{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:28Z","timestamp":1750220968170,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program","award":["2018YFB1004704"],"award-info":[{"award-number":["2018YFB1004704"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["021014380079"],"award-info":[{"award-number":["021014380079"]}]},{"name":"Natural Science Foundation of Jiangsu Province","award":["BK20181251"],"award-info":[{"award-number":["BK20181251"]}]},{"name":"National Natural Science Foundation of China","award":["61502229,61872178,61832005,61672276,61872173,61321491,61802172"],"award-info":[{"award-number":["61502229,61872178,61832005,61672276,61872173,61321491,61802172"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,5]]},"DOI":"10.1145\/3337821.3337832","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:36Z","timestamp":1564058076000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["SAFE"],"prefix":"10.1145","author":[{"given":"Rui","family":"Xia","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]},{"given":"Haipeng","family":"Dai","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]},{"given":"Jiaqi","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]},{"given":"Rong","family":"Gu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel, Software Technology Nanjing University"}]}],"member":"320","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Network Function Virtualization (NFV) Market to hit $70bn by","author":"Ankita Bhutani","year":"2024","unstructured":"Bhutani Ankita and Wadhwani Preeti . 2018. Network Function Virtualization (NFV) Market to hit $70bn by 2024 . https:\/\/www.gminsights.com\/pressrelease\/network-function-virtualization-nfv-market. Bhutani Ankita and Wadhwani Preeti. 2018. Network Function Virtualization (NFV) Market to hit $70bn by 2024. https:\/\/www.gminsights.com\/pressrelease\/network-function-virtualization-nfv-market."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache. 2019. Apache Traffic Control. https:\/\/trafficcontrol.apache.org\/.  Apache. 2019. Apache Traffic Control. https:\/\/trafficcontrol.apache.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2612669.2612686"},{"volume-title":"Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme","author":"Ding Weiran","key":"e_1_3_2_1_4_1","unstructured":"Weiran Ding , Hongfang Yu , and Shouxi Luo . 2017. Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme . In IEEE ICC. 1--6. Weiran Ding, Hongfang Yu, and Shouxi Luo. 2017. Enhancing the reliability of services in NFV with the cost-efficient redundancy scheme. In IEEE ICC. 1--6."},{"volume-title":"Availability-aware mapping of service function chains","author":"Fan Jingyuan","key":"e_1_3_2_1_5_1","unstructured":"Jingyuan Fan , Chaowen Guan , Yangming Zhao , and Chunming Qiao . 2017. Availability-aware mapping of service function chains . In IEEE INFOCOM. 1--9. Jingyuan Fan, Chaowen Guan, Yangming Zhao, and Chunming Qiao. 2017. Availability-aware mapping of service function chains. In IEEE INFOCOM. 1--9."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869960"},{"volume-title":"Adaptive VNF scaling and flow routing with proactive demand prediction","author":"Fei Xincai","key":"e_1_3_2_1_7_1","unstructured":"Xincai Fei , Fangming Liu , Hong Xu , and Hai Jin . 2018. Adaptive VNF scaling and flow routing with proactive demand prediction . In IEEE INFOCOM. 486--494. Xincai Fei, Fangming Liu, Hong Xu, and Hai Jin. 2018. Adaptive VNF scaling and flow routing with proactive demand prediction. In IEEE INFOCOM. 486--494."},{"key":"e_1_3_2_1_8_1","unstructured":"Massimo Gallo and Rafael Laufer. 2018. ClickNF: a modular stack for custom network functions. In USENIX ATC. 745--757.   Massimo Gallo and Rafael Laufer. 2018. ClickNF: a modular stack for custom network functions. In USENIX ATC. 745--757."