{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:59:05Z","timestamp":1775854745801,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T00:00:00Z","timestamp":1763164800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2321123"],"award-info":[{"award-number":["2321123"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["2340982"],"award-info":[{"award-number":["2340982"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2505106"],"award-info":[{"award-number":["2505106"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"DOE U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-SC0024207"],"award-info":[{"award-number":["DE-SC0024207"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,16]]},"DOI":"10.1145\/3712285.3759828","type":"proceedings-article","created":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T16:05:39Z","timestamp":1762963539000},"page":"1917-1934","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DPAR: High-Performance, Secure, and Scalable Differential Privacy-based AllReduce"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8795-5262","authenticated-orcid":false,"given":"Hao","family":"Qi","sequence":"first","affiliation":[{"name":"University of California, Merced, Merced, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0573-8808","authenticated-orcid":false,"given":"Weicong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Merced, Merced, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7837-5791","authenticated-orcid":false,"given":"Chenghong","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7581-8905","authenticated-orcid":false,"given":"Xiaoyi","family":"Lu","sequence":"additional","affiliation":[{"name":"University of California, Merced, Merced, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,15]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"[n. d.]. Google\u2019s DP Library. https:\/\/github.com\/google\/differential-privacy."},{"key":"e_1_3_3_2_3_2","unstructured":"[n. d.]. OpenMPI. https:\/\/github.com\/open-mpi\/ompi\/tree\/v5.0.2."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.50"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"e_1_3_3_2_7_2","first-page":"394","volume-title":"International conference on machine learning","author":"Balle Borja","year":"2018","unstructured":"Borja Balle and Yu-Xiang Wang. 2018. Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising. In International conference on machine learning. PMLR, 394\u2013403."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3569951.3597559"},{"key":"e_1_3_3_2_9_2","unstructured":"Keith Bonawitz Vladimir Ivanov Ben Kreuter Antonio Marcedone H\u00a0Brendan McMahan Sarvar Patel Daniel Ramage Aaron Segal and Karn Seth. 2016. Practical Secure Aggregation for Federated Learning on User-held Data. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1611.04482 (2016)."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski Craig Gentry and Vinod Vaikuntanathan. 2014. (Leveled) Fully Homomorphic Encryption without Bootstrapping. ACM Transactions on Computation Theory (TOCT) 6 3 (2014) 1\u201336.","DOI":"10.1145\/2633600"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781003456285"},{"key":"e_1_3_3_2_13_2","unstructured":"Kamalika Chaudhuri Claire Monteleoni and Anand\u00a0D Sarwate. 2011. Differentially Private Empirical Risk Minimization. Journal of Machine Learning Research 12 3 (2011)."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. 2020. TFHE: Fast Fully Homomorphic Encryption over the Torus. Journal of Cryptology 33 1 (2020) 34\u201391.","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581784.3607099"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"DeepSeek-AI Daya Guo Dejian Yang Haowei Zhang Junxiao Song Ruoyu Zhang Runxin Xu Qihao Zhu Shirong Ma Peiyi Wang Xiao Bi Xiaokang Zhang Xingkai Yu Yu Wu Z.