{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:15:33Z","timestamp":1764713733200,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Portuguese Foundation for Science and Technology FCT","award":["UIDB\/50021\/2020 and 2022.03537.PTDC"],"award-info":[{"award-number":["UIDB\/50021\/2020 and 2022.03537.PTDC"]}]},{"DOI":"10.13039\/501100006374","name":"Carnegie Mellon Portugal","doi-asserted-by":"publisher","award":["SFRH\/BD\/151467\/2021"],"award-info":[{"award-number":["SFRH\/BD\/151467\/2021"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2212390"],"award-info":[{"award-number":["CNS-2212390"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3688443","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T09:40:26Z","timestamp":1730454026000},"page":"401-414","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Reverse-Engineering Congestion Control Algorithm Behavior"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1170-5124","authenticated-orcid":false,"given":"Margarida","family":"Ferreira","sequence":"first","affiliation":[{"name":"Carnegie Mellon University &amp; INESC-ID, IST U. Lisboa, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6619-4149","authenticated-orcid":false,"given":"Ranysha","family":"Ware","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7065-1196","authenticated-orcid":false,"given":"Yash","family":"Kothari","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4868-415X","authenticated-orcid":false,"given":"In\u00eas","family":"Lynce","sequence":"additional","affiliation":[{"name":"INESC-ID\/IST, U. Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1525-1382","authenticated-orcid":false,"given":"Ruben","family":"Martins","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6626-141X","authenticated-orcid":false,"given":"Akshay","family":"Narayan","sequence":"additional","affiliation":[{"name":"Brown University, Providence, Rhode Island, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8270-4102","authenticated-orcid":false,"given":"Justine","family":"Sherry","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564085"},{"key":"e_1_3_2_1_2_1","volume-title":"NSDI","author":"Agarwal Anup","year":"2024","unstructured":"Anup Agarwal, Venkat Arun, Devdeep Ray, Ruben Martins, and Srinivasan Seshan. Towards Provably Performant Congestion Control. In NSDI, 2024. Cited on page 13."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472912"},{"key":"e_1_3_2_1_4_1","first-page":"3","volume-title":"Srinivasan Seshan, and Justine Sherry. Prudentia: Measuring Congestion Control Harm on the Internet. In SIGCOMM N2Women Workshop","author":"Athapathu Rukshani","year":"2020","unstructured":"Rukshani Athapathu, Ranysha Ware, Aditya Abraham Philip, Srinivasan Seshan, and Justine Sherry. Prudentia: Measuring Congestion Control Harm on the Internet. In SIGCOMM N2Women Workshop, 2020. Cited on page 3."},{"key":"e_1_3_2_1_5_1","first-page":"7","article-title":"YeAH-TCP","volume":"7","author":"Baiocchi Andrea","year":"2007","unstructured":"Andrea Baiocchi, Angelo P Castellani, Francesco Vacirca, et al. YeAH-TCP: Yet Another Highspeed TCP. In Proc. PFLDnet, volume 7, 2007. Cited on page 7.","journal-title":"Yet Another Highspeed TCP. In Proc. PFLDnet"},{"key":"e_1_3_2_1_6_1","volume-title":"ICLR (Poster)","author":"Balog Matej","year":"2017","unstructured":"Matej Balog, Alexander L. Gaunt, Marc Brockschmidt, Sebastian Nowozin, and Daniel Tarlow. DeepCoder: Learning to Write Programs. In ICLR (Poster), 2017. Cited on page 3."},{"key":"e_1_3_2_1_7_1","volume-title":"KDD Workshop","author":"Donald","year":"1994","unstructured":"Donald J. Berndt and James Clifford. Using Dynamic Time Warping to Find Patterns in Time Series. In KDD Workshop, 1994. Cited on page 6."