{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:54:26Z","timestamp":1773194066023,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2904600"],"award-info":[{"award-number":["2023YFB2904600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172007"],"award-info":[{"award-number":["62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of Hong Kong","award":["GRF 14201523"],"award-info":[{"award-number":["GRF 14201523"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3651890.3672256","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:11:43Z","timestamp":1722431503000},"page":"258-273","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["RD-Probe: Scalable Monitoring With Sufficient Coverage In Complex Datacenter Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7896-5840","authenticated-orcid":false,"given":"Rui","family":"Ding","sequence":"first","affiliation":[{"name":"Peking University, School of Computer Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3889-564X","authenticated-orcid":false,"given":"Xunpeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University, School of Computer Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2282-3441","authenticated-orcid":false,"given":"Shibo","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, School of Computer Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Peking University, School of Computer Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6142-4761","authenticated-orcid":false,"given":"Baoshu","family":"Xie","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3745-411X","authenticated-orcid":false,"given":"Ronghua","family":"Sun","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8898-1756","authenticated-orcid":false,"given":"Zhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5983-1492","authenticated-orcid":false,"given":"Bolong","family":"Cui","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies Co., Ltd, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654101"},{"key":"e_1_3_2_1_2_1","volume-title":"A scalable, commodity data center network architecture. ACM SIGCOMM computer communication review 38, 4","author":"Al-Fares Mohammad","year":"2008","unstructured":"Mohammad Al-Fares, Alexander Loukissas, and Amin Vahdat. 2008. A scalable, commodity data center network architecture. ACM SIGCOMM computer communication review 38, 4 (2008), 63--74."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of NSDI. 419--435","author":"Arzani Behnaz","year":"2018","unstructured":"Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang Harry Liu, Jitu Padhye, Boon Thau Loo, and Geoff Outhred. 2018. 007: Democratically finding the cause of packet drops. In Proc. of NSDI. 419--435."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524410"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057091"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.87"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604866"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.796384"},{"key":"e_1_3_2_1_12_1","volume-title":"Martin Lee Schoffstall, and James Davin","author":"Case Jeffrey D","year":"1990","unstructured":"Jeffrey D Case, Mark Fedor, Martin Lee Schoffstall, and James Davin. 1990. Rfc1157: Simple network management protocol (snmp)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Benoit Claise. 2004. Cisco Systems NetFlow Services Export Version 9. https:\/\/www.ietf.org\/rfc\/rfc3954.txt.","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644924"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230549"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364677"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929851"},{"key":"e_1_3_2_1_18_1","unstructured":"John Evans and Fabien Chraim. 2023. No packet left behind. https:\/\/storage.googleapis.com\/site-media-prod\/meetings\/NANOG88\/4790\/20230613_Evans_No_Packet_Left_v1.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405851"},{"key":"e_1_3_2_1_20_1","volume-title":"The coupon collector's problem. Materials matem\u00e0tics","author":"Ferrante Marco","year":"2014","unstructured":"Marco Ferrante and Monica Saltalamacchia. 2014. The coupon collector's problem. Materials matem\u00e0tics (2014), 0001--35."},{"key":"e_1_3_2_1_21_1","unstructured":"M Foschiano et al. 2015. Cisco systems' encapsulated remote switch port analyzer (erspan). draft-foschiano-erspan-00. txt Tech. Rep (2015)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626317"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of NSDI. 549--564","author":"Geng Yilong","year":"2019","unstructured":"Yilong Geng, Shiyu Liu, Zi Yin, Ashish Naik, Balaji Prabhakar, Mendel Rosenblum, and Amin Vahdat. 2019. SIMON: A Simple and Scalable Method for Sensing, Inference and Measurement in Data Center Networks.. In Proc. of NSDI. 549--564."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461918"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592577"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402968"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of NSDI. 71--85","author":"Handigol Nikhil","year":"2014","unstructured":"Nikhil Handigol, Brandon Heller, Vimalkumar Jeyakumar, David Mazi\u00e8res, and Nick McKeown. 