{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:00Z","timestamp":1763468280611,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1330308","1302041","1345249"],"award-info":[{"award-number":["1330308","1302041","1345249"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,28]]},"DOI":"10.1145\/2815675.2815698","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"409-421","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["PerfSight"],"prefix":"10.1145","author":[{"given":"Wenfei","family":"Wu","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Keqiang","family":"He","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Balance: the open source load-balancer and tcp proxy. http:\/\/www.inlab.de\/balance.html.  Balance: the open source load-balancer and tcp proxy. http:\/\/www.inlab.de\/balance.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Cherryproxy: a filtering http proxy extensible in python. http:\/\/www.decalage.info\/python\/cherryproxy.  Cherryproxy: a filtering http proxy extensible in python. http:\/\/www.decalage.info\/python\/cherryproxy."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/rightscale.com.  http:\/\/rightscale.com."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/tools.ietf.org\/html\/rfc3954.html.  http:\/\/tools.ietf.org\/html\/rfc3954.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Path mtu discovery. http:\/\/tools.ietf.org\/html\/rfc1191.  Path mtu discovery. http:\/\/tools.ietf.org\/html\/rfc1191."},{"key":"e_1_3_2_1_6_1","unstructured":"Snort: Open source network intrusion prevention. http:\/\/www.snort.org.  Snort: Open source network intrusion prevention. http:\/\/www.snort.org."},{"key":"e_1_3_2_1_7_1","unstructured":"www.openvswitch.org.  www.openvswitch.org."},{"key":"e_1_3_2_1_8_1","unstructured":"www.sflow.org.  www.sflow.org."},{"key":"e_1_3_2_1_9_1","unstructured":"www.tcpdump.org.  www.tcpdump.org."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592580"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"e_1_3_2_1_12_1","first-page":"41","volume-title":"USENIX Annual Technical Conference, FREENIX Track","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . Qemu, a fast and portable dynamic translator . In USENIX Annual Technical Conference, FREENIX Track , pages 41 -- 46 , 2005 . F. Bellard. Qemu, a fast and portable dynamic translator. In USENIX Annual Technical Conference, FREENIX Track, pages 41--46, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511338"},{"key":"e_1_3_2_1_14_1","volume-title":"NSDI","author":"Canini M.","year":"2012","unstructured":"M. Canini , D. Venzano , P. Peresini , D. Kostic , and J. Rexford . A nice way to test openflow applications . In NSDI , 2012 . M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford. A nice way to test openflow applications. In NSDI, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"SDN and OpenFlow World Congress","author":"Chiosi M.","year":"2012","unstructured":"M. Chiosi , D. Clarke , P. Willis , A. Reid , J. Feger , M. Bugenhagen , W. Khan , M. Fargano , C. Cui , H. Deng , Network functions virtualisation-introductory white paper . In SDN and OpenFlow World Congress , 2012 . M. Chiosi, D. Clarke, P. Willis, A. Reid, J. Feger, M. Bugenhagen, W. Khan, M. Fargano, C. Cui, H. Deng, et al. Network functions virtualisation-introductory white paper. In SDN and OpenFlow World Congress, 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364677"},{"key":"e_1_3_2_1_17_1","volume-title":"NSDI","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , G. Porter , R. H. Katz , S. Shenker , and I. Stocia . X-trace: A pervasive network tracing framework . In NSDI , 2007 . R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stocia. X-trace: A pervasive network tracing framework. In NSDI, 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2002.1006587"},{"key":"e_1_3_2_1_20_1","volume-title":"NSDI","author":"Handigol N.","year":"2014","unstructured":"N. Handigol , B. Heller , V. Jeyakumar , D. Mazieres , and N. McKeown . I know what your packet did last hop: Using packet histories to troubleshoot networks . In NSDI , 2014 . N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot networks. In NSDI, 2014."