{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:47:47Z","timestamp":1757540867233,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,30]],"date-time":"2022-10-30T00:00:00Z","timestamp":1667088000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,30]]},"DOI":"10.1109\/icnp55882.2022.9940438","type":"proceedings-article","created":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T17:04:38Z","timestamp":1668445478000},"page":"1-11","source":"Crossref","is-referenced-by-count":7,"title":["Probabilistic Analysis of Network Availability"],"prefix":"10.1109","author":[{"given":"Yunmo","family":"Zhang","sequence":"first","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science"}]},{"given":"Hong","family":"Xu","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong,Department of Computer Science and Engineering"}]},{"given":"Chun Jason","family":"Xue","sequence":"additional","affiliation":[{"name":"City University of Hong Kong,Department of Computer Science"}]},{"given":"Tei-Wei","family":"Kuo","sequence":"additional","affiliation":[{"name":"National Taiwan University,Department of Computer Science and Information Engineering"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1287\/opre.32.6.1296"},{"key":"ref38","article-title":"Cost-Effective Cloud Edge Traffic Engineering with Cascara","author":"singh","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10100-014-0354-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2005.08.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.06.024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-003-0447-x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096551"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523638"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/102782.102783"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009843"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0217060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2582112.2582133"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3194656"},{"key":"ref14","article-title":"Efficient Network Reachability Analysis Using a Succinct Control Plane Representation","author":"fayaz","year":"0","journal-title":"Proc USENIX OSDI"},{"key":"ref15","article-title":"A General Approach to Network Configuration Analysis","author":"fogel","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"ref19","article-title":"Meaningful Availability","author":"hauer","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626314"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804090"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-8438-9_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s101070050099"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02591694"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.61109"},{"key":"ref7","article-title":"Robust Validation of Network Designs under Uncertain Demands and Failures","author":"chang","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref2","first-page":"5","article-title":"Hit and Run as a Unifying Device","volume":"148","author":"andersen","year":"2007","journal-title":"Journal de la Soci&#x00E9;t&#x00E9; Fran&#x00E7;aise de Statistique"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"journal-title":"Topology Zoo","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2992"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385976"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(199708)11:1<1::AID-RSA1>3.0.CO;2-X"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486019"},{"key":"ref44","article-title":"We've Got You Covered: Failure Recovery with Backup Tunnels in Traffic Engineering","author":"zheng","year":"0","journal-title":"Proc IEEE ICNP 2016"},{"key":"ref26","article-title":"Semi-Oblivious Traffic Engineering: The Road Not Taken","author":"kumar","year":"0","journal-title":"Proc USENIX NSDI"},{"key":"ref43","article-title":"Multiprotocol Label Switching Architecture","author":"viswanathan","year":"2001","journal-title":"RFC 3031"},{"key":"ref25","article-title":"Header Space Analysis: Static Checking for Networks","author":"kazemian","year":"0","journal-title":"Proc USENIX NSDI"}],"event":{"name":"2022 IEEE 30th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2022,10,30]]},"location":"Lexington, KY, USA","end":{"date-parts":[[2022,11,2]]}},"container-title":["2022 IEEE 30th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9940251\/9940258\/09940438.pdf?arnumber=9940438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T14:57:47Z","timestamp":1670857067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9940438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,30]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icnp55882.2022.9940438","relation":{},"subject":[],"published":{"date-parts":[[2022,10,30]]}}}