{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:01:46Z","timestamp":1773154906112,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2242502"],"award-info":[{"award-number":["2242502"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2242503"],"award-info":[{"award-number":["2242503"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2137220"],"award-info":[{"award-number":["2137220"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2201489"],"award-info":[{"award-number":["2201489"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2213387"],"award-info":[{"award-number":["2213387"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"DOE U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC02-05CH11231"],"award-info":[{"award-number":["DE-AC02-05CH11231"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,4]]},"DOI":"10.1145\/3651890.3672261","type":"proceedings-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:11:43Z","timestamp":1722431503000},"page":"645-660","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["An Architecture For Edge Networking Services"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7887-3627","authenticated-orcid":false,"given":"Lloyd","family":"Brown","sequence":"first","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5415-6615","authenticated-orcid":false,"given":"Emily","family":"Marx","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9273-9835","authenticated-orcid":false,"given":"Dev","family":"Bali","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8721-4895","authenticated-orcid":false,"given":"Emmanuel","family":"Amaro","sequence":"additional","affiliation":[{"name":"Microsoft, San Francisco, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3432-1761","authenticated-orcid":false,"given":"Debnil","family":"Sur","sequence":"additional","affiliation":[{"name":"Broadcom, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3972-9651","authenticated-orcid":false,"given":"Ezra","family":"Kissel","sequence":"additional","affiliation":[{"name":"LBL, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4524-0457","authenticated-orcid":false,"given":"Inder","family":"Monga","sequence":"additional","affiliation":[{"name":"ESNet, Berkeley, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-6391","authenticated-orcid":false,"given":"Ethan","family":"Katz-Bassett","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9505-9528","authenticated-orcid":false,"given":"Arvind","family":"Krishnamurthy","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6758-7297","authenticated-orcid":false,"given":"James","family":"McCauley","sequence":"additional","affiliation":[{"name":"Mount Holyoke College, South Hadley, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6495-6413","authenticated-orcid":false,"given":"Tejas","family":"Narechania","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9664-4377","authenticated-orcid":false,"given":"Aurojit","family":"Panda","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1357-7533","authenticated-orcid":false,"given":"Scott","family":"Shenker","sequence":"additional","affiliation":[{"name":"ICSI AND UC Berkeley, Berkeley, CA, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Exploring the Latest RPKI ROV Adoption Numbers. https:\/\/www.kentik.com\/blog\/exploring-the-latest-rpki-rov-adoption-numbers\/."},{"key":"e_1_3_2_1_2_1","volume-title":"HotNets","author":"Abdullah Muhammad","unstructured":"Muhammad Abdullah, Pavlos Nikolopoulos, and Katerina Argyraki. 2023. Caching and Neutrality. In HotNets. Association for Computing Machinery."},{"key":"e_1_3_2_1_3_1","volume-title":"David Mazi\u00e8res, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo.","author":"Anderson Tom","year":"2014","unstructured":"Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazi\u00e8res, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon, and Christopher S. Yoo. 2014. A Brief Overview of the NEBULA Future Internet Architecture. SIGCOMM CCR (2014)."},{"key":"e_1_3_2_1_4_1","unstructured":"AOL. 2024. https:\/\/www.aol.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2024. About iCloud Private Relay. https:\/\/support.apple.com\/en-us\/HT212614."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Todd Arnold Jia He Weifan Jiang Matt Calder Italo Cunha Vasileios Giotsas and Ethan Katz-Bassett. 