{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:18:29Z","timestamp":1776885509627,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1440056, 1440065, 1700521"],"award-info":[{"award-number":["1440056, 1440065, 1700521"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405868","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"270-282","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Contention-Aware Performance Prediction For Virtualized Network Functions"],"prefix":"10.1145","author":[{"given":"Antonis","family":"Manousis","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Rahul Anand","family":"Sharma","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Vyas","family":"Sekar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Justine","family":"Sherry","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Aggregate PCM Metrics. https:\/\/software.intel.com\/en-us\/forums\/software-tuning-performance-optimization-platform-monitoring\/topic\/277497.  Aggregate PCM Metrics. https:\/\/software.intel.com\/en-us\/forums\/software-tuning-performance-optimization-platform-monitoring\/topic\/277497."},{"key":"e_1_3_2_2_2_1","unstructured":"AT&T. Domain2. https:\/\/www.att.com\/Common\/about_us\/pdf\/AT&T%20Domain%202.0%20Vision%20White%20Paper.pdf.  AT&T. Domain2. https:\/\/www.att.com\/Common\/about_us\/pdf\/AT&T%20Domain%202.0%20Vision%20White%20Paper.pdf."},{"key":"e_1_3_2_2_3_1","unstructured":"AT&T. ECOMP. https:\/\/policyforum.att.com\/wp-content\/uploads\/2017\/03\/ecomp-architecture-whitepaper-att.pdf.  AT&T. ECOMP. https:\/\/policyforum.att.com\/wp-content\/uploads\/2017\/03\/ecomp-architecture-whitepaper-att.pdf."},{"key":"e_1_3_2_2_4_1","unstructured":"Dpdk-performance tuning guide. https:\/\/doc.dpdk.org\/guides-16.11\/linux_gsg\/nic_perf_intel_platform.html.  Dpdk-performance tuning guide. https:\/\/doc.dpdk.org\/guides-16.11\/linux_gsg\/nic_perf_intel_platform.html."},{"key":"e_1_3_2_2_5_1","unstructured":"ETSI. Network Functions Virtualization. https:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf.  ETSI. Network Functions Virtualization. https:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf."},{"key":"e_1_3_2_2_6_1","unstructured":"Intel cache allocation technology. https:\/\/www.intel.com\/content\/www\/us\/en\/communications\/cache-monitoring-cache-allocation-technologies.html.  Intel cache allocation technology. https:\/\/www.intel.com\/content\/www\/us\/en\/communications\/cache-monitoring-cache-allocation-technologies.html."},{"key":"e_1_3_2_2_7_1","unstructured":"Intel direct data i\/o technology. https:\/\/www.intel.com\/content\/www\/us\/en\/io\/data-direct-i-o-technology.html.  Intel direct data i\/o technology. https:\/\/www.intel.com\/content\/www\/us\/en\/io\/data-direct-i-o-technology.html."},{"key":"e_1_3_2_2_8_1","unstructured":"Intel PCM. https:\/\/github.com\/opcm\/pcm.  Intel PCM. https:\/\/github.com\/opcm\/pcm."},{"key":"e_1_3_2_2_9_1","unstructured":"Intel skylake-x review: Core i9 7900x i7 7820x and i7 7800x tested. https:\/\/www.anandtech.com\/show\/11550\/the-intel-skylakex-review-core-i9-7900x-i7-7820x-and-i7-7800x-tested\/4.  Intel skylake-x review: Core i9 7900x i7 7820x and i7 7800x tested. https:\/\/www.anandtech.com\/show\/11550\/the-intel-skylakex-review-core-i9-7900x-i7-7820x-and-i7-7800x-tested\/4."},{"key":"e_1_3_2_2_10_1","unstructured":"Linux Foundation. OPNFV. https:\/\/www.opnfv.org\/.  Linux Foundation. OPNFV. https:\/\/www.opnfv.org\/."},{"key":"e_1_3_2_2_11_1","unstructured":"Mellanox-performance tuning guide. https:\/\/community.mellanox.com\/s\/article\/performance-tuning-for-mellanox-adapters.  Mellanox-performance tuning guide. https:\/\/community.mellanox.com\/s\/article\/performance-tuning-for-mellanox-adapters."},{"key":"e_1_3_2_2_12_1","unstructured":"Reducing os jitter due to per-cpu kthreads. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/kernel-per-CPU-kthreads.html.  Reducing os jitter due to per-cpu kthreads. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/kernel-per-CPU-kthreads.html."},{"key":"e_1_3_2_2_13_1","unstructured":"Snort: Network Intrusion Detection & Detection System. https:\/\/www.snort.org.  Snort: Network Intrusion Detection & Detection System. https:\/\/www.snort.org."},{"key":"e_1_3_2_2_14_1","unstructured":"SR-IOV. https:\/\/github.com\/intel\/sriov-network-device-plugin.  