{"id":"https://openalex.org/W2564901223","doi":"https://doi.org/10.1109/icnp.2016.7784473","title":"Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters","display_name":"Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2564901223","doi":"https://doi.org/10.1109/icnp.2016.7784473","mag":"2564901223"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2016.7784473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100751736","display_name":"Chen Tian","orcid":"https://orcid.org/0000-0003-2710-7628"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Tian","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110491413","display_name":"Junhua Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junhua Yan","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008787905","display_name":"Alex X. Liu","orcid":"https://orcid.org/0000-0002-6916-1326"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]},{"id":"https://openalex.org/I87216513","display_name":"Michigan State University","ror":"https://ror.org/05hs6h993","country_code":"US","type":"education","lineage":["https://openalex.org/I87216513"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Alex X. Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Michigan State University, USA","State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Michigan State University, USA","institution_ids":["https://openalex.org/I87216513"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061500481","display_name":"Yizhou Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yizhou Tang","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010604212","display_name":"Yuankun Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuankun Zhong","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100451902","display_name":"Zi Li","orcid":"https://orcid.org/0000-0001-7952-7021"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zi Li","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100751736"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.6635,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80972042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10829","display_name":"Interconnection Networks and Systems","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8063159584999084},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7034085988998413},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.675238847732544},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6631365418434143},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48490506410598755},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.4627070426940918},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.45236772298812866},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4377610683441162},{"id":"https://openalex.org/keywords/abstraction","display_name":"Abstraction","score":0.42047804594039917},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.392461895942688},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15263158082962036},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.11873573064804077},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10051751136779785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8063159584999084},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7034085988998413},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.675238847732544},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6631365418434143},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48490506410598755},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.4627070426940918},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.45236772298812866},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4377610683441162},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.42047804594039917},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.392461895942688},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15263158082962036},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.11873573064804077},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10051751136779785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2016.7784473","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784473","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1657185548","https://openalex.org/W2117884704","https://openalex.org/W2149939304","https://openalex.org/W6636819530"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"For":[0],"a":[1,4,48],"datacenter":[2],"running":[3],"data-parallel":[5,58],"analytic":[6],"framework,":[7],"minimizing":[8],"job":[9],"completion":[10],"time":[11],"(JCT)":[12],"is":[13,21,120],"crucial":[14],"for":[15,66],"application":[16,68],"performance.":[17],"The":[18],"key":[19],"observation":[20],"that":[22,51,79,91],"JCT":[23,100],"could":[24],"be":[25],"improved,":[26],"if":[27],"network":[28,86],"scheduling":[29,64],"can":[30,94],"exploit":[31],"the":[32,36,53,62,72,96,112,115],"opportunity":[33],"of":[34,38,57,101,117],"decreasing":[35,67],"amount":[37],"occupied":[39],"machine":[40],"slot-time":[41],"spend":[42],"on":[43,84],"communication.":[44],"We":[45,60,70],"propose":[46,71],"Macroflow,":[47],"networking":[49],"abstraction":[50],"captures":[52],"primitive":[54],"resource":[55],"granularity":[56],"frameworks.":[59],"study":[61],"inter-macroflow":[63],"problem":[65],"JCT.":[69],"Smallest-Macroflow-First":[73],"(SMF)":[74],"and":[75,98,108],"Smallest-Average-Macroflow-First":[76],"(SAMF)":[77],"heuristics":[78],"greedily":[80],"schedule":[81],"macroflows":[82],"based":[83],"their":[85],"footprint.":[87],"Trace-driven":[88],"simulations":[89],"demonstrate":[90],"our":[92],"algorithms":[93],"reduce":[95],"average":[97],"tail":[99],"network-intensive":[102],"jobs":[103,119],"by":[104,122],"up":[105,123],"to":[106,124],"20%":[107],"25%,":[109],"respectively;":[110],"at":[111],"same":[113],"time,":[114],"throughput":[116],"computation-intensive":[118],"increased":[121],"2.2\u00d7.":[125]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
