{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:46Z","timestamp":1750307746794,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T00:00:00Z","timestamp":1188172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,8,27]]},"DOI":"10.1145\/1321753.1321757","type":"proceedings-article","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T14:39:06Z","timestamp":1196433546000},"page":"242-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Towards automated network management"],"prefix":"10.1145","author":[{"given":"Xu","family":"Chen","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Jacobus","family":"van der Merwe","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs--Research"}]}],"member":"320","published-online":{"date-parts":[[2007,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Configuration Management at a Massive Scale: System Design and Experience,\" in Proceedings of Usenix Annual Technical Conference","author":"Enck W.","year":"2007","unstructured":"W. Enck , P. McDaniel , S. Sen , P. Sebos , S. Spoerrel , A. Greenberg , S. Rao , and W. Aiello , \" Configuration Management at a Massive Scale: System Design and Experience,\" in Proceedings of Usenix Annual Technical Conference , 2007 . W. Enck, P. McDaniel, S. Sen, P. Sebos, S. Spoerrel, A. Greenberg, S. Rao, and W. Aiello, \"Configuration Management at a Massive Scale: System Design and Experience,\" in Proceedings of Usenix Annual Technical Conference, 2007."},{"key":"e_1_3_2_1_2_1","volume-title":"AT&T Research","author":"Feldmann A.","year":"1999","unstructured":"A. Feldmann , \"Netdb : IP Network Configuration Debugger\/Database,\" tech. rep ., AT&T Research , July 1999 . A. Feldmann, \"Netdb: IP Network Configuration Debugger\/Database,\" tech. rep., AT&T Research, July 1999."},{"key":"e_1_3_2_1_3_1","volume-title":"MA)","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan , \" Detecting BGP Configuration Faults with Static Analysis,\" in 2nd Symp. on Networked Systems Design and Implementation (NSDI), (Boston , MA) , May 2005 . N. Feamster and H. Balakrishnan, \"Detecting BGP Configuration Faults with Static Analysis,\" in 2nd Symp. on Networked Systems Design and Implementation (NSDI), (Boston, MA), May 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162681"},{"key":"e_1_3_2_1_5_1","volume-title":"Sometimes Called TACACS.\" RFC","author":"Finseth C.","year":"1993","unstructured":"C. Finseth , \" An Access Control Protocol , Sometimes Called TACACS.\" RFC 1492, July 1993 . C. Finseth, \"An Access Control Protocol, Sometimes Called TACACS.\" RFC 1492, July 1993."},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on Hot Topics in Networks (HotNets)","author":"Caldwell D.","year":"2003","unstructured":"D. Caldwell , A. Gilbert , J. Gottlieb , A. Greenberg , G. Hjalmtysson , and J. Rexford , \" The Cutting EDGE of IP Router Configuration,\" in Proc . Workshop on Hot Topics in Networks (HotNets) , 2003 . D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg, G. Hjalmtysson, and J. Rexford, \"The Cutting EDGE of IP Router Configuration,\" in Proc. Workshop on Hot Topics in Networks (HotNets), 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft J. E.","year":"2006","unstructured":"J. E. Hopcroft , R. Motwani , and J. D. Ullman , Introduction to Automata Theory, Languages, and Computation . July 2006 . J. E. Hopcroft, R. Motwani, and J. D. Ullman, Introduction to Automata Theory, Languages, and Computation. July 2006."},{"key":"e_1_3_2_1_8_1","author":"Gottlieb J.","year":"2003","unstructured":"J. Gottlieb , A. Greenberg , J. Rexford , and J. Wang , \"Automated provisioning of BGP customers,\" IEEE Network Magazine , 2003 . J. Gottlieb, A. Greenberg, J. Rexford, and J. Wang, \"Automated provisioning of BGP customers,\" IEEE Network Magazine, 2003.","journal-title":"\"Automated provisioning of BGP customers,\" IEEE Network Magazine"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of CHI","author":"Oppenheimer D.","year":"2003","unstructured":"D. Oppenheimer , \" The Importance of Understanding Distributed System Configuration ,\" in Proceedings of CHI , April 2003 . D. Oppenheimer, \"The Importance of Understanding Distributed System Configuration,\" in Proceedings of CHI, April 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"e_1_3_2_1_11_1","volume-title":"April","author":"Boehm H.","year":"2005","unstructured":"H. Boehm , A. Feldmann , O. Maennel , C. Reiser , and R. Volk , \" Network-Wide Inter-Domain Routing Policies: Design and Realization,\" in draft , April 2005 . H. Boehm, A. Feldmann, O. Maennel, C. Reiser, and R. Volk, \"Network-Wide Inter-Domain Routing Policies: Design and Realization,\" in draft, April 2005."}],"event":{"name":"SIGCOMM07: ACM SIGCOMM 2007 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Kyoto Japan","acronym":"SIGCOMM07"},"container-title":["Proceedings of the 2007 SIGCOMM workshop on Internet network management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1321753.1321757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1321753.1321757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:07Z","timestamp":1750253947000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1321753.1321757"}},"subtitle":["network operations using dynamic views"],"short-title":[],"issued":{"date-parts":[[2007,8,27]]},"references-count":11,"alternative-id":["10.1145\/1321753.1321757","10.1145\/1321753"],"URL":"https:\/\/doi.org\/10.1145\/1321753.1321757","relation":{},"subject":[],"published":{"date-parts":[[2007,8,27]]},"assertion":[{"value":"2007-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}