{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:54:15Z","timestamp":1776275655016,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,19]]},"DOI":"10.1145\/3341302.3342094","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"200-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Validating datacenters at scale"],"prefix":"10.1145","author":[{"given":"Karthick","family":"Jayaraman","sequence":"first","affiliation":[{"name":"Microsoft"}]},{"given":"Nikolaj","family":"Bj\u00f8rner","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Jitu","family":"Padhye","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Amar","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Ashish","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Paul-Andre C","family":"Bissonnette","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Shane","family":"Foster","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Andrew","family":"Helwer","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Mark","family":"Kasten","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Ivan","family":"Lee","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Anup","family":"Namdhari","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Haseeb","family":"Niaz","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Aniruddha","family":"Parkhi","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Hanukumar","family":"Pinnamraju","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Adrian","family":"Power","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Neha Milind","family":"Raje","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Parag","family":"Sharma","sequence":"additional","affiliation":[{"name":"Microsoft"}]}],"member":"320","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339691"},{"key":"e_1_3_2_2_2_1","volume-title":"Firewall Analyzer: Make your firewall really safe. www.algosec.com (Whitepaper).","author":"Algorithmic Security Inc.","year":"2006","unstructured":"Algorithmic Security Inc. 2006 . Firewall Analyzer: Make your firewall really safe. www.algosec.com (Whitepaper). Algorithmic Security Inc. 2006. Firewall Analyzer: Make your firewall really safe. www.algosec.com (Whitepaper)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2017.31"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"e_1_3_2_2_5_1","volume-title":"USENIX Systems Administration Conference. 75--90","author":"Bhatt Sandeep","year":"2008","unstructured":"Sandeep Bhatt , Cat Okita , and Prasad Rao . 2008 . Fast, Cheap, and in Control: Towards Pain-Free Security . In USENIX Systems Administration Conference. 75--90 . Sandeep Bhatt, Cat Okita, and Prasad Rao. 2008. Fast, Cheap, and in Control: Towards Pain-Free Security. In USENIX Systems Administration Conference. 75--90."},{"key":"e_1_3_2_2_7_1","volume-title":"Language-Independent Synthesis of Firewall Policies. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018","author":"Bodei Chiara","year":"2018","unstructured":"Chiara Bodei , Pierpaolo Degano , Letterio Galletta , Riccardo Focardi , Mauro Tempesta , and Lorenzo Veronese . 2018 . Language-Independent Synthesis of Firewall Policies. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018 , London, United Kingdom , April 24-26, 2018. 92--106. Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, and Lorenzo Veronese. 2018. Language-Independent Synthesis of Firewall Policies. In 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018. 92--106."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/136035.136043"},{"key":"e_1_3_2_2_9_1","volume-title":"DISC 2016, Paris, France, September 27-29, 2016. Proceedings. 114--128","author":"Cern\u00fd Pavol","year":"2016","unstructured":"Pavol Cern\u00fd , Nate Foster , Nilesh Jagnik , and Jedidiah McClurg . 2016 . Optimal Consistent Network Updates in Polynomial Time. In Distributed Computing - 30th International Symposium , DISC 2016, Paris, France, September 27-29, 2016. Proceedings. 114--128 . Pavol Cern\u00fd, Nate Foster, Nilesh Jagnik, and Jedidiah McClurg. 2016. Optimal Consistent Network Updates in Polynomial Time. In Distributed Computing - 30th International Symposium, DISC 2016, Paris, France, September 27-29, 2016. Proceedings. 114--128."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232565.3234462"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"L. de Moura and N. Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In TACAS 08.   