{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T03:20:31Z","timestamp":1769829631446,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1703493, 1525936"],"award-info":[{"award-number":["1703493, 1525936"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3230543.3230583","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"476-489","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Control plane compression"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Beckett","sequence":"first","affiliation":[{"name":"Princeton University"}]},{"given":"Aarti","family":"Gupta","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Intentionet"}]},{"given":"David","family":"Walker","sequence":"additional","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Control plane compression: Extended version. https:\/\/scholar.princeton.edu\/sites\/default\/files\/rbeckett\/files\/paper_0.pdf.  Control plane compression: Extended version. https:\/\/scholar.princeton.edu\/sites\/default\/files\/rbeckett\/files\/paper_0.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402967"},{"key":"e_1_3_2_1_3_1","unstructured":"M. Anderson. Time warner cable says outages largely resolved. http:\/\/www.seattletimes.com\/business\/time-warner-cable-says-outages-largely-resolved August 2014.  M. Anderson. Time warner cable says outages largely resolved. http:\/\/www.seattletimes.com\/business\/time-warner-cable-says-outages-largely-resolved August 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378846"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952984"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_7_1","unstructured":"BGPMon. http:\/\/www.bgpmon.net\/.  BGPMon. http:\/\/www.bgpmon.net\/."},{"key":"e_1_3_2_1_8_1","volume-title":"ddNF: An Efficient Data Structure for Header Spaces","author":"Bj\u00f8rner N.","year":"2016","unstructured":"N. Bj\u00f8rner , G. Juniwal , R. Mahajan , S. A. Seshia , and G. Varghese . ddNF: An Efficient Data Structure for Header Spaces . November 2016 . N. Bj\u00f8rner, G. Juniwal, R. Mahajan, S. A. Seshia, and G. Varghese. ddNF: An Efficient Data Structure for Header Spaces. November 2016."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_10_1","volume-title":"CAV","author":"Clarke E. M.","year":"1993","unstructured":"E. M. Clarke , T. Filkorn , and S. Jha . Exploiting symmetry in temporal logic model checking. In Computer Aided Verification , CAV , 1993 . E. M. Clarke, T. Filkorn, and S. Jha. Exploiting symmetry in temporal logic model checking. In Computer Aided Verification, CAV, 1993."},{"key":"e_1_3_2_1_11_1","first-page":"154","volume-title":"CAV","author":"Clarke E. M.","year":"2000","unstructured":"E. M. Clarke , O. Grumberg , S. Jha , Y. Lu , and H. Veith . Counterexample-guided abstraction refinement . In CAV , pages 154 -- 169 , 2000 . E. M. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample-guided abstraction refinement. In CAV, pages 154--169, 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000040025.89719.f3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_14_1","volume-title":"5th International Conference, CAV","author":"Emerson E. A.","year":"1993","unstructured":"E. A. Emerson and A. P. Sistla . Symmetry and model checking. In Computer Aided Verification , 5th International Conference, CAV , 1993 . E. A. Emerson and A. P. Sistla. Symmetry and model checking. In Computer Aided Verification, 5th International Conference, CAV, 1993."},{"key":"e_1_3_2_1_15_1","volume-title":"OSDI","author":"Fayaz S. K.","year":"2016","unstructured":"S. K. Fayaz , T. Sharma , A. Fogel , R. Mahajan , T. Millstein , V. Sekar , and G. Varghese . Efficient network reachability analysis using a succinct control plane representation . In OSDI , 2016 . S. K. Fayaz, T. Sharma, A. Fogel, R. Mahajan, T. Millstein, V. Sekar, and G. Varghese. Efficient network reachability analysis using a succinct control plane representation. In OSDI, 2016."},{"key":"e_1_3_2_1_16_1","volume-title":"NSDI","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP configuration faults with static analysis . In NSDI , May 2005 . N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892876"},{"key":"e_1_3_2_1_18_1","series-title":"Proceedings of Symposia in Applied Mathematics","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1090\/psapm\/019\/0235771","volume-title":"Mathematical Aspects of Computer Science","author":"Floyd R. W.","year":"1967","unstructured":"R. W. Floyd . Assigning meanings to programs . In Mathematical Aspects of Computer Science , volume 19 of Proceedings of Symposia in Applied Mathematics , pages 19 -- 32 , 1967 . R. W. Floyd. Assigning meanings to programs. In Mathematical Aspects of Computer Science, volume 19 of Proceedings of Symposia in Applied Mathematics, pages 19--32, 1967."},{"key":"e_1_3_2_1_19_1","volume-title":"NSDI","author":"Fogel A.","year":"2015","unstructured":"A. Fogel , S. Fung , L. Pedrosa , M. Walraed-Sullivan , R. Govindan , R. Mahajan , and T. Millstein . A general approach to network configuration analysis . In NSDI , October 2015 . A. Fogel, S. Fung, L. Pedrosa, M. Walraed-Sullivan, R. Govindan, R. Mahajan, and T. Millstein. A general approach to network configuration analysis. In NSDI, October 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/blog.algosec.com\/2016\/08\/business-outages-caused-misconfigurations-headline-news-summer.html","author":"Godfrey J.","year":"2016","unstructured":"J. Godfrey . The summer of network misconfigurations. https:\/\/blog.algosec.com\/2016\/08\/business-outages-caused-misconfigurations-headline-news-summer.html , 2016 . J. Godfrey. The summer of network misconfigurations. https:\/\/blog.algosec.com\/2016\/08\/business-outages-caused-misconfigurations-headline-news-summer.html, 2016."