{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:11:56Z","timestamp":1743001916370,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031377648"},{"type":"electronic","value":"9783031377655"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37765-5_4","type":"book-chapter","created":{"date-parts":[[2023,7,6]],"date-time":"2023-07-06T19:01:53Z","timestamp":1688670113000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Formal Analysis of\u00a0Karn\u2019s Algorithm"],"prefix":"10.1007","author":[{"given":"Max","family":"von Hippel","sequence":"first","affiliation":[]},{"given":"Kenneth L.","family":"McMillan","sequence":"additional","affiliation":[]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[]},{"given":"Lenore D.","family":"Zuck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,7]]},"reference":[{"issue":"5","key":"4_CR1","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/LCOMM.2015.2411591","volume":"19","author":"A Abdou","year":"2015","unstructured":"Abdou, A., Matrawy, A., van Oorschot, P.C.: Accurate one-way delay estimation with reduced client trustworthiness. IEEE Commun. Lett. 19(5), 735\u2013738 (2015)","journal-title":"IEEE Commun. Lett."},{"doi-asserted-by":"crossref","unstructured":"Aboba, B., Wood, J.: Authentication, authorization and accounting (AAA) transport profile, June 2003. https:\/\/www.rfc-editor.org\/rfc\/rfc3539. Accessed 21 Mar 2023","key":"4_CR2","DOI":"10.17487\/rfc3539"},{"doi-asserted-by":"crossref","unstructured":"Adamson, B., Bormann, C., Handley, M., Macker, J.: Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) building blocks, November 2004. https:\/\/www.rfc-editor.org\/rfc\/rfc3941. Accessed 17 Mar 2023","key":"4_CR3","DOI":"10.17487\/rfc3941"},{"issue":"6","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1145\/195613.195651","volume":"41","author":"Y Afek","year":"1994","unstructured":"Afek, Y., Attiya, H., Fekete, A., Fischer, M., Lynch, N., Mansour, Y., Wang, D.W., Zuck, L.: Reliable communication over unreliable channels. J. ACM (JACM) 41(6), 1267\u20131297 (1994)","journal-title":"J. ACM (JACM)"},{"doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Blanton, E.: TCP congestion control, September 2009. https:\/\/www.rfc-editor.org\/rfc\/rfc5681. Accessed 23 Feb 2023","key":"4_CR5","DOI":"10.17487\/rfc5681"},{"doi-asserted-by":"crossref","unstructured":"Arun, V., Alizadeh, M., Balakrishnan, H.: Starvation in end-to-end congestion control. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp. 177\u2013192 (2022)","key":"4_CR6","DOI":"10.1145\/3544216.3544223"},{"doi-asserted-by":"crossref","unstructured":"Arun, V., Arashloo, M.T., Saeed, A., Alizadeh, M., Balakrishnan, H.: Toward formally verifying congestion control behavior. In: SIGCOMM 2021 (2021)","key":"4_CR7","DOI":"10.1145\/3452296.3472912"},{"doi-asserted-by":"crossref","unstructured":"Baccelli, F., Hong, D.: TCP is max-plus linear and what it tells us on its throughput. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 219\u2013230 (2000)","key":"4_CR8","DOI":"10.1145\/347057.347548"},{"doi-asserted-by":"crossref","unstructured":"Balakrishnan, H., Seshan, S.: The congestion manager, June 2001. https:\/\/www.rfc-editor.org\/rfc\/rfc3124. Accessed 21 Mar 2023","key":"4_CR9","DOI":"10.17487\/rfc3124"},{"doi-asserted-by":"crossref","unstructured":"Balandina, E., Koucheryavy, Y., Gurtov, A.: Computing the retransmission timeout in coap. In: Internet of Things, Smart Spaces, and Next Generation Networking: 13th International Conference, NEW2AN 2013 and 6th Conference, ruSMART 2013, St. Petersburg, Russia, August 28\u201330, 2013. Proceedings. pp. 352\u2013362. Springer (2013)","key":"4_CR10","DOI":"10.1007\/978-3-642-40316-3_31"},{"doi-asserted-by":"crossref","unstructured":"Bensley, S., Thaler, D., Balasubramanian, P., Eggert, L., Judd, G.: Data Center TCP (DCTCP): TCP congestion control for data centers, October 2017. https:\/\/www.rfc-editor.org\/rfc\/rfc8257. Accessed 15 Mar 2023","key":"4_CR11","DOI":"10.17487\/RFC8257"},{"doi-asserted-by":"crossref","unstructured":"Bishop, S., Fairbairn, M., Norrish, M., Sewell, P., Smith, M., Wansbrough, K.: Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 265\u2013276 (2005)","key":"4_CR12","DOI":"10.1145\/1080091.1080123"},{"issue":"8","key":"4_CR13","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1109\/49.464716","volume":"13","author":"LS Brakmo","year":"1995","unstructured":"Brakmo, L.S., Peterson, L.L.: TCP vegas: end to end congestion avoidance on a global internet. IEEE J. Sel. Areas Commun. 