{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:12:49Z","timestamp":1765231969670},"publisher-location":"Berlin, Heidelberg","reference-count":61,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642276934"},{"type":"electronic","value":"9783642276941"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27694-1_1","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T22:38:40Z","timestamp":1328654320000},"page":"1-16","source":"Crossref","is-referenced-by-count":5,"title":["Recent Advances in Declarative Networking"],"prefix":"10.1007","author":[{"given":"Boon Thau","family":"Loo","sequence":"first","affiliation":[]},{"given":"Harjot","family":"Gill","sequence":"additional","affiliation":[]},{"given":"Changbin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Mao","sequence":"additional","affiliation":[]},{"given":"William R.","family":"Marczak","sequence":"additional","affiliation":[]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[]},{"given":"Anduo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Gecode constraint development environment, \n                  \n                    http:\/\/www.gecode.org\/"},{"key":"1_CR2","unstructured":"PVS Specification and Verification System, \n                  \n                    http:\/\/pvs.csl.sri.com\/"},{"key":"1_CR3","unstructured":"RapidNet, \n                  \n                    http:\/\/netdb.cis.upenn.edu\/rapidnet\/"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Alvaro, P., Condie, T., Conway, N., Elmeleegy, K., Hellerstein, J.M., Sears, R.: Boom Analytics: Exploring Data-Centric, Declarative Programming for the Cloud. In: Proceedings of Eurosys (2010)","DOI":"10.1145\/1755913.1755937"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Alvaro, P., Marczak, W., Conway, N., Hellerstein, J.M., Maier, D., Sears, R.C.: Dedalus: Datalog in time and space. Technical Report UCB\/EECS-2009-173, EECS Department, University of California, Berkeley (December 2009)","DOI":"10.21236\/ADA538767"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Ameloot, T.J., Neven, F., Van den Bussche, J.: Relational Transducers for Declarative Networking. In: PODS (2011)","DOI":"10.1145\/1989284.1989321"},{"key":"1_CR7","unstructured":"Application Aware Anonymity, \n                  \n                    http:\/\/a3.cis.upenn.edu\/"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Balakrishnan, H., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Looking Up Data in P2P Systems. Communications of the ACM\u00a046(2) (2003)","DOI":"10.1145\/606272.606299"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0743-1066(87)90004-5","volume":"4","author":"I. Balbin","year":"1987","unstructured":"Balbin, I., Ramamohanarao, K.: A Generalization of the Differential Approach to Recursive Query Evaluation. Journal of Logic Prog.\u00a04(3), 259\u2013262 (1987)","journal-title":"Journal of Logic Prog."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Mao, Y., Mao, Z.M., van der Merwe, J.: Declarative Configuration Management for Complex and Dynamic Networks. In: CoNEXT (2010)","DOI":"10.1145\/1921168.1921176"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Chu, D.C., Popa, L., Tavakoli, A., Hellerstein, J.M., Levis, P., Shenker, S., Stoica, I.: The Design and Implementation of a Declarative Sensor Network System. In: 5th ACM Conference on Embedded networked Sensor Systems, SenSys (2007)","DOI":"10.1145\/1322263.1322281"},{"key":"1_CR12","unstructured":"DeTreville, J.: Binder: A logic-based security language. In: IEEE Symposium on Security and Privacy (2002)"},{"key":"1_CR13","unstructured":"Gelfond, M., Lifschitz, V.: The Stable Model Semantics For Logic Programming. In: ICLP\/SLP, pp. 1070\u20131080 (1988)"},{"key":"1_CR14","unstructured":"Gill, H., Saeed, T., Fei, Q., Zhang, Z., Loo, B.T.: An Open-source and Declarative Approach Towards Teaching Large-scale Networked Systems Programming. In: SIGCOMM Education Workshop (2011)"},{"issue":"2","key":"1_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D. Goldschlag","year":"1999","unstructured":"Goldschlag, D., Reed, M., Syverson, P.: Onion Routing. Communications of the ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Communications of the ACM"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Griffin, T.G., Sobrinho, J.L.: Metarouting. In: ACM SIGCOMM (2005)","DOI":"10.1145\/1080091.1080094"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, A., Mumick, I.S., Subrahmanian, V.S.: Maintaining Views Incrementally. In: Proceedings of ACM SIGMOD International Conference on Management of Data (1993)","DOI":"10.1145\/170035.170066"},{"key":"1_CR18","unstructured":"Hadoop, \n                  \n                    http:\/\/hadoop.apache.org\/"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Hellerstein, J.M.: Declarative imperative: Experiences and conjectures in distributed logic. SIGMOD