{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:51:39Z","timestamp":1730220699613,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/eucnc.2018.8442793","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T18:05:56Z","timestamp":1535047556000},"page":"203-208","source":"Crossref","is-referenced-by-count":4,"title":["Transactional Network Updates in SDN"],"prefix":"10.1109","author":[{"given":"Maja","family":"Curic","sequence":"first","affiliation":[]},{"given":"Zoran","family":"Despotovic","sequence":"additional","affiliation":[]},{"given":"Artur","family":"Hecker","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2491185.2491200"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/2342356.2342427"},{"key":"ref12","first-page":"4:1","article-title":"Ravana: Controller fault-tolerance in software-defined networking","author":"katta","year":"2015","journal-title":"Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research ser SOSR '15"},{"year":"2015","author":"porras","journal-title":"Securing the Software-Defined Network Control Layer[J]","key":"ref13"},{"year":"0","journal-title":"Floodlight OpenFlow Controller-Project Floodlight","key":"ref14"},{"year":"0","key":"ref15"},{"year":"2018","journal-title":"Acidrepo","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3155921.3155924"},{"key":"ref18","article-title":"Lessons from three views of the internet topology","volume":"abs cs 508033","author":"mahadevan","year":"2005","journal-title":"CoRR"},{"key":"ref19","article-title":"Wireless backhaul topologies: Analyzing backhaul topology strategies","author":"nadiv","year":"2010","journal-title":"Ceragon White Paper"},{"key":"ref4","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"kazemian","year":"2013","journal-title":"Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation ser Nsdi'13"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2342441.2342452"},{"year":"2001","author":"weikum","journal-title":"Transactional Information Systems Theory Algorithms and the Practice of Concurrency Control and Recovery","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2875951.2875957"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2619239.2626307"},{"key":"ref7","first-page":"292","article-title":"The principle of commitment ordering, or guaranteeing se-rializability in a heterogeneous environment of multiple autonomous resource mangers using atomic commitment","author":"raz","year":"1992","journal-title":"Proceedings of the 18th International Conference on Very Large Data Bases Ser VLDB'92"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/INFOCOM.2016.7524420"},{"year":"2008","author":"garcia-molina","journal-title":"Database Systems The Complete Book","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INFOCOM.2016.7524418"},{"key":"ref20","article-title":"Using carrier ethernet to backhaul lte","author":"howard","year":"2011","journal-title":"Infonetics Research White Paper"}],"event":{"name":"2018 European Conference on Networks and Communications (EuCNC)","start":{"date-parts":[[2018,6,18]]},"location":"Ljubljana, Slovenia","end":{"date-parts":[[2018,6,21]]}},"container-title":["2018 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8412474\/8442432\/08442793.pdf?arnumber=8442793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:30:10Z","timestamp":1643178610000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8442793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2018.8442793","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}