{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:06Z","timestamp":1755998826067,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-1618138"],"award-info":[{"award-number":["CNS-1618138"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405876","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"390-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Microscope"],"prefix":"10.1145","author":[{"given":"Junzhi","family":"Gong","sequence":"first","affiliation":[{"name":"Harvard University"}]},{"given":"Yuliang","family":"Li","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Bilal","family":"Anwer","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Aman","family":"Shaikh","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"Harvard University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Brocade vyatta 5400 vrouter. http:\/\/www.brocade.com\/products\/all\/network-functions-virtualization\/product-details\/5400-vrouter\/index.page.  Brocade vyatta 5400 vrouter. http:\/\/www.brocade.com\/products\/all\/network-functions-virtualization\/product-details\/5400-vrouter\/index.page."},{"key":"e_1_3_2_2_2_1","unstructured":"The cooperative association for internet data analysis (caida). http:\/\/www.caida.org\/.  The cooperative association for internet data analysis (caida). http:\/\/www.caida.org\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Data plane development kit. https:\/\/www.dpdk.org\/.  Data plane development kit. https:\/\/www.dpdk.org\/."},{"key":"e_1_3_2_2_4_1","unstructured":"Evolution of the broadband network gateway. https:\/\/www.tmcnet.com\/tmc\/whitepapers\/documents\/whitepapers\/2013\/6756-evolution-the-broadband-network-gateway.pdf.  Evolution of the broadband network gateway. https:\/\/www.tmcnet.com\/tmc\/whitepapers\/documents\/whitepapers\/2013\/6756-evolution-the-broadband-network-gateway.pdf."},{"key":"e_1_3_2_2_5_1","unstructured":"Ieee standard 1588-2008. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=4579757.  Ieee standard 1588-2008. http:\/\/ieeexplore.ieee.org\/xpl\/mostRecentIssue.jsp?punumber=4579757."},{"key":"e_1_3_2_2_6_1","unstructured":"Jaeger: open source end-to-end distributed tracing. https:\/\/www.jaegertracing.io\/.  Jaeger: open source end-to-end distributed tracing. https:\/\/www.jaegertracing.io\/."},{"key":"e_1_3_2_2_7_1","unstructured":"Microscope survey form and results. https:\/\/www.dropbox.com\/s\/66cp4k3wl8zm0q5\/survey.pdf?dl=0.  Microscope survey form and results. https:\/\/www.dropbox.com\/s\/66cp4k3wl8zm0q5\/survey.pdf?dl=0."},{"key":"e_1_3_2_2_8_1","unstructured":"Migration to ethernet-based broadband aggregation. https:\/\/www.broadband-forum.org\/download\/TR-101_Issue-2.pdf.  Migration to ethernet-based broadband aggregation. https:\/\/www.broadband-forum.org\/download\/TR-101_Issue-2.pdf."},{"key":"e_1_3_2_2_9_1","unstructured":"Nfv proofs of concept. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/nfv\/nfv-poc.  Nfv proofs of concept. http:\/\/www.etsi.org\/technologies-clusters\/technologies\/nfv\/nfv-poc."},{"key":"e_1_3_2_2_10_1","unstructured":"Open vswitch. https:\/\/www.openvswitch.org\/.  Open vswitch. https:\/\/www.openvswitch.org\/."},{"key":"e_1_3_2_2_11_1","unstructured":"Vpp. https:\/\/fd.io\/.  Vpp. https:\/\/fd.io\/."},{"key":"e_1_3_2_2_12_1","unstructured":"Zipkin: A distributed tracing system. https:\/\/zipkin.io\/.  Zipkin: A distributed tracing system. https:\/\/zipkin.io\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286073"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774998"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851206"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282383"},{"key":"e_1_3_2_2_17_1","first-page":"18","volume-title":"OSDI","volume":"4","author":"Barham Paul","year":"2004","unstructured":"Paul Barham , Austin Donnelly , Rebecca Isaacs , and Richard Mortier . Using magpie for request extraction and workload modelling . In OSDI , volume 4 , pages 18 -- 18 , 2004 . Paul Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. Using magpie for request extraction and workload modelling. In OSDI, volume 4, pages 18--18, 2004."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"e_1_3_2_2_20_1","first-page":"407","volume-title":"13th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 16)","author":"Chowdhury Mosharaf","year":"2016","unstructured":"Mosharaf Chowdhury , Zhenhua Liu , Ali Ghodsi , and Ion Stoica . {HUG} : Multi-resource fairness for correlated and elastic demands . In 13th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 16) , pages 407 -- 424 , 2016 . Mosharaf Chowdhury, Zhenhua Liu, Ali Ghodsi, and Ion Stoica. {HUG}: Multi-resource fairness for correlated and elastic demands. