{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:30:45Z","timestamp":1772040645911,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1145\/2716281.2836104","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T18:16:29Z","timestamp":1476209789000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["Scaling the LTE control-plane for future mobile access"],"prefix":"10.1145","author":[{"given":"Arijit","family":"Banerjee","sequence":"first","affiliation":[{"name":"University of Utah"}]},{"given":"Rajesh","family":"Mahindra","sequence":"additional","affiliation":[{"name":"NEC Labs America Inc."}]},{"given":"Karthik","family":"Sundaresan","sequence":"additional","affiliation":[{"name":"NEC Labs America Inc."}]},{"given":"Sneha","family":"Kasera","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Kobus","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Sampath","family":"Rangarajan","sequence":"additional","affiliation":[{"name":"NEC Labs America Inc."}]}],"member":"320","published-online":{"date-parts":[[2015,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187844"},{"key":"e_1_3_2_1_2_1","unstructured":"Forecast: The Internet of Things. http:\/\/www.gartner.com\/newsroom\/id\/2636073.  Forecast: The Internet of Things. http:\/\/www.gartner.com\/newsroom\/id\/2636073."},{"key":"e_1_3_2_1_3_1","unstructured":"Signaling is growing 50% faster than data traffic. http:\/\/goo.gl\/89RtYs.  Signaling is growing 50% faster than data traffic. http:\/\/goo.gl\/89RtYs."},{"key":"e_1_3_2_1_4_1","unstructured":"Managing LTE Core Network Signaling Traffic. https:\/\/goo.gl\/2nxq0X.  Managing LTE Core Network Signaling Traffic. https:\/\/goo.gl\/2nxq0X."},{"key":"e_1_3_2_1_5_1","unstructured":"Angry Birds Ruffle Signaling Feathers. http:\/\/goo.gl\/Xqj6ti.  Angry Birds Ruffle Signaling Feathers. http:\/\/goo.gl\/Xqj6ti."},{"key":"e_1_3_2_1_6_1","unstructured":"Charting the Signaling Storms. http:\/\/tinyurl.com\/k7qqeeb.  Charting the Signaling Storms. http:\/\/tinyurl.com\/k7qqeeb."},{"key":"e_1_3_2_1_7_1","unstructured":"AT&T Domain 2.0 Vision White Paper 2013. http:\/\/tinyurl.com\/p4uv3s3.  AT&T Domain 2.0 Vision White Paper 2013. http:\/\/tinyurl.com\/p4uv3s3."},{"key":"e_1_3_2_1_8_1","unstructured":"Amazon Elastic Cloud. http:\/\/aws.amazon.com\/ec2\/.  Amazon Elastic Cloud. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213945"},{"key":"e_1_3_2_1_10_1","unstructured":"Why distribution is important in NFV? http:\/\/tinyurl.com\/kyewvqq.  Why distribution is important in NFV? http:\/\/tinyurl.com\/kyewvqq."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_12_1","unstructured":"OpenEPC. http:\/\/www.openepc.com\/.  OpenEPC. http:\/\/www.openepc.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"GPRS enhancements for E-UTRAN access. http:\/\/www.3gpp.org\/DynaReport\/23401.htm.  GPRS enhancements for E-UTRAN access. http:\/\/www.3gpp.org\/DynaReport\/23401.htm."},{"key":"e_1_3_2_1_14_1","unstructured":"MME Functions. http:\/\/goo.gl\/1BuKpB.  MME Functions. http:\/\/goo.gl\/1BuKpB."},{"key":"e_1_3_2_1_15_1","unstructured":"Path to 5G. http:\/\/tinyurl.com\/kgqe76t.  Path to 5G. http:\/\/tinyurl.com\/kgqe76t."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627585.2627594"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_3_2_1_18_1","unstructured":"Zeljko Savic. Lte design and deployment strategies. http:\/\/tinyurl.com\/lj2erpg.  Zeljko Savic. Lte design and deployment strategies. http:\/\/tinyurl.com\/lj2erpg."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254767"},{"key":"e_1_3_2_1_20_1","unstructured":"RAN Congestion Analytics. http:\/\/tinyurl.com\/nlhqg96.  RAN Congestion Analytics. http:\/\/tinyurl.com\/nlhqg96."},{"key":"e_1_3_2_1_21_1","unstructured":"VidScale Mediwarp RAN. http:\/\/www.vidscale.com.  VidScale Mediwarp RAN. http:\/\/www.vidscale.com."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"e_1_3_2_1_23_1","unstructured":"Remote Direct Memory Access (RDMA) over IP Problem Statement. http:\/\/www.ietf.org\/rfc\/rfc4297.txt\/.  Remote Direct Memory Access (RDMA) over IP Problem Statement. http:\/\/www.ietf.org\/rfc\/rfc4297.txt\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Netem. http:\/\/www.linuxfoundation.org\/collaborate\/workgroups\/networking\/netem.  Netem. http:\/\/www.linuxfoundation.org\/collaborate\/workgroups\/networking\/netem."},{"key":"e_1_3_2_1_25_1","volume-title":"NSDI","author":"Nishtala R.","year":"2013","unstructured":"R. Nishtala . Scaling Memcache at Facebook . In NSDI 2013 . R. Nishtala. Scaling Memcache at Facebook. In NSDI 2013."},{"key":"e_1_3_2_1_26_1","volume-title":"Feedback Computing","year":"2014","unstructured":"Zhang Load balancing of heterogeneous workloads in memcached clusters . In Feedback Computing , 2014 . Zhang et al. Load balancing of heterogeneous workloads in memcached clusters. In Feedback Computing, 2014."},{"key":"e_1_3_2_1_27_1","unstructured":"NEC Virtual EPC. http:\/\/tinyurl.com\/nuefq28.  NEC Virtual EPC. http:\/\/tinyurl.com\/nuefq28."},{"key":"e_1_3_2_1_28_1","unstructured":"The Journey to Packet Core Virtualization. http:\/\/resources.alcatel-lucent.com\/asset\/174234.  The Journey to Packet Core Virtualization. http:\/\/resources.alcatel-lucent.com\/asset\/174234."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535377"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674981"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21547"}],"event":{"name":"CoNEXT '15: Conference on emerging Networking Experiments and Technologies","location":"Heidelberg Germany","acronym":"CoNEXT '15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2716281.2836104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2716281.2836104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:55Z","timestamp":1750227415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2716281.2836104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":31,"alternative-id":["10.1145\/2716281.2836104","10.1145\/2716281"],"URL":"https:\/\/doi.org\/10.1145\/2716281.2836104","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"2015-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}