstructured":"Synopsys Introduces Synphony High Level Synthesis. https:\/\/news.synopsys.com\/index.php?s=20295&item=123096. \t\t\t\t  Synopsys Introduces Synphony High Level Synthesis. https:\/\/news.synopsys.com\/index.php?s=20295&item=123096."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7592970"},{"key":"e_1_3_2_1_18_1","volume-title":"P4-16 specification v1.2.3. https:\/\/p4.org\/wp-content\/uploads\/2022\/07\/P4-16-spec.html#sec-table-action-list","author":"Actions","year":"2022","unstructured":"Actions , P4-16 specification v1.2.3. https:\/\/p4.org\/wp-content\/uploads\/2022\/07\/P4-16-spec.html#sec-table-action-list , 2022 . Actions, P4-16 specification v1.2.3. https:\/\/p4.org\/wp-content\/uploads\/2022\/07\/P4-16-spec.html#sec-table-action-list, 2022."},{"key":"e_1_3_2_1_19_1","volume-title":"Code Generation for Expressions with Common Subexpressions. Journal of the ACM","author":"Aho Alfred V.","year":"1977","unstructured":"Alfred V. Aho , Stephen C. Johnson , and Jeffrey D . Ullman . Code Generation for Expressions with Common Subexpressions. Journal of the ACM , 1977 . Alfred V. Aho, Stephen C. Johnson, and Jeffrey D. Ullman. Code Generation for Expressions with Common Subexpressions. Journal of the ACM, 1977."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626316"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"e_1_3_2_1_22_1","volume-title":"Paper 2012\/351","author":"Aumasson Jean-Philippe","year":"2012","unstructured":"Jean-Philippe Aumasson and Daniel J. Bernstein . Siphash: a fast short-input prf. Cryptology ePrint Archive , Paper 2012\/351 , 2012 . https:\/\/eprint.iacr.org\/2012\/351. Jean-Philippe Aumasson and Daniel J. Bernstein. Siphash: a fast short-input prf. Cryptology ePrint Archive, Paper 2012\/351, 2012. https:\/\/eprint.iacr.org\/2012\/351."},{"key":"e_1_3_2_1_23_1","unstructured":"Clark W. Barrett Roberto Sebastiani Sanjit A. Seshia and Cesare Tinelli. Satisfiability modulo theories. In Handbook of Satisfiability. \t\t\t\t  Clark W. Barrett Roberto Sebastiani Sanjit A. Seshia and Cesare Tinelli. Satisfiability modulo theories. In Handbook of Satisfiability."},{"key":"e_1_3_2_1_24_1","volume-title":"ACM SIGCOMM","author":"Basat Ran Ben","year":"2020","unstructured":"Ran Ben Basat , Sivaramakrishnan Ramanathan , Yuliang Li , Gianni Antichi , Minian Yu , and Michael Mitzenmacher . PINT : Probabilistic In-Band Network Telemetry . In ACM SIGCOMM , 2020 . Ran Ben Basat, Sivaramakrishnan Ramanathan, Yuliang Li, Gianni Antichi, Minian Yu, and Michael Mitzenmacher. PINT: Probabilistic In-Band Network Telemetry. In ACM SIGCOMM, 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Handbook of Model Checking","author":"Beyer Dirk","year":"2018","unstructured":"Dirk Beyer , Sumit Gulwani , and David A. Schmidt . Combining model checking and data-flow analysis . In Handbook of Model Checking . Springer , 2018 . Dirk Beyer, Sumit Gulwani, and David A. Schmidt. Combining model checking and data-flow analysis. In Handbook of Model Checking. Springer, 2018."},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Bilge Leyla","year":"2011","unstructured":"Leyla Bilge , Engin Kirda , Christopher Kruegel , and Marco Balduzzi . EXPOSURE : Finding Malicious Domains Using Passive DNS Analysis . In NDSS , 2011 . Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In NDSS, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"e_1_3_2_1_28_1","volume-title":"FlowMap: an optimal technology mapping algorithm for delay optimization in lookup-table based FPGA designs","author":"Cong J.","year":"1994","unstructured":"J. Cong and Yuzheng Ding . FlowMap: an optimal technology mapping algorithm for delay optimization in lookup-table based FPGA designs . