{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:39:57Z","timestamp":1763728797591,"version":"3.28.0"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001821","name":"Vienna Science and Technology Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001821","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621323","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"2398-2407","source":"Crossref","is-referenced-by-count":2,"title":["SyPer: Synthesis of Perfectly Resilient Local Fast Re-Routing Rules for Highly Dependable Networks"],"prefix":"10.1109","author":[{"given":"Csaba","family":"Gy\u00f6rgyi","sequence":"first","affiliation":[{"name":"University of Vienna"}]},{"given":"Kim G.","family":"Larsen","sequence":"additional","affiliation":[{"name":"Aalborg University"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"University of Vienna"}]},{"given":"Ji\u0159\u00ed","family":"Srba","sequence":"additional","affiliation":[{"name":"Aalborg University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.902727"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018477"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.12367508.v2"},{"article-title":"Ensuring connectivity via data plane mechanisms","volume-title":"NSDI","author":"Liu","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848098"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218382"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620746"},{"article-title":"Exploring the limits of static failover routing (v4)","year":"2016","author":"Chiesa","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524552"},{"key":"ref11","first-page":"134:1","article-title":"On the resiliency of randomized routing against multiple edge failures","volume-title":"ICALP","author":"Chiesa"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888087"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281432"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976489.5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332478"},{"key":"ref16","first-page":"161","article-title":"Blink: Fast connectivity recovery entirely in the data plane","volume-title":"USENIX NSDI","author":"Holterbach"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3558481.3591080"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1959.tb01585.x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.12.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2332432.2332478"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431308"},{"key":"ref24","article-title":"Cudd: Cu decision diagram package release 3.0.0","volume-title":"University of Colorado at Boulder","author":"Somenzi","year":"2015"},{"year":"2023","key":"ref25","article-title":"Omega python package"},{"article-title":"Reproducibility Package for SYPER: Synthesis of Perfectly Resilient Local Fast Re-Routing Rules for Highly Dependable Networks","year":"2024","author":"Gy\u00f6rgyi","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/777412.777446"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094876"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5286"},{"key":"ref30","first-page":"2948","article-title":"IP fast reroute: Loop free alternates revisited","volume-title":"INFOCOM","author":"R\u00e9tv\u00e1ri"},{"key":"ref31","article-title":"Topology independent fast reroute using segment routing","author":"Bashandy","year":"2018","journal-title":"Working Draft"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4090"},{"article-title":"Bgp prefix independent convergence","volume-title":"Cisco","author":"Filsfils","key":"ref33"},{"article-title":"OpenFlow","volume-title":"Switch Specification 1.3.1","year":"2013","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365410"},{"article-title":"Topology independent fast reroute using segment routing","year":"2014","author":"Fran\u00e7ois","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406885"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848157"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535774"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1391289.1391291"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2619398"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488782"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS47363.2019.00028"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00039"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211858"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-012-0455-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737980"},{"key":"ref49","first-page":"579","article-title":"NetComplete: Practical network-wide configuration synthesis with autocompletion","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"El-Hassany"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP55882.2022.9940325"},{"key":"ref51","first-page":"730","article-title":"Learning to configure computer networks with neural algorithmic reasoning","volume":"35","author":"Beurer-Kellner","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2023.102992"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"ref54","first-page":"953","article-title":"Plankton: Scalable network configuration verification through model checking","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation ({NSDI} 20)","author":"Prabhu"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737980"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31784-3_30"},{"key":"ref57","first-page":"579","article-title":"Netcomplete: Practical network-wide configuration synthesis with autocompletion","volume-title":"USENIX NSDI","author":"El-Hassany"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535862"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569140"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10363-6_23"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621323.pdf?arnumber=10621323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:42:22Z","timestamp":1723527742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621323","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}