{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:48Z","timestamp":1772164068228,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,17]],"date-time":"2014-08-17T00:00:00Z","timestamp":1408233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-11-C-7189"],"award-info":[{"award-number":["FA8650-11-C-7189"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1054229"],"award-info":[{"award-number":["CNS-1054229"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1040672"],"award-info":[{"award-number":["CNS-1040672"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1065130"],"award-info":[{"award-number":["CNS-1065130"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0845552"],"award-info":[{"award-number":["CNS-0845552"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,17]]},"DOI":"10.1145\/2619239.2626335","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T09:53:50Z","timestamp":1407837230000},"page":"383-394","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Diagnosing missing events in distributed systems with negative provenance"],"prefix":"10.1145","author":[{"given":"Yang","family":"Wu","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Mingchen","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. NSDI","author":"Canini M.","year":"2012","unstructured":"M. Canini , D. Venzano , P. Peres\u0131ni , D. Kosti\u0107 , and J. Rexford . A NICE way to test OpenFlow applications . In Proc. NSDI , Apr. 2012 . M. Canini, D. Venzano, P. Peres\u0131ni, D. Kosti\u0107, and J. Rexford. A NICE way to test OpenFlow applications. In Proc. NSDI, Apr. 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559901"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491189"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015491"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247631"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. NSDI","author":"Handigol N.","year":"2014","unstructured":"N. Handigol , B. Heller , V. Jeyakumar , D. Mazi\u00e8res , and N. McKeown . I know what your packet did last hop: Using packet histories to troubleshoot networks . In Proc. NSDI , Apr. 2014 . N. Handigol, B. Heller, V. Jeyakumar, D. Mazi\u00e8res, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot networks. In Proc. NSDI, Apr. 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453936"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. CIDR","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In Proc. CIDR , Jan. 2011 . R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In Proc. CIDR, Jan. 2011."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. NSDI","author":"Katz-Bassett E.","year":"2008","unstructured":"E. Katz-Bassett , H. V. Madhyastha , J. P. John , A. Krishnamurthy , D. Wetherall , and T. Anderson . Studying black holes in the Internet with Hubble . In Proc. NSDI , Apr. 2008 . E. Katz-Bassett, H. V. Madhyastha, J. P. John, A. Krishnamurthy, D. Wetherall, and T. Anderson. Studying black holes in the Internet with Hubble. In Proc. NSDI, Apr. 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: static checking for networks . In Proc. NSDI , Apr. 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: static checking for networks. In Proc. NSDI, Apr. 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"libspatialindex. http:\/\/libspatialindex.github.io\/.  libspatialindex. http:\/\/libspatialindex.github.io\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. TaPP","author":"Macko P.","year":"2011","unstructured":"P. Macko and M. Seltzer . Provenance Map Orbiter: Interactive exploration of large provenance graphs . In Proc. TaPP , June 2011 . P. Macko and M. Seltzer. Provenance Map Orbiter: Interactive exploration of large provenance graphs. In Proc. TaPP, June 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213875"},{"key":"e_1_3_2_1_20_1","unstructured":"Mininet. http:\/\/mininet.org\/.  Mininet. http:\/\/mininet.org\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. NSDI","author":"Monsanto C.","year":"2013","unstructured":"C. Monsanto , J. Reich , N. Foster , J. Rexford , and D. Walker . Composing software-defined networks . In Proc. NSDI , Apr. 2013 . C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing software-defined networks. In Proc. NSDI, Apr. 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. USENIX ATC","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"K.-K. Muniswamy-Reddy , D. A. Holland , U. Braun , and M. Seltzer . Provenance-aware storage systems . In Proc. USENIX ATC , May 2006 . K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-aware storage systems. In Proc. USENIX ATC, May 2006."},{"key":"e_1_3_2_1_23_1","unstructured":"Outages mailing list. http:\/\/wiki.outages.org\/index.php\/Main_Page#Outages_Mailing_Lists.  Outages mailing list. http:\/\/wiki.outages.org\/index.php\/Main_Page#Outages_Mailing_Lists."},{"key":"e_1_3_2_1_24_1","unstructured":"RapidNet. http:\/\/netdb.cis.upenn.edu\/rapidnet\/.  RapidNet. http:\/\/netdb.cis.upenn.edu\/rapidnet\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367934"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217973"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016687.1016704"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807172"},{"key":"e_1_3_2_1_29_1","unstructured":"Trema. http:\/\/trema.github.io\/trema\/.  Trema. http:\/\/trema.github.io\/trema\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187924"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. CIDR","author":"Widom J.","year":"2005","unstructured":"J. Widom . Trio : A system for integrated management of data, accuracy, and lineage . In Proc. CIDR , Jan. 2005 . J. Widom. Trio: A system for integrated management of data, accuracy, and lineage. In Proc. CIDR, Jan. 2005."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535799"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043584"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. VLDB","author":"Zhou W.","year":"2013","unstructured":"W. Zhou , S. Mapara , Y. Ren , Y. Li , A. Haeberlen , Z. Ives , B. T. Loo , and M. Sherr . Distributed time-aware provenance . In Proc. VLDB , Aug. 2013 . W. Zhou, S. Mapara, Y. Ren, Y. Li, A. Haeberlen, Z. Ives, B. T. Loo, and M. Sherr. Distributed time-aware provenance. In Proc. VLDB, Aug. 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"}],"event":{"name":"SIGCOMM'14: ACM SIGCOMM 2014 Conference","location":"Chicago Illinois USA","acronym":"SIGCOMM'14","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2014 ACM conference on SIGCOMM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2619239.2626335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2619239.2626335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:28:15Z","timestamp":1750217295000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2619239.2626335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,17]]},"references-count":35,"alternative-id":["10.1145\/2619239.2626335","10.1145\/2619239"],"URL":"https:\/\/doi.org\/10.1145\/2619239.2626335","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2740070.2626335","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,8,17]]},"assertion":[{"value":"2014-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}