2020. Cloud Provider Connectivity in the Flat Internet. In IMC.","DOI":"10.1145\/3419394.3423613"},{"key":"e_1_3_2_1_7_1","volume-title":"Blake","author":"Baker Fred","year":"1998","unstructured":"Fred Baker, David L. Black, Kathleen Nichols, and Steven L. Blake. 1998. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464994.3464998"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Gilles Bertrand Stephan Emile Trevor Burbridge Philip Eardley Kevin J. Ma and Grant Watson. 2012. Use Cases for Content Delivery Network Interconnection. RFC 6770. 10.17487\/RFC6770","DOI":"10.17487\/RFC6770"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649171.3649175"},{"key":"e_1_3_2_1_11_1","volume-title":"Clark","author":"Blumenthal Marjory S.","year":"2001","unstructured":"Marjory S. Blumenthal and David D. Clark. 2001. Rethinking the Design of the Internet: The End-to-End Arguments vs. the Brave New World. ACM Trans. Internet Technol. (2001)."},{"key":"e_1_3_2_1_12_1","volume-title":"SVTA2007: Open Cache Request Routing Functional Specification. https:\/\/www.svta.org\/product\/svta2007\/.","author":"Caching Open","year":"2021","unstructured":"Open Caching. 2021. SVTA2007: Open Cache Request Routing Functional Specification. https:\/\/www.svta.org\/product\/svta2007\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Frank Cangialosi Akshay Narayan Prateesh Goyal Radhika Mittal Mohammad Alizadeh and Hari Balakrishnan. 2021. Site-to-Site Internet Traffic Control (EuroSys).","DOI":"10.1145\/3447786.3456260"},{"key":"e_1_3_2_1_14_1","unstructured":"Karen Casella Travis Nelson and Sunny Singh. 2021. Edge Authentication and Token-Agnostic Identity Propagation. https:\/\/netflixtechblog.com\/edge-authentication-and-token-agnostic-identity-propagation-514e47e0b602."},{"key":"e_1_3_2_1_15_1","unstructured":"CDN Planet. 2024. Content Delivery Networks by country. https:\/\/www.cdnplanet.com\/cdns-by-country\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Sarah Chasins Alvin Cheung Natacha Crooks Ali Ghodsi Ken Goldberg Joseph E Gonzalez Joseph M Hellerstein Michael I Jordan Anthony D Joseph Michael W Mahoney et al. 2022. The sky above the clouds. arXiv preprint arXiv:2205.07147 (2022)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.690972"},{"key":"e_1_3_2_1_18_1","volume-title":"Designing an Internet","author":"Clark David D.","unstructured":"David D. Clark. 2018. Designing an Internet (1st ed.). The MIT Press.","edition":"1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144199"},{"key":"e_1_3_2_1_20_1","unstructured":"Cloudflare. 2023. Cloudflare Queues. https:\/\/developers.cloudflare.com\/queues\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"e_1_3_2_1_22_1","volume-title":"Plutarch: An Argument for Network Pluralism. SIGCOMM Comput. Commun. Rev.","author":"Crowcroft Jon","year":"2003","unstructured":"Jon Crowcroft, Steven Hand, Richard Mortier, Timothy Roscoe, and Andrew Warfield. 2003. Plutarch: An Argument for Network Pluralism. SIGCOMM Comput. Commun. Rev. (2003)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Jason A Donenfeld. 2017. Wireguard: next generation kernel network tunnel.. In NDSS.","DOI":"10.14722\/ndss.2017.23160"},{"key":"e_1_3_2_1_24_1","unstructured":"Dmitry Duplyakin Robert Ricci Aleksander Maricq Gary Wong Jonathon Duerig Eric Eide Leigh Stoller Mike Hibler David Johnson Kirk Webb Aditya Akella Kuangching Wang Glenn Ricart Larry Landweber Chip Elliott Michael Zink Emmanuel Cecchet Snigdhaswin Kar and Prabodh Mishra. 2019. The Design and Operation of CloudLab. In ATC. 1--14. https:\/\/www.flux.utah.edu\/paper\/duplyakin-atc19"},{"key":"e_1_3_2_1_25_1","unstructured":"fabric [n. d.]. FABRIC Testbed. https:\/\/fabric-testbed.net."},{"key":"e_1_3_2_1_26_1","unstructured":"T.L. Friedman. 2009. Hot Flat and Crowded 2.0: Why We Need a Green Revolution-and How It Can Renew America. Picador. https:\/\/books.google.com\/books?id=BpkALHFTnhUC"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974523"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Ahmad Ghalayini Jinkun Geng Vighnesh Sachidananda Vinay Sriram Yilong Geng Balaji Prabhakar Mendel Rosenblum and Anirudh Sivaraman. 2021. CloudEx: a fair-access financial exchange in the cloud. In HotOS. 96--103.","DOI":"10.1145\/3458336.3465278"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Yossi Gilad Avichai Cohen Amir Herzberg Michael Schapira and Haya Shulman. 