publications:
{'count': 104,
'next': 'https://publications.fabric-testbed.net/publications/?page=4',
'previous': 'https://publications.fabric-testbed.net/publications/?page=2',
'results': [{'authors': [{'author_name': 'Alexander Wolosewicz',
'display_name': 'Alexander Wolosewicz',
'fabric_uuid': None,
'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20',
'uuid': 'baecd6cb-d7b0-4886-9512-68a457f8d3bd'},
{'author_name': 'Vinod Yegneswaran',
'display_name': 'Vinod Yegneswaran',
'fabric_uuid': None,
'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20',
'uuid': '22a905ab-d0ce-46ec-9f26-8572d608e840'},
{'author_name': 'Ashish Gehani',
'display_name': 'Ashish Gehani',
'fabric_uuid': None,
'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20',
'uuid': 'ab1fe63c-db32-46b8-b214-71a466ea4f72'},
{'author_name': 'Nik Sultana',
'display_name': 'Nik Sultana',
'fabric_uuid': None,
'publication_uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20',
'uuid': '73d67a55-d0ab-4e31-996d-e2e07f32a3d2'}],
'bibtex': '@article{wolosewicz2025,\n'
' title = {Network Replay and Consistency Across '
'Testbeds},\n'
' author = {Alexander Wolosewicz and Vinod '
'Yegneswaran and Ashish Gehani and Nik Sultana},\n'
' year = {2025},\n'
' journal = {12th Annual International Workshop on '
'Innovating the Network for Data-Intensive Science '
'(INDIS)},\n'
' url = '
'{https://www.csl.sri.com/users/gehani/papers/INDIS-2025.Choir.pdf}\n'
'}',
'created': '2025-11-07 21:58:16.626000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://www.csl.sri.com/users/gehani/papers/INDIS-2025.Choir.pdf',
'modified': '2025-11-07 21:58:16.626000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Network Replay and Consistency Across Testbeds',
'uuid': 'c41de0e0-94c3-4cbb-ad53-cd04099a9d20',
'venue': '12th Annual International Workshop on Innovating the '
'Network for Data-Intensive Science (INDIS)',
'year': '2025'},
{'authors': [{'author_name': 'da Silva B. M.',
'display_name': 'da Silva B. M.',
'fabric_uuid': None,
'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad',
'uuid': '8d045cc5-cb3b-4d10-a071-0a7b0cbbb649'},
{'author_name': 'Moreira L. F. R.',
'display_name': 'Moreira L. F. R.',
'fabric_uuid': None,
'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad',
'uuid': '37c41b9b-acf4-4bc4-895a-bb107880c8d5'},
{'author_name': 'de Oliveira Silva F.',
'display_name': 'de Oliveira Silva F.',
'fabric_uuid': None,
'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad',
'uuid': 'cd8683bd-d2d4-426d-87d4-042ff3fc5bfc'},
{'author_name': 'Moreira R.',
'display_name': 'Moreira R.',
'fabric_uuid': None,
'publication_uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad',
'uuid': '057a2ecc-a8ee-4fd9-90f0-d38680c1024f'}],
'bibtex': '@article{m.2025,\n'
' title = {Optimizing Edge Gaming Slices through an '
'Enhanced User Plane Function and Analytics in Beyond '
'5G Networks},\n'
' author = {da Silva B. M. and Moreira L. F. R. and '
'de Oliveira Silva F. and Moreira R.},\n'
' year = {2025},\n'
' journal = {arXiv:2507.17843}\n'
'}',
'created': '2025-12-03 18:33:11.117000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': None,
'modified': '2025-12-03 18:33:33.233000+00:00',
'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'project_name': 'Agentic GPU-Accelerated 5G/6G RAN Controller on '
'FABRIC',
'project_uuid': '47556e8d-33f2-4482-b0b3-30f17ecb271b',
'title': 'Optimizing Edge Gaming Slices through an Enhanced User '
'Plane Function and Analytics in Beyond 5G Networks',
'uuid': '44d53e84-324f-4136-a6a5-b3e1924580ad',
'venue': 'arXiv:2507.17843',
'year': '2025'},
{'authors': [{'author_name': 'Ajay Kumar',
'display_name': 'Ajay Kumar',
'fabric_uuid': None,
'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc',
'uuid': 'db0ed4e3-830a-4e43-8a5f-ebf5b7489d16'},
{'author_name': 'Praveen Rao',
'display_name': 'Praveen Rao',
'fabric_uuid': None,
'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc',
'uuid': 'bbf03a7a-4dbe-45ce-b431-7f1cb14b64dc'},
{'author_name': 'Peter Sanders',
'display_name': 'Peter Sanders',
'fabric_uuid': None,
'publication_uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc',
'uuid': '0a706951-4f36-4147-b206-44b3d6b51dcc'}],
'bibtex': '@article{kumar2025,\n'
' title = {Optimizing the Variant Calling Pipeline '
