publications:
{'count': 104,
'next': 'https://publications.fabric-testbed.net/publications/?page=5',
'previous': 'https://publications.fabric-testbed.net/publications/?page=3',
'results': [{'authors': [{'author_name': 'Krishnan Raghavan',
'display_name': 'Krishnan Raghavan',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': 'f502e5f4-83a2-498e-9b84-52aac8394995'},
{'author_name': 'George Papadimitriou',
'display_name': 'George Papadimitriou',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': '61ae522d-445e-4daa-b619-d07e5ebcedb7'},
{'author_name': 'Hongwei Jin',
'display_name': 'Hongwei Jin',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': 'cee871bf-87f7-4190-af38-d23d615e6bb0'},
{'author_name': 'Anirban Mandal',
'display_name': 'Anirban Mandal',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': '737e72a9-046b-4768-a293-1c24ced48bfa'},
{'author_name': 'Mariam Kiran',
'display_name': 'Mariam Kiran',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': '7f508ad6-4808-41ec-8654-c18f47f7a90a'},
{'author_name': 'Prasanna Balaprakash',
'display_name': 'Prasanna Balaprakash',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': '7df9e802-c0cf-4113-8046-3fed247f1d61'},
{'author_name': 'Ewa Deelman',
'display_name': 'Ewa Deelman',
'fabric_uuid': None,
'publication_uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'uuid': 'f7d0b2dd-9dc6-4fe0-9154-85b72955bdf6'}],
'bibtex': '@article{raghavan2024,\n'
' title = {Advancing Anomaly Detection in '
'Computational Workflows with Active Learning},\n'
' author = {Krishnan Raghavan and George '
'Papadimitriou and Hongwei Jin and Anirban Mandal and '
'Mariam Kiran and Prasanna Balaprakash and Ewa '
'Deelman},\n'
' year = {2024},\n'
' journal = {arXiv:2405.06133},\n'
' url = {https://arxiv.org/abs/2405.06133}\n'
'}',
'created': '2024-10-07 00:04:37.852000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://arxiv.org/abs/2405.06133',
'modified': '2025-01-30 19:54:25.641000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'PoSeiDon',
'project_uuid': '1a0f06eb-75ea-4258-9b92-ff4d8cf999b0',
'title': 'Advancing Anomaly Detection in Computational Workflows '
'with Active Learning',
'uuid': '698d51d8-fbbe-4e72-90e8-1a2407e2d15a',
'venue': 'arXiv:2405.06133',
'year': '2024'},
{'authors': [{'author_name': 'Lloyd Brown',
'display_name': 'Lloyd Brown',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '365231f0-3094-4601-8279-84d5df26f400'},
{'author_name': 'Emily Marx',
'display_name': 'Emily Marx',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': 'f692c4a3-a80b-4339-ae3d-2a3f2877c4e7'},
{'author_name': 'Dev Bali',
'display_name': 'Dev Bali',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': 'cd14a38c-b429-45e6-bde0-96ade7ef61eb'},
{'author_name': 'Emmanuel Amaro',
'display_name': 'Emmanuel Amaro',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '5077db14-8492-492e-bfa3-bf2748fa60eb'},
{'author_name': 'Debnil Sur',
'display_name': 'Debnil Sur',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': 'dd444684-f1d3-460c-ba55-91249564f1b0'},
{'author_name': 'Ezra Kissel',
'display_name': 'Ezra Kissel',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '91a9b92a-22d0-473f-8c39-2b96fb777875'},
{'author_name': 'Inder Monga',
'display_name': 'Inder Monga',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': 'c083ab3f-e6fb-49a2-85c1-75bb92fa0eda'},
{'author_name': 'Ethan Katz-Bassett',
'display_name': 'Ethan Katz-Bassett',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '842bfd80-1823-4e78-af19-086d607a149b'},
{'author_name': 'Arvind Krishnamurthy',
'display_name': 'Arvind Krishnamurthy',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '7a6defce-dfd5-4a72-a68d-fb853f6617a3'},
{'author_name': 'James McCauley',
'display_name': 'James McCauley',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '44e9c29e-f8b1-417c-a646-4da9272fb1ec'},
{'author_name': 'Tejas Narechania',
'display_name': 'Tejas Narechania',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '592b3f03-e8f8-43cd-b09f-f244d845e403'},
{'author_name': 'Aurojit Panda',
'display_name': 'Aurojit Panda',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': '37ab0431-50a0-4c51-959e-d286e38e277f'},
{'author_name': 'Scott Shenker',
'display_name': 'Scott Shenker',
'fabric_uuid': None,
'publication_uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'uuid': 'f711b7ca-ca27-4649-9377-e1d059552973'}],
'bibtex': '@article{brown2024,\n'
' title = {An Architecture For Edge Networking '
'Services},\n'
' author = {Lloyd Brown and Emily Marx and Dev Bali '
'and Emmanuel Amaro and Debnil Sur and Ezra Kissel and '
'Inder Monga and Ethan Katz-Bassett and Arvind '
'Krishnamurthy and James McCauley and Tejas Narechania '
'and Aurojit Panda and Scott Shenker},\n'
' year = {2024},\n'
' journal = {Proceedings of the ACM SIGCOMM 2024 '
'Conference},\n'
