{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:09Z","timestamp":1750221009457,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National R&D Program of China","award":["2018YFB1004800"],"award-info":[{"award-number":["2018YFB1004800"]}]},{"name":"NSF SPX","award":["1822985"],"award-info":[{"award-number":["1822985"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,24]]},"DOI":"10.1145\/3326285.3329057","type":"proceedings-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T12:42:33Z","timestamp":1560516153000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Characterizing and orchestrating NFV-ready servers for efficient edge data processing"],"prefix":"10.1145","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Pengyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yunxin","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Quan","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Minyi","family":"Guo","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"320","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. X10 Protocol. https:\/\/buildyoursmarthome.co\/home-automation\/protocols\/x10\/.  2014. X10 Protocol. https:\/\/buildyoursmarthome.co\/home-automation\/protocols\/x10\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. Z-Wave. https:\/\/buildyoursmarthome.co\/home-automation\/protocols\/z-wave\/.  2014. Z-Wave. https:\/\/buildyoursmarthome.co\/home-automation\/protocols\/z-wave\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2016. STREAM Benchmark. http:\/\/www.cs.virginia.edu\/stream\/FTP\/Code\/.  2016. STREAM Benchmark. http:\/\/www.cs.virginia.edu\/stream\/FTP\/Code\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. ZigBee Alliance. https:\/\/www.zigbee.org.  2018. ZigBee Alliance. https:\/\/www.zigbee.org."},{"key":"e_1_3_2_1_5_1","unstructured":"Azure. 2019. Azure Data Box family. https:\/\/azure.microsoft.com\/en-us\/services\/storage\/databox\/.  Azure. 2019. Azure Data Box family. https:\/\/azure.microsoft.com\/en-us\/services\/storage\/databox\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel. Corporation. 2017. Intel 64 and ia-32 architectures developer's manual . https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/64-ia-32-architectures-software-developer-manual-325462.html.  Intel. Corporation. 2017. Intel 64 and ia-32 architectures developer's manual . https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/64-ia-32-architectures-software-developer-manual-325462.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818869.2818889"},{"key":"e_1_3_2_1_9_1","volume-title":"Gartner: 21 Billion IoT Devices To Invade By","author":"Eddy Nathan","year":"2020","unstructured":"Nathan Eddy . 2015. Gartner: 21 Billion IoT Devices To Invade By 2020 . https:\/\/www.informationweek.com\/mobile\/mobile-devices\/gartner-21-billion-iot-devices-to-invade-by-2020\/d\/d-id\/1323081. Nathan Eddy. 2015. Gartner: 21 Billion IoT Devices To Invade By 2020. https:\/\/www.informationweek.com\/mobile\/mobile-devices\/gartner-21-billion-iot-devices-to-invade-by-2020\/d\/d-id\/1323081."},{"key":"e_1_3_2_1_10_1","first-page":"V1","article-title":"Network functions virtualization (nfv): Architectural framework","volume":"2","author":"GSNFV","year":"2013","unstructured":"GSNFV ETSI. 2013 . Network functions virtualization (nfv): Architectural framework . ETsI Gs NFV 2 , 2 (2013), V1 . GSNFV ETSI. 2013. Network functions virtualization (nfv): Architectural framework. ETsI Gs NFV 2, 2 (2013), V1.","journal-title":"ETsI Gs NFV"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2925426.2926257"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195648"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037713"},{"key":"e_1_3_2_1_16_1","volume-title":"Mobile edge computing - A key technology towards 5G. ETSI white paper 11, 11","author":"Hu Yun Chao","year":"2015","unstructured":"Yun Chao Hu , Milan Patel , Dario Sabella , Nurit Sprecher , and Valerie Young . 2015. Mobile edge computing - A key technology towards 5G. ETSI white paper 11, 11 ( 2015 ), 1--16. Yun Chao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. Mobile edge computing - A key technology towards 5G. ETSI white paper 11, 11 (2015), 1--16."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2015.2401568"},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. 2012. Data Plane Development Kit. https:\/\/www.dpdk.org\/.  Intel. 