{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T20:32:10Z","timestamp":1768163530482,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,21]],"date-time":"2013-11-21T00:00:00Z","timestamp":1384992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845552, CNS-1040672, CNS-1054229, CNS-1065130"],"award-info":[{"award-number":["CNS-0845552, CNS-1040672, CNS-1054229, CNS-1065130"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,21]]},"DOI":"10.1145\/2535771.2535799","type":"proceedings-article","created":{"date-parts":[[2013,12,20]],"date-time":"2013-12-20T19:50:52Z","timestamp":1387569052000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Answering why-not queries in software-defined networks with negative provenance"],"prefix":"10.1145","author":[{"given":"Yang","family":"Wu","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2013,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228312"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559901"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034812"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247631"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453936"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR)","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR) , Jan. 2011 . R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research (CIDR), Jan. 2011."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 5th USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Katz-Bassett E.","year":"2008","unstructured":"E. Katz-Bassett , H. V. Madhyastha , J. P. John , A. Krishnamurthy , D. Wetherall , and T. Anderson . Studying black holes in the Internet with Hubble . In Proceedings of the 5th USENIX Conference on Networked Systems Design and Implementation (NSDI) , Apr. 2008 . E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the Internet with Hubble. In Proceedings of the 5th USENIX Conference on Networked Systems Design and Implementation (NSDI), Apr. 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI)","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI) , Apr. 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI), Apr. 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213875"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367934"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807172"},{"key":"e_1_3_2_1_17_1","unstructured":"M. Welsh. What I wish systems researchers would work on. Blog post http:\/\/matt-welsh.blogspot.com\/2013\/05\/what-i-wish-systems-researchers-would.html May 2013.  M. Welsh. What I wish systems researchers would work on. Blog post http:\/\/matt-welsh.blogspot.com\/2013\/05\/what-i-wish-systems-researchers-would.html May 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR)","author":"Widom J.","year":"2005","unstructured":"J. Widom . Trio : A system for integrated management of data, accuracy, and lineage . In Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR) , Jan. 2005 . J. Widom. Trio: A system for integrated management of data, accuracy, and lineage. In Proceedings of the 2nd Biennial Conference on Innovative Data Systems Research (CIDR), Jan. 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"}],"event":{"name":"HotNets-XII: Twelfth ACM Workshop on Hot Topics in Networks","location":"College Park Maryland","acronym":"HotNets-XII","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"]},"container-title":["Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535799","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2535771.2535799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:24Z","timestamp":1750235964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535771.2535799"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,21]]},"references-count":21,"alternative-id":["10.1145\/2535771.2535799","10.1145\/2535771"],"URL":"https:\/\/doi.org\/10.1145\/2535771.2535799","relation":{},"subject":[],"published":{"date-parts":[[2013,11,21]]},"assertion":[{"value":"2013-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}