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037713"},{"key":"e_1_3_2_1_11_1","unstructured":"Jinho Hwang K. K. Ramakrishnan and Timothy Wood. 2014. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In USENIX NSDI. 445--458.   Jinho Hwang K. K. Ramakrishnan and Timothy Wood. 2014. NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms. In USENIX NSDI. 445--458."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760162"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2800400"},{"key":"e_1_3_2_1_14_1","unstructured":"Murad Kablan Azzam Alsudais Eric Keller and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing.. In USENIX NSDI. 97--112.   Murad Kablan Azzam Alsudais Eric Keller and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing.. In USENIX NSDI. 97--112."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2703080"},{"key":"e_1_3_2_1_16_1","volume-title":"Designing Optimal Middlebox Recovery Schemes with Performance Guarantees","author":"Kanizo Yossi","year":"2096","unstructured":"Yossi Kanizo , Ori Rottenstreich , Itai Segall , and Jose Yallouz . 2018. Designing Optimal Middlebox Recovery Schemes with Performance Guarantees . In IEEE INFOCOM. 2096 --2104. Yossi Kanizo, Ori Rottenstreich, Itai Segall, and Jose Yallouz. 2018. Designing Optimal Middlebox Recovery Schemes with Performance Guarantees. In IEEE INFOCOM. 2096--2104."},{"key":"e_1_3_2_1_17_1","volume-title":"Iron: Isolating Network-based CPU in Container Environments. In USENIX NSDI. 312--328.","author":"Khalid Junaid","year":"2018","unstructured":"Junaid Khalid , Eric Rozner , Wesley Felter , Cong Xu , Karthick Rajamani , Alexandre Ferreira , and Aditya Akella . 2018 . Iron: Isolating Network-based CPU in Container Environments. In USENIX NSDI. 312--328. Junaid Khalid, Eric Rozner, Wesley Felter, Cong Xu, Karthick Rajamani, Alexandre Ferreira, and Aditya Akella. 2018. Iron: Isolating Network-based CPU in Container Environments. In USENIX NSDI. 312--328."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281441"},{"key":"e_1_3_2_1_20_1","unstructured":"Joao Martins Mohamed Ahmed Costin Raiciu Vladimir Olteanu Michio Honda Roberto Bifulco and Felipe Huici. 2014. ClickOS and the art of network function virtualization. In USENIX NSDI. 459--473.   Joao Martins Mohamed Ahmed Costin Raiciu Vladimir Olteanu Michio Honda Roberto Bifulco and Felipe Huici. 2014. ClickOS and the art of network function virtualization. In USENIX NSDI. 459--473."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2833815"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"e_1_3_2_1_23_1","unstructured":"Snort Team. 2015. VRT Rule Set. https:\/\/www.snort.org\/talos.  Snort Team. 2015. VRT Rule Set. https:\/\/www.snort.org\/talos."},{"volume-title":"Report: Global NFV market to grow by 33% in four years","year":"2016","key":"e_1_3_2_1_24_1","unstructured":"TelcoSystems. 2016 . Report: Global NFV market to grow by 33% in four years . http:\/\/www.telco.com\/blog\/report-global-nfv-market-grow-33-four-years\/. TelcoSystems. 2016. Report: Global NFV market to grow by 33% in four years. http:\/\/www.telco.com\/blog\/report-global-nfv-market-grow-33-four-years\/."},{"volume-title":"Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints","author":"Tomassilli Andrea","key":"e_1_3_2_1_25_1","unstructured":"Andrea Tomassilli , Fr\u00e9d\u00e9ric Giroire , Nicolas Huin , and St\u00e9phane P\u00e9rennes . 2018. Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints . In IEEE INFOCOM. 1--9. Andrea Tomassilli, Fr\u00e9d\u00e9ric Giroire, Nicolas Huin, and St\u00e9phane P\u00e9rennes. 2018. Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints. In IEEE INFOCOM. 1--9."},{"key":"e_1_3_2_1_26_1","unstructured":"Amin Tootoonchian Aurojit Panda Chang Lan Melvin Walls Katerina Argyraki Sylvia Ratnasamy and Scott Shenker. 