{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T20:38:40Z","timestamp":1768163920080,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T00:00:00Z","timestamp":1635984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1909450"],"award-info":[{"award-number":["1909450"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,10]]},"DOI":"10.1145\/3484266.3487391","type":"proceedings-article","created":{"date-parts":[[2021,11,4]],"date-time":"2021-11-04T22:31:15Z","timestamp":1636065075000},"page":"123-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Faur\u00e9"],"prefix":"10.1145","author":[{"given":"Fangping","family":"Lan","sequence":"first","affiliation":[{"name":"Temple University"}]},{"given":"Bin","family":"Gui","sequence":"additional","affiliation":[{"name":"Temple University"}]},{"given":"Anduo","family":"Wang","sequence":"additional","affiliation":[{"name":"Temple University"}]}],"member":"320","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tiramisu: Fast Multilayer Network Verification. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Abhashkumar Anubhavnidhi","year":"2020","unstructured":"Anubhavnidhi Abhashkumar , Aaron Gember-Jacobson , and Aditya Akella . 2020 . Tiramisu: Fast Multilayer Network Verification. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 201--219. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/abhashkumar Anubhavnidhi Abhashkumar, Aaron Gember-Jacobson, and Aditya Akella. 2020. Tiramisu: Fast Multilayer Network Verification. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 201--219. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/abhashkumar"},{"key":"e_1_3_2_1_2_1","unstructured":"Serge Abiteboul Richard Hull and Victor Vianu (Eds.). 1995. Foundations of Databases: The Logical Level (1st ed.). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA.  Serge Abiteboul Richard Hull and Victor Vianu (Eds.). 1995. Foundations of Databases: The Logical Level (1st ed.). Addison-Wesley Longman Publishing Co. Inc. Boston MA USA."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/38713.38724"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464994.3464998"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633048"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230583"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043195"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661061.2661063"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management (INM '07)","author":"Chen Xu","unstructured":"Xu Chen , Z. Morley Mao, and Jacobus van der Merwe. 2007. Towards Automated Network Management: Network Operations Using Dynamic Views . In Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management (INM '07) . ACM, New York, NY, USA, 242--247. https:\/\/doi.org\/10.1145\/1321753.1321757 10.1145\/1321753.1321757 Xu Chen, Z. Morley Mao, and Jacobus van der Merwe. 2007. Towards Automated Network Management: Network Operations Using Dynamic Views. In Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management (INM '07). ACM, New York, NY, USA, 242--247. https:\/\/doi.org\/10.1145\/1321753.1321757"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Tyson Condie Joseph M. Hellerstein Petros Maniatis Sean Rhea and Timothy Roscoe. 2005. Finally a use for componentized transport protocols. In In HotNets IV.  Tyson Condie Joseph M. Hellerstein Petros Maniatis Sean Rhea and Timothy Roscoe. 2005. Finally a use for componentized transport protocols. In In HotNets IV.","DOI":"10.1145\/1095810.1118617"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 19th ACM Workshop on Hot Topics in Networks (HotNets '20)","author":"Dackow Kevin","unstructured":"Kevin Dackow , Andrew Wagner , Tim Nelson , Shriram Krishnamurthi , and Theophilus A. Benson . 2020. Solver-Aided Multi-Party Configuration . In Proceedings of the 19th ACM Workshop on Hot Topics in Networks (HotNets '20) . Association for Computing Machinery, New York, NY, USA, 103--109. https:\/\/doi.org\/10.1145\/3422604.3425944 10.1145\/3422604.3425944 Kevin Dackow, Andrew Wagner, Tim Nelson, Shriram Krishnamurthi, and Theophilus A. Benson. 