{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:51:00Z","timestamp":1742989860576,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811528095"},{"type":"electronic","value":"9789811528101"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2810-1_60","type":"book-chapter","created":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T18:03:11Z","timestamp":1580580191000},"page":"652-662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-core Processor Performance Evaluation Model Based on DPDK Affinity Setting"],"prefix":"10.1007","author":[{"given":"Canshuai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wenjun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Haocheng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhuang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,2]]},"reference":[{"key":"60_CR1","unstructured":"Home-DPDK[EB\/OL]. \nwww.dpdk.org\/\n\n. Accessed 23 Apr 2019"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Emmerich, P., Gallenmuller, S., Raumer, D., et al.: MoonGen: a scriptable high-speed packet generator. In: Association for Computing Machinery (2015)","DOI":"10.1145\/2815675.2815692"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Rincon, S.R., Vaton, S.: Reproducing DNS 10Gbps flooding attacks with commodity-hardware. In: 2016 International Wireless Communications and Mobile Computing Conference, pp. 510\u2013515 (2016)","DOI":"10.1109\/IWCMC.2016.7577110"},{"key":"60_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-319-31409-9_4","volume-title":"Performance Evaluation and Benchmarking: Traditional to Big Data to Internet of Things","author":"M Wagle","year":"2016","unstructured":"Wagle, M., Booss, D., Schreter, I., Egenolf, D.: NUMA-aware memory management with in-memory databases. In: Nambiar, R., Poess, M. (eds.) TPCTC 2015. LNCS, vol. 9508, pp. 45\u201360. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-31409-9_4"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Ren, Y., Yu, D., Jin, S., Robertazzi, T.: Characterization of input\/output bandwidth performance models in NUMA architecture for data intensive applications. In: Proceedings of the 42nd International Conference on Parallel Processing, pp. 369\u2013378 (2013)","DOI":"10.1109\/ICPP.2013.46"},{"issue":"9","key":"60_CR6","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/2500468.2500477","volume":"56","author":"C Lameter","year":"2013","unstructured":"Lameter, C.: An overview of non-uniform memory access. Commun. ACM 56(9), 54\u201359 (2013)","journal-title":"Commun. ACM"},{"issue":"1","key":"60_CR7","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1198\/TECH.2010.BR521","volume":"52","author":"M Hlynka","year":"2010","unstructured":"Hlynka, M.: An introduction to queuing theory modeling and analysis in application. Technometrics 52(1), 138\u2013139 (2010)","journal-title":"Technometrics"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Subramanian, S., Dutta, R.: Measurements and analysis of M\/M\/1 and M\/M\/c queuing models of the SIP proxy server. In: Proceedings of 18th International Conference on Computer Communications and Networks (ICCN), pp. 1\u20137 (2009)","DOI":"10.1109\/ICCCN.2009.5235282"},{"issue":"04","key":"60_CR9","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1142\/S0219622003000823","volume":"02","author":"T Bayrak","year":"2014","unstructured":"Bayrak, T., Grabowski, M.R.: Safety-critical wide area network performance evaluation. Int. J. Inf. Technol. Decis. Making 02(04), 651\u2013664 (2014)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"issue":"02","key":"60_CR10","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1142\/S0219622007002514","volume":"06","author":"S Jeong","year":"2007","unstructured":"Jeong, S., Hur, S., Kim, J.Y.: Parameter decision for enhancing performance of wireless LANs with prioritized messages. Int. J. Inf. Technol. Decis. Making 06(02), 301\u2013313 (2007)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"issue":"03","key":"60_CR11","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1142\/S021962200400115X","volume":"03","author":"J Yue","year":"2004","unstructured":"Yue, J., Wang, M.C., Huang, Z.: Commit time decision for measuring demand side quality costs with limited distribution information. Int. J. Inf. Technol. Decis. Making 03(03), 435\u2013452 (2004)","journal-title":"Int. J. Inf. Technol. Decis. Making"},{"issue":"02","key":"60_CR12","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1142\/S0219622017500432","volume":"17","author":"A Albeshri","year":"2018","unstructured":"Albeshri, A., Thayananthan, V., et al.: Analytical techniques for decision making on information security for big data breaches. Int. J. Inf. Technol. Decis. Making. 