{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:27:10Z","timestamp":1767338830233,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1109\/tnet.2024.3368130","type":"journal-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T19:03:55Z","timestamp":1709147035000},"page":"2960-2971","source":"Crossref","is-referenced-by-count":4,"title":["Asynchronous Load Balancing and Auto-Scaling: Mean-Field Limit and Optimal Design"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5541-5631","authenticated-orcid":false,"given":"Jonatha","family":"Anselmi","sequence":"first","affiliation":[{"name":"CNRS, Inria, Grenoble INP, LIG, Universit&#x00E9; Grenoble Alpes, Grenoble, France"}]}],"member":"263","reference":[{"volume-title":"Knative Docs V1.3.","year":"2022","key":"ref1"},{"volume-title":"Knative Load Balancing","year":"2022","key":"ref2"},{"volume-title":"Knative Scale Bounds","year":"2022","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811044"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-017-9547-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2950621"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2920121"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2019.1014"},{"issue":"1","key":"ref9","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1023\/A:1019160803783","article-title":"State space collapse with application to heavy traffic limits for multiclass queueing networks","volume":"30","author":"Bramson","year":"1998","journal-title":"Queueing Syst. Theory Appl."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1177004828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3045059"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104837"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2896377.2901478"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/stsy.2017.0008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2465529.2465760"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3199524.3199529"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.1999.1577"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555383"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.46.4.563"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2011.07.015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3033373"},{"key":"ref23","first-page":"203","article-title":"Optimizing serverless computing: Introducing an adaptive function placement algorithm","volume-title":"Proc. 29th Annu. Int. Conf. Comput. Sci. Softw. Eng. (CASCON)","author":"Mahmoudi"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2019.1042"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3143314.3078532"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/stsy.2019.0030"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3148149"},{"key":"ref29","first-page":"205","article-title":"Serverless in the wild: Characterizing and optimizing the serverless workload at a large cloud provider","volume-title":"Proc. USENIX Conf. Annu. Tech. Conf. (USENIX ATC)","author":"Shahrad"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-015-9448-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1287\/11-SSY033"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3376930.3376970"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/20m1323746"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3186308"},{"key":"ref35","first-page":"133","article-title":"Peeking behind the curtains of serverless platforms","volume-title":"Proc. USENIX Conf. Usenix Annu. Tech. Conf. (USENIX ATC)","author":"Wang"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10640200\/10453489.pdf?arnumber=10453489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T19:45:50Z","timestamp":1724960750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10453489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":35,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3368130","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2024,8]]}}}