{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:09:43Z","timestamp":1761156583678,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T00:00:00Z","timestamp":1542240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","doi-asserted-by":"publisher","award":["15\/24494-8,15\/24490-2"],"award-info":[{"award-number":["15\/24494-8,15\/24490-2"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,15]]},"DOI":"10.1145\/3286062.3286081","type":"proceedings-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T13:09:55Z","timestamp":1542028195000},"page":"127-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A Case for Spraying Packets in Software Middleboxes"],"prefix":"10.1145","author":[{"given":"Hugo","family":"Sadok","sequence":"first","affiliation":[{"name":"GTA\/PEE\/COPPE -- Universidade Federal do Rio de Janeiro"}]},{"given":"Miguel Elias M.","family":"Campista","sequence":"additional","affiliation":[{"name":"GTA\/PEE\/COPPE -- Universidade Federal do Rio de Janeiro"}]},{"given":"Lu\u00eds Henrique M. K.","family":"Costa","sequence":"additional","affiliation":[{"name":"GTA\/PEE\/COPPE -- Universidade Federal do Rio de Janeiro"}]}],"member":"320","published-online":{"date-parts":[[2018,11,15]]},"reference":[{"unstructured":"Data Plane Development Kit. https:\/\/dpdk.org  Data Plane Development Kit. https:\/\/dpdk.org","key":"e_1_3_2_2_1_1"},{"unstructured":"Digital Corpora: M57-Patents Scenario. https:\/\/digitalcorpora.org\/corpora\/scenarios\/m57-patents-scenario  Digital Corpora: M57-Patents Scenario. https:\/\/digitalcorpora.org\/corpora\/scenarios\/m57-patents-scenario","key":"e_1_3_2_2_2_1"},{"unstructured":"HTTPS encryption on the web. Retrieved Jul. 2 2018 from https:\/\/transparencyreport.google.com\/https\/  HTTPS encryption on the web. Retrieved Jul. 2 2018 from https:\/\/transparencyreport.google.com\/https\/","key":"e_1_3_2_2_3_1"},{"unstructured":"iperf3. https:\/\/software.es.net\/iperf\/  iperf3. https:\/\/software.es.net\/iperf\/","key":"e_1_3_2_2_4_1"},{"unstructured":"IXGBE Driver. https:\/\/doc.dpdk.org\/guides\/nics\/ixgbe.html  IXGBE Driver. https:\/\/doc.dpdk.org\/guides\/nics\/ixgbe.html","key":"e_1_3_2_2_5_1"},{"unstructured":"Let's Encrypt Stats. Retrieved Jul. 2 2018 from https:\/\/letsencrypt.org\/stats\/  Let's Encrypt Stats. Retrieved Jul. 2 2018 from https:\/\/letsencrypt.org\/stats\/","key":"e_1_3_2_2_6_1"},{"unstructured":"MAWI Working Group Traffic Archive: samplepoint-F. http:\/\/mawi.wide.ad.jp\/mawi\/  MAWI Working Group Traffic Archive: samplepoint-F. http:\/\/mawi.wide.ad.jp\/mawi\/","key":"e_1_3_2_2_7_1"},{"unstructured":"NetFPGA. https:\/\/netfpga.org\/  NetFPGA. https:\/\/netfpga.org\/","key":"e_1_3_2_2_8_1"},{"volume-title":"Hedera: Dynamic Flow Scheduling for Data Center Networks. In NSDI.","year":"2010","author":"Al-Fares Mohammad","key":"e_1_3_2_2_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1145\/2619239.2626316"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/2486001.2486031"},{"doi-asserted-by":"crossref","unstructured":"Mina Tahmasbi Arashloo Monia Ghobadi Jennifer Rexford and David Walker. 2017. HotCocoa: Hardware Congestion Control Abstractions. In HotNets.  Mina Tahmasbi Arashloo Monia Ghobadi Jennifer Rexford and David Walker. 2017. HotCocoa: Hardware Congestion Control Abstractions. In HotNets.","key":"e_1_3_2_2_12_1","DOI":"10.1145\/3152434.3152457"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1145\/2535372.2535375"},{"unstructured":"Margaret Chiosi et al. 2012. Network Functions Virtualisation: An Introduction Benefits Enablers Challenges & Call for Action. Technical Report. ETSI.  