' url = '
'{https://dl.acm.org/doi/10.1145/3651890.3672261}\n'
'}',
'created': '2025-04-09 00:17:58.899000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://dl.acm.org/doi/10.1145/3651890.3672261',
'modified': '2025-04-27 13:33:27.009000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'An Architecture For Edge Networking Services',
'uuid': '94aa2c05-0ed0-41cf-ad1b-25c55698607f',
'venue': 'Proceedings of the ACM SIGCOMM 2024 Conference',
'year': '2024'},
{'authors': [{'author_name': 'Rodrigo Moreira',
'display_name': 'Rodrigo Moreira',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': '16052fda-6c40-4758-8006-c4a6749d1c7d'},
{'author_name': 'Rodolfo S. Villaça',
'display_name': 'Rodolfo S. Villaça',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': '394ca4b2-3aa5-4c43-9f81-1c72e97cbbeb'},
{'author_name': 'Moisés R.N. Ribeiro',
'display_name': 'Moisés R.N. Ribeiro',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': 'fe63681a-e15b-49ec-aad0-fc0ef835c844'},
{'author_name': 'Joberto S.B. Martins',
'display_name': 'Joberto S.B. Martins',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': 'eae632a2-e8b1-4d24-b87e-f31973fee9a3'},
{'author_name': 'João Henrique Corrêa',
'display_name': 'João Henrique Corrêa',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': '8425b409-7b46-4583-875c-d447f11a3fda'},
{'author_name': 'Tereza C. Carvalho',
'display_name': 'Tereza C. Carvalho',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': 'eaff46b2-25cf-43a9-a49f-0659526877ff'},
{'author_name': 'Flávio de Oliveira Silva',
'display_name': 'Flávio de Oliveira Silva',
'fabric_uuid': None,
'publication_uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'uuid': '417f28e4-f0ba-41ee-8e85-76b651c9c2f3'}],
'bibtex': '@article{moreira2024,\n'
' title = {An intelligent native network slicing '
'security architecture empowered by federated '
'learning},\n'
' author = {Rodrigo Moreira and Rodolfo S. Villaça '
'and Moisés R.N. Ribeiro and Joberto S.B. Martins and '
'João Henrique Corrêa and Tereza C. Carvalho and '
'Flávio de Oliveira Silva},\n'
' year = {2024},\n'
' journal = {Future Generation Computer Systems},\n'
' url = '
'{https://www.sciencedirect.com/science/article/abs/pii/S0167739X24005016}\n'
'}',
'created': '2024-12-09 15:06:17.656000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://www.sciencedirect.com/science/article/abs/pii/S0167739X24005016',
'modified': '2025-12-03 18:45:58.646000+00:00',
'modified_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'project_name': 'Agentic GPU-Accelerated 5G/6G RAN Controller on '
'FABRIC',
'project_uuid': '47556e8d-33f2-4482-b0b3-30f17ecb271b',
'title': 'An intelligent native network slicing security '
'architecture empowered by federated learning',
'uuid': 'f2379ea7-ceb2-4a1d-8729-b8275b7cc5e6',
'venue': 'Future Generation Computer Systems',
'year': '2024'},
{'authors': [{'author_name': 'Khawar Shehzad',
'display_name': 'Khawar Shehzad',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': 'a3fbbeb2-62dc-4a91-b1a4-058cbaa73183'},
{'author_name': 'Ajay Kumar',
'display_name': 'Ajay Kumar',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': '5fe50467-06d2-4470-9e3c-9df869cac8ce'},
{'author_name': 'Matthew Schutz',
'display_name': 'Matthew Schutz',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': '92d05fed-4177-4291-846f-6abe20d7e639'},
{'author_name': 'Chase Webb',
'display_name': 'Chase Webb',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': 'a8707bfc-ab3d-486d-93d4-ae2a717cddc7'},
{'author_name': 'Polycarp Nalela',
'display_name': 'Polycarp Nalela',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': '78fd625d-33ed-4d51-b2d1-f022aa69f758'},
{'author_name': 'Manas Das',
'display_name': 'Manas Das',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': 'ac6c878e-7759-4a71-a747-b2a3cc2ae243'},
{'author_name': 'Praveen Rao',
'display_name': 'Praveen Rao',
'fabric_uuid': None,
'publication_uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'uuid': 'ed8f554e-f1d8-4108-9e2c-33fe7916c1fd'}],
'bibtex': '@article{shehzad2024,\n'
' title = {A Scalable Tool for Democratizing Variant '
'Calling on Human Genomes Using Commodity Clusters},\n'
' author = {Khawar Shehzad and Ajay Kumar and Matthew '
'Schutz and Chase Webb and Polycarp Nalela and Manas '
'Das and Praveen Rao},\n'
' year = {2024},\n'
' journal = {ACM Conference on Information and '
'Knowledge Management (CIKM 2024)},\n'
' url = '
'{https://dl.acm.org/doi/10.1145/3627673.3679221}\n'
'}',
'created': '2025-02-26 15:00:39.170000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://dl.acm.org/doi/10.1145/3627673.3679221',
'modified': '2025-02-26 15:02:01.119000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'A Scalable Tool for Democratizing Variant Calling on '
'Human Genomes Using Commodity Clusters',
