{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:12Z","timestamp":1772164092553,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1161595"],"award-info":[{"award-number":["CNS-1161595"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,14]]},"DOI":"10.1145\/3062341.3062367","type":"proceedings-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T10:01:04Z","timestamp":1497434464000},"page":"437-451","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Network configuration synthesis with abstract topologies"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Beckett","sequence":"first","affiliation":[{"name":"Princeton University, USA"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Intentionet, USA \/ Microsoft, USA"}]},{"given":"Todd","family":"Millstein","sequence":"additional","affiliation":[{"name":"Intentionet, USA \/ University of California at Los Angeles, USA"}]},{"given":"Jitendra","family":"Padhye","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"David","family":"Walker","sequence":"additional","affiliation":[{"name":"Princeton University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"News and press \u2014 BGPMon. http:\/\/www.bgpmon. net\/news-and-events\/.  News and press \u2014 BGPMon. http:\/\/www.bgpmon. net\/news-and-events\/."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654059.1654101"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_2_4_1","volume-title":"November","author":"Andreyev A.","year":"2014","unstructured":"A. Andreyev . Introducing data center fabric, the nextgeneration facebook data center network. https:\/\/ code.facebook.com\/posts\/360346274145943\/ , November 2014 . A. Andreyev. Introducing data center fabric, the nextgeneration facebook data center network. https:\/\/ code.facebook.com\/posts\/360346274145943\/, November 2014."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_3_2_2_6_1","first-page":"199","volume-title":"\u03bdZ - An Optimizing SMT Solver","author":"Bj\u00f8rner N.","unstructured":"N. Bj\u00f8rner , A.-D. Phan , and L. Fleckenstein . \u03bdZ - An Optimizing SMT Solver , pages 194\u2013 199 . 2015. N. Bj\u00f8rner, A.-D. Phan, and L. Fleckenstein. \u03bdZ - An Optimizing SMT Solver, pages 194\u2013199. 2015."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921151.1921162"},{"key":"e_1_3_2_2_8_1","volume-title":"November","author":"El-Hassany A.","year":"2016","unstructured":"A. El-Hassany , P. Tsankov , L. Vanbever , and M. Vechev . Network-wide configuration synthesis. https:\/\/arxiv. org\/abs\/1611.02537 , November 2016 . A. El-Hassany, P. Tsankov, L. Vanbever, and M. Vechev. Network-wide configuration synthesis. https:\/\/arxiv. org\/abs\/1611.02537, November 2016."},{"key":"e_1_3_2_2_9_1","volume-title":"OSDI","author":"Fayaz S. K.","year":"2016","unstructured":"S. K. Fayaz , T. Sharma , A. Fogel , R. Mahajan , T. Millstein , V. Sekar , and G. Varghese . Efficient network reachability analysis using a succinct control plane representation . In OSDI , 2016 . S. K. Fayaz, T. Sharma, A. Fogel, R. Mahajan, T. Millstein, V. Sekar, and G. Varghese. Efficient network reachability analysis using a succinct control plane representation. In OSDI, 2016."},{"key":"e_1_3_2_2_10_1","volume-title":"NSDI","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP configuration faults with static analysis . In NSDI , May 2005 . N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005."},{"key":"e_1_3_2_2_11_1","volume-title":"NSDI","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fung , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In NSDI , March 2015 . A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In NSDI, March 2015."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677011"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339426"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402968"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592577"},{"key":"e_1_3_2_2_19_1","unstructured":"hatch. Hatch \u2013 create and share configurations. http: \/\/www.hatchconfigs.com\/.  hatch. Hatch \u2013 create and share configurations. http: \/\/www.hatchconfigs.com\/."},{"key":"e_1_3_2_2_20_1","volume-title":"NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In NSDI , April 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In NSDI, April 2012."},{"key":"e_1_3_2_2_21_1","volume-title":"January","author":"Kerravala Z.","year":"2004","unstructured":"Z. Kerravala . What is behind network downtime? proactive steps to reduce human error and improve availability of networks. https:\/\/www.cs.princeton.edu\/ courses\/archive\/fall10\/cos561\/papers\/ Yankee04.pdf , January 2004 . Z. Kerravala. What is behind network downtime? proactive steps to reduce human error and improve availability of networks. https:\/\/www.cs.princeton.edu\/ courses\/archive\/fall10\/cos561\/papers\/ Yankee04.pdf, January 2004."},{"key":"e_1_3_2_2_22_1","first-page":"27","volume-title":"NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . Veriflow: Verifying network-wide invariants in real time . In NSDI , pages 15\u2013 27 , April 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veriflow: Verifying network-wide invariants in real time. In NSDI, pages 15\u201327, April 2013."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250679"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079302"},{"key":"e_1_3_2_2_25_1","first-page":"412","volume-title":"NSDI","author":"Liu V.","year":"2013","unstructured":"V. Liu , D. Halperin , A. Krishnamurthy , and T. Anderson . F10: A fault-tolerant engineered network . In NSDI , pages 399\u2013 412 , April 2013 . V. Liu, D. Halperin, A. Krishnamurthy, and T. Anderson. F10: A fault-tolerant engineered network. In NSDI, pages 399\u2013412, April 2013."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9108-y"},{"key":"e_1_3_2_2_29_1","volume-title":"May","author":"Networks J.","year":"2008","unstructured":"J. Networks . As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/ gts\/pdf\/200249.pdf , May 2008 . J. Networks. As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/ gts\/pdf\/200249.pdf, May 2008."},{"key":"e_1_3_2_2_30_1","unstructured":"Quagga. Quagga routing suite. http:\/\/www.nongnu. org\/quagga\/.  Quagga. Quagga routing suite. http:\/\/www.nongnu. org\/quagga\/."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491187"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775006"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787476"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674989"},{"key":"e_1_3_2_2_35_1","unstructured":"thwack. configuration templates \u2014 thwack. https: \/\/thwack.solarwinds.com\/search.jspa?q= configuration+templates.  thwack. configuration templates \u2014 thwack. https: \/\/thwack.solarwinds.com\/search.jspa?q= configuration+templates."},{"key":"e_1_3_2_2_36_1","volume-title":"NetPL","author":"Weitz K.","year":"2016","unstructured":"K. Weitz , D. Woos , E. Torlak , M. D. Ernst , A. Krishnamurthy , and Z. Tatlock . Formal semantics and automated verification for the border gateway protocol . In NetPL , March 2016 . K. Weitz, D. Woos, E. Torlak, M. D. Ernst, A. Krishnamurthy, and Z. Tatlock. Formal semantics and automated verification for the border gateway protocol. In NetPL, March 2016."}],"event":{"name":"PLDI '17: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Barcelona Spain","acronym":"PLDI '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3062341.3062367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3062341.3062367","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3062341.3062367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:36:32Z","timestamp":1750203392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3062341.3062367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,14]]},"references-count":36,"alternative-id":["10.1145\/3062341.3062367","10.1145\/3062341"],"URL":"https:\/\/doi.org\/10.1145\/3062341.3062367","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3140587.3062367","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,6,14]]},"assertion":[{"value":"2017-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}