2017. Are We There Yet? On RPKI's Deployment and Security. In NDSS.","DOI":"10.14722\/ndss.2017.23123"},{"key":"e_1_3_2_1_30_1","unstructured":"Dan Goodin. 2018. Suspicious event hijacks Amazon traffic for 2 hours steals cryptocurrency. https:\/\/arstechnica.com\/information-technology\/2018\/04\/suspicious-event-hijacks-amazon-traffic-for-2-hours-steals-cryptocurrency\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Dan Goodin. 2019. BGP event sends European mobile traffic through China Telecom for 2 hours. https:\/\/arstechnica.com\/information-technology\/2019\/06\/bgp-mishap-sends-european-mobile-traffic-through-china-telecom-for-2-hours\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Dan Goodin. 2022. How 3 hours of inaction from Amazon cost cryptocurrency holders $235 000. https:\/\/arstechnica.com\/information-technology\/2022\/09\/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000\/."},{"key":"e_1_3_2_1_33_1","unstructured":"Dan Goodin. 2022. Some Twitter traffic briefly funneled through Russian ISP thanks to BGP mishap. https:\/\/arstechnica.com\/information-technology\/2022\/03\/absence-of-malice-russian-isps-hijacking-of-twitter-ips-appears-to-be-a-goof\/."},{"key":"e_1_3_2_1_34_1","unstructured":"Google. 2022. PSP Architecture Specification. https:\/\/raw.githubusercontent.com\/google\/psp\/main\/doc\/PSP_Arch_Spec.pdf."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564098"},{"key":"e_1_3_2_1_36_1","volume-title":"Zero-Knowledge Middleboxes. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Grubbs Paul","year":"2022","unstructured":"Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, and Michael Walfish. 2022. Zero-Knowledge Middleboxes. In 31st USENIX Security Symposium (USENIX Security 22). 4255--4272."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI).","author":"Han Dongsu","year":"2012","unstructured":"Dongsu Han, Ashok Anand, Fahad Dogar, Boyan Li, Hyeontaek Lim, Michel Machado, Arvind Mukundan, Wenfei Wu, Aditya Akella, David G. Andersen, John W. Byers, Srinivasan Seshan, and Peter Steenkiste. 2012. XIA: Efficient Support for Evolvable Internetworking. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Yotam Harchol Dirk Bergmann Nick Feamster Eric Friedman Arvind Krishnamurthy Aurojit Panda Sylvia Ratnasamy Michael Schapira and Scott Shenker. 2020. A Public Option for the Core. In SIGCOMM.","DOI":"10.1145\/3387514.3405875"},{"key":"e_1_3_2_1_39_1","unstructured":"Tatiana Iskandar Lee Semien and Daniel Vinegrad. 2010. The End-to-End Principle. https:\/\/cs.stanford.edu\/people\/eroberts\/cs201\/projects\/2010-11\/NetNeutrality\/Articles\/Proponents.html."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282402"},{"key":"e_1_3_2_1_41_1","unstructured":"Craig Labovitz. 2019. Internet Traffic 2009--2019. https:\/\/pc.nanog.org\/static\/published\/meetings\/NANOG76\/1972\/20190610_Labovitz_Internet_Traffic_2009-2019_v1.pdf. Presentation at NANOG 76."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Robert Lychev Sharon Goldberg and Michael Schapira. 2013. BGP security in partial deployment: Is the juice worth the squeeze?. In SIGCOMM.","DOI":"10.1145\/2486001.2486010"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10728.001.0001"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342075"},{"key":"e_1_3_2_1_46_1","volume-title":"GPU acceleration of H. 264\/MPEG-4 AVC software video encoder. APSIPA","author":"Moriyoshi Tatsuji","year":"2011","unstructured":"Tatsuji Moriyoshi, Fumiyo Takano, and Yuichi Nakamura. 2011. GPU acceleration of H. 264\/MPEG-4 AVC software video encoder. APSIPA (2011)."},{"key":"e_1_3_2_1_47_1","volume-title":"Kafka: The Definitive Guide Real-Time Data and Stream Processing at Scale","author":"Narkhede Neha","year":"2017","unstructured":"Neha Narkhede, Gwen Shapira, and Todd Palino. 2017. Kafka: The Definitive Guide Real-Time Data and Stream Processing at Scale (1st ed.). O'Reilly Media, Inc.","edition":"1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143383"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787482"},{"key":"e_1_3_2_1_50_1","volume-title":"A generalized processor sharing approach to flow control in integrated services networks. Ph. D. Dissertation","author":"Parekh Abhay Kumar","unstructured":"Abhay Kumar Parekh. 1992. A generalized processor sharing approach to flow control in integrated services networks. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_51_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Poddar Rishabh","year":"2018","unstructured":"Rishabh Poddar, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. 2018. {SafeBricks}: Shielding Network Functions in the Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 201--216."},{"key":"e_1_3_2_1_52_1","unstructured":"S. Shenker R. Braden D. Clark. 1994. Integrated Services in the Internet Architecture: an Overview. RFC 1633."},{"key":"e_1_3_2_1_53_1","unstructured":"r2 2023. Cloudflare R2. https:\/\/developers.cloudflare.com\/r2\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080128"},{"key":"e_1_3_2_1_55_1","unstructured":"Carlos Rodrigues and Vasilis Giotsas. 2022. Helping build a safer Internet by measuring BGP RPKI Route Origin Validation. https:\/\/blog.cloudflare.com\/rpki-updates-data\/."},{"key":"e_1_3_2_1_56_1","unstructured":"Jeffery Rott. 2012. Intel Advanced Encryption Standard Instructions (AES-NI). Intel Developer Zone https:\/\/goo.gl\/0VvQ8G retrieved 07\/17\/2015."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340301.3341128"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Ivan Seskar Kiran Nagaraja Sam Nelson and Dipankar Raychaudhuri. 2011. MobilityFirst Future Internet Architecture Project. In AINTEC.","DOI":"10.1145\/2089016.2089017"},{"key":"e_1_3_2_1_60_1","unstructured":"Scott Shenker. 2022. Creating an Extensible Internet. https:\/\/blog.apnic.net\/2022\/04\/14\/creating-an-extensible-internet\/"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_3_2_1_62_1","unstructured":"Amin Vahdat and Soheil Hassas Yeganeh. 2022. Announcing PSP's cryptographic hardware offload at scale is now open source. https:\/\/cloud.google.com\/blog\/products\/identity-security\/announcing-psp-security-protocol-is-now-open-source."},{"key":"e_1_3_2_1_63_1","volume-title":"Matt Calder, and Ethan Katz-Bassett.","author":"Vermeulen Kevin","year":"2023","unstructured":"Kevin Vermeulen, Loqman Salamatian, Sang Hoon Kim, Matt Calder, and Ethan Katz-Bassett. 2023. The Central Problem with Distributed Content: Common CDN Deployments Centralize Traffic In A Risky Way. In HotNets."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628213"},{"key":"e_1_3_2_1_65_1","unstructured":"Gustav Ernberg von Heijne Jonathon Imperiosi Rob Hazan and Beng Eu. 2019. Fast Ads Matter. https:\/\/web.dev\/articles\/fast-ads-matter."},{"key":"e_1_3_2_1_66_1","unstructured":"Tao Wang Xiangrui Yang Gianni Antichi Anirudh Sivaraman and Aurojit Panda. 2022. Isolation mechanisms for {High-Speed}{Packet-Processing} pipelines. In NSDI."},{"key":"e_1_3_2_1_67_1","unstructured":"Tim Wu. [n. d.]. Network Neutrality FAQ. http:\/\/www.timwu.org\/network_neutrality.html."},{"key":"e_1_3_2_1_68_1","unstructured":"Zadara. [n. d.]. Federated Edge. https:\/\/www.zadara.com\/federated-edge\/."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"e_1_3_2_1_70_1","volume-title":"Andersen","author":"Zhang Xin","year":"2011","unstructured":"Xin Zhang, Hsu-Chun Hsiao, Geoffrey Hasker, Haowen Chan, Adrian Perrig, and David G. Andersen. 2011. SCION: Scalability, Control, and Isolation on Next-Generation Networks. In IEEE S&P."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28718400"},{"key":"e_1_3_2_1_72_1","volume-title":"Xiongchun Duan, Peng He, Arvind Krishnamurthy, Matthew Lentz, et al.","author":"Zhu Xiangfeng","year":"2022","unstructured":"Xiangfeng Zhu, Guozhen She, Bowen Xue, Yu Zhang, Yongsu Zhang, Xuan Kelvin Zou, Xiongchun Duan, Peng He, Arvind Krishnamurthy, Matthew Lentz, et al. 2022. Dissecting Service Mesh Overheads. arXiv preprint arXiv:2207.00592 (2022)."}],"event":{"name":"ACM SIGCOMM '24: ACM SIGCOMM 2024 Conference","location":"Sydney NSW Australia","acronym":"ACM SIGCOMM '24","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM SIGCOMM 2024 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3651890.3672261","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651890.3672261","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651890.3672261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:13Z","timestamp":1750268953000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651890.3672261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":72,"alternative-id":["10.1145\/3651890.3672261","10.1145\/3651890"],"URL":"https:\/\/doi.org\/10.1145\/3651890.3672261","relation":{},"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"2024-08-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}