'uuid': 'aec9ffad-c687-4bfd-839a-48bc665316b5',
'venue': 'ACM Conference on Information and Knowledge Management '
'(CIKM 2024)',
'year': '2024'},
{'authors': [{'author_name': 'Praveen Rao',
'display_name': 'Praveen Rao',
'fabric_uuid': None,
'publication_uuid': '714a353e-54fd-4b2f-8530-d2609e2363e2',
'uuid': 'a34c9221-afd8-4910-8d27-1a5e236f84f9'},
{'author_name': 'Khawar Shehzad',
'display_name': 'Khawar Shehzad',
'fabric_uuid': None,
'publication_uuid': '714a353e-54fd-4b2f-8530-d2609e2363e2',
'uuid': '122b29aa-3fca-4bc7-840d-6bf06b1baba3'}],
'bibtex': '@article{rao2024,\n'
' title = {A Technique for Secure Variant Calling on '
'Human Genome Sequences Using SmartNICs},\n'
' author = {Praveen Rao and Khawar Shehzad},\n'
' year = {2024},\n'
' journal = {IEEE International Conference on Cloud '
'Computing (CLOUD)},\n'
' url = '
'{https://www.computer.org/csdl/proceedings-article/cloud/2024/685300a328/1ZMekOsdsD6}\n'
'}',
'created': '2024-10-07 00:06:40.994000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://www.computer.org/csdl/proceedings-article/cloud/2024/685300a328/1ZMekOsdsD6',
'modified': '2025-01-30 20:01:04.376000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'GAF',
'project_uuid': '68926660-da26-475d-9c40-50ebf0a5a812',
'title': 'A Technique for Secure Variant Calling on Human Genome '
'Sequences Using SmartNICs',
'uuid': '714a353e-54fd-4b2f-8530-d2609e2363e2',
'venue': 'IEEE International Conference on Cloud Computing '
'(CLOUD)',
'year': '2024'},
{'authors': [{'author_name': 'Xi Yang',
'display_name': 'Xi Yang',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '061277cd-8282-46a7-ba9f-cb8d492d1c9c'},
{'author_name': 'Ezra Kissel',
'display_name': 'Ezra Kissel',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '95b1c053-bb42-4a9b-b6ab-08d97fc7187a'},
{'author_name': 'Abdelilah Essiari',
'display_name': 'Abdelilah Essiari',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': 'de38633b-1b9e-46c8-a1fa-40215bec1122'},
{'author_name': 'Liang Zhang',
'display_name': 'Liang Zhang',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': 'b452ceb9-a656-4cd1-8b2a-afb308fcff8b'},
{'author_name': 'Tom Lehman',
'display_name': 'Tom Lehman',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '403435b5-8350-4d1e-a1a3-6d18ec69f578'},
{'author_name': 'Inder Monga',
'display_name': 'Inder Monga',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '4b4a73f4-eb31-479a-a1bf-253be1e93a96'},
{'author_name': 'Paul Ruth',
'display_name': 'Paul Ruth',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '7434c595-967a-48f8-b0eb-c78fd9e84994'},
{'author_name': 'Komal Thareja',
'display_name': 'Komal Thareja',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '4957b6e1-f384-45c8-a55b-93b220a09b3a'},
{'author_name': 'Ilya Baldin',
'display_name': 'Ilya Baldin',
'fabric_uuid': None,
'publication_uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'uuid': '3cb36aff-7dd8-48d8-b362-29a256a95388'}],
'bibtex': '@article{yang2024,\n'
' title = {FabFed: Tool-Based Network Federation for '
'Testbed of Testbeds-Paradigm and Practice},\n'
' author = {Xi Yang and Ezra Kissel and Abdelilah '
'Essiari and Liang Zhang and Tom Lehman and Inder '
'Monga and Paul Ruth and Komal Thareja and Ilya '
'Baldin},\n'
' year = {2024},\n'
' journal = {IEEE Conference on Computer '
'Communications Workshops (INFOCOM WKSHPS)},\n'
' url = '
'{https://ieeexplore.ieee.org/document/10620897}\n'
'}',
'created': '2024-10-07 00:04:10.767000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://ieeexplore.ieee.org/document/10620897',
'modified': '2025-01-30 20:11:54.479000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'FABRIC Staff',
'project_uuid': '990d8a8b-7e50-4d13-a3be-0f133ffa8653',
'title': 'FabFed: Tool-Based Network Federation for Testbed of '
'Testbeds-Paradigm and Practice',
'uuid': 'be60c669-3afc-4a83-887a-a81f6c504871',
'venue': 'IEEE Conference on Computer Communications Workshops '
'(INFOCOM WKSHPS)',
'year': '2024'},
{'authors': [{'author_name': 'Justin Presley',
'display_name': 'Justin Presley',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': 'c7e7a433-e7b1-47a3-9ba3-ef62c438852d'},
{'author_name': 'Xi Wang',
'display_name': 'Xi Wang',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': 'dc82c038-f1af-4386-9065-0f9afb3cef0b'},
{'author_name': 'Xusheng Ai',
'display_name': 'Xusheng Ai',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '260f8f05-65e5-49e7-89ef-d73ccff2c4cc'},
{'author_name': 'Tianyuan Yu',
'display_name': 'Tianyuan Yu',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '22e2f420-1063-424d-8990-1a0faf363121'},
{'author_name': 'Tym Brandel',
'display_name': 'Tym Brandel',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': 'fb9c872e-0fa6-4afd-b7f2-9c53025f667b'},
{'author_name': 'Proyash Podder',