'Execution on Human Genomes Using GPU-Enabled '
'Machines},\n'
' author = {Ajay Kumar and Praveen Rao and Peter '
'Sanders},\n'
' year = {2025},\n'
' journal = {arXiv:2509.09058},\n'
' url = {https://arxiv.org/pdf/2509.09058}\n'
'}',
'created': '2025-11-07 21:52:55.778000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://arxiv.org/pdf/2509.09058',
'modified': '2025-11-07 21:52:55.778000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Optimizing the Variant Calling Pipeline Execution on '
'Human Genomes Using GPU-Enabled Machines',
'uuid': 'a4f9e6d2-d9ad-4950-b1fd-b570824ff8dc',
'venue': 'arXiv:2509.09058',
'year': '2025'},
{'authors': [{'author_name': 'Grigoryan',
'display_name': 'Grigoryan',
'fabric_uuid': None,
'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710',
'uuid': '5a72ccc3-9faa-4342-acfc-a44e3781ac48'},
{'author_name': 'Garegin',
'display_name': 'Garegin',
'fabric_uuid': None,
'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710',
'uuid': 'd0ad29f9-ac29-4f02-b948-3359bbcd52b2'},
{'author_name': 'Kevin Penkowski',
'display_name': 'Kevin Penkowski',
'fabric_uuid': None,
'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710',
'uuid': 'b2fbcc6e-a1e1-400a-91e6-0d7059cc2e17'},
{'author_name': 'Minseok Kwon',
'display_name': 'Minseok Kwon',
'fabric_uuid': None,
'publication_uuid': '54876276-8c6b-47c7-8206-af3102769710',
'uuid': 'c054d875-da13-4cf4-a7bb-9ee7d6cca4a0'}],
'bibtex': '@article{grigoryan2025,\n'
' title = {P4Kube: In-Network Load Balancer for '
'Kubernetes},\n'
' author = {Grigoryan and Garegin and Kevin Penkowski '
'and Minseok Kwon},\n'
' year = {2025},\n'
' journal = {2025 IEEE 22nd Consumer Communications & '
'Networking Conference (CCNC)},\n'
' url = '
'{https://xplorestaging.ieee.org/document/10976037}\n'
'}',
'created': '2025-06-13 14:38:12.167000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://xplorestaging.ieee.org/document/10976037',
'modified': '2025-06-13 14:38:12.167000+00:00',
'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'project_name': 'MyResearch',
'project_uuid': '5f00e1ce-d082-4a2b-b08f-889658e932b7',
'title': 'P4Kube: In-Network Load Balancer for Kubernetes',
'uuid': '54876276-8c6b-47c7-8206-af3102769710',
'venue': '2025 IEEE 22nd Consumer Communications & Networking '
'Conference (CCNC)',
'year': '2025'},
{'authors': [{'author_name': 'Nishanth Shyamkumar',
'display_name': 'Nishanth Shyamkumar',
'fabric_uuid': None,
'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'uuid': '6e05a2d4-644f-43f4-8199-e49a0b27c727'},
{'author_name': 'Bjoern Sagstad',
'display_name': 'Bjoern Sagstad',
'fabric_uuid': None,
'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'uuid': 'c73cc2ac-b963-4fb2-a08d-61cd93f62a68'},
{'author_name': 'Prajwal Somendyapanahalli',
'display_name': 'Prajwal Somendyapanahalli',
'fabric_uuid': None,
'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'uuid': 'f1e64911-cb40-4f0f-86cc-290765940d48'},
{'author_name': 'Venkateshmurthy',
'display_name': 'Venkateshmurthy',
'fabric_uuid': None,
'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'uuid': 'ffb575d3-673b-415d-9b90-099038043c76'},
{'author_name': 'Sean Cummings',
'display_name': 'Sean Cummings',
'fabric_uuid': None,
'publication_uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'uuid': '7d3803e8-72cb-46ca-bc86-67213f0c6038'}],
'bibtex': '@article{shyamkumar2025,\n'
' title = {Patchwork: A Traffic Capture and Analysis '
'Platform for Network Experiments on a Federated '
'Testbed},\n'
' author = {Nishanth Shyamkumar and Bjoern Sagstad '
'and Prajwal Somendyapanahalli and Venkateshmurthy and '
'Sean Cummings},\n'
' year = {2025},\n'
' journal = {Internet Measurement Conference},\n'
' url = '
'{https://packetfilters.cs.iit.edu/patchwork/patchwork.pdf}\n'
'}',
'created': '2025-11-07 22:00:49.028000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://packetfilters.cs.iit.edu/patchwork/patchwork.pdf',
'modified': '2025-11-07 22:00:49.028000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Patchwork: A Traffic Capture and Analysis Platform for '
'Network Experiments on a Federated Testbed',
'uuid': 'e64374e0-504c-4b86-883a-757c1a28d68c',
'venue': 'Internet Measurement Conference',
'year': '2025'},
{'authors': [{'author_name': 'Baptiste Jonglez',
'display_name': 'Baptiste Jonglez',
