Authors: Alexander Wolosewicz, Vinod Yegneswaran, Ashish Gehani, Nik Sultana
2025 12th Annual International Workshop on Innovating the Network for Data-Intensive Science (INDIS)
Authors: Ajay Kumar, Praveen Rao, Peter Sanders
2025 arXiv:2509.09058
Authors: Grigoryan, Garegin, Kevin Penkowski, Minseok Kwon
2025 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC) MyResearch
Authors: Nishanth Shyamkumar, Bjoern Sagstad, Prajwal Somendyapanahalli, Venkateshmurthy, Sean Cummings
2025 Internet Measurement Conference
Authors: Baptiste Jonglez, Matthieu Simonin, Jolan Philippe, Sidi Mohammed Kaddour
2025 Workshop de Pesquisa Experimental da Internet do Futuro (WPEIF)
Authors: Sergio Elizalde, Ali Mazloum, Samia Choueiri, Elie Kfoury, Jorge Crichigno
2025 4th IEEE/IFIP International Intelligence Provisioning for Network and Service Management in Softwarized Networks (NOMS_IPSN 2025)
Authors: Mohammad Amir Salari, Abhinav Kumar, Federico Rinaudi, Reza Tourani, Alessio Sacco, Flavio Esposito
2025 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Authors: Anestis Dalgkitsis, Jose E. Zerna Torres, Angelos Dimoglis, Marios Avgeris, Chrysa Papagianni, Paola Grosso
2025 25th Anniversary International Conference on Transparent Optical Networks (ICTON)
Authors: Elie Kfoury, Ali Mazloum, Jose Gomez, Ali AlSabeh, Jorge Crichigno
2025 IEEE International Conference on Communications (ICC): Next-Generation Networking and Internet Symposium
Authors: Motahare Mounesan
2025 Dissertation, The City University of New York
Authors: Xi Wang
2025 Tennessee Technological University ProQuest Dissertations & Theses
Authors: Yang-Zhe Lin, Chun-Ting Lin, Po-Yi Lin, Shixiong Qi, Jyh-Cheng Chen, K. K. Ramakrishnan
2025 The 1st free5GC World Forum 2025
Authors: Zhifan Lu, Siyang Sun, Yixin Sun
2025 arXiv:2501.06010
Authors: Inder Monga, Mazahir Hussain, Justas Balcas, Aashay Arora, Diego Davila, Buseung Cho, Xi Yang, Cees De Laat
2025 SC Workshops '25: Proceedings of the SC '25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis
Authors: Fatih Berkay Sarpkaya, Fraida Fund, Shivendra Panwar
2025 arXiv:2411.10952
Authors: Flavio Castro, Weijian Zheng, Joaquin Chung, Ian Foster, Raj Kettimuthu
2025 SC Workshops '25: Proceedings of the SC '25 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis
Authors: Mami Hayashida, Joshna, Kurra, Zongming Fei, James Griffioen
2025 Improving Scientific Software Conference Proceedings
Authors: Alexander Wolosewicz, Vinod Yegneswaran, Ashish Gehani, Nik Sultana
2025 Cyber Security Experimentation and Test Workshop
Page 2 41 - 60 of 104 results Page 4

publications:
{'count': 104, 'next': 'https://publications.fabric-testbed.net/publications/?page=4', 'previous': 'https://publications.fabric-testbed.net/publications/?page=2', 'results': [{'authors': [{'author_name': 'Alexander Wolosewicz', 'display_name': 'Alexander Wolosewicz', 'fabric_uuid': None, 'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20', 'uuid': 'baecd6cb-d7b0-4886-9512-68a457f8d3bd'}, {'author_name': 'Vinod Yegneswaran', 'display_name': 'Vinod Yegneswaran', 'fabric_uuid': None, 'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20', 'uuid': '22a905ab-d0ce-46ec-9f26-8572d608e840'}, {'author_name': 'Ashish Gehani', 'display_name': 'Ashish Gehani', 'fabric_uuid': None, 'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20', 'uuid': 'ab1fe63c-db32-46b8-b214-71a466ea4f72'}, {'author_name': 'Nik Sultana', 'display_name': 'Nik Sultana', 'fabric_uuid': None, 'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20', 'uuid': '73d67a55-d0ab-4e31-996d-e2e07f32a3d2'}], 'bibtex': '@article{wolosewicz2025,\n' ' title = {Network Replay and Consistency Across ' 'Testbeds},\n' ' author = {Alexander Wolosewicz and Vinod ' 'Yegneswaran and Ashish Gehani and Nik Sultana},\n' ' year = {2025},\n' ' journal = {12th Annual International Workshop on ' 'Innovating the Network for Data-Intensive Science ' '(INDIS)},\n' ' url = ' '{https://www.csl.sri.com/users/gehani/papers/INDIS-2025.Choir.pdf}\n' '}', 'created': '2025-11-07 21:58:16.626000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://www.csl.sri.com/users/gehani/papers/INDIS-2025.Choir.pdf', 'modified': '2025-11-07 21:58:16.626000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Network Replay and Consistency Across Testbeds', 'uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20', 'venue': '12th Annual International Workshop on Innovating the ' 'Network for Data-Intensive Science (INDIS)', 'year': '2025'}, {'authors': [{'author_name': 'da Silva B. M.', 'display_name': 'da Silva B. M.', 'fabric_uuid': None, 'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad', 