'display_name': 'Proyash Podder',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': 'a8bd2e4b-6026-4e4a-9e45-eb5dd91db128'},
{'author_name': 'Varun Patil',
'display_name': 'Varun Patil',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '47741393-6e91-44f2-a7b5-097106a69013'},
{'author_name': 'Alex Afanasyev',
'display_name': 'Alex Afanasyev',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': 'e5d9a9cb-f112-44e5-a35b-0191b8f01e74'},
{'author_name': 'F. Alex Feltus',
'display_name': 'F. Alex Feltus',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '6e3a82f8-8278-4668-aa79-c973d1fa38b9'},
{'author_name': 'Lixia Zhang',
'display_name': 'Lixia Zhang',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '45ab65d8-37f3-4d94-af91-7b2829ff9c15'},
{'author_name': 'Susmit Shannigrahi',
'display_name': 'Susmit Shannigrahi',
'fabric_uuid': None,
'publication_uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'uuid': '74bfc1f1-7093-4cf6-9584-cb0d53ca804d'}],
'bibtex': '@article{presley2024,\n'
' title = {Hydra: A Scalable Decentralized P2P '
'Storage Federation for Large Scientific Datasets},\n'
' author = {Justin Presley and Xi Wang and Xusheng Ai '
'and Tianyuan Yu and Tym Brandel and Proyash Podder '
'and Varun Patil and Alex Afanasyev and F. Alex Feltus '
'and Lixia Zhang and Susmit Shannigrahi},\n'
' year = {2024},\n'
' journal = {International Conference on Computing, '
'Networking and Communications (ICNC)},\n'
' url = '
'{http://www.conf-icnc.org/2024/papers/p810-presley.pdf}\n'
'}',
'created': '2024-10-07 00:05:05.446000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'http://www.conf-icnc.org/2024/papers/p810-presley.pdf',
'modified': '2025-01-30 20:15:18.535000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'The Genome Lake',
'project_uuid': 'b3cffedd-ddb4-43ee-b57d-459b768e14ca',
'title': 'Hydra: A Scalable Decentralized P2P Storage Federation '
'for Large Scientific Datasets',
'uuid': 'da7924f2-04de-41cc-b2b7-d0844c2e5a33',
'venue': 'International Conference on Computing, Networking and '
'Communications (ICNC)',
'year': '2024'},
{'authors': [{'author_name': 'Jose Antonio Gomez Gaona',
'display_name': 'Jose Antonio Gomez Gaona',
'fabric_uuid': None,
'publication_uuid': '6ff2a2b2-5a28-4654-8e87-66da61dbca0b',
'uuid': '0d5cdc7d-c77b-43da-9981-c8a9b0d73036'}],
'bibtex': '@article{gaona2024,\n'
' title = {Improving TCP Performance Using '
'P4-Programmable Data Planes},\n'
' author = {Jose Antonio Gomez Gaona},\n'
' year = {2024},\n'
' journal = {University of South Carolina Theses and '
'Dissertations},\n'
' url = '
'{https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=8824&context=etd}\n'
'}',
'created': '2024-12-09 15:20:19.153000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=8824&context=etd',
'modified': '2025-01-30 20:16:19.438000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Improving TCP Performance Using P4-Programmable Data '
'Planes',
'uuid': '6ff2a2b2-5a28-4654-8e87-66da61dbca0b',
'venue': 'University of South Carolina Theses and Dissertations',
'year': '2024'},
{'authors': [{'author_name': 'Ilija Vukotic',
'display_name': 'Ilija Vukotic',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': '0fa47531-88cd-4fd8-8bed-6bfda20eea4a'},
{'author_name': 'Fengping Hu',
'display_name': 'Fengping Hu',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': '01951393-6792-4de4-8fda-ec9a39fbac86'},
{'author_name': 'Lincoln Bryant',
'display_name': 'Lincoln Bryant',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': '3f5f1937-5b03-4c52-aa4d-a60bb83820a8'},
{'author_name': 'Robert William Gardner Jr.',
'display_name': 'Robert William Gardner Jr.',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': 'a828adae-a5c4-47c3-8b9a-d8fcfcf84234'},
{'author_name': 'Shawn McKee',
'display_name': 'Shawn McKee',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': 'a130a0d6-dcaf-4b2d-9d72-7127888c254b'},
{'author_name': 'Judith Stephen',
'display_name': 'Judith Stephen',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': '674f6afd-c1f7-4515-89e2-679ee2994c95'},
{'author_name': 'David Jordan',
'display_name': 'David Jordan',
'fabric_uuid': None,
'publication_uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'uuid': '8eb2586a-1811-4275-9887-864ff840c78e'}],
'bibtex': '@article{vukotic2024,\n'
' title = {Investigating Data Access Models for '
'ATLAS: A Case Study with FABRIC Across Borders and '
'ServiceX},\n'
' author = {Ilija Vukotic and Fengping Hu and Lincoln '
'Bryant and Robert William Gardner Jr. and Shawn McKee '
'and Judith Stephen and David Jordan},\n'
' year = {2024},\n'
' journal = {International Conference on Computing in '
'High Energy & Nuclear Physics}\n'
'}',
'created': '2025-04-01 14:50:05.254000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': None,
'modified': '2025-04-01 14:50:05.254000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Investigating Data Access Models for ATLAS: A Case '