'fabric_uuid': None,
'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555',
'uuid': '1e647b8e-8b49-4fbc-b373-2be3166ead4f'},
{'author_name': 'Matthieu Simonin',
'display_name': 'Matthieu Simonin',
'fabric_uuid': None,
'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555',
'uuid': '628fa4a5-28e2-416f-a601-1dbcb75e36b7'},
{'author_name': 'Jolan Philippe',
'display_name': 'Jolan Philippe',
'fabric_uuid': None,
'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555',
'uuid': 'e081b5a9-9890-4abc-a828-49f1521179fe'},
{'author_name': 'Sidi Mohammed Kaddour',
'display_name': 'Sidi Mohammed Kaddour',
'fabric_uuid': None,
'publication_uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555',
'uuid': '1d134608-40db-4284-90a5-1bbcb3d862da'}],
'bibtex': '@article{jonglez2025,\n'
' title = {Performance Evaluation and Threat '
'Mitigation in Large-scale 5G Core Deployment},\n'
' author = {Baptiste Jonglez and Matthieu Simonin and '
'Jolan Philippe and Sidi Mohammed Kaddour},\n'
' year = {2025},\n'
' journal = {Workshop de Pesquisa Experimental da '
'Internet do Futuro (WPEIF)}\n'
'}',
'created': '2025-06-02 13:58:26.764000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': None,
'modified': '2025-06-02 13:58:26.764000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Performance Evaluation and Threat Mitigation in '
'Large-scale 5G Core Deployment',
'uuid': '0f782f94-d9b8-43ca-ad9d-d4943ea5e555',
'venue': 'Workshop de Pesquisa Experimental da Internet do '
'Futuro (WPEIF)',
'year': '2025'},
{'authors': [{'author_name': 'Sergio Elizalde',
'display_name': 'Sergio Elizalde',
'fabric_uuid': None,
'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'uuid': '6c73b232-0059-4c6e-8f0f-b9ae25c56762'},
{'author_name': 'Ali Mazloum',
'display_name': 'Ali Mazloum',
'fabric_uuid': None,
'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'uuid': '44536c66-d4fa-4622-929e-c3e625e1d68c'},
{'author_name': 'Samia Choueiri',
'display_name': 'Samia Choueiri',
'fabric_uuid': None,
'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'uuid': 'ea3342b9-a5b5-447c-986c-0338d3ae8964'},
{'author_name': 'Elie Kfoury',
'display_name': 'Elie Kfoury',
'fabric_uuid': None,
'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'uuid': '25e14a61-c2b0-422f-94f2-daf8f2467669'},
{'author_name': 'Jorge Crichigno',
'display_name': 'Jorge Crichigno',
'fabric_uuid': None,
'publication_uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'uuid': '67de9f64-c05e-48dc-bfa5-bbfff8fbf3ba'}],
'bibtex': '@article{elizalde2025,\n'
' title = {Performance Evaluation of Stateless '
'Firewalling: Host-Based, SmartNIC, and P4 Switch},\n'
' author = {Sergio Elizalde and Ali Mazloum and Samia '
'Choueiri and Elie Kfoury and Jorge Crichigno},\n'
' year = {2025},\n'
' journal = {4th IEEE/IFIP International Intelligence '
'Provisioning for Network and Service Management in '
'Softwarized Networks (NOMS_IPSN 2025)},\n'
' url = '
'{https://research.cec.sc.edu/files/documents/Stateless_Firewalling_NOMS_workshop.pdf}\n'
'}',
'created': '2025-04-27 13:36:05.041000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://research.cec.sc.edu/files/documents/Stateless_Firewalling_NOMS_workshop.pdf',
'modified': '2025-04-27 13:36:05.041000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Performance Evaluation of Stateless Firewalling: '
'Host-Based, SmartNIC, and P4 Switch',
'uuid': '69a1d743-0a08-43c7-bc8f-7836b7ec60dc',
'venue': '4th IEEE/IFIP International Intelligence Provisioning '
'for Network and Service Management in Softwarized '
'Networks (NOMS_IPSN 2025)',
'year': '2025'},
{'authors': [{'author_name': 'Mohammad Amir Salari',
'display_name': 'Mohammad Amir Salari',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': '206185ec-fb5d-4089-ad5d-d4947ad15c4a'},
{'author_name': 'Abhinav Kumar',
'display_name': 'Abhinav Kumar',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': '82b6042c-da45-4e43-8ac0-2711799503c8'},
{'author_name': 'Federico Rinaudi',
'display_name': 'Federico Rinaudi',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': 'f77ea727-b389-4444-b1d2-120902d02ea0'},
{'author_name': 'Reza Tourani',
'display_name': 'Reza Tourani',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': 'fd4d913f-3eee-4b72-acbe-f4ec4d60cac4'},
{'author_name': 'Alessio Sacco',
