{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:54:14Z","timestamp":1776275654966,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1703493,1525936"],"award-info":[{"award-number":["1703493,1525936"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,7]]},"DOI":"10.1145\/3098822.3098834","type":"proceedings-article","created":{"date-parts":[[2017,8,4]],"date-time":"2017-08-04T13:48:54Z","timestamp":1501854534000},"page":"155-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":204,"title":["A General Approach to Network Configuration Verification"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Beckett","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Aarti","family":"Gupta","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Microsoft Research &amp; Intentionet"}]},{"given":"David","family":"Walker","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2017,8,7]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"M. Anderson. Time warner cable says outages largely resolved. http:\/\/www.seattletimes.com\/business\/time-warner-cable-says-outages-largely-resolved 2014.  M. Anderson. Time warner cable says outages largely resolved. http:\/\/www.seattletimes.com\/business\/time-warner-cable-says-outages-largely-resolved 2014."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952984"},{"key":"e_1_3_2_2_3_1","volume-title":"Minesweeper source code. https:\/\/batfish.github.io\/minesweeper","author":"Beckett R.","year":"2017","unstructured":"R. Beckett . Minesweeper source code. https:\/\/batfish.github.io\/minesweeper , 2017 . R. Beckett. Minesweeper source code. https:\/\/batfish.github.io\/minesweeper, 2017."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_3_2_2_5_1","unstructured":"News and press | BGPMon. http:\/\/www.bgpmon.net\/news-and-events\/.  News and press | BGPMon. http:\/\/www.bgpmon.net\/news-and-events\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA360973"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"e_1_3_2_2_11_1","volume-title":"OSDI","author":"Fayaz S. K.","year":"2016","unstructured":"S. K. Fayaz , T. Sharma , A. Fogel , R. Mahajan , T. Millstein , V. Sekar , and G. Varghese . Efficient network reachability analysis using a succinct control plane representation . In OSDI , 2016 . S. K. Fayaz, T. Sharma, A. Fogel, R. Mahajan, T. Millstein, V. Sekar, and G. Varghese. Efficient network reachability analysis using a succinct control plane representation. In OSDI, 2016."},{"key":"e_1_3_2_2_12_1","volume-title":"NSDI","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP configuration faults with static analysis . In NSDI , 2005 . N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, 2005."},{"key":"e_1_3_2_2_13_1","volume-title":"NSDI","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fung , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In NSDI , 2015 . A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In NSDI, 2015."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815684"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"e_1_3_2_2_17_1","volume-title":"NSDI","author":"Horn A.","year":"2017","unstructured":"A. Horn , A. Kheradmand , and M. Prasad . Delta-net: Real-time network verification using atoms . In NSDI , 2017 . A. Horn, A. Kheradmand, and M. Prasad. Delta-net: Real-time network verification using atoms. In NSDI, 2017."},{"key":"e_1_3_2_2_18_1","volume-title":"NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In NSDI , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In NSDI, 2012."},{"key":"e_1_3_2_2_19_1","volume-title":"NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . Veriflow: Verifying network-wide invariants in real time . In NSDI , 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veriflow: Verifying network-wide invariants in real time. In NSDI, 2013."},{"key":"e_1_3_2_2_20_1","unstructured":"D. Kline. Network downtime results in job revenue loss. http:\/\/www.avaya.com\/en\/about-avaya\/newsroom\/news-releases\/2014\/pr-140305\/ 2014.  D. Kline. Network downtime results in job revenue loss. http:\/\/www.avaya.com\/en\/about-avaya\/newsroom\/news-releases\/2014\/pr-140305\/ 2014."},{"key":"e_1_3_2_2_21_1","volume-title":"NSDI","author":"Lopes N. P.","year":"2015","unstructured":"N. P. Lopes , N. Bj\u00f8rner , P. Godefroid , K. Jayaraman , and G. Varghese . Checking beliefs in dynamic networks . In NSDI , 2015 . N. P. Lopes, N. Bj\u00f8rner, P. Godefroid, K. Jayaraman, and G. Varghese. Checking beliefs in dynamic networks. In NSDI, 2015."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536637"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9108-y"},{"key":"e_1_3_2_2_25_1","volume-title":"Guide to Reliable Internet Services and Applications","author":"Narain S.","year":"2010","unstructured":"S. Narain , R. Talpade , and G. Levin . Guide to Reliable Internet Services and Applications , chapter Network Configuration Validation. Springer , 2010 . S. Narain, R. Talpade, and G. Levin. Guide to Reliable Internet Services and Applications, chapter Network Configuration Validation. Springer, 2010."},{"key":"e_1_3_2_2_26_1","volume-title":"As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf","author":"Networks J.","year":"2008","unstructured":"J. Networks . As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf , 2008 . J. Networks. As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf, 2008."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_2_29_1","volume-title":"http:\/\/www.theregister.co.uk\/2016\/03\/01\/google_cloud_wobbles_as_workers_patch_wrong_routers\/","author":"Sharwood S.","year":"2016","unstructured":"S. Sharwood . Google cloud wobbles as workers patch wrong routers. http:\/\/www.theregister.co.uk\/2016\/03\/01\/google_cloud_wobbles_as_workers_patch_wrong_routers\/ , 2016 . S. Sharwood. Google cloud wobbles as workers patch wrong routers. http:\/\/www.theregister.co.uk\/2016\/03\/01\/google_cloud_wobbles_as_workers_patch_wrong_routers\/, 2016."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3837"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_2_32_1","unstructured":"Y. Sverdlik. Microsoft: misconfigured network device led to azure outage. http:\/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/microsoft-misconfigured-network-device-led-to-azure-outage\/68312.fullarticle 2012.  Y. Sverdlik. Microsoft: misconfigured network device led to azure outage. http:\/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/microsoft-misconfigured-network-device-led-to-azure-outage\/68312.fullarticle 2012."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187924"},{"key":"e_1_3_2_2_34_1","volume-title":"NetPL","author":"Weitz K.","year":"2016","unstructured":"K. Weitz , D. Woos , E. Torlak , M. D. Ernst , A. Krishnamurthy , and Z. Tatlock . Formal semantics and automated verification for the border gateway protocol . In NetPL , 2016 . K. Weitz, D. Woos, E. Torlak, M. D. Ernst, A. Krishnamurthy, and Z. Tatlock. Formal semantics and automated verification for the border gateway protocol. In NetPL, 2016."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02444-8_43"}],"event":{"name":"SIGCOMM '17: ACM SIGCOMM 2017 Conference","location":"Los Angeles CA USA","acronym":"SIGCOMM '17","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098834","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098822.3098834","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098822.3098834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:21Z","timestamp":1750273641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098822.3098834"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":35,"alternative-id":["10.1145\/3098822.3098834","10.1145\/3098822"],"URL":"https:\/\/doi.org\/10.1145\/3098822.3098834","relation":{},"subject":[],"published":{"date-parts":[[2017,8,7]]},"assertion":[{"value":"2017-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}