13(8), 1465\u20131480 (1995)","journal-title":"IEEE J. Sel. Areas Commun."},{"doi-asserted-by":"crossref","unstructured":"Camarillo, G., Drage, K., Kristensen, T., Ott, J., Eckel, C.: The Binary Floor Control Protocol (BFCP), January 2021. https:\/\/www.rfc-editor.org\/rfc\/rfc8855. Accessed 23 Feb 2023","key":"4_CR14","DOI":"10.17487\/RFC8855"},{"unstructured":"Cardwell, N., et al.: packetdrill: scriptable network stack testing, from sockets to packets. In: 2013 USENIX Annual Technical Conference (USENIX ATC 13), pp. 213\u2013218 (2013)","key":"4_CR15"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-642-19835-9_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"HR Chamarthi","year":"2011","unstructured":"Chamarthi, H.R., Dillinger, P., Manolios, P., Vroon, D.: The ACL2 sedan theorem proving system. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 291\u2013295. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_27"},{"doi-asserted-by":"crossref","unstructured":"Cheng, Y., Cardwell, N., Dukkipati, N., Jha, P.: The RACK-TLP loss detection algorithm for TCP, February 2021. https:\/\/www.rfc-editor.org\/rfc\/rfc8985. Accessed 15 Mar 2023","key":"4_CR17","DOI":"10.17487\/RFC8985"},{"doi-asserted-by":"crossref","unstructured":"Cluzel, G., Georgiou, K., Moy, Y., Zeller, C.: Layered formal verification of a TCP stack. In: 2021 IEEE Secure Development Conference (SecDev), pp. 86\u201393. IEEE (2021)","key":"4_CR18","DOI":"10.1109\/SecDev51306.2021.00028"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2006.09.018","volume":"174","author":"PC Dillinger","year":"2007","unstructured":"Dillinger, P.C., Manolios, P., Vroon, D., Moore, J.S.: Acl2s:\u201cthe ACL2 sedan\u2019\u2019. Electron. Notes Theoretical Comput. Sci. 174(2), 3\u201318 (2007)","journal-title":"Electron. Notes Theoretical Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Eggert, L., Fairhurst, G., Shepherd, G.: UDP usage guidelines, March 2017. https:\/\/www.rfc-editor.org\/rfc\/rfc8085. Accessed 23 Feb 2023","key":"4_CR20","DOI":"10.17487\/RFC8085"},{"doi-asserted-by":"crossref","unstructured":"Gerla, M., Sanadidi, M.Y., Wang, R., Zanella, A., Casetti, C., Mascolo, S.: TCP Westwood: congestion window control using bandwidth estimation. In: GLOBECOM\u201901. IEEE Global Telecommunications Conference (Cat. No. 01CH37270), vol. 3, pp. 1698\u20131702. IEEE (2001)","key":"4_CR21","DOI":"10.1109\/GLOCOM.2001.965869"},{"doi-asserted-by":"crossref","unstructured":"Henderson, T., Floyd, S., Gurtov, A., Nishida, Y.: The NewReno modification to TCP\u2019s fast recovery algorithm, April 2012. https:\/\/www.rfc-editor.org\/rfc\/rfc6582. Accessed 15 March 2023","key":"4_CR22","DOI":"10.17487\/rfc6582"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-45351-2_25","volume-title":"Hybrid Systems: Computation and Control","author":"JP Hespanha","year":"2001","unstructured":"Hespanha, J.P., Bohacek, S., Obraczka, K., Lee, J.: Hybrid modeling of TCP congestion control. In: Di Benedetto, M.D., Sangiovanni-Vincentelli, A. (eds.) HSCC 2001. LNCS, vol. 2034, pp. 291\u2013304. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45351-2_25"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-030-54549-9_9","volume-title":"Computer Safety, Reliability, and Security","author":"M von Hippel","year":"2020","unstructured":"von Hippel, M., Vick, C., Tripakis, S., Nita-Rotaru, C.: Automated attacker synthesis for distributed protocols. In: Casimiro, A., Ortmeier, F., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12234, pp. 133\u2013149. