{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T14:56:41Z","timestamp":1777129001769,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,23]]},"DOI":"10.1145\/3230718.3230724","type":"proceedings-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T16:08:49Z","timestamp":1531498129000},"page":"125-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["VNF chain allocation and management at data center scale"],"prefix":"10.1145","author":[{"given":"Nodir","family":"Kodirov","sequence":"first","affiliation":[{"name":"University of British Columbia"}]},{"given":"Sam","family":"Bayless","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]},{"given":"Fabian","family":"Ruffy","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]},{"given":"Holger H.","family":"Hoos","sequence":"additional","affiliation":[{"name":"Universiteit Leiden and University of British Columbia"}]},{"given":"Alan J.","family":"Hu","sequence":"additional","affiliation":[{"name":"University of British Columbia"}]}],"member":"320","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Introducing data center fabric, the next-generation Facebook data center network. (2014). {Online at code.facebook.com\/posts\/360346274145943","author":"Andreyev Alexey","year":"2018","unstructured":"Alexey Andreyev . 2014. Introducing data center fabric, the next-generation Facebook data center network. (2014). {Online at code.facebook.com\/posts\/360346274145943 ; accessed 03-31- 2018 }. Alexey Andreyev. 2014. Introducing data center fabric, the next-generation Facebook data center network. (2014). {Online at code.facebook.com\/posts\/360346274145943; accessed 03-31-2018}."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774998"},{"key":"e_1_3_2_2_3_1","volume-title":"Linux Virtual Machines. (2018). {Online at azure.microsoft.com\/en-ca\/pricing\/details\/virtual-machines\/linux","author":"Azure Microsoft","year":"2018","unstructured":"Microsoft Azure . 2018. Linux Virtual Machines. (2018). {Online at azure.microsoft.com\/en-ca\/pricing\/details\/virtual-machines\/linux ; accessed 03-31- 2018 }. Microsoft Azure. 2018. Linux Virtual Machines. (2018). {Online at azure.microsoft.com\/en-ca\/pricing\/details\/virtual-machines\/linux; accessed 03-31-2018}."},{"key":"e_1_3_2_2_4_1","volume-title":"Scalable Constraint-Based Virtual Data Center Allocation. In International Joint Conference on Artificial Intelligence, IJCAI. 546--554","author":"Bayless Sam","unstructured":"Sam Bayless , Nodir Kodirov , Ivan Beschastnikh , Holger H. Hoos , and Alan J. Hu . 2017 . Scalable Constraint-Based Virtual Data Center Allocation. In International Joint Conference on Artificial Intelligence, IJCAI. 546--554 . Sam Bayless, Nodir Kodirov, Ivan Beschastnikh, Holger H. Hoos, and Alan J. Hu. 2017. Scalable Constraint-Based Virtual Data Center Allocation. In International Joint Conference on Artificial Intelligence, IJCAI. 546--554."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"key":"e_1_3_2_2_6_1","volume-title":"Conference on Network Function Visualization and Software Defined Network (NFV-SDN). 93--99","author":"Cao Lianjie","year":"2015","unstructured":"Lianjie Cao , Puneet Sharma , Sonia Fahmy , and Vinay Saxena . 2015 . NFV-VITAL: A framework for characterizing the performance of virtual network functions . In Conference on Network Function Visualization and Software Defined Network (NFV-SDN). 93--99 . Lianjie Cao, Puneet Sharma, Sonia Fahmy, and Vinay Saxena. 2015. NFV-VITAL: A framework for characterizing the performance of virtual network functions. In Conference on Network Function Visualization and Software Defined Network (NFV-SDN). 93--99."},{"key":"e_1_3_2_2_7_1","volume-title":"Real packet traces. (2009). {Online at downloads.digitalcorpora.org\/corpora\/scenarios\/2009-m57-patents\/net\/","author":"Digital Corp","year":"2018","unstructured":"Digital Corp ora. 2009. Real packet traces. (2009). {Online at downloads.digitalcorpora.org\/corpora\/scenarios\/2009-m57-patents\/net\/ ; accessed 03-31- 2018 }. Digital Corpora. 