{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:17Z","timestamp":1750309397761,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSW Department of Industry for Defence Innovation Network, Australia"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3672202.3673731","type":"proceedings-article","created":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T18:27:48Z","timestamp":1722882468000},"page":"104-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4002-5600","authenticated-orcid":false,"given":"Chamara","family":"Madarasingha","sequence":"first","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2166-0828","authenticated-orcid":false,"given":"Thilini","family":"Dahanayaka","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4332-0082","authenticated-orcid":false,"given":"Kanchana","family":"Thilakarathna","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5485-5595","authenticated-orcid":false,"given":"Suranga","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"The University of Sydney, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8560-6199","authenticated-orcid":false,"given":"Young Choon","family":"Lee","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil S","family":"Kanhere","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6894-7987","authenticated-orcid":false,"given":"Aruna","family":"Seneviratne","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3264-8318","authenticated-orcid":false,"given":"Phil","family":"Ridley","sequence":"additional","affiliation":[{"name":"IoT Factory, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_2_1","unstructured":"Grafana Labs. 2024. Grafana. https:\/\/grafana.com\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477482.3477486"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN57253.2022.00155"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM60985.2024.00056"},{"key":"e_1_3_2_1_6_1","unstructured":"Plumerai. 2024. Larq - Binarized Neural Networks for efficient deep learning. https:\/\/larq.dev\/."},{"key":"e_1_3_2_1_7_1","volume-title":"2020 IFIP Networking Conference (Networking). IEEE, 352--360","author":"Qin Qiaofeng","year":"2020","unstructured":"Qiaofeng Qin, Konstantinos Poularakis, Kin K Leung, and Leandros Tassiulas. 2020. Line-speed and scalable intrusion detection at the network edge via federated learning. In 2020 IFIP Networking Conference (Networking). IEEE, 352--360."},{"key":"e_1_3_2_1_8_1","unstructured":"The Prometheus Authors. 2024. Prometheus. https:\/\/prometheus.io\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546037.3546060"},{"key":"e_1_3_2_1_10_1","volume-title":"Automating in-network machine learning. arXiv preprint arXiv:2205.08824","author":"Zheng Changgang","year":"2022","unstructured":"Changgang Zheng, Mingyuan Zang, Xinpeng Hong, Riyad Bensoussane, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman. 2022. Automating in-network machine learning. arXiv preprint arXiv:2205.08824 (2022)."}],"event":{"name":"ACM SIGCOMM Posters and Demos '24: ACM SIGCOMM 2024 Conference: Posters and Demos","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Sydney NSW Australia","acronym":"ACM SIGCOMM Posters and Demos '24"},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672202.3673731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672202.3673731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:48Z","timestamp":1750294668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672202.3673731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":10,"alternative-id":["10.1145\/3672202.3673731","10.1145\/3672202"],"URL":"https:\/\/doi.org\/10.1145\/3672202.3673731","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}