},{"key":"e_1_3_2_1_8_1","volume-title":"TCP-NV: Congestion Avoidance for Data Centers. Linux Plumbers Conference","author":"Brakmo L.","year":"2010","unstructured":"L. Brakmo. TCP-NV: Congestion Avoidance for Data Centers. Linux Plumbers Conference, 2010. Cited on pages 7 and 10."},{"key":"e_1_3_2_1_9_1","volume-title":"TCP Vegas: New Techniques for Congestion Detection and Avoidance. In SIGCOMM","author":"Brakmo Lawrence S.","year":"1994","unstructured":"Lawrence S. Brakmo, Sean W. O'Malley, and Larry L. Peterson. TCP Vegas: New Techniques for Congestion Detection and Avoidance. In SIGCOMM, 1994. Cited on pages 5, 7, and 10."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57259-3_11"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Understanding Congestion Control for Cloud Game Streaming","author":"Caban Deklin","year":"2020","unstructured":"Deklin Caban, Devdeep Ray, and Srinivasan Seshan. Understanding Congestion Control for Cloud Game Streaming. 2020. Cited on page 1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sat.799"},{"key":"e_1_3_2_1_13_1","first-page":"14","author":"Cardwell Neal","year":"2016","unstructured":"Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, and Van Jacobson. BBR: Congestion-Based Congestion Control. ACM Queue, 14, 2016. Cited on pages 5, 7, and 8.","journal-title":"Congestion-Based Congestion Control. ACM Queue"},{"key":"e_1_3_2_1_14_1","first-page":"12","volume-title":"Gradient Descent over Metagrammars for Syntax-Guided Synthesis. CoRR, abs\/2007.06677","author":"Chan Nicolas","year":"2020","unstructured":"Nicolas Chan, Elizabeth Polgreen, and Sanjit A. Seshia. Gradient Descent over Metagrammars for Syntax-Guided Synthesis. CoRR, abs\/2007.06677, 2020. Cited on page 12."},{"key":"e_1_3_2_1_15_1","first-page":"3","author":"Chen Haoxian","year":"2018","unstructured":"Haoxian Chen, Anduo Wang, and Boon Thau Loo. Towards Example-Guided Network Synthesis. In APNet, 2018. Cited on page 3.","journal-title":"Towards Example-Guided Network Synthesis. In APNet"},{"key":"e_1_3_2_1_16_1","unstructured":"Mark Chen Jerry Tworek Heewoo Jun Qiming Yuan Henrique Pond\u00e9 de Oliveira Pinto Jared Kaplan Harrison Edwards Yuri Burda Nicholas Joseph Greg Brockman Alex Ray Raul Puri Gretchen Krueger Michael Petrov Heidy Khlaaf Girish Sastry Pamela Mishkin Brooke Chan Scott Gray Nick Ryder Mikhail Pavlov Alethea Power Lukasz Kaiser Mohammad Bavarian Clemens Winter Philippe Tillet Felipe Petroski Such Dave Cummings Matthias Plappert Fotios Chantzis Elizabeth Barnes Ariel Herbert-Voss William Hebgen Guss Alex Nichol Alex Paino Nikolas Tezak Jie Tang Igor Babuschkin Suchir Balaji Shantanu Jain William Saunders Christopher Hesse Andrew N. Carr Jan Leike Joshua Achiam Vedant Misra Evan Morikawa Alec Radford Matthew Knight Miles Brundage Mira Murati Katie Mayer Peter Welinder Bob McGrew Dario Amodei Sam McCandlish Ilya Sutskever and Wojciech Zaremba. Evaluating large language models trained on code. CoRR abs\/2107.03374 2021. Cited on page 3."},{"key":"e_1_3_2_1_17_1","first-page":"3","article-title":"Multi-Modal Synthesis of Regular Expressions","author":"Chen Qiaochu","year":"2020","unstructured":"Qiaochu Chen, Xinyu Wang, Xi Ye, Greg Durrett, and Isil Dillig. Multi-Modal Synthesis of Regular Expressions. In PLDI, 2020. Cited on page 3.","journal-title":"PLDI"},{"key":"e_1_3_2_1_18_1","first-page":"17","article-title":"Analysis of the Increase and Decrease Algorithms for Congestion Avoidance","author":"Chiu Dah-Ming","year":"1989","unstructured":"Dah-Ming Chiu and Raj Jain. Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks. Comput. Networks, 17, 1989. Cited on page 1.","journal-title":"Computer Networks. Comput. Networks"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_20_1","volume-title":"Inferring Persistent Interdomain Congestion. In SIGCOMM","author":"Dhamdhere Amogh","year":"2018","unstructured":"Amogh Dhamdhere, David D. Clark, Alexander Gamero-Garrido, Matthew J. Luckie, Ricky K. P. Mok, Gautam Akiwate, Kabir Gogia, Vaibhav Bajpai, Alex C. Snoeren, and kc claffy. Inferring Persistent Interdomain Congestion. In SIGCOMM, 2018. Cited on page 3."