{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:54:07Z","timestamp":1772726047562,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3718958.3750495","type":"proceedings-article","created":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:54:11Z","timestamp":1756313651000},"page":"1070-1089","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Hummingbird: Fast, Flexible, and Fair Inter-Domain Bandwidth Reservations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6000-3009","authenticated-orcid":false,"given":"Karl","family":"W\u00fcst","sequence":"first","affiliation":[{"name":"Mysten Labs, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0626-6236","authenticated-orcid":false,"given":"Giacomo","family":"Giuliari","sequence":"additional","affiliation":[{"name":"Mysten Labs, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4565-1133","authenticated-orcid":false,"given":"Markus","family":"Legner","sequence":"additional","affiliation":[{"name":"Mysten Labs, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4979-0398","authenticated-orcid":false,"given":"Jean-Pierre","family":"Smith","sequence":"additional","affiliation":[{"name":"Mysten Labs, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9267-6646","authenticated-orcid":false,"given":"Marc","family":"Wyss","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7257-7277","authenticated-orcid":false,"given":"Jules","family":"Bachmann","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8813-1303","authenticated-orcid":false,"given":"Juan","family":"Garcia-Pardo","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5280-5412","authenticated-orcid":false,"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Mysten Labs, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anapaya Systems. 2020. SCION-Internet and Anapaya Software. https:\/\/content.anapaya.net\/hubfs\/collateral\/anapaya-scion-Internet-and-anapaya-software-fs-en.pdf?hsLang=en."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972382"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2474"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282411"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23132"},{"key":"e_1_3_2_1_6_1","volume-title":"Sui Lutris: A Blockchain Combining Broadcast and Consensus. Technical Report. Mysten Labs. https:\/\/arxiv.org\/pdf\/2310.18042","author":"Blackshear Sam","year":"2023","unstructured":"Sam Blackshear, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Xun Li, Mark Logan, Ashok Menon, Todd Nowacki, Alberto Sonnino, Brandon William, and Lu Zhang. 2023. Sui Lutris: A Blockchain Combining Broadcast and Consensus. Technical Report. Mysten Labs. https:\/\/arxiv.org\/pdf\/2310.18042"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Robert T. Braden Lixia Zhang Steven Berson Shai Herzog and Sugih Jamin. 1997. Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification. RFC 2205. IETF. 10.17487\/RFC2205","DOI":"10.17487\/RFC2205"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Workshop on Hot Topics in Operating Systems.","author":"Castro Ignacio","year":"2015","unstructured":"Ignacio Castro, Aurojit Panda, Barath Raghavan, Scott Shenker, and Sergey Gorinsky. 2015. Route bazaar: Automatic interdomain contract negotiation. In USENIX Workshop on Hot Topics in Operating Systems."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05288-0"},{"key":"e_1_3_2_1_10_1","volume-title":"Retrieved","year":"2016","unstructured":"Cisco. 2016. Voice Packetization. Retrieved August 16, 2023 from https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/ios-xml\/ios\/voice\/cube\/configuration\/cube-book\/cube-book_chapter_01001111.html"},{"key":"e_1_3_2_1_11_1","volume-title":"Multipart pricing of public goods. Public choice","author":"Clarke Edward H","year":"1971","unstructured":"Edward H Clarke. 1971. Multipart pricing of public goods. Public choice (1971), 17\u201333."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.266050"},{"key":"e_1_3_2_1_13_1","unstructured":"DPDK Project. 2023. Data Plane Development Kit. https:\/\/dpdk.org."},{"key":"e_1_3_2_1_14_1","volume-title":"ACM SIGCOMM Conference. Association for Computing Machinery","author":"Wirz","year":"2025","unstructured":"Wirz et al. 2025. Scaling SCIERA: A Journey Through the Deployment of a Next-generation Network. In ACM SIGCOMM Conference. Association for Computing Machinery, New York, NY, USA."