{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:04Z","timestamp":1761402064601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT, Fundac?a?o para a Cie?ncia e a Tecnologia","award":["UIDB\/50021\/2020 and Lisboa-01-0145- FEDER- 031456 (Angainor)"],"award-info":[{"award-number":["UIDB\/50021\/2020 and Lisboa-01-0145- FEDER- 031456 (Angainor)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387540","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Kollaps"],"prefix":"10.1145","author":[{"given":"Paulo","family":"Gouveia","sequence":"first","affiliation":[{"name":"U. Lisboa, Lisbon, Portugal"}]},{"given":"Jo\u00e3o","family":"Neves","sequence":"additional","affiliation":[{"name":"U. Lisboa, Lisbon, Portugal"}]},{"given":"Carlos","family":"Segarra","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"given":"Luca","family":"Liechti","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"given":"Shady","family":"Issa","sequence":"additional","affiliation":[{"name":"U. Lisboa, Lisbon, Portugal"}]},{"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"given":"Miguel","family":"Matos","sequence":"additional","affiliation":[{"name":"U. Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1997. Linux Network Emulator. https:\/\/www.linux.org\/docs\/man8\/tc-netem.html. Accessed: 2020-03-12.  1997. Linux Network Emulator. https:\/\/www.linux.org\/docs\/man8\/tc-netem.html. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_2_1","unstructured":"2011. Curl. https:\/\/curl.haxx.se\/. Accessed: 2020-03-12.  2011. Curl. https:\/\/curl.haxx.se\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_3_1","unstructured":"2012. Linux TCP Small Queues. https:\/\/lwn.net\/Articles\/507065\/. Accessed: 2020-03-12.  2012. Linux TCP Small Queues. https:\/\/lwn.net\/Articles\/507065\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_4_1","unstructured":"2015. Summary of the Amazon DynamoDB Service. https:\/\/aws.amazon.com\/message\/5467D2\/. Accessed: 2020-03-12.  2015. Summary of the Amazon DynamoDB Service. https:\/\/aws.amazon.com\/message\/5467D2\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Apache Mina. https:\/\/mina.apache.org\/. Accessed: 2020-03-12.  2018. Apache Mina. https:\/\/mina.apache.org\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. Floodlight. http:\/\/www.projectfloodlight.org\/floodlight\/. Accessed: 2020-03-12.  2018. Floodlight. http:\/\/www.projectfloodlight.org\/floodlight\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. Memcached. https:\/\/memcached.org\/. Accessed: 2020-03-12.  2018. Memcached. https:\/\/memcached.org\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Opendaylight. https:\/\/www.opendaylight.org\/. Accessed: 2020-03-12.  2018. Opendaylight. https:\/\/www.opendaylight.org\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. POX. https:\/\/github.com\/noxrepo\/pox. Accessed: 2020-03-12.  2018. POX. https:\/\/github.com\/noxrepo\/pox. Accessed: 2020-03-12."},{"volume-title":"u32 Universal Identifiers","key":"e_1_3_2_1_10_1","unstructured":"2018. u32 Universal Identifiers . http:\/\/man7.org\/linux\/man-pages\/man8\/tc-u32.8.html. Accessed: 2020-03-12. 2018. u32 Universal Identifiers. http:\/\/man7.org\/linux\/man-pages\/man8\/tc-u32.8.html. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_11_1","unstructured":"2019. Aeron. https:\/\/github.com\/real-logic\/aeron. Accessed: 2020--03-12.  2019. Aeron. https:\/\/github.com\/real-logic\/aeron. Accessed: 2020--03-12."},{"key":"e_1_3_2_1_12_1","unstructured":"2019. Amazon EC2 - T1 micro instances. https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/concepts_micro_instances.html. Accessed: 2020-03-12.  2019. Amazon EC2 - T1 micro instances. https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/concepts_micro_instances.html. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_13_1","unstructured":"2019. Apache Cassandra. https:\/\/cassandra.apache.org\/. Accessed: 2020-03-12.  2019. Apache Cassandra. https:\/\/cassandra.apache.org\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_14_1","unstructured":"2019. Docker Security Capabilities. https:\/\/docs.docker.com\/engine\/security\/. Accessed: 2020-03-12.  2019. Docker Security Capabilities. https:\/\/docs.docker.com\/engine\/security\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_15_1","unstructured":"2019. Docker Swarm. https:\/\/docs.docker.com\/engine\/swarm\/. Accessed: 2020-03-12.  2019. Docker Swarm. https:\/\/docs.docker.com\/engine\/swarm\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_16_1","unstructured":"2019. iPerf3. https:\/\/github.com\/esnet\/iperf. Accessed: 2020-03-12.  2019. iPerf3. https:\/\/github.com\/esnet\/iperf. