{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T07:21:51Z","timestamp":1774855311096,"version":"3.50.1"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,1,27]],"date-time":"2010-01-27T00:00:00Z","timestamp":1264550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2010,1,27]]},"abstract":"<jats:p>Initiated by the declarative networking project, rule-based declarative programming languages have gained increasing popularity in building complex networked systems across multiple application domains. This paper investigates the declarativity of those systems. First, by analyzing the language semantics, we classify rules into deductive rules and Event-Condition-Action (ECA) rules, and reveal their different levels of declarativities. Then, we use case studies to show that ECA rules that are less declarative are dominantly used in most of the proposed systems. As a result, the benefit of declarative programming is undermined. We identify the key factors that cause the low declarativity effect, and present our ongoing work towards addressing those challenges.<\/jats:p>","DOI":"10.1145\/1713254.1713260","type":"journal-article","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T13:33:51Z","timestamp":1265117631000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["On the declarativity of declarative networking"],"prefix":"10.1145","volume":"43","author":[{"given":"Yun","family":"Mao","sequence":"first","affiliation":[{"name":"AT&amp;T Labs - Research, Florham Park, NJ"}]}],"member":"320","published-online":{"date-parts":[[2010,1,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI'09)","author":"Belaramani N.","year":"2009","unstructured":"N. Belaramani , J. Zheng , A. Nayte , M. Dahlin , and R. Grimm . PADS: A Policy Architecture for building Distributed Storage systems . In Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI'09) , Apr. 2009 . N. Belaramani, J. Zheng, A. Nayte, M. Dahlin, and R. Grimm. PADS: A Policy Architecture for building Distributed Storage systems. In Proceedings of the 6th Symposium on Networked Systems Design and Implementation (NSDI'09), Apr. 2009."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592631.1592647"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322281"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453978"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250755"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI'07)","author":"Killian C.","year":"2007","unstructured":"C. Killian , J.W. Anderson , R. Jhala , and A. Vahdat . Life, Death, and the Critical Transition: Detecting Liveness Bugs in Systems Code . In Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI'07) , Cambridge, MA , April 2007 . C. Killian, J.W. Anderson, R. Jhala, and A. Vahdat. Life, Death, and the Critical Transition: Detecting Liveness Bugs in Systems Code. In Proceedings of the 4th Symposium on Networked Systems Design and Implementation (NSDI'07), Cambridge, MA, April 2007."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397718.1397733"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142485"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095818"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544017"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92995-6_6"},{"key":"e_1_2_1_15_1","volume-title":"Database Management Systems","author":"Ramakrishnan R.","year":"2002","unstructured":"R. Ramakrishnan and J. Gehrke . Database Management Systems . McGraw-Hill , third edition, 2002 . R. Ramakrishnan and J. Gehrke. Database Management Systems. McGraw-Hill, third edition, 2002."},{"key":"e_1_2_1_16_1","volume-title":"A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125--149","author":"Ramakrishnan R.","year":"1993","unstructured":"R. Ramakrishnan and J.D. Ullman . A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125--149 , 1993 . R. Ramakrishnan and J.D. Ullman. A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125--149, 1993."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086365.1086370"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387603"},{"key":"e_1_2_1_19_1","unstructured":"The Coral Project. http:\/\/www.cs.wisc.edu\/coral\/.  The Coral Project. http:\/\/www.cs.wisc.edu\/coral\/."},{"key":"e_1_2_1_20_1","first-page":"306","volume-title":"Proc. of 1st Workshop on Rules in Database Systems","author":"Widom J.","year":"1993","unstructured":"J. Widom . Deductive and active databases: Two paradigms or ends of a spectrum ? In Proc. of 1st Workshop on Rules in Database Systems , pages 306 -- 315 , 1993 . J. Widom. Deductive and active databases: Two paradigms or ends of a spectrum? In Proc. of 1st Workshop on Rules in Database Systems, pages 306--315, 1993."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.58"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1713254.1713260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1713254.1713260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:35Z","timestamp":1750250495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1713254.1713260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,27]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,1,27]]}},"alternative-id":["10.1145\/1713254.1713260"],"URL":"https:\/\/doi.org\/10.1145\/1713254.1713260","relation":{},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,27]]},"assertion":[{"value":"2010-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}