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Clarence Filsfils Pablo Camarillo John Leddy Daniel Voyer Satoru Matsushima and Zhenbin Li. 2021. Segment Routing over IPv6 (SRv6) Network Programming. RFC 8986. 10.17487\/RFC8986","DOI":"10.17487\/RFC8986"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466772.3467031"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494871"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79527-6_14"},{"key":"e_1_3_2_1_19_1","volume-title":"Incentives in teams. Econometrica: Journal of the Econometric Society","author":"Groves Theodore","year":"1973","unstructured":"Theodore Groves. 1973. Incentives in teams. Econometrica: Journal of the Econometric Society (1973), 617\u2013631."},{"key":"e_1_3_2_1_20_1","unstructured":"Shay Gueron. 2010. Intel Advanced Encryption Standard (AES) new instructions set. Technical Report. Intel Corporation. https:\/\/www.intel.com.bo\/content\/dam\/doc\/white-paper\/advanced-encryption-standard-new-instructions-set-paper.pdf"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/jgt.3190120212"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium (USENIX Security). USENIX Association","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin's peer-to-peer network. In USENIX Security Symposium (USENIX Security). USENIX Association, Berkeley, CA, USA, 129\u2013144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484367"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.tcs.2020.06.024","article-title":"Dynamic data structures for interval coloring","volume":"838","author":"Kashyop Manas Jyoti","year":"2020","unstructured":"Manas Jyoti Kashyop, NS Narayanaswamy, et al. 2020. Dynamic data structures for interval coloring. Theoretical Computer Science 838 (2020), 126\u2013142.","journal-title":"Theoretical Computer Science"},{"key":"e_1_3_2_1_26_1","volume-title":"Cryptographers' Track at the RSA Conference","author":"Katz Jonathan","unstructured":"Jonathan Katz and Andrew Y Lindell. 2008. Aggregate message authentication codes. In Cryptographers' Track at the RSA Conference. Springer, Berlin, Heidelberg, 155\u2013169."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2600523"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejc.2015.05.015"},{"key":"e_1_3_2_1_29_1","volume-title":"Congressus Numerantium 33","author":"Kierstead Henry A","year":"1981","unstructured":"Henry A Kierstead, William T Trotter, et al. 1981. An extremal problem in recursive combinatorics. Congressus Numerantium 33, 143\u2013153 (1981), 98."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE.","author":"Lee Soo Bum","unstructured":"Soo Bum Lee and Virgil D. Gligor. 2010. FLoc: Dependable link access for legitimate traffic in flooding attacks. In Proc. of the IEEE International Conference on Distributed Computing Systems (ICDCS). IEEE."},{"key":"e_1_3_2_1_32_1","volume-title":"Conference on Emerging Networking Experiments and Technologies (CoNEXT).","author":"Lee Soo Bum","unstructured":"Soo Bum Lee, Min Suk Kang, and Virgil D. Gligor. 2013. CoDef: Collaborative defense against large-scale link-flooding attacks. In Conference on Emerging Networking Experiments and Technologies (CoNEXT)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052988"},{"key":"e_1_3_2_1_34_1","volume-title":"Forbes Advisor. Retrieved","author":"Leonard Kimberlee","year":"2023","unstructured":"Kimberlee Leonard and Bottorff Cassie. 2023. Credit Card Processing Fees (2024 Guide). Forbes Advisor. Retrieved January 16, 2024 from https:\/\/www.forbes.com\/advisor\/business\/credit-card-processing-fees\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"Matt Lepinski and Stephen Kent. 2012. An Infrastructure to Support Secure Internet Routing. RFC 6480. IETF. 10.17487\/RFC6480","DOI":"10.17487\/RFC6480"},{"key":"e_1_3_2_1_36_1","volume-title":"Pricing the Internet","author":"MacKie-Mason Jeffrey","unstructured":"Jeffrey MacKie-Mason and Hal Varian. 1995. Pricing the Internet. MIT Press."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2191157"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282413"},{"key":"e_1_3_2_1_39_1","volume-title":"Retrieved","author":"DB.","year":"2023","unstructured":"PeeringDB. 2023. PeeringDB. Retrieved August 16, 2023 from https:\/\/www.peeringdb.com\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2019.102050"},{"key":"e_1_3_2_1_41_1","volume-title":"Digital Line), By Application (BFSI, Medical Insurance), By Geographic Scope And Forecast. Retrieved","author":"Reports Verified Market","year":"2024","unstructured":"Verified Market Reports. 