'display_name': 'Alessio Sacco',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': '918ae114-1b56-4cba-ae77-9743c8974310'},
{'author_name': 'Flavio Esposito',
'display_name': 'Flavio Esposito',
'fabric_uuid': None,
'publication_uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'uuid': 'd5e54e7a-85ad-45b6-8f52-37bbe59f8041'}],
'bibtex': '@article{salari2025,\n'
' title = {Privacy Analysis of Oblivious DNS over '
'HTTPS: a Website Fingerprinting Study},\n'
' author = {Mohammad Amir Salari and Abhinav Kumar '
'and Federico Rinaudi and Reza Tourani and Alessio '
'Sacco and Flavio Esposito},\n'
' year = {2025},\n'
' journal = {IEEE/IFIP International Conference on '
'Dependable Systems and Networks (DSN)},\n'
' url = '
'{https://ieeexplore.ieee.org/abstract/document/11068816}\n'
'}',
'created': '2025-07-19 20:42:04.617000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://ieeexplore.ieee.org/abstract/document/11068816',
'modified': '2025-07-19 20:42:04.617000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Privacy Analysis of Oblivious DNS over HTTPS: a '
'Website Fingerprinting Study',
'uuid': '6ec697f8-e7f6-4c8b-81f4-91481e22c35f',
'venue': 'IEEE/IFIP International Conference on Dependable '
'Systems and Networks (DSN)',
'year': '2025'},
{'authors': [{'author_name': 'Anestis Dalgkitsis',
'display_name': 'Anestis Dalgkitsis',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': '74f5a371-b19a-4520-9b10-5f3f3c998a4a'},
{'author_name': 'Jose E. Zerna Torres',
'display_name': 'Jose E. Zerna Torres',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': 'c6f3a77d-8c1b-478a-9b48-0b02265383ed'},
{'author_name': 'Angelos Dimoglis',
'display_name': 'Angelos Dimoglis',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': 'b234cc8b-e8f2-41fa-9124-9943da7c9755'},
{'author_name': 'Marios Avgeris',
'display_name': 'Marios Avgeris',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': '0eb030bc-80a5-4acb-9db6-28fc841099a4'},
{'author_name': 'Chrysa Papagianni',
'display_name': 'Chrysa Papagianni',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': 'bcd0d75a-6aaf-4d05-b0dd-b3dbbaed3008'},
{'author_name': 'Paola Grosso',
'display_name': 'Paola Grosso',
'fabric_uuid': None,
'publication_uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'uuid': '2a6a3bcf-c6a7-4657-968e-c535e75543e0'}],
'bibtex': '@article{dalgkitsis2025,\n'
' title = {Programmable & Trustworthy Data Paths for '
'Sovereign Network Services},\n'
' author = {Anestis Dalgkitsis and Jose E. Zerna '
'Torres and Angelos Dimoglis and Marios Avgeris and '
'Chrysa Papagianni and Paola Grosso},\n'
' year = {2025},\n'
' journal = {25th Anniversary International '
'Conference on Transparent Optical Networks (ICTON)},\n'
' url = '
'{https://ieeexplore.ieee.org/abstract/document/11125298}\n'
'}',
'created': '2025-11-07 21:48:18.468000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://ieeexplore.ieee.org/abstract/document/11125298',
'modified': '2025-11-07 21:48:18.468000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Programmable & Trustworthy Data Paths for Sovereign '
'Network Services',
'uuid': 'ac6a90c4-0c00-4aad-8615-bcaf23e27b2d',
'venue': '25th Anniversary International Conference on '
'Transparent Optical Networks (ICTON)',
'year': '2025'},
{'authors': [{'author_name': 'Elie Kfoury',
'display_name': 'Elie Kfoury',
'fabric_uuid': None,
'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'uuid': 'cd794ca3-c253-4874-91a5-f401182a7bef'},
{'author_name': 'Ali Mazloum',
'display_name': 'Ali Mazloum',
'fabric_uuid': None,
'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'uuid': 'b07d7297-e35f-4d9a-b348-aca62729d614'},
{'author_name': 'Jose Gomez',
'display_name': 'Jose Gomez',
'fabric_uuid': None,
'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'uuid': '2ca18c9c-22be-49f0-86a4-c2d00e489fca'},
{'author_name': 'Ali AlSabeh',
'display_name': 'Ali AlSabeh',
'fabric_uuid': None,
'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'uuid': '71682561-94bc-43d4-a4f7-616196b1238c'},
{'author_name': 'Jorge Crichigno',
'display_name': 'Jorge Crichigno',
'fabric_uuid': None,
'publication_uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'uuid': '004ef6e1-d54d-4931-8e9a-58a4d696f029'}],
'bibtex': '@article{kfoury2025,\n'