L. de Moura and N. Bj\u00f8rner. 2008. Z3: An Efficient SMT Solver. In TACAS 08 .","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_2_12_1","volume-title":"CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II. 261--281","author":"El-Hassany Ahmed","unstructured":"Ahmed El-Hassany , Petar Tsankov , Laurent Vanbever , and Martin T. Vechev . 2017. Network-Wide Configuration Synthesis. In Computer Aided Verification - 29th International Conference , CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II. 261--281 . Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin T. Vechev. 2017. Network-Wide Configuration Synthesis. In Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II. 261--281."},{"key":"e_1_3_2_2_13_1","volume-title":"12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15","author":"Fogel Ari","year":"2015","unstructured":"Ari Fogel , Stanley Fung , Luis Pedrosa , Meg Walraed-Sullivan , Ramesh Govindan , Ratul Mahajan , and Todd D. Millstein . 2015. A General Approach to Network Configuration Analysis . In 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15 , Oakland, CA, USA , May 4-6, 2015 . USENIX Association, 469--483. https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/fogel Ari Fogel, Stanley Fung, Luis Pedrosa, Meg Walraed-Sullivan, Ramesh Govindan, Ratul Mahajan, and Todd D. Millstein. 2015. A General Approach to Network Configuration Analysis. In 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15, Oakland, CA, USA, May 4-6, 2015. USENIX Association, 469--483. https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/fogel"},{"key":"e_1_3_2_2_14_1","volume-title":"Computer Aided Verification - 31st International Conference, CAV.","author":"Gacek Andrew","unstructured":"Andrew Gacek , John Backes , Byron Cook , Neha Rungta , Sam Bayless , Catherine Dodge , Carsten Varming , Alan Hu , Bill Kocik , Evgenii Kotelnikov , Jure Kukovec , Sean McLaughlin , Jason Reed , John Sizemore , Mark Stalzer , Preethi Srinivasan , Pavle Subotic , Blake Whaley , Yiwen Wu , and Temesghen Kahsai . 2019. Reachability Analysis for AWS-based Networks . In Computer Aided Verification - 31st International Conference, CAV. Andrew Gacek, John Backes, Byron Cook, Neha Rungta, Sam Bayless, Catherine Dodge, Carsten Varming, Alan Hu, Bill Kocik, Evgenii Kotelnikov, Jure Kukovec, Sean McLaughlin, Jason Reed, John Sizemore, Mark Stalzer, Preethi Srinivasan, Pavle Subotic, Blake Whaley, Yiwen Wu, and Temesghen Kahsai. 2019. Reachability Analysis for AWS-based Networks. In Computer Aided Verification - 31st International Conference, CAV."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.06.015"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592576"},{"key":"e_1_3_2_2_18_1","unstructured":"Swati Gupta Kristen LeFevre and Atul Prakash. 2009. SPAN: a unified framework and toolkit for querying heterogeneous access policies. In HotSec. USENIX 5--5.   Swati Gupta Kristen LeFevre and Atul Prakash. 2009. SPAN: a unified framework and toolkit for querying heterogeneous access policies. In HotSec . USENIX 5--5."},{"key":"e_1_3_2_2_19_1","volume-title":"FMCAD 2017","author":"Hallahan William T.","year":"2017","unstructured":"William T. Hallahan , Ennan Zhai , and Ruzica Piskac . 2017 . Automated repair by example for firewalls. In 2017 Formal Methods in Computer Aided Design , FMCAD 2017 , Vienna, Austria , October 2-6, 2017. 220--229. William T. Hallahan, Ennan Zhai, and Ruzica Piskac. 2017. Automated repair by example for firewalls. In 2017 Formal Methods in Computer Aided Design, FMCAD 2017, Vienna, Austria, October 2-6, 2017. 220--229."},{"key":"e_1_3_2_2_20_1","unstructured":"Andrew Helwer. 2018. Z3Prover\/FirewallChecker. https:\/\/github.com\/Z3Prover\/FirewallChecker  Andrew Helwer. 2018. Z3Prover\/FirewallChecker. https:\/\/github.com\/Z3Prover\/FirewallChecker"},{"key":"e_1_3_2_2_21_1","volume-title":"Delta-net: Real-time Network Verification Using Atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Horn Alex","year":"2017","unstructured":"Alex Horn , Ali Kheradmand , and Mukul R. Prasad . 2017 . Delta-net: Real-time Network Verification Using Atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017 , Boston, MA, USA , March 27-29, 2017 . 735--749. Alex Horn, Ali Kheradmand, and Mukul R. Prasad. 2017. Delta-net: Real-time Network Verification Using Atoms. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017. 735--749."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013","author":"Kazemian Peyman","year":"2013","unstructured":"Peyman Kazemian , Michael Chan , Hongyi Zeng , George Varghese , Nick McKeown , and Scott Whyte . 