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 16), pages 407--424, 2016."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929851"},{"key":"e_1_3_2_2_23_1","unstructured":"Daniel E Eisenbud Cheng Yi Carlo Contavalli Cody Smith Roman Kononov Eric Mann-Hielscher Ardas Cilingiroglu Bin Cheyney Wentao Shang and Jinnah Dylan Hosein. Maglev: A fast and reliable software network load balancer. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 16) pages 523--535 2016.  Daniel E Eisenbud Cheng Yi Carlo Contavalli Cody Smith Roman Kononov Eric Mann-Hielscher Ardas Cilingiroglu Bin Cheyney Wentao Shang and Jinnah Dylan Hosein. Maglev: A fast and reliable software network load balancer. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 16) pages 523--535 2016."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863972"},{"key":"e_1_3_2_2_26_1","volume-title":"4th {USENIX } Symposium on Networked Systems Design & Implementation ( {NSDI} 07)","author":"Fonseca Rodrigo","year":"2007","unstructured":"Rodrigo Fonseca , George Porter , Randy H Katz , and Scott Shenker . X-trace: A pervasive network tracing framework . In 4th {USENIX } Symposium on Networked Systems Design & Implementation ( {NSDI} 07) , 2007 . Rodrigo Fonseca, George Porter, Randy H Katz, and Scott Shenker. X-trace: A pervasive network tracing framework. In 4th {USENIX } Symposium on Networked Systems Design & Implementation ( {NSDI} 07), 2007."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626317"},{"key":"e_1_3_2_2_28_1","first-page":"81","volume-title":"15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18)","author":"Geng Yilong","year":"2018","unstructured":"Yilong Geng , Shiyu Liu , Zi Yin , Ashish Naik , Balaji Prabhakar , Mendel Rosenblum , and Amin Vahdat . Exploiting a natural network effect for scalable, fine-grained clock synchronization . In 15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18) , pages 81 -- 94 , 2018 . Yilong Geng, Shiyu Liu, Zi Yin, Ashish Naik, Balaji Prabhakar, Mendel Rosenblum, and Amin Vahdat. Exploiting a natural network effect for scalable, fine-grained clock synchronization. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18), pages 81--94, 2018."},{"key":"e_1_3_2_2_29_1","first-page":"83","volume-title":"YoungGyoun Moon, Changho Hwang, and KyoungSoo Park. Apunet: Revitalizing {GPU } as packet processing accelerator. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 17)","author":"Go Younghwan","year":"2017","unstructured":"Younghwan Go , Muhammad Asim Jamshed , YoungGyoun Moon, Changho Hwang, and KyoungSoo Park. Apunet: Revitalizing {GPU } as packet processing accelerator. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 17) , pages 83 -- 96 , 2017 . Younghwan Go, Muhammad Asim Jamshed, YoungGyoun Moon, Changho Hwang, and KyoungSoo Park. Apunet: Revitalizing {GPU } as packet processing accelerator. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 17), pages 83--96, 2017."},{"key":"e_1_3_2_2_30_1","volume-title":"Softnic: A software nic to augment hardware. EECS Department","author":"Han Sangjin","year":"2015","unstructured":"Sangjin Han , Keon Jang , Aurojit Panda , Shoumik Palkar , Dongsu Han , and Sylvia Ratnasamy . Softnic: A software nic to augment hardware. EECS Department , University of California , Berkeley, Tech . Rep. UCB\/EECS- 2015 -155, 2015. Sangjin Han, Keon Jang, Aurojit Panda, Shoumik Palkar, Dongsu Han, and Sylvia Ratnasamy. Softnic: A software nic to augment hardware. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2015-155, 2015."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851207"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"e_1_3_2_2_33_1","first-page":"1","volume-title":"NSDI","author":"Jang Keon","year":"2011","unstructured":"Keon Jang , Sangjin Han , Seungyeop Han , Sue B Moon , and KyoungSoo Park . Sslshader : Cheap ssl acceleration with commodity processors . In NSDI , pages 1 -- 14 , 2011 . Keon Jang, Sangjin Han, Seungyeop Han, Sue B Moon, and KyoungSoo Park. Sslshader: Cheap ssl acceleration with commodity processors. In NSDI, pages 1--14, 2011."