{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:08:40Z","timestamp":1752282520017},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,10]]},"DOI":"10.1109\/infocom42981.2021.9488857","type":"proceedings-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:07:32Z","timestamp":1627344452000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Flow Algebra: Towards an Efficient, Unifying Framework for Network Management Tasks"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Leet","sequence":"first","affiliation":[]},{"given":"Robert","family":"Soule","sequence":"additional","affiliation":[]},{"given":"Yang Richard","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"P4-16 language specification","year":"2016","key":"ref39"},{"journal-title":"Openflow Spec","year":"2014","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref31","article-title":"Towards a declarative language and system for secure networking","author":"abadi","year":"2007","journal-title":"Proceedings of the 3rd USENIX International Workshop on Networking Meets Databases ser NETB&#x2019;07"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142485"},{"journal-title":"Flow Algebra Technical Report","year":"0","key":"ref37"},{"journal-title":"P4 switch","year":"2016","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365417"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098830"},{"journal-title":"Most Popular Databases in 2020 Here&#x2019;s How They Stack Up","year":"2020","author":"babeni","key":"ref10"},{"journal-title":"Developer Survey Results 2019","year":"2019","author":"overflow","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3191315.3191317"},{"article-title":"Plankton: Scalable network configuration verification through model checking","year":"2019","author":"prabhu","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref15","article-title":"A general approach to network configuration analysis","author":"fogel","year":"2015","journal-title":"12th USENIX Symposium on Networked Systems Design and Implementation ( NSDI 15)"},{"key":"ref16","article-title":"Efficient network reachability analysis using a succinct control plane representation","author":"fayaz","year":"2016","journal-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation ser OSDI&#x2019;16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"ref18","article-title":"Veriflow: Verifying network-wide invariants in real time","author":"khurshid","year":"2013","journal-title":"10th USENIX Symposium on Networked Systems Design and Implementation Ser NSDI '13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365430"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2720172"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7285"},{"key":"ref3","article-title":"Real-time verification of network properties using atomic predicates","author":"yang","year":"2015","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"ref6","article-title":"Covisor: A compositional hypervisor for software-defined networks","author":"jin","year":"2015","journal-title":"NSDI15"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890970"},{"article-title":"Apkeep: Realtime verification for real networks","year":"0","author":"zhang","key":"ref5"},{"key":"ref8","article-title":"Real time network policy checking using header space analysis","author":"kazemian","year":"2013","journal-title":"NSDI"},{"journal-title":"Hassel-C","year":"0","author":"kazemian","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"ref9","article-title":"Checking beliefs in dynamic networks","author":"lopes","year":"2015","journal-title":"12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref22","article-title":"BUZZ: Testing context-dependent policies in stateful networks","author":"fayaz","year":"2016","journal-title":"13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185499"},{"key":"ref24","article-title":"Netsmc: A custom symbolic model checker for stateful network verification","author":"yuan","year":"2020","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402999"},{"key":"ref25","article-title":"Liveness verification of stateful network functions","author":"yousefi","year":"2020","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"}],"event":{"name":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","start":{"date-parts":[[2021,5,10]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2021,5,13]]}},"container-title":["IEEE INFOCOM 2021 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9488422\/9488423\/09488857.pdf?arnumber=9488857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:43:40Z","timestamp":1652197420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9488857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/infocom42981.2021.9488857","relation":{},"subject":[],"published":{"date-parts":[[2021,5,10]]}}}