2013 . Real Time Network Policy Checking Using Header Space Analysis . In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013 , Lombard, IL, USA , April 2-5, 2013. 99--111. Peyman Kazemian, Michael Chan, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013, Lombard, IL, USA, April 2-5, 2013. 99--111."},{"key":"e_1_3_2_2_23_1","first-page":"15","article-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX","author":"Khurshid Ahmed","year":"2013","unstructured":"Ahmed Khurshid , Xuan Zou , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2013 . VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX , Lombard , IL , 15 -- 27 . https:\/\/www.usenix.org\/conference\/nsdi13\/technical-sessions\/presentation\/khurshid Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX, Lombard, IL, 15--27. https:\/\/www.usenix.org\/conference\/nsdi13\/technical-sessions\/presentation\/khurshid","journal-title":"Lombard"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Petr Lapukhov Ariff Premji and Jon Mitchell. 2016. Use of BGP for Routing in Large-Scale Data Centers. RFC 7938.  Petr Lapukhov Ariff Premji and Jon Mitchell. 2016. Use of BGP for Routing in Large-Scale Data Centers. RFC 7938.","DOI":"10.17487\/RFC7938"},{"key":"e_1_3_2_2_25_1","unstructured":"Andrew Lerner. 2017. Intent-based Networking. https:\/\/blogs.gartner.com\/andrew-lerner\/2017\/02\/07\/intent-based-networking  Andrew Lerner. 2017. Intent-based Networking. https:\/\/blogs.gartner.com\/andrew-lerner\/2017\/02\/07\/intent-based-networking"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11516798_15"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132759"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"e_1_3_2_2_29_1","unstructured":"Nuno Lopes. {n. d.}. Cloud Topology Generator. http:\/\/web.ist.utl.pt\/nuno.lopes\/netverif\/netverif-scripts-0.2.tar.bz2  Nuno Lopes. {n. d.}. Cloud Topology Generator. http:\/\/web.ist.utl.pt\/nuno.lopes\/netverif\/netverif-scripts-0.2.tar.bz2"},{"key":"e_1_3_2_2_30_1","volume-title":"Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15","author":"Lopes Nuno P.","year":"2015","unstructured":"Nuno P. Lopes , Nikolaj Bj\u00f3rner , Patrice Godefroid , Karthick Jayaraman , and George Varghese .2015. Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15 , Oakland, CA, USA , May 4-6, 2015 . 499--512. Nuno P. Lopes, Nikolaj Bj\u00f3rner, Patrice Godefroid, Karthick Jayaraman, and George Varghese.2015. Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 15, Oakland, CA, USA, May 4-6, 2015. 499--512."},{"key":"e_1_3_2_2_31_1","volume-title":"VMCAI 2019, Cascais, Portugal, January 13-15, 2019, Proceedings (Lecture Notes in Computer Science), Constantin Enea and Ruzica Piskac (Eds.)","volume":"11388","author":"Nuno","unstructured":"Nuno P. Lopes and Andrey Rybalchenko. 2019. Fast BGP Simulation of Large Datacenters. In Verification, Model Checking, and Abstract Interpretation - 20th International Conference , VMCAI 2019, Cascais, Portugal, January 13-15, 2019, Proceedings (Lecture Notes in Computer Science), Constantin Enea and Ruzica Piskac (Eds.) , Vol. 11388 . Springer, 386--408. Nuno P. Lopes and Andrey Rybalchenko. 2019. Fast BGP Simulation of Large Datacenters. In Verification, Model Checking, and Abstract Interpretation - 20th International Conference, VMCAI 2019, Cascais, Portugal, January 13-15, 2019, Proceedings (Lecture Notes in Computer Science), Constantin Enea and Ruzica Piskac (Eds.), Vol. 11388. Springer, 386--408."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_2_33_1","volume-title":"Marmorstein and Phil Kearns","author":"Robert","year":"2005","unstructured":"Robert M. Marmorstein and Phil Kearns . 2005 . An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. In LISA. 103--112. Robert M. Marmorstein and Phil Kearns. 2005. An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. In LISA. 103--112."},{"key":"e_1_3_2_2_34_1","volume-title":"Fang: A Firewall Analysis Engine. In IEEE Symposium on Security and Privacy. 177--187","author":"Mayer Alain J.","year":"2000","unstructured":"Alain J. Mayer , Avishai Wool , and Elisha Ziskind . 2000 . Fang: A Firewall Analysis Engine. In IEEE Symposium on Security and Privacy. 177--187 . Alain J. Mayer, Avishai Wool, and Elisha Ziskind. 2000. Fang: A Firewall Analysis Engine. In IEEE Symposium on Security and Privacy. 177--187."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737980"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-008-9108-y"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Sanjai Narain Rajesh Talpade and Gary Levin. 