},{"key":"e_1_3_2_2_34_1","first-page":"97","volume-title":"14th {USENIX } Symposium on Networked Systems Design and Implementation ({NSDI} 17)","author":"Kablan Murad","year":"2017","unstructured":"Murad Kablan , Azzam Alsudais , Eric Keller , and Franck Le . Stateless network functions: Breaking the tight coupling of state and processing . In 14th {USENIX } Symposium on Networked Systems Design and Implementation ({NSDI} 17) , pages 97 -- 112 , 2017 . Murad Kablan, Azzam Alsudais, Eric Keller, and Franck Le. Stateless network functions: Breaking the tight coupling of state and processing. In 14th {USENIX } Symposium on Networked Systems Design and Implementation ({NSDI} 17), pages 97--112, 2017."},{"key":"e_1_3_2_2_35_1","unstructured":"Kostis Kaffes Timothy Chong Jack Tigar Humphries Adam Belay David Mazi\u00e8res and Christos Kozyrakis. Shinjuku: Preemptive scheduling for &mu;second-scale tail latency. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 19) pages 345--360 2019.  Kostis Kaffes Timothy Chong Jack Tigar Humphries Adam Belay David Mazi\u00e8res and Christos Kozyrakis. Shinjuku: Preemptive scheduling for &mu;second-scale tail latency. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 19) pages 345--360 2019."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592597"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535407"},{"key":"e_1_3_2_2_38_1","first-page":"171","volume-title":"15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18)","author":"Katsikas Georgios P","year":"2018","unstructured":"Georgios P Katsikas , Tom Barbette , Dejan Kostic , Rebecca Steinert , and Gerald Q Maguire Jr . Metron:{NFV} service chains at the true speed of the underlying hardware. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18) , pages 171 -- 186 , 2018 . Georgios P Katsikas, Tom Barbette, Dejan Kostic, Rebecca Steinert, and Gerald Q Maguire Jr. Metron:{NFV} service chains at the true speed of the underlying hardware. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 18), pages 171--186, 2018."},{"key":"e_1_3_2_2_39_1","first-page":"22","volume-title":"Proceedings of the Tenth European Conference on Computer Systems","author":"Kim Joongi","unstructured":"Joongi Kim , Keon Jang , Keunhong Lee , Sangwook Ma , Junhyun Shim , and Sue Moon . Nba (network balancing act) : A high-performance packet processing framework for heterogeneous processors . In Proceedings of the Tenth European Conference on Computer Systems , page 22 . ACM, 2015. Joongi Kim, Keon Jang, Keunhong Lee, Sangwook Ma, Junhyun Shim, and Sue Moon. Nba (network balancing act): A high-performance packet processing framework for heterogeneous processors. In Proceedings of the Tenth European Conference on Computer Systems, page 22. ACM, 2015."},{"key":"e_1_3_2_2_40_1","volume-title":"The click modular router. ACM Transactions on Computer Systems (TOCS), 18(3):263--297","author":"Kohler Eddie","year":"2000","unstructured":"Eddie Kohler , Robert Morris , Benjie Chen , John Jannotti , and M Frans Kaashoek . The click modular router. ACM Transactions on Computer Systems (TOCS), 18(3):263--297 , 2000 . Eddie Kohler, Robert Morris, Benjie Chen, John Jannotti, and M Frans Kaashoek. The click modular router. ACM Transactions on Computer Systems (TOCS), 18(3):263--297, 2000."},{"key":"e_1_3_2_2_41_1","first-page":"57","volume-title":"Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation -","volume":"2","author":"Kompella Ramana Rao","year":"2005","unstructured":"Ramana Rao Kompella , Jennifer Yates , Albert Greenberg , and Alex C. Snoeren . Ip fault localization via risk modeling . In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 , NSDI'05, pages 57 -- 70 , Berkeley, CA, USA , 2005 . USENIX Association. Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren. Ip fault localization via risk modeling. In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2, NSDI'05, pages 57--70, Berkeley, CA, USA, 2005. USENIX Association."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098828"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_2_44_1","first-page":"589","volume-title":"12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15)","author":"Mace Jonathan","year":"2015","unstructured":"Jonathan Mace , Peter Bodik , Rodrigo Fonseca , and Madanlal Musuvathi . Retro: Targeted resource management in multi-tenant distributed systems . In 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15) , pages 589 -- 603 , 2015 . Jonathan Mace, Peter Bodik, Rodrigo Fonseca, and Madanlal Musuvathi. Retro: Targeted resource management in multi-tenant distributed systems. In 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15), pages 589--603, 2015."