{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:04:54Z","timestamp":1766732694760},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infcomw.2019.8845306","type":"proceedings-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T02:23:05Z","timestamp":1569291785000},"page":"378-384","source":"Crossref","is-referenced-by-count":5,"title":["Gossip-based monitoring of virtualized resources in 5G networks"],"prefix":"10.1109","author":[{"given":"Mauro","family":"Femminella","sequence":"first","affiliation":[{"name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy"}]},{"given":"Gianluca","family":"Reali","sequence":"additional","affiliation":[{"name":"Consorzio Nazionale Interuniversitario per le Telecomunicazioni (CNIT), Italy"}]}],"member":"263","reference":[{"volume-title":"Mobile edge computing - A key technology towards 5G","year":"2015","author":"Hu","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/COMST.2017.2745201"},{"year":"2014","journal-title":"ETSI GS NFV-MAN 001 V1.1.1","article-title":"Network functions virtualisation (NFV); management and orchestration","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2016.7452271"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MCOM.2016.7470940"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/COMST.2018.2836315"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MNET.2011.6085639"},{"author":"Martins","journal-title":"USENIXNSDI14","article-title":"Clickos and the art of network function virtualization","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2377677.2377680"},{"key":"ref10","first-page":"445","article-title":"Netvm: High performance and flexible networking using virtualization on commodity platforms","volume-title":"USENIXNSDI14","author":"Hwang"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2740070.2631426"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2740070.2626313"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CloudNet.2014.6968961"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CloudNet.2015.7335301"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/EWSDN.2015.55"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/MC.2014.328"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICNP.2013.6733615"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/MCOM.2016.7378433"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/MCOM.2017.1600940"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/NOMS.2016.7502808"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TPDS.2003.1214321"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/JPROC.2011.2159689"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CHINACOM.2007.4469548"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/12.204799"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2312005.2312031"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/NOMS.2012.6212024"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TC.2003.1176982"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.17487\/rfc4080"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/LCOMM.2016.2564960"},{"volume-title":"Open Call Deliverable OCA-DS1.1 -Advanced Networking for the EU genomic research (ARES)","year":"2015","author":"Femminella","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.23919\/ITC.2017.8065707"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.23919\/INM.2017.7987264"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/NFV-SDN.2017.8169826"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/EuCNC.2018.8442844"},{"key":"ref35","article-title":"A robust and scalable peer-to-peer gossiping protocol","author":"Voulgaris","year":"2005","journal-title":"AP2PC03"},{"volume-title":"Introduction to Algorithms","year":"2001","author":"Cormen","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/2677046.2677052"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8831168\/8845034\/08845306.pdf?arnumber=8845306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T12:13:42Z","timestamp":1709295222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8845306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/infcomw.2019.8845306","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}