{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:00:26Z","timestamp":1758819626760,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/icnp52444.2021.9651954","type":"proceedings-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T21:32:43Z","timestamp":1640727163000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["Loss-freedom, Order-preservation and No-buffering: Pick Any Two During Flow Migration in Network Functions"],"prefix":"10.1109","author":[{"given":"Radhika","family":"Sukapuram","sequence":"first","affiliation":[]},{"given":"Ranjan","family":"Patowary","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Barua","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986939"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.33"},{"key":"ref32","first-page":"23","article-title":"Cap twelve years later: How the","volume":"45","author":"brewer","year":"2012","journal-title":"rules\" have changed \" Computer"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.389"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491186"},{"key":"ref36","volume":"370","author":"bernstein","year":"1987","journal-title":"Concurrency Control and Recovery in Database Systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1999.798396"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2765636"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2876749"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162751"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2785989.2785997"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784446"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185473"},{"key":"ref16","first-page":"97","article-title":"Stateless network functions: Breaking the tight coupling of state and processing","author":"kablan","year":"2017","journal-title":"NSDI '17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00068"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431290"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"ref28","article-title":"{DAL}: A locality-optimizing distributed shared memory system","author":"n\u00e9meth","year":"2017","journal-title":"HotCloud 17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626313"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561139"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815338"},{"key":"ref6","first-page":"501","article-title":"Correctness and performance for stateful chained network functions","author":"khalid","year":"2019","journal-title":"NSDI'19"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"ref5","first-page":"299","article-title":"Elastic scaling of stateful network functions","author":"woo","year":"2018","journal-title":"NSDI'18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2760107"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180476"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919479"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"ref46","first-page":"257","article-title":"Liveness verification of stateful network functions","author":"yousefi","year":"2020","journal-title":"NSDI 20"},{"journal-title":"The Art of Multiprocessor Programming","year":"2020","author":"herlihy","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.03.009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2868050"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377748"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673873"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491191"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2910089"},{"key":"ref23","first-page":"73","article-title":"Enforcing customizable consistency properties in software-defined networks","author":"zhou","year":"2015","journal-title":"NSDI '15"},{"key":"ref44","first-page":"699","article-title":"Verifying reachability in networks with mutable datapaths","author":"panda","year":"2017","journal-title":"NSDI 17)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2388754"},{"key":"ref43","first-page":"15","article-title":"Veriflow: Verifying network-wide invariants in real time","author":"khurshid","year":"2013","journal-title":"NSDI'13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626307"}],"event":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2021,11,1]]},"location":"Dallas, TX, USA","end":{"date-parts":[[2021,11,5]]}},"container-title":["2021 IEEE 29th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9651731\/9651908\/09651954.pdf?arnumber=9651954","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:05Z","timestamp":1652202005000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9651954\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icnp52444.2021.9651954","relation":{},"subject":[],"published":{"date-parts":[[2021,11,1]]}}}