{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:40:23Z","timestamp":1770676823137,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Shanghai Key Technology Project","award":["19DZ1208903"],"award-info":[{"award-number":["19DZ1208903"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572325"],"award-info":[{"award-number":["61572325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60970012"],"award-info":[{"award-number":["60970012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education Doctoral Fund of Ph.D. Supervisor of China","award":["20113120110008"],"award-info":[{"award-number":["20113120110008"]}]},{"name":"Shanghai Key Science and Technology Project in Information Technology Field","award":["14511107902"],"award-info":[{"award-number":["14511107902"]}]},{"name":"Shanghai Key Science and Technology Project in Information Technology Field","award":["16DZ1203603"],"award-info":[{"award-number":["16DZ1203603"]}]},{"DOI":"10.13039\/501100012150","name":"Shanghai Leading Academic Discipline Project","doi-asserted-by":"publisher","award":["XTKX2012"],"award-info":[{"award-number":["XTKX2012"]}],"id":[{"id":"10.13039\/501100012150","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Engineering Research Center Project","award":["GCZX14014"],"award-info":[{"award-number":["GCZX14014"]}]},{"name":"Shanghai Engineering Research Center Project","award":["C14001"],"award-info":[{"award-number":["C14001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03942-x","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T10:03:41Z","timestamp":1624269821000},"page":"1852-1884","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Toward low CPU usage and efficient DPDK communication in a cluster"],"prefix":"10.1007","volume":"78","author":[{"given":"Mingjie","family":"Wu","sequence":"first","affiliation":[]},{"given":"Qingkui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jingjuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"issue":"4","key":"3942_CR1","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/2043164.2018500","volume":"41","author":"L Rizzo","year":"2011","unstructured":"Rizzo L, Landi M (2011) Netmap: memory mapped access to network devices. SIGCOMM Comput Commun Rev 41(4):422\u2013423. https:\/\/doi.org\/10.1145\/2043164.2018500","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"3942_CR2","unstructured":"Intel. Intel data plane development kit (DPDK). Website (2012). https:\/\/www.dpdk.org\/"},{"issue":"3","key":"3942_CR3","first-page":"20","volume":"10","author":"A Nazir","year":"2019","unstructured":"Nazir A, Wajahat A, Qureshi S (2019) Performance analysis of open source solution \u201cntop\u2019\u2019 for active and passive packet analysis relating to application and transport layer. Int J Adv Comput Sci Appl 10(3):20\u201327","journal-title":"Int J Adv Comput Sci Appl"},{"key":"3942_CR4","doi-asserted-by":"crossref","unstructured":"Barbette T, Soldani C, Mathy L (2015) Fast userspace packet processing. In: 2015 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp 5\u201316","DOI":"10.1109\/ANCS.2015.7110116"},{"key":"3942_CR5","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.comcom.2020.07.040","volume":"161","author":"R Qingqing","year":"2020","unstructured":"Qingqing R, Liang Z, Zhijun X, Yujun Z, Lei Z (2020) PacketUsher: exploiting DPDK to accelerate compute-intensive packet processing. Comput Commun 161:324\u2013333. https:\/\/doi.org\/10.1016\/j.comcom.2020.07.040","journal-title":"Comput Commun"},{"key":"3942_CR6","doi-asserted-by":"publisher","unstructured":"Huo L (2020) Packet-level-based traffic aggregation to optimize NDN content delivery. Int J Commun Syst 33(12). https:\/\/doi.org\/10.1002\/dac.4473","DOI":"10.1002\/dac.4473"},{"key":"3942_CR7","doi-asserted-by":"crossref","unstructured":"Red\u017eovi\u0107 H, Smiljani\u0107 A, Savi\u0107 B (2016) Performance evaluation of software routers with VPN features. In: 2016 24th Telecommunications Forum (TELFOR), pp 1\u20134","DOI":"10.1109\/TELFOR.2016.7818727"},{"key":"3942_CR8","doi-asserted-by":"crossref","unstructured":"Vesovi\u0107 M, Smiljani\u0107 A, Toma\u0161evi\u0107 M (2016) Speeding up IP lookup procedure in software routers by means of parallelization. In: 2016 24th Telecommunications Forum (TELFOR), pp 1\u20134","DOI":"10.1109\/TELFOR.2016.7818732"},{"key":"3942_CR9","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/s10922-017-9417-0","volume":"26","author":"P