{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:17:48Z","timestamp":1774311468382,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Key R&D Program of China","award":["2019YFB1802600"],"award-info":[{"award-number":["2019YFB1802600"]}]},{"name":"the National Natural Science Foundation of China","award":["U23B2001"],"award-info":[{"award-number":["U23B2001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3651890.3672231","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:11:43Z","timestamp":1722431503000},"page":"71-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["RedTE: Mitigating Subsecond Traffic Bursts with Real-time and Distributed Traffic Engineering"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6808-3242","authenticated-orcid":false,"given":"Fei","family":"Gui","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2073-8235","authenticated-orcid":false,"given":"Songtao","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-8865","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-7885","authenticated-orcid":false,"given":"Li","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9013-5993","authenticated-orcid":false,"given":"Kaihui","family":"Gao","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5476-226X","authenticated-orcid":false,"given":"Congcong","family":"Min","sequence":"additional","affiliation":[{"name":"Guangdong Communications &amp; Networks Institute, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9095-6879","authenticated-orcid":false,"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Future Networks in Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. cisco dynamic load balance. https:\/\/community.cisco.com\/t5\/routing\/dynamic-load-balancing\/td-p\/646603."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Gurobi. https:\/\/www.gurobi.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. huawei dynamic load balance. https:\/\/support.huawei.com\/enterprise\/en\/doc\/EDOC1100169990\/75e82656\/configuring-dynamic-load-balancing."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Internet Topology Zoo. http:\/\/www.topology-zoo.org\/dataset.html."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. MAWI Working Group Traffic Archive. https:\/\/mawi.wide.ad.jp\/mawi\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2024. gRPC. https:\/\/grpc.io."},{"key":"e_1_3_2_1_7_1","unstructured":"2024. Network Simulator 3. [EB\/OL]. https:\/\/www.nsnam.org\/."},{"key":"e_1_3_2_1_8_1","volume-title":"18th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 21). 175--200.","author":"Abuzaid Firas","unstructured":"Firas Abuzaid, Srikanth Kandula, Behnaz Arzani, Ishai Menache, Matei Zaharia, and Peter Bailis. 2021. Contracting Wide-area Network Topologies to Solve Flow Problems Quickly. In 18th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 21). 175--200."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.826370"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Michael Bain and Claude Sammut. 1995. A Framework for Behavioural Cloning.. In Machine Intelligence 15. 103--129.","DOI":"10.1093\/oso\/9780198538677.003.0006"},{"key":"e_1_3_2_1_12_1","volume-title":"Is Machine Learning Ready for Traffic Engineering Optimization? arXiv preprint arXiv:2109.01445","author":"Bern\u00e1rdez Guillermo","year":"2021","unstructured":"Guillermo Bern\u00e1rdez, Jos\u00e9 Su\u00e1rez-Varela, Albert L\u00f3pez, Bo Wu, Shihan Xiao, Xiangle Cheng, Pere Barlet-Ros, and Albert Cabellos-Aparicio. 2021. Is Machine Learning Ready for Traffic Engineering Optimization? arXiv preprint arXiv:2109.01445 (2021)."},{"key":"e_1_3_2_1_13_1","unstructured":"Justin A Boyan and Michael L Littman. 1994. Packet routing in dynamically changing networks: A reinforcement learning approach. In Advances in neural information processing systems. 671--678."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"e_1_3_2_1_15_1","unstructured":"Cisco. 2020. Best Practices in Core Network Capacity Planning White Paper. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/routers\/wan-automation-engine\/white_paper_c11-728551.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916625"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417124"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11794"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2675450"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604844"},{"key":"e_1_3_2_1_21_1","volume-title":"Incorporating intra-flow dependencies and inter-flow correlations for traffic matrix prediction. In 2020 IEEE\/ACM 28th IWQoS","author":"Gao Kaihui","unstructured":"Kaihui Gao, Dan Li, Li Chen, Jinkun Geng, Fei Gui, Yang Cheng, and Yue Gu. 2020. Incorporating intra-flow dependencies and inter-flow correlations for traffic matrix prediction. In 2020 IEEE\/ACM 28th IWQoS."},{"key":"e_1_3_2_1_22_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Gao Kaihui","year":"2022","unstructured":"Kaihui Gao, Chen Sun, Shuai Wang, Dan Li, Yu Zhou, Hongqiang Harry Liu, Lingjun Zhu, and Ming Zhang. 2022. Buffer-based end-to-end request event monitoring in the cloud. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 829--843."