2023. Global Managed Leased Line Service Market By Type (Analog Dedicated Line, Digital Line), By Application (BFSI, Medical Insurance), By Geographic Scope And Forecast. Retrieved 2 September 2024 from https:\/\/www.verifiedmarketreports.com\/product\/managed-leased-line-service-market\/"},{"key":"e_1_3_2_1_42_1","volume-title":"Global Software-Defined Wide Area Network (SD-WAN) Market - Industry Trends and Forecast to","author":"Research Databridge Market","year":"2031","unstructured":"Databridge Market Research. 2024. Global Software-Defined Wide Area Network (SD-WAN) Market - Industry Trends and Forecast to 2031. Retrieved 2 September 2024 from https:\/\/www.databridgemarketresearch.com\/reports\/global-software-defined-wide-area-network-sd-wan-market"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3107"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384743"},{"key":"e_1_3_2_1_45_1","volume-title":"Retrieved","year":"2023","unstructured":"Stripe. 2023. Card authorisation explained: How it works and what businesses need to know. Retrieved January 17, 2024 from https:\/\/stripe.com\/en-gb-ch\/resources\/more\/card-authorization-explained"},{"key":"e_1_3_2_1_46_1","volume-title":"Linux. Retrieved","author":"Support Zoom","year":"2023","unstructured":"Zoom Support. 2023. Zoom system requirements: Windows, MacOS, Linux. Retrieved August 16, 2023 from https:\/\/support.zoom.us\/hc\/en-us\/articles\/201362023-Zoom-system-requirements-Windows-macOS-Linux"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"Arun Viswanathan Eric C. Rosen and Ross Callon. 2001. Multiprotocol Label Switching Architecture. RFC 3031. 10.17487\/RFC3031","DOI":"10.17487\/RFC3031"},{"key":"e_1_3_2_1_49_1","volume-title":"Knottenbelt","author":"Werner Sam M.","year":"2022","unstructured":"Sam M. Werner, Daniel Perez, Lewis Gudgeon, Ariah Klages-Mundt, Dominik Harz, and William J. Knottenbelt. 2022. SoK: Decentralized Finance (DeFi). arXiv:2101.08778 [cs.CR]"},{"key":"e_1_3_2_1_50_1","volume-title":"Network Time Protocol. Retrieved","year":"2024","unstructured":"Wikipedia. 2024. Network Time Protocol. Retrieved 2 September 2024 from https:\/\/en.wikipedia.org\/wiki\/Network_Time_Protocol"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","unstructured":"John T. Wroclawski. 1997. The Use of RSVP with IETF Integrated Services. RFC 2210. IETF. 10.17487\/RFC2210","DOI":"10.17487\/RFC2210"},{"key":"e_1_3_2_1_52_1","unstructured":"Karl W\u00fcst and Arthur Gervais. 2016. Ethereum eclipse attacks. Technical Report. ETH Zurich. 10.3929\/ethz-a-010724205"},{"key":"e_1_3_2_1_53_1","volume-title":"Secure and Scalable QoS for Critical Applications. In IEEE\/ACM International Symposium on Quality of Service (IWQoS).","author":"Wyss Marc","year":"2021","unstructured":"Marc Wyss, Giacomo Giuliari, Markus Legner, and Adrian Perrig. 2021. Secure and Scalable QoS for Critical Applications. In IEEE\/ACM International Symposium on Quality of Service (IWQoS)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560582"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"e_1_3_2_1_56_1","volume-title":"IEEE Symposium on Security and Privacy (S&P).","author":"Yaar Abraham","year":"2004","unstructured":"Abraham Yaar, Adrian Perrig, and Dawn Song. 2004. SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080120"},{"key":"e_1_3_2_1_58_1","volume-title":"Retrieved","author":"Yeluri Sharada","year":"2023","unstructured":"Sharada Yeluri. 2023. Sizing router buffers \u2014 small is the new big. Retrieved August 16, 2023 from https:\/\/blog.apnic.net\/2023\/03\/06\/sizing-router-buffers-small-is-the-new-big\/"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","location":"S\u00e3o Francisco Convent Coimbra Portugal","acronym":"SIGCOMM '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2025 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3718958.3750495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T17:02:28Z","timestamp":1756314148000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3718958.3750495"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,27]]},"references-count":58,"alternative-id":["10.1145\/3718958.3750495","10.1145\/3718958"],"URL":"https:\/\/doi.org\/10.1145\/3718958.3750495","relation":{},"subject":[],"published":{"date-parts":[[2025,8,27]]},"assertion":[{"value":"2025-08-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}