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , 1994 . J. Cong and Yuzheng Ding. FlowMap: an optimal technology mapping algorithm for delay optimization in lookup-table based FPGA designs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1994."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2009.69"},{"key":"e_1_3_2_1_30_1","volume-title":"ACM TOPLAS","author":"Cytron Ron","year":"1991","unstructured":"Ron Cytron , Jeanne Ferrante , Barry K Rosen , Mark N Wegman , and F Kenneth Zadeck . Efficiently computing static single assignment form and the control dependence graph . ACM TOPLAS , 1991 . Ron Cytron, Jeanne Ferrante, Barry K Rosen, Mark N Wegman, and F Kenneth Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM TOPLAS, 1991."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_32_1","volume-title":"The BLUE Active Queue Management Algorithms","author":"Shin Kang G.","year":"2002","unstructured":"Wu-chang Feng, Kang G. Shin , Dilip D. Kandlur , and Debanjan Saha . The BLUE Active Queue Management Algorithms . IEEE\/ACM ToN , 2002 . Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, and Debanjan Saha. The BLUE Active Queue Management Algorithms. IEEE\/ACM ToN, 2002."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405879"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405852"},{"key":"e_1_3_2_1_35_1","volume-title":"ACM SIGCOMM","author":"Goyal Pawan","year":"1996","unstructured":"Pawan Goyal , Harrick M. Vin , and Haichen Chen . Start-time Fair Queueing: A Scheduling Algorithm for Integrated Services Packet Switching Networks . In ACM SIGCOMM , 1996 . Pawan Goyal, Harrick M. Vin, and Haichen Chen. Start-time Fair Queueing: A Scheduling Algorithm for Integrated Services Packet Switching Networks. In ACM SIGCOMM, 1996."},{"key":"e_1_3_2_1_36_1","volume-title":"Hachtel and Fabio Somenzi. Logic synthesis and verification algorithms","author":"Gary","year":"2006","unstructured":"Gary D. Hachtel and Fabio Somenzi. Logic synthesis and verification algorithms . 2006 . Gary D. Hachtel and Fabio Somenzi. Logic synthesis and verification algorithms. 2006."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX NSDI","author":"Hogan Mary","year":"2022","unstructured":"Mary Hogan , Shir Landau-Feibish , Mina Tahmasbi Arashloo , Jennifer Rexford , and David Walker . Modular Switch Programming Under Resource Constraints . In USENIX NSDI , 2022 . Mary Hogan, Shir Landau-Feibish, Mina Tahmasbi Arashloo, Jennifer Rexford, and David Walker. Modular Switch Programming Under Resource Constraints. In USENIX NSDI, 2022."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"e_1_3_2_1_39_1","volume-title":"USENIX NSDI","author":"Jose Lavanya","year":"2015","unstructured":"Lavanya Jose , Lisa Yan , George Varghese , and Nick McKeown . Compiling Packet Programs to Reconfigurable Switches . In USENIX NSDI , 2015 . Lavanya Jose, Lisa Yan, George Varghese, and Nick McKeown. Compiling Packet Programs to Reconfigurable Switches. In USENIX NSDI, 2015."},{"key":"e_1_3_2_1_40_1","volume-title":"SIGCOMM Industrial Demo Session","author":"Kim Changhoon","year":"2015","unstructured":"Changhoon Kim , Anirudh Sivaraman , Naga Katta , Antonin Bas , Advait Dixit , and Lawrence J Wobker . In-band network telemetry via programmable dataplanes . In SIGCOMM Industrial Demo Session , 2015 . Changhoon Kim, Anirudh Sivaraman, Naga Katta, Antonin Bas, Advait Dixit, and Lawrence J Wobker. In-band network telemetry via programmable dataplanes. In SIGCOMM Industrial Demo Session, 2015."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_42_1","volume-title":"ACM PLDI","author":"Lam M.","year":"1988","unstructured":"M. Lam . Software Pipelining : An Effective Scheduling Technique for VLIW Machines . In ACM PLDI , 1988 . M. Lam. Software Pipelining: An Effective Scheduling Technique for VLIW Machines. In ACM PLDI, 1988."