{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:15:01Z","timestamp":1774120501866,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1910234"],"award-info":[{"award-number":["1910234"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405858","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"139-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["PCF"],"prefix":"10.1145","author":[{"given":"Chuan","family":"Jiang","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Sanjay","family":"Rao","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Mohit","family":"Tawarmalani","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/137406"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863991"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005719"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971262"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.919325"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of ACM SIGCOMM","author":"Bogle Jeremy","year":"2019","unstructured":"Jeremy Bogle , Nikhil Bhatia , Manya Ghobadi , Ishai Menache , Nikolaj Bjorner , Asaf Valadarsky , and Michael Schapira . Teavar : Striking the right utilization-availability balance in wan traffic engineering . In Proceedings of ACM SIGCOMM , 2019 . (to appear). Jeremy Bogle, Nikhil Bhatia, Manya Ghobadi, Ishai Menache, Nikolaj Bjorner, Asaf Valadarsky, and Michael Schapira. Teavar: Striking the right utilization-availability balance in wan traffic engineering. In Proceedings of ACM SIGCOMM, 2019. (to appear)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-9859-3"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/sapm1964431117"},{"key":"e_1_3_2_2_9_1","first-page":"347","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Chang Yiyang","year":"2017","unstructured":"Yiyang Chang , Sanjay Rao , and Mohit Tawarmalani . Robust validation of network designs under uncertain demands and failures . In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI) , pages 347 -- 362 , 2017 . Yiyang Chang, Sanjay Rao, and Mohit Tawarmalani. Robust validation of network designs under uncertain demands and failures. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI), pages 347--362, 2017."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366697"},{"key":"e_1_3_2_2_11_1","first-page":"225","volume-title":"Proceedings of International Network Optimization Conference","author":"Fortz Bernard","year":"2003","unstructured":"Bernard Fortz and Mikkel Thorup . Robust optimization of OSPF\/IS-IS weights . In Proceedings of International Network Optimization Conference , pages 225 -- 230 , 2003 . Bernard Fortz and Mikkel Thorup. Robust optimization of OSPF\/IS-IS weights. In Proceedings of International Network Optimization Conference, pages 225--230, 2003."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524551"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787495"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"e_1_3_2_2_19_1","volume-title":"Gurobi optimizer reference manual","author":"Gurobi Optimization Inc.","year":"2016","unstructured":"Gurobi Optimization Inc. Gurobi optimizer reference manual , 2016 . http:\/\/www.gurobi.com. Gurobi Optimization Inc. Gurobi optimizer reference manual, 2016. http:\/\/www.gurobi.com."},{"key":"e_1_3_2_2_20_1","first-page":"3","volume-title":"Proceedings of ACM SIGCOMM","author":"Jain Sushant","year":"2013","unstructured":"Sushant Jain , Alok Kumar , Subhasree Mandal , Joon Ong , Leon Poutievski , Arjun Singh , Subbaiah Venkata , Jim Wanderer , Junlan Zhou , Min Zhu , Jon Zolla , Urs H\u00f6lzle , Stephen Stuart , and Amin Vahdat . B4 : Experience with a globally-deployed software defined wan . In Proceedings of ACM SIGCOMM , pages 3 -- 14 , 2013 . Sushant Jain, Alok Kumar, Subhasree Mandal, Joon Ong, Leon Poutievski, Arjun Singh, Subbaiah Venkata, Jim Wanderer, Junlan Zhou, Min Zhu, Jon Zolla, Urs H\u00f6lzle, Stephen Stuart, and Amin Vahdat. B4: Experience with a globally-deployed software defined wan. In Proceedings of ACM SIGCOMM, pages 3--14, 2013."},{"key":"e_1_3_2_2_21_1","volume-title":"The axiom of choice","author":"Jech Thomas J.","year":"2008","unstructured":"Thomas J. Jech . The axiom of choice . Courier Corporation , 2008 . Thomas J. Jech. The axiom of choice. Courier Corporation, 2008."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"e_1_3_2_2_23_1","first-page":"157","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Kumar Praveen","year":"2018","unstructured":"Praveen Kumar , Yang Yuan , Chris Yu , Nate Foster , Robert Kleinberg , Petr Lapukhov , Chiun Lin Lim , and Robert Soul\u00e9 . Semi-oblivious traffic engineering: The road not taken . In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) , pages 157 -- 170 , 2018 . Praveen Kumar, Yang Yuan, Chris Yu, Nate Foster, Robert Kleinberg, Petr Lapukhov, Chiun Lin Lim, and Robert Soul\u00e9. Semi-oblivious traffic engineering: The road not taken. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), pages 157--170, 2018."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2123916"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282408"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626314"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.902727"},{"key":"e_1_3_2_2_28_1","volume-title":"Fast Reroute Extensions to RSVP-TE for LSP Tunnels. RFC","author":"Pan P.","year":"2005","unstructured":"P. Pan , G. Swallow , and A. Atlas . Fast Reroute Extensions to RSVP-TE for LSP Tunnels. RFC 4090, May 2005 . P. Pan, G. Swallow, and A. Atlas. Fast Reroute Extensions to RSVP-TE for LSP Tunnels. RFC 4090, May 2005."},{"key":"e_1_3_2_2_29_1","volume-title":"Flow, and Capacity Design in Communication and Computer Networks","author":"Pi\u00f3ro Michal","year":"2004","unstructured":"Michal Pi\u00f3ro and Deepankar Medhi . Routing , Flow, and Capacity Design in Communication and Computer Networks . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 2004 . ISBN 0125571895. Michal Pi\u00f3ro and Deepankar Medhi. Routing, Flow, and Capacity Design in Communication and Computer Networks. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2004. ISBN 0125571895."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523638"},{"key":"e_1_3_2_2_31_1","volume-title":"IP Fast Reroute Framework. RFC","author":"Shand M.","year":"2010","unstructured":"M. Shand and S. Bryant . IP Fast Reroute Framework. RFC 5714, January 2010 . M. Shand and S. Bryant. IP Fast Reroute Framework. RFC 5714, January 2010."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2014.6816140"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2007116.2007128"},{"key":"e_1_3_2_2_34_1","volume-title":"Segment routing architecture. IETF Internet draft","author":"Tantsura Jeff","year":"2013","unstructured":"Jeff Tantsura , Igor Milojevic , Edward Crabbe , Stefano Previdi , Martin Horneffer , Ahmed Bashandy , Rob Shakir , Clarence Filsfils , Bruno Decraene , Saku Ytti , Segment routing architecture. IETF Internet draft , 2013 . Jeff Tantsura, Igor Milojevic, Edward Crabbe, Stefano Previdi, Martin Horneffer, Ahmed Bashandy, Rob Shakir, Clarence Filsfils, Bruno Decraene, Saku Ytti, et al. Segment routing architecture. IETF Internet draft, 2013."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851220"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159926"},{"key":"e_1_3_2_2_37_1","first-page":"291","volume-title":"Proceedings of ACM SIGCOMM","author":"Wang Ye","year":"2010","unstructured":"Ye Wang , Hao Wang , Ajay Mahimkar , Richard Alimi , Yin Zhang , Lili Qiu , and Yang Richard Yang . R3 : Resilient routing reconfiguration . In Proceedings of ACM SIGCOMM , pages 291 -- 302 , 2010 . Ye Wang, Hao Wang, Ajay Mahimkar, Richard Alimi, Yin Zhang, Lili Qiu, and Yang Richard Yang. R3: Resilient routing reconfiguration. In Proceedings of ACM SIGCOMM, pages 291--302, 2010."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848098"},{"key":"e_1_3_2_2_39_1","volume-title":"Network Protocols, 2005. ICNP 2005. 13th IEEE International Conference on","author":"Zhang Chun","year":"2005","unstructured":"Chun Zhang , Zihui Ge , Jim Kurose , Yong Liu , and Don Towsley . Optimal routing with multiple traffic matrices tradeoff between average and worst case performance . In Network Protocols, 2005. ICNP 2005. 13th IEEE International Conference on , 2005 . Chun Zhang, Zihui Ge, Jim Kurose, Yong Liu, and Don Towsley. Optimal routing with multiple traffic matrices tradeoff between average and worst case performance. In Network Protocols, 2005. ICNP 2005. 13th IEEE International Conference on, 2005."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251116"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784449"}],"event":{"name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA","acronym":"SIGCOMM '20","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405858","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405858","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:18Z","timestamp":1750206378000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405858"}},"subtitle":["Provably Resilient Flexible Routing"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":41,"alternative-id":["10.1145\/3387514.3405858","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405858","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}