{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T06:41:57Z","timestamp":1719038517715},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T00:00:00Z","timestamp":1672185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T00:00:00Z","timestamp":1672185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["101008468"],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006463","name":"Bayerisches Staatsministerium f\u00fcr Wirtschaft und Medien, Energie und Technologie","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006463","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KISK001K","16KISK107"],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005713","name":"Technische Universit\u00e4t M\u00fcnchen","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005713","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2023,1]]},"abstract":"Abstract<\/jats:title>Throughput is a commonly used performance indicator for networks. However, throughput may be considered insignificant if data is outdated or networks become unpredictable or unreliable. Critical services may even prioritize latency, predictability, and reliability at the expense of throughput to avoid detrimental effects on service operation. Latency, predictability, and reliability are distinct qualities realized in real-time systems. Real-time systems often require additional effort using non-standard interfaces, requiring customized software, or providing low throughput figures. This work picks up the challenge and investigates a single-server network function\u2014a building block for end-to-end low-latency network applications. Assessing reliability and quantifying low latency is equally challenging, as sub-microsecond latency and $$1\/10^{5}$$<\/jats:tex-math>\n \n 1<\/mml:mn>\n \/<\/mml:mo>\n \n 10<\/mml:mn>\n 5<\/mml:mn>\n <\/mml:msup>\n <\/mml:mrow>\n <\/mml:math><\/jats:alternatives><\/jats:inline-formula> loss probability leave little room for error. Both, our measurement and the investigated platforms, rely on Linux running on off-the-shelf components. Our paper provides a comprehensive study on the impact of various components on latency and reliability, such as the central processing unit (CPU), the Linux Kernel, the network card, virtualization features, and the networking application itself. We chose Suricata, an intrusion prevention system (IPS), representing a widely deployed, typical network application as our primary subject of investigation.<\/jats:p>","DOI":"10.1007\/s10922-022-09710-3","type":"journal-article","created":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T08:02:54Z","timestamp":1672214574000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["How Low Can You Go? A Limbo Dance for Low-Latency Network Functions"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7173-3573","authenticated-orcid":false,"given":"Sebastian","family":"Gallenm\u00fcller","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2471-9864","authenticated-orcid":false,"given":"Florian","family":"Wiedner","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8808-7643","authenticated-orcid":false,"given":"Johannes","family":"Naab","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2347-1839","authenticated-orcid":false,"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,28]]},"reference":[{"key":"9710_CR1","doi-asserted-by":"publisher","unstructured":"Gallenm\u00fcller, S., Wiedner, F., Naab, J., Carle, G.: Ducked tails: trimming the tail latency of(f) packet processing systems. In: 17th international conference on network and service management, CNSM Izmir, Turkey, October 25\u201329, IEEE, 2021. https:\/\/doi.org\/10.23919\/CNSM52442.2021.9615532","DOI":"10.23919\/CNSM52442.2021.9615532"},{"key":"9710_CR2","doi-asserted-by":"publisher","unstructured":"Gallenm\u00fcller, S., Naab, J., Adam, I., Carle, G.: 5G QoS: Impact of Security Functions on Latency. In: NOMS, IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary, April 20\u201324. IEEE 2020, 1\u20139 (2020). https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110422","DOI":"10.1109\/NOMS47738.2020.9110422"},{"issue":"10","key":"9710_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MCOM.001.2000467","volume":"58","author":"S Gallenm\u00fcller","year":"2020","unstructured":"Gallenm\u00fcller, S., Naab, J., Adam, I., Carle, G.: 5G URLLC: a case study on low-latency intrusion prevention. IEEE Commun. Mag. 58(10), 35\u201341 (2020). https:\/\/doi.org\/10.1109\/MCOM.001.2000467","journal-title":"IEEE Commun. Mag."