{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:33Z","timestamp":1755993693207,"version":"3.44.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:00:00Z","timestamp":1558310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5,20]]},"DOI":"10.23919\/ifipnetworking.2019.8816831","type":"proceedings-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T21:35:56Z","timestamp":1567114556000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Let there be Chaining: How to Augment your IGP to Chain your Services"],"prefix":"10.23919","author":[{"given":"Adrien","family":"Wion","sequence":"first","affiliation":[{"name":"Telecom ParisTech, Paris, France"}]},{"given":"Mathieu","family":"Bouet","sequence":"additional","affiliation":[{"name":"Thales, Gennevilliers, France"}]},{"given":"Luigi","family":"Iannone","sequence":"additional","affiliation":[{"name":"Telecom ParisTech, Paris, France"}]},{"given":"Vania","family":"Conan","sequence":"additional","affiliation":[{"name":"Thales, Gennevilliers, France"}]}],"member":"263","reference":[{"journal-title":"Distributed systems emulator (distem)","year":"0","key":"ref32"},{"journal-title":"P4 software switch","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004208"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098827"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8300"},{"key":"ref14","first-page":"227","article-title":"Split\/merge: System support for elastic execution in virtual middle-boxes","author":"rajagopalan","year":"2013","journal-title":"Proc USENIX Conf Networked Systems Design and Implementation (NSDI)"},{"key":"ref15","first-page":"97","article-title":"Stateless network functions: Breaking the tight coupling of state and processing","author":"kablan","year":"2017","journal-title":"Proc USENIX Conf Networked Systems Design and Implementation (NSDI)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/NFV-SDN.2015.7387412","article-title":"Nfv-vital: A framework for characterizing the performance of virtual network functions","author":"cao","year":"2015","journal-title":"Proc of the IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919491"},{"key":"ref18","first-page":"2129","article-title":"Bandwidth-delay based routing algorithms","volume":"3","author":"wang","year":"1995","journal-title":"Proc IEEE Global Telecommunications Conference (GLOBECOM)"},{"key":"ref19","first-page":"95","article-title":"Algorithms for finding paths with multiple constraints","volume":"14","author":"j j m","year":"0","journal-title":"Networks"},{"journal-title":"Linux Containers (Lxc)","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"journal-title":"ONOS","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733615"},{"journal-title":"FRRouting","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626313"},{"key":"ref8","article-title":"Stratos: A network-aware orchestration layer for middleboxes in the cloud","volume":"abs 1305 209","author":"gember","year":"2013","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491203"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760178"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787495"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/2377677.2377680","article-title":"Making middleboxes someone else's problem: Network processing as a cloud service","author":"sherry","year":"2012","journal-title":"Proc of the ACM SIGCOMM Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04519-1_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"journal-title":"DEFO Website","year":"0","key":"ref21"},{"journal-title":"Fd io","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987273"},{"journal-title":"OpenDaylight","year":"0","key":"ref26"},{"journal-title":"OPNFV","year":"0","key":"ref25"}],"event":{"name":"2019 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2019,5,20]]},"location":"Warsaw, Poland","end":{"date-parts":[[2019,5,22]]}},"container-title":["2019 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8811689\/8816828\/08816831.pdf?arnumber=8816831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:40:02Z","timestamp":1755909602000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8816831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,20]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking.2019.8816831","relation":{},"subject":[],"published":{"date-parts":[[2019,5,20]]}}}