{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:30:15Z","timestamp":1777390215428,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3748273.3749200","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:19:34Z","timestamp":1756829974000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Why choose when you can have both: Programmable data planes meet programmable optics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3617-1907","authenticated-orcid":false,"given":"Chris","family":"Misa","sequence":"first","affiliation":[{"name":"University of Oregon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0802-2920","authenticated-orcid":false,"given":"Matthew","family":"Nance-Hall","sequence":"additional","affiliation":[{"name":"Scala Computing, Inc. and University of Oregon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9654-1316","authenticated-orcid":false,"given":"Reza","family":"Rejaie","sequence":"additional","affiliation":[{"name":"University of Oregon"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1384-8188","authenticated-orcid":false,"given":"Walter","family":"Willinger","sequence":"additional","affiliation":[{"name":"NIKSUN, Inc."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2859-5598","authenticated-orcid":false,"given":"Ramakrishnan","family":"Durairajan","sequence":"additional","affiliation":[{"name":"University of Oregon and Link Oregon"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Ayar Labs. https:\/\/ayarlabs.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Behavioral Model Repository. https:\/\/github.com\/p4lang\/behavioral-model. Accessed: 2023-03-05."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. COSMOS Testbed. https:\/\/cosmos-lab.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. FABRIC Testbed. https:\/\/fabric-testbed.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Intel Tofino Series. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/network-io\/programmable-ethernet-switch\/tofino-series.html. Accessed: 2023-02-20."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Lighttelligence. https:\/\/www.lightelligence.ai\/."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. NPL-Open High-level language for developing feature-rich solutions for programmable networking platforms. https:\/\/nplang.org\/. Accessed: 2023-03-08."},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. Open Disaggregated Transport Network. https:\/\/www.opennetworking.org\/odtn\/. Accessed: 2023-06-26."},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. Optalysys. https:\/\/optalysys.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Trident4 \/ BCM56880 Series. https:\/\/www.broadcom.com\/products\/ethernet-connectivity\/switching\/strataxgs\/bcm56880-series. Accessed: 2023-05-04."},{"key":"e_1_3_2_1_11_1","unstructured":"Firas Abuzaid Srikanth Kandula Behnaz Arzani Ishai Menache Matei Zaharia and Peter Bailis. 2021. Contracting Wide-area Network Topologies to Solve Flow Problems Quickly.. In NSDI. 175--200."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546096.3546103"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Hitesh Ballani Paolo Costa Raphael Behrendt Daniel Cletheroe Istv\u00e1n Haller Krzysztof Jozwik Fotini Karinou Sophie Lange Kai Shi Benn Thomsen and Hugh Williams. 2020. Sirius: A Flat Datacenter Network with Nanosecond Optical Switching. In SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications technologies architectures and protocols for computer communication Virtual Event USA August 10-14 2020 Henning Schulzrinne and Vishal Misra (Eds.). ACM 782--797. doi:10.1145\/3387514.3406221","DOI":"10.1145\/3387514.3406221"},{"key":"e_1_3_2_1_15_1","volume-title":"Panagiotis Papadimitratos, and Marco Chiesa.","author":"Barbette Tom","year":"2020","unstructured":"Tom Barbette, Chen Tang, Haoran Yao, Dejan Kostic, Gerald Q Maguire Jr, Panagiotis Papadimitratos, and Marco Chiesa. 2020. A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency.. In NSDI. 667--683."},{"key":"e_1_3_2_1_16_1","volume-title":"A little is enough: Circumventing defenses for distributed learning. Advances in Neural Information Processing Systems 32","author":"Baruch Gilad","year":"2019","unstructured":"Gilad Baruch, Moran Baruch, and Yoav Goldberg. 2019. A little is enough: Circumventing defenses for distributed learning. Advances in Neural Information Processing Systems 32 (2019)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845180"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"e_1_3_2_1_20_1","volume-title":"TVMC: Time-Varying Mesh Compression Using Volume-Tracked Reference Meshes.","author":"Chen Guodong","year":"2025","unstructured":"Guodong Chen, Filip H\u00e1cha, Libor V\u00e1\u0161a, and Mallesham Dasari. 2025. TVMC: Time-Varying Mesh Compression Using Volume-Tracked Reference Meshes. (2025)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.4.000001"},{"key":"e_1_3_2_1_22_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Feng Yong","year":"2022","unstructured":"Yong Feng, Zhikang Chen, Haoyu Song, Wenquan Xu, Jiahao Li, Zijian Zhang, Tong Yun, Ying Wan, and Bin Liu. 2022. Enabling In-situ Programmability in Network Data Plane: From Architecture to Language. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 635--649."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.8.000A45"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380840"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363542.3363547"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"e_1_3_2_1_27_1","unstructured":"Martin Geddes. 2016. No Moore's Law for Networks. https:\/\/themobilecentury.com\/moores-law-for-networks\/. Accessed: 2023-06-26."