\u00a0F. Wu Zhibin Gou Zhihong Shao Zhuoshu Li Ziyi Gao Aixin Liu Bing Xue Bingxuan Wang Bochao Wu Bei Feng Chengda Lu Chenggang Zhao Chengqi Deng Chenyu Zhang Chong Ruan Damai Dai Deli Chen Dongjie Ji Erhang Li Fangyun Lin Fucong Dai Fuli Luo Guangbo Hao Guanting Chen Guowei Li H. Zhang Han Bao Hanwei Xu Haocheng Wang Honghui Ding Huajian Xin Huazuo Gao Hui Qu Hui Li Jianzhong Guo Jiashi Li Jiawei Wang Jingchang Chen Jingyang Yuan Junjie Qiu Junlong Li J.\u00a0L. Cai Jiaqi Ni Jian Liang Jin Chen Kai Dong Kai Hu Kaige Gao Kang Guan Kexin Huang Kuai Yu Lean Wang Lecong Zhang Liang Zhao Litong Wang Liyue Zhang Lei Xu Leyi Xia Mingchuan Zhang Minghua Zhang Minghui Tang Meng Li Miaojun Wang Mingming Li Ning Tian Panpan Huang Peng Zhang Qiancheng Wang Qinyu Chen Qiushi Du Ruiqi Ge Ruisong Zhang Ruizhe Pan Runji Wang R.\u00a0J. Chen R.\u00a0L. Jin Ruyi Chen Shanghao Lu Shangyan Zhou Shanhuang Chen Shengfeng Ye Shiyu Wang Shuiping Yu Shunfeng Zhou Shuting Pan S.\u00a0S. Li Shuang Zhou Shaoqing Wu Shengfeng Ye Tao Yun Tian Pei Tianyu Sun T. Wang Wangding Zeng Wanjia Zhao Wen Liu Wenfeng Liang Wenjun Gao Wenqin Yu Wentao Zhang W.\u00a0L. Xiao Wei An Xiaodong Liu Xiaohan Wang Xiaokang Chen Xiaotao Nie Xin Cheng Xin Liu Xin Xie Xingchao Liu Xinyu Yang Xinyuan Li Xuecheng Su Xuheng Lin X.\u00a0Q. Li Xiangyue Jin Xiaojin Shen Xiaosha Chen Xiaowen Sun Xiaoxiang Wang Xinnan Song Xinyi Zhou Xianzu Wang Xinxia Shan Y.\u00a0K. Li Y.\u00a0Q. Wang Y.\u00a0X. Wei Yang Zhang Yanhong Xu Yao Li Yao Zhao Yaofeng Sun Yaohui Wang Yi Yu Yichao Zhang Yifan Shi Yiliang Xiong Ying He Yishi Piao Yisong Wang Yixuan Tan Yiyang Ma Yiyuan Liu Yongqiang Guo Yuan Ou Yuduan Wang Yue Gong Yuheng Zou Yujia He Yunfan Xiong Yuxiang Luo Yuxiang You Yuxuan Liu Yuyang Zhou Y.\u00a0X. Zhu Yanhong Xu Yanping Huang Yaohui Li Yi Zheng Yuchen Zhu Yunxian Ma Ying Tang Yukun Zha Yuting Yan Z.\u00a0Z. Ren Zehui Ren Zhangli Sha Zhe Fu Zhean Xu Zhenda Xie Zhengyan Zhang Zhewen Hao Zhicheng Ma Zhigang Yan Zhiyu Wu Zihui Gu Zijia Zhu Zijun Liu Zilin Li Ziwei Xie Ziyang Song Zizheng Pan Zhen Huang Zhipeng Xu Zhongyu Zhang and Zhen Zhang. 2025. DeepSeek-R1: Incentivizing Reasoning Capability in LLMs via Reinforcement Learning. 10.48550\/arXiv.2501.12948 arxiv:https:\/\/arXiv.org\/abs\/2501.12948\u00a0[cs]","DOI":"10.48550\/arXiv.2501.12948"},{"key":"e_1_3_3_2_18_2","unstructured":"DeepSeek-R1-Distill-LLaMA-70B. [n. d.]. DeepSeek-R1-Distill-LLaMA-70B. https:\/\/huggingface.co\/deepseek-ai\/DeepSeek-R1-Distill-Llama-70B."},{"key":"e_1_3_3_2_19_2","unstructured":"DeepSeek-R1-Distill-Llama-8B. [n. d.]. DeepSeek-R1-Distill-Llama-8B. https:\/\/huggingface.co\/deepseek-ai\/DeepSeek-R1-Distill-Llama-8B."},{"key":"e_1_3_3_2_20_2","unstructured":"DeepSeek-R1-Distill-Qwen-1.5B. [n. d.]. DeepSeek-R1-Distill-Qwen-1.5B. https:\/\/huggingface.co\/deepseek-ai\/DeepSeek-R1-Distill-Qwen-1.5B."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Jinshuo Dong Aaron Roth and Weijie\u00a0J Su. 2022. Gaussian Differential Privacy. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 84 1 (2022) 3\u201337.","DOI":"10.1111\/rssb.12454"},{"key":"e_1_3_3_2_22_2","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et\u00a0al. 2020. An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.11929 (2020)."},{"key":"e_1_3_3_2_23_2","unstructured":"John Duchi Martin\u00a0J Wainwright and Michael\u00a0I Jordan. 2013. Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation. Advances in Neural Information Processing Systems 26 (2013)."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et\u00a0al. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (2014) 211\u2013407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Haokun Fang and Quan Qian. 2021. Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning. Future Internet 13 4 (2021) 94.","DOI":"10.3390\/fi13040094"},{"key":"e_1_3_3_2_28_2","first-page":"1605","volume-title":"29th USENIX security symposium (USENIX Security 20)","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Gong. 2020. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. In 29th USENIX security symposium (USENIX Security 20). 1605\u20131622."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Michael Fellows and Neal Koblitz. 1994. Combinatorial Cryptosystems Galore! Contemp. Math. 168 (1994) 51\u201351.","DOI":"10.1090\/conm\/168\/01688"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Arik Friedman Shlomo Berkovsky and Mohamed\u00a0Ali Kaafar. 2016. A Differential Privacy Framework for Matrix Factorization Recommender Systems. User Modeling and User-Adapted Interaction 26 (2016) 425\u2013458.","DOI":"10.1007\/s11257-016-9177-7"},{"key":"e_1_3_3_2_31_2","volume-title":"A Fully Homomorphic Cncryption Scheme","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry. 2009. A Fully Homomorphic Cncryption Scheme. Stanford university."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335749"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Rafik Hamza Alzubair Hassan Awad Ali Mohammed\u00a0Bakri Bashir Samar\u00a0M Alqhtani Tawfeeg\u00a0Mohmmed Tawfeeg and Adil Yousif. 2022. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. Entropy 24 4 (2022) 519.","DOI":"10.3390\/e24040519"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/SC41404.2022.00016"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377989"},{"key":"e_1_3_3_2_38_2","unstructured":"Zhanglong Ji Zachary\u00a0C Lipton and Charles Elkan. 2014. Differential Privacy and Machine Learning: a Survey and Review. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.7584 (2014)."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Daniel Kifer and Ashwin Machanavajjhala. 2014. Pufferfish: A Framework for Mathematical Privacy Definitions. ACM Transactions on Database Systems (TODS) 39 1 (2014) 1\u201336.","DOI":"10.1145\/2514689"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Sang\u00a0Gyu Kwak and Jong\u00a0Hae Kim. 2017. Central Limit Theorem: the Cornerstone of Modern Statistics. Korean journal of anesthesiology 70 2 (2017) 144\u2013156.","DOI":"10.4097\/kjae.2017.70.2.144"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Yehuda Lindell. 2020. Secure Multiparty Computation. Commun. ACM 64 1 (2020) 86\u201396.","DOI":"10.1145\/3387108"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Yuhong Liu Yan\u00a0Lindsay Sun Jungwoo Ryoo and Athanasios\u00a0V Vasilakos. 2015. A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. (2015).","DOI":"10.5626\/JCSE.2015.9.3.119"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2018.00068"},{"key":"e_1_3_3_2_44_2","volume-title":"MPI: A Message-Passing Interface Standard, Version 3.1","author":"Forum Message Passing Interface","year":"2015","unstructured":"Message Passing Interface Forum. 2015. MPI: A Message-Passing Interface Standard, Version 3.1. Technical Report. High Performance Computing Center Stuttgart (HLRS). https:\/\/www.mpi-forum.org\/docs\/mpi-3.1\/mpi31-report.pdf"},{"key":"e_1_3_3_2_45_2","unstructured":"META. [n. d.]. META Natural Reasoning Dataset. https:\/\/huggingface.co\/datasets\/facebook\/natural_reasoning\/tree\/main."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_3_2_47_2","volume-title":"Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis","author":"Mitzenmacher Michael","year":"2017","unstructured":"Michael Mitzenmacher and Eli Upfal. 2017. Probability and Computing: Randomization and Probabilistic Techniques in Algorithms and Data Analysis. Cambridge university press."},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS53633.2021.9614297"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_3_2_51_2","unstructured":"Maxim Naumov Dheevatsa Mudigere Hao-Jun\u00a0Michael Shi Jianyu Huang Narayanan Sundaraman Jongsoo Park Xiaodong Wang Udit Gupta Carole-Jean Wu Alisson\u00a0G Azzolini et\u00a0al. 2019. Deep Learning Recommendation Model for Personalization and Recommendation Systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1906.00091 (2019)."