Emmerich","year":"2018","unstructured":"Emmerich P, Raumer D, Gallenm\u00fcller S, Wohlfart F, Carle G (2018) Throughput and latency of virtual switching with open vSwitch: a quantitative analysis. J Netw Syst Manage 26:314\u2013388. https:\/\/doi.org\/10.1007\/s10922-017-9417-0","journal-title":"J Netw Syst Manage"},{"key":"3942_CR10","doi-asserted-by":"publisher","unstructured":"Yang R, Chang X, Mi\u0161i\u0107 Jelena, Mi\u0161i\u0107, Vojislav\u00a0B (2020) Performance modeling of linux network system with open vSwitch. Peer-to-Peer Netw Appl 13:151\u2013162. https:\/\/doi.org\/10.1007\/s12083-019-00723-5","DOI":"10.1007\/s12083-019-00723-5"},{"key":"3942_CR11","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10922-020-09542-z","volume":"28","author":"A Bradai","year":"2020","unstructured":"Bradai A, Rehmani MH, Haque I, Nogueira M, Bukhari SHR (2020) Software-defined networking (SDN) and network function virtualization (NFV) for a hyperconnected world: challenges. J Netw Syst Manag Appl Major Adv 28:433\u2013435. https:\/\/doi.org\/10.1007\/s10922-020-09542-z","journal-title":"J Netw Syst Manag Appl Major Adv"},{"issue":"1","key":"3942_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TNSM.2015.2401568","volume":"12","author":"J Hwang","year":"2015","unstructured":"Hwang J, Ramakrishnan KK, Wood T (2015) NetVM: high performance and flexible networking using virtualization on commodity platforms. IEEE Trans Netw Serv Manage 12(1):34","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"3942_CR13","doi-asserted-by":"publisher","unstructured":"Ullah S, Choi J, Oh H (2020) Performance analysis and enhancements, IPsec for high speed network links. Future Gener Comput Syst 107:112\u2013125. https:\/\/doi.org\/10.1016\/j.future.2020.01.049","DOI":"10.1016\/j.future.2020.01.049"},{"key":"3942_CR14","doi-asserted-by":"publisher","first-page":"103256","DOI":"10.1109\/ACCESS.2020.2999096","volume":"8","author":"M Wu","year":"2020","unstructured":"Wu M, Chen Q, Wang J (2020) BPCM: a flexible high-speed bypass parallel communication mechanism for GPU cluster. IEEE Access 8:103256\u2013103272","journal-title":"IEEE Access"},{"issue":"4","key":"3942_CR15","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TPDS.2019.2957746","volume":"31","author":"X Li","year":"2020","unstructured":"Li X, Cheng W, Zhang T, Ren F, Yang B (2020) Towards power efficient high performance packet I\/O. IEEE Trans Parallel Distrib Syst 31(4):981\u2013996","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"3942_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1672308.1672325","volume":"40","author":"T Benson","year":"2010","unstructured":"Benson T, Anand A, Akella A, Zhang M (2010) Understanding data center traffic characteristics. SIGCOMM Comput Commun Rev 40(1):92\u201399. https:\/\/doi.org\/10.1145\/1672308.1672325","journal-title":"SIGCOMM Comput Commun Rev"},{"issue":"5","key":"3942_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/963985.963988","volume":"33","author":"N Feamster","year":"2003","unstructured":"Feamster N, Borkenhagen J, Rexford J (2003) Guidelines for interdomain traffic engineering. SIGCOMM Comput Commun Rev 33(5):19\u201330. https:\/\/doi.org\/10.1145\/963985.963988","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"3942_CR18","doi-asserted-by":"publisher","unstructured":"Kandula S, Sengupta S, Greenberg A, Patel P, Chaiken R (2009) The nature of data center traffic: measurements and analysis. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement (Association for Computing Machinery, New York, NY, USA, 2009), IMC \u201909, p. 202\u2013208. https:\/\/doi.org\/10.1145\/1644893.1644918","DOI":"10.1145\/1644893.1644918"},{"key":"3942_CR19","unstructured":"Bash C, Forman G (2007) Cool job allocation: measuring the power savings of placing jobs at cooling-efficient locations in the data center. In: 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference (USENIX Association, USA, 2007), ATC\u201907, pp 363\u2013368"},{"issue":"1","key":"3942_CR20","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1241601.1241609","volume":"35","author":"M Kondo","year":"2007","unstructured":"Kondo M, Sasaki H, Nakamura H (2007) Improving fairness, throughput and energy-efficiency on a chip multiprocessor through DVFS. SIGARCH Comput Archit News 35(1):31\u201338. https:\/\/doi.org\/10.1145\/1241601.1241609","journal-title":"SIGARCH Comput