{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:34:24Z","timestamp":1773117264873,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":100,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NKFIH\/OTKA","award":["135606"],"award-info":[{"award-number":["135606"]}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/T007206\/1"],"award-info":[{"award-number":["EP\/T007206\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507769","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"1148-1164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Domain specific run time optimization for software data planes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1247-9640","authenticated-orcid":false,"given":"Sebastiano","family":"Miano","sequence":"first","affiliation":[{"name":"Queen Mary University of London, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6461-1650","authenticated-orcid":false,"given":"Alireza","family":"Sanaee","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6134-7890","authenticated-orcid":false,"given":"Fulvio","family":"Risso","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5958-7817","authenticated-orcid":false,"given":"G\u00e1bor","family":"R\u00e9tv\u00e1ri","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6063-4975","authenticated-orcid":false,"given":"Gianni","family":"Antichi","sequence":"additional","affiliation":[{"name":"Queen Mary University of London, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Intel Data Direct I\/O Technology. https:\/\/www.intel.co.uk\/content\/www\/uk\/en\/io\/data-direct-i-o-technology.html [Online","year":"2021","unstructured":"2021. Intel Data Direct I\/O Technology. https:\/\/www.intel.co.uk\/content\/www\/uk\/en\/io\/data-direct-i-o-technology.html [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/www.kernel.org\/doc\/html\/latest\/networking\/af_xdp.html [Online","author":"Linux","year":"2021","unstructured":"2021. Linux AF_XDP. https:\/\/www.kernel.org\/doc\/html\/latest\/networking\/af_xdp.html [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_3_1","volume-title":"LLVM Alias Analysis. https:\/\/llvm.org\/docs\/AliasAnalysis.html [Online","year":"2021","unstructured":"2021. LLVM Alias Analysis. https:\/\/llvm.org\/docs\/AliasAnalysis.html [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/llvm.org\/docs\/MemorySSA.html [Online","author":"LLVM","year":"2021","unstructured":"2021. LLVM MemorySSA. https:\/\/llvm.org\/docs\/MemorySSA.html [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/cloudlab.us\/ [Online","year":"2022","unstructured":"2022. CloudLab. https:\/\/cloudlab.us\/ [Online; accessed 26-January-2022]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050235"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286073"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231409"},{"key":"e_1_3_2_1_9_1","volume-title":"AutoFDO tutorial. https:\/\/gcc.gnu.org\/wiki\/AutoFDO\/Tutorial [Online","author":"Authors GCC","year":"2021","unstructured":"GCC Authors. 2016. AutoFDO tutorial. https:\/\/gcc.gnu.org\/wiki\/AutoFDO\/Tutorial [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_10_1","volume-title":"secure, control, and observe services. https:\/\/istio.io\/ [Online","author":"Authors Istio","year":"2021","unstructured":"Istio Authors. 2020. Istio - Connect, secure, control, and observe services. https:\/\/istio.io\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787493"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168906"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110116"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3388242.3388291"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124680.3124747"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Scott Bradner. 1991. Benchmarking Terminology for Network Interconnection Devices. RFC Editor 1\u201312. https:\/\/www.rfc-editor.org\/rfc\/rfc1242.txt","DOI":"10.17487\/rfc1242"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Scott Bradner and Jim McQuaid. 1999. Benchmarking Methodology for Network Interconnect Devices. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc2544.txt","DOI":"10.17487\/rfc2544"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776290"},{"key":"e_1_3_2_1_21_1","volume-title":"The CAIDA Anonymized Internet Traces Data Access. https:\/\/www.caida.org\/catalog\/datasets\/passive_dataset_download\/ [Online","author":"CAIDA.","year":"2022","unstructured":"CAIDA. 2019. The CAIDA Anonymized Internet Traces Data Access. https:\/\/www.caida.org\/catalog\/datasets\/passive_dataset_download\/ [Online; accessed 26-January-2022]."