{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:09:45Z","timestamp":1764785385564,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CRI-1822737 and SHF-2007827"],"award-info":[{"award-number":["CRI-1822737 and SHF-2007827"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3650200.3656602","type":"proceedings-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T14:11:54Z","timestamp":1717423914000},"page":"449-459","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced UGAL Routing Schemes for Dragonfly Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9683-9306","authenticated-orcid":false,"given":"Ram Sharan","family":"Chaulagain","sequence":"first","affiliation":[{"name":"Department of Computer Science, Florida State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2075-5238","authenticated-orcid":false,"given":"Xin","family":"Yuan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Florida State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. CORAL-2014. https:\/\/asc.llnl.gov\/coral-benchmarks Last accessed on 2023-12-20."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Online Workloads. https:\/\/github.com\/codes-org\/codes\/wiki\/online-workloads Last accessed on 2023-09-25."},{"key":"e_1_3_2_1_3_1","volume-title":"Cray XC series network","author":"Alverson Bob","year":"2012","unstructured":"Bob Alverson, Edwin Froese, Larry Kaplan, and Duncan Roweth. 2012. Cray XC series network. Cray Inc., White Paper WP-Aries01-1112 (2012)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392717.3392756"},{"key":"e_1_3_2_1_5_1","volume-title":"Achieving the Performance of Global Adaptive Routing using Local Information on Dragonfly through Deep Learning","author":"Chaulagain Ram\u00a0Sharan","year":"2020","unstructured":"Ram\u00a0Sharan Chaulagain, Fatema\u00a0Tabassum Liza, Sudheer Chunduri, Xin Yuan, and Michael Lang. 2020. Achieving the Performance of Global Adaptive Routing using Local Information on Dragonfly through Deep Learning. ACM\/IEEE SC tech poster (2020)."},{"volume-title":"the Workshop on Emerging Supercomputing Technologies.","author":"Cope J.","key":"e_1_3_2_1_6_1","unstructured":"J. Cope, N. Liu, S. Lang, P. Carns, C. Carothers, and R. Ross. 2012. Codes: Enabling co-design of multilayer exascale storage architectures. In the Workshop on Emerging Supercomputing Technologies."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3433701.3433747"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.39"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2018.2877264"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.78"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.46"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2013.72"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTI.2013.16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2015.57"},{"key":"e_1_3_2_1_15_1","unstructured":"Karl\u00a0Scott Hemmert Ray Bair Abhinav Bhatele Taylor Groves Simon\u00a0David Hammond Michael\u00a0J Levenhagen Misbah Mubarak Scott Pakin Rob Ross and Jeremiah\u00a0J Wilke. 2019. System-level Architecture Simulation for Exascale: Challenges and Opportunities. (2019)."},{"key":"e_1_3_2_1_16_1","unstructured":"HPE. 2019. HPC Slingshot interconnect. https:\/\/www.hpe.com\/us\/en\/compute\/hpc\/slingshot-interconnect.html#. Accessed 09\/30\/2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557149"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555783"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431379.3460650"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527389"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.19"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20656-7_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Oak Ridge National Laboratory. 2022. Frontier. https:\/\/www.olcf.ornl.gov\/frontier\/. Accessed 09\/30\/2023."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295500.3356208"},{"key":"e_1_3_2_1_25_1","volume-title":"Workshop on Modeling & Simulation of Systems and Applications","author":"Thompson John","year":"2014","unstructured":"John Thompson. 2014. Scalable workload models for system simulations. In Workshop on Modeling & Simulation of Systems and Applications 2014. 13\u201314."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00089"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056051"}],"event":{"name":"ICS '24: 2024 International Conference on Supercomputing","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Kyoto Japan","acronym":"ICS '24"},"container-title":["Proceedings of the 38th ACM International Conference on Supercomputing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650200.3656602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650200.3656602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:22:59Z","timestamp":1755876179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650200.3656602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":27,"alternative-id":["10.1145\/3650200.3656602","10.1145\/3650200"],"URL":"https:\/\/doi.org\/10.1145\/3650200.3656602","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}