},{"key":"e_1_3_3_2_52_2","unstructured":"NERSC. [n. d.]. Perlmutter. https:\/\/docs.nersc.gov\/systems\/perlmutter\/architecture\/."},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_3_2_54_2","unstructured":"OLCF. [n. d.]. Cray MPICH v8.1.31. https:\/\/docs.olcf.ornl.gov\/systems\/frontier_user_guide.html#id7."},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Ronald\u00a0L Rivest Adi Shamir and Leonard Adleman. 1978. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Commun. ACM 21 2 (1978) 120\u2013126.","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Alexis\u00a0R Santos-Lozada Jeffrey\u00a0T Howard and Ashton\u00a0M Verdery. 2020. How Differential Privacy will Affect our Understanding of Health Disparities in the United States. Proceedings of the National Academy of Sciences 117 24 (2020) 13405\u201313412.","DOI":"10.1073\/pnas.2003714117"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/JNS2.2012.6249248"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_3_2_60_2","unstructured":"The Ohio\u00a0State University. 2025. OSU Micro-Benchmarks (OMB). https:\/\/mvapich.cse.ohio-state.edu\/benchmarks\/. Accessed: Feb. 2025."},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_3_2_62_2","first-page":"1577","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Wang Chenghong","year":"2023","unstructured":"Chenghong Wang, David Pujol, Kartik Nayak, and Ashwin Machanavajjhala. 2023. Private { Proof-of-Stake} Blockchains using { Differentially-Private} Stake Distortion. In 32nd USENIX Security Symposium (USENIX Security 23). 1577\u20131594."},{"key":"e_1_3_3_2_63_2","first-page":"1226","volume-title":"The 22nd international conference on artificial intelligence and statistics","author":"Wang Yu-Xiang","year":"2019","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva\u00a0Prasad Kasiviswanathan. 2019. Subsampled r\u00e9nyi Differential Privacy and Analytical Moments Accountant. In The 22nd international conference on artificial intelligence and statistics. PMLR, 1226\u20131235."},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"crossref","unstructured":"Stanley\u00a0L Warner. 1965. Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias. Journal of the American statistical association 60 309 (1965) 63\u201369.","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_3_2_66_2","first-page":"493","volume-title":"2020 USENIX annual technical conference (USENIX ATC 20)","author":"Zhang Chengliang","year":"2020","unstructured":"Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and Yang Liu. 2020. BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX annual technical conference (USENIX ATC 20). 493\u2013506."},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2014.36"},{"key":"e_1_3_3_2_68_2","unstructured":"Ligeng Zhu Zhijian Liu and Song Han. 2019. Deep Leakage from Gradients. Advances in neural information processing systems 32 (2019)."}],"event":{"name":"SC '25: The International Conference for High Performance Computing, Networking, Storage and Analysis","location":"St. Louis MO USA","acronym":"SC '25","sponsor":["SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"]},"container-title":["Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3712285.3759828","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712285.3759828","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712285.3759828","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T18:39:08Z","timestamp":1773254348000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712285.3759828"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,15]]},"references-count":67,"alternative-id":["10.1145\/3712285.3759828","10.1145\/3712285"],"URL":"https:\/\/doi.org\/10.1145\/3712285.3759828","relation":{},"subject":[],"published":{"date-parts":[[2025,11,15]]},"assertion":[{"value":"2025-11-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}