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592597"},{"key":"e_1_3_2_1_23_1","volume-title":"NSDI","author":"Kazemian P.","year":"2014","unstructured":"P. Kazemian , M. Chang , H. Zeng , G. Varghese , N. McKeown , and S. Whyte . Real time network policy checking using header space analysis . In NSDI , 2014 . P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In NSDI, 2014."},{"key":"e_1_3_2_1_24_1","volume-title":"NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In NSDI , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In NSDI, 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_26_1","volume-title":"IM","author":"Kliger S.","year":"1995","unstructured":"S. Kliger , S. Yemini , Y. Yemini , D. Ohsie , and S. Stolfo . A coding approach to event correlation . In IM , 1995 . S. Kliger, S. Yemini, Y. Yemini, D. Ohsie, and S. Stolfo. A coding approach to event correlation. In IM, 1995."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_28_1","volume-title":"NSDI","author":"Kompella R. R.","year":"2005","unstructured":"R. R. Kompella , J. Yates , A. Greenberg , and A. C. Snoeren . Ip fault localization via risk modeling . In NSDI , 2005 . R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren. Ip fault localization via risk modeling. In NSDI, 2005."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"e_1_3_2_1_30_1","volume-title":"NSDI","author":"Koponen T.","year":"2014","unstructured":"T. Koponen , K. Amidon , P. Balland , M. Casado , A. Chanda , B. Fulton , I. Ganichev , J. Gross , N. Gude , P. Ingram , Network virtualization in multi-tenant datacenters . In NSDI , 2014 . T. Koponen, K. Amidon, P. Balland, M. Casado, A. Chanda, B. Fulton, I. Ganichev, J. Gross, N. Gude, P. Ingram, et al. Network virtualization in multi-tenant datacenters. In NSDI, 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_32_1","volume-title":"PHD thesis","author":"McCann J. N.","year":"2012","unstructured":"J. N. McCann . Automating performance diagnosis in networked systems. In PHD thesis , 2012 . J. N. McCann. Automating performance diagnosis in networked systems. In PHD thesis, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504737"},{"key":"e_1_3_2_1_34_1","unstructured":"C. D. P. Ramanathan and D. Moore. Packet dispersion techniques and capacity estimation.  C. D. P. Ramanathan and D. Moore. Packet dispersion techniques and capacity estimation."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523621"},{"key":"e_1_3_2_1_36_1","volume-title":"NSDI","author":"Yu M.","year":"2011","unstructured":"M. Yu , A. Greenberg , D. Maltz , J. Rexford , and L. Yuan . Profiling network performance for multi-tier data center applications . In NSDI , 2011 . M. Yu, A. Greenberg, D. Maltz, J. Rexford, and L. Yuan. Profiling network performance for multi-tier data center applications. In NSDI, 2011."},{"key":"e_1_3_2_1_37_1","volume-title":"NSDI","author":"Zeng H.","year":"2014","unstructured":"H. Zeng , S. Zhang , F. Ye , V. Jeyakumar , M. Ju , J. Liu , N. McKeown , and A. Vahdat . Libra: Divide and conquer to verify forwarding tables in huge networks . In NSDI , 2014 H. Zeng, S. Zhang, F. Ye, V. Jeyakumar, M. Ju, J. Liu, N. McKeown, and A. Vahdat. Libra: Divide and conquer to verify forwarding tables in huge networks. In NSDI, 2014"}],"event":{"name":"IMC '15: Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"],"location":"Tokyo Japan","acronym":"IMC '15"},"container-title":["Proceedings of the 2015 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815675.2815698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815698"}},"subtitle":["Performance Diagnosis for Software Dataplanes"],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":36,"alternative-id":["10.1145\/2815675.2815698","10.1145\/2815675"],"URL":"https:\/\/doi.org\/10.1145\/2815675.2815698","relation":{},"subject":[],"published":{"date-parts":[[2015,10,28]]},"assertion":[{"value":"2015-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}