},{"key":"e_1_3_2_1_43_1","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation","author":"Lattner Chris","year":"2004","unstructured":"Chris Lattner and Vikram Adve . LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation . In ACM\/IEEE CGO , 2004 . Chris Lattner and Vikram Adve. LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In ACM\/IEEE CGO, 2004."},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX NSDI","author":"Li Yifan","year":"2022","unstructured":"Yifan Li , Jiaqi Gao , Ennan Zhai , Mengqi Liu , Kun Liu , and Hongqiang Harry Liu . Cetus : Releasing P4 Programmers from the Chore of Trial and Error Compiling . In USENIX NSDI , 2022 . Yifan Li, Jiaqi Gao, Ennan Zhai, Mengqi Liu, Kun Liu, and Hongqiang Harry Liu. Cetus: Releasing P4 Programmers from the Chore of Trial and Error Compiling. In USENIX NSDI, 2022."},{"key":"e_1_3_2_1_45_1","volume-title":"ACM SIGCOMM","author":"Li Yuliang","year":"2019","unstructured":"Yuliang Li , Rui Miao , Hongqiang Harry Liu , Yan Zhuang , Fei Feng , Lingbo Tang , Zheng Cao , Ming Zhang , Frank Kelly , Mohammad Alizadeh , and Minlan Yu. Hpcc : High precision congestion control . In ACM SIGCOMM , 2019 . Yuliang Li, Rui Miao, Hongqiang Harry Liu, Yan Zhuang, Fei Feng, Lingbo Tang, Zheng Cao, Ming Zhang, Frank Kelly, Mohammad Alizadeh, and Minlan Yu. Hpcc: High precision congestion control. In ACM SIGCOMM, 2019."},{"key":"e_1_3_2_1_46_1","volume-title":"IEEE INFOCOM","author":"MacDavid Robert","year":"2023","unstructured":"Robert MacDavid , Xiaoqi Chen , and Jennifer Rexford . Scalable Real-Time Bandwidth Fairness in Switches . In IEEE INFOCOM , 2023 . Robert MacDavid, Xiaoqi Chen, and Jennifer Rexford. Scalable Real-Time Bandwidth Fairness in Switches. In IEEE INFOCOM, 2023."},{"key":"e_1_3_2_1_47_1","volume-title":"USENIC Security","author":"Meier Roland","year":"2018","unstructured":"Roland Meier , Petar Tsankov , Vincent Lenders , Laurent Vanbever , and Martin Vechev. NetHide : Secure and Practical Network Topology Obfuscation . In USENIC Security , 2018 . Roland Meier, Petar Tsankov, Vincent Lenders, Laurent Vanbever, and Martin Vechev. NetHide: Secure and Practical Network Topology Obfuscation. In USENIC Security, 2018."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"e_1_3_2_1_50_1","volume-title":"ACM SIGCOMM","author":"Pan Tian","year":"2021","unstructured":"Tian Pan , Nianbing Yu , Chenhao Jia , Jianwen Pi , Liang Xu , Yisong Qiao , Zhiguo Li , Kun Liu , Jie Lu , Jianyuan Lu , Enge Song , Jiao Zhang , Tao Huang , and Shunmin Zhu . Sailfish : Accelerating cloud-scale multi-tenant multi-service gateways with programmable switches . In ACM SIGCOMM , 2021 . Tian Pan, Nianbing Yu, Chenhao Jia, Jianwen Pi, Liang Xu, Yisong Qiao, Zhiguo Li, Kun Liu, Jie Lu, Jianyuan Lu, Enge Song, Jiao Zhang, Tao Huang, and Shunmin Zhu. Sailfish: Accelerating cloud-scale multi-tenant multi-service gateways with programmable switches. In ACM SIGCOMM, 2021."},{"key":"e_1_3_2_1_51_1","volume-title":"ACM HotNets","author":"Sapio Amedeo","year":"2017","unstructured":"Amedeo Sapio , Ibrahim Abdelaziz , Abdulla Aldilaijan , Marco Canini , and Panos Kalnis . In-Network Computation is a Dumb Idea Whose Time Has Come . In ACM HotNets , 2017 . Amedeo Sapio, Ibrahim Abdelaziz, Abdulla Aldilaijan, Marco Canini, and Panos Kalnis. In-Network Computation is a Dumb Idea Whose Time Has Come. In ACM HotNets, 2017."},{"key":"e_1_3_2_1_52_1","volume-title":"ACM HotNets","author":"Sinha Shan","year":"2004","unstructured":"Shan Sinha , Srikanth Kandula , and Dina Katabi . Harnessing TCPs Burstiness using Flowlet Switching . In ACM HotNets , 2004 . Shan Sinha, Srikanth Kandula, and Dina Katabi. Harnessing TCPs Burstiness using Flowlet Switching. In ACM HotNets, 2004."