{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:31:36Z","timestamp":1761921096256,"version":"3.37.3"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2021B0101400001"],"award-info":[{"award-number":["2021B0101400001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2022"],"award-info":[{"award-number":["U21B2022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004147","name":"Tsinghua University-China Mobile Communications Group Company Ltd., Joint Institute","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004147","name":"Tsinghua University (Department of Computer Science and Technology)-Siemens Ltd., China Joint Research Center for Industrial Intelligence and Internet of Things","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tnet.2022.3224610","type":"journal-article","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T21:19:19Z","timestamp":1673558359000},"page":"1732-1747","source":"Crossref","is-referenced-by-count":2,"title":["Buffer-Based High-Coverage and Low-Overhead Request Event Monitoring in the Cloud"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9013-5993","authenticated-orcid":false,"given":"Kaihui","family":"Gao","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Chen","family":"Sun","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-8865","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tsinghua University, Beijing, China"}]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Hongqiang Harry","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Lingjun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Hangzhou, China"}]},{"given":"Xiang","family":"Deng","sequence":"additional","affiliation":[{"name":"Siemens Ltd., Beijing, China"}]},{"given":"Cheng","family":"Zhou","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, Beijing, China"}]},{"given":"Lu","family":"Lu","sequence":"additional","affiliation":[{"name":"China Mobile Research Institute, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190513"},{"journal-title":"Stingray SmartNIC","year":"2020","key":"ref57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132749"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"journal-title":"Jaeger Open Source End-to-End Distributed Tracing","year":"2020","key":"ref15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref14","first-page":"405","article-title":"Performance analysis of cloud applications","author":"ardelean","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"journal-title":"Finagle","year":"2021","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3265723.3265731"},{"journal-title":"Dapper a Large-scale Distributed Systems Tracing Infrastructure","year":"2010","author":"sigelman","key":"ref11"},{"journal-title":"Protocol buffers Encoding Signed integers","year":"2021","key":"ref55"},{"key":"ref10","first-page":"271","article-title":"X-trace: A pervasive network tracing framework","author":"fonseca","year":"2007","journal-title":"Proc USENIX NSDI"},{"journal-title":"Data-Plane Development Kit","year":"2014","author":"intel","key":"ref54"},{"journal-title":"Opentelemetry","year":"2021","key":"ref17"},{"journal-title":"Zipkin","year":"2021","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref18","first-page":"1","article-title":"Profiling network performance for multi-tier data center applications","author":"yu","year":"2011","journal-title":"Proc USENIX NSDI"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365408"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3139645.3139648"},{"journal-title":"Rocket","year":"2021","key":"ref46"},{"key":"ref45","first-page":"489","article-title":"mTCP: A highly scalable user-level TCP stack for multicore systems","author":"jeong","year":"2014","journal-title":"Proc USENIX NSDI"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365408"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"ref42","first-page":"51","article-title":"Azure accelerated networking: SmartNICs in the public cloud","author":"firestone","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref41","first-page":"93","article-title":"Enabling programmable transport protocols in high-speed nics","author":"arashloo","year":"2020","journal-title":"Proc USENIX NSDI"},{"journal-title":"grpc A high performance open-source universal rpc framework","year":"2020","key":"ref44"},{"journal-title":"Thrift","year":"2020","key":"ref43"},{"year":"1996","key":"ref49","first-page":"59"},{"key":"ref8","first-page":"519","article-title":"When cloud storage meets RDMA","author":"gao","year":"2021","journal-title":"Proc USENIX NSDI"},{"key":"ref7","first-page":"1","article-title":"Datacenter RPCs can be general and fast","author":"kalia","year":"2019","journal-title":"Proc USENIX NSDI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref4","first-page":"629","article-title":"lprof: A non-intrusive request flow profiler for distributed systems","author":"zhao","year":"2014","journal-title":"Proc USENIX