{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:51:35Z","timestamp":1774540295930,"version":"3.50.1"},"reference-count":106,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Cii\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["PTDC\/CCI-COM\/4485\/2021 (Ainur)"],"award-info":[{"award-number":["PTDC\/CCI-COM\/4485\/2021 (Ainur)"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Cii\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["INESC-ID UIDB\/50021\/2020"],"award-info":[{"award-number":["INESC-ID UIDB\/50021\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tnet.2024.3478050","type":"journal-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:38:11Z","timestamp":1730223491000},"page":"35-50","source":"Crossref","is-referenced-by-count":2,"title":["Kollaps: Decentralized and Efficient Network Emulation for Large-Scale Systems"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3280-1879","authenticated-orcid":false,"given":"Sebasti\u00e3o","family":"Amaro","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Lisbon, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6916-2866","authenticated-orcid":false,"given":"Miguel","family":"Matos","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Lisbon, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Neuch&#x00E2;tel, Neuch&#x00E2;tel, Switzerland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2639988.2655736"},{"issue":"239","key":"ref2","article-title":"Docker: Lightweight Linux containers for consistent development and deployment","volume":"2014","author":"Merkel","year":"2014","journal-title":"Linux J."},{"key":"ref3","volume-title":"Linux LXC","year":"2024"},{"key":"ref4","volume-title":"Docker Swarm","year":"2024"},{"key":"ref5","volume-title":"Kubernetes","year":"2024"},{"key":"ref6","volume-title":"Amazon Elastic Compute Cloud","year":"2024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2994031"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1126\/science.1213847"},{"key":"ref9","first-page":"113","article-title":"Large-scale virtualization in the emulab network testbed","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Hibler"},{"issue":"6","key":"ref10","first-page":"36","article-title":"Introducing CloudLab: Scientific infrastructure for advancing cloud architectures and applications","volume":"39","author":"Ricci","year":"2014","journal-title":"Login Mag. USENIX SAGE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00141"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068864"},{"key":"ref14","volume-title":"Discrete-Event System Simulation","author":"Banks","year":"2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774767"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/268437.268737"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2699417"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263140"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857078"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284497"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844154"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564097"},{"key":"ref28","first-page":"1","article-title":"Network emulation with NetEm","volume-title":"Proc. Linux Conf.","author":"Hemminger"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"issue":"3","key":"ref30","first-page":"313","article-title":"Delayline: A wide-area network emulation tool","volume":"7","author":"Ingham","year":"1994","journal-title":"Comput. Syst."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764876"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844152"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957007"},{"key":"ref35","first-page":"61","article-title":"Trickle: A userland bandwidth shaper for UNIX-like systems","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Eriksen"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.01.002"},{"key":"ref37","first-page":"201","article-title":"The flexlab approach to realistic evaluation of networked systems","volume-title":"Proc. NSDI","author":"Ricci"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2006.09.013"},{"key":"ref39","first-page":"519","article-title":"Performance analysis of a decentralized network simulator based on imunes","volume-title":"Proc. Int. Symp. Perform. Eval. Comput. Telecommun. Syst.","author":"Puljiz"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2008.48"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1242"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"ref43","first-page":"414","article-title":"DSF: A common platform for distributed systems research and development","volume-title":"Middleware","volume":"5896","author":"Tang","year":"2009"},{"key":"ref44","first-page":"1","article-title":"SliceTime: A platform for scalable and accurate network emulation","volume-title":"Proc. NSDI","author":"Weing\u00e4rtner"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45065-5_4"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2013.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2015.17"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.107"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CONCAPANXXXIX47272.2019.8977002"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8459905"},{"issue":"2","key":"ref51","first-page":"508","article-title":"Network emulation as a service (NEaaS): Towards a cloud-based network emulation platform","volume":"26","author":"Lai","year":"2019","journal-title":"Mobile Networks and Applications"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282297"},{"key":"ref53","volume-title":"Testground","year":"2022"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387540"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.40"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"ref58","volume-title":"Apache Cassandra","year":"2024"},{"key":"ref59","volume-title":"Linux Hierarchy Token Bucket","year":"2024"},{"key":"ref60","volume-title":"Priority Qdisc","year":"2024"},{"key":"ref61","volume-title":"U32 Universal Identifiers","year":"2024"},{"key":"ref62","volume-title":"Linux Traffic Control","year":"2024"},{"key":"ref63","volume-title":"Extended Berkeley Packet Filter","year":"2024"},{"key":"ref64","volume-title":"Linux Socket Filter","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284506"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.4108\/tridentcom.2008.3155"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406267"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"ref69","first-page":"731","article-title":"Pantheon: The training ground for internet congestion-control research","volume-title":"Proc. USENIX Annu. Tech. Conf. (ATC)","author":"Yan"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3531517"},{"key":"ref71","volume-title":"Apache Mina","year":"2024"},{"key":"ref72","first-page":"185","article-title":"SPLAY: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze)","volume-title":"Proc. NSDI","author":"Leonini"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919490"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486027"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523638"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00034"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080106"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012364"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/90.842137"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2898442.2898444"},{"key":"ref81","volume-title":"Docker Security Capabilities","year":"2024"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198262"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517487"},{"key":"ref85","volume-title":"Linux Network Emulator","year":"1997"},{"key":"ref86","volume-title":"Linux TCP Small Queues","year":"2012"},{"key":"ref87","volume-title":"A Rust Ebpf Toolchain","year":"2024"},{"key":"ref88","volume-title":"Raw(7)\u2014Linux Man Page","year":"2024"},{"key":"ref89","volume-title":"Perfmap Implementation in Github","year":"2024"},{"key":"ref90","volume-title":"Async Standard Library","year":"2024"},{"key":"ref91","volume-title":"Linux Pipes","year":"2024"},{"key":"ref92","volume-title":"Imec Virtual Wall 1","year":"2024"},{"key":"ref93","volume-title":"IPerf3","year":"2024"},{"key":"ref94","volume-title":"Network Time Protocol (NTP)","year":"2024"},{"key":"ref95","volume-title":"Amazon EC2\u2013T1 Micro Instances","year":"2024"},{"issue":"5439","key":"ref96","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"Barab\u00e1si","year":"1999","journal-title":"Science"},{"key":"ref97","volume-title":"Dstat","year":"2024"},{"key":"ref98","volume-title":"POX","year":"2018"},{"key":"ref99","volume-title":"Floodlight","year":"2018"},{"key":"ref100","volume-title":"Opendaylight","year":"2018"},{"key":"ref101","volume-title":"IFTOP\u2014Display Bandwidth Usage on an Interface By Host","year":"2024"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"ref103","volume-title":"Aeron","year":"2024"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.60"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/90.811453"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1057\/s41273-016-0043-8"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/10891942\/10737681.pdf?arnumber=10737681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:11:00Z","timestamp":1740082260000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10737681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":106,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3478050","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}