callback( { "result":{ "query":":facetid:toc:\"db/conf/apnet/apnet2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"203.15" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"11", "@dc":"11", "@oc":"11", "@id":"43384095", "text":":facetid:toc:db/conf/apnet/apnet2018.bht" } }, "hits":{ "@total":"11", "@computed":"11", "@sent":"11", "@first":"0", "hit":[{ "@score":"1", "@id":"2518972", "info":{"authors":{"author":[{"@pid":"158/6303-1","text":"Haoxian Chen 0001"},{"@pid":"29/4271","text":"Anduo Wang"},{"@pid":"75/3108","text":"Boon Thau Loo"}]},"title":"Towards Example-Guided Network Synthesis.","venue":"APNet","pages":"65-71","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/ChenWL18","doi":"10.1145/3232565.3234462","ee":"https://doi.org/10.1145/3232565.3234462","url":"https://dblp.org/rec/conf/apnet/ChenWL18"}, "url":"URL#2518972" }, { "@score":"1", "@id":"2518973", "info":{"authors":{"author":[{"@pid":"204/9493","text":"Arnaud Dethise"},{"@pid":"78/9826","text":"Marco Chiesa"},{"@pid":"24/5715","text":"Marco Canini"}]},"title":"Prelude: Ensuring Inter-Domain Loop-Freedom in SDN-Enabled Networks.","venue":"APNet","pages":"50-56","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/DethiseCC18","doi":"10.1145/3232565.3232570","ee":"https://doi.org/10.1145/3232565.3232570","url":"https://dblp.org/rec/conf/apnet/DethiseCC18"}, "url":"URL#2518973" }, { "@score":"1", "@id":"2518974", "info":{"authors":{"author":[{"@pid":"143/8245","text":"Shuihai Hu"},{"@pid":"45/661-1","text":"Wei Bai 0001"},{"@pid":"223/0216","text":"Baochen Qiao"},{"@pid":"c/KaiChen5","text":"Kai Chen 0005"},{"@pid":"42/5784","text":"Kun Tan"}]},"title":"Augmenting Proactive Congestion Control with Aeolus.","venue":"APNet","pages":"22-28","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/Hu0Q0T18","doi":"10.1145/3232565.3232567","ee":"https://doi.org/10.1145/3232565.3232567","url":"https://dblp.org/rec/conf/apnet/Hu0Q0T18"}, "url":"URL#2518974" }, { "@score":"1", "@id":"2518975", "info":{"authors":{"author":[{"@pid":"154/2753","text":"Xiaohe Hu"},{"@pid":"122/9141","text":"Arpit Gupta"},{"@pid":"87/840","text":"Nick Feamster"},{"@pid":"55/925","text":"Aurojit Panda"},{"@pid":"34/5593","text":"Scott Shenker"}]},"title":"Preserving Privacy at IXPs.","venue":"APNet","pages":"43-49","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/HuGFPS18","doi":"10.1145/3232565.3232575","ee":"https://doi.org/10.1145/3232565.3232575","url":"https://dblp.org/rec/conf/apnet/HuGFPS18"}, "url":"URL#2518975" }, { "@score":"1", "@id":"2518976", "info":{"authors":{"author":[{"@pid":"128/3410","text":"Zhetao Li"},{"@pid":"221/4684","text":"Fei Gui"},{"@pid":"171/1013","text":"Jinkun Geng"},{"@pid":"48/4185-1","text":"Dan Li 0001"},{"@pid":"31/5772-1","text":"Zhibo Wang 0001"},{"@pid":"76/5380","text":"Junfeng Li"},{"@pid":"27/986","text":"Yang Cheng"},{"@pid":"223/0221","text":"Usama Zafar"}]},"title":"Dante: Enabling FOV-Aware Adaptive FEC Coding for 360-Degree Video Streaming.","venue":"APNet","pages":"15-21","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/LiGGLWLCZ18","doi":"10.1145/3232565.3234686","ee":"https://doi.org/10.1145/3232565.3234686","url":"https://dblp.org/rec/conf/apnet/LiGGLWLCZ18"}, "url":"URL#2518976" }, { "@score":"1", "@id":"2518977", "info":{"authors":{"author":[{"@pid":"218/5791","text":"Haonan Qiu"},{"@pid":"02/3450-1","text":"Xiaoliang Wang 0001"},{"@pid":"223/0201","text":"Tianchen Jin"},{"@pid":"96/2572","text":"Zhuzhong Qian"},{"@pid":"69/5116","text":"Baoliu Ye"},{"@pid":"77/5837","text":"Bin