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_17_1","unstructured":"2019. Kubernetes. https:\/\/kubernetes.io\/. Accessed: 2020-03-12.  2019. Kubernetes. https:\/\/kubernetes.io\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_18_1","unstructured":"2019. Linux LXC. https:\/\/linuxcontainers.org\/. Accessed: 2020-03-12.  2019. Linux LXC. https:\/\/linuxcontainers.org\/. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_19_1","unstructured":"2019. Linux Traffic Control. https:\/\/linux.die.net\/man\/8\/tc.  2019. Linux Traffic Control. https:\/\/linux.die.net\/man\/8\/tc."},{"key":"e_1_3_2_1_20_1","unstructured":"2019. Post-mortem Google Cloud Storage Incident. https:\/\/status.cloud.google.com\/incident\/storage\/19002. Accessed: 2020-03-12.  2019. Post-mortem Google Cloud Storage Incident. https:\/\/status.cloud.google.com\/incident\/storage\/19002. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_21_1","unstructured":"2019. wrk2: A constant throughput correct latency recording variant of wrk. https:\/\/github.com\/giltene\/wrk2. Accessed: 2020-03-12.  2019. wrk2: A constant throughput correct latency recording variant of wrk. https:\/\/github.com\/giltene\/wrk2. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_22_1","unstructured":"2020. NoSQL Redis and Memcache traffic generation and benchmarking tool. https:\/\/github.com\/RedisLabs\/memtier_benchmark. Accessed: 2020-03-12.  2020. NoSQL Redis and Memcache traffic generation and benchmarking tool. https:\/\/github.com\/RedisLabs\/memtier_benchmark. Accessed: 2020-03-12."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.01.002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639988.2655736"},{"key":"e_1_3_2_1_25_1","unstructured":"J. Banks J.S. Carson and B.L. Nelson. 2010. Discrete-event System Simulation. Prentice Hall. https:\/\/books.google.pt\/books?id=cqSNnmrqqbQC  J. Banks J.S. Carson and B.L. Nelson. 2010. Discrete-event System Simulation. Prentice Hall. https:\/\/books.google.pt\/books?id=cqSNnmrqqbQC"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994031"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406267"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898442.2898444"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764876"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957007"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.811453"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05)","author":"Eriksen Marius A.","year":"2005","unstructured":"Marius A. Eriksen . 2005 . Trickle: A Userland Bandwidth Shaper for Unix-like Systems . In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05) . USENIX Association, USA, 43. Marius A. Eriksen. 2005. Trickle: A Userland Bandwidth Shaper for Unix-like Systems. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05). USENIX Association, USA, 43."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774767"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1118605"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the Linux Conference.","author":"Hemminger Stephen","year":"2005","unstructured":"Stephen Hemminger . 2005 . Network emulation with NetEm . In Proceedings of the Linux Conference. Stephen Hemminger. 2005. Network emulation with NetEm. In Proceedings of the Linux Conference."},{"key":"e_1_3_2_1_46_1","volume-title":"Large-Scale Virtualization in the Emulab Network Testbed. In USENIX 2008 Annual Technical Conference (ATC'08)","author":"Hibler Mike","year":"2008","unstructured":"Mike Hibler , Robert Ricci , Leigh Stoller , Jonathon Duerig , Shashi Guruprasad , Tim Stack , Kirk Webb , and Jay Lepreau . 2008 . Large-Scale Virtualization in the Emulab Network Testbed. In USENIX 2008 Annual Technical Conference (ATC'08) . USENIX Association, USA, 113--128. Mike Hibler, Robert Ricci, Leigh Stoller, Jonathon Duerig, Shashi Guruprasad, Tim Stack, Kirk Webb, and Jay Lepreau. 2008. Large-Scale Virtualization in the Emulab Network Testbed. In USENIX 2008 Annual Technical Conference (ATC'08). USENIX Association, USA, 113--128."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/198008.198010"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_3_2_1_49_1","volume-title":"Charging and rate control for elastic traffic. European transactions on Telecommunications 8, 1","author":"Kelly Frank","year":"1997","unstructured":"Frank Kelly . 1997. Charging and rate control for elastic traffic. European transactions on Telecommunications 8, 1 ( 1997 ), 33--37. Frank Kelly. 1997. Charging and rate control for elastic traffic. European transactions on Telecommunications 8, 1 (1997), 33--37."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3549"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068864"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"volume-title":"Ninth Workshop on Hot Topics in Networks (HotNets'10)","author":"Lantz B.","key":"e_1_3_2_1_53_1","unstructured":"B. Lantz , B. Heller , and N. McKeown . 