2009. Network Configuration Validation. In Guide to Reliable Internet Services and Application Charles Kalmanek Richard Yang and Sudip Misra (Eds.).  Sanjai Narain Rajesh Talpade and Gary Levin. 2009. Network Configuration Validation. In Guide to Reliable Internet Services and Application Charles Kalmanek Richard Yang and Sudip Misra (Eds.).","DOI":"10.1007\/978-1-84882-828-5_9"},{"key":"e_1_3_2_2_38_1","volume-title":"The margrave tool for firewall analysis","author":"Nelson Timothy","unstructured":"Timothy Nelson , Christopher Barratt , Daniel J. Dougherty , Kathi Fisler , and Shriram Krishnamurthi . 2010. The margrave tool for firewall analysis . In LISA. USENIX Association , Berkeley, CA, USA , 1--8. Timothy Nelson, Christopher Barratt, Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. 2010. The margrave tool for firewall analysis. In LISA. USENIX Association, Berkeley, CA, USA, 1--8."},{"key":"e_1_3_2_2_39_1","volume-title":"Verifying Reachability in Networks with Mutable Datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017","author":"Panda Aurojit","year":"2017","unstructured":"Aurojit Panda , Ori Lahav , Katerina J. Argyraki , Mooly Sagiv , and Scott Shenker . 2017 . Verifying Reachability in Networks with Mutable Datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017 , Boston, MA, USA , March 27-29, 2017, Aditya Akella and Jon Howell (Eds.). USENIX Association, 699--718. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/panda-mutable-datapaths Aurojit Panda, Ori Lahav, Katerina J. Argyraki, Mooly Sagiv, and Scott Shenker. 2017. Verifying Reachability in Networks with Mutable Datapaths. In 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27-29, 2017, Aditya Akella and Jon Howell (Eds.). USENIX Association, 699--718. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/panda-mutable-datapaths"},{"key":"e_1_3_2_2_40_1","volume-title":"SAS 2018, Freiburg, Germany, August 29-31, 2018, Proceedings. 71--76","author":"Piskac Ruzica","year":"2018","unstructured":"Ruzica Piskac . 2018 . New Applications of Software Synthesis: Verification of Configuration Files and Firewall Repair. In Static Analysis - 25th International Symposium , SAS 2018, Freiburg, Germany, August 29-31, 2018, Proceedings. 71--76 . Ruzica Piskac. 2018. New Applications of Software Synthesis: Verification of Configuration Files and Firewall Repair. In Static Analysis - 25th International Symposium, SAS 2018, Freiburg, Germany, August 29-31, 2018, Proceedings. 71--76."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070569"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823394"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium -","volume":"10","author":"Wool Avishai","year":"2001","unstructured":"Avishai Wool . 2001 . Architecting the Lumeta Firewall Analyzer . In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, Berkeley, CA, USA, Article 7. Avishai Wool. 2001. Architecting the Lumeta Firewall Analyzer. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, Berkeley, CA, USA, Article 7."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2398197"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.126"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098833"},{"key":"e_1_3_2_2_50_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Zeng Hongyi","year":"2014","unstructured":"Hongyi Zeng , Shidong Zhang , Fei Ye , Vimalkumar Jeyakumar , Mickey Ju , Junda Liu , Nick McKeown , and Amin Vahdat . 2014 . Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) . USENIX Association, Seattle, WA, 87--99. https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/zeng Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat. 2014. Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). USENIX Association, Seattle, WA, 87--99. https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/zeng"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459944"}],"event":{"name":"SIGCOMM '19: ACM SIGCOMM 2019 Conference","location":"Beijing China","acronym":"SIGCOMM '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342094","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342094"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":50,"alternative-id":["10.1145\/3341302.3342094","10.1145\/3341302"],"URL":"https:\/\/doi.org\/10.1145\/3341302.3342094","relation":{},"subject":[],"published":{"date-parts":[[2019,8,19]]},"assertion":[{"value":"2019-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}