{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:40Z","timestamp":1761401920091,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1637427"],"award-info":[{"award-number":["1637427"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3132747.3132753","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"359-373","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Automatically Repairing Network Control Planes Using an Abstract Representation"],"prefix":"10.1145","author":[{"given":"Aaron","family":"Gember-Jacobson","sequence":"first","affiliation":[{"name":"Colgate University"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Intentionet"}]},{"given":"Hongqiang Harry","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"https:\/\/bitbucket.org\/uw-madison-networking-research\/arc.  https:\/\/bitbucket.org\/uw-madison-networking-research\/arc."},{"key":"e_1_3_2_2_2_1","unstructured":"Cisco IOS configuration fundamentals command reference. http\/\/:www.cisco.com\/c\/en\/us\/td\/docs\/ios\/fundamentals\/command\/reference\/cf_book.pdf.  Cisco IOS configuration fundamentals command reference. http\/\/:www.cisco.com\/c\/en\/us\/td\/docs\/ios\/fundamentals\/command\/reference\/cf_book.pdf."},{"key":"e_1_3_2_2_3_1","unstructured":"The z3 theorem prover. https:\/\/github.com\/Z3Prover\/z3.  The z3 theorem prover. https:\/\/github.com\/Z3Prover\/z3."},{"key":"e_1_3_2_2_4_1","volume-title":"Menger's theorem for infinite graphs. Inventiones mathematicae","author":"Aharoni R.","year":"2008","unstructured":"R. Aharoni and E. Berger . Menger's theorem for infinite graphs. Inventiones mathematicae , 2008 . R. Aharoni and E. Berger. Menger's theorem for infinite graphs. Inventiones mathematicae, 2008."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370223"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_3_2_2_9_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Benson T.","year":"2009","unstructured":"T. Benson , A. Akella , and D. Maltz . Unraveling the complexity of network management . In Symposium on Networked Systems Design and Implementation (NSDI) , 2009 . T. Benson, A. Akella, and D. Maltz. Unraveling the complexity of network management. In Symposium on Networked Systems Design and Implementation (NSDI), 2009."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3113610.3113932"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INETMW.2008.4660333"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_21"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"e_1_3_2_2_16_1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Fayaz S. K.","year":"2016","unstructured":"S. K. Fayaz , T. Sharma , A. Fogel , R. Mahajan , T. D. Millstein , V. Sekar , and G. Varghese . Efficient network reachability analysis using a succinct control plane representation . In Symposium on Operating Systems Design and Implementation (OSDI) , 2016 . S. K. Fayaz, T. Sharma, A. Fogel, R. Mahajan, T. D. Millstein, V. Sekar, and G. Varghese. Efficient network reachability analysis using a succinct control plane representation. In Symposium on Operating Systems Design and Implementation (OSDI), 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP configuration faults with static analysis . In Symposium on Networked Systems Design and Implementation (NSDI) , 2005 . N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In Symposium on Networked Systems Design and Implementation (NSDI), 2005."},{"key":"e_1_3_2_2_18_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fung , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In Symposium on Networked Systems Design and Implementation (NSDI) , 2015 . A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In Symposium on Networked Systems Design and Implementation (NSDI), 2015."},{"key":"e_1_3_2_2_19_1","volume-title":"IEEE Internet Mgmt Conf","author":"Fulp E. W.","year":"2005","unstructured":"E. W. Fulp . Optimization of network firewall policies using directed acyclic graphs . In IEEE Internet Mgmt Conf , 2005 . E. W. Fulp. Optimization of network firewall policies using directed acyclic graphs. In IEEE Internet Mgmt Conf, 2005."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815684"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987389.1987408"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_33"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3077629.3077646"},{"key":"e_1_3_2_2_26_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Kazemian P.","year":"2013","unstructured":"P. Kazemian , M. Chang , H. Zeng , G. Varghese , N. McKeown , and S. Whyte . Real time network policy checking using header space analysis . In Symposium on Networked Systems Design and Implementation (NSDI) , 2013 . P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In Symposium on Networked Systems Design and Implementation (NSDI), 2013."},{"key":"e_1_3_2_2_27_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In Symposium on Networked Systems Design and Implementation (NSDI) , 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In Symposium on Networked Systems Design and Implementation (NSDI), 2012."},{"key":"e_1_3_2_2_28_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . Veri-Flow: Verifying network-wide invariants in real time . In Symposium on Networked Systems Design and Implementation (NSDI) , 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veri-Flow: Verifying network-wide invariants in real time. In Symposium on Networked Systems Design and Implementation (NSDI), 2013."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21668-3_13"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2157654.2157671"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402964"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384626"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_2_36_1","volume-title":"RFC Editor","author":"Malkin G. S.","year":"1998","unstructured":"G. S. Malkin . Rip version 2. STD 56 , RFC Editor , November 1998 . http\/\/:www.rfc-editor.org\/rfc\/rfc2453.txt. G. S. Malkin. Rip version 2. STD 56, RFC Editor, November 1998. http\/\/:www.rfc-editor.org\/rfc\/rfc2453.txt."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818811"},{"key":"e_1_3_2_2_38_1","volume-title":"April","author":"Moy J.","year":"1998","unstructured":"J. Moy . Ospf version 2. STD 54, RFC Editor, April 1998 . http\/\/:www.rfc-editor.org\/rfc\/rfc2328.txt. J. Moy. Ospf version 2. STD 54, RFC Editor, April 1998. http\/\/:www.rfc-editor.org\/rfc\/rfc2328.txt."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9108-y"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486890"},{"key":"e_1_3_2_2_41_1","volume-title":"RFC Editor","author":"Rekhter Y.","year":"2006","unstructured":"Y. Rekhter , T. Li , and S. Hares . A border gateway protocol 4 (bgp-4). RFC 4271 , RFC Editor , January 2006 . http\/\/:www.rfc-editor.org\/rfc\/rfc4271.txt. Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (bgp-4). RFC 4271, RFC Editor, January 2006. http\/\/:www.rfc-editor.org\/rfc\/rfc4271.txt."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1517424.1517451"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_64"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_2_47_1","volume-title":"Symposium on Networked Systems Design and Implementation (NSDI)","author":"Wu Y.","year":"2017","unstructured":"Y. Wu , A. Chen , A. Haeberlen , W. Zhou , and B. T. Loo . Automated bug removal for software-defined networks . In Symposium on Networked Systems Design and Implementation (NSDI) , 2017 . Y. Wu, A. Chen, A. Haeberlen, W. Zhou, and B. T. Loo. Automated bug removal for software-defined networks. In Symposium on Networked Systems Design and Implementation (NSDI), 2017."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673879"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098827"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Shanghai China","acronym":"SOSP '17"},"container-title":["Proceedings of the 26th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132753","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132747.3132753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:57Z","timestamp":1750212657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132747.3132753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":47,"alternative-id":["10.1145\/3132747.3132753","10.1145\/3132747"],"URL":"https:\/\/doi.org\/10.1145\/3132747.3132753","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}