{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:41:21Z","timestamp":1760420481047,"version":"build-2065373602"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,22]]},"DOI":"10.1109\/icnp65844.2025.11192409","type":"proceedings-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T17:38:54Z","timestamp":1760377134000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["HeTu: High-Performance Centralized Parallel Data-Plane Verification for Hyper-Scale DCNs"],"prefix":"10.1109","author":[{"given":"Peng","family":"Peng","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University,China"}]},{"given":"Xun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,China"}]},{"given":"Zhengtao","family":"Shen","sequence":"additional","affiliation":[{"name":"ByteDance,China"}]},{"given":"Feiyang","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,China"}]},{"given":"Jiawei","family":"Chen","sequence":"additional","affiliation":[{"name":"ByteDance,China"}]},{"given":"Lizhao","family":"You","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,China"}]},{"given":"Weirong","family":"Jiang","sequence":"additional","affiliation":[{"name":"ByteDance,China"}]},{"given":"Yongping","family":"Tang","sequence":"additional","affiliation":[{"name":"ByteDance,China"}]},{"given":"Feng","family":"Luo","sequence":"additional","affiliation":[{"name":"ByteDance,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342094"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663420"},{"volume-title":"Cisco Application Policy Infrastructure Controller (APIC)","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3114448"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018470"},{"key":"ref7","first-page":"113","article-title":"Header space analysis: Static checking for networks","author":"Kazemian","year":"2012","journal-title":"USENIX NSDI"},{"key":"ref8","first-page":"15","article-title":"Veriflow: Verifying network-wide invariants in real time","author":"Khurshid","year":"2013","journal-title":"USENIX NSDI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"ref10","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"Kazemian","year":"2013","journal-title":"USENIX NSDI"},{"key":"ref11","first-page":"469","article-title":"A general approach to network configuration analysis","author":"Fogel","year":"2015","journal-title":"USENIX NSDI"},{"volume-title":"Batfish","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_4"},{"key":"ref14","first-page":"735","article-title":"Delta-net: Real-time network verification using atoms","author":"Horn","year":"2017","journal-title":"USENIX NSDI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888144"},{"key":"ref16","first-page":"241","article-title":"Apkeep: Realtime verification for real networks","author":"Zhang","year":"2020","journal-title":"USENIX NSDI"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544246"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604866"},{"key":"ref19","first-page":"87","article-title":"Libra: Divide and conquer to verify forwarding tables in huge networks","author":"Zeng","year":"2014","journal-title":"USENIX NSDI"},{"article-title":"Fine-grained distributed data plane verification with intent-based slicing","year":"2024","author":"Chou","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604843"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3689031.3717494"},{"volume-title":"BuDDy: A BDD Package","year":"1999","author":"Lind-Nielsen","key":"ref23"},{"volume-title":"CUDD: CU Decision Diagram Package, Release 2.7.0","year":"2024","author":"Somenzi","key":"ref24"},{"volume-title":"JDD: Java BDD package","key":"ref25"},{"key":"ref26","first-page":"237","article-title":"NDD: A decision diagram for network verification","volume-title":"22nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 25)","author":"Li"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10431-7_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-016-0433-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88885-5_10"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS57882.2023.10139480"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3610845"},{"volume-title":"HeTu","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406220"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3629145"},{"key":"ref35","article-title":"An introduction to binary decision diagrams","author":"Andersen","year":"1997","journal-title":"Lecture Notes"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733614"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"volume-title":"Sybila\/biodivine-lib-bdd","key":"ref38"},{"volume-title":"Snlab\/flash","key":"ref39"},{"volume-title":"Sngroup-xmu\/ddpv-pubilc","key":"ref40"}],"event":{"name":"2025 IEEE 33rd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2025,9,22]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2025,9,25]]}},"container-title":["2025 IEEE 33rd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11192357\/11192322\/11192409.pdf?arnumber=11192409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T05:08:27Z","timestamp":1760418507000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11192409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icnp65844.2025.11192409","relation":{},"subject":[],"published":{"date-parts":[[2025,9,22]]}}}