2009. Real packet traces. (2009). {Online at downloads.digitalcorpora.org\/corpora\/scenarios\/2009-m57-patents\/net\/; accessed 03-31-2018}."},{"key":"e_1_3_2_2_8_1","volume-title":"PowerEdge R730xd Rack Server. (2018). {Online at dell.com\/ca\/business\/p\/poweredge-r730xd\/pd","year":"2018","unstructured":"Dell. 2018. PowerEdge R730xd Rack Server. (2018). {Online at dell.com\/ca\/business\/p\/poweredge-r730xd\/pd ; accessed 03-31- 2018 }. Dell. 2018. PowerEdge R730xd Rack Server. (2018). {Online at dell.com\/ca\/business\/p\/poweredge-r730xd\/pd; accessed 03-31-2018}."},{"key":"e_1_3_2_2_9_1","volume-title":"Seacliff Trail: Intel FM6000.","author":"Engineering ADI","year":"2018","unstructured":"ADI Engineering . 2018 . Seacliff Trail: Intel FM6000. (2018). {Online at adiengineering.com\/products\/seacliff-trail-switch; acc.d 05-31-2018}. ADI Engineering. 2018. Seacliff Trail: Intel FM6000. (2018). {Online at adiengineering.com\/products\/seacliff-trail-switch; acc.d 05-31-2018}."},{"key":"e_1_3_2_2_10_1","volume-title":"{Online at portal.etsi.org\/NFV\/NFV_White_Paper2.pdf","author":"Whitepaper ETSI.","year":"2013","unstructured":"ETSI. 2013. NFV Whitepaper . ( 2013 ). {Online at portal.etsi.org\/NFV\/NFV_White_Paper2.pdf ; accessed 03-31-2018}. ETSI. 2013. NFV Whitepaper. (2013). {Online at portal.etsi.org\/NFV\/NFV_White_Paper2.pdf; accessed 03-31-2018}."},{"key":"e_1_3_2_2_11_1","volume-title":"Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud. CoRR","author":"Gember Aaron","year":"2013","unstructured":"Aaron Gember , Anand Krishnamurthy , Saul St. John , Robert Grandl , Xiaoyang Gao , Ashok Anand , Theophilus Benson , Aditya Akella , and Vyas Sekar . 2013 . Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud. CoRR (2013). http:\/\/arxiv.org\/abs\/1305.0209 Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Aditya Akella, and Vyas Sekar. 2013. Stratos: A Network-Aware Orchestration Layer for Middleboxes in the Cloud. CoRR (2013). http:\/\/arxiv.org\/abs\/1305.0209"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_2_14_1","volume-title":"Simplifying Software-defined Network Optimization Using SOL. In Conference on Networked Systems Design and Implementation (NSDI'16)","author":"Heorhiadi Victor","year":"2016","unstructured":"Victor Heorhiadi , Michael K. Reiter , and Vyas Sekar . 2016 . Simplifying Software-defined Network Optimization Using SOL. In Conference on Networked Systems Design and Implementation (NSDI'16) . 223--237. http:\/\/dl.acm.org\/citation.cfm?id=2930611.2930627 Victor Heorhiadi, Michael K. Reiter, and Vyas Sekar. 2016. Simplifying Software-defined Network Optimization Using SOL. In Conference on Networked Systems Design and Implementation (NSDI'16). 223--237. http:\/\/dl.acm.org\/citation.cfm?id=2930611.2930627"},{"key":"e_1_3_2_2_15_1","volume-title":"HPE Integrity BL870c i4 Server Blade. (2018). {Online at hpe.com\/us\/en\/product-catalog\/servers\/integrity-servers\/pip.hpe-integrity-bl870c-i4-server-blade.5330439.html","author":"HPE.","year":"2018","unstructured":"HPE. 2018. HPE Integrity BL870c i4 Server Blade. (2018). {Online at hpe.com\/us\/en\/product-catalog\/servers\/integrity-servers\/pip.hpe-integrity-bl870c-i4-server-blade.5330439.html ; accessed 03-31- 2018 }. HPE. 2018. HPE Integrity BL870c i4 Server Blade. (2018). {Online at hpe.com\/us\/en\/product-catalog\/servers\/integrity-servers\/pip.hpe-integrity-bl870c-i4-server-blade.5330439.html; accessed 03-31-2018}."},{"key":"e_1_3_2_2_16_1","volume-title":"CPLEX.","author":"IBM.","year":"1997","unstructured":"IBM. 1997. Optimization , CPLEX. ( 1997 ). {Onlineatwww-03.ibm.com\/software\/products\/en\/ibmilogcpleoptistud; accessed 03-31-2018}. IBM. 1997. Optimization, CPLEX. (1997). {Onlineatwww-03.ibm.com\/software\/products\/en\/ibmilogcpleoptistud; accessed 03-31-2018}."},{"key":"e_1_3_2_2_17_1","volume-title":"Ethernet Switch FM6000 Series Datasheet. (2018). {Online at intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/ethernet-switch-fm6000-series-brief.pdf","year":"2018","unstructured":"Intel. 