},{"key":"9710_CR4","unstructured":"NGMN Alliance, 5G E2E Technology to Support Verticals URLLC Requirements, 2019"},{"key":"9710_CR5","unstructured":"Suricata repository: https:\/\/github.com\/gallenmu\/suricata\/tree\/dpdk-21.11. Accessed 25 Nov 2022"},{"key":"9710_CR6","unstructured":"AMD, Performance Tuning Guidelines for Low Latency Response on AMD EPYC-Based Servers Application Note. http:\/\/developer.amd.com\/wp-content\/ resources\/56263-Performance-Tuning-Guidelines-PUB.pdf. Accessed 25 Nov 2022, Jun 2018"},{"key":"9710_CR7","unstructured":"Mario, J., Eder, J.: Low Latency Performance Tuning for Red Hat Enterprise Linux 7. https:\/\/access.redhat.com\/sites\/default\/files\/attachments\/201501-perf-brief-low-latency-tuning-rhel7-v2.1.pdf. Accessed 25 Nov 2022"},{"key":"9710_CR8","unstructured":"Rigtorp, E.: Low latency tuning guide. https:\/\/rigtorp.se\/low-latency-guide\/. Accessed 25 Nov 2022, Mar 2020"},{"key":"9710_CR9","unstructured":"Beierl, M.: Nfv-kvm-tuning. https:\/\/wiki.opnfv.org\/pages\/viewpage.action?pageId=2926179. Accessed 25 Nov 2022"},{"key":"9710_CR10","doi-asserted-by":"publisher","unstructured":"Li, J., Sharma, N.K., Ports, D.R.K., Gribble, S.D.: Tales of the tail: hardware, OS, and application-level sources of tail latency. In: Lazowska, E., Terry, D., Arpaci-Dusseau, R.H., Gehrke, J., Eds. Proceedings of the ACM symposium on cloud computing, Seattle, WA, USA, November 3\u20135, 2014. ACM, 2014, 9:1\u20139:14. https:\/\/doi.org\/10.1145\/2670979.2670988","DOI":"10.1145\/2670979.2670988"},{"key":"9710_CR11","unstructured":"Popescu, D., Zilberman, N., Moore, A.: Characterizing the impact of network latency on cloud-based applications\u2019 performance, 2017"},{"issue":"4","key":"9710_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/3015146","volume":"60","author":"LA Barroso","year":"2017","unstructured":"Barroso, L.A., Marty, M., Patterson, D.A., Ranganathan, P.: Attack of the killer microseconds. Commun. ACM 60(4), 48\u201354 (2017). https:\/\/doi.org\/10.1145\/3015146","journal-title":"Commun. ACM"},{"key":"9710_CR13","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Laurenzano, M.A., Mars, J., Tang, L.: SMiTe: precise QoS prediction on real-system SMT processors to improve utilization in warehouse scale computers. In: 47th annual IEEE\/ACM international symposium on microarchitecture, MICRO: Cambridge, UK, December 13\u201317, 2014. IEEE Computer Society 2014, 406\u2013418 (2014). https:\/\/doi.org\/10.1109\/MICRO.2014.53","DOI":"10.1109\/MICRO.2014.53"},{"issue":"2","key":"9710_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s00450-014-0270-z","volume":"30","author":"R Sch\u00f6ne","year":"2015","unstructured":"Sch\u00f6ne, R., Molka, D., Werner, M.: Wake-up latencies for processor idle states on current x86 processors. Comput. Sci. R &D 30(2), 219\u2013227 (2015). https:\/\/doi.org\/10.1007\/s00450-014-0270-z","journal-title":"Comput. Sci. R &D"},{"key":"9710_CR15","doi-asserted-by":"publisher","unstructured":"Herdrich, A., Verplanke, E., Autee, P., Illikkal, R., Gianos, C., Singhal, R., Iyer, R.: Cache QoS: from concept to reality in the Intel Xeon E5-2600 v3 Product Family. In: 2016 IEEE International Symposium on High Performance Computer Architecture, HPCA 2016, Barcelona, Spain, March 12\u201316, 2016, 2016, pp. 657\u2013668. https:\/\/doi.org\/10.1109\/HPCA.2016.7446102","DOI":"10.1109\/HPCA.2016.7446102"},{"key":"9710_CR16","unstructured":"Aleksinski, M. et al.: intel-cmt-cat. https:\/\/github.com\/intel\/intel-cmt-cat. Accessed 25 Nov 2022"},{"issue":"2","key":"9710_CR17","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/s10922-017-9417-0","volume":"26","author":"P Emmerich","year":"2018","unstructured":"Emmerich, P., Raumer, D., Gallenm\u00fcller, S., Wohlfart, F., Carle, G.: Throughput and latency of virtual switching with open vswitch: a quantitative analysis. J. Netw. Syst. Manag. 