{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:08:21Z","timestamp":1773194901155,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00059","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"501-509","source":"Crossref","is-referenced-by-count":0,"title":["User Study of a Network Debugger on FABRIC"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Wolosewicz","sequence":"first","affiliation":[{"name":"Illinois Tech,Chicago,USA"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI,Menlo Park,California"}]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[{"name":"SRI,Menlo Park,California"}]},{"given":"Nik","family":"Sultana","sequence":"additional","affiliation":[{"name":"Illinois Tech,Chicago,USA"}]}],"member":"263","reference":[{"issue":"6","key":"ref1","first-page":"757","article-title":"Representing distributed systems using the open provenance model","volume-title":"Future Generation Computer Systems","volume":"27","author":"Groth","year":"2011"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35170-9_6","article-title":"SPADE: Support for Provenance Auditing in Distributed Environments","volume-title":"13th ACM\/IFIP\/USENIX International Middleware Conference","author":"Gehani"},{"key":"ref3","article-title":"TRACE: Enterprise-Wide Provenance Tracking For Real-Time APT Detection","volume-title":"IEEE Transactions on Information Forensics and Security (TIFS)","volume":"16","author":"Irshad","year":"2021"},{"key":"ref4","article-title":"Magpie: Online modelling and performance-aware systems","volume-title":"9th Workshop on Hot Topics in Operating Systems (HotOS IX)","author":"Barham"},{"key":"ref5","article-title":"XTrace: A pervasive network tracing framework","volume-title":"4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 07)","author":"Fonseca"},{"key":"ref6","article-title":"Dapper, a large-scale distributed systems tracing infrastructure","author":"Sigelman","year":"2010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35576-9_24"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2019.2958545"},{"key":"ref9","article-title":"Enabling Reproducibility through the SPHERE Research Infrastructure","author":"Mirkovic","year":"2024","journal-title":"USENIX ;login"},{"key":"ref10","article-title":"Experiment Management APIs (FABLib)"},{"key":"ref11","article-title":"Project Jupyter"},{"key":"ref12","article-title":"FABRIC Artifact Manager"},{"key":"ref13","article-title":"Sharing Experiments with Trovi","author":"Powers","year":"2022"},{"key":"ref14","article-title":"Network Services in FABRIC"},{"key":"ref15","article-title":"Lessons learned from the chameleon testbed","volume-title":"Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC \u201920)","author":"Keahey"},{"key":"ref16","article-title":"FABRIC Forums: FABRIC TACC and FABRIC INDI dataplane links are down","year":"2024"},{"key":"ref17","article-title":"FABRIC Forums: STAR site power loss, connectivity losses","year":"2023"},{"key":"ref18","article-title":"L2Bridge without MAC learning?","year":"2023"},{"key":"ref19","article-title":"Applying the Rule of Least Surprise","author":"Raymond","year":"2008"},{"key":"ref20","article-title":"FABRIC Forums: failed lease update all units failed in priming","year":"2024"},{"key":"ref21","article-title":"Data Plane Development Kit"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/sp61157.2025.00028"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DCIS.2015.7388601"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6555325"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604877"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3563766.3564105"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3605573.3605622"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418009.pdf?arnumber=11418009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:29:38Z","timestamp":1773120578000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00059","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}