2020. Solver-Aided Multi-Party Configuration. In Proceedings of the 19th ACM Workshop on Hot Topics in Networks (HotNets '20). Association for Computing Machinery, New York, NY, USA, 103--109. https:\/\/doi.org\/10.1145\/3422604.3425944"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041027.3041030"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026895"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896531"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892876"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"e_1_3_2_1_22_1","volume-title":"Griffin and Gordon Wilfong","author":"Timothy","year":"1999","unstructured":"Timothy G. Griffin and Gordon Wilfong . 1999 . An Analysis of BGP Convergence Properties. In SIGCOMM. Timothy G. Griffin and Gordon Wilfong. 1999. An Analysis of BGP Convergence Properties. In SIGCOMM."},{"key":"e_1_3_2_1_23_1","unstructured":"T. G. Griffin and G. Wilfong. 2000. A Safe Path Vector Protocol. In INFOCOM.  T. G. Griffin and G. Wilfong. 2000. A Safe Path Vector Protocol. In INFOCOM."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/182591.182597"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/502102.502104"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405875"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"e_1_3_2_1_28_1","unstructured":"Geoff Huston. [n. d.]. The Death of Transit and Beyond. https:\/\/labs.apnic.net\/presentations\/store\/2017-02-28-death-of-transit.pdf. ([n. d.]).  Geoff Huston. [n. d.]. The Death of Transit and Beyond. https:\/\/labs.apnic.net\/presentations\/store\/2017-02-28-death-of-transit.pdf. ([n. d.])."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1634.1886"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342094"},{"key":"e_1_3_2_1_31_1","unstructured":"Juniper networks Fast Reroute Overview. (14-Sep-18). [n. d.]. https:\/\/www.juniper.net\/documentation\/en_US\/junos-space-apps\/connectivity-services-director4.1\/topics\/concept\/fast-reroute-understanding.html. ([n. d.]).  Juniper networks Fast Reroute Overview. (14-Sep-18). [n. d.]. https:\/\/www.juniper.net\/documentation\/en_US\/junos-space-apps\/connectivity-services-director4.1\/topics\/concept\/fast-reroute-understanding.html. ([n. d.])."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2482626.2482638"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12)","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header space analysis: static checking for networks . In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12) . USENIX Association, Berkeley, CA, USA. Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header space analysis: static checking for networks. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, USA."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12)","author":"Khurshid Ahmed","unstructured":"Ahmed Khurshid , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2012. VeriFlow: Verifying Network-Wide Invariants in Real Time . In Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12) . Association for Computing Machinery, New York, NY, USA, 49\u00e2\u0102\u015e54. https:\/\/doi.org\/10.1145\/2342441.2342452 10.1145\/2342441.2342452 Ahmed Khurshid, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2012. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks (HotSDN '12). Association for Computing Machinery, New York, NY, USA, 49\u00e2\u0102\u015e54. https:\/\/doi.org\/10.1145\/2342441.2342452"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616468"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 9th USENIX conference on Operating systems design and implementation (OSDI'10)","author":"Koponen Teemu","year":"2010","unstructured":"Teemu Koponen , Martin Casado , Natasha Gude , Jeremy Stribling , Leon Poutievski , Min Zhu , Rajiv Ramanathan , Yuichiro Iwata , Hiroaki Inoue , Takayuki Hama , and Scott Shenker . 2010 . Onix: a distributed control platform for large-scale production networks . In Proceedings of the 9th USENIX conference on Operating systems design and implementation (OSDI'10) . Teemu Koponen, Martin Casado, Natasha Gude, Jeremy Stribling, Leon Poutievski, Min Zhu, Rajiv Ramanathan, Yuichiro Iwata, Hiroaki Inoue, Takayuki Hama, and Scott Shenker. 2010. Onix: a distributed control platform for large-scale production networks. In Proceedings of the 9th USENIX conference on Operating systems design and implementation (OSDI'10)."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 19th International Conference on Very Large Data Bases (VLDB '93)","author":"Alon","unstructured":"Alon Y. Levy and Yehoshua Sagiv. 1993. Queries Independent of Updates . In Proceedings of the 19th International Conference on Very Large Data Bases (VLDB '93) . Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 171--181. http:\/\/dl.acm.org\/citation.cfm?id=645919.672674 Alon Y. Levy and Yehoshua Sagiv. 1993. Queries Independent of Updates. In Proceedings of the 19th International Conference on Very Large Data Bases (VLDB '93). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 171--181. http:\/\/dl.acm.org\/citation.cfm?id=645919.672674"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038942"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212357"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142485"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_1_42_1","volume-title":"Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Lopes Nuno P.","year":"2015","unstructured":"Nuno P. Lopes , Nikolaj Bj\u00f8rner , Patrice Godefroid , Karthick Jayaraman , and George Varghese . 2015 . Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) . USENIX Association, Oakland, CA, 499--512. https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/lopes Nuno P. Lopes, Nikolaj Bj\u00f8rner, Patrice Godefroid, Karthick Jayaraman, and George Varghese. 2015. Checking Beliefs in Dynamic Networks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). USENIX Association, Oakland, CA, 499--512. https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/lopes"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 2008 ACM CoNEXT Conference (CoNEXT '08)","author":"Mao Yun","unstructured":"Yun Mao , Boon Thau Loo , Zachary Ives , and Jonathan M. Smith . 2008. MOSAIC: Unified Declarative Platform for Dynamic Overlay Composition . In Proceedings of the 2008 ACM CoNEXT Conference (CoNEXT '08) . ACM, New York, NY, USA, Article 5, 12 pages. https:\/\/doi.org\/10.1145\/1544012.1544017 10.1145\/1544012.1544017 Yun Mao, Boon Thau Loo, Zachary Ives, and Jonathan M. Smith. 2008. MOSAIC: Unified Declarative Platform for Dynamic Overlay Composition. In Proceedings of the 2008 ACM CoNEXT Conference (CoNEXT '08). ACM, New York, NY, USA, Article 5, 12 pages. https:\/\/doi.org\/10.1145\/1544012.1544017"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342075"},{"key":"e_1_3_2_1_45_1","volume-title":"RFC 3345","author":"McPherson D.","year":"2002","unstructured":"D. McPherson , V. Gill , D. Walton , and A. Retana . RFC 3345 , 2002 . Border Gateway Protocol (BGP) Persistent Route Oscillation Condition. (RFC 3345, 2002). D. McPherson, V. Gill, D. Walton, and A. Retana. RFC 3345, 2002. Border Gateway Protocol (BGP) Persistent Route Oscillation Condition. (RFC 3345, 2002)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837657"},{"key":"e_1_3_2_1_47_1","unstructured":"PostgreSQL: The World's Most Advanced Open Source Relational Database. [n. d.]. https:\/\/www.postgresql.org\/. ([n. d.]).  PostgreSQL: The World's Most Advanced Open Source Relational Database. [n. d.]. https:\/\/www.postgresql.org\/. ([n. d.])."},{"key":"e_1_3_2_1_48_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Prabhu Santhosh","year":"2020","unstructured":"Santhosh Prabhu , Kuan Yen Chou , Ali Kheradmand , Brighten Godfrey , and Matthew Caesar . 2020 . Plankton: Scalable network configuration verification through model checking . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 953--967. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/prabhu Santhosh Prabhu, Kuan Yen Chou, Ali Kheradmand, Brighten Godfrey, and Matthew Caesar. 2020. Plankton: Scalable network configuration verification through model checking. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 953--967. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/prabhu"},{"key":"e_1_3_2_1_49_1","volume-title":"SIGCOMM '15","author":"Prakash Chaithan","unstructured":"Chaithan Prakash , Jeongkeun Lee , Yoshio Turner , Joon-Myung Kang , Aditya Akella , Sujata Banerjee , Charles Clark , Yadi Ma , Puneet Sharma , and Ying Zhang . [n. d.]. PGA : Using Graphs to Express and Automatically Reconcile Network Policies . In SIGCOMM '15 . Chaithan Prakash, Jeongkeun Lee, Yoshio Turner, Joon-Myung Kang, Aditya Akella, Sujata Banerjee, Charles Clark, Yadi Ma, Puneet Sharma, and Ying Zhang. [n. d.]. PGA: Using Graphs to Express and Automatically Reconcile Network Policies. In SIGCOMM '15."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2005.1541716"},{"key":"e_1_3_2_1_51_1","unstructured":"Removed for anonymous submission. [n. d.]. ([n. d.]).  Removed for anonymous submission. [n. d.]. ([n. d.])."