'Study with FABRIC Across Borders and ServiceX',
'uuid': '0071f080-3d58-4b21-8084-3cb78669af2b',
'venue': 'International Conference on Computing in High Energy & '
'Nuclear Physics',
'year': '2024'},
{'authors': [{'author_name': 'Peter Willis',
'display_name': 'Peter Willis',
'fabric_uuid': None,
'publication_uuid': '6dffbd61-4e60-43e2-9b2f-1190d657b01e',
'uuid': '0c8202cd-8e37-475e-b7e5-6ee9393ac005'},
{'author_name': 'Nirmala Shenoy',
'display_name': 'Nirmala Shenoy',
'fabric_uuid': None,
'publication_uuid': '6dffbd61-4e60-43e2-9b2f-1190d657b01e',
'uuid': '6edea45c-5284-4b11-93a4-250ecdd6d1f9'},
{'author_name': 'Yin Pan',
'display_name': 'Yin Pan',
'fabric_uuid': None,
'publication_uuid': '6dffbd61-4e60-43e2-9b2f-1190d657b01e',
'uuid': 'd2f70cc1-cdba-4bfb-836d-b0fb65d39624'},
{'author_name': 'Bill Stackpole',
'display_name': 'Bill Stackpole',
'fabric_uuid': None,
'publication_uuid': '6dffbd61-4e60-43e2-9b2f-1190d657b01e',
'uuid': '017a2fa6-1d29-48c6-9a7e-827988b6af3e'}],
'bibtex': '@article{willis2024,\n'
' title = {Investigating Data Center Network '
'Protocols},\n'
' author = {Peter Willis and Nirmala Shenoy and Yin '
'Pan and Bill Stackpole},\n'
' year = {2024},\n'
' journal = {Applied Networking Research Workshop '
'(ANRW)},\n'
' url = '
'{https://dl.acm.org/doi/10.1145/3673422.3674897}\n'
'}',
'created': '2024-10-07 00:05:57.253000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://dl.acm.org/doi/10.1145/3673422.3674897',
'modified': '2025-01-30 20:17:17.425000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'Meshed Tree Protocol for Data Center Networks',
'project_uuid': 'fec0d0d8-a7a8-4eac-b091-87f7914af796',
'title': 'Investigating Data Center Network Protocols',
'uuid': '6dffbd61-4e60-43e2-9b2f-1190d657b01e',
'venue': 'Applied Networking Research Workshop (ANRW)',
'year': '2024'},
{'authors': [{'author_name': 'Daniel Pendleton',
'display_name': 'Daniel Pendleton',
'fabric_uuid': None,
'publication_uuid': '961a3da7-01dd-428b-9306-83a50a4641ff',
'uuid': 'a76178e9-c99f-4785-a167-036e9ec04eba'}],
'bibtex': '@article{pendleton2024,\n'
' title = {Multi-Domain Secure DDS Networks for '
'Aerial and Ground Vehicle Communications},\n'
' author = {Daniel Pendleton},\n'
' year = {2024},\n'
' journal = {Clemson University Theses and '
'Dissertations},\n'
' url = '
'{https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=5326&context=all_theses}\n'
'}',
'created': '2024-10-07 00:04:49.889000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=5326&context=all_theses',
'modified': '2025-01-30 20:18:03.922000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'FABRIC Clemson',
'project_uuid': '7bc05490-ba40-45ba-99dc-b011680825d2',
'title': 'Multi-Domain Secure DDS Networks for Aerial and Ground '
'Vehicle Communications',
'uuid': '961a3da7-01dd-428b-9306-83a50a4641ff',
'venue': 'Clemson University Theses and Dissertations',
'year': '2024'},
{'authors': [{'author_name': 'Nirmala Shenoy',
'display_name': 'Nirmala Shenoy',
'fabric_uuid': None,
'publication_uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'uuid': '66053070-961d-47e6-b89b-7f78559d874e'},
{'author_name': 'Peter Willis',
'display_name': 'Peter Willis',
'fabric_uuid': None,
'publication_uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'uuid': 'fb95984a-9839-402e-bef9-f384a7313bda'},
{'author_name': 'Yin Pan',
'display_name': 'Yin Pan',
'fabric_uuid': None,
'publication_uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'uuid': '6b9bcf8c-e916-47d7-9f86-156d8b7e8b76'},
{'author_name': 'Bill Stackpole',
'display_name': 'Bill Stackpole',
'fabric_uuid': None,
'publication_uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'uuid': '3d672a74-0d7c-4cb0-8a96-866d46c3b3ed'},
{'author_name': 'and John Hamilton',
'display_name': 'and John Hamilton',
'fabric_uuid': None,
'publication_uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'uuid': 'ccd622fe-b073-43a6-82ff-304cf79e21b6'}],
'bibtex': '@article{shenoy2024,\n'
' title = {New Techniques to Route in Folded-Clos '
'Topology Data Center Networks},\n'
' author = {Nirmala Shenoy and Peter Willis and Yin '
'Pan and Bill Stackpole and and John Hamilton},\n'
' year = {2024},\n'
' journal = {Workshops of the International '
'Conference for High Performance Computing, '
'Networking, Storage and Analysis},\n'
' url = '
'{https://conferences.computer.org/sc-wpub/pdfs/SC-W2024-6oZmigAQfgJ1GhPL0yE3pS/555400a819/555400a819.pdf}\n'
'}',
'created': '2024-12-09 15:22:24.230000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://conferences.computer.org/sc-wpub/pdfs/SC-W2024-6oZmigAQfgJ1GhPL0yE3pS/555400a819/555400a819.pdf',
'modified': '2025-01-30 20:21:59.864000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'New Techniques to Route in Folded-Clos Topology Data '
'Center Networks',
'uuid': '0c6ff76d-b6a9-4845-ae10-d201c4030042',
