{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:00Z","timestamp":1772164080441,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,11]],"date-time":"2016-01-11T00:00:00Z","timestamp":1452470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,11]]},"DOI":"10.1145\/2837614.2837657","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T09:05:00Z","timestamp":1452157500000},"page":"69-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Scaling network verification using symmetry and surgery"],"prefix":"10.1145","author":[{"given":"Gordon D.","family":"Plotkin","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Nikolaj","family":"Bj\u00f8rner","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Nuno P.","family":"Lopes","sequence":"additional","affiliation":[{"name":"Microsoft Research, UK"}]},{"given":"Andrey","family":"Rybalchenko","sequence":"additional","affiliation":[{"name":"Microsoft Research, UK"}]},{"given":"George","family":"Varghese","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A calculus for protocol specification and validation. Protocol Specification, Testing, and Verification, 3(1)","author":"Aggarwal S.","year":"1983","unstructured":"S. Aggarwal , R. Kurshan , and K. Sabnani . A calculus for protocol specification and validation. Protocol Specification, Testing, and Verification, 3(1) , 1983 . S. Aggarwal, R. Kurshan, and K. Sabnani. A calculus for protocol specification and validation. Protocol Specification, Testing, and Verification, 3(1), 1983."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535862"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4034-9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2006.28"},{"key":"e_1_3_2_1_5_1","volume-title":"Microsoft Research","author":"Bj\u00f8rner N.","year":"2015","unstructured":"N. Bj\u00f8rner , G. Juniwal , R. Mahajan , S. A. Seshia , and G. Varghese . ddnf: An efficient data structure for header spaces. Technical report , Microsoft Research , November 2015 . URL http:\/\/research. microsoft.com\/apps\/pubs\/default.aspx?id=258188. N. Bj\u00f8rner, G. Juniwal, R. Mahajan, S. A. Seshia, and G. Varghese. ddnf: An efficient data structure for header spaces. Technical report, Microsoft Research, November 2015. URL http:\/\/research. microsoft.com\/apps\/pubs\/default.aspx?id=258188."},{"key":"e_1_3_2_1_6_1","volume-title":"CAV","author":"Clarke E. M.","year":"1993","unstructured":"E. M. Clarke , T. Filkorn , and S. Jha . Exploiting symmetry in temporal logic model checking . In CAV , 1993 . E. M. Clarke, T. Filkorn, and S. Jha. Exploiting symmetry in temporal logic model checking. In CAV, 1993."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625970"},{"key":"e_1_3_2_1_8_1","volume-title":"CAV","author":"Emerson E. A.","year":"1993","unstructured":"E. A. Emerson and A. P. Sistla . Symmetry and model checking . In CAV , 1993 . E. A. Emerson and A. P. Sistla. Symmetry and model checking. In CAV, 1993."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767111.1767125"},{"key":"e_1_3_2_1_10_1","volume-title":"NSDI","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fung , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In NSDI , 2015 . A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In NSDI, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677011"},{"key":"e_1_3_2_1_13_1","first-page":"385","volume-title":"Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday","author":"Hasegawa M.","unstructured":"M. Hasegawa , M. Hofmann , and G. Plotkin . Finite dimensional vector spaces are complete for traced symmetric monoidal categories . In Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday , pages 367\u2013 385 . Springer Berlin Heidelberg, 2008. M. Hasegawa, M. Hofmann, and G. Plotkin. Finite dimensional vector spaces are complete for traced symmetric monoidal categories. In Pillars of Computer Science: Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday, pages 367\u2013385. Springer Berlin Heidelberg, 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625968"},{"key":"e_1_3_2_1_15_1","volume-title":"NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: static checking for networks . In NSDI , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: static checking for networks. In NSDI, 2012."},{"key":"e_1_3_2_1_16_1","volume-title":"NSDI","author":"Kazemian P.","year":"2013","unstructured":"P. Kazemian , M. Chang , H. Zeng , G. Varghese , N. McKeown , and S. Whyte . Real time network policy checking using header space analysis . In NSDI , 2013 . P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In NSDI, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . Veri-Flow: verifying network-wide invariants in real time . In NSDI , 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veri-Flow: verifying network-wide invariants in real time. In NSDI, 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"Computer Networking: A Top-Down Approach Featuring the Internet","author":"Kurose J. F.","year":"2002","unstructured":"J. F. Kurose and K. Ross . Computer Networking: A Top-Down Approach Featuring the Internet . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2 nd edition, 2002 . ISBN 0201976994. J. F. Kurose and K. Ross. Computer Networking: A Top-Down Approach Featuring the Internet. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2nd edition, 2002. ISBN 0201976994.","edition":"2"},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Cloud Computing and Services Science (IJCLOSER), 2(5):321\u2013331","author":"Li Z.","year":"2013","unstructured":"Z. Li , M. Liang , L. O\u2019Brien , and H. Zhang . The cloud\u2019s cloudy moment: A systematic survey of public cloud service outage . International Journal of Cloud Computing and Services Science (IJCLOSER), 2(5):321\u2013331 , 2013 . Z. Li, M. Liang, L. O\u2019Brien, and H. Zhang. The cloud\u2019s cloudy moment: A systematic survey of public cloud service outage. International Journal of Cloud Computing and Services Science (IJCLOSER), 2(5):321\u2013331, 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"NSDI","author":"Lopes N. P.","year":"2015","unstructured":"N. P. Lopes , N. Bj\u00f8rner , P. Godefroid , K. Jayaraman , and G. Varghese . Checking beliefs in dynamic networks . In NSDI , 2015 . N. P. Lopes, N. Bj\u00f8rner, P. Godefroid, K. Jayaraman, and G. Varghese. Checking beliefs in dynamic networks. In NSDI, 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289237"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2682923.2682953"},{"key":"e_1_3_2_1_24_1","volume-title":"Communication and Concurrency","author":"Milner R.","year":"1989","unstructured":"R. Milner . Communication and Concurrency . Prentice-Hall , 1989 . R. Milner. Communication and Concurrency. Prentice-Hall, 1989."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1540607"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103685"},{"key":"e_1_3_2_1_27_1","volume-title":"NSDI","author":"Nelson T.","year":"2014","unstructured":"T. Nelson , A. D. Ferguson , M. J. G. Scheer , and S. Krishnamurthi . Tierless programming and reasoning for software-defined networks . In NSDI , 2014 . T. Nelson, A. D. Ferguson, M. J. G. Scheer, and S. Krishnamurthi. Tierless programming and reasoning for software-defined networks. In NSDI, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516507.1516510"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/321879.321884"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733614"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02444-8_43"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33386-6_1"}],"event":{"name":"POPL '16: The 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","location":"St. Petersburg FL USA","acronym":"POPL '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837614.2837657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837614.2837657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:43:38Z","timestamp":1750211018000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837614.2837657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,11]]},"references-count":32,"alternative-id":["10.1145\/2837614.2837657","10.1145\/2837614"],"URL":"https:\/\/doi.org\/10.1145\/2837614.2837657","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2914770.2837657","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,1,11]]},"assertion":[{"value":"2016-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}