2010. A network in a laptop: rapid prototyping for software-defined networks . In Ninth Workshop on Hot Topics in Networks (HotNets'10) . ACM. B. Lantz, B. Heller, and N. McKeown. 2010. A network in a laptop: rapid prototyping for software-defined networks. In Ninth Workshop on Hot Topics in Networks (HotNets'10). ACM."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09)","author":"Leonini Lorenzo","year":"2009","unstructured":"Lorenzo Leonini , \u00c9tienne Rivi\u00e8re , and Pascal Felber . 2009 . SPLAY: Distributed Systems Evaluation Made Simple (or How to Turn Ideas into Live Systems in a Breeze) . In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09) . USENIX Association, Berkeley, CA, USA, 185--198. http:\/\/dl.acm.org\/citation.cfm?id=1558977.1558990 Lorenzo Leonini, \u00c9tienne Rivi\u00e8re, and Pascal Felber. 2009. SPLAY: Distributed Systems Evaluation Made Simple (or How to Turn Ideas into Live Systems in a Breeze). In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI'09). USENIX Association, Berkeley, CA, USA, 185--198. http:\/\/dl.acm.org\/citation.cfm?id=1558977.1558990"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00034"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012364"},{"key":"e_1_3_2_1_58_1","volume-title":"Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux J.","author":"Merkel Dirk","year":"2014","unstructured":"Dirk Merkel . 2014 . Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux J. 2014, 239, Article Article 2 (March 2014), 1 pages. Dirk Merkel. 2014. Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux J. 2014, 239, Article Article 2 (March 2014), 1 pages."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284506"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699417"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/1358302.1358305"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.842137"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/268437.268737"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1213847"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8459905"},{"key":"e_1_3_2_1_66_1","volume-title":"IEEE Conference on. IEEE, 148--153","author":"Peuster Manuel","year":"2016","unstructured":"Manuel Peuster , Holger Karl , and Steven Van Rossem . 2016 . Medicine: Rapid prototyping of production-ready network services in multi-pop environments. In Network Function Virtualization and Software Defined Networks (NFV-SDN) , IEEE Conference on. IEEE, 148--153 . Manuel Peuster, Holger Karl, and Steven Van Rossem. 2016. Medicine: Rapid prototyping of production-ready network services in multi-pop environments. In Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE Conference on. IEEE, 148--153."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.4108\/tridentcom.2008.3155"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486027"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523638"},{"volume-title":"2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems. 519--525","author":"Puljiz Z.","key":"e_1_3_2_1_70_1","unstructured":"Z. Puljiz , R. Penco , and M. Mikuc . 2008. Performance analysis of a decentralized network simulator based on IMUNES . In 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems. 519--525 . Z. Puljiz, R. Penco, and M. Mikuc. 2008. Performance analysis of a decentralized network simulator based on IMUNES. In 2008 International Symposium on Performance Evaluation of Computer and Telecommunication Systems. 519--525."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/1973430.1973445"},{"key":"e_1_3_2_1_72_1","volume-title":"Introducing CloudLab: Scientific infrastructure for advancing cloud architectures and applications","author":"Ricci Robert","year":"2014","unstructured":"Robert Ricci , Eric Eide , and CloudLab Team . 2014. Introducing CloudLab: Scientific infrastructure for advancing cloud architectures and applications . ; login:: the magazine of USENIX & SAGE 39, 6 ( 2014 ), 36--38. Robert Ricci, Eric Eide, and CloudLab Team. 2014. Introducing CloudLab: Scientific infrastructure for advancing cloud architectures and applications. ; login:: the magazine of USENIX & SAGE 39, 6 (2014), 36--38."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107415324.004"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2008.48"},{"key":"e_1_3_2_1_76_1","volume-title":"Middleware","author":"Schiavoni Valerio","year":"2013","unstructured":"Valerio Schiavoni , Etienne Rivi\u00e8re , and Pascal Felber . 2013. SplayNet: Distributed User-Space Topology Emulation . In Middleware 2013 , David Eyers and Karsten Schwan (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 62--81. Valerio Schiavoni, Etienne Rivi\u00e8re, and Pascal Felber. 