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2021.W1E.2"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987483"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934911"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098839"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473938.3474510"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the ACM SIGCOMM 2020 Workshop on Optical Systems Design. ACM.","author":"Hall Matthew Nance","year":"2020","unstructured":"Matthew Nance Hall and Ramakrishnan Durairajan. 2020. Bridging the Optical-Packet Network Chasm via Secure Enclaves. In Proceedings of the ACM SIGCOMM 2020 Workshop on Optical Systems Design. ACM."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405824"},{"key":"e_1_3_2_1_36_1","volume-title":"Simplifying Software-Defined Network Optimization Using SOL. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Heorhiadi Victor","year":"2016","unstructured":"Victor Heorhiadi, Michael K Reiter, and Vyas Sekar. 2016. Simplifying Software-Defined Network Optimization Using SOL. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 223--237."},{"key":"e_1_3_2_1_37_1","first-page":"80","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","volume":"1","author":"Hutchins Eric M","year":"2011","unstructured":"Eric M Hutchins, Michael J Cloppert, Rohan M Amin, et al. 2011. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues in Information Warfare & Security Research 1, 1 (2011), 80.","journal-title":"Leading Issues in Information Warfare & Security Research"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Su Jia Xin Jin Golnaz Ghasemiesfeh Jiaxin Ding and Jie Gao. 2017. Competitive Analysis for Online Scheduling in Software-Defined Optical WAN. In INFOCOM. 1--9.","DOI":"10.1109\/INFOCOM.2017.8056969"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Xin Jin Yiran Li Da Wei Siming Li Jie Gao Lei Xu Guangzhi Li Wei Xu and Jennifer Rexford. 2016. Optimizing Bulk Transfers with Software-Defined Optical WAN. In ACM SIGCOMM. 87--100.","DOI":"10.1145\/2934872.2934904"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.19"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2019.8768888"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. of fourth workshop on Hot Topics in Networks (HotNet-IV).","author":"Kompella Ramana Rao","year":"2005","unstructured":"Ramana Rao Kompella, Albert Greenberg, Jennifer Rexford, Alex C Snoeren, and Jennifer Yates. 2005. Cross-layer Visibility as a Service. In Proc. of fourth workshop on Hot Topics in Networks (HotNet-IV)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2923110"},{"key":"e_1_3_2_1_46_1","volume-title":"Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Liu Zaoxing","year":"2021","unstructured":"Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. 2021. Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating Volumetric DDoS Attacks with Programmable Switches. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, Berkeley, California, USA, 3829--3846. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/liu-zaoxing"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2023.3306773"},{"key":"e_1_3_2_1_48_1","volume-title":"Long-term Capacity Planning in Flexible Optical Transport Networks. In 2022 Optical Fiber Communications Conference and Exhibition (OFC). IEEE, 1--3.","author":"Machuca Carmen Mas","year":"2022","unstructured":"Carmen Mas Machuca, Sai Kireet Patri, and Saquib Amjad. 2022. Long-term Capacity Planning in Flexible Optical Transport Networks. In 2022 Optical Fiber Communications Conference and Exhibition (OFC). IEEE, 1--3."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_50_1","unstructured":"Serge Melle. 2021. Closing the gap to the Shannon Limit in real-world networks. https:\/\/www.nokia.com\/blog\/closing-the-gap-to-the-shannon-limit-in-real-world-networks\/. Accessed: 2023-06-26."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2021.M3E.2"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3295500.3356145"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00267"},{"key":"e_1_3_2_1_55_1","volume-title":"Dynamic Scheduling of Approximate Telemetry Queries. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Misa Chris","year":"2022","unstructured":"Chris Misa, Walt O'Connor, Ramakrishnan Durairajan, Reza Rejaie, and Walter Willinger. 2022. Dynamic Scheduling of Approximate Telemetry Queries. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 701--717."},{"key":"e_1_3_2_1_56_1","unstructured":"Mitre. 2022. Network Denial of Service: Direct Network Flood. https:\/\/attack.mitre.org\/versions\/v13\/techniques\/T1498\/001\/. Accessed 2023-06-26."},{"key":"e_1_3_2_1_57_1","volume-title":"A compiler and run-time system for network programming languages. Acm sigplan notices 47, 1","author":"Monsanto Christopher","year":"2012","unstructured":"Christopher Monsanto, Nate Foster, Rob Harrison, and David Walker. 2012. A compiler and run-time system for network programming languages. Acm sigplan notices 47, 1 (2012), 217--230."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2016.2522305"},{"key":"e_1_3_2_1_59_1","volume-title":"Improving Scalability in Traffic Engineering via Optical Topology Programming","author":"Nance-Hall Matthew","year":"2023","unstructured":"Matthew Nance-Hall, Paul Barford, Klaus-Tycho Foerster, and Ramakrishnan Durairajan. 2023. Improving Scalability in Traffic Engineering via Optical Topology Programming. IEEE Transactions on Network and Service Management (2023)."