Margaret Chiosi et al. 2012. Network Functions Virtualisation: An Introduction Benefits Enablers Challenges & Call for Action. Technical Report. ETSI.","key":"e_1_3_2_2_14_1"},{"doi-asserted-by":"crossref","unstructured":"Advait Dixit Pawan Prakash Y. Charlie Hu and Ramana Rao Kompella. 2013. On the impact of packet spraying in data center networks. In INFOCOM.  Advait Dixit Pawan Prakash Y. Charlie Hu and Ramana Rao Kompella. 2013. On the impact of packet spraying in data center networks. In INFOCOM.","key":"e_1_3_2_2_15_1","DOI":"10.1109\/INFCOM.2013.6567015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/2815675.2815692"},{"unstructured":"Daniel Firestone et al. 2018. Azure Accelerated Networking: SmartNICs in the Public Cloud. In NSDI.  Daniel Firestone et al. 2018. Azure Accelerated Networking: SmartNICs in the Public Cloud. In NSDI.","key":"e_1_3_2_2_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1145\/2619239.2626313"},{"unstructured":"Liang Guo and Ibrahim Matta. 2001. The war between mice and elephants. In ICNP.  Liang Guo and Ibrahim Matta. 2001. The war between mice and elephants. In ICNP.","key":"e_1_3_2_2_19_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1145\/3098822.3098825"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1145\/2785956.2787507"},{"doi-asserted-by":"crossref","unstructured":"Jinho Hwang K. K. Ramakrishnan and Timothy Wood. 2014. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In NSDI.   Jinho Hwang K. K. Ramakrishnan and Timothy Wood. 2014. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In NSDI.","key":"e_1_3_2_2_23_1","DOI":"10.1109\/TNSM.2015.2401568"},{"unstructured":"Intel. 2016. Intel 82599 10 GbE Controller.  Intel. 2016. Intel 82599 10 GbE Controller.","key":"e_1_3_2_2_24_1"},{"unstructured":"Intel. 2018. Intel Ethernet Controller X710\/XXV710\/XL710.  Intel. 2018. Intel Ethernet Controller X710\/XXV710\/XL710.","key":"e_1_3_2_2_25_1"},{"unstructured":"Rajendra K. Jain Dah-Ming W. Chiu and William R. Hawe. 1984. A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems. Technical Report. DEC.  Rajendra K. Jain Dah-Ming W. Chiu and William R. Hawe. 1984. A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer Systems. Technical Report. DEC.","key":"e_1_3_2_2_26_1"},{"unstructured":"Muhammad Jamshed YoungGyoun Moon Donghwi Kim Dongsu Han and KyoungSoo Park. 2017. mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. In NSDI.   Muhammad Jamshed YoungGyoun Moon Donghwi Kim Dongsu Han and KyoungSoo Park. 2017. mOS: A Reusable Networking Stack for Flow Monitoring Middleboxes. In NSDI.","key":"e_1_3_2_2_27_1"},{"unstructured":"Murad Kablan Azzam Alsudais Eric Keller and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In NSDI.   Murad Kablan Azzam Alsudais Eric Keller and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing. In NSDI.","key":"e_1_3_2_2_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.1145\/1232919.1232925"},{"unstructured":"Georgios P. Katsikas Tom Barbette Dejan Kosti\u0107 Rebecca Steinert and Gerald Q. Maguire Jr. 2018. Metron: NFV Service Chains at the True Speed of the Underlying Hardware. In NSDI.  Georgios P. Katsikas Tom Barbette Dejan Kosti\u0107 Rebecca Steinert and Gerald Q. Maguire Jr. 2018. Metron: NFV Service Chains at the True Speed of the Underlying Hardware. In NSDI.","key":"e_1_3_2_2_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1145\/354871.354874"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1145\/3098822.3098828"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/3098822.3098842"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_34_1","DOI":"10.1109\/71.963420"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1145\/2815400.2815423"},{"unstructured":"Aurojit Panda Sangjin Han Keon Jang Melvin Walls Sylvia Ratnasamy and Scott Shenker. 