{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T09:48:40Z","timestamp":1776851320561,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,21]],"date-time":"2015-08-21T00:00:00Z","timestamp":1440115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation (NSF)","award":["NeTS 1320389"],"award-info":[{"award-number":["NeTS 1320389"]}]},{"name":"National Science Foundation (NSF)","award":["XPS 1337399"],"award-info":[{"award-number":["XPS 1337399"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,21]]},"DOI":"10.1145\/2785989.2785993","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T14:09:20Z","timestamp":1440425360000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Stateless Network Functions"],"prefix":"10.1145","author":[{"given":"Murad","family":"Kablan","sequence":"first","affiliation":[{"name":"University of Colorado, Boulder, CO, USA"}]},{"given":"Blake","family":"Caldwell","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO, USA"}]},{"given":"Richard","family":"Han","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO, USA"}]},{"given":"Hani","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"IBM Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Eric","family":"Keller","sequence":"additional","affiliation":[{"name":"University of Colorado, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"airbib SmartStack. http:\/\/nerds.airbnb.com\/smartstack-service-discovery-cloud\/.  airbib SmartStack. http:\/\/nerds.airbnb.com\/smartstack-service-discovery-cloud\/."},{"key":"e_1_3_2_1_2_1","unstructured":"D-ITG Distributed Internet Traffic Generator. http:\/\/traffic.comics.unina.it\/software\/ITG\/.  D-ITG Distributed Internet Traffic Generator. http:\/\/traffic.comics.unina.it\/software\/ITG\/."},{"key":"e_1_3_2_1_3_1","unstructured":"HAProxy. http:\/\/www.haproxy.org.  HAProxy. http:\/\/www.haproxy.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Netflix Open Source Software. http:\/\/netflix.github.io\/#repo.  Netflix Open Source Software. http:\/\/netflix.github.io\/#repo."},{"key":"e_1_3_2_1_5_1","unstructured":"Netflix Ribbon. https:\/\/github.com\/Netflix\/ribbon.  Netflix Ribbon. https:\/\/github.com\/Netflix\/ribbon."},{"key":"e_1_3_2_1_6_1","unstructured":"Zuul. https:\/\/github.com\/Netflix\/zuul\/wiki.  Zuul. https:\/\/github.com\/Netflix\/zuul\/wiki."},{"key":"e_1_3_2_1_7_1","volume-title":"December","year":"2014","unstructured":"Carreira, Joao. {ramcloud-dev} Replicating Ramcloud results (latencies). https:\/\/mailman.stanford.edu\/pipermail\/ramcloud-dev\/2014-December\/001033.html , December 2014 . Carreira, Joao. {ramcloud-dev} Replicating Ramcloud results (latencies). https:\/\/mailman.stanford.edu\/pipermail\/ramcloud-dev\/2014-December\/001033.html, December 2014."},{"key":"e_1_3_2_1_8_1","unstructured":"A. Cockroft C. Hicks and G. Orzell. Lessons Netflix Learned from the AWS Outage. http:\/\/techblog.netflix.com\/2011\/04\/lessons-netflix-learned-from-aws-outage.html April 2011.  A. Cockroft C. Hicks and G. Orzell. Lessons Netflix Learned from the AWS Outage. http:\/\/techblog.netflix.com\/2011\/04\/lessons-netflix-learned-from-aws-outage.html April 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"FaRM: Fast Remote Memory. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Dragojevi\u0107 A.","year":"2014","unstructured":"A. Dragojevi\u0107 , D. Narayanan , M. Castro , and O. Hodson . FaRM: Fast Remote Memory. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , Apr 2014 . A. Dragojevi\u0107, D. Narayanan, M. Castro, and O. Hodson. FaRM: Fast Remote Memory. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of USENIX NSDI","author":"Hwang J.","year":"2014","unstructured":"J. Hwang , K. K. Ramakrishnan , and T. Wood . NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms . In Proc. of USENIX NSDI , Seattle, WA , Apr. 2014 . J. Hwang, K. K. Ramakrishnan, and T. Wood. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In Proc. of USENIX NSDI, Seattle, WA, Apr. 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4626228"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. NSDI","author":"Keller E.","year":"2010","unstructured":"E. Keller , J. Rexford , and J. Van Der Merwe. Seamless BGP Migration with Router Grafting . In Proc. NSDI , 2010 . E. Keller, J. Rexford, and J. Van Der Merwe. Seamless BGP Migration with Router Grafting. In Proc. NSDI, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of USENIX NSDI","author":"Martins J.","year":"2014","unstructured":"J. Martins , M. Ahmed , C. Raiciu , V. Olteanu , M. Honda , R. Bifulco , and F. Huici . ClickOS and the Art of Network Function Virtualization . In Proc. of USENIX NSDI , Seattle, WA , Apr. 2014 . J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco, and F. Huici. ClickOS and the Art of Network Function Virtualization. In Proc. of USENIX NSDI, Seattle, WA, Apr. 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342376"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043560"},{"key":"e_1_3_2_1_18_1","unstructured":"OpenVZ. Checkpoint\/Restore in Userspace. http:\/\/www.criu.org. Accessed: 2014-03--14.  OpenVZ. Checkpoint\/Restore in Userspace. http:\/\/www.criu.org. Accessed: 2014-03--14."},{"key":"e_1_3_2_1_19_1","unstructured":"PCI SIG. Single Root I\/O Virtualization. https:\/\/www.pcisig.com\/specifications\/iov\/single_root\/.  PCI SIG. Single Root I\/O Virtualization. https:\/\/www.pcisig.com\/specifications\/iov\/single_root\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of USENIX NSDI","author":"Rajagopalan S.","year":"2013","unstructured":"S. Rajagopalan , D. Williams , H. Jamjoom , and A. Warfield . Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes . In Proc. of USENIX NSDI , Lombard, IL , Apr. 2013 . S. Rajagopalan, D. Williams, H. Jamjoom, and A. Warfield. Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In Proc. of USENIX NSDI, Lombard, IL, Apr. 2013."},{"key":"e_1_3_2_1_22_1","unstructured":"A. Tirumala F. Qin J. Dugan J. Ferguson and K. Gibbs. Iperf: The TCP\/UDP bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects\/Iperf May 2005.  A. Tirumala F. Qin J. Dugan J. Ferguson and K. Gibbs. Iperf: The TCP\/UDP bandwidth measurement tool. http:\/\/dast.nlanr.net\/Projects\/Iperf May 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"Stateful Network Intrusion Detection on Commodity Hardware. In Proc. of International Conference on Recent Advances in Intrusion Detection","author":"Vallentin M.","year":"2007","unstructured":"M. Vallentin , R. Sommer , J. Lee , C. Leres , V. Paxson , and B. Tierney . The NIDS Cluster: Scalable , Stateful Network Intrusion Detection on Commodity Hardware. In Proc. of International Conference on Recent Advances in Intrusion Detection , 2007 . M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In Proc. of International Conference on Recent Advances in Intrusion Detection, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925869"}],"event":{"name":"SIGCOMM '15: ACM SIGCOMM 2015 Conference","location":"London United Kingdom","acronym":"SIGCOMM '15","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785989.2785993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2785989.2785993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:14Z","timestamp":1750225394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2785989.2785993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,21]]},"references-count":24,"alternative-id":["10.1145\/2785989.2785993","10.1145\/2785989"],"URL":"https:\/\/doi.org\/10.1145\/2785989.2785993","relation":{},"subject":[],"published":{"date-parts":[[2015,8,21]]},"assertion":[{"value":"2015-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}