2013. SplayNet: Distributed User-Space Topology Emulation. In Middleware 2013, David Eyers and Karsten Schwan (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 62--81."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2015.17"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.40"},{"key":"e_1_3_2_1_79_1","volume-title":"DSF: A Common Platform for Distributed Systems Research and Development. In Middleware","author":"Tang Chunqiang","year":"2009","unstructured":"Chunqiang Tang . 2009 . DSF: A Common Platform for Distributed Systems Research and Development. In Middleware 2009, Jean M. Bacon and Brian F. Cooper (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 414--436. Chunqiang Tang. 2009. DSF: A Common Platform for Distributed Systems Research and Development. In Middleware 2009, Jean M. Bacon and Brian F. Cooper (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 414--436."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.107"},{"key":"e_1_3_2_1_81_1","volume-title":"SI","author":"Vahdat Amin","year":"2002","unstructured":"Amin Vahdat , Ken Yocum , Kevin Walsh , Priya Mahadevan , Dejan Kosti\u0107 , Jeff Chase , and David Becker . 2002. Scalability and accuracy in a large-scale network emulator. ACM SIGOPS Operating Systems Review 36 , SI ( 2002 ), 271--284. Amin Vahdat, Ken Yocum, Kevin Walsh, Priya Mahadevan, Dejan Kosti\u0107, Jeff Chase, and David Becker. 2002. Scalability and accuracy in a large-scale network emulator. ACM SIGOPS Operating Systems Review 36, SI (2002), 271--284."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517487"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2009.5284497"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198262"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2006.09.013"},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11)","author":"Weing\u00e4rtner Elias","year":"2011","unstructured":"Elias Weing\u00e4rtner , Florian Schmidt , Hendrik Vom Lehn , Tobias Heer , and Klaus Wehrle . 2011 . SliceTime: A Platform for Scalable and Accurate Network Emulation . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11) . USENIX Association, USA, 253--266. Elias Weing\u00e4rtner, Florian Schmidt, Hendrik Vom Lehn, Tobias Heer, and Klaus Wehrle. 2011. SliceTime: A Platform for Scalable and Accurate Network Emulation. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11). USENIX Association, USA, 253--266."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857078"},{"key":"e_1_3_2_1_88_1","volume-title":"SI","author":"White Brian","year":"2002","unstructured":"Brian White , Jay Lepreau , Leigh Stoller , Robert Ricci , Shashi Guruprasad , Mac Newbold , Mike Hibler , Chad Barb , and Abhijeet Joglekar . 2002. An integrated experimental environment for distributed systems and networks. ACM SIGOPS Operating Systems Review 36 , SI ( 2002 ), 255--270. Brian White, Jay Lepreau, Leigh Stoller, Robert Ricci, Shashi Guruprasad, Mac Newbold, Mike Hibler, Chad Barb, and Abhijeet Joglekar. 2002. An integrated experimental environment for distributed systems and networks. ACM SIGOPS Operating Systems Review 36, SI (2002), 255--270."},{"key":"e_1_3_2_1_89_1","volume-title":"Pantheon: The Training Ground for Internet Congestion-control Research. In USENIX 2018 Annual Technical Conference (ATC '18)","author":"Yan Francis Y.","year":"2018","unstructured":"Francis Y. Yan , Jestin Ma , Greg D. Hill , Deepti Raghavan , Riad S. Wahby , Philip Levis , and Keith Winstein . 2018 . Pantheon: The Training Ground for Internet Congestion-control Research. In USENIX 2018 Annual Technical Conference (ATC '18) . USENIX Association, Berkeley, CA, USA, 731--743. http:\/\/dl.acm.org\/citation.cfm?id-3277355.3277426 Francis Y. Yan, Jestin Ma, Greg D. Hill, Deepti Raghavan, Riad S. Wahby, Philip Levis, and Keith Winstein. 2018. Pantheon: The Training Ground for Internet Congestion-control Research. In USENIX 2018 Annual Technical Conference (ATC '18). USENIX Association, Berkeley, CA, USA, 731--743. http:\/\/dl.acm.org\/citation.cfm?id-3277355.3277426"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41273-016-0043-8"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Heraklion Greece","acronym":"EuroSys '20"},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:22Z","timestamp":1750199602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387540"}},"subtitle":["decentralized and dynamic topology emulation"],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":90,"alternative-id":["10.1145\/3342195.3387540","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387540","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}