Tang"},{"@pid":"98/3150","text":"Wenzhong Li"},{"@pid":"24/3318","text":"Sanglu Lu"}]},"title":"Toward Effective and Fair RDMA Resource Sharing.","venue":"APNet","pages":"8-14","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/QiuWJQYTLL18","doi":"10.1145/3232565.3232636","ee":"https://doi.org/10.1145/3232565.3232636","url":"https://dblp.org/rec/conf/apnet/QiuWJQYTLL18"}, "url":"URL#2518977" }, { "@score":"1", "@id":"2518978", "info":{"authors":{"author":[{"@pid":"223/0237","text":"Bingchuan Tian"},{"@pid":"94/1247-1","text":"Chen Tian 0001"},{"@pid":"135/6009","text":"Jiajun Sun"},{"@pid":"157/9079","text":"Junhua Yan"},{"@pid":"175/6032","text":"Yizhou Tang"},{"@pid":"w/WeiWang2","text":"Wei Wang 0002"},{"@pid":"124/6911","text":"Haipeng Dai"},{"@pid":"26/2547","text":"Nai Xia"},{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"57/5595","text":"Wanchun Dou"}]},"title":"Using the Macroflow Abstraction to Minimize Machine Slot-time Spent on Networking in Hadoop.","venue":"APNet","pages":"36-42","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/TianTSYTWDXCD18","doi":"10.1145/3232565.3234504","ee":"https://doi.org/10.1145/3232565.3234504","url":"https://dblp.org/rec/conf/apnet/TianTSYTWDXCD18"}, "url":"URL#2518978" }, { "@score":"1", "@id":"2518979", "info":{"authors":{"author":[{"@pid":"24/6914-25","text":"Hong Zhang 0025"},{"@pid":"c/KaiChen5","text":"Kai Chen 0005"},{"@pid":"42/1518","text":"Mosharaf Chowdhury"}]},"title":"Pas de deux: Shape the Circuits, and Shape the Apps too!","venue":"APNet","pages":"29-35","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/ZhangCC18","doi":"10.1145/3232565.3232568","ee":"https://doi.org/10.1145/3232565.3232568","url":"https://dblp.org/rec/conf/apnet/ZhangCC18"}, "url":"URL#2518979" }, { "@score":"1", "@id":"2518980", "info":{"authors":{"author":[{"@pid":"116/8571","text":"Zhilong Zheng"},{"@pid":"79/3662","text":"Jun Bi"},{"@pid":"01/6072-5","text":"Chen Sun 0005"},{"@pid":"29/1429-5","text":"Heng Yu 0005"},{"@pid":"02/2870","text":"Hongxin Hu"},{"@pid":"198/8304","text":"Zili Meng"},{"@pid":"202/8467","text":"Shuhe Wang"},{"@pid":"12/4000-1","text":"Kai Gao 0001"},{"@pid":"82/4905","text":"Jianping Wu"}]},"title":"GEN: A GPU-Accelerated Elastic Framework for NFV.","venue":"APNet","pages":"57-64","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/ZhengBSYHMWGW18","doi":"10.1145/3232565.3234510","ee":"https://doi.org/10.1145/3232565.3234510","url":"https://dblp.org/rec/conf/apnet/ZhengBSYHMWGW18"}, "url":"URL#2518980" }, { "@score":"1", "@id":"2518981", "info":{"authors":{"author":[{"@pid":"71/5417","text":"Ying Zheng"},{"@pid":"71/4888","text":"Ziyu Liu"},{"@pid":"37/4180","text":"Xinyu You"},{"@pid":"26/340","text":"Yuedong Xu"},{"@pid":"49/8398","text":"Junchen Jiang"}]},"title":"Demystifying Deep Learning in Networking.","venue":"APNet","pages":"1-7","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/apnet/ZhengLYXJ18","doi":"10.1145/3232565.3232569","ee":"https://doi.org/10.1145/3232565.3232569","url":"https://dblp.org/rec/conf/apnet/ZhengLYXJ18"}, "url":"URL#2518981" }, { "@score":"1", "@id":"2684151", "info":{"authors":{"author":[{"@pid":"42/1518","text":"Mosharaf Chowdhury"},{"@pid":"42/5784","text":"Kun Tan"}]},"title":"Proceedings of the 2nd Asia-Pacific Workshop on Networking, APNet 2018, Beijing, China, August 02-03, 2018","venue":"APNet","publisher":"ACM","year":"2018","type":"Editorship","key":"conf/apnet/2018","doi":"10.1145/3232565","ee":"https://doi.org/10.1145/3232565","url":"https://dblp.org/rec/conf/apnet/2018"}, "url":"URL#2684151" } ] } } } )