},{"key":"e_1_3_2_1_22_1","unstructured":"CAIDA. 2019. The CAIDA UCSD Anonymized Internet Traces. http:\/\/www.caida.org\/data\/passive\/passive_dataset.xml [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854044"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446692"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3060609"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3107000"},{"key":"e_1_3_2_1_27_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Perf_(Linux) [Online","author":"Wikipedia","year":"2021","unstructured":"Wikipedia contributors. 2018. Perf (linux). https:\/\/en.wikipedia.org\/wiki\/Perf_(Linux) [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/DTrace [Online","author":"Dtrace Wikipedia","year":"2021","unstructured":"Wikipedia contributors. 2020. Dtrace. https:\/\/en.wikipedia.org\/wiki\/DTrace [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_29_1","volume-title":"Pin - A Dynamic Binary Instrumentation Tool. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/pin-a-dynamic-binary-instrumentation-tool.html [Online","author":"Intel Corporation","year":"2021","unstructured":"Intel Corporation. 2020. Pin - A Dynamic Binary Instrumentation Tool. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/pin-a-dynamic-binary-instrumentation-tool.html [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.591653"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380832"},{"key":"e_1_3_2_1_32_1","unstructured":"DPDK. 2018. Pktgen Traffic Generator Using DPDK. http:\/\/dpdk.org\/git\/apps\/pktgen-dpdk [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_33_1","volume-title":"L3 Forwarding with Access Control Sample Application. https:\/\/doc.dpdk.org\/guides\/sample_app_ug\/l3_forward_access_ctrl.html [Online","author":"DPDK.","year":"2021","unstructured":"DPDK. 2021. L3 Forwarding with Access Control Sample Application. https:\/\/doc.dpdk.org\/guides\/sample_app_ug\/l3_forward_access_ctrl.html [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815692"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446724"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832493"},{"key":"e_1_3_2_1_38_1","volume-title":"Vector Packet Processing (VPP) platform. https:\/\/wiki.fd.io\/view\/VPP [Online","author":"Foundation Linux","year":"2021","unstructured":"Linux Foundation. 2020. Vector Packet Processing (VPP) platform. https:\/\/wiki.fd.io\/view\/VPP [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_39_1","volume-title":"Suricata - Intrusion Detection System. https:\/\/suricata-ids.org\/ [Online","author":"Security Foundation Open Information","year":"2021","unstructured":"Open Information Security Foundation. 2020. Suricata - Intrusion Detection System. https:\/\/suricata-ids.org\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542528"},{"key":"e_1_3_2_1_41_1","volume-title":"GNU Compiler Collection. https:\/\/gcc.gnu.org\/ [Online","author":"Project GNU","year":"2021","unstructured":"GNU Project. [n.d.]. GNU Compiler Collection. https:\/\/gcc.gnu.org\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2015.7110117"},{"key":"e_1_3_2_1_44_1","unstructured":"Sangjin Han Keon Jang Aurojit Panda Shoumik Palkar Dongsu Han and Sylvia Ratnasamy. 2015. SoftNIC: A software NIC to augment hardware."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178478"},{"key":"e_1_3_2_1_46_1","volume-title":"Katran: A high performance layer 4 load balancer. https:\/\/github.com\/facebookincubator\/katran","author":"Hopps Christian","year":"2019","unstructured":"Christian Hopps. 2019. Katran: A high performance layer 4 load balancer. https:\/\/github.com\/facebookincubator\/katran"},{"key":"e_1_3_2_1_47_1","volume-title":"Kubernetes: Production-Grade Container Orchestration. https:\/\/kubernetes.io. [Online","author":"Google Inc.","year":"2019","unstructured":"Google Inc.. 2019. Kubernetes: Production-Grade Container Orchestration. https:\/\/kubernetes.io. [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_48_1","volume-title":"Propeller: Profile Guided Optimizing Large Scale LLVM-based Relinker. https:\/\/github.com\/google\/llvm-propeller [Online","author":"Google Inc.","year":"2019","unstructured":"Google Inc.. 2019. Propeller: Profile Guided Optimizing Large Scale LLVM-based Relinker. https:\/\/github.com\/google\/llvm-propeller [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_49_1","volume-title":"16th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 19)","author":"Iyer Rishabh","year":"1971","unstructured":"Rishabh Iyer, Luis Pedrosa, Arseniy Zaostrovnykh, Solal Pirelli, Katerina Argyraki, and George Candea. 