' title = {Real-Time Flow Statistics Collection using '
'RDMA and P4 Programmable Data Planes},\n'
' author = {Elie Kfoury and Ali Mazloum and Jose '
'Gomez and Ali AlSabeh and Jorge Crichigno},\n'
' year = {2025},\n'
' journal = {IEEE International Conference on '
'Communications (ICC): Next-Generation Networking and '
'Internet Symposium},\n'
' url = '
'{https://research.cec.sc.edu/files/documents/m94115-kfoury%20final.pdf}\n'
'}',
'created': '2025-04-27 13:43:23.073000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://research.cec.sc.edu/files/documents/m94115-kfoury%20final.pdf',
'modified': '2025-04-27 13:43:23.073000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Real-Time Flow Statistics Collection using RDMA and P4 '
'Programmable Data Planes',
'uuid': 'c0e91d2a-64cc-4250-aef9-872712768041',
'venue': 'IEEE International Conference on Communications (ICC): '
'Next-Generation Networking and Internet Symposium',
'year': '2025'},
{'authors': [{'author_name': 'Motahare Mounesan',
'display_name': 'Motahare Mounesan',
'fabric_uuid': None,
'publication_uuid': '01f6113e-b51a-4975-a2bf-44795fad4f8d',
'uuid': 'cc1e5e55-1234-4a7d-9399-ab3d221aece2'}],
'bibtex': '@article{mounesan2025,\n'
' title = {Reinforcement Learning Based Resource '
'Management in Edge Systems},\n'
' author = {Motahare Mounesan},\n'
' year = {2025},\n'
' journal = {Dissertation, The City University of New '
'York},\n'
' url = '
'{https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=7602&context=gc_etds}\n'
'}',
'created': '2025-11-07 22:03:36.460000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=7602&context=gc_etds',
'modified': '2025-11-07 22:03:36.461000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Reinforcement Learning Based Resource Management in '
'Edge Systems',
'uuid': '01f6113e-b51a-4975-a2bf-44795fad4f8d',
'venue': 'Dissertation, The City University of New York',
'year': '2025'},
{'authors': [{'author_name': 'Xi Wang',
'display_name': 'Xi Wang',
'fabric_uuid': None,
'publication_uuid': '30145e8d-c93f-4e45-a027-8ada2471cf3e',
'uuid': '3873603e-2429-4154-96b7-fc21f20d4bbd'}],
'bibtex': '@article{wang2025,\n'
' title = {Replication Algorithms and Optimization '
'Techniques for Decentralized Storage Systems},\n'
' author = {Xi Wang},\n'
' year = {2025},\n'
' journal = {Tennessee Technological University\u2009'
'ProQuest Dissertations & Theses}\n'
'}',
'created': '2025-06-02 14:01:04.792000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': None,
'modified': '2025-06-02 14:01:04.792000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Replication Algorithms and Optimization Techniques for '
'Decentralized Storage Systems',
'uuid': '30145e8d-c93f-4e45-a027-8ada2471cf3e',
'venue': 'Tennessee Technological University\u2009ProQuest '
'Dissertations & Theses',
'year': '2025'},
{'authors': [{'author_name': 'Yang-Zhe Lin',
'display_name': 'Yang-Zhe Lin',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': '9f56811d-ab2f-4a2c-8a0b-fbc6e2f45be6'},
{'author_name': 'Chun-Ting Lin',
'display_name': 'Chun-Ting Lin',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': 'd7ed1296-50f8-474e-a24d-9d0adb51bd5c'},
{'author_name': 'Po-Yi Lin',
'display_name': 'Po-Yi Lin',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': '46d0ca96-cffb-4e62-b6c5-66c726ac48e5'},
{'author_name': 'Shixiong Qi',
'display_name': 'Shixiong Qi',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': 'fa35c4de-0e8d-4588-9ca2-f8781094ac7c'},
{'author_name': 'Jyh-Cheng Chen',
'display_name': 'Jyh-Cheng Chen',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': '77a958f8-3493-423d-bfa1-6984b4bcc674'},
{'author_name': 'K. K. Ramakrishnan',
'display_name': 'K. K. Ramakrishnan',
'fabric_uuid': None,
'publication_uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'uuid': '490b85e0-24c3-4898-a6fd-0a07b65bfd3d'}],
'bibtex': '@article{lin2025,\n'
' title = {Rethinking 5G Core for Performance, '
'Fairness, and Flexibility},\n'
' author = {Yang-Zhe Lin and Chun-Ting Lin and Po-Yi '
'Lin and Shixiong Qi and Jyh-Cheng Chen and K. K. '
'Ramakrishnan},\n'
' year = {2025},\n'
' journal = {The 1st free5GC World Forum 2025},\n'
' url = '
'{https://shixiongqi.uky.edu/sites/default/files/2025-08/free5gc25-11_0.pdf}\n'
'}',
