{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:32Z","timestamp":1750307372351,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,17]],"date-time":"2010-05-17T00:00:00Z","timestamp":1274054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,17]]},"DOI":"10.1145\/1787275.1787345","type":"proceedings-article","created":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T13:46:25Z","timestamp":1274190385000},"page":"347-356","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Scalable simulation of complex network routing policies"],"prefix":"10.1145","author":[{"given":"Andrew Ian","family":"Stone","sequence":"first","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Steven","family":"DiBenedetto","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Michelle","family":"Mills Strout","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"given":"Daniel","family":"Massey","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Metarouting website http:\/\/www.cl.cam.ac.uk\/~tgg22\/metarouting\/.  Metarouting website http:\/\/www.cl.cam.ac.uk\/~tgg22\/metarouting\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"2007","unstructured":"Alfred V. Aho , Monica S. Lam , Ravi Sethi , and Jeffrey D . Ullman , Compilers : Principles, techniques, and tools, second edition, Pearson Addison Wesley , Boston, MA, USA, 2007 . Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman, Compilers: Principles, techniques, and tools, second edition, Pearson Addison Wesley, Boston, MA, USA, 2007."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.841785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892876"},{"key":"e_1_3_2_1_6_1","volume-title":"Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS)","author":"Fujimoto Richard M.","year":"2003","unstructured":"Richard M. Fujimoto , Kalyan Perumalla , Alfred Park , Hao Wu , Mostafa H. Ammar , and George F . Riley, Large-scale network simulation \u00e2\u0102\u015e how big? how fast , In Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS) , 2003 . Richard M. Fujimoto, Kalyan Perumalla, Alfred Park, Hao Wu, Mostafa H. Ammar, and George F. Riley, Large-scale network simulation \u00e2\u0102\u015e how big? how fast, In Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems (MASCOTS), 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080094"},{"key":"e_1_3_2_1_8_1","first-page":"522","volume-title":"Proceedings of the Sixth Workshop on Languages and Compilers for Parallel Computing, Springer-Verlag","author":"Hall Mary","year":"1993","unstructured":"Mary Hall , John Mellor-crummey, Rene Rodriguez , Mary W. Hall , John M. Mellor-crummey, Alan Carle , and Alan Carle , Fiat : A framework for interprocedural analysis and transformation , In Proceedings of the Sixth Workshop on Languages and Compilers for Parallel Computing, Springer-Verlag , 1993 , pp. 522 -- 545 . Mary Hall, John Mellor-crummey, Rene Rodriguez, Mary W. Hall, John M. Mellor-crummey, Alan Carle, and Alan Carle, Fiat: A framework for interprocedural analysis and transformation, In Proceedings of the Sixth Workshop on Languages and Compilers for Parallel Computing, Springer-Verlag, 1993, pp. 522--545."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.2006.9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/824475.825877"},{"key":"e_1_3_2_1_11_1","volume-title":"The machine-suif bit-vector data-flow analysis library","author":"Holloway G.","year":"1998","unstructured":"G. Holloway and A. Dimock , The machine-suif bit-vector data-flow analysis library , 1998 . G. Holloway and A. Dimock, The machine-suif bit-vector data-flow analysis library, 1998."},{"key":"e_1_3_2_1_13_1","volume-title":"Data ow analysis theory and practice","author":"Khedker Uday P.","year":"2009","unstructured":"Uday P. Khedker , Amitabha Sanyal , and Bageshri Karkare , Data ow analysis theory and practice , CRC Press , Taylor & Francis Group, 2009 . Uday P. Khedker, Amitabha Sanyal, and Bageshri Karkare, Data ow analysis theory and practice, CRC Press, Taylor & Francis Group, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512927.512945"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01237234"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050017"},{"key":"e_1_3_2_1_17_1","first-page":"3","article-title":"Semiring frameworks and algorithms for shortest-distance problems, Journal of Automata","volume":"7","author":"Mohri Mehryar","year":"2002","unstructured":"Mehryar Mohri , Semiring frameworks and algorithms for shortest-distance problems, Journal of Automata , Languages and Combinatorics 7 ( 2002 ), no. 3 , 321--350. Mehryar Mohri, Semiring frameworks and algorithms for shortest-distance problems, Journal of Automata, Languages and Combinatorics 7 (2002), no. 3, 321--350.","journal-title":"Languages and Combinatorics"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/823451.823695"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863963"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948208"},{"key":"e_1_3_2_1_22_1","volume-title":"Master's thesis","author":"Wojciechowski Maciej","year":"2008","unstructured":"Maciej Wojciechowski , Border gateway protocol modeling and simulation , Master's thesis , University of Warsaw and VU University Amsterdam , 2008 . Maciej Wojciechowski, Border gateway protocol modeling and simulation, Master's thesis, University of Warsaw and VU University Amsterdam, 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956999"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052812.1052825"}],"event":{"name":"CF'10: Computing Frontiers Conference","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Bertinoro Italy","acronym":"CF'10"},"container-title":["Proceedings of the 7th ACM international conference on Computing frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1787275.1787345","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1787275.1787345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:56Z","timestamp":1750245776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1787275.1787345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,17]]},"references-count":22,"alternative-id":["10.1145\/1787275.1787345","10.1145\/1787275"],"URL":"https:\/\/doi.org\/10.1145\/1787275.1787345","relation":{},"subject":[],"published":{"date-parts":[[2010,5,17]]},"assertion":[{"value":"2010-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}