{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:34:24Z","timestamp":1761921264020,"version":"3.37.3"},"reference-count":92,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2901305"],"award-info":[{"award-number":["2022YFB2901305"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["623B2090","62172007"],"award-info":[{"award-number":["623B2090","62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902362"],"award-info":[{"award-number":["61902362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Provincial Key Research and Development Program of Zhejiang","award":["2021C01032"],"award-info":[{"award-number":["2021C01032"]}]},{"name":"Research Grants Council of Hong Kong","award":["GRF 14201523"],"award-info":[{"award-number":["GRF 14201523"]}]},{"name":"Yangzhou Science and Technology Plan Project","award":["YZ2023200"],"award-info":[{"award-number":["YZ2023200"]}]},{"name":"Self-Developing Experimental Instrument and Equipment Project of Yangzhou University","award":["zzyq2023zy06"],"award-info":[{"award-number":["zzyq2023zy06"]}]},{"name":"Major Science and Technology Infrastructure Project of Zhejiang Laboratory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tnet.2024.3421327","type":"journal-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T17:45:42Z","timestamp":1720028742000},"page":"4441-4455","source":"Crossref","is-referenced-by-count":2,"title":["Toward Full-Coverage and Low-Overhead Profiling of Network-Stack Latency"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0249-9664","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7753-0294","authenticated-orcid":false,"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Wenbin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Multimedia Information Processing, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6379-0244","authenticated-orcid":false,"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Big Data, Fuzhou University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-2805","authenticated-orcid":false,"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4488","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9687","authenticated-orcid":false,"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"Quan Cheng Laboratory and the College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796758"},{"key":"ref2","first-page":"49","article-title":"IX: A protected dataplane operating system for high throughput and low latency","volume-title":"Proc. OSDI","author":"Belay"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"ref4","first-page":"243","article-title":"Detailed diagnosis in computer networks","volume-title":"Proc. SIGCOMM","author":"Kandula"},{"key":"ref5","first-page":"57","article-title":"Profiling network performance for multi-tier data center applications","volume-title":"Proc. NSDI","author":"Yu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"volume-title":"TCP Probe","year":"2024","key":"ref7"},{"volume-title":"Systemtap","year":"2024","key":"ref8"},{"volume-title":"Lttng","year":"2024","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3411"},{"volume-title":"Netflow","year":"2024","key":"ref11"},{"volume-title":"Sflow","year":"2024","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"volume-title":"Tofino","year":"2024","key":"ref15"},{"volume-title":"Memcached","year":"2024","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2401568"},{"article-title":"SoftNIC: A software NIC to augment hardware","year":"2015","author":"Han","key":"ref18"},{"volume-title":"Data Plane Development Kit","year":"2024","key":"ref19"},{"volume-title":"PF_RING ZC","year":"2024","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391238"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"volume-title":"Httpd","year":"2024","key":"ref24"},{"volume-title":"Memaslap","year":"2024","key":"ref25"},{"volume-title":"Apache Benchmark","year":"2024","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604827"},{"key":"ref29","first-page":"437","article-title":"DETER: Deterministic TCP replay for performance diagnosis","volume-title":"Proc. NSDI","author":"Li"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.26"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890971"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402971"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3158644"},{"key":"ref34","first-page":"193","article-title":"R2: An application-level kernel for record and replay","volume-title":"Proc. OSDI","author":"Guo"},{"volume-title":"TCPtrace","year":"2024","key":"ref35"},{"key":"ref36","first-page":"43","article-title":"Diagnosing performance changes by comparing request flows","volume-title":"Proc. NSDI","author":"Sambasivan"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486011"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref41","first-page":"1","article-title":"In-band network telemetry via programmable dataplanes","volume-title":"Proc. SIGCOMM Poster","author":"Kim"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050233"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405822"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405855"},{"volume-title":"eBPF","year":"2024","key":"ref46"},{"volume-title":"BCC","year":"2024","key":"ref47"},{"volume-title":"BPFtime","year":"2024","key":"ref48"},{"key":"ref49","first-page":"117","article-title":"The design and implementation of open vswitch","volume-title":"Proc. USENIX NSDI","author":"Pfaff"},{"volume-title":"xxHash","year":"2024","key":"ref50"},{"volume-title":"Jhash","year":"2024","key":"ref51"},{"volume-title":"Fasthash","year":"2024","key":"ref52"},{"volume-title":"Lookup3","year":"2024","key":"ref53"},{"volume-title":"Siphash","year":"2024","key":"ref54"},{"volume-title":"Murmurhash3","year":"2024","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407830"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494852"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544262"},{"key":"ref60","first-page":"823","article-title":"Scaling hardware accelerated network monitoring to concurrent and dynamic queries with *flow","volume-title":"Proc. USENIX ATC","author":"Sonchack"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref63","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","volume-title":"Proc. USENIX Secur.","author":"Liu"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3594255.3594259"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483583"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3594255.3594256"},{"volume-title":"Switch.P4","year":"2024","key":"ref67"},{"volume-title":"NetFilter","year":"2024","key":"ref68"},{"volume-title":"TCPdump and Libpcap","year":"2024","key":"ref69"},{"volume-title":"Mmap","year":"2024","key":"ref70"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592821"},{"volume-title":"Caida Internet Traces","year":"2024","key":"ref73"},{"volume-title":"Pktgen","year":"2024","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050228"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"ref79","first-page":"745","article-title":"ClickNF: A modular stack for custom network functions","volume-title":"Proc. ATC","author":"Gallo"},{"key":"ref80","first-page":"171","article-title":"Metron: NFV service chains at the true speed of the underlying hardware","volume-title":"Proc. USENIX NSDI","author":"Katsikas"},{"key":"ref81","first-page":"1","article-title":"SLOG: Your switch is also your load-generator","volume-title":"Proc. NSDI Poster","author":"Kogias"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787510"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259414"},{"key":"ref86","first-page":"35","article-title":"NetChain: Scale-free sub-RTT coordination","volume-title":"Proc. NSDI","author":"Jin"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405823"},{"key":"ref88","first-page":"419","article-title":"007: Democratically finding the cause of packet drops","volume-title":"Proc. NSDI","author":"Arzani"},{"key":"ref89","first-page":"421","article-title":"Confluo: Distributed monitoring and diagnosis stack for high-speed networks","volume-title":"Proc. NSDI","author":"Khandelwal"},{"key":"ref90","first-page":"395","article-title":"Zeno: Diagnosing performance problems with temporal provenance","volume-title":"Proc. NSDI","author":"Wu"},{"key":"ref91","first-page":"71","article-title":"Efficiently measuring bandwidth at all time scales","volume-title":"Proc. NSDI","author":"Uyeda"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098849"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/90\/10720541\/10583922.pdf?arnumber=10583922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:44:42Z","timestamp":1729226682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10583922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":92,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3421327","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}