'created': '2025-11-07 21:55:26.591000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://shixiongqi.uky.edu/sites/default/files/2025-08/free5gc25-11_0.pdf',
'modified': '2025-11-07 21:55:26.591000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Rethinking 5G Core for Performance, Fairness, and '
'Flexibility',
'uuid': '51fb165e-463a-46f7-9760-62d46778c343',
'venue': 'The 1st free5GC World Forum 2025',
'year': '2025'},
{'authors': [{'author_name': 'Zhifan Lu',
'display_name': 'Zhifan Lu',
'fabric_uuid': None,
'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84',
'uuid': '33a866e9-1d87-4b53-8d5f-c7ba1b282eb0'},
{'author_name': 'Siyang Sun',
'display_name': 'Siyang Sun',
'fabric_uuid': None,
'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84',
'uuid': 'b4ebc40a-1077-4a1e-bbd3-f8dc36dfd74e'},
{'author_name': 'Yixin Sun',
'display_name': 'Yixin Sun',
'fabric_uuid': None,
'publication_uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84',
'uuid': 'da4aab66-e04c-4384-acaf-e877e721daab'}],
'bibtex': '@article{lu2025,\n'
' title = {RPKI-Based Location-Unaware Tor Guard '
'Relay Selection Algorithms},\n'
' author = {Zhifan Lu and Siyang Sun and Yixin Sun},\n'
' year = {2025},\n'
' journal = {arXiv:2501.06010},\n'
' url = {https://arxiv.org/abs/2501.06010}\n'
'}',
'created': '2025-02-03 15:17:31.220000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://arxiv.org/abs/2501.06010',
'modified': '2025-02-03 15:17:31.220000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'RPKI-Based Location-Unaware Tor Guard Relay Selection '
'Algorithms',
'uuid': '978a8e37-8c07-4758-8ee5-2a5bc2e79c84',
'venue': 'arXiv:2501.06010',
'year': '2025'},
{'authors': [{'author_name': 'Inder Monga',
'display_name': 'Inder Monga',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': '025873e8-d198-4026-980f-745702b1f56a'},
{'author_name': 'Mazahir Hussain',
'display_name': 'Mazahir Hussain',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': 'cfb2fc2b-94f4-4ead-abd3-8da1613bcc53'},
{'author_name': 'Justas Balcas',
'display_name': 'Justas Balcas',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': '57293f3d-278b-43e7-a190-c0cc170cc24f'},
{'author_name': 'Aashay Arora',
'display_name': 'Aashay Arora',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': '66fc65de-d4d6-4951-8405-d6acb3d5e967'},
{'author_name': 'Diego Davila',
'display_name': 'Diego Davila',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': '8edba79a-c3f4-4e24-9b16-1fa792d4b7b4'},
{'author_name': 'Buseung Cho',
'display_name': 'Buseung Cho',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': 'e2121ec3-4eef-4e69-a5ef-032b13630ad5'},
{'author_name': 'Xi Yang',
'display_name': 'Xi Yang',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': '7ebc0ba7-4c76-44b2-a000-d1d372e05a90'},
{'author_name': 'Cees De Laat',
'display_name': 'Cees De Laat',
'fabric_uuid': None,
'publication_uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'uuid': 'bcb41ab6-9457-4c9e-9dd5-114775fbcf61'}],
'bibtex': '@article{monga2025,\n'
' title = {SENSE in Practice: Quantifying the '
'End-to-End Benefits of Intent-Based Bandwidth '
'Reservation for Exascale Science Workflows},\n'
' author = {Inder Monga and Mazahir Hussain and '
'Justas Balcas and Aashay Arora and Diego Davila and '
'Buseung Cho and Xi Yang and Cees De Laat},\n'
' year = {2025},\n'
" journal = {SC Workshops '25: Proceedings of the SC "
"'25 Workshops of the International Conference for "
'High Performance Computing, Networking, Storage and '
'Analysis},\n'
' url = '
'{https://dl.acm.org/doi/full/10.1145/3731599.3767454}\n'
'}',
'created': '2025-11-26 03:33:38.348000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://dl.acm.org/doi/full/10.1145/3731599.3767454',
'modified': '2025-11-26 03:33:38.348000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'SENSE in Practice: Quantifying the End-to-End Benefits '
'of Intent-Based Bandwidth Reservation for Exascale '
'Science Workflows',
'uuid': '02529745-a5dc-40c2-a70d-ce56f9c57425',
'venue': "SC Workshops '25: Proceedings of the SC '25 Workshops "
'of the International Conference for High Performance '
'Computing, Networking, Storage and Analysis',
'year': '2025'},
{'authors': [{'author_name': 'Fatih Berkay Sarpkaya',
'display_name': 'Fatih Berkay Sarpkaya',
'fabric_uuid': None,
'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea',