2016. NetBricks: Taking the V out of NFV. In OSDI.   Aurojit Panda Sangjin Han Keon Jang Melvin Walls Sylvia Ratnasamy and Scott Shenker. 2016. NetBricks: Taking the V out of NFV. In OSDI.","key":"e_1_3_2_2_36_1"},{"unstructured":"Shriram Rajagopalan Dan Williams Hani Jamjoom and Andrew Warfield. 2013. Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In NSDI.   Shriram Rajagopalan Dan Williams Hani Jamjoom and Andrew Warfield. 2013. Split\/Merge: System Support for Elastic Execution in Virtual Middleboxes. In NSDI.","key":"e_1_3_2_2_37_1"},{"doi-asserted-by":"crossref","unstructured":"Vyas Sekar Norbert Egi Sylvia Ratnasamy Michael K. Reiter and Guangyu Shi. 2012. Design and Implementation of a Consolidated Middlebox Architecture. In NSDI.   Vyas Sekar Norbert Egi Sylvia Ratnasamy Michael K. Reiter and Guangyu Shi. 2012. Design and Implementation of a Consolidated Middlebox Architecture. In NSDI.","key":"e_1_3_2_2_38_1","DOI":"10.1145\/2070562.2070583"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1145\/2785956.2787501"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_40_1","DOI":"10.1145\/2342356.2342359"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_41_1","DOI":"10.1145\/3098822.3098826"},{"unstructured":"Amin Tootoonchian Aurojit Panda Chang Lan Melvin Walls Katerina Argyraki Sylvia Ratnasamy and Scott Shenker. 2018. ResQ: Enabling SLOs in Network Function Virtualization. In NSDI.  Amin Tootoonchian Aurojit Panda Chang Lan Melvin Walls Katerina Argyraki Sylvia Ratnasamy and Scott Shenker. 2018. ResQ: Enabling SLOs in Network Function Virtualization. In NSDI.","key":"e_1_3_2_2_42_1"},{"unstructured":"Matthias Vallentin Robin Sommer Jason Lee Craig Leres Vern Paxson and Brian Tierney. 2007. The NIDS Cluster: Scalable Stateful Network Intrusion Detection on Commodity Hardware. In RAID.   Matthias Vallentin Robin Sommer Jason Lee Craig Leres Vern Paxson and Brian Tierney. 2007. The NIDS Cluster: Scalable Stateful Network Intrusion Detection on Commodity Hardware. In RAID.","key":"e_1_3_2_2_43_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_44_1","DOI":"10.1145\/2462456.2464442"},{"unstructured":"Shinae Woo Justine Sherry Sangjin Han Sue Moon Sylvia Ratnasamy and Scott Shenker. 2018. Elastic Scaling of Stateful Network Functions. In NSDI.  Shinae Woo Justine Sherry Sangjin Han Sue Moon Sylvia Ratnasamy and Scott Shenker. 2018. Elastic Scaling of Stateful Network Functions. In NSDI.","key":"e_1_3_2_2_45_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_46_1","DOI":"10.1145\/2881025.2881034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_47_1","DOI":"10.1145\/3098822.3098841"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_48_1","DOI":"10.1145\/3050220.3050236"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"acronym":"HotNets '18","name":"HotNets '18: The 17th ACM workshop on Hot Topics in Networks","location":"Redmond WA USA"},"container-title":["Proceedings of the 17th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286062.3286081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:15Z","timestamp":1750207455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286062.3286081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,15]]},"references-count":47,"alternative-id":["10.1145\/3286062.3286081","10.1145\/3286062"],"URL":"https:\/\/doi.org\/10.1145\/3286062.3286081","relation":{},"subject":[],"published":{"date-parts":[[2018,11,15]]},"assertion":[{"value":"2018-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}