17(02), 527\u2013545 (2018)","journal-title":"Int. J. Inf. Technol. Decis. Making."},{"key":"60_CR13","first-page":"1","volume":"99","author":"D Barach","year":"2018","unstructured":"Barach, D., Linguaglossa, L., et al.: High-speed software data plane via vectorized packet processing. IEEE Commun. Mag. 99, 1\u20137 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Bhardwaj, A., Shree, A., Reddy, V.B., et al.: A Preliminary Performance Model for Optimizing Software Packet Processing Pipelines (2017)","DOI":"10.1145\/3124680.3124747"},{"key":"60_CR15","doi-asserted-by":"crossref","unstructured":"Yan, J., Lu, T., Sun, Z., et al.: Self-described buffer: a novel mechanism to improve packet I\/O efficiency in Linux. In: IEEE\/ACM International Symposium on Quality of Service (2016)","DOI":"10.1109\/IWQoS.2016.7590426"},{"key":"60_CR16","doi-asserted-by":"crossref","unstructured":"Kourtis, M.A., Xilouris, G., Riccobene, V., et al.: Enhancing VNF performance by exploiting SR-IOV and DPDK packet processing acceleration. In: Network Function Virtualization & Software Defined Network (2016)","DOI":"10.1109\/NFV-SDN.2015.7387409"},{"issue":"4","key":"60_CR17","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1109\/TNSM.2018.2874476","volume":"15","author":"T Begin","year":"2018","unstructured":"Begin, T., Baynat, B., Gallardo, G.A., et al.: An accurate and efficient modeling framework for the performance evaluation of DPDK-based virtual switches. IEEE Trans. Netw. Serv. Manag. 15(4), 1407\u20131421 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"60_CR18","unstructured":"Cheng, Z., Bi, J., et al.: HyperV: a high performance hypervisor for virtualization of the programmable data plane. In: International Conference on Computer Communication & Networks (2017)"},{"key":"60_CR19","unstructured":"Lepers, B., Qu\u00e9ma, V., Fedorova, A.: Thread and memory placement on NUMA systems: asymmetry matters. In: Proceedings of the 2015 USENIX Conference on USENIX Annual Technical Conference, pp. 277\u2013289 (2015)"},{"issue":"2","key":"60_CR20","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1145\/3093315.3037753","volume":"51","author":"W Song","year":"2017","unstructured":"Song, W., Kim, G., Jung, H., et al.: History-based arbitration for fairness in processor-interconnect of NUMA servers. Acm Sigops Oper. Syst. Rev. 51(2), 765\u2013777 (2017)","journal-title":"Acm Sigops Oper. Syst. Rev."},{"key":"60_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.future.2017.04.001","volume":"74","author":"T Li","year":"2017","unstructured":"Li, T., Ren, Y., Yu, D., et al.: Analysis of NUMA effects in modern multicore systems for the design of high-performance data transfer applications. Fut. Gener. Comput. Syst.- Int. J. Esci. 74, 41\u201350 (2017)","journal-title":"Fut. Gener. Comput. Syst.- Int. J. Esci."},{"key":"60_CR22","doi-asserted-by":"crossref","unstructured":"Majo, Z., Gross, T.R.: (Mis)understanding the NUMA memory system performance of multithreaded workloads. In: Proceedings of the 2013 IEEE International Symposium on Workload Characterization, pp. 11\u201322 (2013)","DOI":"10.1109\/IISWC.2013.6704666"},{"key":"60_CR23","doi-asserted-by":"crossref","unstructured":"Bi, H., Wang, Z.: DPDK-based improvement of packet forwarding. In: ITM Web of Conferences, pp. 1\u20135 (2016)","DOI":"10.1051\/itmconf\/20160701009"},{"issue":"3","key":"60_CR24","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/MCOM.2017.1600756CM","volume":"55","author":"M Trevisan","year":"2017","unstructured":"Trevisan, M., Finamore, A., Mellia, M., et al.: Traffic analysis with off-the-shelf hardware: challenges and lessons learned. IEEE Commun. Mag. 55(3), 163\u2013169 (2017)","journal-title":"IEEE Commun. Mag."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2810-1_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T10:09:28Z","timestamp":1587809368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-2810-1_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811528095","9789811528101"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2810-1_60","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Service","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vcrab.com.au\/ICDS2019\/home.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"210","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}