'uuid': '8d045cc5-cb3b-4d10-a071-0a7b0cbbb649'}, {'author_name': 'Moreira L. F. R.', 'display_name': 'Moreira L. F. R.', 'fabric_uuid': None, 'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad', 'uuid': '37c41b9b-acf4-4bc4-895a-bb107880c8d5'}, {'author_name': 'de Oliveira Silva F.', 'display_name': 'de Oliveira Silva F.', 'fabric_uuid': None, 'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad', 'uuid': 'cd8683bd-d2d4-426d-87d4-042ff3fc5bfc'}, {'author_name': 'Moreira R.', 'display_name': 'Moreira R.', 'fabric_uuid': None, 'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad', 'uuid': '057a2ecc-a8ee-4fd9-90f0-d38680c1024f'}], 'bibtex': '@article{m.2025,\n' ' title = {Optimizing Edge Gaming Slices through an ' 'Enhanced User Plane Function and Analytics in Beyond ' '5G Networks},\n' ' author = {da Silva B. M. and Moreira L. F. R. and ' 'de Oliveira Silva F. and Moreira R.},\n' ' year = {2025},\n' ' journal = {arXiv:2507.17843}\n' '}', 'created': '2025-12-03 18:33:11.117000+00:00', 'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b', 'link': None, 'modified': '2025-12-03 18:33:33.233000+00:00', 'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b', 'project_name': 'Agentic GPU-Accelerated 5G/6G RAN Controller on ' 'FABRIC', 'project_uuid': '47556e8d-33f2-4482-b0b3-30f17ecb271b', 'title': 'Optimizing Edge Gaming Slices through an Enhanced User ' 'Plane Function and Analytics in Beyond 5G Networks', 'uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad', 'venue': 'arXiv:2507.17843', 'year': '2025'}, {'authors': [{'author_name': 'Ajay Kumar', 'display_name': 'Ajay Kumar', 'fabric_uuid': None, 'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc', 'uuid': 'db0ed4e3-830a-4e43-8a5f-ebf5b7489d16'}, {'author_name': 'Praveen Rao', 'display_name': 'Praveen Rao', 'fabric_uuid': None, 'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc', 'uuid': 'bbf03a7a-4dbe-45ce-b431-7f1cb14b64dc'}, {'author_name': 'Peter Sanders', 'display_name': 'Peter Sanders', 'fabric_uuid': None, 'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc', 'uuid': '0a706951-4f36-4147-b206-44b3d6b51dcc'}], 'bibtex': '@article{kumar2025,\n' ' title = {Optimizing the Variant Calling Pipeline ' 'Execution on Human Genomes Using GPU-Enabled ' 'Machines},\n' ' author = {Ajay Kumar and Praveen Rao and Peter ' 'Sanders},\n' ' year = {2025},\n' ' journal = {arXiv:2509.09058},\n' ' url = {https://arxiv.org/pdf/2509.09058}\n' '}', 'created': '2025-11-07 21:52:55.778000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://arxiv.org/pdf/2509.09058', 'modified': '2025-11-07 21:52:55.778000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Optimizing the Variant Calling Pipeline Execution on ' 'Human Genomes Using GPU-Enabled Machines', 'uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc', 'venue': 'arXiv:2509.09058', 'year': '2025'}, {'authors': [{'author_name': 'Grigoryan', 'display_name': 'Grigoryan', 'fabric_uuid': None, 'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710', 'uuid': '5a72ccc3-9faa-4342-acfc-a44e3781ac48'}, {'author_name': 'Garegin', 'display_name': 'Garegin', 'fabric_uuid': None, 'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710', 'uuid': 'd0ad29f9-ac29-4f02-b948-3359bbcd52b2'}, {'author_name': 'Kevin Penkowski', 'display_name': 'Kevin Penkowski', 'fabric_uuid': None, 'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710', 'uuid': 'b2fbcc6e-a1e1-400a-91e6-0d7059cc2e17'}, {'author_name': 'Minseok Kwon', 'display_name': 'Minseok Kwon', 'fabric_uuid': None, 'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710', 'uuid': 'c054d875-da13-4cf4-a7bb-9ee7d6cca4a0'}], 'bibtex': '@article{grigoryan2025,\n' ' title = {P4Kube: In-Network Load Balancer for ' 'Kubernetes},\n' ' author = {Grigoryan and Garegin and Kevin Penkowski ' 'and Minseok Kwon},\n' ' year = {2025},\n' ' journal = {2025 IEEE 22nd Consumer Communications & ' 'Networking Conference (CCNC)},\n' ' url = ' '{https://xplorestaging.ieee.org/document/10976037}\n' '}', 'created': '2025-06-13 14:38:12.167000+00:00', 'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b', 'link': 'https://xplorestaging.ieee.org/document/10976037', 'modified': '2025-06-13 14:38:12.167000+00:00', 'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b', 'project_name': 'MyResearch', 'project_uuid': '5f00e1ce-d082-4a2b-b08f-889658e932b7', 'title': 'P4Kube: In-Network Load Balancer for Kubernetes', 'uuid': '54876276-8c6b-47c7-8206-af3102769710', 'venue': '2025 IEEE 22nd Consumer Communications & Networking ' 'Conference (CCNC)', 'year': '2025'}, {'authors': [{'author_name': 