{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:08Z","timestamp":1767339668323,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Swiss NSF","award":["200021_166132"],"award-info":[{"award-number":["200021_166132"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1561209","CNS-1518779","CNS-1111698","CCF-1253165","CNS-1413972","CCF-1422046","ACI-1440744","CCF-1535952"],"award-info":[{"award-number":["CNS-1561209","CNS-1518779","CNS-1111698","CCF-1253165","CNS-1413972","CCF-1422046","ACI-1440744","CCF-1535952"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ONR","award":["N00014-15-1-2177"],"award-info":[{"award-number":["N00014-15-1-2177"]}]},{"name":"Cisco"},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003393","name":"Fujitsu","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003393","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tnet.2018.2867239","type":"journal-article","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T18:49:35Z","timestamp":1536778175000},"page":"2188-2201","source":"Crossref","is-referenced-by-count":16,"title":["Merlin: A Language for Managing Network Resources"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2825-6660","authenticated-orcid":false,"given":"Robert","family":"Soule","sequence":"first","affiliation":[]},{"given":"Shrutarshi","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Parisa Jalili","family":"Marandi","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Pedone","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kleinberg","sequence":"additional","affiliation":[]},{"given":"Emin Gun","family":"Sirer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6557-684X","authenticated-orcid":false,"given":"Nate","family":"Foster","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Dprle Decision Procedure Library","year":"2017","author":"hooimeijer","key":"ref39"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","article-title":"Z3: An Efficient SMT Solver","author":"moura","year":"2008","journal-title":"Proc Int Conf Tools Algorithms Construct Anal Syst"},{"key":"ref33","first-page":"137","article-title":"MapReduce: Simplified data processing on large clusters","author":"dean","year":"2004","journal-title":"Proc Symp Oper Syst Desing Implement"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"1979","author":"hopcroft","key":"ref32"},{"key":"ref31","first-page":"533","article-title":"Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags","author":"fayazbakhsh","year":"2014","journal-title":"Proc Symp Netw Syst Desing Implement"},{"year":"2017","key":"ref30"},{"journal-title":"Gurobi Optimizer","year":"2017","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755949"},{"key":"ref35","first-page":"297","article-title":"EyeQ: Practical network performance isolation at the edge","author":"jeyakumar","year":"2013","journal-title":"Proc Symp Netw Syst Desing Implement"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2008927"},{"key":"ref60","first-page":"190","article-title":"Implementing a distributed firewall","author":"ioannidis","year":"2000","journal-title":"Proc Conf Comp Comm Sec"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592583"},{"key":"ref61","first-page":"229","article-title":"Snort&#x2014;Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc Conf Syst Admin"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"ref28","first-page":"1","article-title":"The frenetic network controller","author":"foster","year":"2013","journal-title":"Proc OCaml Users Developers Workshop"},{"key":"ref64","first-page":"13","article-title":"Making middleboxes someone else&#x2019;s problem: network processing as a cloud service","author":"sherry","year":"2012","journal-title":"Proc Conf Appl Technol Archit Protocols Comput Commun"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"ref2","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"2013","journal-title":"Proc Symp Netw Syst Des Implement"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1996.548465"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2418(1999010)14:1<87::AID-RSA5>3.0.CO;2-O"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539799355314"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1996.548467"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49543-6_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1287\/opre.48.2.318.12378"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0095-8956(81)80012-3"},{"key":"ref50","first-page":"527","article-title":"Ring Paxos: A high-throughput atomic broadcast protocol","author":"marandi","year":"2010","journal-title":"Proc Int Conf Dependable Syst Netw"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342396"},{"key":"ref58","first-page":"1","article-title":"Seawall: Performance isolation for cloud datacenter networks","author":"shieh","year":"2010","journal-title":"Proc of Workshop on Hot Topics in Cloud Computing"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018465"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"journal-title":"Developer Network","year":"2017","key":"ref55"},{"year":"2017","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"ref52","first-page":"85","article-title":"ETTM: A scalable fault tolerant network manager","author":"dixon","year":"2011","journal-title":"Proc Symp Netw Syst Desing Implement"},{"journal-title":"Intent-Based Networking","year":"2017","author":"lerner","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103685"},{"year":"2017","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535792"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535373"},{"key":"ref15","volume":"1","author":"aho","year":"1972","journal-title":"The Theory of Parsing Translation and Compiling"},{"journal-title":"Network Flows Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-45753-4_7","article-title":"Approximation algorithms for the unsplittable flow problem","author":"chakrabarti","year":"2002","journal-title":"Proceedings of the 5th International Workshop on Approximation Algorithms for Combinatorial Optimization"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.54"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s004930050043"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390233"},{"key":"ref5","first-page":"1","article-title":"Tierless programming and reasoning for software-defined networks","author":"nelson","year":"2014","journal-title":"Proc Symp Netw Syst Des Implement"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402966"},{"key":"ref49","first-page":"251","article-title":"Spanner: Google&#x2019;s globally-distributed database","author":"corbett","year":"2012","journal-title":"Proc Symp Oper Syst Desing Implement"},{"key":"ref9","first-page":"24","article-title":"Design and implementation of a consolidated middlebox architecture","author":"sekar","year":"2012","journal-title":"Proc Symp Netw Syst Des Implement"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043559"},{"key":"ref47","first-page":"335","article-title":"The Chubby lock service for loosely-coupled distributed systems","author":"burrows","year":"2006","journal-title":"Proc Symp Oper Syst Desing Implement"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-006-4900-5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/762483.762485"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.03.013"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielaam\/90\/8491738\/8464096-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/8491738\/08464096.pdf?arnumber=8464096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:49:13Z","timestamp":1649443753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8464096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":68,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2018.2867239","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}