26(2), 314\u2013338 (2018). https:\/\/doi.org\/10.1007\/s10922-017-9417-0","journal-title":"J. Netw. Syst. Manag."},{"key":"9710_CR18","doi-asserted-by":"publisher","unstructured":"Lettieri, G., Maffione, V., Rizzo, L., \u201cA Survey of Fast Packet I, O Technologies for Network Function Virtualization,\u201d in High Performance Computing - ISC High Performance,: International Workshops, Frankfurt, Germany, June 18\u201322, 2017. Revised Selected Papers 2017, 579\u2013590 (2017). https:\/\/doi.org\/10.1007\/978-3-319-67630-2_40","DOI":"10.1007\/978-3-319-67630-2_40"},{"key":"9710_CR19","doi-asserted-by":"publisher","unstructured":"Xu, X., Davda, B.: SRVM: hypervisor support for live migration with passthrough SR-IOV network devices. In: Proceedings of the 12th ACM SIGPLAN\/SIGOPS international conference on virtual execution environments, Atlanta, GA, USA, April 2\u20133, 2016, 2016, pp. 65\u201377. https:\/\/doi.org\/10.1145\/2892242.2892256.","DOI":"10.1145\/2892242.2892256"},{"issue":"5","key":"9710_CR20","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JSAC.2019.2906788","volume":"37","author":"Z Xiang","year":"2019","unstructured":"Xiang, Z., Gabriel, F., Urbano, E., Nguyen, G.T., Reisslein, M., Fitzek, F.H.P.: Reducing Latency in Virtual Machines: Enabling Tactile Internet for Human-Machine Co-Working. IEEE J. Select. Areas Commun. 37(5), 1098\u20131116 (2019). https:\/\/doi.org\/10.1109\/JSAC.2019.2906788","journal-title":"IEEE J. Select. Areas Commun."},{"key":"9710_CR21","doi-asserted-by":"publisher","unstructured":"Zilberman, N., Grosvenor, M.P., Popescu, D.A., Bojan, N.M., Antichi, G., W\u00f3jcik, M., Moore, A.W.: Where has my time gone? In: Passive and active measurement - 18th international conference, PAM 2017, Sydney, NSW, Australia, March 30\u201331, 2017, Proceedings, 2017, pp. 201\u2013214. https:\/\/doi.org\/10.1007\/978-3-319-54328-4_15.","DOI":"10.1007\/978-3-319-54328-4_15"},{"key":"9710_CR22","unstructured":"Ramsauer, R., Kiszka, J., Lohmann, D., Mauerer, W.: Look mum, no VM exits! (almost), CoRR, vol. abs\/1705.06932, 2017. arXiv: 1705. 06932. [Online]. http:\/\/arxiv.org\/abs\/1705.06932"},{"key":"9710_CR23","unstructured":"Kaiser, R., Wagner, S.: Evolution of the PikeOS Microkernel. In: First international workshop on microkernels for embedded systems, vol. 50, Jan 2007"},{"issue":"1","key":"9710_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3297714","volume":"52","author":"F Reghenzani","year":"2019","unstructured":"Reghenzani, F., Massari, G., Fornaciari, W.: The Real-Time Linux Kernel: a survey on PREEMPT_RT. ACM Comput. Surv. 52(1), 1\u201336 (2019). https:\/\/doi.org\/10.1145\/3297714","journal-title":"ACM Comput. Surv."},{"key":"9710_CR25","unstructured":"n.a., $${NO}_{HZ}$$: Reducing Scheduling-Clock Ticks. https:\/\/www.kernel.org\/doc\/Documentation\/timers\/NO%7B%5C_%7DHZ.txt. Accessed 25 Nov 2022"},{"key":"9710_CR26","doi-asserted-by":"publisher","unstructured":"Emmerich, P., Raumer, D., Beifu\u00df, A., Erlacher, L., Wohlfart, F., Runge, T.M., Gallenm\u00fcller, S., Carle, G.: Optimizing latency and CPU load in packet processing systems. In: Proceedings of the international symposium on performance evaluation of computer and telecommunication systems, Chicago, IL, USA, July 26\u201329, 2015, IEEE, 2015, 6:1\u20136:8. https:\/\/doi.org\/10.1109\/SPECTS.2015.7285275.","DOI":"10.1109\/SPECTS.2015.7285275."