'venue': 'Workshops of the International Conference for High '
'Performance Computing, Networking, Storage and '
'Analysis',
'year': '2024'},
{'authors': [{'author_name': 'Shoaib Basu',
'display_name': 'Shoaib Basu',
'fabric_uuid': None,
'publication_uuid': 'b9bbf5e8-5c4c-4852-9cad-215840911f42',
'uuid': '0966c8d0-7d1d-4891-b999-b3ab33993309'},
{'author_name': 'Deepak Nadig',
'display_name': 'Deepak Nadig',
'fabric_uuid': None,
'publication_uuid': 'b9bbf5e8-5c4c-4852-9cad-215840911f42',
'uuid': '7929efe1-a527-4cf7-9371-cb419899c74a'}],
'bibtex': '@article{basu2024,\n'
' title = {Offloading NVMe over Fabrics (NVMe-oF) to '
'SmartNICs on an at-scale Distributed Testbed},\n'
' author = {Shoaib Basu and Deepak Nadig},\n'
' year = {2024},\n'
' journal = {International Conference on Network '
'Softwarization (NetSoft)},\n'
' url = '
'{https://ieeexplore.ieee.org/abstract/document/10588915}\n'
'}',
'created': '2024-10-07 00:05:45.423000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://ieeexplore.ieee.org/abstract/document/10588915',
'modified': '2025-01-30 20:22:34.733000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'Purdue CYAN Lab',
'project_uuid': '42b3494b-982f-4fe8-b160-26f28c3e33c0',
'title': 'Offloading NVMe over Fabrics (NVMe-oF) to SmartNICs on '
'an at-scale Distributed Testbed',
'uuid': 'b9bbf5e8-5c4c-4852-9cad-215840911f42',
'venue': 'International Conference on Network Softwarization '
'(NetSoft)',
'year': '2024'},
{'authors': [{'author_name': 'Vladimir Omelyusik',
'display_name': 'Vladimir Omelyusik',
'fabric_uuid': None,
'publication_uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'uuid': '8849b75c-3149-45a9-ac7c-cc53c5fffae8'},
{'author_name': 'Khawar Shehzad',
'display_name': 'Khawar Shehzad',
'fabric_uuid': None,
'publication_uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'uuid': '4083130b-8857-41c6-be0e-87dc178ee1c7'},
{'author_name': 'Tyler Banks',
'display_name': 'Tyler Banks',
'fabric_uuid': None,
'publication_uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'uuid': '82a6e0cc-1e6d-4b73-9ecb-fa4ad65f6ad1'},
{'author_name': 'Praveen Rao',
'display_name': 'Praveen Rao',
'fabric_uuid': None,
'publication_uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'uuid': 'f2bbe878-613b-47c0-8f90-8c0616187379'},
{'author_name': 'Satish Nair',
'display_name': 'Satish Nair',
'fabric_uuid': None,
'publication_uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'uuid': 'f1ace6a2-74c9-485e-8e41-9480fdeb931a'}],
'bibtex': '@article{omelyusik2024,\n'
' title = {On Scaling Neuronal Network Simulations '
'Using Distributed Computing},\n'
' author = {Vladimir Omelyusik and Khawar Shehzad and '
'Tyler Banks and Praveen Rao and Satish Nair},\n'
' year = {2024},\n'
' journal = {International Workshop on Innovating the '
'Network for Data-Intensive Science (INDIS 2024)},\n'
' url = '
'{https://sc24.supercomputing.org/proceedings/workshops/workshop_pages/ws_indis112.html}\n'
'}',
'created': '2025-02-26 15:03:33.973000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://sc24.supercomputing.org/proceedings/workshops/workshop_pages/ws_indis112.html',
'modified': '2025-02-26 15:03:33.973000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'On Scaling Neuronal Network Simulations Using '
'Distributed Computing',
'uuid': 'e824179a-ddcc-4775-aecb-462d53c546b7',
'venue': 'International Workshop on Innovating the Network for '
'Data-Intensive Science (INDIS 2024)',
'year': '2024'},
{'authors': [{'author_name': 'Sandeep Bal',
'display_name': 'Sandeep Bal',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': '1a0ed050-437e-4e68-bdda-fd8fba04ce81'},
{'author_name': 'Zhaoyang Han',
'display_name': 'Zhaoyang Han',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': '0c1acd18-d12f-4adb-ba6e-3e67c57d182b'},
{'author_name': 'Suranga Handagala',
'display_name': 'Suranga Handagala',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': 'db358ba8-94d1-428d-9cb1-03e1a33fd299'},
{'author_name': 'Mert Cevik',
'display_name': 'Mert Cevik',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': '713efa5c-4cd9-4f6e-8bb3-cae04612c36a'},
{'author_name': 'Michael Zink',
'display_name': 'Michael Zink',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': '4c01bd25-89d6-4547-96c7-c8bd991c4a8b'},
{'author_name': 'Miriam Leeser',
'display_name': 'Miriam Leeser',
'fabric_uuid': None,
'publication_uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'uuid': '67f191e5-4e6b-40cd-98ea-dd79d28e7bd4'}],
'bibtex': '@article{bal2024,\n'
' title = {P4-based In-Network Telemetry for FPGAs in '
'the Open Cloud Testbed and FABRIC},\n'
' author = {Sandeep Bal and Zhaoyang Han and Suranga '
'Handagala and Mert Cevik and Michael Zink and Miriam '
'Leeser},\n'
' year = {2024},\n'
' journal = {IEEE Conference on Computer '
'Communications Workshops (INFOCOM WKSHPS)},\n'