Archit News"},{"key":"3942_CR21","unstructured":"Intel. Data plane development kit power optimization on advantech* network appliance platform. Website (2015). https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/dpdk-power-optimization-advantech-white-paper.pdf"},{"key":"3942_CR22","doi-asserted-by":"publisher","unstructured":"Wu CM, Chang RS, Chan HY (2014) A green energyefficient scheduling algorithm using the DVFS technique for cloud datacenters, Future Gener Comput Syst 37, 141\u2013147. https:\/\/doi.org\/10.1016\/j.future.2013.06.009","DOI":"10.1016\/j.future.2013.06.009"},{"key":"3942_CR23","doi-asserted-by":"crossref","unstructured":"Gallenm\u00fcller S, Emmerich P, Wohlfart F, Raumer D, Carle G (2015) Comparison of frameworks for high-performance packet IO. In: 2015 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pp 29\u201338","DOI":"10.1109\/ANCS.2015.7110118"},{"key":"3942_CR24","doi-asserted-by":"crossref","unstructured":"Kahng AB, Kang S, Kumar R, Sartori J (2013) Enhancing the efficiency of energy-constrained DVFS designs. IEEE Trans Very Large Scale Integr Syst 21(10), 1769\u20131782","DOI":"10.1109\/TVLSI.2012.2219084"},{"issue":"3","key":"3942_CR25","doi-asserted-by":"publisher","first-page":"20141128","DOI":"10.1587\/elex.12.20141128","volume":"12","author":"SJ Cho","year":"2015","unstructured":"Cho SJ, Yun SH, Jeon JW (2015) A powersaving DVFS algorithm based on operational intensity for embedded systems. IEICE Electron Express 12(3):20141128. https:\/\/doi.org\/10.1587\/elex.12.20141128","journal-title":"IEICE Electron Express"},{"issue":"5","key":"3942_CR26","first-page":"28","volume":"12","author":"S Borodin","year":"2014","unstructured":"Borodin S, Pavlenko D (2014) Device for detection and bearing finding of radar with a low probability of intercept (LPI), by using detected signal. Nonlinear World (Russia) 12(5):28\u201331","journal-title":"Nonlinear World (Russia)"},{"issue":"2","key":"3942_CR27","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00450-014-0270-z","volume":"30","author":"R Schoene","year":"2015","unstructured":"Schoene R, Molka D, Werner M (2015) Wake-up latencies for processor idle states on current x86 processors. Comput Sci - Res Dev 30(2):219\u2013227. https:\/\/doi.org\/10.1007\/s00450-014-0270-z","journal-title":"Comput Sci - Res Dev"},{"issue":"3","key":"3942_CR28","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s00450-013-0240-x","volume":"29","author":"A Mazouz","year":"2014","unstructured":"Mazouz A, Laurent A, Pradelle B, Jalby W (2014) Evaluation of CPU frequency transition latency. Comput Sci Res Dev 29(3):187. https:\/\/doi.org\/10.1145\/2043164.20185000","journal-title":"Comput Sci Res Dev"},{"issue":"4","key":"3942_CR29","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/48012.48037","volume":"6","author":"A Agarwal","year":"1988","unstructured":"Agarwal A, Hennessy J, Horowitz M (1988) Cache performance of operating system and multiprogramming workloads. ACM Trans Comput Syst 6(4):393\u2013431. https:\/\/doi.org\/10.1145\/2043164.20185001","journal-title":"ACM Trans Comput Syst"},{"key":"3942_CR30","doi-asserted-by":"publisher","unstructured":"Mogul JC, Borg A (1991) The effect of context switches on cache performance. In: Proceedings of the Fourth International Conference on Architectural Support for Programming Languages and Operating Systems (Association for Computing Machinery, New York, NY, USA, 1991), ASPLOS IV, pp 75\u201384. https:\/\/doi.org\/10.1145\/106972.106982","DOI":"10.1145\/106972.106982"},{"key":"3942_CR31","doi-asserted-by":"publisher","first-page":"10709","DOI":"10.1109\/ACCESS.2017.2711043","volume":"5","author":"MA Khoshkholghi","year":"2017","unstructured":"Khoshkholghi MA, Derahman MN, Abdullah A, Subramaniam S, Othman M (2017) Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers. IEEE Access 5:10709\u201310722","journal-title":"IEEE Access"},{"key":"3942_CR32","doi-asserted-by":"publisher","first-page":"11031","DOI":"10.1109\/ACCESS.2020.2965548","volume":"8","author":"J Han","year":"2020","unstructured":"Han J, Lee S (2020) Performance improvement of linux CPU scheduler using policy gradient reinforcement learning for android smartphones. IEEE Access 8:11031","journal-title":"IEEE Access"},{"key":"3942_CR33","doi-asserted-by":"publisher","unstructured":"Joseph O, Michael C, Tom P (2015) Benefitting power and performance sleep loops. Website (2015). https:\/\/doi.org\/10.1145\/2043164.20185002","DOI":"10.1145\/2043164.2018500"},{"issue":"3","key":"3942_CR34","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.comnet.2003.10.004","volume":"44","author":"P Salvador","year":"2004","unstructured":"Salvador P, Pacheco A, Valadas R (2004) Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs. Comput Netw 44(3):335\u2013352. https:\/\/doi.org\/10.1145\/2043164.20185003","journal-title":"Comput Netw"},{"issue":"3","key":"3942_CR35","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1002\/INT.22335","volume":"36","author":"G Wei","year":"2020","unstructured":"Wei G, Weifan W, Yaojun C (2020) Tight bounds for the existence of path factors in network vulnerability parameter settings. Int J Intell Syst 36(3):1133\u20131158. https:\/\/doi.org\/10.1145\/2043164.20185004","journal-title":"Int J Intell Syst"},{"key":"3942_CR36","doi-asserted-by":"publisher","unstructured":"Gao W, Veeresha P, Prakasha DG, Senel B, Baskonus HM (2020) Iterative method applied to the fractional nonlinear systems arising in thermoelasticity with Mittag Leffler kernel. Fractals-Complex Geom Patterns Scal Nat Soc 28(8):12040040. https:\/\/doi.org\/10.1142\/S0218348X2040040X","DOI":"10.1142\/S0218348X2040040X"},{"issue":"1","key":"3942_CR37","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1186\/s13677-020-00173-y","volume":"9","author":"G Wei","year":"2020","unstructured":"Wei G, Yaojun C (2020) Approximation analysis of ontology learning algorithm in linear combination setting. J Cloud Comput 9(1):29. https:\/\/doi.org\/10.1145\/2043164.20185005","journal-title":"J Cloud Comput"},{"key":"3942_CR38","doi-asserted-by":"publisher","unstructured":"Hashlamon I (2020) A new adaptive extended Kalman filter for a class of nonlinear systems. J Appl Comput Mech 6(1): 1\u201312. https:\/\/doi.org\/10.22055\/jacm.2019.28130.1455","DOI":"10.22055\/jacm.2019.28130.1455"},{"key":"3942_CR39","doi-asserted-by":"publisher","unstructured":"Lei X, Tian Y, Zhang Z, Wang L, Xiang X, Wang H (2019) Correction of pumping station parameters in a one-dimensional hydrodynamic model using the Ensemble Kalman filter. J Hydrol 568, 108\u2013118 . https:\/\/doi.org\/10.1016\/j.jhydrol.2018.10.062","DOI":"10.1016\/j.jhydrol.2018.10.062"},{"issue":"2","key":"3942_CR40","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/90.491008","volume":"4","author":"A Erramilli","year":"1996","unstructured":"Erramilli A, Narayan O, Willinger W (1996) Experimental queueing analysis with long-range dependent packet traffic. IEEE\/ACM Trans Netw 4(2):209\u2013223","journal-title":"IEEE\/ACM Trans Netw"},{"key":"3942_CR41","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.jnca.2019.07.001","volume":"144","author":"CH Chang","year":"2019","unstructured":"Chang CH, Lin YD, Lai YK, Lai YC (2019) A scalable and accurate distributed traffic generator with Fourier transformed distribution over multiple commodity platforms. J Netw Comput Appl 144:102\u2013117. https:\/\/doi.org\/10.1145\/2043164.20185006","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"3942_CR42","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s40012-020-00275-7","volume":"8","author":"M Adeppady","year":"2020","unstructured":"Adeppady M, Singh MK, Tamma BR (2020) ONVM-5G: a framework for realization of 5G core in a box using DPDK. CSI Trans ICT 8(1):77\u201384. https:\/\/doi.org\/10.1145\/2043164.20185007","journal-title":"CSI Trans ICT"},{"key":"3942_CR43","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.comnet.2019.01.033","volume":"152","author":"R Leira","year":"2019","unstructured":"Leira R, Juli\u00e1nMoreno G, Gonz\u00e1lez I, G\u00f3mezArribas FJ, de Vergara JEL (2019) Performance assessment of 40 Gbit\/s off-the-shelf network cards for virtual network probes in 5G networks. Comput Netw 152:133\u2013143. https:\/\/doi.org\/10.1145\/2043164.20185008","journal-title":"Comput Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03942-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03942-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03942-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:23:03Z","timestamp":1643023383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03942-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3942"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03942-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"8 June 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}