2018. Ethernet Switch FM6000 Series Datasheet. (2018). {Online at intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/ethernet-switch-fm6000-series-brief.pdf ; accessed 03-31- 2018 }. Intel. 2018. Ethernet Switch FM6000 Series Datasheet. (2018). {Online at intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/ethernet-switch-fm6000-series-brief.pdf; accessed 03-31-2018}."},{"key":"e_1_3_2_2_18_1","volume-title":"Conference on Networked Systems Design and Implementation (NSDI'17)","author":"Jamshed Muhammad Asim","year":"2017","unstructured":"Muhammad Asim Jamshed , YoungGyoun Moon , Donghwi Kim , Dongsu Han , and KyoungSoo Park . 2017 . mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes . In Conference on Networked Systems Design and Implementation (NSDI'17) . 113--129. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/jamshed Muhammad Asim Jamshed, YoungGyoun Moon, Donghwi Kim, Dongsu Han, and KyoungSoo Park. 2017. mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. In Conference on Networked Systems Design and Implementation (NSDI'17). 113--129. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/jamshed"},{"key":"e_1_3_2_2_19_1","volume-title":"Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In Conference on Networked Systems Design and Implementation (NSDI'17)","author":"Kablan Murad","year":"2017","unstructured":"Murad Kablan , Azzam Alsudais , Eric Keller , and Franck Le . 2017 . Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In Conference on Networked Systems Design and Implementation (NSDI'17) . 97--112. http:\/\/dl.acm.org\/citation.cfm?id=3154630.3154639 Murad Kablan, Azzam Alsudais, Eric Keller, and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In Conference on Networked Systems Design and Implementation (NSDI'17). 97--112. http:\/\/dl.acm.org\/citation.cfm?id=3154630.3154639"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/368996.369025"},{"key":"e_1_3_2_2_21_1","volume-title":"Conference on Networked Systems Design and Implementation (NSDI'16)","author":"Lan Chang","year":"2016","unstructured":"Chang Lan , Justine Sherry , Raluca Ada Popa , Sylvia Ratnasamy , and Zhi Liu . 2016 . Embark: Securely Outsourcing Middleboxes to the Cloud . In Conference on Networked Systems Design and Implementation (NSDI'16) . 255--273. http:\/\/dl.acm.org\/citation.cfm?id=2930611.2930629 Chang Lan, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, and Zhi Liu. 2016. Embark: Securely Outsourcing Middleboxes to the Cloud. In Conference on Networked Systems Design and Implementation (NSDI'16). 255--273. http:\/\/dl.acm.org\/citation.cfm?id=2930611.2930629"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014205"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2015.7114738"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919491"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185495"},{"key":"e_1_3_2_2_28_1","volume-title":"Open Virtual Switch. (2018). {Online at openvswitch.org","author":"Switch Open","year":"2018","unstructured":"Open v Switch . 2018. Open Virtual Switch. (2018). {Online at openvswitch.org ; accessed 03-31- 2018 }. Open vSwitch. 2018. Open Virtual Switch. (2018). {Online at openvswitch.org; accessed 03-31-2018}."},{"key":"e_1_3_2_2_29_1","volume-title":"Overcommitting CPU and RAM. (2018). {Online at docs.openstack.org\/arch-design\/design-compute\/design-compute-overcommit.html","year":"2018","unstructured":"OpenStack. 2018. Overcommitting CPU and RAM. (2018). {Online at docs.openstack.org\/arch-design\/design-compute\/design-compute-overcommit.html ; accessed 05-31- 2018 }. OpenStack. 2018. Overcommitting CPU and RAM. (2018). {Online at docs.openstack.org\/arch-design\/design-compute\/design-compute-overcommit.html; accessed 05-31-2018}."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"e_1_3_2_2_31_1","volume-title":"Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Panda Aurojit","year":"2016","unstructured":"Aurojit Panda , Sangjin Han , Keon Jang , Melvin Walls , Sylvia Ratnasamy , and Scott Shenker . 