2018. ResQ: Enabling SLOs in Network Function Virtualization. In USENIX NSDI. 283--297.   Amin Tootoonchian Aurojit Panda Chang Lan Melvin Walls Katerina Argyraki Sylvia Ratnasamy and Scott Shenker. 2018. ResQ: Enabling SLOs in Network Function Virtualization. In USENIX NSDI. 283--297."},{"key":"e_1_3_2_1_27_1","unstructured":"Shinae Woo Justine Sherry Sangjin Han Sue Moon Sylvia Ratnasamy and Scott Shenker. 2018. Elastic Scaling of Stateful Network Functions. In USENIX NSDI. 299--312.   Shinae Woo Justine Sherry Sangjin Han Sue Moon Sylvia Ratnasamy and Scott Shenker. 2018. Elastic Scaling of Stateful Network Functions. In USENIX NSDI. 299--312."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209592"},{"key":"e_1_3_2_1_29_1","volume-title":"Jian Guo, and Tao Wang.","author":"Zhang Qixia","year":"2017","unstructured":"Qixia Zhang , Yikai Xiao , Fangming Liu , John CS Lui , Jian Guo, and Tao Wang. 2017 . Joint optimization of chain placement and request scheduling for network function virtualization. In IEEE ICDCS. 731--741. Qixia Zhang, Yikai Xiao, Fangming Liu, John CS Lui, Jian Guo, and Tao Wang. 2017. Joint optimization of chain placement and request scheduling for network function virtualization. In IEEE ICDCS. 731--741."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Wei Zhang Guyue Liu Wenhui Zhang Neel Shah Phillip Lopreiato Gregoire Todeschi KK Ramakrishnan and Timothy Wood. 2016. OpenNetVM: A platform for high performance network service chains. In ACM HotMIddlebox. 26--31.   Wei Zhang Guyue Liu Wenhui Zhang Neel Shah Phillip Lopreiato Gregoire Todeschi KK Ramakrishnan and Timothy Wood. 2016. OpenNetVM: A platform for high performance network service chains. In ACM HotMIddlebox. 26--31.","DOI":"10.1145\/2940147.2940155"},{"volume-title":"Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization","author":"Zhang Xiaoxi","key":"e_1_3_2_1_31_1","unstructured":"Xiaoxi Zhang , Chuan Wu , Zongpeng Li , and Francis CM Lau . 2017. Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization . In IEEE INFOCOM. 1--9. Xiaoxi Zhang, Chuan Wu, Zongpeng Li, and Francis CM Lau. 2017. Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization. In IEEE INFOCOM. 1--9."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329045"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2680821.2680823"},{"volume-title":"We've got you covered: Failure recovery with backup tunnels in traffic engineering","author":"Zheng Jiaqi","key":"e_1_3_2_1_34_1","unstructured":"Jiaqi Zheng , Hong Xu , Xiaojun Zhu , Guihai Chen , and Yanhui Geng . 2016. We've got you covered: Failure recovery with backup tunnels in traffic engineering . In IEEE ICNP. 1--10. Jiaqi Zheng, Hong Xu, Xiaojun Zhu, Guihai Chen, and Yanhui Geng. 2016. We've got you covered: Failure recovery with backup tunnels in traffic engineering. In IEEE ICNP. 1--10."}],"event":{"name":"ICPP 2019: 48th International Conference on Parallel Processing","sponsor":["University of Tsukuba University of Tsukuba"],"location":"Kyoto Japan","acronym":"ICPP 2019"},"container-title":["Proceedings of the 48th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337832","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3337821.3337832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:25Z","timestamp":1750204465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3337821.3337832"}},"subtitle":["Service Availability via Failure Elimination Through VNF Scaling"],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":34,"alternative-id":["10.1145\/3337821.3337832","10.1145\/3337821"],"URL":"https:\/\/doi.org\/10.1145\/3337821.3337832","relation":{},"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2019-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}