},{"key":"e_1_3_2_2_45_1","volume-title":"Pivot tracing: Dynamic causal monitoring for distributed systems. ACM Transactions on Computer Systems (TOCS), 35(4):1--28","author":"Mace Jonathan","year":"2018","unstructured":"Jonathan Mace , Ryan Roelke , and Rodrigo Fonseca . Pivot tracing: Dynamic causal monitoring for distributed systems. ACM Transactions on Computer Systems (TOCS), 35(4):1--28 , 2018 . Jonathan Mace, Ryan Roelke, and Rodrigo Fonseca. Pivot tracing: Dynamic causal monitoring for distributed systems. ACM Transactions on Computer Systems (TOCS), 35(4):1--28, 2018."},{"key":"e_1_3_2_2_46_1","first-page":"353","volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 12)","author":"Nagaraj Karthik","year":"2012","unstructured":"Karthik Nagaraj , Charles Killian , and Jennifer Neville . Structured comparative analysis of systems logs to diagnose performance problems . In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 12) , pages 353 -- 366 , 2012 . Karthik Nagaraj, Charles Killian, and Jennifer Neville. Structured comparative analysis of systems logs to diagnose performance problems. In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ( {NSDI} 12), pages 353--366, 2012."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185495"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"e_1_3_2_2_49_1","first-page":"203","volume-title":"12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16)","author":"Panda Aurojit","year":"2016","unstructured":"Aurojit Panda , Sangjin Han , Keon Jang , Melvin Walls , Sylvia Ratnasamy , and Scott Shenker . Netbricks: Taking the v out of {NFV} . In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16) , pages 203 -- 216 , 2016 . Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. Netbricks: Taking the v out of {NFV}. In 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16), pages 203--216, 2016."},{"key":"e_1_3_2_2_50_1","first-page":"101","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo . Netmap : a novel framework for fast packet i\/o . In 21st USENIX Security Symposium (USENIX Security 12) , pages 101 -- 112 , 2012 . Luigi Rizzo. Netmap: a novel framework for fast packet i\/o. In 21st USENIX Security Symposium (USENIX Security 12), pages 101--112, 2012."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098826"},{"key":"e_1_3_2_2_52_1","first-page":"363","volume-title":"13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16)","author":"Venkataraman Shivaram","year":"2016","unstructured":"Shivaram Venkataraman , Zongheng Yang , Michael Franklin , Benjamin Recht , and Ion Stoica . Ernest: efficient performance prediction for large-scale advanced analytics . In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16) , pages 363 -- 378 , 2016 . Shivaram Venkataraman, Zongheng Yang, Michael Franklin, Benjamin Recht, and Ion Stoica. Ernest: efficient performance prediction for large-scale advanced analytics. In 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16), pages 363--378, 2016."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815698"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.492975"},{"key":"e_1_3_2_2_55_1","first-page":"187","volume-title":"15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18)","author":"Zhang Kai","year":"2018","unstructured":"Kai Zhang , Bingsheng He , Jiayu Hu , Zeke Wang , Bei Hua , Jiayi Meng , and Lishan Yang . G-net : Effective {GPU} sharing in {NFV} systems . In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18) , pages 187 -- 200 , 2018 . Kai Zhang, Bingsheng He, Jiayu Hu, Zeke Wang, Bei Hua, Jiayi Meng, and Lishan Yang. G-net: Effective {GPU} sharing in {NFV} systems. In 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18), pages 187--200, 2018."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050236"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event USA","acronym":"SIGCOMM '20"},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405876","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405876","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405876"}},"subtitle":["Queue-based Performance Diagnosis for Network Functions"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":56,"alternative-id":["10.1145\/3387514.3405876","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405876","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}