'Nishanth Shyamkumar', 'display_name': 'Nishanth Shyamkumar', 'fabric_uuid': None, 'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'uuid': '6e05a2d4-644f-43f4-8199-e49a0b27c727'}, {'author_name': 'Bjoern Sagstad', 'display_name': 'Bjoern Sagstad', 'fabric_uuid': None, 'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'uuid': 'c73cc2ac-b963-4fb2-a08d-61cd93f62a68'}, {'author_name': 'Prajwal Somendyapanahalli', 'display_name': 'Prajwal Somendyapanahalli', 'fabric_uuid': None, 'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'uuid': 'f1e64911-cb40-4f0f-86cc-290765940d48'}, {'author_name': 'Venkateshmurthy', 'display_name': 'Venkateshmurthy', 'fabric_uuid': None, 'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'uuid': 'ffb575d3-673b-415d-9b90-099038043c76'}, {'author_name': 'Sean Cummings', 'display_name': 'Sean Cummings', 'fabric_uuid': None, 'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'uuid': '7d3803e8-72cb-46ca-bc86-67213f0c6038'}], 'bibtex': '@article{shyamkumar2025,\n' ' title = {Patchwork: A Traffic Capture and Analysis ' 'Platform for Network Experiments on a Federated ' 'Testbed},\n' ' author = {Nishanth Shyamkumar and Bjoern Sagstad ' 'and Prajwal Somendyapanahalli and Venkateshmurthy and ' 'Sean Cummings},\n' ' year = {2025},\n' ' journal = {Internet Measurement Conference},\n' ' url = ' '{https://packetfilters.cs.iit.edu/patchwork/patchwork.pdf}\n' '}', 'created': '2025-11-07 22:00:49.028000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://packetfilters.cs.iit.edu/patchwork/patchwork.pdf', 'modified': '2025-11-07 22:00:49.028000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Patchwork: A Traffic Capture and Analysis Platform for ' 'Network Experiments on a Federated Testbed', 'uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c', 'venue': 'Internet Measurement Conference', 'year': '2025'}, {'authors': [{'author_name': 'Baptiste Jonglez', 'display_name': 'Baptiste Jonglez', 'fabric_uuid': None, 'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555', 'uuid': '1e647b8e-8b49-4fbc-b373-2be3166ead4f'}, {'author_name': 'Matthieu Simonin', 'display_name': 'Matthieu Simonin', 'fabric_uuid': None, 'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555', 'uuid': '628fa4a5-28e2-416f-a601-1dbcb75e36b7'}, {'author_name': 'Jolan Philippe', 'display_name': 'Jolan Philippe', 'fabric_uuid': None, 'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555', 'uuid': 'e081b5a9-9890-4abc-a828-49f1521179fe'}, {'author_name': 'Sidi Mohammed Kaddour', 'display_name': 'Sidi Mohammed Kaddour', 'fabric_uuid': None, 'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555', 'uuid': '1d134608-40db-4284-90a5-1bbcb3d862da'}], 'bibtex': '@article{jonglez2025,\n' ' title = {Performance Evaluation and Threat ' 'Mitigation in Large-scale 5G Core Deployment},\n' ' author = {Baptiste Jonglez and Matthieu Simonin and ' 'Jolan Philippe and Sidi Mohammed Kaddour},\n' ' year = {2025},\n' ' journal = {Workshop de Pesquisa Experimental da ' 'Internet do Futuro (WPEIF)}\n' '}', 'created': '2025-06-02 13:58:26.764000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': None, 'modified': '2025-06-02 13:58:26.764000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Performance Evaluation and Threat Mitigation in ' 'Large-scale 5G Core Deployment', 'uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555', 'venue': 'Workshop de Pesquisa Experimental da Internet do ' 'Futuro (WPEIF)', 'year': '2025'}, {'authors': [{'author_name': 'Sergio Elizalde', 'display_name': 'Sergio Elizalde', 'fabric_uuid': None, 'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'uuid': '6c73b232-0059-4c6e-8f0f-b9ae25c56762'}, {'author_name': 'Ali Mazloum', 'display_name': 'Ali Mazloum', 'fabric_uuid': None, 'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'uuid': '44536c66-d4fa-4622-929e-c3e625e1d68c'}, {'author_name': 'Samia Choueiri', 'display_name': 'Samia Choueiri', 'fabric_uuid': None, 'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'uuid': 'ea3342b9-a5b5-447c-986c-0338d3ae8964'}, {'author_name': 'Elie Kfoury', 'display_name': 'Elie Kfoury', 'fabric_uuid': None, 'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'uuid': '25e14a61-c2b0-422f-94f2-daf8f2467669'}, {'author_name': 'Jorge Crichigno', 'display_name': 'Jorge Crichigno', 'fabric_uuid': None, 'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'uuid': '67de9f64-c05e-48dc-bfa5-bbfff8fbf3ba'}], 'bibtex': '@article{elizalde2025,\n' ' title = {Performance Evaluation of Stateless ' 'Firewalling: Host-Based, SmartNIC, and P4 Switch},\n' ' author = {Sergio Elizalde and Ali Mazloum