},{"key":"e_1_3_2_1_21_1","first-page":"3","author":"Feng Yu","year":"2018","unstructured":"Yu Feng, Ruben Martins, Osbert Bastani, and Isil Dillig. Program Synthesis Using Conflict-Driven Learning. In PLDI, 2018. Cited on page 3.","journal-title":"Program Synthesis Using Conflict-Driven Learning. In PLDI"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062351"},{"key":"e_1_3_2_1_23_1","first-page":"6","author":"Feng Yu","year":"2017","unstructured":"Yu Feng, Ruben Martins, Yuepeng Wang, Isil Dillig, and Thomas W. Reps. Component-Based Synthesis for Complex APIs. In POPL, 2017. Cited on page 6.","journal-title":"Reps. Component-Based Synthesis for Complex APIs. In POPL"},{"key":"e_1_3_2_1_24_1","first-page":"2","author":"Ferreira Margarida","year":"2021","unstructured":"Margarida Ferreira, Akshay Narayan, In\u00eas Lynce, Ruben Martins, and Justine Sherry. Counterfeiting Congestion Control Algorithms. In HotNets, 2021. Cited on pages 2, 3, 4, and 13.","journal-title":"Counterfeiting Congestion Control Algorithms. In HotNets"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"key":"e_1_3_2_1_26_1","first-page":"11","volume-title":"HighSpeed TCP for Large Congestion Windows. https:\/\/www.ietf. org\/rfc\/rfc3649.txt","author":"Floyd Sally","year":"2003","unstructured":"Sally Floyd. HighSpeed TCP for Large Congestion Windows. https:\/\/www.ietf. org\/rfc\/rfc3649.txt, 2003. Cited on page 11."},{"key":"e_1_3_2_1_27_1","volume-title":"NSDI","author":"Fouladi Sadjad","year":"2018","unstructured":"Sadjad Fouladi, John Emmons, Emre Orbay, Catherine Wu, Riad S. Wahby, and Keith Winstein. Salsify: Low-Latency Network Video through Tighter Integration between a Video Codec and a Transport Protocol. In NSDI, 2018. Cited on page 3."},{"issue":"2","key":"e_1_3_2_1_28_1","first-page":"7","article-title":"TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks","volume":"21","author":"Fu Cheng Peng","year":"2003","unstructured":"Cheng Peng Fu and Soung C. Liew. TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks. IEEE J. Sel. Areas Commun., 21(2), 2003. Cited on page 7.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"e_1_3_2_1_29_1","volume-title":"TMA. IFIP","author":"Gong Sishuai","year":"2020","unstructured":"Sishuai Gong, Usama Naseer, and Theophilus Benson. Inspector Gadget: A Framework for Inferring TCP Congestion Control Algorithms and Protocol Configurations. In TMA. IFIP, 2020. Cited on pages 3 and 4."},{"key":"e_1_3_2_1_30_1","first-page":"12","article-title":"Programming by Examples - and its applications in Data Wrangling. In Javier Esparza, Orna Grumberg, and Salomon Sickert, editors","volume":"45","author":"Gulwani Sumit","year":"2016","unstructured":"Sumit Gulwani. Programming by Examples - and its applications in Data Wrangling. In Javier Esparza, Orna Grumberg, and Salomon Sickert, editors, Dependable Software Systems Engineering, volume 45. 2016. Cited on page 12.","journal-title":"Dependable Software Systems Engineering"},{"key":"e_1_3_2_1_31_1","first-page":"55","author":"Gulwani Sumit","year":"2012","unstructured":"Sumit Gulwani, William R. Harris, and Rishabh Singh. Spreadsheet Data Manipulation Using Examples. CACM, 55, 2012. Cited on pages 1, 3, and 12.","journal-title":"Spreadsheet Data Manipulation Using Examples. CACM"},{"key":"e_1_3_2_1_32_1","first-page":"4","article-title":"Program synthesis","author":"Gulwani Sumit","year":"2017","unstructured":"Sumit Gulwani, Oleksandr Polozov, and Rishabh Singh. Program synthesis. Foundations and Trends in Programming Languages, 4, 2017. Cited on page 1.","journal-title":"Foundations and Trends in Programming Languages"},{"key":"e_1_3_2_1_33_1","first-page":"6","article-title":"Type-Directed