'uuid': 'db51073e-0392-4a9c-be89-09986b9100ab'},
{'author_name': 'Fraida Fund',
'display_name': 'Fraida Fund',
'fabric_uuid': None,
'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea',
'uuid': 'ba89d3b5-39d1-49c5-be0f-a848c2efe3e2'},
{'author_name': 'Shivendra Panwar',
'display_name': 'Shivendra Panwar',
'fabric_uuid': None,
'publication_uuid': '94a1df32-17b6-40dc-bb94-010329a751ea',
'uuid': 'cb051e81-1a49-41b8-bc0a-534349bbce9b'}],
'bibtex': '@article{sarpkaya2025,\n'
' title = {To Adopt or Not to Adopt L4S-compatible '
'Congestion Control? Understanding Performance in a '
'Partial L4S Deployment},\n'
' author = {Fatih Berkay Sarpkaya and Fraida Fund and '
'Shivendra Panwar},\n'
' year = {2025},\n'
' journal = {arXiv:2411.10952},\n'
' url = {https://arxiv.org/abs/2411.10952}\n'
'}',
'created': '2024-12-09 15:18:07.157000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://arxiv.org/abs/2411.10952',
'modified': '2025-01-30 20:30:54.651000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'To Adopt or Not to Adopt L4S-compatible Congestion '
'Control? Understanding Performance in a Partial L4S '
'Deployment',
'uuid': '94a1df32-17b6-40dc-bb94-010329a751ea',
'venue': 'arXiv:2411.10952',
'year': '2025'},
{'authors': [{'author_name': 'Flavio Castro',
'display_name': 'Flavio Castro',
'fabric_uuid': None,
'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'uuid': '25488224-2826-46c4-b03b-5dca940a75f5'},
{'author_name': 'Weijian Zheng',
'display_name': 'Weijian Zheng',
'fabric_uuid': None,
'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'uuid': 'cdec2cdc-2a36-400c-8e46-48724176adea'},
{'author_name': 'Joaquin Chung',
'display_name': 'Joaquin Chung',
'fabric_uuid': None,
'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'uuid': 'dbce0b24-0fcf-47f9-81df-3ec09101bb45'},
{'author_name': 'Ian Foster',
'display_name': 'Ian Foster',
'fabric_uuid': None,
'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'uuid': 'dc860e70-dc77-4f60-8760-3919602508b4'},
{'author_name': 'Raj Kettimuthu',
'display_name': 'Raj Kettimuthu',
'fabric_uuid': None,
'publication_uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'uuid': 'ee7b5c52-66e3-4ddb-a148-fc91e744d62f'}],
'bibtex': '@article{castro2025,\n'
' title = {To Stream or Not to Stream: Towards A '
'Quantitative Model for Remote HPC Processing '
'Decisions},\n'
' author = {Flavio Castro and Weijian Zheng and '
'Joaquin Chung and Ian Foster and Raj Kettimuthu},\n'
' year = {2025},\n'
" journal = {SC Workshops '25: Proceedings of the SC "
"'25 Workshops of the International Conference for "
'High Performance Computing, Networking, Storage and '
'Analysis},\n'
' url = '
'{https://dl.acm.org/doi/10.1145/3731599.3767455}\n'
'}',
'created': '2025-11-26 02:44:46.684000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://dl.acm.org/doi/10.1145/3731599.3767455',
'modified': '2025-11-26 02:44:46.684000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'To Stream or Not to Stream: Towards A Quantitative '
'Model for Remote HPC Processing Decisions',
'uuid': '4ee5de29-4b37-476d-be3e-a3c77212f748',
'venue': "SC Workshops '25: Proceedings of the SC '25 Workshops "
'of the International Conference for High Performance '
'Computing, Networking, Storage and Analysis',
'year': '2025'},
{'authors': [{'author_name': 'Mami Hayashida',
'display_name': 'Mami Hayashida',
'fabric_uuid': None,
'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'uuid': '94856cac-30d1-4bd4-b68d-d1fc247245b2'},
{'author_name': 'Joshna',
'display_name': 'Joshna',
'fabric_uuid': None,
'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'uuid': '1ab10487-77cc-4ab6-92d4-b8fe20442a7a'},
{'author_name': 'Kurra',
'display_name': 'Kurra',
'fabric_uuid': None,
'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'uuid': '572b9083-62ad-4ef3-8dcc-be3e593a2d4d'},
{'author_name': 'Zongming Fei',
'display_name': 'Zongming Fei',
'fabric_uuid': None,
'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'uuid': '0f0ce2ae-af2c-4197-b4c0-2965ed8c5aee'},
{'author_name': 'James Griffioen',
'display_name': 'James Griffioen',
'fabric_uuid': None,
'publication_uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'uuid': '73701099-b370-4095-a07c-11e1b1e49784'}],
'bibtex': '@article{hayashida2025,\n'