2019. Performance Contracts for Software Network Functions. In 16th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 19). USENIX Association, 517\u2013530. isbn:978-1-931971-49-2"},{"key":"e_1_3_2_1_50_1","volume-title":"Kubernetes Long Road to Dual IPv4\/IPv6 Support. https:\/\/thenewstack.io\/it-takes-a-community-kubernetes-long-road-to-dual-ipv4-ipv6-support [Online","author":"Jackson Joab","year":"2021","unstructured":"Joab Jackson. 2019. Kubernetes Long Road to Dual IPv4\/IPv6 Support. https:\/\/thenewstack.io\/it-takes-a-community-kubernetes-long-road-to-dual-ipv4-ipv6-support [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512566"},{"key":"e_1_3_2_1_52_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Katsikas Georgios P.","unstructured":"Georgios P. Katsikas, Tom Barbette, Dejan Kosti\u0107, Rebecca Steinert, and Gerald Q. Maguire Jr.. 2018. Metron: NFV Service Chains at the True Speed of the Underlying Hardware. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA. 171\u2013186. isbn:978-1-939133-01-4 https:\/\/dl.acm.org\/doi\/10.5555\/3307441.3307457"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.98"},{"key":"e_1_3_2_1_54_1","volume-title":"Header Space Analysis: Static Checking for Networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). USENIX Association, San Jose, CA. 113\u2013126. isbn:978-931971-92-8 https:\/\/dl.acm.org\/doi\/10.5555\/2228298.2228311"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379165"},{"key":"e_1_3_2_1_56_1","volume-title":"DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Khan Tanvir Ahmed","year":"2021","unstructured":"Tanvir Ahmed Khan, Ian Neal, Gilles Pokam, Barzan Mozafari, and Baris Kasikci. 2021. DMon: Efficient Detection and Correction of Data Locality Problems Using Selective Profiling. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 163\u2013181. isbn:978-1-939133-22-9 https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/khan"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00027"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Mirja Kuehlewind and Brian Trammell. 2021. Manageability of the QUIC Transport Protocol.","DOI":"10.17487\/RFC9312"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_60_1","volume-title":"Oprofile: A system profiler for linux. https:\/\/oprofile.sourceforge.io\/news\/ [Online","author":"Levon John","year":"2004","unstructured":"John Levon and Philippe Elie. 2004. Oprofile: A system profiler for linux. https:\/\/oprofile.sourceforge.io\/news\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896848"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230563"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405868"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616491"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.5830832"},{"key":"e_1_3_2_1_66_1","unstructured":"Sebastiano Miano. 2021. Polycube (Morpheus branch). https:\/\/github.com\/Morpheus-compiler\/polycube\/tree\/morpheus"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371927.3371929"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901880"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850758"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055676"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934887"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428245"},{"key":"e_1_3_2_1_73_1","volume-title":"Stateless Datacenter Load-balancing with Beamer. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Olteanu Vladimir","year":"2018","unstructured":"Vladimir Olteanu, Alexandru Agache, Andrei Voinescu, and Costin Raiciu. 2018. Stateless Datacenter Load-balancing with Beamer. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA. 125\u2013139. isbn:978-1-939133-01-4 https:\/\/dl.acm.org\/doi\/10.5555\/3307441.3307453"},{"key":"e_1_3_2_1_74_1","volume-title":"https:\/\/www.openstack.org\/ [Online","author":"Authors OpenStack","year":"2021","unstructured":"OpenStack Authors. 2020. OpenStack. https:\/\/www.openstack.org\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_75_1","volume-title":"Java HotSpot VM Options. https:\/\/www.oracle.com\/java\/technologies\/javase\/vmoptions-jsp.html [Online","year":"2021","unstructured":"Oracle. 2021. Java HotSpot VM Options. https:\/\/www.oracle.com\/java\/technologies\/javase\/vmoptions-jsp.html [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_76_1","unstructured":"2018. The Open Virtual Network architecture: Tunnel Encapsulations. http:\/\/www.openvswitch.org\/support\/dist-docs\/ovn-architecture.7.html [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661201"},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201916)","author":"Panda Aurojit","year":"2016","unstructured":"Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V out of NFV. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201916). USENIX Association, USA. 203\u2013216. isbn:9781931971331 https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/panda"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230573"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872387"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131977"},{"key":"e_1_3_2_1_82_1","unstructured":"G\u00e1bor R\u00e9tv\u00e1ri L\u00e1szl\u00f3 Moln\u00e1r G\u00e1bor Enyedi and Gergely Pongr\u00e1cz. 2017. Dynamic Compilation and Optimization of Packet Processing Programs. ACM SIGCOMM NetPL."},{"key":"e_1_3_2_1_83_1","volume-title":"DPDK burst replay tool. https:\/\/github.com\/FraudBuster\/dpdk-burst-replay [Online","author":"Ribas Jonathan","year":"2021","unstructured":"Jonathan Ribas. 2019. DPDK burst replay tool. https:\/\/github.com\/FraudBuster\/dpdk-burst-replay [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC\u201912)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo. 2012. Netmap: A Novel Framework for Fast Packet I\/O. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC\u201912). USENIX Association, USA. 9. https:\/\/dl.acm.org\/doi\/10.5555\/2342821.2342830"},{"key":"e_1_3_2_1_85_1","volume-title":"Souper: A Synthesizing Superoptimizer. arxiv:1711.04422","author":"Sasnauskas Raimondas","year":"2017","unstructured":"Raimondas Sasnauskas, Yang Chen, Peter Collingbourne, Jeroen Ketema, Jubi Taneja, and John Regehr. 2017. Souper: A Synthesizing Superoptimizer. arxiv:1711.04422"},{"key":"e_1_3_2_1_86_1","volume-title":"Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Sekar Vyas","year":"1971","unstructured":"Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, and Guangyu Shi. 2012. Design and Implementation of a Consolidated Middlebox Architecture. In Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). USENIX, San Jose, CA. 323\u2013336. isbn:978-931971-92-8 https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/sekar"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775000"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775000"},{"key":"e_1_3_2_1_89_1","volume-title":"Snort - Network Intrusion Detection & Prevention System. https:\/\/www.snort.org\/ [Online","year":"2021","unstructured":"Sourcefire. 2020. Snort - Network Intrusion Detection & Prevention System. https:\/\/www.snort.org\/ [Online; accessed 07-August-2021]."},{"key":"e_1_3_2_1_90_1","unstructured":"StackOverflow. 2011. What can cause my code to run slower when the server JIT is activated? https:\/\/stackoverflow.com\/questions\/2923989\/what-can-cause-my-code-to-run-slower-when-the-server-jit-is-activated"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098826"},{"key":"e_1_3_2_1_92_1","unstructured":"David E Taylor and Jonathan S Turner. [n.d.]. Classbench Filter Set & Trace Generator. https:\/\/www.arl.wustl.edu\/classbench\/"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893156"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Patrick Wintermeyer Maria Apostolaki Alexander Dietm\u00fcller and Laurent Vanbever. 2020. P2GO: P4 Profile-Guided Optimizations. In Hot Topics in Networks (HotNets). ACM.","DOI":"10.1145\/3422604.3425941"},{"key":"e_1_3_2_1_95_1","volume-title":"Eliminating unrequired guards. https:\/\/6guts.wordpress.com\/2018\/09\/29\/eliminating-unrequired-guards\/ [Online","author":"Worthington Jonathan","year":"2021","unstructured":"Jonathan Worthington. 2018. Eliminating unrequired guards. https:\/\/6guts.wordpress.com\/2018\/09\/29\/eliminating-unrequired-guards\/ [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_96_1","unstructured":"David Wragg. 2020. Unimog - Cloudflare\u2019s edge load balancer. https:\/\/blog.cloudflare.com\/unimog-cloudflares-edge-load-balancer\/"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281426"},{"key":"e_1_3_2_1_98_1","volume-title":"bpf: adding map batch processing support. https:\/\/lwn.net\/Articles\/797808\/ [Online","author":"Song Yonghong","year":"2021","unstructured":"Yonghong Song. 2019. bpf: adding map batch processing support. https:\/\/lwn.net\/Articles\/797808\/ [Online; accessed 12-August-2021]."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00018"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259025"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":100,"alternative-id":["10.1145\/3503222.3507769","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507769","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}