2016 . NetBricks: Taking the V out of NFV . In Conference on Operating Systems Design and Implementation (OSDI'16) . 203--216. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026894 Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V out of NFV. In Conference on Operating Systems Design and Implementation (OSDI'16). 203--216. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026894"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919490"},{"key":"e_1_3_2_2_33_1","volume-title":"{Online at github.com\/sonata-nfv\/son-emu","author":"Peuster Manuel","year":"2017","unstructured":"Manuel Peuster , Holger Karl , and Steven van Rossem . 2017. Sonata NFVSDK. ( 2017 ). {Online at github.com\/sonata-nfv\/son-emu ; accessed 03-31-2018}. Manuel Peuster, Holger Karl, and Steven van Rossem. 2017. Sonata NFVSDK. (2017). {Online at github.com\/sonata-nfv\/son-emu; accessed 03-31-2018}."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504737"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_2_36_1","volume-title":"Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In Conference on Networked Systems Design and Implementation (NSDI'16)","author":"Rajagopalan Shriram","year":"2013","unstructured":"Shriram Rajagopalan , Dan Williams , Hani Jamjoom , and Andrew Warfield . 2013 . Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In Conference on Networked Systems Design and Implementation (NSDI'16) . 227--240. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482649 Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. 2013. Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In Conference on Networked Systems Design and Implementation (NSDI'16). 227--240. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482649"},{"key":"e_1_3_2_2_37_1","volume-title":"Ryu SDN Framework. (2018). {Online at osrg.github.io\/ryu","author":"Community Ryu","year":"2018","unstructured":"Ryu Community . 2018. Ryu SDN Framework. (2018). {Online at osrg.github.io\/ryu ; accessed 02-24- 2018 }. Ryu Community. 2018. Ryu SDN Framework. (2018). {Online at osrg.github.io\/ryu; accessed 02-24-2018}."},{"key":"e_1_3_2_2_38_1","volume-title":"Provably Efficient Algorithms for Joint Placement and Allocation of Virtual Network Functions. In IEEE Conference on Computer Communications. 1--9.","author":"Sang Yu","year":"2017","unstructured":"Yu Sang , Bo Ji , Gagan R Gupta , Xiaojiang Du , and Li Yehnology . 2017 . Provably Efficient Algorithms for Joint Placement and Allocation of Virtual Network Functions. In IEEE Conference on Computer Communications. 1--9. Yu Sang, Bo Ji, Gagan R Gupta, Xiaojiang Du, and Li Yehnology. 2017. Provably Efficient Algorithms for Joint Placement and Allocation of Virtual Network Functions. In IEEE Conference on Computer Communications. 1--9."},{"key":"e_1_3_2_2_39_1","volume-title":"Conference on Networked Systems Design and Implementation (NSDI'12)","author":"Sekar Vyas","year":"2012","unstructured":"Vyas Sekar , Norbert Egi , Sylvia Ratnasamy , Michael K. Reiter , and Guangyu Shi . 2012 . Design and Implementation of a Consolidated Middlebox Architecture . In Conference on Networked Systems Design and Implementation (NSDI'12) . 24--24. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228331 Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, and Guangyu Shi. 2012. Design and Implementation of a Consolidated Middlebox Architecture. In Conference on Networked Systems Design and Implementation (NSDI'12). 24--24. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228331"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787501"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"e_1_3_2_2_42_1","volume-title":"Network Intrusion Detection & Prevention System. (2018). {Online at snort.org","author":"Team The Snort","year":"2018","unstructured":"The Snort Team . 2018. Network Intrusion Detection & Prevention System. (2018). {Online at snort.org ; accessed 03-31- 2018 }. The Snort Team. 2018. Network Intrusion Detection & Prevention System. (2018). {Online at snort.org; accessed 03-31-2018}."