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080094"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_25_1","volume-title":"NSDI","author":"Horn A.","year":"2017","unstructured":"A. Horn , A. Kheradmand , and M. Prasad . Delta-net: Real-time network verification using atoms . In NSDI , March 2017 . A. Horn, A. Kheradmand, and M. Prasad. Delta-net: Real-time network verification using atoms. In NSDI, March 2017."},{"key":"e_1_3_2_1_26_1","first-page":"99","volume-title":"NSDI","author":"Kazemian P.","year":"2013","unstructured":"P. Kazemian , M. Chang , H. Zeng , G. Varghese , N. McKeown , and S. Whyte . Real time network policy checking using header space analysis . In NSDI , pages 99 -- 112 , April 2013 . P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte. Real time network policy checking using header space analysis. In NSDI, pages 99--112, April 2013."},{"key":"e_1_3_2_1_27_1","volume-title":"NSDI","author":"Kazemian P.","year":"2012","unstructured":"P. Kazemian , G. Varghese , and N. McKeown . Header space analysis: Static checking for networks . In NSDI , April 2012 . P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: Static checking for networks. In NSDI, April 2012."},{"key":"e_1_3_2_1_28_1","volume-title":"What is behind network downtime? proactive steps to reduce human error and improve availability of networks. https:\/\/www.cs.princeton.edu\/courses\/archive\/fall10\/cos561\/papers\/Yankee04.pdf","author":"Kerravala Z.","year":"2004","unstructured":"Z. Kerravala . What is behind network downtime? proactive steps to reduce human error and improve availability of networks. https:\/\/www.cs.princeton.edu\/courses\/archive\/fall10\/cos561\/papers\/Yankee04.pdf , 2004 . Z. Kerravala. What is behind network downtime? proactive steps to reduce human error and improve availability of networks. https:\/\/www.cs.princeton.edu\/courses\/archive\/fall10\/cos561\/papers\/Yankee04.pdf, 2004."},{"key":"e_1_3_2_1_29_1","volume-title":"NSDI","author":"Khurshid A.","year":"2013","unstructured":"A. Khurshid , X. Zou , W. Zhou , M. Caesar , and P. B. Godfrey . Veriflow: Verifying network-wide invariants in real time . In NSDI , April 2013 . A. Khurshid, X. Zou, W. Zhou, M. Caesar, and P. B. Godfrey. Veriflow: Verifying network-wide invariants in real time. In NSDI, April 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"Use of BGP for routing in large-scale data centers. Internet draft","author":"Lapukhov P.","year":"2015","unstructured":"P. Lapukhov , A. Premji , and J. Mitchell . Use of BGP for routing in large-scale data centers. Internet draft , 2015 . P. Lapukhov, A. Premji, and J. Mitchell. Use of BGP for routing in large-scale data centers. Internet draft, 2015."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"e_1_3_2_1_32_1","volume-title":"NSDI","author":"Lopes N. P.","year":"2015","unstructured":"N. P. Lopes , N. Bj\u00f8rner , P. Godefroid , K. Jayaraman , and G. Varghese . Checking beliefs in dynamic networks . In NSDI , 2015 . N. P. Lopes, N. Bj\u00f8rner, P. Godefroid, K. Jayaraman, and G. Varghese. Checking beliefs in dynamic networks. In NSDI, 2015."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018470"},{"key":"e_1_3_2_1_35_1","volume-title":"As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf","author":"Networks J.","year":"2008","unstructured":"J. Networks . As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf , 2008 . J. Networks. As the value of enterprise networks escalates, so does the need for configuration management. https:\/\/www-935.ibm.com\/services\/au\/gts\/pdf\/200249.pdf, 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106991"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857111"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_40_1","unstructured":"Y. Sverdlik. Microsoft: misconfigured network device led to azure outage. http:\/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/microsoft-misconfigured-network-device-led-to-azure-outage\/68312.fullarticle 2012.  Y. Sverdlik. Microsoft: misconfigured network device led to azure outage. http:\/\/www.datacenterdynamics.com\/content-tracks\/servers-storage\/microsoft-misconfigured-network-device-led-to-azure-outage\/68312.fullarticle 2012."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847989"},{"key":"e_1_3_2_1_42_1","volume-title":"NetPL","author":"Weitz K.","year":"2016","unstructured":"K. Weitz , D. Woos , E. Torlak , M. D. Ernst , A. Krishnamurthy , and Z. Tatlock . Formal semantics and automated verification for the border gateway protocol . In NetPL , March 2016 . K. Weitz, D. Woos, E. Torlak, M. D. Ernst, A. Krishnamurthy, and Z. Tatlock. Formal semantics and automated verification for the border gateway protocol. In NetPL, March 2016."},{"key":"e_1_3_2_1_43_1","unstructured":"J. Whaley. Javabdd. http:\/\/javabdd.sourceforge.net\/index.html.  J. Whaley. Javabdd. http:\/\/javabdd.sourceforge.net\/index.html."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","location":"Budapest Hungary","acronym":"SIGCOMM '18","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230583","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:47Z","timestamp":1750210787000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":44,"alternative-id":["10.1145\/3230543.3230583","10.1145\/3230543"],"URL":"https:\/\/doi.org\/10.1145\/3230543.3230583","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}