and Samia ' 'Choueiri and Elie Kfoury and Jorge Crichigno},\n' ' year = {2025},\n' ' journal = {4th IEEE/IFIP International Intelligence ' 'Provisioning for Network and Service Management in ' 'Softwarized Networks (NOMS_IPSN 2025)},\n' ' url = ' '{https://research.cec.sc.edu/files/documents/Stateless_Firewalling_NOMS_workshop.pdf}\n' '}', 'created': '2025-04-27 13:36:05.041000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://research.cec.sc.edu/files/documents/Stateless_Firewalling_NOMS_workshop.pdf', 'modified': '2025-04-27 13:36:05.041000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Performance Evaluation of Stateless Firewalling: ' 'Host-Based, SmartNIC, and P4 Switch', 'uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc', 'venue': '4th IEEE/IFIP International Intelligence Provisioning ' 'for Network and Service Management in Softwarized ' 'Networks (NOMS_IPSN 2025)', 'year': '2025'}, {'authors': [{'author_name': 'Mohammad Amir Salari', 'display_name': 'Mohammad Amir Salari', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': '206185ec-fb5d-4089-ad5d-d4947ad15c4a'}, {'author_name': 'Abhinav Kumar', 'display_name': 'Abhinav Kumar', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': '82b6042c-da45-4e43-8ac0-2711799503c8'}, {'author_name': 'Federico Rinaudi', 'display_name': 'Federico Rinaudi', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': 'f77ea727-b389-4444-b1d2-120902d02ea0'}, {'author_name': 'Reza Tourani', 'display_name': 'Reza Tourani', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': 'fd4d913f-3eee-4b72-acbe-f4ec4d60cac4'}, {'author_name': 'Alessio Sacco', 'display_name': 'Alessio Sacco', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': '918ae114-1b56-4cba-ae77-9743c8974310'}, {'author_name': 'Flavio Esposito', 'display_name': 'Flavio Esposito', 'fabric_uuid': None, 'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'uuid': 'd5e54e7a-85ad-45b6-8f52-37bbe59f8041'}], 'bibtex': '@article{salari2025,\n' ' title = {Privacy Analysis of Oblivious DNS over ' 'HTTPS: a Website Fingerprinting Study},\n' ' author = {Mohammad Amir Salari and Abhinav Kumar ' 'and Federico Rinaudi and Reza Tourani and Alessio ' 'Sacco and Flavio Esposito},\n' ' year = {2025},\n' ' journal = {IEEE/IFIP International Conference on ' 'Dependable Systems and Networks (DSN)},\n' ' url = ' '{https://ieeexplore.ieee.org/abstract/document/11068816}\n' '}', 'created': '2025-07-19 20:42:04.617000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://ieeexplore.ieee.org/abstract/document/11068816', 'modified': '2025-07-19 20:42:04.617000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Privacy Analysis of Oblivious DNS over HTTPS: a ' 'Website Fingerprinting Study', 'uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f', 'venue': 'IEEE/IFIP International Conference on Dependable ' 'Systems and Networks (DSN)', 'year': '2025'}, {'authors': [{'author_name': 'Anestis Dalgkitsis', 'display_name': 'Anestis Dalgkitsis', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': '74f5a371-b19a-4520-9b10-5f3f3c998a4a'}, {'author_name': 'Jose E. Zerna Torres', 'display_name': 'Jose E. Zerna Torres', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': 'c6f3a77d-8c1b-478a-9b48-0b02265383ed'}, {'author_name': 'Angelos Dimoglis', 'display_name': 'Angelos Dimoglis', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': 'b234cc8b-e8f2-41fa-9124-9943da7c9755'}, {'author_name': 'Marios Avgeris', 'display_name': 'Marios Avgeris', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': '0eb030bc-80a5-4acb-9db6-28fc841099a4'}, {'author_name': 'Chrysa Papagianni', 'display_name': 'Chrysa Papagianni', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': 'bcd0d75a-6aaf-4d05-b0dd-b3dbbaed3008'}, {'author_name': 'Paola Grosso', 'display_name': 'Paola Grosso', 'fabric_uuid': None, 'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'uuid': '2a6a3bcf-c6a7-4657-968e-c535e75543e0'}], 'bibtex': '@article{dalgkitsis2025,\n' ' title = {Programmable & Trustworthy Data Paths for ' 'Sovereign Network Services},\n' ' author = {Anestis Dalgkitsis and Jose E. Zerna ' 'Torres and Angelos Dimoglis and Marios Avgeris and ' 'Chrysa Papagianni and Paola Grosso},\n' ' year = {2025},\n' ' journal = {25th Anniversary International ' 'Conference on Transparent Optical Networks (ICTON)},\n' ' url = ' '{https://ieeexplore.ieee.org/abstract/document/11125298}\n' '}', 'created': '2025-11-07 21:48:18.468000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://ieeexplore.ieee.org/abstract/document/11125298', 'modified': '2025-11-07 21:48:18.468000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Programmable & Trustworthy Data Paths for Sovereign ' 'Network Services', 'uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d', 'venue': '25th Anniversary International Conference on ' 'Transparent Optical Networks (ICTON)', 'year': '2025'}, {'authors': [{'author_name': 'Elie Kfoury', 'display_name': 'Elie Kfoury', 'fabric_uuid': None, 'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'uuid': 'cd794ca3-c253-4874-91a5-f401182a7bef'}, {'author_name': 'Ali Mazloum', 'display_name': 'Ali Mazloum', 'fabric_uuid': None, 'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'uuid': 'b07d7297-e35f-4d9a-b348-aca62729d614'}, {'author_name': 'Jose Gomez', 'display_name': 'Jose Gomez', 'fabric_uuid': None, 'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'uuid': '2ca18c9c-22be-49f0-86a4-c2d00e489fca'}, {'author_name': 'Ali AlSabeh', 'display_name': 'Ali AlSabeh', 'fabric_uuid': None, 'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'uuid': '71682561-94bc-43d4-a4f7-616196b1238c'}, {'author_name': 'Jorge Crichigno', 'display_name': 'Jorge Crichigno', 'fabric_uuid': None, 'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'uuid': '004ef6e1-d54d-4931-8e9a-58a4d696f029'}], 'bibtex': '@article{kfoury2025,\n' ' title = {Real-Time Flow Statistics Collection using ' 'RDMA and P4 Programmable Data Planes},\n' ' author = {Elie Kfoury and Ali Mazloum and Jose ' 'Gomez and Ali AlSabeh and Jorge Crichigno},\n' ' year = {2025},\n' ' journal = {IEEE International Conference on ' 'Communications (ICC): Next-Generation Networking and ' 'Internet Symposium},\n' ' url = ' '{https://research.cec.sc.edu/files/documents/m94115-kfoury%20final.pdf}\n' '}', 'created': '2025-04-27 13:43:23.073000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://research.cec.sc.edu/files/documents/m94115-kfoury%20final.pdf', 'modified': '2025-04-27 13:43:23.073000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Real-Time Flow Statistics Collection using RDMA and P4 ' 'Programmable Data Planes', 'uuid': 'c0e91d2a-64cc-4250-aef9-872712768041', 'venue': 'IEEE International Conference on Communications (ICC): ' 'Next-Generation Networking and Internet Symposium', 'year': '2025'}, {'authors': [{'author_name': 'Motahare Mounesan', 'display_name': 'Motahare Mounesan', 'fabric_uuid': None, 'publication_uuid': '01f6113e-b51a-4975-a2bf-44795fad4f8d', 'uuid': 'cc1e5e55-1234-4a7d-9399-ab3d221aece2'}], 'bibtex': '@article{mounesan2025,\n' ' title = {Reinforcement Learning Based Resource ' 'Management in Edge Systems},\n' ' author = {Motahare Mounesan},\n' ' year = {2025},\n' ' journal = {Dissertation, The City University of New ' 'York},\n' ' url = ' '{https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=7602&context=gc_etds}\n' '}', 'created': '2025-11-07 22:03:36.460000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=7602&context=gc_etds', 'modified': '2025-11-07 22:03:36.461000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Reinforcement Learning Based Resource Management in ' 'Edge Systems', 'uuid': '01f6113e-b51a-4975-a2bf-44795fad4f8d', 'venue': 'Dissertation, The City University of New York', 'year': '2025'}, {'authors': [{'author_name': 'Xi Wang', 'display_name': 'Xi Wang', 'fabric_uuid': None, 'publication_uuid': '30145e8d-c93f-4e45-a027-8ada2471cf3e', 'uuid': '3873603e-2429-4154-96b7-fc21f20d4bbd'}], 'bibtex': '@article{wang2025,\n' ' title = {Replication Algorithms and Optimization ' 'Techniques for Decentralized Storage Systems},\n' ' author = {Xi Wang},\n' ' year = {2025},\n' ' journal = {Tennessee Technological University\u2009' 'ProQuest Dissertations & Theses}\n' '}', 'created': '2025-06-02 14:01:04.792000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': None, 'modified': '2025-06-02 14:01:04.792000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Replication Algorithms and Optimization Techniques for ' 'Decentralized Storage Systems', 'uuid': '30145e8d-c93f-4e45-a027-8ada2471cf3e', 'venue': 'Tennessee Technological University\u2009ProQuest ' 'Dissertations & Theses', 'year': '2025'}, {'authors': [{'author_name': 'Yang-Zhe Lin', 'display_name': 'Yang-Zhe Lin', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': '9f56811d-ab2f-4a2c-8a0b-fbc6e2f45be6'}, {'author_name': 'Chun-Ting Lin', 'display_name': 'Chun-Ting Lin', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': 'd7ed1296-50f8-474e-a24d-9d0adb51bd5c'}, {'author_name': 'Po-Yi Lin', 'display_name': 'Po-Yi Lin', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': '46d0ca96-cffb-4e62-b6c5-66c726ac48e5'}, {'author_name': 'Shixiong Qi', 'display_name': 'Shixiong