{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:51:16Z","timestamp":1757454676408,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T00:00:00Z","timestamp":1355097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,10]]},"DOI":"10.1145\/2413176.2413187","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Modeling complexity of enterprise routing design"],"prefix":"10.1145","author":[{"given":"Xin","family":"Sun","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"given":"Sanjay G.","family":"Rao","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Geoffrey G.","family":"Xie","sequence":"additional","affiliation":[{"name":"Naval Postgraduate School, Monterey, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IRTF Network Complexity Research Group. http:\/\/irtf.org\/ncrg.  IRTF Network Complexity Research Group. http:\/\/irtf.org\/ncrg."},{"key":"e_1_3_2_1_2_1","unstructured":"Open Networking Foundation. http:\/\/www.opennetworking.org.  Open Networking Foundation. http:\/\/www.opennetworking.org."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2622"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079303"},{"volume-title":"Proc. of USENIX NSDI","year":"2009","author":"Benson T.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644909"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018471"},{"key":"e_1_3_2_1_8_1","unstructured":"H. Boehm A. Feldmann O. Maennel C. Reiser and R. Volk. Network-wide inter-domain routing policies: Design and realization. Apr. 2005. Draft.  H. Boehm A. Feldmann O. Maennel C. Reiser and R. Volk. Network-wide inter-domain routing policies: Design and realization. Apr. 2005. Draft."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco Systems Inc. Reliable static routing backup using object tracking. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_3\/12_3x\/12_3xe\/feature\/guide\/dbackupx.html.  Cisco Systems Inc. Reliable static routing backup using object tracking. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_3\/12_3x\/12_3xe\/feature\/guide\/dbackupx.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1248660"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080094"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068863"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402964"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375839"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544021"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851210"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015472"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810317"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342427"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018473"}],"event":{"name":"CoNEXT '12: Conference on emerging Networking Experiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Nice France","acronym":"CoNEXT '12"},"container-title":["Proceedings of the 8th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413176.2413187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:27Z","timestamp":1750234707000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,10]]},"references-count":23,"alternative-id":["10.1145\/2413176.2413187","10.1145\/2413176"],"URL":"https:\/\/doi.org\/10.1145\/2413176.2413187","relation":{},"subject":[],"published":{"date-parts":[[2012,12,10]]},"assertion":[{"value":"2012-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}