{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:16Z","timestamp":1750220896042,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB17H188"],"award-info":[{"award-number":["70NANB17H188"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1818971"],"award-info":[{"award-number":["CNS-1818971"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,24]]},"DOI":"10.1145\/3357150.3357406","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"44-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Name Space Analysis"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Jahanian","sequence":"first","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]},{"given":"K. K.","family":"Ramakrishnan","sequence":"additional","affiliation":[{"name":"University of California, Riverside, Riverside, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038461"},{"key":"e_1_3_2_1_2_1","volume-title":"IFIP Networking Conference","author":"Afanasyev Alexander","year":"2013","unstructured":"Alexander Afanasyev , Priya Mahadevan , Ilya Moiseenko , Ersin Uzun , and Lixia Zhang . 2013 . Interest flooding attack and countermeasures in Named Data Networking . In IFIP Networking Conference , 2013. Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, and Lixia Zhang. 2013. Interest flooding attack and countermeasures in Named Data Networking. In IFIP Networking Conference, 2013."},{"key":"e_1_3_2_1_3_1","unstructured":"Alexander Afanasyev Junxiao Shi etal 2018. NFD developer's guide. Technical report NDN-0021 NDN (2018).  Alexander Afanasyev Junxiao Shi et al. 2018. NFD developer's guide. Technical report NDN-0021 NDN (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179398"},{"key":"e_1_3_2_1_5_1","volume-title":"Contrace: Traceroute Facility for Content-Centric Network draft-asaeda-icnrg-contrace-04. https:\/\/tools.ietf.org\/html\/draft- asaeda- icnrg- contrace- 042.","author":"Asaeda Hitoshi","year":"2018","unstructured":"Hitoshi Asaeda , Xun Shao , and Thierry Turletti . 2018 . Contrace: Traceroute Facility for Content-Centric Network draft-asaeda-icnrg-contrace-04. https:\/\/tools.ietf.org\/html\/draft- asaeda- icnrg- contrace- 042. Hitoshi Asaeda, Xun Shao, and Thierry Turletti. 2018. Contrace: Traceroute Facility for Content-Centric Network draft-asaeda-icnrg-contrace-04. https:\/\/tools.ietf.org\/html\/draft- asaeda- icnrg- contrace- 042."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125734"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125725"},{"volume-title":"16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19).","author":"Dumitrescu Dragos","key":"e_1_3_2_1_9_1","unstructured":"Dragos Dumitrescu , Radu Stoenescu , Matei Popovici , Lorina Negreanu , and Costin Raiciu . 2019. Dataplane equivalence and its applications . In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19). Dragos Dumitrescu, Radu Stoenescu, Matei Popovici, Lorina Negreanu, and Costin Raiciu. 2019. Dataplane equivalence and its applications. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491231"},{"volume-title":"Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09)","author":"Jacobson Van","key":"e_1_3_2_1_11_1","unstructured":"Van Jacobson , Diana K. Smetters , James D. Thornton , Michael F. Plass , Nicholas H. Briggs , and Rebecca L. Braynard . 2009. Networking Named Content . In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09) . Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, and Rebecca L. Braynard. 2009. Networking Named Content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Mohammad Jahanian and K. K. Ramakrishnan. 2019. Name Space Analysis. https:\/\/github.com\/mjaha\/NameSpaceAnalysis.  Mohammad Jahanian and K. K. Ramakrishnan. 2019. Name Space Analysis. https:\/\/github.com\/mjaha\/NameSpaceAnalysis.","DOI":"10.1145\/3357150.3357406"},{"volume-title":"Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13).","author":"Kazemian Peyman","key":"e_1_3_2_1_13_1","unstructured":"Peyman Kazemian , Michael Chang , Hongyi Zeng , George Varghese , Nick McKeown , and Scott Whyte . 2013. Real Time Network Policy Checking Using Header Space Analysis . In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). Peyman Kazemian, Michael Chang, Hongyi Zeng, George Varghese, Nick McKeown, and Scott Whyte. 2013. Real Time Network Policy Checking Using Header Space Analysis. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12)","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header Space Analysis: Static Checking for Networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12) . Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125738"},{"volume-title":"Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12)","author":"Khurshid Ahmed","key":"e_1_3_2_1_16_1","unstructured":"Ahmed Khurshid , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2012. VeriFlow: Verifying Network-wide Invariants in Real Time . In Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12) . Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2012. VeriFlow: Verifying Network-wide Invariants in Real Time. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984360"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984356.2984377"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590394"},{"key":"e_1_3_2_1_20_1","volume-title":"Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Lopes Nuno P.","year":"2015","unstructured":"Nuno P. Lopes , Nikolaj Bj\u00f8rner , Patrice Godefroid , Karthick Jayaraman , and George Varghese . 2015 . Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) . Nuno P. Lopes, Nikolaj Bj\u00f8rner, Patrice Godefroid, Karthick Jayaraman, and George Varghese. 2015. Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018470"},{"key":"e_1_3_2_1_22_1","unstructured":"Spyridon Mastorakis Jim Gibson Ilya Moiseenko Ralph Droms and David Oran. 2017. ICN Ping Protocol draft-mastorakis-icnrg-icnping-00. https:\/\/tools.ietf.org\/html\/draft-mastorakis-icnrg-icnping-02.  Spyridon Mastorakis Jim Gibson Ilya Moiseenko Ralph Droms and David Oran. 2017. ICN Ping Protocol draft-mastorakis-icnrg-icnping-00. https:\/\/tools.ietf.org\/html\/draft-mastorakis-icnrg-icnping-02."},{"key":"e_1_3_2_1_23_1","unstructured":"Spyridon Mastorakis Jim Gibson Ilya Moiseenko Ralph Droms and David Oran. 2017. ICN Traceroute Protocol Specification draft-mastorakis-icnrg-icntraceroute-01. https:\/\/tools.ietf.org\/id\/draft-mastorakis-icnrg-icntraceroute-01.html.  Spyridon Mastorakis Jim Gibson Ilya Moiseenko Ralph Droms and David Oran. 2017. ICN Traceroute Protocol Specification draft-mastorakis-icnrg-icntraceroute-01. https:\/\/tools.ietf.org\/id\/draft-mastorakis-icnrg-icntraceroute-01.html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125719.3125721"},{"key":"e_1_3_2_1_25_1","unstructured":"NDN. 2019. NDN Packet Format Specification 0.3 documentation. http:\/\/named-data.net\/doc\/NDN-packet-spec\/current\/.  NDN. 2019. NDN Packet Format Specification 0.3 documentation. http:\/\/named-data.net\/doc\/NDN-packet-spec\/current\/."},{"key":"e_1_3_2_1_26_1","unstructured":"NDN. 2019. NDN Regular Expression. http:\/\/named-data.net\/doc\/ndn-cxx\/current\/tutorials\/utils-ndn-regex.html.  NDN. 2019. NDN Regular Expression. http:\/\/named-data.net\/doc\/ndn-cxx\/current\/tutorials\/utils-ndn-regex.html."},{"key":"e_1_3_2_1_27_1","unstructured":"NDN. 2019. NDN Testbed. http:\/\/ndndemo.arl.wustl.edu\/ndn.html.  NDN. 2019. NDN Testbed. http:\/\/ndndemo.arl.wustl.edu\/ndn.html."},{"volume-title":"14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17).","author":"Panda Aurojit","key":"e_1_3_2_1_28_1","unstructured":"Aurojit Panda , Ori Lahav , Katerina Argyraki , Mooly Sagiv , and Scott Shenker . 2017. Verifying reachability in networks with mutable datapaths . In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, and Scott Shenker. 2017. Verifying reachability in networks with mutable datapaths. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810171"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810170"},{"key":"e_1_3_2_1_33_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Zeng Hongyi","year":"2014","unstructured":"Hongyi Zeng , Shidong Zhang , Fei Ye , Vimalkumar Jeyakumar , Mickey Ju , Junda Liu , Nick McKeown , and Amin Vahdat . 2014 . Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) . Hongyi Zeng, Shidong Zhang, Fei Ye, Vimalkumar Jeyakumar, Mickey Ju, Junda Liu, Nick McKeown, and Amin Vahdat. 2014. Libra: Divide and Conquer to Verify Forwarding Tables in Huge Networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"}],"event":{"name":"ICN '19: 6th ACM Conference on Information-Centric Networking","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Macao China","acronym":"ICN '19"},"container-title":["Proceedings of the 6th ACM Conference on Information-Centric Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357406","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357150.3357406","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357150.3357406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:38Z","timestamp":1750203878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357150.3357406"}},"subtitle":["Verification of Named Data Network Data Planes"],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":33,"alternative-id":["10.1145\/3357150.3357406","10.1145\/3357150"],"URL":"https:\/\/doi.org\/10.1145\/3357150.3357406","relation":{},"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"2019-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}