' url = '
'{http://www1.coe.neu.edu/~zhhan/papers/sand_infocom24_wkshps.pdf}\n'
'}',
'created': '2024-10-07 00:05:19.652000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'http://www1.coe.neu.edu/~zhhan/papers/sand_infocom24_wkshps.pdf',
'modified': '2025-01-30 20:23:10.414000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': 'PRATE',
'project_uuid': 'c658fc95-b820-42eb-a40b-1770a913fab3',
'title': 'P4-based In-Network Telemetry for FPGAs in the Open '
'Cloud Testbed and FABRIC',
'uuid': '892dcf26-e3a4-4bde-945c-24228d97507b',
'venue': 'IEEE Conference on Computer Communications Workshops '
'(INFOCOM WKSHPS)',
'year': '2024'},
{'authors': [{'author_name': 'Jakub Sowa',
'display_name': 'Jakub Sowa',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '95971458-a727-4d98-aa8c-e2ff0dac13ac'},
{'author_name': 'Bach Hoang',
'display_name': 'Bach Hoang',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '4285e998-53f9-4096-aa90-b676210b87c1'},
{'author_name': 'Advaith Yeluru',
'display_name': 'Advaith Yeluru',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '9ecd551b-b9e7-45ae-a514-3db505a68c5c'},
{'author_name': 'Steven Qie',
'display_name': 'Steven Qie',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '5d79cb06-0a24-487c-beeb-170bc11f587d'},
{'author_name': 'Anita Nikolich',
'display_name': 'Anita Nikolich',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '2a3cce00-0b32-4256-a751-af591a5b8e4b'},
{'author_name': 'Ravishanka Iyer',
'display_name': 'Ravishanka Iyer',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '4064367a-23bb-4f56-b266-13e5b5bfb4ee'},
{'author_name': 'Phuong Cao',
'display_name': 'Phuong Cao',
'fabric_uuid': None,
'publication_uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'uuid': '5338bc10-e5c1-4435-bc73-43edd8b374d1'}],
'bibtex': '@article{sowa2024,\n'
' title = {Post-Quantum Cryptography (PQC) Network '
'Instrument: Measuring PQC Adoption Rates and '
'Identifying Migration Pathways},\n'
' author = {Jakub Sowa and Bach Hoang and Advaith '
'Yeluru and Steven Qie and Anita Nikolich and '
'Ravishanka Iyer and Phuong Cao},\n'
' year = {2024},\n'
' journal = {arXiv:2408.00054},\n'
' url = {https://arxiv.org/pdf/2408.00054}\n'
'}',
'created': '2024-10-07 00:06:27.091000+00:00',
'created_by': 'b12b961d-98ec-46f1-a938-af7a5ec0410b',
'link': 'https://arxiv.org/pdf/2408.00054',
'modified': '2025-01-30 20:24:20.651000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Post-Quantum Cryptography (PQC) Network Instrument: '
'Measuring PQC Adoption Rates and Identifying Migration '
'Pathways',
'uuid': '402ffefc-d5dc-4cdb-9eb0-1ed9c5ca6731',
'venue': 'arXiv:2408.00054',
'year': '2024'},
{'authors': [{'author_name': 'Rodrigo Moreira',
'display_name': 'Rodrigo Moreira',
'fabric_uuid': None,
'publication_uuid': '9640edf5-1a18-4354-b557-7b125d71877f',
'uuid': '0be5b966-9c9e-4369-8daf-e447a2b230bb'},
{'author_name': 'Larissa F. Rodrigues Moreira',
'display_name': 'Larissa F. Rodrigues Moreira',
'fabric_uuid': None,
'publication_uuid': '9640edf5-1a18-4354-b557-7b125d71877f',
'uuid': '7dde3691-850f-4422-9e9a-bcc92b73dd46'},
{'author_name': 'Tereza C. Carvalho',
'display_name': 'Tereza C. Carvalho',
'fabric_uuid': None,
'publication_uuid': '9640edf5-1a18-4354-b557-7b125d71877f',
'uuid': 'f6f7bd26-3585-4f51-abc6-511568e2cc3b'},
{'author_name': 'Flávio de Oliveira Silva',
'display_name': 'Flávio de Oliveira Silva',
'fabric_uuid': None,
'publication_uuid': '9640edf5-1a18-4354-b557-7b125d71877f',
'uuid': '6aa4aa83-b8d6-4eb3-8d12-fd07200f602b'}],
'bibtex': '@article{moreira2024,\n'
' title = {Resource Allocation Influence on '
'Application Performance in Sliced Testbeds},\n'
' author = {Rodrigo Moreira and Larissa F. Rodrigues '
'Moreira and Tereza C. Carvalho and Flávio de Oliveira '
'Silva},\n'
' year = {2024},\n'
' journal = {arXiv:2412.16716},\n'
' url = {https://arxiv.org/abs/2412.16716}\n'
'}',
'created': '2025-02-03 15:11:07.601000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://arxiv.org/abs/2412.16716',
'modified': '2025-02-03 15:11:07.601000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Resource Allocation Influence on Application '
'Performance in Sliced Testbeds',
'uuid': '9640edf5-1a18-4354-b557-7b125d71877f',
'venue': 'arXiv:2412.16716',
'year': '2024'},
{'authors': [{'author_name': 'Vaneshi Ramdhony',
'display_name': 'Vaneshi Ramdhony',
'fabric_uuid': None,
'publication_uuid': 'ccac7d5e-cbd5-45e0-8b39-d70bd4c7785c',
'uuid': 'd32b47e0-4411-4401-a1de-a30da1ad4019'},
{'author_name': 'Hyunsuk Bang',
'display_name': 'Hyunsuk Bang',
'fabric_uuid': None,
'publication_uuid': 'ccac7d5e-cbd5-45e0-8b39-d70bd4c7785c',
'uuid': 'da0c86d2-bc99-41b5-8c8b-a6e8a014abd4'},
{'author_name': 'Nik Sultana',
'display_name': 'Nik Sultana',
'fabric_uuid': None,
'publication_uuid': 'ccac7d5e-cbd5-45e0-8b39-d70bd4c7785c',
