{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:28:25Z","timestamp":1774121305063,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Plan of China","award":["2017YFB0801701"],"award-info":[{"award-number":["2017YFB0801701"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472213"],"award-info":[{"award-number":["61472213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,7]]},"DOI":"10.1145\/3098822.3098826","type":"proceedings-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T13:48:54Z","timestamp":1501854534000},"page":"43-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":210,"title":["NFP"],"prefix":"10.1145","author":[{"given":"Chen","family":"Sun","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Jun","family":"Bi","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Zhilong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Heng","family":"Yu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Hongxin","family":"Hu","sequence":"additional","affiliation":[{"name":"Clemson University"}]}],"member":"320","published-online":{"date-parts":[[2017,8,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"George S Almasi and Allan Gottlieb. 1988. Highly parallel computing. (1988).  George S Almasi and Allan Gottlieb. 1988. Highly parallel computing. (1988)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491223"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Md Bari Shihabur Rahman Chowdhury Reaz Ahmed Raouf Boutaba and others. 2015. On orchestrating virtual network functions in NFV. arXiv preprint arXiv:1503.06377 (2015).  Md Bari Shihabur Rahman Chowdhury Reaz Ahmed Raouf Boutaba and others. 2015. On orchestrating virtual network functions in NFV. arXiv preprint arXiv:1503.06377 (2015).","DOI":"10.1109\/CNSM.2015.7367338"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674984"},{"key":"e_1_3_2_2_9_1","unstructured":"Cisco. 2002. Vector Packet Processing. (2002). https:\/\/wiki.fd.io\/view\/VPP  Cisco. 2002. Vector Packet Processing. (2002). https:\/\/wiki.fd.io\/view\/VPP"},{"key":"e_1_3_2_2_10_1","unstructured":"Cisco. 2017. IOS Technologies. (2017). http:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ios-technologies\/index.html  Cisco. 2017. IOS Technologies. (2017). http:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/ios-technologies\/index.html"},{"key":"e_1_3_2_2_11_1","unstructured":"Cisco. 2017. MGX 8800 Series Switches. (2017). http:\/\/www.cisco.com\/c\/en\/us\/products\/switches\/mgx-8800-series-switches\/index.html  Cisco. 2017. MGX 8800 Series Switches. (2017). http:\/\/www.cisco.com\/c\/en\/us\/products\/switches\/mgx-8800-series-switches\/index.html"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Benoit Claise. 2004. Cisco systems NetFlow services export version 9. (2004).  Benoit Claise. 2004. Cisco systems NetFlow services export version 9. (2004).","DOI":"10.17487\/rfc3954"},{"key":"e_1_3_2_2_13_1","unstructured":"David E Culler Jaswinder Pal Singh and Anoop Gupta. 1999. Parallel computer architecture: a hardware\/software approach. Gulf Professional Publishing.  David E Culler Jaswinder Pal Singh and Anoop Gupta. 1999. Parallel computer architecture: a hardware\/software approach. Gulf Professional Publishing."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_2_15_1","unstructured":"ETSI. 2017. OSM. (2017). https:\/\/osm.etsi.org\/  ETSI. 2017. OSM. (2017). https:\/\/osm.etsi.org\/"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI'14)","author":"Fayazbakhsh Seyed Kaveh","year":"2014"},{"key":"e_1_3_2_2_17_1","unstructured":"Markus Feilner. 2006. OpenVPN: Building and integrating virtual private networks. Packt Publishing Ltd.  Markus Feilner. 2006. OpenVPN: Building and integrating virtual private networks. Packt Publishing Ltd."},{"key":"e_1_3_2_2_18_1","volume-title":"VFP: A Virtual Switch Platform for Host SDN in the Public Cloud.. In NSDI. 315--328.","author":"Firestone Daniel","year":"2017"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"e_1_3_2_2_20_1","unstructured":"Linux Foundation. 2017. OpNFV. (2017).  Linux Foundation. 2017. OpNFV. (2017)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626317"},{"key":"e_1_3_2_2_22_1","first-page":"056","article-title":"Traffic control management architecture based on Linux TC [J]","volume":"20","author":"Yang","year":"2006","journal-title":"Computer Engineering and Design"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"e_1_3_2_2_24_1","volume-title":"SDN and OpenFlow World Congress.","author":"R"},{"key":"e_1_3_2_2_25_1","unstructured":"W Haeffner J Napper M Stiemerling D Lopez and J Uttaro. 2014. Service function chaining use cases in mobile networks. draft-ietf-sfc-use-case-mobility-01 (2014).  W Haeffner J Napper M Stiemerling D Lopez and J Uttaro. 2014. Service function chaining use cases in mobile networks. draft-ietf-sfc-use-case-mobility-01 (2014)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"J Halpern and C Pignataro. 2015. Service Function Chaining (SFC) Architecture. draft-ietf-sfc-architecture-07 (work in progress) (2015).  J Halpern and C Pignataro. 2015. Service Function Chaining (SFC) Architecture. draft-ietf-sfc-architecture-07 (work in progress) (2015).","DOI":"10.17487\/RFC7665"},{"key":"e_1_3_2_2_28_1","first-page":"34","article-title":"NetVM: high performance and flexible networking using virtualization on commodity platforms. Network and Service Management","volume":"12","author":"Hwang Jinho","year":"2015","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_2_29_1","unstructured":"Kai Hwang and A Faye. 1984. Computer architecture and parallel processing. (1984).  