},{"key":"9710_CR27","unstructured":"Salim, J.H.: When napi comes to town. In: Linux 2005 conference 2005"},{"key":"9710_CR28","unstructured":"DPDK repository. https:\/\/github.com\/gallenmu\/dpdk-1\/tree\/21.11-low-latency. Accessed 25 Nov 2022"},{"key":"9710_CR29","doi-asserted-by":"publisher","unstructured":"H\u00f8iland-J\u00f8rgensen, T., Brouer, J.D., Borkmann, D., Fastabend, J., Herbert, T., Ahern, D., Miller, D.: The eXpress Data Path: fast programmable packet processing in the operating system kernel. In: Proceedings of the 14th international Conference on emerging Networking EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December 04-07, 2018, 2018, pp. 54\u201366. https:\/\/doi.org\/10.1145\/3281411.3281443.","DOI":"10.1145\/3281411.3281443."},{"key":"9710_CR30","doi-asserted-by":"publisher","unstructured":"Deri, L.: nCap: wire-speed packet capture and transmission. In: Third IEEE\/IFIP workshop on end-to-end monitoring techniques and services, E2EMON: 15th May 2005. Nice, France, IEEE Computer Society 2005, 47\u201355 (2005). https:\/\/doi.org\/10.1109\/E2EMON.2005.1564468","DOI":"10.1109\/E2EMON.2005.1564468"},{"key":"9710_CR31","unstructured":"Rizzo, L.: netmap: a novel framework for fast packet I\/O. In: Heiser, G., Hsieh, W.C., Eds., 2012 USENIX annual technical conference, Boston, MA, USA, June 13\u201315, 2012. USENIX Association, 2012, pp. 101\u2013 112. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/ technical-sessions\/presentation\/rizzo"},{"key":"9710_CR32","doi-asserted-by":"publisher","unstructured":"Gallenm\u00fcller, S., Emmerich, P., Wohlfart, F., Raumer, D., Carle, G.: Comparison of frameworks for high-performance packet IO. In: Proceedings of the eleventh ACM\/IEEE symposium on architectures for networking and communications systems, ANCS 2015, Oakland, CA, USA, May 7\u20138, 2015, IEEE Computer Society, 2015, pp. 29\u201338. https:\/\/doi.org\/10.1109\/ANCS.2015.7110118","DOI":"10.1109\/ANCS.2015.7110118"},{"key":"9710_CR33","doi-asserted-by":"publisher","unstructured":"Emmerich, P.,Gallenm\u00fcller, S.,Raumer, D., Wohlfart, F., Carle, G.: MoonGen: a scriptable high-speed packet generator. In: Cho, K., Fukuda, K., Pai, B.S., Spring, N., Eds., Proceedings of the 2015 ACM internet measurement conference, IMC 2015, Tokyo, Japan, October 28\u201330, 2015. ACM, 2015, pp. 275\u2013287. https:\/\/doi.org\/10.1145\/2815675.2815692","DOI":"10.1145\/2815675.2815692"},{"key":"9710_CR34","doi-asserted-by":"publisher","unstructured":"Emmerich, P., Gallenm\u00fcller, S., Antichi, G., Moore, A.W., Carle, G.: Mind the gap - a comparison of software packet generators. In: ACM\/IEEE symposium on architectures for networking and communications systems, ANCS, Beijing, China, May 18\u201319, IEEE Computer Society, 2017, pp. 191\u2013203. https:\/\/doi.org\/10.1109\/ANCS.2017.32","DOI":"10.1109\/ANCS.2017.32"},{"issue":"5","key":"9710_CR35","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2014.6915433","volume":"28","author":"G Antichi","year":"2014","unstructured":"Antichi, G., Shahbaz, M., Geng, Y., Zilberman, N., Covington, G.A., Bruyere, M., McKeown, N., Feamster, N., Felderman, B., Blott, M., Moore, A.W., Owezarski, P.: OSNT: open source network tester. IEEE Netw. 28(5), 6\u201312 (2014). https:\/\/doi.org\/10.1109\/MNET.2014.6915433","journal-title":"IEEE Netw."},{"key":"9710_CR36","unstructured":"Silicom, Datasheet PE310G4TSF4I71. https:\/\/www.silicom-usa.com\/wp-content\/uploads\/ 2016\/08\/PE310G4TSF4I71-Programmable-Application-Acceleration- 10G.pdf. Accessed 25 Nov 2022"},{"issue":"5","key":"9710_CR37","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/3155055.3155065","volume":"47","author":"M Primorac","year":"2017","unstructured":"Primorac, M., Bugnion, E., Argyraki, K.J.: How to measure the killer microsecond. Comput. Commun. Rev. 47(5), 61\u201366 (2017). https:\/\/doi.org\/10.1145\/3155055.3155065","journal-title":"Comput. Commun. Rev."