Qi', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': 'fa35c4de-0e8d-4588-9ca2-f8781094ac7c'}, {'author_name': 'Jyh-Cheng Chen', 'display_name': 'Jyh-Cheng Chen', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': '77a958f8-3493-423d-bfa1-6984b4bcc674'}, {'author_name': 'K. K. Ramakrishnan', 'display_name': 'K. K. Ramakrishnan', 'fabric_uuid': None, 'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'uuid': '490b85e0-24c3-4898-a6fd-0a07b65bfd3d'}], 'bibtex': '@article{lin2025,\n' ' title = {Rethinking 5G Core for Performance, ' 'Fairness, and Flexibility},\n' ' author = {Yang-Zhe Lin and Chun-Ting Lin and Po-Yi ' 'Lin and Shixiong Qi and Jyh-Cheng Chen and K. K. ' 'Ramakrishnan},\n' ' year = {2025},\n' ' journal = {The 1st free5GC World Forum 2025},\n' ' url = ' '{https://shixiongqi.uky.edu/sites/default/files/2025-08/free5gc25-11_0.pdf}\n' '}', 'created': '2025-11-07 21:55:26.591000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://shixiongqi.uky.edu/sites/default/files/2025-08/free5gc25-11_0.pdf', 'modified': '2025-11-07 21:55:26.591000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Rethinking 5G Core for Performance, Fairness, and ' 'Flexibility', 'uuid': '51fb165e-463a-46f7-9760-62d46778c343', 'venue': 'The 1st free5GC World Forum 2025', 'year': '2025'}, {'authors': [{'author_name': 'Zhifan Lu', 'display_name': 'Zhifan Lu', 'fabric_uuid': None, 'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84', 'uuid': '33a866e9-1d87-4b53-8d5f-c7ba1b282eb0'}, {'author_name': 'Siyang Sun', 'display_name': 'Siyang Sun', 'fabric_uuid': None, 'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84', 'uuid': 'b4ebc40a-1077-4a1e-bbd3-f8dc36dfd74e'}, {'author_name': 'Yixin Sun', 'display_name': 'Yixin Sun', 'fabric_uuid': None, 'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84', 'uuid': 'da4aab66-e04c-4384-acaf-e877e721daab'}], 'bibtex': '@article{lu2025,\n' ' title = {RPKI-Based Location-Unaware Tor Guard ' 'Relay Selection Algorithms},\n' ' author = {Zhifan Lu and Siyang Sun and Yixin Sun},\n' ' year = {2025},\n' ' journal = {arXiv:2501.06010},\n' ' url = {https://arxiv.org/abs/2501.06010}\n' '}', 'created': '2025-02-03 15:17:31.220000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://arxiv.org/abs/2501.06010', 'modified': '2025-02-03 15:17:31.220000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'RPKI-Based Location-Unaware Tor Guard Relay Selection ' 'Algorithms', 'uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84', 'venue': 'arXiv:2501.06010', 'year': '2025'}, {'authors': [{'author_name': 'Inder Monga', 'display_name': 'Inder Monga', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': '025873e8-d198-4026-980f-745702b1f56a'}, {'author_name': 'Mazahir Hussain', 'display_name': 'Mazahir Hussain', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': 'cfb2fc2b-94f4-4ead-abd3-8da1613bcc53'}, {'author_name': 'Justas Balcas', 'display_name': 'Justas Balcas', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': '57293f3d-278b-43e7-a190-c0cc170cc24f'}, {'author_name': 'Aashay Arora', 'display_name': 'Aashay Arora', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': '66fc65de-d4d6-4951-8405-d6acb3d5e967'}, {'author_name': 'Diego Davila', 'display_name': 'Diego Davila', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': '8edba79a-c3f4-4e24-9b16-1fa792d4b7b4'}, {'author_name': 'Buseung Cho', 'display_name': 'Buseung Cho', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': 'e2121ec3-4eef-4e69-a5ef-032b13630ad5'}, {'author_name': 'Xi Yang', 'display_name': 'Xi Yang', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': '7ebc0ba7-4c76-44b2-a000-d1d372e05a90'}, {'author_name': 'Cees De Laat', 'display_name': 'Cees De Laat', 'fabric_uuid': None, 'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'uuid': 'bcb41ab6-9457-4c9e-9dd5-114775fbcf61'}], 'bibtex': '@article{monga2025,\n' ' title = {SENSE in Practice: Quantifying the ' 'End-to-End Benefits of Intent-Based Bandwidth ' 'Reservation for Exascale Science Workflows},\n' ' author = {Inder Monga and Mazahir Hussain and ' 'Justas Balcas and Aashay Arora and Diego Davila and ' 'Buseung Cho and Xi Yang and Cees De Laat},\n' ' year = {2025},\n' " journal = {SC Workshops '25: Proceedings of the SC " "'25 Workshops of the International Conference for " 'High Performance Computing, Networking, Storage and ' 'Analysis},\n' ' url = ' '{https://dl.acm.org/doi/full/10.1145/3731599.3767454}\n' '}', 'created': '2025-11-26 03:33:38.348000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://dl.acm.org/doi/full/10.1145/3731599.3767454', 'modified': '2025-11-26 