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209641"},{"key":"e_1_3_2_1_24_1","volume-title":"Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning. In 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS). IEEE, 1--10","author":"Geng Nan","year":"2021","unstructured":"Nan Geng, Mingwei Xu, Yuan Yang, Chenyi Liu, Jiahai Yang, Qi Li, and Shize Zhang. 2021. Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning. In 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS). IEEE, 1--10."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-019-09421-1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064240"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080122"},{"key":"e_1_3_2_1_31_1","volume-title":"Chiun Lin Lim, and Robert Soul\u00e9","author":"Kumar Praveen","year":"2018","unstructured":"Praveen Kumar, Yang Yuan, Chris Yu, Nate Foster, Robert Kleinberg, Petr Lapukhov, Chiun Lin Lim, and Robert Soul\u00e9. 2018. Semi-oblivious traffic engineering: The road not taken. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). USENIX."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2010494"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375233"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2350990"},{"key":"e_1_3_2_1_36_1","volume-title":"Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971","author":"Lillicrap Timothy P","year":"2015","unstructured":"Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver, and Daan Wierstra. 2015. Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971 (2015)."},{"key":"e_1_3_2_1_37_1","volume-title":"Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. In 31st Conference on Neural Information Processing Systems (NIPS.","author":"Lowe Ryan","year":"2018","unstructured":"Ryan Lowe, Jean Harb, Aviv Tamar, Pieter Abbeel, and Igor Mordatch. 2018. Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. In 31st Conference on Neural Information Processing Systems (NIPS."},{"key":"e_1_3_2_1_38_1","volume-title":"Zili Meng, and Mohammad Alizadeh.","author":"Mao Hongzi","year":"2019","unstructured":"Hongzi Mao, Malte Schwarzkopf, Shaileshh Bojja Venkatakrishnan, Zili Meng, and Mohammad Alizadeh. 2019. Learning scheduling algorithms for data processing clusters. In Proceedings of the ACM Special Interest Group on Data Communication. 270--288."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544238"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2349905"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski et al. 2015. Human-level control through deep reinforcement learning. nature 518 7540 (2015) 529--533.","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483588"},{"key":"e_1_3_2_1_43_1","volume-title":"White paper: Is your network prepared for microbursts? https:\/\/www.xenanetworks.com\/wp-content\/uploads\/2019\/11\/Microburst_WP.pdf","author":"Xena","year":"2009","unstructured":"Xena network. 2009. White paper: Is your network prepared for microbursts? https:\/\/www.xenanetworks.com\/wp-content\/uploads\/2019\/11\/Microburst_WP.pdf (2009)."},{"key":"e_1_3_2_1_44_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems 32 (2019)."},{"key":"e_1_3_2_1_45_1","volume-title":"DOTE: Rethinking (Predictive) WAN Traffic Engineering. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Perry Yarin","year":"2023","unstructured":"Yarin Perry, Felipe Vieira Frujeri, Chaim Hoch, Srikanth Kandula, Ishai Menache, Michael Schapira, and Aviv Tamar. 2023. DOTE: Rethinking (Predictive) WAN Traffic Engineering. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 1557--1581."},{"key":"e_1_3_2_1_46_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2987866"},{"key":"e_1_3_2_1_48_1","volume-title":"NIPS Deep Reinforcement Learning Symposium.","author":"Valadarsky Asaf","year":"2017","unstructured":"Asaf Valadarsky, Michael Schapira, Dafna Shahaf, and Aviv Tamar. 2017. Learning to route with deep rl. In NIPS Deep Reinforcement Learning Symposium."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544241"},{"key":"e_1_3_2_1_50_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Wang Yanshu","year":"2022","unstructured":"Yanshu Wang, Dan Li, Yuanwei Lu, Jianping Wu, Hua Shao, and Yutian Wang. 2022. Elixir: A High-performance and Low-cost Approach to Managing {Hardware\/Software} Hybrid Flow Tables Considering Flow Burstiness. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 535--550."},{"key":"e_1_3_2_1_51_1","volume-title":"Machine learning 8, 3--4","author":"Watkins Christopher JCH","year":"1992","unstructured":"Christopher JCH Watkins and Peter Dayan. 1992. Q-learning. Machine learning 8, 3--4 (1992), 279--292."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485853"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604857"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592803"}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651890.3672231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:12Z","timestamp":1750268952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672231"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":55,"alternative-id":["10.1145\/3651890.3672231","10.1145\/3651890"],"URL":"https:\/\/doi.org\/10.1145\/3651890.3672231","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}