},{"key":"9710_CR38","doi-asserted-by":"publisher","unstructured":"Zhang, X., Li, C., Zheng, W.: Intrusion prevention system design. In: 2004 international conference on computer and information technology (CIT 2004), 14\u201316 September 2004, Wuhan, China, IEEE Computer Society, 2004, pp. 386\u2013390. https:\/\/doi.org\/10.1109\/CIT.2004.1357226","DOI":"10.1109\/CIT.2004.1357226"},{"key":"9710_CR39","doi-asserted-by":"publisher","unstructured":"Albin, E., Rowe, N.C.: Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems. In: 26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26\u201329, 2012, L. Barolli, T. Enokido, F. Xhafa, and M. Takizawa, Eds., IEEE Computer Society, 2012, pp. 122\u2013127. https:\/\/doi.org\/10.1109\/WAINA.2012.29","DOI":"10.1109\/WAINA.2012.29"},{"key":"9710_CR40","unstructured":"Julien V., et al.: Suricata User Guide. https:\/\/suricata.readthedocs.io\/en\/latest\/. Accessed 25 Nov 2022"},{"key":"9710_CR41","unstructured":"Julien, V., Simis, L.: dpdk: initial support with workers runmode. https:\/\/github.com\/OISF\/suricata\/commit\/a7faed12450b85e9108868861723741fc93716fa. Accessed 25 Nov 2022"},{"key":"9710_CR42","doi-asserted-by":"crossref","unstructured":"Gupta, A., Sharma, L.S.: Performance Evaluation of Snort and Suricata Intrusion Detection Systems on Ubuntu Server. In: Proceedings of ICRIC 2019, Springer, 2020, pp. 811\u2013821","DOI":"10.1007\/978-3-030-29407-6_58"},{"key":"9710_CR43","unstructured":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual, 325462- 075US, Intel, Jun 2021"},{"key":"9710_CR44","unstructured":"ISO 5725-1: 1994: Accuracy (Trueness and Precision) of Measurement Methods and Results-Part 1: General Principles and Definitions. International Organization for Standardization, 1994"},{"key":"9710_CR45","unstructured":"Intel 82599 10 GbE Controller - Datasheet, 331520-005, Rev. 3.4, Intel, Nov 2019"},{"key":"9710_CR46","unstructured":"Intel Ethernet Controller X710\/XXV710\/XL710 Datasheet, 332464-020, Rev. 3.65, Intel, Aug 2019"},{"key":"9710_CR47","unstructured":"Intel Ethernet Controller X550 - Datasheet, 333369-005, Rev. 2.3, Intel, Nov 2018"},{"key":"9710_CR48","unstructured":"PostgreSQL Global Development Group, PostgreSQL, Jul 2021. https:\/\/www.postgresql.org\/"},{"key":"9710_CR49","doi-asserted-by":"publisher","unstructured":"Gallenm\u00fcller, S., Scholz, D., Stubbe, H., Carle, G.: The pos Framework: A Methodology and Toolchain for Reproducible Network Experiments. In: CoNEXT \u201921: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7\u201310, ACM, 2021, pp. 259\u2013266. https:\/\/doi.org\/10.1145\/3485983.3494841","DOI":"10.1145\/3485983.3494841"},{"key":"9710_CR50","unstructured":"Tene, G.: HdrHistogram: A High Dynamic Range Histogram. http:\/\/hdrhistogram.org\/. Accessed 25 Nov 2022"},{"key":"9710_CR51","unstructured":"Intel Ethernet Controller E810 Datasheet, 613875-005, Rev. 2.3, Intel, Sep 2021"},{"key":"9710_CR52","unstructured":"Gallenm\u00fcller, S., Wiedner, F., Naab, J., Carle, G.: latency-limbo repository. https:\/\/gallenmu.github.io\/latency-limbo. Accessed 25 Nov 2022"},{"key":"9710_CR53","unstructured":"Gallenm\u00fcller, S., Wiedner, F., Naab, J., Carle, G.: latency-limbo repository. https:\/\/github.com\/gallenmu\/latency-limbo. Accessed 25 Nov 2022"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-022-09710-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-022-09710-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-022-09710-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T02:14:07Z","timestamp":1675304047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-022-09710-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,28]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["9710"],"URL":"https:\/\/doi.org\/10.1007\/s10922-022-09710-3","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,28]]},"assertion":[{"value":"1 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"20"}}