{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:05:22Z","timestamp":1755925522435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1145\/1658939.1658971","type":"proceedings-article","created":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T19:26:20Z","timestamp":1259695580000},"page":"277-288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["PACMAN"],"prefix":"10.1145","author":[{"given":"Xu","family":"Chen","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, NJ, USA"}]},{"given":"Jacobus","family":"Van der Merwe","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs - Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Configuration Management Delivers Business Resiliency","author":"Kerravala Z.","year":"2002","unstructured":"Z. Kerravala . Configuration Management Delivers Business Resiliency . The Yankee Group , Novenver 2002 . Z. Kerravala. Configuration Management Delivers Business Resiliency. The Yankee Group, Novenver 2002."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"Enck William","year":"2007","unstructured":"William Enck , Patrick McDaniel , Subhabrata Sen , Panagiotis Sebos , Sylke Spoerel , Albert Greenberg , Sanjay Rao , and William Aiello . Configuration management at massive scale: system design and experience . In Proceedings of USENIX Annual Technical Conference , 2007 . William Enck, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, and William Aiello. Configuration management at massive scale: system design and experience. In Proceedings of USENIX Annual Technical Conference, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1248660"},{"key":"e_1_3_2_1_4_1","unstructured":"Hagen Bohm Anja Feldmann Olaf Maennel Christian Reiser and Rudiger Volk. Network-wide inter-domain routing policies: Design and realization. Presentation at the NANOG34 Meeting.  Hagen Bohm Anja Feldmann Olaf Maennel Christian Reiser and Rudiger Volk. Network-wide inter-domain routing policies: Design and realization. Presentation at the NANOG34 Meeting."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.826367"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of ACM SIGCOMM HotNets Workshop","author":"Caldwell Don","year":"2003","unstructured":"Don Caldwell , Anna Gilbert , Joel Gottlieb , Albert Greenberg , Gisli Hjalmtysson , and Jennifer Rexford . The cutting EDGE of IP router configuration . In Proceedings of ACM SIGCOMM HotNets Workshop , 2003 . Don Caldwell, Anna Gilbert, Joel Gottlieb, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. The cutting EDGE of IP router configuration. In Proceedings of ACM SIGCOMM HotNets Workshop, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.953233"},{"key":"e_1_3_2_1_8_1","volume-title":"Feamster and Hari Balakrishnan. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of Symposium on Networked Systems Design and Implementation","author":"Nick","year":"2005","unstructured":"Nick Feamster and Hari Balakrishnan. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of Symposium on Networked Systems Design and Implementation , May 2005 . Nick Feamster and Hari Balakrishnan. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of Symposium on Networked Systems Design and Implementation, May 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321753.1321757"},{"key":"e_1_3_2_1_10_1","unstructured":"Juniper Networks Configuration and Diagnostic Automation Guide. http:\/\/www.juniper.net.  Juniper Networks Configuration and Diagnostic Automation Guide. http:\/\/www.juniper.net."},{"key":"e_1_3_2_1_11_1","unstructured":"Cisco Active Network abstraction. http:\/\/www.cisco.com.  Cisco Active Network abstraction. http:\/\/www.cisco.com."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282404"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402972"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402985"},{"key":"e_1_3_2_1_15_1","volume-title":"Elyes Lehtihet. FOCALE - A Novel Autonomic Networking Architecture. Latin American Autonomic Computing Symposium (LAACS)","author":"Strassner John C.","year":"2006","unstructured":"John C. Strassner , Nazim Agoulmine , and Elyes Lehtihet. FOCALE - A Novel Autonomic Networking Architecture. Latin American Autonomic Computing Symposium (LAACS) , 2006 . John C. Strassner, Nazim Agoulmine, and Elyes Lehtihet. FOCALE - A Novel Autonomic Networking Architecture. Latin American Autonomic Computing Symposium (LAACS), 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"e_1_3_2_1_18_1","volume-title":"The application of petri nets to workflow management","author":"van der Aalst W.M.P.","year":"1998","unstructured":"W.M.P. van der Aalst . The application of petri nets to workflow management , 1998 . W.M.P. van der Aalst. The application of petri nets to workflow management, 1998."},{"key":"e_1_3_2_1_19_1","volume-title":"Scott Mahlke. Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. In Proceedings of OSDI","author":"Wang Yin","year":"2008","unstructured":"Yin Wang , Terence Kelly , Manjunath Kudlur , Stephane Lafortune , and Scott Mahlke. Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. In Proceedings of OSDI , 2008 . Yin Wang, Terence Kelly, Manjunath Kudlur, Stephane Lafortune, and Scott Mahlke. Gadara: Dynamic Deadlock Avoidance for Multithreaded Programs. In Proceedings of OSDI, 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"Juniper Networks: Troubleshooting Layer 3 VPNs. http:\/\/www.juniper.net\/techpubs\/software\/junos\/junos93\/swconfig-vpns\/tr%oubleshooting-layer-3-vpns-using-ping-\\\\and-traceroute.html.  Juniper Networks: Troubleshooting Layer 3 VPNs. http:\/\/www.juniper.net\/techpubs\/software\/junos\/junos93\/swconfig-vpns\/tr%oubleshooting-layer-3-vpns-using-ping-\\\\and-traceroute.html."},{"key":"e_1_3_2_1_21_1","unstructured":"Manav Bhatia et al. IS-IS and OSPF Difference Discussions. http:\/\/www.join.uni-muenster.de\/Dokumente\/drafts\/draft-bhatia-manral-di%ff-isis-ospf-01.txt.  Manav Bhatia et al. IS-IS and OSPF Difference Discussions. http:\/\/www.join.uni-muenster.de\/Dokumente\/drafts\/draft-bhatia-manral-di%ff-isis-ospf-01.txt."},{"key":"e_1_3_2_1_22_1","unstructured":"Vijay Gill and Jon Mitchell. OSPF to IS-IS. http:\/\/www.nanog.org\/mtg-0310\/pdf\/gill.pdf.  Vijay Gill and Jon Mitchell. OSPF to IS-IS. http:\/\/www.nanog.org\/mtg-0310\/pdf\/gill.pdf."},{"key":"e_1_3_2_1_23_1","unstructured":"Results of the GEANT OSPF to ISIS Migration. http:\/\/www.geant.net\/eumedconnect\/upload\/pdf\/GEANT-OSPF-to-ISIS-Migrati%on.pdf.  Results of the GEANT OSPF to ISIS Migration. http:\/\/www.geant.net\/eumedconnect\/upload\/pdf\/GEANT-OSPF-to-ISIS-Migrati%on.pdf."}],"event":{"name":"Co-NEXT '09: Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Rome Italy","acronym":"Co-NEXT '09"},"container-title":["Proceedings of the 5th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658939.1658971","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1658939.1658971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:03Z","timestamp":1750250463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658939.1658971"}},"subtitle":["a platform for automated and controlled network operations and configuration management"],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":22,"alternative-id":["10.1145\/1658939.1658971","10.1145\/1658939"],"URL":"https:\/\/doi.org\/10.1145\/1658939.1658971","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2009-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}