{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:29:38Z","timestamp":1752982178230,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:00:00Z","timestamp":1559088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-18-D-0007"],"award-info":[{"award-number":["H98230-18-D-0007"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-17-1-0240"],"award-info":[{"award-number":["FA9550-17-1-0240"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,29]]},"DOI":"10.1145\/3316480.3322889","type":"proceedings-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:37:16Z","timestamp":1559306236000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Virtual-Time-Accelerated Emulation for Blockchain Network and Application Evaluation"],"prefix":"10.1145","author":[{"given":"Xiaoliang","family":"Wu","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Jiaqi","family":"Yan","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]},{"given":"Dong","family":"Jin","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"volume-title":"Retrieved Janunary 10","year":"2018","author":"Altman Ian","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Bitfly. 2018. Ethpool - Info. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/ethpool.org  Bitfly. 2018. Ethpool - Info. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/ethpool.org"},{"volume-title":"Retrieved Janunary 10","year":"2018","author":"Boersma Jacob","key":"e_1_3_2_1_3_1"},{"volume-title":"Retrieved Janunary 10","year":"2018","author":"Crichton Danny","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"volume-title":"Retrieved Janunary 10","year":"2018","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"ethereum. 2017. go-ethereum. (Jan. 2017). Retrieved Janunary 5 2019 from https:\/\/github.com\/ethereum\/go-ethereum\/  ethereum. 2017. go-ethereum. (Jan. 2017). Retrieved Janunary 5 2019 from https:\/\/github.com\/ethereum\/go-ethereum\/"},{"key":"e_1_3_2_1_8_1","unstructured":"ethereum\/EIPs. 2018. EIPS\/eip-2.md. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-2.md  ethereum\/EIPs. 2018. EIPS\/eip-2.md. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-2.md"},{"key":"e_1_3_2_1_9_1","unstructured":"Ittay Eyal and Emin G\u00fc n Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR Vol. abs\/1311.0243 (2013). arxiv: 1311.0243 http:\/\/arxiv.org\/abs\/1311.0243  Ittay Eyal and Emin G\u00fc n Sirer. 2013. Majority is not Enough: Bitcoin Mining is Vulnerable. CoRR Vol. abs\/1311.0243 (2013). arxiv: 1311.0243 http:\/\/arxiv.org\/abs\/1311.0243"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_11_1","unstructured":"Sneha Goswami. 2017. Scalability analysis of blockchains through blockchain simulation. (2017).  Sneha Goswami. 2017. Scalability analysis of blockchains through blockchain simulation. (2017)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1118605"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901378.2901383"},{"volume-title":"Shadow: Running Tor in a box for accurate and efficient experimentation. Technical Report. MINNESOTA UNIV MINNEAPOLIS DEPT OF COMPUTER SCIENCE AND ENGINEERING.","year":"2011","author":"Jansen Rob","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2012.49"},{"key":"e_1_3_2_1_16_1","unstructured":"Michael Kerrisk. 2013. Namespaces in operation part 1: namespaces overview. (Jan. 2013). Retrieved Janunary 5 2019 from https:\/\/lwn.net\/Articles\/531114\/  Michael Kerrisk. 2013. Namespaces in operation part 1: namespaces overview. (Jan. 2013). Retrieved Janunary 5 2019 from https:\/\/lwn.net\/Articles\/531114\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Michael Kerrisk. 2018. Man Page for NETEM - Network Emulator. (Jan. 2018). Retrieved Janunary 5 2019 from http:\/\/man7.org\/linux\/man-pages\/man8\/tc-netem.8.html  Michael Kerrisk. 2018. Man Page for NETEM - Network Emulator. (Jan. 2018). Retrieved Janunary 5 2019 from http:\/\/man7.org\/linux\/man-pages\/man8\/tc-netem.8.html"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154386"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154386"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"volume-title":"8th Workshop on Cyber Security Experimentation and Test (CSET 15)","year":"2015","author":"Miller Andrew","key":"e_1_3_2_1_21_1"},{"volume-title":"Bitcoin: A peer-to-peer electronic cash system.","year":"2008","author":"Nakamoto Satoshi","key":"e_1_3_2_1_22_1"},{"volume-title":"Retrieved Janunary 10","year":"2018","author":"Project The Monero","key":"e_1_3_2_1_23_1"},{"volume-title":"Caliper: A Blockchain Benchmark framework. (Jan.","year":"2017","author":"Technologies Huawei","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94478-4_2"},{"key":"e_1_3_2_1_26_1","unstructured":"Jiaqi Yan. 2018. On Convergence of Ethereum's Difficulty under Virtual Time . (Janunary 2018). Retrieved Janunary 3 2019 from https:\/\/drive.google.com\/file\/d\/15iK1eDGLwShPoXYH3_0gQ9enSoiDSK_U\/view?usp=sharing  Jiaqi Yan. 2018. On Convergence of Ethereum's Difficulty under Virtual Time . (Janunary 2018). Retrieved Janunary 3 2019 from https:\/\/drive.google.com\/file\/d\/15iK1eDGLwShPoXYH3_0gQ9enSoiDSK_U\/view?usp=sharing"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775012"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.22"},{"key":"e_1_3_2_1_29_1","unstructured":"Qi Trey Zhong and Zak Cole. 2018. Analyzing the Effects of Network Latency on Blockchain Performance and Security Using the Whiteblock Testing Platform. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/www.whiteblock.io\/library\/analyzing-effects-network.pdf  Qi Trey Zhong and Zak Cole. 2018. Analyzing the Effects of Network Latency on Blockchain Performance and Security Using the Whiteblock Testing Platform. (Jan. 2018). Retrieved Janunary 5 2019 from https:\/\/www.whiteblock.io\/library\/analyzing-effects-network.pdf"}],"event":{"name":"SIGSIM-PADS '19: SIGSIM Principles of Advanced Discrete Simulation","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Chicago IL USA","acronym":"SIGSIM-PADS '19"},"container-title":["Proceedings of the 2019 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316480.3322889","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316480.3322889","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3316480.3322889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3316480.3322889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,29]]},"references-count":29,"alternative-id":["10.1145\/3316480.3322889","10.1145\/3316480"],"URL":"https:\/\/doi.org\/10.1145\/3316480.3322889","relation":{},"subject":[],"published":{"date-parts":[[2019,5,29]]},"assertion":[{"value":"2019-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}