Program Synthesis for RESTful APIs","author":"Guo Zheng","year":"2022","unstructured":"Zheng Guo, David Cao, Davin Tjong, Jean Yang, Cole Schlesinger, and Nadia Polikarpova. Type-Directed Program Synthesis for RESTful APIs. In PLDI, 2022. Cited on page 6.","journal-title":"PLDI"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_3_2_1_35_1","volume-title":"Inductive Program Synthesis Over Noisy Data. In ESEC\/SIGSOFT FSE","author":"Handa Shivam","year":"2020","unstructured":"Shivam Handa and Martin C. Rinard. Inductive Program Synthesis Over Noisy Data. In ESEC\/SIGSOFT FSE, 2020. Cited on page 12."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_25"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/248156.248180"},{"key":"e_1_3_2_1_38_1","unstructured":"Van Jacobson Neal Cardwell Yuchung Cheng and Soheil Hassas Yeganeh. Bottleneck Bandwidth and RTT (BBR) Congestion Control. https:\/\/elixir.bootlin. com\/linux\/v4.14\/source\/net\/ipv4\/tcp_bbr.c. Cited on page 7."},{"key":"e_1_3_2_1_39_1","first-page":"3","author":"Jha Susmit","year":"2010","unstructured":"Susmit Jha, Sumit Gulwani, Sanjit A. Seshia, and Ashish Tiwari. Oracle-Guided Component-Based Program Synthesis. In ICSE. ACM, 2010. Cited on page 3.","journal-title":"Oracle-Guided Component-Based Program Synthesis. In ICSE. ACM"},{"key":"e_1_3_2_1_40_1","volume-title":"ICLR (Poster)","author":"Kalyan Ashwin","year":"2018","unstructured":"Ashwin Kalyan, Abhishek Mohta, Oleksandr Polozov, Dhruv Batra, Prateek Jain, and Sumit Gulwani. Neural-Guided Deductive Search for Real-Time Program Synthesis from Examples. In ICLR (Poster), 2018. Cited on page 3."},{"key":"e_1_3_2_1_41_1","first-page":"33","article-title":"Improving Performance","author":"Kelly Tom","year":"2003","unstructured":"Tom Kelly. Scalable TCP: Improving Performance in Highspeed Wide Area Networks. SIGCOMM CCR, 33, 2003. Cited on page 7.","journal-title":"Highspeed Wide Area Networks. SIGCOMM CCR"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.879702"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192410"},{"key":"e_1_3_2_1_45_1","volume-title":"PFLDNet","author":"Leith DJ","year":"2004","unstructured":"DJ Leith and R. Shorten. H-TCP Protocol for High-Speed Long Distance Networks. In PFLDNet, 2004. Cited on pages 5, 7, and 9."},{"key":"e_1_3_2_1_46_1","first-page":"65","author":"Liu Shao","year":"2008","unstructured":"Shao Liu, Tamer Basar, and R. Srikant. TCP-Illinois: A Loss- and Delay-Based Congestion Control Algorithm for High-Speed Networks. Perform. Evaluation, 65, 2008. Cited on pages 7 and 9.","journal-title":"Perform. Evaluation"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09720-9"},{"key":"e_1_3_2_1_48_1","first-page":"3","volume-title":"Trinity: An Extensible Synthesis Framework for Data Science. VLDB, 12(12)","author":"Martins Ruben","year":"2019","unstructured":"Ruben Martins, Jia Chen, Yanju Chen, Yu Feng, and Isil Dillig. Trinity: An Extensible Synthesis Framework for Data Science. VLDB, 12(12), 2019. Cited on pages 3 and 6."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381704"},{"key":"e_1_3_2_1_50_1","first-page":"3","article-title":"SymPy: symbolic computing","author":"Meurer Aaron","year":"2017","unstructured":"Aaron Meurer, Christopher P. Smith, Mateusz Paprocki, Ondrej Cert\u00edk, Sergey B. Kirpichev, Matthew Rocklin, Amit Kumar, Sergiu Ivanov, Jason Keith Moore, Sartaj Singh, Thilina Rathnayake, Sean Vig, Brian E. Granger, Richard P. Muller, Francesco Bonazzi, Harsh Gupta, Shivam Vats, Fredrik Johansson, Fabian Pe- dregosa, Matthew J. Curry, Andy R. Terrel, Step\u00e1n Roucka, Ashutosh Saboo, Isuru Fernando, Sumith Kulal, Robert Cimrman, and Anthony M. Scopatz. SymPy: symbolic computing in Python. PeerJ Comput. Sci., 3, 2017. Cited on page 6.","journal-title":"Python. PeerJ Comput. Sci."