{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:54:49Z","timestamp":1757613289178,"version":"3.44.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,20]]},"DOI":"10.23919\/ifipnetworking.2019.8816846","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T21:35:56Z","timestamp":1567114556000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Latency and Consistent Flow Migration: Relax for Lossless Updates"],"prefix":"10.23919","author":[{"given":"Klaus-Tycho","family":"Foerster","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, University of Vienna, Austria"}]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[{"name":"ETH Zurich, Networked Systems Group, Switzerland"}]},{"given":"Roger","family":"Wattenhofer","sequence":"additional","affiliation":[{"name":"ETH Zurich, Distributed Computing Group, Switzerland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ECUMN.2002.1002118"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1097\/00000658-200204000-00005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892557"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25258-2_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2871023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486005"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535791"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497214"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841562"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249247"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626336"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626307"},{"key":"ref29","article-title":"What you need to know about SDN flow tables","author":"kuzniar","year":"2015","journal-title":"PAM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"journal-title":"Network Flows - Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.11.018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342455"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1990","author":"garey","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775069"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6678922"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230120306"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592604"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2190767"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098849"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.33"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906741"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760146"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2642586"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2723461"},{"journal-title":"Network Recovery Protection and Restoration of Optical SONET-SDH IP and MPLS","year":"2004","author":"vasseur","key":"ref53"},{"key":"ref52","article-title":"Let it flow: Resilient asymmetric load balancing with flowlet switching","author":"vanini","year":"2017","journal-title":"NSDI"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2661061.2661063"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2332101"},{"key":"ref40","article-title":"On the necessity of time-based updates in SDN","author":"mizrahi","year":"2014","journal-title":"ONS"},{"journal-title":"Introduction to Algorithms","year":"2009","author":"cormen","key":"ref12"},{"journal-title":"Don't disturb my flows Algorithms for consistent network updates in software defined networks","year":"2016","author":"foerster","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171348"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548339"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2778426"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2016.7497232"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2876749"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568583"},{"key":"ref4","article-title":"Congestion-free rerouting of flows on dags","author":"amiri","year":"2018","journal-title":"ICALP"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2019.8816833"},{"key":"ref6","article-title":"Transiently consistent SDN updates: Being greedy is hard","author":"amiri","year":"2016","journal-title":"SIROCCO"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211859"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524332"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2810640"},{"key":"ref49","article-title":"B4: experience with a globally-deployed software defined wan","author":"sushant","year":"2013","journal-title":"SIGCOMM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.09.012"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342427"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644903"},{"key":"ref48","article-title":"Harnessing tcp's burstiness with flowlet switching","author":"sinha","year":"2004","journal-title":"HotNets"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230570"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2608441"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2529058"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626309"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050224"}],"event":{"name":"2019 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2019,5,20]]},"location":"Warsaw, Poland","end":{"date-parts":[[2019,5,22]]}},"container-title":["2019 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811689\/8816828\/08816846.pdf?arnumber=8816846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:19:56Z","timestamp":1757009996000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8816846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,20]]},"references-count":59,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2019.8816846","relation":{},"subject":[],"published":{"date-parts":[[2019,5,20]]}}}