2014. I know what your packet did last hop: Using packet histories to troubleshoot networks. In Proc. of NSDI. 71--85."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425945"},{"key":"e_1_3_2_1_34_1","unstructured":"Leo Huang and Arya Reais-Parsi. 2013. Localizing packet loss in a large complex network. https:\/\/apricot.net\/apricot2013\/assets\/Google_Monitoring_APRICOT_2013.pdf."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243426"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342094"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626292"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of NSDI. 253--268","author":"Kannan Pravein Govindan","year":"2021","unstructured":"Pravein Govindan Kannan, Nishant Budhdev, Raj Joshi, and Mun Choon Chan. 2021. Debugging Transient Faults in Data Centers using Synchronized Networkwide Packet Histories.. In Proc. of NSDI. 253--268."},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. of SIGCOMM","volume":"15","author":"Kim Changhoon","year":"2015","unstructured":"Changhoon Kim, Anirudh Sivaraman, Naga Katta, Antonin Bas, Advait Dixit, and Lawrence J Wobker. 2015. In-band network telemetry via programmable dataplanes. In Proc. of SIGCOMM, Vol. 15."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382129"},{"key":"e_1_3_2_1_42_1","volume-title":"Netnorad: Troubleshooting networks via end-to-end probing. https:\/\/engineering.fb.com\/2016\/02\/18\/core-data\/netnorad-troubleshooting-networks-via-end-to-end-probing\/.","author":"Lapukhov Petr","year":"2016","unstructured":"Petr Lapukhov and Aijay Adams. 2016. Netnorad: Troubleshooting networks via end-to-end probing. https:\/\/engineering.fb.com\/2016\/02\/18\/core-data\/netnorad-troubleshooting-networks-via-end-to-end-probing\/."},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of NSDI. 311--324","author":"Li Yuliang","year":"2016","unstructured":"Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. 2016. Flowradar: A better netflow for data centers. In Proc. of NSDI. 311--324."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999609"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2868050"},{"key":"e_1_3_2_1_46_1","volume-title":"Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis","author":"Mitzenmacher Michael","unstructured":"Michael Mitzenmacher and Eli Upfal. 2017. Probability and computing: Randomization and probabilistic techniques in algorithms and data analysis. Cambridge university press."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800152"},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. of SIGCOMM. 677--692","author":"Molero Edgar Costa","year":"2022","unstructured":"Edgar Costa Molero, Stefano Vissicchio, and Laurent Vanbever. 2022. FAst innetwork GraY failure detection for ISPs. In Proc. of SIGCOMM. 677--692."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Al Morton. 2016. Rfc7799: Active and Passive Metrics and Methods (with Hybrid Types In-Between).","DOI":"10.17487\/RFC7799"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of SIGCOMM. 39--50","author":"Mysore Radhika Niranjan","year":"2009","unstructured":"Radhika Niranjan Mysore, Andreas Pamboris, Nathan Farrington, Nelson Huang, Pardis Miri, Sivasankar Radhakrishnan, Vikram Subramanya, and Amin Vahdat. 2009. Portland: a scalable fault-tolerant layer 2 data center network fabric. In Proc. of SIGCOMM. 39--50."},{"key":"e_1_3_2_1_52_1","unstructured":"ns3 2022. Network Simulator 3. https:\/\/www.nsnam.org\/."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737529"},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. of USENIX ATC. The Advanced Computing Systems Association.","author":"Peng Yanghua","year":"2017","unstructured":"Yanghua Peng, Ji Yang, Chuan Wu, Chuanxiong Guo, Chengchen Hu, and Zongpeng Li. 2017. deTector: a topology-aware monitoring system for data center networks. In Proc. of USENIX ATC. The Advanced Computing Systems Association."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Peter Phaal Sonia Panchen and Neil McKee. 2001. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. https:\/\/www.ietf.org\/rfc\/rfc3176.html.","DOI":"10.17487\/rfc3176"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018467"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278572"},{"key":"e_1_3_2_1_58_1","volume-title":"Proc. of NSDI. 595--612","author":"Roy Arjun","year":"2017","unstructured":"Arjun Roy, Hongyi Zeng, Jasmeet Bagga, and Alex C Snoeren. 2017. Passive Realtime Datacenter Fault Detection and Localization.. In Proc. of NSDI. 595--612."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"John Scudder Rex Fernando and Stephen Stuart. 2016. Rfc7854: BGP Monitoring Protocol (BMP).","DOI":"10.17487\/RFC7854"},{"key":"e_1_3_2_1_60_1","volume-title":"Ramana Rao Kompella, and David G Andersen","author":"Sekar Vyas","year":"2008","unstructured":"Vyas Sekar, Michael K Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, and David G Andersen. 2008. cSamp: A system for network-wide flow monitoring. (2008)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879186"},{"key":"e_1_3_2_1_62_1","unstructured":"Gregg Siegfried. 