'uuid': 'f92b9bdd-02cd-4948-8ecb-f0afc2fd1649'}],
'bibtex': '@article{ramdhony2024,\n'
' title = {Running GraphBLAS on the FABRIC testbed},\n'
' author = {Vaneshi Ramdhony and Hyunsuk Bang and Nik '
'Sultana},\n'
' year = {2024},\n'
' journal = {IEEE High Performance Extreme '
'Computing}\n'
'}',
'created': '2024-12-09 15:10:36.813000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': None,
'modified': '2025-01-30 20:26:00.239000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Running GraphBLAS on the FABRIC testbed',
'uuid': 'ccac7d5e-cbd5-45e0-8b39-d70bd4c7785c',
'venue': 'IEEE High Performance Extreme Computing',
'year': '2024'},
{'authors': [{'author_name': 'Samia Choueiri',
'display_name': 'Samia Choueiri',
'fabric_uuid': None,
'publication_uuid': '9bc6e827-718b-4791-9edd-fcc67c7b6553',
'uuid': '3ff8fd02-79df-43b4-b0a4-6308eb1d78ec'},
{'author_name': 'Ali Mazloum',
'display_name': 'Ali Mazloum',
'fabric_uuid': None,
'publication_uuid': '9bc6e827-718b-4791-9edd-fcc67c7b6553',
'uuid': 'c1555c8e-e5ea-4004-9be2-ca401408134a'},
{'author_name': 'Elie F. Kfoury',
'display_name': 'Elie F. Kfoury',
'fabric_uuid': None,
'publication_uuid': '9bc6e827-718b-4791-9edd-fcc67c7b6553',
'uuid': '78e55909-2ec2-497a-b6b5-05f5421643a4'},
{'author_name': 'Jorge Crichigno',
'display_name': 'Jorge Crichigno',
'fabric_uuid': None,
'publication_uuid': '9bc6e827-718b-4791-9edd-fcc67c7b6553',
'uuid': 'a1092bd6-9795-4d34-8124-6877ff2ed774'}],
'bibtex': '@article{choueiri2024,\n'
' title = {Scalable Heavy Hitter Detection: A '
'DPDK-based Software Approach with P4 Integration},\n'
' author = {Samia Choueiri and Ali Mazloum and Elie '
'F. Kfoury and Jorge Crichigno},\n'
' year = {2024},\n'
' journal = {IEEE Global Communications Conference '
'(GLOBECOM)},\n'
' url = '
'{https://research.cec.sc.edu/files/cyberinfra/files/globecom_2024_2.pdf}\n'
'}',
'created': '2024-12-09 14:56:52.819000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'https://research.cec.sc.edu/files/cyberinfra/files/globecom_2024_2.pdf',
'modified': '2025-01-30 20:27:31.731000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Scalable Heavy Hitter Detection: A DPDK-based Software '
'Approach with P4 Integration',
'uuid': '9bc6e827-718b-4791-9edd-fcc67c7b6553',
'venue': 'IEEE Global Communications Conference (GLOBECOM)',
'year': '2024'},
{'authors': [{'author_name': 'Nik Sultana',
'display_name': 'Nik Sultana',
'fabric_uuid': None,
'publication_uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'uuid': '3beeba0f-73dc-4857-9169-1ae6852013a4'},
{'author_name': 'Yatish Kumar',
'display_name': 'Yatish Kumar',
'fabric_uuid': None,
'publication_uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'uuid': 'f98dad61-1573-4c67-ad2c-d4e127d9408b'},
{'author_name': 'Chin Guok',
'display_name': 'Chin Guok',
'fabric_uuid': None,
'publication_uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'uuid': '492a8050-2e15-4a97-bc1b-60a3142a618f'},
{'author_name': 'James B. Kowalkowski',
'display_name': 'James B. Kowalkowski',
'fabric_uuid': None,
'publication_uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'uuid': 'dc165372-b7fc-4dca-a7ca-109ad05c842f'},
{'author_name': 'Michael H. L. S. WangAuthors Info & '
'Claims',
'display_name': 'Michael H. L. S. WangAuthors Info '
'& Claims',
'fabric_uuid': None,
'publication_uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'uuid': '0d602efa-0ff6-4cd5-a10b-18f25d729fd3'}],
'bibtex': '@article{sultana2024,\n'
' title = {Shape-shifting Elephants: Multi-modal '
'Transport for Integrated Research Infrastructure},\n'
' author = {Nik Sultana and Yatish Kumar and Chin '
'Guok and James B. Kowalkowski and Michael H. L. S. '
'WangAuthors Info & Claims},\n'
' year = {2024},\n'
' journal = {ACM Workshop on Hot Topics in Networks '
'(HotNets)},\n'
' url = {Shape-shifting Elephants: Multi-modal '
'Transport for Integrated Research Infrastructure}\n'
'}',
'created': '2024-12-09 15:28:14.557000+00:00',
'created_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'link': 'Shape-shifting Elephants: Multi-modal Transport for '
'Integrated Research Infrastructure',
'modified': '2025-01-30 20:28:16.878000+00:00',
'modified_by': 'e89cc650-904d-40c0-855c-46dedc374691',
'project_name': None,
'project_uuid': None,
'title': 'Shape-shifting Elephants: Multi-modal Transport for '
'Integrated Research Infrastructure',
'uuid': '6e09a709-ba33-47f7-8e23-f82a1a2566d8',
'venue': 'ACM Workshop on Hot Topics in Networks (HotNets)',
'year': '2024'}]}
api_user:
{'access_expires': '2024-10-07 00:08:16.356000+00:00',
'access_type': 'cookie',
'affiliation': 'None',
'can_create_publication': False,
'cilogon_id': 'None',
'email': 'None',
'fabric_roles': [],
'is_authenticated': False,
'is_publication_tracker_admin': False,
'name': 'Anonymous API User',
'projects': [],
'uuid': '00000000-0000-0000-0000-000000000000'}