},{"key":"e_1_3_2_2_43_1","unstructured":"Anduo Wang Wenchao Zhou Brighten Godfrey and Matthew Caesar. 2014. Software-Defined Networks as Databases. In Open Networking Summit. https:\/\/www.usenix.org\/conference\/ons2014\/technical-sessions\/presentation\/wang  Anduo Wang Wenchao Zhou Brighten Godfrey and Matthew Caesar. 2014. Software-Defined Networks as Databases. In Open Networking Summit. https:\/\/www.usenix.org\/conference\/ons2014\/technical-sessions\/presentation\/wang"},{"key":"e_1_3_2_2_44_1","volume-title":"Elastic Scaling of Stateful Network Functions. In Conference on Networked Systems Design and Implementation (NSDI'18)","author":"Woo Shinae","year":"2018","unstructured":"Shinae Woo , Justine Sherry , Sangjin Han , Sue Moon , Sylvia Ratnasamy , and Scott Shenker . 2018 . Elastic Scaling of Stateful Network Functions. In Conference on Networked Systems Design and Implementation (NSDI'18) . 299--312. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/woo Shinae Woo, Justine Sherry, Sangjin Han, Sue Moon, Sylvia Ratnasamy, and Scott Shenker. 2018. Elastic Scaling of Stateful Network Functions. In Conference on Networked Systems Design and Implementation (NSDI'18). 299--312. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/woo"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098827"},{"key":"e_1_3_2_2_46_1","volume-title":"Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization. In International Conference on Distributed Computing Systems (ICDCS). 731--741","author":"Zhang Qixia","year":"2017","unstructured":"Qixia Zhang , Yikai Xiao , Fangming Liu , John C.S. Lui , Jian Guo , and Tao Wang . 2017 . Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization. In International Conference on Distributed Computing Systems (ICDCS). 731--741 . Qixia Zhang, Yikai Xiao, Fangming Liu, John C.S. Lui, Jian Guo, and Tao Wang. 2017. Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization. In International Conference on Distributed Computing Systems (ICDCS). 731--741."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999602"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502435"},{"key":"e_1_3_2_2_49_1","volume-title":"Enforcing Customizable Consistency Properties in Software-Defined Networks. In Conference on Networked Systems Design and Implementation (NSDI'15)","author":"Zhou Wenxuan","unstructured":"Wenxuan Zhou , Dong Jin , Jason Croft , MatthewCaesar, and P. Brighten Godfrey . 2015 . Enforcing Customizable Consistency Properties in Software-Defined Networks. In Conference on Networked Systems Design and Implementation (NSDI'15) . 73--85. http:\/\/dl.acm.org\/citation.cfm?id=2789770.2789776 Wenxuan Zhou, Dong Jin, Jason Croft, MatthewCaesar, and P. Brighten Godfrey. 2015. Enforcing Customizable Consistency Properties in Software-Defined Networks. In Conference on Networked Systems Design and Implementation (NSDI'15). 73--85. http:\/\/dl.acm.org\/citation.cfm?id=2789770.2789776"},{"key":"e_1_3_2_2_50_1","volume-title":"{Online at zscaler.com","author":"Security Cloud","year":"2018","unstructured":"Zscaler. 2018. Cloud Security . ( 2018 ). {Online at zscaler.com ; accessed 03-31-2018}. Zscaler. 2018. Cloud Security. (2018). {Online at zscaler.com; accessed 03-31-2018}."}],"event":{"name":"ANCS '18: Symposium on Architectures for Networking and Communications Systems","location":"Ithaca New York","acronym":"ANCS '18","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"]},"container-title":["Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230724","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230718.3230724","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:29Z","timestamp":1750208249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230724"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":50,"alternative-id":["10.1145\/3230718.3230724","10.1145\/3230718"],"URL":"https:\/\/doi.org\/10.1145\/3230718.3230724","relation":{},"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"2018-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}