{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T09:07:44Z","timestamp":1750410464556,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,23]]},"DOI":"10.1145\/3230718.3230731","type":"proceedings-article","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T16:08:49Z","timestamp":1531498129000},"page":"141-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["FTvNF"],"prefix":"10.1145","author":[{"given":"Yotam","family":"Harchol","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"David","family":"Hay","sequence":"additional","affiliation":[{"name":"The Hebrew University, Jerusalem, Israel"}]},{"given":"Tal","family":"Orenstein","sequence":"additional","affiliation":[{"name":"The Hebrew University, Jerusalem, Israel"}]}],"member":"320","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"volume-title":"CORFU: A Shared Log Design for Flash Clusters.. In NSDI. 1--14.","year":"2012","author":"Balakrishnan M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934875"},{"volume-title":"Remus: High Availability via Asynchronous Virtual Machine Replication. In NSDI. 161--174.","year":"2008","author":"Cully B.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523630"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_6_1","unstructured":"ETSI. 2012. Network Functions Virtualization - Introductory White Paper. (2012). http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf.  ETSI. 2012. Network Functions Virtualization - Introductory White Paper. (2012). http:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"S. K. Fayazbakhsh L. Chiang V. Sekar M. Yu and J. C. Mogul. 2014. Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions Using Flowtags. In NSDI. 533--546.   S. K. Fayazbakhsh L. Chiang V. Sekar M. Yu and J. C. Mogul. 2014. Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions Using Flowtags. In NSDI. 533--546.","DOI":"10.1145\/2491185.2491203"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"volume-title":"Geneve: Generic Network Virtualization Encapsulation. IETF Internet-Draft. (November","year":"2015","author":"Gross J.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"M. Kablan A. Alsudais E. Keller and F. Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In NSDI. 97--112.   M. Kablan A. Alsudais E. Keller and F. Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In NSDI. 97--112."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2703080"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Y. Kanizo O. Rottenstreich I. Segall and J. Yallouz. 2018. Designing Optimal Middlebox Recovery Schemes with Performance Guarantees. In INFOCOM.  Y. Kanizo O. Rottenstreich I. Segall and J. Yallouz. 2018. Designing Optimal Middlebox Recovery Schemes with Performance Guarantees. In INFOCOM.","DOI":"10.1109\/INFOCOM.2018.8486289"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_14_1","unstructured":"KVM. 2017. Kernel Virtual Machine. (2017). https:\/\/www.nnux-kvm.org\/page\/Main_Page.  KVM. 2017. Kernel Virtual Machine. (2017). https:\/\/www.nnux-kvm.org\/page\/Main_Page."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811099.1811057"},{"volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis and Transformation. In CGO.","year":"2004","author":"Lattner C.","key":"e_1_3_2_1_16_1"},{"volume-title":"Tardigrade: Leveraging Lightweight Virtual Machines to Easily and Efficiently Construct Fault-Tolerant Services. In NSDI. 575--588.","year":"2015","author":"Lorch J. R.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"B. Pfaff J. Pettit T. Koponen E. Jackson A. Zhou J. Rajahalme J. Gross A. Wang J. Stringer P. Shelar K. Amidon and M. Casado. 2015. The Design and Implementation of Open vSwitch. In NSDI. 117--130.   B. Pfaff J. Pettit T. Koponen E. Jackson A. Zhou J. Rajahalme J. Gross A. Wang J. Stringer P. Shelar K. Amidon and M. Casado. 2015. The Design and Implementation of Open vSwitch. In NSDI. 117--130."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504737"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787501"}],"event":{"name":"ANCS '18: Symposium on Architectures for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"],"location":"Ithaca New York","acronym":"ANCS '18"},"container-title":["Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230718.3230731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:29Z","timestamp":1750208249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230718.3230731"}},"subtitle":["fault tolerant virtual network functions"],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":21,"alternative-id":["10.1145\/3230718.3230731","10.1145\/3230718"],"URL":"https:\/\/doi.org\/10.1145\/3230718.3230731","relation":{},"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"2018-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}