},{"key":"e_1_3_2_1_60_1","volume-title":"Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks","author":"Nance-Hall Matthew","year":"2024","unstructured":"Matthew Nance-Hall, Zaoxing Liu, Vyas Sekar, and Ramakrishnan Durairajan. 2024. Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks. IEEE Transactions on Dependable and Secure Computing (2024)."},{"key":"e_1_3_2_1_61_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Olteanu Vladimir","year":"2018","unstructured":"Vladimir Olteanu, Alexandru Agache, Andrei Voinescu, and Costin Raiciu. 2018. Stateless datacenter load-balancing with beamer. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 125--139."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.021.1900599"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2016.M2K.3"},{"key":"e_1_3_2_1_64_1","volume-title":"Hague","author":"Pols Paul","year":"2017","unstructured":"Paul Pols and Jan van den Berg. 2017. The unified kill chain. CSA Thesis, Hague (2017), 1--104."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Arslan Sajid Raja Sophie Lange Maxim Karpov Kai Shi Xin Fu Raphael Behrendt Daniel Cletheroe Anton Lukashchuk Istvan Haller Fotini Karinou et al. 2021. Ultrafast optical circuit switching for data centers using integrated soliton microcombs. Nature communications 12 1 (2021) 5867.","DOI":"10.1038\/s41467-021-25841-8"},{"key":"e_1_3_2_1_66_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Sharma Naveen Kr","year":"2018","unstructured":"Naveen Kr Sharma, Ming Liu, Kishore Atreya, and Arvind Krishnamurthy. 2018. Approximating fair queueing on reconfigurable switches. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 1--16."},{"key":"e_1_3_2_1_67_1","volume-title":"On the Feasibility of Using LLMs to Execute Multistage Network Attacks. arXiv preprint arXiv:2501.16466","author":"Singer Brian","year":"2025","unstructured":"Brian Singer, Keane Lucas, Lakshmi Adiga, Meghna Jain, Lujo Bauer, and Vyas Sekar. 2025. On the Feasibility of Using LLMs to Execute Multistage Network Attacks. arXiv preprint arXiv:2501.16466 (2025)."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472895"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230570"},{"key":"e_1_3_2_1_70_1","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Siracusano Giuseppe","year":"2022","unstructured":"Giuseppe Siracusano, Salvator Galea, Davide Sanvito, Mohammad Malekzadeh, Gianni Antichi, Paolo Costa, Hamed Haddadi, and Roberto Bifulco. 2022. Rearchitecting traffic analysis with neural network interface cards. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). 513--533."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"e_1_3_2_1_73_1","volume-title":"Full-stack SDN. In Proceedings of the 21st ACM Workshop on Hot Topics in Networks. 130--137","author":"Sur Debnil","year":"2022","unstructured":"Debnil Sur, Ben Pfaff, Leonid Ryzhyk, and Mihai Budiu. 2022. Full-stack SDN. In Proceedings of the 21st ACM Workshop on Hot Topics in Networks. 130--137."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2015.W1D.5"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389698"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2021.M3E.3"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342462"},{"key":"e_1_3_2_1_78_1","volume-title":"Topoopt: Optimizing the network topology for distributed dnn training. arXiv e-prints","author":"Wang Weiyang","year":"2022","unstructured":"Weiyang Wang, Moein Khazraee, Zhizhen Zhong, Zhijao Jia, Dheevatsa Mudigere, Ying Zhang, Anthony Kewitsch, and Manya Ghobadi. 2022. Topoopt: Optimizing the network topology for distributed dnn training. arXiv e-prints (2022), arXiv-2202."},{"key":"e_1_3_2_1_79_1","volume-title":"Proc. NSDI (to appear)","author":"Xing Jiarong","year":"2022","unstructured":"Jiarong Xing, Kuo-Feng Hsu, Matty Kadosh, Alan Lo, Yonatan Piasetzky, Arvind Krishnamurthy, and Ang Chen. 2022. Runtime programmable switches. Proc. NSDI (to appear) (2022)."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487377"},{"key":"e_1_3_2_1_81_1","volume-title":"Decentralized Link-Flooding Defense Against Adaptive Adversaries. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Xing Jiarong","year":"2021","unstructured":"Jiarong Xing, Wenqing Wu, and Ang Chen. 2021. Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive Adversaries. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 3865--3881. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/xing"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544262"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102564"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405870"},{"key":"e_1_3_2_1_85_1","unstructured":"Hui Zang Jason P Jue Biswanath Mukherjee et al. 2000. A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks. Optical networks magazine 1 1 (2000) 47--60."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"crossref","unstructured":"Zhizhen Zhong Manya Ghobadi Alaa Khaddaj Jonathan Leach Yiting Xia and Ying Zhang. 2021. ARROW: restoration-aware traffic engineering. In ACM SIGCOMM. 560--579.","DOI":"10.1145\/3452296.3472921"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","location":"Coimbra Portugal","acronym":"SIGCOMM '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2nd Workshop on Networks for AI Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748273.3749200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:10:51Z","timestamp":1760019051000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748273.3749200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":87,"alternative-id":["10.1145\/3748273.3749200","10.1145\/3748273"],"URL":"https:\/\/doi.org\/10.1145\/3748273.3749200","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}