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54549-9_9"},{"doi-asserted-by":"crossref","unstructured":"Hu, K., Liu, C., Liu, K.: Modeling and verification of custom TCP using SDL. In: 2013 IEEE 4th International Conference on Software Engineering and Service Science, pp. 455\u2013458. IEEE (2013)","key":"4_CR25","DOI":"10.1109\/ICSESS.2013.6615347"},{"doi-asserted-by":"crossref","unstructured":"Hurtig, P., Brunstrom, A., Petlund, A., Welzl, M.: TCP and Stream Control Transmission Protocol (SCTP) RTO restart, February 2016. https:\/\/www.rfc-editor.org\/rfc\/rfc7765. Accessed 23 Feb 2023","key":"4_CR26","DOI":"10.17487\/RFC7765"},{"unstructured":"Inamura, H., Montenegro, G., Ludwig, R., Gurtov, A., Khafizov, F.: TCP over second (2.5g) and third (3g) generation wireless networks, February 2007. https:\/\/www.rfc-editor.org\/rfc\/rfc3481. Accessed 21 Mar 2023","key":"4_CR27"},{"doi-asserted-by":"crossref","unstructured":"Iyengar, J., Swett, I.: QUIC loss detection and congestion control, May 2021. https:\/\/www.rfc-editor.org\/rfc\/rfc9002. Accessed 17 Mar 2023","key":"4_CR28","DOI":"10.17487\/RFC9002"},{"doi-asserted-by":"publisher","unstructured":"Iyengar, J., Thomson, M.: QUIC: A UDP-Based Multiplexed and Secure Transport. RFC 9000, May 2021. https:\/\/doi.org\/10.17487\/RFC9000. https:\/\/www.rfc-editor.org\/info\/rfc9000","key":"4_CR29","DOI":"10.17487\/RFC9000"},{"issue":"4","key":"4_CR30","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1145\/52325.52356","volume":"18","author":"V Jacobson","year":"1988","unstructured":"Jacobson, V.: Congestion avoidance and control. ACM SIGCOMM Comput. Commun. Rev. 18(4), 314\u2013329 (1988)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD) Base Protocol (2014). https:\/\/www.rfc-editor.org\/rfc\/rfc6940. Accessed 23 Feb 2023","key":"4_CR31","DOI":"10.17487\/rfc6940"},{"unstructured":"Kakarla, S.K.R., Beckett, R., Millstein, T., Varghese, G.: SCALE: automatically finding RFC compliance bugs in DNS nameservers. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pp. 307\u2013323. USENIX Association, Renton, WA, April 2022. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/kakarla","key":"4_CR32"},{"issue":"5","key":"4_CR33","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/55483.55484","volume":"17","author":"P Karn","year":"1987","unstructured":"Karn, P., Partridge, C.: Improving round-trip time estimates in reliable transport protocols. ACM SIGCOMM Comput. Commun. Rev. 17(5), 2\u20137 (1987)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Keranen, A., Holmberg, C., Rosenberg, J.: Interactive Connectivity Establishment (ICE): A protocol for Network Address Translator (NAT) traversal, July 2018. https:\/\/www.rfc-editor.org\/rfc\/rfc8445. Accessed 23 February 2023","key":"4_CR34","DOI":"10.17487\/RFC8445"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-31957-3_17","volume-title":"Networking - ICN 2005","author":"A Kesselman","year":"2005","unstructured":"Kesselman, A., Mansour, Y.: Optimizing TCP retransmission timeout. In: Lorenz, P., Dini, P. (eds.) ICN 2005. LNCS, vol. 3421, pp. 133\u2013140. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31957-3_17"},{"doi-asserted-by":"crossref","unstructured":"Kim, H., Hou, J.C.: Network calculus based simulation for TCP congestion control: theorems, implementation and evaluation. In: IEEE INFOCOM 2004, vol. 4, pp. 2844\u20132855. IEEE (2004)","key":"4_CR36","DOI":"10.1109\/INFCOM.2004.1354701"},{"doi-asserted-by":"crossref","unstructured":"Konur, S., Fisher, M.: Formal analysis of a VANET congestion control protocol through probabilistic verification. In: 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1\u20135. IEEE (2011)","key":"4_CR37","DOI":"10.1109\/VETECS.2011.5956327"},{"doi-asserted-by":"crossref","unstructured":"Le Boudec, J.Y., Thiran, P.: Network calculus: a theory of deterministic queuing systems for the