SR-IOV. https:\/\/github.com\/intel\/sriov-network-device-plugin."},{"key":"e_1_3_2_2_15_1","unstructured":"Suricata: Open source ids ips nsm ensgine. https:\/\/suricata-ids.org.  Suricata: Open source ids ips nsm ensgine. https:\/\/suricata-ids.org."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40184-8_3"},{"key":"e_1_3_2_2_17_1","volume-title":"The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3):1--154","author":"Barroso L. A.","year":"2013","unstructured":"L. A. Barroso , J. Clidaras , and U. H\u00f6lzle . The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3):1--154 , 2013 . L. A. Barroso, J. Clidaras, and U. H\u00f6lzle. The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3):1--154, 2013."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"e_1_3_2_2_19_1","volume-title":"Reed Media Services","author":"Buechler C. M.","year":"2009","unstructured":"C. M. Buechler and J. Pingle . pfsense: The definitive guide . Reed Media Services , 2009 . C. M. Buechler and J. Pingle. pfsense: The definitive guide. Reed Media Services, 2009."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451125"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541941"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/648054.743935"},{"key":"e_1_3_2_2_23_1","unstructured":"I. D. Direct. I\/o technology (intel ddio) a primer 2012.  I. D. Direct. I\/o technology (intel ddio) a primer 2012."},{"key":"e_1_3_2_2_24_1","first-page":"141","volume-title":"Proc. NSDI 12","author":"Dobrescu M.","year":"2012","unstructured":"M. Dobrescu , K. Argyraki , and S. Ratnasamy . Toward predictable performance in software packet-processing platforms . In Proc. NSDI 12 , pages 141 -- 154 , San Jose, CA , 2012 . USENIX. M. Dobrescu, K. Argyraki, and S. Ratnasamy. Toward predictable performance in software packet-processing platforms. In Proc. NSDI 12, pages 141--154, San Jose, CA, 2012. USENIX."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736058"},{"key":"e_1_3_2_2_27_1","first-page":"1189","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman J. H.","year":"2001","unstructured":"J. H. Friedman . Greedy function approximation: a gradient boosting machine. Annals of statistics , pages 1189 -- 1232 , 2001 . J. H. Friedman. Greedy function approximation: a gradient boosting machine. Annals of statistics, pages 1189--1232, 2001."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"e_1_3_2_2_29_1","volume-title":"The problem of overfitting. Journal of chemical information and computer sciences, 44(1):1--12","author":"Hawkins D. M.","year":"2004","unstructured":"D. M. Hawkins . The problem of overfitting. Journal of chemical information and computer sciences, 44(1):1--12 , 2004 . D. M. Hawkins. The problem of overfitting. Journal of chemical information and computer sciences, 44(1):1--12, 2004."},{"key":"e_1_3_2_2_30_1","first-page":"517","volume-title":"16th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)","author":"Iyer R.","year":"2019","unstructured":"R. Iyer , L. Pedrosa , A. Zaostrovnykh , S. Pirelli , K. Argyraki , and G. Candea . Performance contracts for software network functions . In 16th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19) , pages 517 -- 530 , 2019 . R. Iyer, L. Pedrosa, A. Zaostrovnykh, S. Pirelli, K. Argyraki, and G. Candea. Performance contracts for software network functions. In 16th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19), pages 517--530, 2019."},{"key":"e_1_3_2_2_31_1","first-page":"97","volume-title":"NSDI","author":"Kablan M.","year":"2017","unstructured":"M. Kablan , A. Alsudais , E. Keller , and F. Le . Stateless network functions: Breaking the tight coupling of state and processing . In NSDI , pages 97 -- 112 , 2017 . M. Kablan, A. Alsudais, E. Keller, and F. Le. Stateless network functions: Breaking the tight coupling of state and processing. In NSDI, pages 97--112, 2017."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.73"},{"key":"e_1_3_2_2_34_1","volume-title":"Netcat: Practical cache attacks from the network","author":"Kurth M.","year":"2020","unstructured":"M. Kurth , B. Gras , D. Andriesse , C. Giuffrida , H. Bos , and K. Razavi . Netcat: Practical cache attacks from the network , 2020 . M. Kurth, B. Gras, D. Andriesse, C. Giuffrida, H. Bos, and K. Razavi. Netcat: Practical cache attacks from the network, 2020."