03:33:38.348000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'SENSE in Practice: Quantifying the End-to-End Benefits ' 'of Intent-Based Bandwidth Reservation for Exascale ' 'Science Workflows', 'uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425', 'venue': "SC Workshops '25: Proceedings of the SC '25 Workshops " 'of the International Conference for High Performance ' 'Computing, Networking, Storage and Analysis', 'year': '2025'}, {'authors': [{'author_name': 'Fatih Berkay Sarpkaya', 'display_name': 'Fatih Berkay Sarpkaya', 'fabric_uuid': None, 'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea', 'uuid': 'db51073e-0392-4a9c-be89-09986b9100ab'}, {'author_name': 'Fraida Fund', 'display_name': 'Fraida Fund', 'fabric_uuid': None, 'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea', 'uuid': 'ba89d3b5-39d1-49c5-be0f-a848c2efe3e2'}, {'author_name': 'Shivendra Panwar', 'display_name': 'Shivendra Panwar', 'fabric_uuid': None, 'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea', 'uuid': 'cb051e81-1a49-41b8-bc0a-534349bbce9b'}], 'bibtex': '@article{sarpkaya2025,\n' ' title = {To Adopt or Not to Adopt L4S-compatible ' 'Congestion Control? Understanding Performance in a ' 'Partial L4S Deployment},\n' ' author = {Fatih Berkay Sarpkaya and Fraida Fund and ' 'Shivendra Panwar},\n' ' year = {2025},\n' ' journal = {arXiv:2411.10952},\n' ' url = {https://arxiv.org/abs/2411.10952}\n' '}', 'created': '2024-12-09 15:18:07.157000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://arxiv.org/abs/2411.10952', 'modified': '2025-01-30 20:30:54.651000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'To Adopt or Not to Adopt L4S-compatible Congestion ' 'Control? Understanding Performance in a Partial L4S ' 'Deployment', 'uuid': '94a1df32-17b6-40dc-bb94-010329a751ea', 'venue': 'arXiv:2411.10952', 'year': '2025'}, {'authors': [{'author_name': 'Flavio Castro', 'display_name': 'Flavio Castro', 'fabric_uuid': None, 'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'uuid': '25488224-2826-46c4-b03b-5dca940a75f5'}, {'author_name': 'Weijian Zheng', 'display_name': 'Weijian Zheng', 'fabric_uuid': None, 'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'uuid': 'cdec2cdc-2a36-400c-8e46-48724176adea'}, {'author_name': 'Joaquin Chung', 'display_name': 'Joaquin Chung', 'fabric_uuid': None, 'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'uuid': 'dbce0b24-0fcf-47f9-81df-3ec09101bb45'}, {'author_name': 'Ian Foster', 'display_name': 'Ian Foster', 'fabric_uuid': None, 'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'uuid': 'dc860e70-dc77-4f60-8760-3919602508b4'}, {'author_name': 'Raj Kettimuthu', 'display_name': 'Raj Kettimuthu', 'fabric_uuid': None, 'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'uuid': 'ee7b5c52-66e3-4ddb-a148-fc91e744d62f'}], 'bibtex': '@article{castro2025,\n' ' title = {To Stream or Not to Stream: Towards A ' 'Quantitative Model for Remote HPC Processing ' 'Decisions},\n' ' author = {Flavio Castro and Weijian Zheng and ' 'Joaquin Chung and Ian Foster and Raj Kettimuthu},\n' ' year = {2025},\n' " journal = {SC Workshops '25: Proceedings of the SC " "'25 Workshops of the International Conference for " 'High Performance Computing, Networking, Storage and ' 'Analysis},\n' ' url = ' '{https://dl.acm.org/doi/10.1145/3731599.3767455}\n' '}', 'created': '2025-11-26 02:44:46.684000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://dl.acm.org/doi/10.1145/3731599.3767455', 'modified': '2025-11-26 02:44:46.684000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'To Stream or Not to Stream: Towards A Quantitative ' 'Model for Remote HPC Processing Decisions', 'uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748', 'venue': "SC Workshops '25: Proceedings of the SC '25 Workshops " 'of the International Conference for High Performance ' 'Computing, Networking, Storage and Analysis', 'year': '2025'}, {'authors': [{'author_name': 'Mami Hayashida', 'display_name': 'Mami Hayashida', 'fabric_uuid': None, 'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'uuid': '94856cac-30d1-4bd4-b68d-d1fc247245b2'}, {'author_name': 'Joshna', 'display_name': 'Joshna', 'fabric_uuid': None, 'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'uuid': '1ab10487-77cc-4ab6-92d4-b8fe20442a7a'}, {'author_name': 'Kurra', 'display_name': 'Kurra', 'fabric_uuid': None, 'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'uuid': '572b9083-62ad-4ef3-8dcc-be3e593a2d4d'}, {'author_name': 'Zongming Fei', 'display_name': 'Zongming Fei', 'fabric_uuid': None, 'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'uuid': '0f0ce2ae-af2c-4197-b4c0-2965ed8c5aee'}, {'author_name': 