2018. Monitoring Modern Services and Infrastructure. https:\/\/www.gartner.com\/en\/documents\/3868219."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140103.1140293"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.31"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775066"},{"key":"e_1_3_2_1_67_1","volume-title":"Proc. of OSDI. 233--248","author":"Tammana Praveen","year":"2016","unstructured":"Praveen Tammana, Rachit Agarwal, and Myungjin Lee. 2016. Simplifying Datacenter Network Debugging with PathDump.. In Proc. of OSDI. 233--248."},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. of NSDI. 453--456","author":"Tammana Praveen","year":"2018","unstructured":"Praveen Tammana, Rachit Agarwal, and Myungjin Lee. 2018. Distributed network monitoring and debugging with switchpointer. In Proc. of NSDI. 453--456."},{"key":"e_1_3_2_1_69_1","volume-title":"Proc. of NSDI. 599--614","author":"Tan Cheng","year":"2019","unstructured":"Cheng Tan, Ze Jin, Chuanxiong Guo, Tianrong Zhang, Haitao Wu, Karl Deng, Dongming Bi, and Dong Xiang. 2019. NetBouncer: Active Device and Link Failure Localization in Data Center Networks.. In Proc. of NSDI. 599--614."},{"key":"e_1_3_2_1_70_1","volume-title":"Hashing Design in Modern Networks: Challenges and Mitigation Techniques. In 2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Xu Yunhong","year":"2022","unstructured":"Yunhong Xu, Keqiang He, Rui Wang, Minlan Yu, Nick Duffield, Hassan Wassel, Shidong Zhang, Leon Poutievski, Junlan Zhou, and Amin Vahdat. 2022. Hashing Design in Modern Networks: Challenges and Mitigation Techniques. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 805--818."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651940"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"e_1_3_2_1_73_1","first-page":"5","article-title":"Profiling Network Performance for Multi-tier Data Center Applications","volume":"11","author":"Yu Minlan","year":"2011","unstructured":"Minlan Yu, Albert G Greenberg, David A Maltz, Jennifer Rexford, Lihua Yuan, Srikanth Kandula, and Changhoon Kim. 2011. Profiling Network Performance for Multi-tier Data Center Applications.. In Proc. of NSDI, Vol. 11. 5--5.","journal-title":"Proc. of NSDI"},{"key":"e_1_3_2_1_74_1","first-page":"29","article-title":"Software Defined Traffic Measurement with OpenSketch","volume":"13","author":"Yu Minlan","year":"2013","unstructured":"Minlan Yu, Lavanya Jose, and Rui Miao. 2013. Software Defined Traffic Measurement with OpenSketch.. In Proc. of NSDI, Vol. 13. 29--42.","journal-title":"Proc. of NSDI"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"},{"key":"e_1_3_2_1_76_1","volume-title":"Measuring and troubleshooting large operational multipath networks with gray box testing. Mountain Safety Res","author":"Zeng Hongyi","year":"2015","unstructured":"Hongyi Zeng, Ratul Mahajan, Nick McKeown, George Varghese, Lihua Yuan, and Ming Zhang. 2015. Measuring and troubleshooting large operational multipath networks with gray box testing. Mountain Safety Res., Seattle, WA, USA, Rep. MSR-TR-2015-55 (2015)."},{"key":"e_1_3_2_1_77_1","volume-title":"Proc. of NSDI. 87--99","author":"Zeng Hongyi","year":"2014","unstructured":"Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat. 2014. Libra: Divide and conquer to verify forwarding tables in huge networks. In Proc. of NSDI. 87--99."},{"key":"e_1_3_2_1_78_1","volume-title":"Proc. of NSDI. 575--589","author":"Zhai Ennan","year":"2020","unstructured":"Ennan Zhai, Ang Chen, Ruzica Piskac, Mahesh Balakrishnan, Bingchuan Tian, Bo Song, and Haoliang Zhang. 2020. Check before you change: Preventing correlated failures in service updates. In Proc. of NSDI. 575--589."},{"key":"e_1_3_2_1_79_1","volume-title":"Proc. of NSDI. 221--239","author":"Zhang Kaiyuan","year":"2020","unstructured":"Kaiyuan Zhang, Danyang Zhuo, Aditya Akella, Arvind Krishnamurthy, and Xi Wang. 2020. Automated verification of customizable middlebox properties with gravel. In Proc. of NSDI. 221--239."},{"key":"e_1_3_2_1_80_1","volume-title":"Proc. of ATC. 855--862","author":"Zhang Zhehui","year":"2021","unstructured":"Zhehui Zhang, Haiyang Zheng, Jiayao Hu, Xiangning Yu, Chenchen Qi, Xuemei Shi, and Guohui Wang. 2021. Hashing linearity enables relative path control in data centers. In Proc. of ATC. 855--862."},{"key":"e_1_3_2_1_81_1","volume-title":"Proc. of NSDI. 991--1010","author":"Zhao Yikai","year":"2021","unstructured":"Yikai Zhao, Kaicheng Yang, Zirui Liu, Tong Yang, Li Chen, Shiyi Liu, Naiqian Zheng, Ruixin Wang, Hanbo Wu, Yi Wang, et al. 2021. LightGuardian: A Full-Visibility, Lightweight, In-band Telemetry System Using Sketchlets.. In Proc. of NSDI. 991--1010."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544247"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431298"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651890.3672256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:13Z","timestamp":1750268953000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":84,"alternative-id":["10.1145\/3651890.3672256","10.1145\/3651890"],"URL":"https:\/\/doi.org\/10.1145\/3651890.3672256","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}