internet. Springer (2001)","key":"4_CR38","DOI":"10.1007\/3-540-45318-0"},{"doi-asserted-by":"crossref","unstructured":"Liu, S., Ba\u015far, T., Srikant, R.: TCP-Illinois: a loss and delay-based congestion control algorithm for high-speed networks. In: Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, pp. 55-es (2006)","key":"4_CR39","DOI":"10.1145\/1190095.1190166"},{"key":"4_CR40","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2015.08.005","volume":"118","author":"L Lockefeer","year":"2016","unstructured":"Lockefeer, L., Williams, D.M., Fokkink, W.: Formal specification and verification of tcp extended with the window scale option. Sci. Comput. Program. 118, 3\u201323 (2016)","journal-title":"Sci. Comput. Program."},{"issue":"1","key":"4_CR41","first-page":"77","volume":"102","author":"A Lomuscio","year":"2010","unstructured":"Lomuscio, A., Strulo, B., Walker, N.G., Wu, P.: Model checking optimisation based congestion control algorithms. Fund. Inform. 102(1), 77\u201396 (2010)","journal-title":"Fund. Inform."},{"doi-asserted-by":"crossref","unstructured":"Ludwig, R., Gurtov, A.: The Eifel response algorithm for TCP, February 2005. https:\/\/www.rfc-editor.org\/rfc\/rfc4015. Accessed 21 Mar 2023","key":"4_CR42","DOI":"10.17487\/rfc4015"},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-016-0646-9","volume":"2016","author":"MH Malik","year":"2016","unstructured":"Malik, M.H., Jamil, M., Khan, M.N., Malik, M.H.: Formal modelling of tcp congestion control mechanisms ecn\/red and sap-law in the presence of udp traffic. EURASIP J. Wirel. Commun. Netw. 2016, 1\u201312 (2016)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Mascolo, S., Casetti, C., Gerla, M., Sanadidi, M.Y., Wang, R.: Tcp westwood: bandwidth estimation for enhanced transport over wireless links. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 287\u2013297 (2001)","key":"4_CR44","DOI":"10.1145\/381677.381704"},{"issue":"3","key":"4_CR45","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/263932.264023","volume":"27","author":"M Mathis","year":"1997","unstructured":"Mathis, M., Semke, J., Mahdavi, J., Ott, T.: The macroscopic behavior of the tcp congestion avoidance algorithm. ACM SIGCOMM Comput. Commun. Rev. 27(3), 67\u201382 (1997)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"McMillan, K.L., Zuck, L.D.: Formal specification and testing of QUIC. In: Proceedings of the ACM Special Interest Group on Data Communication, pp. 227\u2013240 (2019)","key":"4_CR46","DOI":"10.1145\/3341302.3342087"},{"key":"4_CR47","volume":"53","author":"N Okumura","year":"2020","unstructured":"Okumura, N., Ogata, K., Shinoda, Y.: Formal analysis of RFC 8120 authentication protocol for http under different assumptions. J. Inf. Secur. Appl. 53, 102529 (2020)","journal-title":"J. Inf. Secur. Appl."},{"doi-asserted-by":"crossref","unstructured":"Pacheco, M.L., von Hippel, M., Weintraub, B., Goldwasser, D., Nita-Rotaru, C.: Automated attack synthesis by extracting finite state machines from protocol specification documents. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 51\u201368. IEEE (2022)","key":"4_CR48","DOI":"10.1109\/SP46214.2022.9833673"},{"doi-asserted-by":"crossref","unstructured":"Paxson, V., Allman, M., Chu, J., Sargent, M.: Computing TCP\u2019s retransmission timer, June 2011. https:\/\/www.rfc-editor.org\/rfc\/rfc6298. Accessed 22 Feb 2023","key":"4_CR49","DOI":"10.17487\/rfc6298"},{"doi-asserted-by":"crossref","unstructured":"Petit-Huguenin, M., Salgueiro, G., Rosenberg, J., Wing, D., Mahy, R., Matthews, P.: Session Traversal Utilities for NAT (STUN), February 2020. https:\/\/www.rfc-editor.org\/rfc\/rfc8489. Accessed 23 February 2023","key":"4_CR50","DOI":"10.17487\/RFC8489"},{"doi-asserted-by":"crossref","unstructured":"Pothamsetty, V., Mateti, P.: A case for exploit-robust and attack-aware protocol RFCs. In: Proceedings 20th IEEE International Parallel and Distributed Processing Symposium (2006)","key":"4_CR51","DOI":"10.1109\/IPDPS.2006.1639676"},{"doi-asserted-by":"crossref","unstructured":"Schinazi, D., Pauly, T.: Happy eyeballs version 2: Better connectivity using concurrency, December 2017. https:\/\/www.rfc-editor.org\/rfc\/rfc8305. Accessed 23 Feb 2023","key":"4_CR52","DOI":"10.17487\/RFC8305"},{"doi-asserted-by":"crossref","unstructured":"Shalunov, S., Hazel, G., Iyengar, J., Kuehlewind, M.: Low Extra Delay Background Transport (LEDBAT), December 2012. https:\/\/www.rfc-editor.org\/rfc\/rfc6817. Accessed 23 Feb 2023","key":"4_CR53","DOI":"10.17487\/rfc6817"},{"unstructured":"Smith, M.A.S.: Formal verification of TCP and T\/TCP. Ph.D. thesis, Massachusetts Institute of Technology (1997)","key":"4_CR54"},{"unstructured":"Sridharan, M., Tan, K., Bansal, D., Thaler, D.: Compound TCP: a new TCP congestion control for high-speed and long distance networks, November 2008. https:\/\/datatracker.ietf.org\/doc\/html\/draft-sridharan-tcpm-ctcp-02. Accessed 15 Mar 2023","key":"4_CR55"},{"doi-asserted-by":"crossref","unstructured":"Srikant, R., Ba\u015far, T.: The mathematics of Internet congestion control. Springer (2004)","key":"4_CR56","DOI":"10.1007\/978-0-8176-8216-3"},{"unstructured":"Stewart, R.: tream control transmission protocol, September 2007. https:\/\/www.rfc-editor.org\/rfc\/rfc4960. Accessed 23 Feb 2023","key":"4_CR57"},{"doi-asserted-by":"crossref","unstructured":"T. Henderson, A.G.: The Host Identity Protocol (HIP) Experiment Report, March 2012. https:\/\/www.rfc-editor.org\/rfc\/rfc6538. Accessed 23 Feb 2023","key":"4_CR58","DOI":"10.17487\/rfc6538"},{"unstructured":"Tang, C., Chang, R.N., Ward, C.: Gocast: gossip-enhanced overlay multicast for fast and dependable group communication. In: 2005 International Conference on Dependable Systems and Networks (DSN 2005), pp. 140\u2013149. IEEE (2005)","key":"4_CR59"},{"doi-asserted-by":"crossref","unstructured":"Taube, M., Losa, G., McMillan, K.L., Padon, O., Sagiv, M., Shoham, S., Wilcox, J.R., Woos, D.: Modularity for decidability of deductive verification with applications to distributed systems. In: Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 662\u2013677 (2018)","key":"4_CR60","DOI":"10.1145\/3192366.3192414"},{"doi-asserted-by":"crossref","unstructured":"Thubert, P.: IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) selective fragment recovery, November 2020. https:\/\/www.rfc-editor.org\/rfc\/rfc8931. Accessed 23 Feb 2023","key":"4_CR61","DOI":"10.17487\/RFC8931"},{"unstructured":"Yang, P.: tcp: fix F-RTO may not work correctly when receiving DSACK. https:\/\/lore.kernel.org\/netdev\/165116761177.10854.18409623100154256898.git-patchwork-notify@kernel.org\/t\/. Accessed 24 Mar 2023","key":"4_CR62"},{"doi-asserted-by":"crossref","unstructured":"Yen, J., L\u00e9vai, T., Ye, Q., Ren, X., Govindan, R., Raghavan, B.: Semi-automated protocol disambiguation and code generation. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, pp. 272\u2013286 (2021)","key":"4_CR63","DOI":"10.1145\/3452296.3472910"},{"doi-asserted-by":"crossref","unstructured":"Zarchy, D., Mittal, R., Schapira, M., Shenker, S.: Axiomatizing congestion control. In: Proceedings of the ACM on Measurement and Analysis of Computing Systems, July 2019","key":"4_CR64","DOI":"10.1145\/3309697.3331501"}],"container-title":["Lecture Notes in Computer Science","Networked Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37765-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T19:35:23Z","timestamp":1729712123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37765-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377648","9783031377655"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37765-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NETYS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Networked Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Benguerir","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"netys2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/netys.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}