'James Griffioen', 'display_name': 'James Griffioen', 'fabric_uuid': None, 'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'uuid': '73701099-b370-4095-a07c-11e1b1e49784'}], 'bibtex': '@article{hayashida2025,\n' ' title = {Toward Generating Experiment-Specific ' 'Notebooks in FABRIC},\n' ' author = {Mami Hayashida and Joshna and Kurra and ' 'Zongming Fei and James Griffioen},\n' ' year = {2025},\n' ' journal = {Improving Scientific Software Conference ' 'Proceedings},\n' ' url = {https://zenodo.org/records/16921063}\n' '}', 'created': '2025-10-27 19:14:02.556000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://zenodo.org/records/16921063', 'modified': '2025-10-27 19:14:02.556000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'Toward Generating Experiment-Specific Notebooks in ' 'FABRIC', 'uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2', 'venue': 'Improving Scientific Software Conference Proceedings', 'year': '2025'}, {'authors': [{'author_name': 'Rodrigo Moreira', 'display_name': 'Rodrigo Moreira', 'fabric_uuid': None, 'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa', 'uuid': 'e5dc4675-6f47-43b7-a63d-debf1de1428a'}, {'author_name': 'Larissa Ferreira Rodrigues Moreira', 'display_name': 'Larissa Ferreira Rodrigues Moreira', 'fabric_uuid': None, 'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa', 'uuid': '53ac9150-12b1-44b4-ba07-7c3eb5acdf25'}, {'author_name': 'Flávio de Oliveira Silva', 'display_name': 'Flávio de Oliveira Silva', 'fabric_uuid': None, 'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa', 'uuid': '11cd4ad3-9562-4842-a19f-31b8ea5bd40a'}], 'bibtex': '@article{moreira2025,\n' ' title = {Unleashing AI-Empowered Slices on Mobile ' 'Networks for Natively Cognitive Service Delivery},\n' ' author = {Rodrigo Moreira and Larissa Ferreira ' 'Rodrigues Moreira and Flávio de Oliveira Silva},\n' ' year = {2025},\n' ' journal = {IEEE Access},\n' ' url = ' '{https://ieeexplore.ieee.org/document/11126031}\n' '}', 'created': '2025-11-07 21:49:31.371000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://ieeexplore.ieee.org/document/11126031', 'modified': '2025-12-03 18:43:59.055000+00:00', 'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b', 'project_name': 'Agentic GPU-Accelerated 5G/6G RAN Controller on ' 'FABRIC', 'project_uuid': '47556e8d-33f2-4482-b0b3-30f17ecb271b', 'title': 'Unleashing AI-Empowered Slices on Mobile Networks for ' 'Natively Cognitive Service Delivery', 'uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa', 'venue': 'IEEE Access', 'year': '2025'}, {'authors': [{'author_name': 'Alexander Wolosewicz', 'display_name': 'Alexander Wolosewicz', 'fabric_uuid': None, 'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628', 'uuid': 'b86fec43-fe4f-46f3-bdb6-8abd480bb6be'}, {'author_name': 'Vinod Yegneswaran', 'display_name': 'Vinod Yegneswaran', 'fabric_uuid': None, 'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628', 'uuid': '14d19d37-8dbf-4400-9627-b4d6b578b93b'}, {'author_name': 'Ashish Gehani', 'display_name': 'Ashish Gehani', 'fabric_uuid': None, 'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628', 'uuid': '6d741fd8-91c6-4beb-8b22-bcd8cd2c26a0'}, {'author_name': 'Nik Sultana', 'display_name': 'Nik Sultana', 'fabric_uuid': None, 'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628', 'uuid': '17931169-ca87-4277-9c2e-bde0d7dc5c39'}], 'bibtex': '@article{wolosewicz2025,\n' ' title = {User Study of a Network Debugger on ' 'FABRIC},\n' ' author = {Alexander Wolosewicz and Vinod ' 'Yegneswaran and Ashish Gehani and Nik Sultana},\n' ' year = {2025},\n' ' journal = {Cyber Security Experimentation and Test ' 'Workshop},\n' ' url = ' '{https://www.csl.sri.com/users/gehani/papers/CSET-2025.Crinkle.pdf}\n' '}', 'created': '2025-12-01 18:12:14.831000+00:00', 'created_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'link': 'https://www.csl.sri.com/users/gehani/papers/CSET-2025.Crinkle.pdf', 'modified': '2025-12-01 18:12:14.831000+00:00', 'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691', 'project_name': None, 'project_uuid': None, 'title': 'User Study of a Network Debugger on FABRIC', 'uuid': '78a1a029-c519-4b86-a821-b4e09d52e628', 'venue': 'Cyber Security Experimentation and Test Workshop', 'year': '2025'}]}
api_user:
{'access_expires': '2024-10-07 00:08:16.356000+00:00', 'access_type': 'cookie', 'affiliation': 'None', 'can_create_publication': False, 'cilogon_id': 'None', 'email': 'None', 'fabric_roles': [], 'is_authenticated': False, 'is_publication_tracker_admin': False, 'name': 'Anonymous API User', 'projects': [], 'uuid': '00000000-0000-0000-0000-000000000000'}