{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:21Z","timestamp":1759335681066},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796764","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"source":"Crossref","is-referenced-by-count":5,"title":["NFlow and MVT Abstractions for NFV Scaling"],"prefix":"10.1109","author":[{"given":"Ziyan","family":"Wu","sequence":"first","affiliation":[{"name":"University of Minnesota &#x2013; Twin Cities"}]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Minnesota &#x2013; Twin Cities"}]},{"given":"Wendi","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing Infomation Science and Technology University"}]},{"given":"Zhi-Li","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Minnesota &#x2013; Twin Cities"}]}],"member":"263","reference":[{"key":"ref39","article-title":"TRex","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365412"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3343180.3343188"},{"key":"ref32","first-page":"299","article-title":"Elastic scaling of stateful network functions","author":"woo","year":"2018","journal-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)"},{"key":"ref31","first-page":"97","article-title":"Stateless network functions: Breaking the tight coupling of state and processing","author":"kablan","year":"2017","journal-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)"},{"key":"ref30","first-page":"239","article-title":"Paving the way for NFV: Simplifying middlebox modifications using statealyzr","author":"khalid","year":"2016","journal-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.852662"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863980"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405868"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2508834.2513149"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365412"},{"key":"ref14","article-title":"Balance","author":"networks","year":"2019"},{"key":"ref15","article-title":"Haproxy-the reliable, high-performance tcp\/http load balancer","author":"tarreau","year":"0"},{"key":"ref16","article-title":"squid : Optimising web delivery","year":"0"},{"key":"ref17","article-title":"Netfilter - Firewalling, NAT, and Packet Mangling for Linux","year":"0"},{"key":"ref18","article-title":"Mazu NAT","year":"0"},{"key":"ref19","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486320"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"ref27","first-page":"171","article-title":"Metron: NFV service chains at the true speed of the underlying hardware","author":"katsikas","year":"2018","journal-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787501"},{"key":"ref6","first-page":"91","article-title":"NFV Performance Profiling on Multi-core Servers","author":"zheng","year":"2020","journal-title":"2020 IFIP Networking Conference (Networking) Networking"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900483"},{"key":"ref5","first-page":"501","article-title":"Correctness and performance for stateful chained network functions","author":"khalid","year":"2019","journal-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)"},{"key":"ref8","article-title":"Modular sdn programming with pyretic","author":"reich","year":"2013","journal-title":"Technical Reprot of USENIX"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365417"},{"key":"ref1","first-page":"227","article-title":"Split\/merge: System support for elastic execution in virtual middleboxes","author":"rajagopalan","year":"2013","journal-title":"Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)"},{"key":"ref20","article-title":"PRADS - Passive Real-time Asset Detection System","year":"0"},{"key":"ref22","first-page":"445","article-title":"Netvm: High performance and flexible networking using virtualization on commodity platforms","author":"hwang","year":"2014","journal-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)"},{"key":"ref21","article-title":"Softnic: A software nic to augment hardware","author":"han","year":"2015","journal-title":"EECS Department University of California Berkeley Tech Rep UCB\/EECS-2015-49"},{"key":"ref42","article-title":"Intel VTune Profiler","year":"0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"ref41","article-title":"Back-to-back Connection","year":"2019"},{"key":"ref23","first-page":"203","article-title":"Netbricks: Taking the v out of NFV","author":"panda","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050236"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3155921.3158429"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","location":"London, United Kingdom","start":{"date-parts":[[2022,5,2]]},"end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796764.pdf?arnumber=9796764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:49Z","timestamp":1658177209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796764","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}