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670988"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2499271"},{"key":"e_1_3_2_2_37_1","first-page":"46","volume-title":"M. Garey, and D. Johnson. Approximation algorithms for bin packing: A survey. Approximation algorithms for NP-hard problems","author":"E.","year":"1996","unstructured":"E. C. man Jr , M. Garey, and D. Johnson. Approximation algorithms for bin packing: A survey. Approximation algorithms for NP-hard problems , pages 46 -- 93 , 1996 . E. C. man Jr, M. Garey, and D. Johnson. Approximation algorithms for bin packing: A survey. Approximation algorithms for NP-hard problems, pages 46--93, 1996."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2011.14"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155650"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2016.7810127"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"e_1_3_2_2_42_1","first-page":"203","volume-title":"OSDI","author":"Panda A.","year":"2016","unstructured":"A. Panda , S. Han , K. Jang , M. Walls , S. Ratnasamy , and S. Shenker . Netbricks: Taking the v out of nfv . In OSDI , pages 203 -- 216 , 2016 . A. Panda, S. Han, K. Jang, M. Walls, S. Ratnasamy, and S. Shenker. Netbricks: Taking the v out of nfv. In OSDI, pages 203--216, 2016."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230573"},{"key":"e_1_3_2_2_44_1","first-page":"24","volume-title":"Proc. of NSDI 2012, NSDI'12","author":"Sekar V.","year":"2012","unstructured":"V. Sekar , N. Egi , S. Ratnasamy , M. Reiter , and G. Shi . Design and implementation of a consolidated middlebox architecture . In Proc. of NSDI 2012, NSDI'12 , pages 24 -- 24 , Berkeley, CA, USA , 2012 . USENIX Association. V. Sekar, N. Egi, S. Ratnasamy, M. Reiter, and G. Shi. Design and implementation of a consolidated middlebox architecture. In Proc. of NSDI 2012, NSDI'12, pages 24--24, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"e_1_3_2_2_46_1","first-page":"33","volume-title":"16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)","author":"Stephens B.","year":"2019","unstructured":"B. Stephens , A. Akella , and M. Swift . Loom: Flexible and efficient {NIC } packet scheduling . In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19) , pages 33 -- 46 , 2019 . B. Stephens, A. Akella, and M. Swift. Loom: Flexible and efficient {NIC } packet scheduling. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19), pages 33--46, 2019."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830803"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522356"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000417.2000419"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000099"},{"key":"e_1_3_2_2_51_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation NSDI 18","author":"Tootoonchian A.","year":"2018","unstructured":"A. Tootoonchian , A. Panda , C. Lan , M. Walls , K. Argyraki , S. Ratnasamy , and S. Shenker . Resq: Enabling slos in network function virtualization . In 15th USENIX Symposium on Networked Systems Design and Implementation NSDI 18 . USENIX, 2018 . A. Tootoonchian, A. Panda, C. Lan, M. Walls, K. Argyraki, S. Ratnasamy, and S. Shenker. Resq: Enabling slos in network function virtualization. In 15th USENIX Symposium on Networked Systems Design and Implementation NSDI 18. USENIX, 2018."},{"key":"e_1_3_2_2_52_1","first-page":"35","volume-title":"Icml","volume":"97","author":"Yang Y.","year":"1997","unstructured":"Y. Yang and J. O. Pedersen . A comparative study on feature selection in text categorization . In Icml , volume 97 , page 35 , 1997 . Y. Yang and J. O. Pedersen. A comparative study on feature selection in text categorization. In Icml, volume 97, page 35, 1997."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359647"},{"key":"e_1_3_2_2_54_1","volume-title":"foundations and algorithms","author":"Zhou Z.-H.","year":"2012","unstructured":"Z.-H. Zhou . Ensemble methods : foundations and algorithms . Chapman and Hall\/CRC , 2012 . Z.-H. Zhou. Ensemble methods: foundations and algorithms. Chapman and Hall\/CRC, 2012."}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA","acronym":"SIGCOMM '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405868","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":54,"alternative-id":["10.1145\/3387514.3405868","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405868","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}