{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:58:33Z","timestamp":1772305113086,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"EU under the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership \u201cTelecommunications of the Future\u201d","award":["PE00000001"],"award-info":[{"award-number":["PE00000001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tnsm.2025.3593870","type":"journal-article","created":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T18:51:12Z","timestamp":1753901472000},"page":"5452-5463","source":"Crossref","is-referenced-by-count":1,"title":["Critical Limitations of the Least Outstanding Request Load Balancing Policy in Service Meshes for Large-Scale Microservice Applications"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0803-1392","authenticated-orcid":false,"given":"Andrea","family":"Detti","sequence":"first","affiliation":[{"name":"CNIT, Department of Electronic Engineering, University of Rome &#x201C;Tor Vergata,&#x201D;, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2225-2124","authenticated-orcid":false,"given":"Ludovico","family":"Funari","sequence":"additional","affiliation":[{"name":"CNIT, Department of Electronic Engineering, University of Rome &#x201C;Tor Vergata,&#x201D;, Rome, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67425-4_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.11"},{"key":"ref3","volume-title":"Microservices Patterns: With Examples in Java","author":"Richardson","year":"2018"},{"key":"ref4","volume-title":"(K8S): Production-grade container orchestration","year":"2025"},{"key":"ref5","volume-title":"Consul service mesh","year":"2025"},{"key":"ref6","volume-title":"Istio service mesh","year":"2025"},{"key":"ref7","volume-title":"Linkerd service mesh","year":"2025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00026"},{"key":"ref9","first-page":"969","article-title":"{ServiceRouter}: Hyperscale and minimal cost service mesh at meta","volume-title":"Proc. 17th USENIX Symp. Oper. Syst. Design Implement. (OSDI)","author":"Saokar"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/71.963420"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.012"},{"key":"ref12","volume-title":"Sock shop: A microservice demo application","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3508033"},{"key":"ref14","volume-title":"Queuing Systems, Volume I: Theory","author":"Kleinrock","year":"1975"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3154498"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/277851.277897"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3236447"},{"key":"ref18","volume-title":"Apache jmeter","year":"2025"},{"key":"ref19","volume-title":"Proxy-service repository","year":"2025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.orl.2021.06.010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2015.2428331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1980.1102445"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1978.1094075"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-022-09736-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2980061"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3453953.3453965"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3220931"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486300"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737450"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010032"},{"key":"ref31","volume-title":"Istio ambient mode","year":"2025"},{"key":"ref32","volume-title":"Merbridge-accelerate your mesh with EBPF","year":"2025"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11278396\/11104849.pdf?arnumber=11104849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:38:37Z","timestamp":1764959917000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11104849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":32,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3593870","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}