Kai Hwang and A Faye. 1984. Computer architecture and parallel processing. (1984)."},{"key":"e_1_3_2_2_30_1","unstructured":"Intel. 2012. Data Plane Development Kit (DPDK). (2012). http:\/\/dpdk.org  Intel. 2012. Data Plane Development Kit (DPDK). (2012). http:\/\/dpdk.org"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787479"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402966"},{"key":"e_1_3_2_2_33_1","unstructured":"Christoforos Kachris Georgios Sirakoulis and Dimitrios Soudris. 2014. Network Function Virtualization based on FPGAs: A Framework for all-Programmable network devices. arXiv preprint arXiv:1406.0309 (2014).  Christoforos Kachris Georgios Sirakoulis and Dimitrios Soudris. 2014. Network Function Virtualization based on FPGAs: A Framework for all-Programmable network devices. arXiv preprint arXiv:1406.0309 (2014)."},{"key":"e_1_3_2_2_34_1","first-page":"113","article-title":"Header Space Analysis: Static Checking for Networks","volume":"12","author":"Kazemian Peyman","year":"2012","journal-title":"NSDI"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_36_1","unstructured":"S Kumar M Tufail S Majee C Captari and S Homma. 2015. Service Function Chaining Use Cases in Data Centers. IETF SFC WG (2015).  S Kumar M Tufail S Majee C Captari and S Homma. 2015. Service Function Chaining Use Cases in Data Centers. IETF SFC WG (2015)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"e_1_3_2_2_38_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Martins Joao","year":"2014"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2600239.2600241"},{"key":"e_1_3_2_2_40_1","first-page":"1","article-title":"Composing Software Defined Networks","volume":"13","author":"Monsanto Christopher","year":"2013","journal-title":"NSDI"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397718.1397720"},{"key":"e_1_3_2_2_43_1","volume-title":"IETF Draft","author":"Natarajan S","year":"2015"},{"key":"e_1_3_2_2_44_1","unstructured":"A10 Networks. 2017. aFleX advanced scripting for layer 4-7 traffic management. (2017). http:\/\/www.loadbalanceworks.com\/features-aFleX.asp  A10 Networks. 2017. aFleX advanced scripting for layer 4-7 traffic management. (2017). http:\/\/www.loadbalanceworks.com\/features-aFleX.asp"},{"key":"e_1_3_2_2_45_1","unstructured":"F5 Networks. 2017. Local traffic manager. (2017). https:\/\/f5.com\/products\/modules\/local-traffic-manager  F5 Networks. 2017. Local traffic manager. (2017). https:\/\/f5.com\/products\/modules\/local-traffic-manager"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"e_1_3_2_2_47_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","volume":"16","author":"Panda Aurojit"},{"key":"e_1_3_2_2_48_1","unstructured":"David A Patterson and John L Hennessy. 2013. Computer organization and design: the hardware\/software interface. Newnes.  David A Patterson and John L Hennessy. 2013. Computer organization and design: the hardware\/software interface. Newnes."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787506"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_2_51_1","unstructured":"Paul Quinn and Uri Elzur. 2014. Network service header. draft-quinnsfc-nsh-01 (2014).  Paul Quinn and Uri Elzur. 2014. Network service header. draft-quinnsfc-nsh-01 (2014)."},{"key":"e_1_3_2_2_52_1","unstructured":"P Quinn and T Nadeau. 2014. Service function chaining problem statement. draft-ietf-sfc-problem-statement-10 (work in progress) (2014).  P Quinn and T Nadeau. 2014. Service function chaining problem statement. draft-ietf-sfc-problem-statement-10 (work in progress) (2014)."},{"key":"e_1_3_2_2_53_1","volume-title":"Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). 227--240.","author":"Rajagopalan Shriram"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1412202.1412204"},{"key":"e_1_3_2_2_55_1","first-page":"229","article-title":"Snort: Lightweight Intrusion Detection for Networks","volume":"99","author":"Roesch Martin","year":"1999","journal-title":"LISA"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019240520661"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1872007.1872052"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543763"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.5120\/8738-2991"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228331"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_6"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999602"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940147.2940155"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050236"}],"event":{"name":"SIGCOMM '17: ACM SIGCOMM 2017 Conference","location":"Los Angeles CA USA","acronym":"SIGCOMM '17","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098822.3098826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:21Z","timestamp":1750273641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098826"}},"subtitle":["Enabling Network Function Parallelism in NFV"],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":64,"alternative-id":["10.1145\/3098822.3098826","10.1145\/3098822"],"URL":"https:\/\/doi.org\/10.1145\/3098822.3098826","relation":{},"subject":[],"published":{"date-parts":[[2017,8,7]]},"assertion":[{"value":"2017-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}