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834101"},{"key":"e_1_3_2_1_53_1","volume-title":"Bootstrapping Evolvability for Inter-domain Routing with D-BGP (SIGCOMM '17)","author":"Sambasivan Raja R.","year":"2017","unstructured":"Raja R. Sambasivan , David Tran-Lam , Aditya Akella , and Peter Steenkiste . 2017 . Bootstrapping Evolvability for Inter-domain Routing with D-BGP (SIGCOMM '17) . ACM, New York, NY, USA, 14. https:\/\/doi.org\/10.1145\/3098822.3098857 10.1145\/3098822.3098857 Raja R. Sambasivan, David Tran-Lam, Aditya Akella, and Peter Steenkiste. 2017. Bootstrapping Evolvability for Inter-domain Routing with D-BGP (SIGCOMM '17). ACM, New York, NY, USA, 14. https:\/\/doi.org\/10.1145\/3098822.3098857"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016687.1016704"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM '19)","author":"Tian Bingchuan","year":"2088","unstructured":"Bingchuan Tian , Xinyi Zhang , Ennan Zhai , Hongqiang Harry Liu , Qiaobo Ye , Chunsheng Wang , Xin Wu , Zhiming Ji , Yihong Sang , Ming Zhang , Da Yu , Chen Tian , Haitao Zheng , and Ben Y. Zhao . 2019. Safely and Automatically Updating In-Network ACL Configurations with Intent Language . In Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM '19) . Association for Computing Machinery, New York, NY, USA, 214\u00e2\u0102\u015e226. https:\/\/doi.org\/10.1145\/3341302.334 2088 10.1145\/3341302.3342088 Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, Da Yu, Chen Tian, Haitao Zheng, and Ben Y. Zhao. 2019. Safely and Automatically Updating In-Network ACL Configurations with Intent Language. In Proceedings of the ACM Special Interest Group on Data Communication (SIGCOMM '19). Association for Computing Machinery, New York, NY, USA, 214\u00e2\u0102\u015e226. https:\/\/doi.org\/10.1145\/3341302.3342088"},{"key":"e_1_3_2_1_56_1","volume-title":"Logics for Databases and Information Systems (the book grow out of the Dagstuhl Seminar 9529: Role of Logics in Information Systems","author":"van der Meyden Ron","year":"1995","unstructured":"Ron van der Meyden . 1998. Logical Approaches to Incomplete Information: A Survey . In Logics for Databases and Information Systems (the book grow out of the Dagstuhl Seminar 9529: Role of Logics in Information Systems , 1995 ), Jan Chomicki and Gunter Saake (Eds.). Kluwer , 307--356. Ron van der Meyden. 1998. Logical Approaches to Incomplete Information: A Survey. In Logics for Databases and Information Systems (the book grow out of the Dagstuhl Seminar 9529: Role of Logics in Information Systems, 1995), Jan Chomicki and Gunter Saake (Eds.). Kluwer, 307--356."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00108-5"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498492"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425936"},{"key":"e_1_3_2_1_61_1","volume-title":"APKeep: Realtime Verification for Real Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Zhang Peng","year":"2020","unstructured":"Peng Zhang , Xu Liu , Hongkun Yang , Ning Kang , Zhengchang Gu , and Hao Li . 2020 . APKeep: Realtime Verification for Real Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA, 241--255. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/zhang-peng Peng Zhang, Xu Liu, Hongkun Yang, Ning Kang, Zhengchang Gu, and Hao Li. 2020. APKeep: Realtime Verification for Real Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 241--255. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/zhang-peng"}],"event":{"name":"HotNets '21: The 20th ACM Workshop on Hot Topics in Networks","location":"Virtual Event United Kingdom","acronym":"HotNets '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the Twentieth ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487391","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3484266.3487391","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487391","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3484266.3487391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:41Z","timestamp":1750191101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3484266.3487391"}},"subtitle":["A Partial Approach to Network Analysis"],"short-title":[],"issued":{"date-parts":[[2021,11,4]]},"references-count":61,"alternative-id":["10.1145\/3484266.3487391","10.1145\/3484266"],"URL":"https:\/\/doi.org\/10.1145\/3484266.3487391","relation":{},"subject":[],"published":{"date-parts":[[2021,11,4]]},"assertion":[{"value":"2021-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}