2012. Data Plane Development Kit. https:\/\/www.dpdk.org\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830797"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741969"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098828"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820975.2820980"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750381"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154815"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155650"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616491"},{"key":"e_1_3_2_1_28_1","unstructured":"ntop. 2015. PF_RING ZC. http:\/\/www.ntop.org\/products\/pf_ring\/pf_ring-zc-zero-copy\/.  ntop. 2015. PF_RING ZC. http:\/\/www.ntop.org\/products\/pf_ring\/pf_ring-zc-zero-copy\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Aurojit Panda Sangjin Han Keon Jang Melvin Walls Sylvia Ratnasamy and Scott Shenker. 2016. NetBricks: Taking the V out of NFV.. In OSDI. 203--216.   Aurojit Panda Sangjin Han Keon Jang Melvin Walls Sylvia Ratnasamy and Scott Shenker. 2016. NetBricks: Taking the V out of NFV.. In OSDI. 203--216."},{"key":"e_1_3_2_1_30_1","volume-title":"d.}. Worldwide vCPE\/uCPE Forecast","author":"Rajesh Ghai Rohit Mehra","year":"2017","unstructured":"Rohit Mehra Rajesh Ghai , Petr Jirovsky . {n. d.}. Worldwide vCPE\/uCPE Forecast , 2017 \u00e2\u0102\u015e2021: NFV at the Network Edge . https:\/\/www.idc.com\/getdoc.jsp?containerId=US41429616. Rohit Mehra Rajesh Ghai, Petr Jirovsky. {n. d.}. Worldwide vCPE\/uCPE Forecast, 2017\u00e2\u0102\u015e2021: NFV at the Network Edge. https:\/\/www.idc.com\/getdoc.jsp?containerId=US41429616."},{"key":"e_1_3_2_1_31_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo . 2012 . Netmap: a novel framework for fast packet I\/O . In 21st USENIX Security Symposium (USENIX Security 12) . 101--112. Luigi Rizzo. 2012. Netmap: a novel framework for fast packet I\/O. In 21st USENIX Security Symposium (USENIX Security 12). 101--112."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"volume-title":"In-Situ AI: Towards Autonomous and Incremental Deep Learning for IoT Systems. In 2018 IEEE InternatiOnal SympOsium On High PerfOrmance COmputer Architecture (HPCA)","author":"Song Mingcong","key":"e_1_3_2_1_33_1","unstructured":"Mingcong Song , Kan Zhong , Jiaqi Zhang , Yang Hu , Duo Liu , Weigong Zhang , Jing Wang , and Tao Li. 2018. In-Situ AI: Towards Autonomous and Incremental Deep Learning for IoT Systems. In 2018 IEEE InternatiOnal SympOsium On High PerfOrmance COmputer Architecture (HPCA) . IEEE , 92--103. Mingcong Song, Kan Zhong, Jiaqi Zhang, Yang Hu, Duo Liu, Weigong Zhang, Jing Wang, and Tao Li. 2018. In-Situ AI: Towards Autonomous and Incremental Deep Learning for IoT Systems. In 2018 IEEE InternatiOnal SympOsium On High PerfOrmance COmputer Architecture (HPCA). IEEE, 92--103."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818869.2818898"},{"key":"e_1_3_2_1_35_1","unstructured":"Princeton University. 2010. PARSEC. http:\/\/parsec.cs.princeton.edu\/.  Princeton University. 2010. PARSEC. http:\/\/parsec.cs.princeton.edu\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080219"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2645892.2645901"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2641798.2641814"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485974"},{"key":"e_1_3_2_1_40_1","unstructured":"Yishay Yovel. 2017. Why NFV is Long on Hype Short on Value. https:\/\/www.catonetworks.com\/blog\/why-nfv-is-long-on-hype-short-on-value\/.  Yishay Yovel. 2017. Why NFV is Long on Hype Short on Value. https:\/\/www.catonetworks.com\/blog\/why-nfv-is-long-on-hype-short-on-value\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999602"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940155"}],"event":{"name":"IWQoS '19: IEEE\/ACM International Symposium on Quality of Service","acronym":"IWQoS '19","location":"Phoenix Arizona"},"container-title":["Proceedings of the International Symposium on Quality of Service"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326285.3329057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:00Z","timestamp":1750206360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326285.3329057"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":41,"alternative-id":["10.1145\/3326285.3329057","10.1145\/3326285"],"URL":"https:\/\/doi.org\/10.1145\/3326285.3329057","relation":{},"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"2019-06-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}