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_2_1_54_1","volume-title":"ACM SOSR","author":"Sivaraman Anirudh","year":"2015","unstructured":"Anirudh Sivaraman , Changhoon Kim , Ramkumar Krishnamoorthy , Advait Dixit , and Mihai Budiu . DC.P4 : Programming the forwarding plane of a data-center switch . In ACM SOSR , 2015 . Anirudh Sivaraman, Changhoon Kim, Ramkumar Krishnamoorthy, Advait Dixit, and Mihai Budiu. DC.P4: Programming the forwarding plane of a data-center switch. In ACM SOSR, 2015."},{"key":"e_1_3_2_1_56_1","volume-title":"ACM SIGCOMM","author":"Sonchak John","year":"2021","unstructured":"John Sonchak , Devon Loehr , Jennifer Rexford , and David Walker . Lucid : A Language for Control in the Data Plane . In ACM SIGCOMM , 2021 . John Sonchak, Devon Loehr, Jennifer Rexford, and David Walker. Lucid: A Language for Control in the Data Plane. In ACM SIGCOMM, 2021."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405872"},{"key":"e_1_3_2_1_58_1","first-page":"4","volume-title":"Flightplan: Dataplane disaggregation and placement for","author":"Sultana Nik","year":"2021","unstructured":"Nik Sultana , John Sonchack , Hans Giesen , Isaac Pedisich , Zhaoyang Han , Nishanth Shyamkumar , Shivani Burad , Andr\u00e9 DeHon , and Boon Thau Loo . Flightplan: Dataplane disaggregation and placement for p 4 programs. In USENIX NSDI , 2021 . Nik Sultana, John Sonchack, Hans Giesen, Isaac Pedisich, Zhaoyang Han, Nishanth Shyamkumar, Shivani Burad, Andr\u00e9 DeHon, and Boon Thau Loo. Flightplan: Dataplane disaggregation and placement for p4 programs. In USENIX NSDI, 2021."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.285"},{"key":"e_1_3_2_1_60_1","volume-title":"EuroP4","author":"Vass Bal\u00e1zs","year":"2020","unstructured":"Bal\u00e1zs Vass , Erika B\u00e9rczi-Kov\u00e1cs , Costin Raiciu , and G\u00e1bor R\u00e9tv\u00e1ri . Compiling Packet Programs to Reconfigurable Switches: Theory and Algorithms . In EuroP4 , 2020 . Bal\u00e1zs Vass, Erika B\u00e9rczi-Kov\u00e1cs, Costin Raiciu, and G\u00e1bor R\u00e9tv\u00e1ri. Compiling Packet Programs to Reconfigurable Switches: Theory and Algorithms. In EuroP4, 2020."},{"key":"e_1_3_2_1_61_1","volume-title":"USENIX NSDI","author":"Wang Tao","year":"2022","unstructured":"Tao Wang , Xiangrui Yang , Gianni Antichi , Anirudh Sivaraman , and Aurojit Panda . Isolation Mechanisms for High-Speed Packet-Processing Pipelines . In USENIX NSDI , 2022 . Tao Wang, Xiangrui Yang, Gianni Antichi, Anirudh Sivaraman, and Aurojit Panda. Isolation Mechanisms for High-Speed Packet-Processing Pipelines. In USENIX NSDI, 2022."},{"key":"e_1_3_2_1_62_1","volume-title":"Yoo and Xiaoqi Chen. Secure Keyed Hashing on Programmable Switches. In ACM SIGCOMM Workshop on Secure Programmable Network INfrastructure","author":"Sophia","year":"2021","unstructured":"Sophia Yoo and Xiaoqi Chen. Secure Keyed Hashing on Programmable Switches. In ACM SIGCOMM Workshop on Secure Programmable Network INfrastructure , 2021 . Sophia Yoo and Xiaoqi Chen. Secure Keyed Hashing on Programmable Switches. In ACM SIGCOMM Workshop on Secure Programmable Network INfrastructure, 2021."}],"event":{"name":"ASPLOS '23: 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Vancouver BC Canada","acronym":"ASPLOS '23"},"container-title":["Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582036","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:45Z","timestamp":1750178805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582016.3582036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,25]]},"references-count":61,"alternative-id":["10.1145\/3582016.3582036","10.1145\/3582016"],"URL":"https:\/\/doi.org\/10.1145\/3582016.3582036","relation":{},"subject":[],"published":{"date-parts":[[2023,3,25]]},"assertion":[{"value":"2023-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}