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394221"},{"key":"e_1_3_2_1_52_1","volume-title":"OSDI","author":"Moritz Philipp","year":"2018","unstructured":"Philipp Moritz, Robert Nishihara, Stephanie Wang, Alexey Tumanov, Richard Liaw, Eric Liang, Melih Elibol, Zongheng Yang, William Paul, Michael I. Jordan, and Ion Stoica. Ray: A Distributed Framework for Emerging AI Applications. In OSDI, 2018. Cited on page 7."},{"key":"e_1_3_2_1_53_1","volume-title":"SIGCOMM","author":"Narayan Akshay","year":"2018","unstructured":"Akshay Narayan, Frank Cangialosi, Deepti Raghavan, Prateesh Goyal, Srinivas Narayana, Radhika Mittal, Mohammad Alizadeh, and Hari Balakrishnan. Restructuring Endpoint Congestion Control. In SIGCOMM, 2018. Cited on pages 1 and 4."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342077"},{"key":"e_1_3_2_1_55_1","volume-title":"SIGCOMM","author":"Padhye Jitendra","year":"2001","unstructured":"Jitendra Padhye and Sally Floyd. On Inferring TCP Behavior. In SIGCOMM, 2001. Cited on page 3."},{"key":"e_1_3_2_1_56_1","volume-title":"SIG- COMM","author":"Philip Adithya Abraham","year":"2024","unstructured":"Adithya Abraham Philip, Rukshani Athapathu, Ranysha Ware, Fabian Francis Mkocheko, Alexis Schlomer, Mengrou Shou, Zili Meng, Srinivasan Seshan, and Justine Sherry. Prudentia: Findings of an Internet Fairness Watchdog. In SIG- COMM, 2024. Cited on page 3."},{"key":"e_1_3_2_1_57_1","unstructured":"Devdeep Ray. Integrating Video Codec Design and Network Transport for Emerging Internet Video Streaming Applications. PhD thesis Carnegie Mellon University 2022. Cited on page 3."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564088"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2019.8784684"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342211"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72016-2_23"},{"key":"e_1_3_2_1_62_1","first-page":"3","article-title":"Programming by Sketching for Bit-Streaming Programs","author":"Solar-Lezama Armando","year":"2005","unstructured":"Armando Solar-Lezama, Rodric M. Rabbah, Rastislav Bod\u00edk, and Kemal Ebcioglu. Programming by Sketching for Bit-Streaming Programs. In PLDI, 2005. Cited on page 3.","journal-title":"PLDI"},{"key":"e_1_3_2_1_63_1","first-page":"1","author":"Ware Ranysha","year":"2019","unstructured":"Ranysha Ware, Matthew K. Mukerjee, Srinivasan Seshan, and Justine Sherry. Modeling BBR's Interactions with Loss-Based Congestion Control. In IMC, 2019. Cited on pages 1, 4, and 8.","journal-title":"IMC"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672255"},{"issue":"6","key":"e_1_3_2_1_65_1","first-page":"1","article-title":"FAST TCP: Motivation, Architecture, Algorithms","volume":"14","author":"Wei D.X.","year":"2006","unstructured":"D.X. Wei, C. Jin, S.H. Low, and S. Hegde. FAST TCP: Motivation, Architecture, Algorithms, Performance. IEEE\/ACM Trans. on Networking, 14(6), 2006. Cited on page 1.","journal-title":"Performance. IEEE\/ACM Trans. on Networking"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"e_1_3_2_1_67_1","volume-title":"INFOCOM","author":"Xu Lisong","year":"2004","unstructured":"Lisong Xu, Khaled Harfoush, and Injong Rhee. Binary Increase Congestion Control (BIC) for Fast Long-Distance Networks. In INFOCOM, 2004. Cited on pages 7 and 10."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836119"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Madrid Spain","acronym":"IMC '24"},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3688443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:49:20Z","timestamp":1755863360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3688443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":68,"alternative-id":["10.1145\/3646547.3688443","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3688443","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}