OSDI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670994"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2806887"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522732"},{"key":"ref40","first-page":"77","article-title":"AccelTCP: Accelerating network applications with stateful TCP offloading","author":"moon","year":"2020","journal-title":"Proc USENIX NSDI"},{"key":"ref35","first-page":"549","article-title":"SIMON: A simple and scalable method for sensing, inference and measurement in data center networks","author":"geng","year":"2019","journal-title":"Proc USENIX NSDI"},{"key":"ref34","first-page":"421","article-title":"Confluo: Distributed monitoring and diagnosis stack for high-speed networks","author":"khandelwal","year":"2019","journal-title":"Proc USENIX NSDI"},{"key":"ref37","first-page":"453","article-title":"Distributed network monitoring and debugging with switchpointer","author":"tammana","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref36","first-page":"233","article-title":"Simplifying datacenter network debugging with PathDump","author":"tammana","year":"2016","journal-title":"Proc USENIX OSDI"},{"key":"ref31","first-page":"595","article-title":"Passive realtime datacenter fault detection and localization","author":"roy","year":"2017","journal-title":"Proc USENIX NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359650"},{"key":"ref33","first-page":"589","article-title":"Retro: Targeted resource management in multi-tenant distributed systems","author":"mace","year":"2015","journal-title":"Proc USENIX NSDI"},{"key":"ref32","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"Proc USENIX NSDI"},{"journal-title":"Cloud Native Computing Foundation","year":"2021","key":"ref2"},{"key":"ref1","first-page":"829","article-title":"Buffer-based end-to-end request event monitoring in the cloud","author":"gao","year":"2022","journal-title":"Proc USENIX NSDI"},{"key":"ref39","first-page":"1","article-title":"The new Linux&#x2019; perf&#x2019;tools","volume":"18","author":"melo","year":"2010","journal-title":"Proc Slides Linux Kongress"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103005"},{"key":"ref71","first-page":"861","article-title":"How to diagnose nanosecond network latencies in rich end-host stacks","author":"haecki","year":"2022","journal-title":"Proc USENIX NSDI"},{"key":"ref70","first-page":"419","article-title":"007: Democratically finding the cause of packet drops","author":"arzani","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"ref68","first-page":"353","article-title":"Structured comparative analysis of systems logs to diagnose performance problems","author":"nagaraj","year":"2012","journal-title":"Proc USENIX NSDI"},{"key":"ref23","first-page":"55","article-title":"deTector: A topology-aware monitoring system for data center networks","author":"peng","year":"2017","journal-title":"Proc USENIX ATC"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"ref26","first-page":"437","article-title":"DETER: Deterministic TCP replay for performance diagnosis","author":"li","year":"2019","journal-title":"Proc USENIX NSDI"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592597"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"ref64","first-page":"603","article-title":"Non-intrusive performance profiling for entire software stacks based on the flow reconstruction principle","author":"zhao","year":"2016","journal-title":"Proc USENIX OSDI"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815415"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050228"},{"key":"ref66","first-page":"293","article-title":"Be conservative: Enhancing failure diagnosis with proactive logging","author":"yuan","year":"2012","journal-title":"Proc USENIX OSDI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999609"},{"key":"ref65","first-page":"321","article-title":"Troubleshooting transiently-recurring errors in production systems with blame-proportional logging","author":"luo","year":"2018","journal-title":"Proc USENIX ATC"},{"key":"ref28","first-page":"18","article-title":"Using magpie for request extraction and workload modelling","author":"barham","year":"2004","journal-title":"Proc USENIX OSDI"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405876"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132768"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref62","first-page":"1","article-title":"Fay: Extensible distributed tracing from kernels to clusters","author":"rlingsson","year":"2012","journal-title":"Proc ACM TOCS"},{"year":"2011","key":"ref61","first-page":"1"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10223306\/10016287.pdf?arnumber=10016287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T18:31:59Z","timestamp":1693852319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10016287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":71,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2022.3224610","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}