' title = {Toward Generating Experiment-Specific '
'Notebooks in FABRIC},\n'
' author = {Mami Hayashida and Joshna and Kurra and '
'Zongming Fei and James Griffioen},\n'
' year = {2025},\n'
' journal = {Improving Scientific Software Conference '
'Proceedings},\n'
' url = {https://zenodo.org/records/16921063}\n'
'}',
'created': '2025-10-27 19:14:02.556000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://zenodo.org/records/16921063',
'modified': '2025-10-27 19:14:02.556000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Toward Generating Experiment-Specific Notebooks in '
'FABRIC',
'uuid': '949bbdbc-9920-4a81-8df6-28cf1e9290f2',
'venue': 'Improving Scientific Software Conference Proceedings',
'year': '2025'},
{'authors': [{'author_name': 'Rodrigo Moreira',
'display_name': 'Rodrigo Moreira',
'fabric_uuid': None,
'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa',
'uuid': 'e5dc4675-6f47-43b7-a63d-debf1de1428a'},
{'author_name': 'Larissa Ferreira Rodrigues Moreira',
'display_name': 'Larissa Ferreira Rodrigues Moreira',
'fabric_uuid': None,
'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa',
'uuid': '53ac9150-12b1-44b4-ba07-7c3eb5acdf25'},
{'author_name': 'Flávio de Oliveira Silva',
'display_name': 'Flávio de Oliveira Silva',
'fabric_uuid': None,
'publication_uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa',
'uuid': '11cd4ad3-9562-4842-a19f-31b8ea5bd40a'}],
'bibtex': '@article{moreira2025,\n'
' title = {Unleashing AI-Empowered Slices on Mobile '
'Networks for Natively Cognitive Service Delivery},\n'
' author = {Rodrigo Moreira and Larissa Ferreira '
'Rodrigues Moreira and Flávio de Oliveira Silva},\n'
' year = {2025},\n'
' journal = {IEEE Access},\n'
' url = '
'{https://ieeexplore.ieee.org/document/11126031}\n'
'}',
'created': '2025-11-07 21:49:31.371000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://ieeexplore.ieee.org/document/11126031',
'modified': '2025-12-03 18:43:59.055000+00:00',
'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'project_name': 'Agentic GPU-Accelerated 5G/6G RAN Controller on '
'FABRIC',
'project_uuid': '47556e8d-33f2-4482-b0b3-30f17ecb271b',
'title': 'Unleashing AI-Empowered Slices on Mobile Networks for '
'Natively Cognitive Service Delivery',
'uuid': '7bdbf56d-676e-430d-aaf6-83b319adc4fa',
'venue': 'IEEE Access',
'year': '2025'},
{'authors': [{'author_name': 'Alexander Wolosewicz',
'display_name': 'Alexander Wolosewicz',
'fabric_uuid': None,
'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628',
'uuid': 'b86fec43-fe4f-46f3-bdb6-8abd480bb6be'},
{'author_name': 'Vinod Yegneswaran',
'display_name': 'Vinod Yegneswaran',
'fabric_uuid': None,
'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628',
'uuid': '14d19d37-8dbf-4400-9627-b4d6b578b93b'},
{'author_name': 'Ashish Gehani',
'display_name': 'Ashish Gehani',
'fabric_uuid': None,
'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628',
'uuid': '6d741fd8-91c6-4beb-8b22-bcd8cd2c26a0'},
{'author_name': 'Nik Sultana',
'display_name': 'Nik Sultana',
'fabric_uuid': None,
'publication_uuid': '78a1a029-c519-4b86-a821-b4e09d52e628',
'uuid': '17931169-ca87-4277-9c2e-bde0d7dc5c39'}],
'bibtex': '@article{wolosewicz2025,\n'
' title = {User Study of a Network Debugger on '
'FABRIC},\n'
' author = {Alexander Wolosewicz and Vinod '
'Yegneswaran and Ashish Gehani and Nik Sultana},\n'
' year = {2025},\n'
' journal = {Cyber Security Experimentation and Test '
'Workshop},\n'
' url = '
'{https://www.csl.sri.com/users/gehani/papers/CSET-2025.Crinkle.pdf}\n'
'}',
'created': '2025-12-01 18:12:14.831000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://www.csl.sri.com/users/gehani/papers/CSET-2025.Crinkle.pdf',
'modified': '2025-12-01 18:12:14.831000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'User Study of a Network Debugger on FABRIC',
'uuid': '78a1a029-c519-4b86-a821-b4e09d52e628',
'venue': 'Cyber Security Experimentation and Test Workshop',
'year': '2025'}]}
api_user:
{'access_expires': '2024-10-07 00:08:16.356000+00:00',
'access_type': 'cookie',
'affiliation': 'None',
'can_create_publication': False,
'cilogon_id': 'None',
'email': 'None',
'fabric_roles': [],
'is_authenticated': False,
'is_publication_tracker_admin': False,
'name': 'Anonymous API User',
'projects': [],
'uuid': '00000000-0000-0000-0000-000000000000'}