Record\u00a039(1) (2010)","DOI":"10.1145\/1860702.1860704"},{"key":"1_CR20","unstructured":"Jim, T.: SD3: A Trust Management System With Certified Evaluation. In: IEEE Symposium on Security and Privacy (2001)"},{"issue":"3","key":"1_CR21","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/354871.354874","volume":"18","author":"E. Kohler","year":"2000","unstructured":"Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The Click Modular Router. ACM Transactions on Computer Systems\u00a018(3), 263\u2013297 (2000)","journal-title":"ACM Transactions on Computer Systems"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation Logic: A logic-based approach to distributed authorization. ACM TISSEC (2003)","DOI":"10.1145\/605434.605438"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Liu, C., Correa, R., Gill, H., Gill, T., Li, X., Muthukumar, S., Saeed, T., Loo, B.T., Basu, P.: PUMA: Policy-based Unified Multi-radio Architecture for Agile Mesh Networking. In: 4th International Conference on Communication Systems and Networks, COMSNETS (2012)","DOI":"10.1109\/COMSNETS.2012.6151315"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Liu, C., Correa, R., Li, X., Basu, P., Loo, B.T., Mao, Y.: Declarative policy-based adaptive mobile ad hoc networking. IEEE\/ACM Transactions on Networking, ToN (2011)","DOI":"10.1109\/TNET.2011.2165851"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Liu, C., Loo, B.T., Mao, Y.: Declarative Automated Cloud Resource Orchestration. In: ACM Symposium on Cloud Computing, SOCC (2011)","DOI":"10.1145\/2038916.2038942"},{"key":"1_CR26","unstructured":"LogicBlox Inc., \n                  \n                    http:\/\/www.logicblox.com\/"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative Networking: Language, Execution and Optimization. In: Proceedings of ACM SIGMOD International Conference on Management of Data (2006)","DOI":"10.1145\/1142473.1142485"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative Networking. Communications of the ACM, CACM (2009)","DOI":"10.1145\/1592761.1592785"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Condie, T., Hellerstein, J.M., Maniatis, P., Roscoe, T., Stoica, I.: Implementing Declarative Overlays. In: Proceedings of ACM Symposium on Operating Systems Principles (2005)","DOI":"10.1145\/1095810.1095818"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Hellerstein, J.M., Stoica, I.: Customizable Routing with Declarative Queries. In: ACM SIGCOMM Hot Topics in Networks (2004)","DOI":"10.1145\/1080091.1080126"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Loo, B.T., Hellerstein, J.M., Stoica, I., Ramakrishnan, R.: Declarative Routing: Extensible Routing with Declarative Queries. In: Proceedings of ACM SIGCOMM Conference on Data Communication (2005)","DOI":"10.1145\/1080091.1080126"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Mao, Y.: On the declarativity of declarative networking. In: ACM NetDB Workshop (2009)","DOI":"10.1145\/1713254.1713260"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Mao, Y., Loo, B.T., Ives, Z., Smith, J.M.: MOSAIC: Unified Platform for Dynamic Overlay Selection and Composition. In: CoNEXT (2008)","DOI":"10.1145\/1544012.1544017"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Marczak, W.R., Huang, S.S., Bravenboer, M., Sherr, M., Loo, B.T., Aref, M.: SecureBlox: Customizable Secure Distributed Data Processing. In: SIGMOD (2010)","DOI":"10.1145\/1807167.1807246"},{"key":"1_CR35","unstructured":"Marczak, W.R., Zook, D., Zhou, W., Aref, M., Loo, B.T.: Declarative Reconfigurable Trust Management. In: Proceedings of Conference on Innovative Data Systems Research, CIDR (2009)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Liu, M., Taylor, N., Zhou, W., Ives, Z., Loo, B.T.: Recursive Computation of Regions and Connectivity in Networks. In: Proceedings of IEEE Conference on Data Engineering, ICDE (2009)","DOI":"10.1109\/ICDE.2009.36"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Muthukumar, S.C., Li, X., Liu, C., Kopena, J.B., Oprea, M., Correa, R., Loo, B.T., Basu, P.: RapidMesh: declarative toolkit for rapid experimentation of wireless mesh networks. In: WINTECH (2009)","DOI":"10.1145\/1614293.1614295"},{"key":"1_CR38","unstructured":"Muthukumar, S.C., Li, X., Liu, C., Kopena, J.B., Oprea, M., Loo, B.T.: Declarative toolkit for rapid network protocol simulation and experimentation. In: SIGCOMM, demo (2009)"},{"key":"1_CR39","unstructured":"NetDB@Penn, \n                  \n                    http:\/\/netdb.cis.upenn.edu\/"},{"key":"1_CR40","unstructured":"Network Simulator 3, \n                  \n                    http:\/\/www.nsnam.org\/"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Nigam, V., Jia, L., Loo, B.T., Scedrov, A.: Maintaining distributed logic programs incrementally. In: 13th International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, PPDP (2011)","DOI":"10.1145\/2003476.2003495"},{"key":"1_CR42","unstructured":"ORBIT - Wireless Network Testbed, \n                  \n                    http:\/\/www.orbit-lab.org\/"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Perich, F.: Policy-based Network Management for NeXt Generation Spectrum Access Control. In: DySPAN (2007)","DOI":"10.1109\/DYSPAN.2007.72"},{"key":"1_CR44","unstructured":"PlanetLab. Global testbed, \n                  \n                    http:\/\/www.planet-lab.org\/"},{"key":"1_CR45","unstructured":"Quagga Routing Suite, \n                  \n                    http:\/\/www.quagga.net\/"},{"issue":"2","key":"1_CR46","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0743-1066(94)00039-9","volume":"23","author":"R. Ramakrishnan","year":"1993","unstructured":"Ramakrishnan, R., Ullman, J.D.: A Survey of Research on Deductive Database Systems. Journal of Logic Programming\u00a023(2), 125\u2013149 (1993)","journal-title":"Journal of Logic Programming"},{"key":"1_CR47","unstructured":"RapidNet Declarative Networking Engine, \n                  \n                    http:\/\/netdb.cis.upenn.edu\/rapidnet\/"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Ren, Y., Zhou, W., Wang, A., Jia, L., Gurney, A.J., Loo, B.T., Rexford, J.: FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing. In: ACM SIGCOMM Conference on Data Communication, demonstration (2011)","DOI":"10.1145\/2018436.2018510"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Sacc\u00e0, D., Zaniolo, C.: Stable Models and Non-Determinism in Logic Programs with Negation. In: PODS, pp. 205\u2013217 (1990)","DOI":"10.1145\/298514.298572"},{"key":"1_CR50","unstructured":"Secure BGP, \n                  \n                    http:\/\/www.ir.bbn.com\/sbgp\/"},{"key":"1_CR51","unstructured":"Sherr, M., Mao, A., Marczak, W.R., Zhou, W., Loo, B.T., Blaze, M.: A3: An Extensible Platform for Application-Aware Anonymity. In: Network and Distributed System Security (2010)"},{"key":"1_CR52","unstructured":"Singh, A., Das, T., Maniatis, P., Druschel, P., Roscoe, T.: BFT Protocols Under Fire. In: USENIX Symposium on Networked Systems Design and Implementation (2008)"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Wang, A., Basu, P., Loo, B.T., Sokolsky, O.: Towards declarative network verification. In: 11th International Symposium on Practical Aspects of Declarative Languages, PADL (2009)","DOI":"10.1007\/978-3-540-92995-6_5"},{"key":"1_CR54","unstructured":"Wang, A., Jia, L., Zhou, W., Ren, Y., Loo, B.T., Rexford, J., Nigam, V., Scedrov, A., Talcott, C.: FSR: Formal analysis and implementation toolkit for safe inter-domain routing. University of Pennsylvania CIS Technical Report No. MS-CIS-11-10 (2011), \n                  \n                    http:\/\/repository.upenn.edu\/cis_reports\/954\/"},{"key":"1_CR55","unstructured":"Yices, \n                  \n                    http:\/\/yices.csl.sri.com\/"},{"key":"1_CR56","unstructured":"Zhou, W., Ding, L., Haeberlen, A., Ives, Z., Loo, B.T.: Tap: Time-aware provenance for distributed systems. In: 3rd USENIX Workshop on the Theory and Practice of Provenance, TaPP 2011 (2011)"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Zhou, W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: Proceedings of ACM Symposium on Operating Systems Principles (2011)","DOI":"10.1145\/2043556.2043584"},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Zhou, W., Fei, Q., Sun, S., Tao, T., Haeberlen, A., Ives, Z., Loo, B.T., Sherr, M.: Nettrails: A declarative platform for provenance maintenance and querying in distributed systems. In: SIGMOD, demonstration (2011)","DOI":"10.1145\/1989323.1989488"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Zhou, W., Mao, Y., Loo, B.T., Abadi, M.: Unified Declarative Platform for Secure Networked Information Systems. In: Proceedings of IEEE Conference on Data Engineering, ICDE (2009)","DOI":"10.1109\/ICDE.2009.58"},{"key":"1_CR60","doi-asserted-by":"crossref","unstructured":"Zhou, W., Sherr, M., Tao, T., Li, X., Loo, B.T., Mao, Y.: Efficient querying and maintenance of network provenance at Internet-scale. In: Proc. SIGMOD (2010)","DOI":"10.1145\/1807167.1807234"},{"key":"1_CR61","doi-asserted-by":"crossref","unstructured":"Zhou, W., Sokolsky, O., Loo, B.T., Lee, I.: Dmac: Distributed monitoring and checking. In: 9th International Workshop on Runtime Verification, RV (2009)","DOI":"10.1007\/978-3-642-04694-0_13"}],"container-title":["Lecture Notes in Computer Science","Practical Aspects of Declarative Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27694-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T07:19:43Z","timestamp":1556263183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27694-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642276934","9783642276941"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27694-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}