{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:34:02Z","timestamp":1772519642303,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T00:00:00Z","timestamp":1666656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,25]]},"DOI":"10.1145\/3517745.3561455","type":"proceedings-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T21:28:36Z","timestamp":1666387716000},"page":"83-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Aurora"],"prefix":"10.1145","author":[{"given":"Ajay","family":"Mahimkar","sequence":"first","affiliation":[{"name":"AT&amp;T"}]},{"given":"Zihui","family":"Ge","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Yusef","family":"Shaqalle","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Yu","family":"Xiang","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Jennifer","family":"Yates","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Shomik","family":"Pathak","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]},{"given":"Rick","family":"Reichel","sequence":"additional","affiliation":[{"name":"AT&amp;T"}]}],"member":"320","published-online":{"date-parts":[[2022,10,25]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Retrieved","year":"2022","unstructured":"[n.d.]. Precision and recall . Retrieved May 16, 2022 from https:\/\/en.wikipedia.org\/wiki\/Precision_and_recall [n.d.]. Precision and recall. Retrieved May 16, 2022 from https:\/\/en.wikipedia.org\/wiki\/Precision_and_recall"},{"key":"e_1_3_2_2_2_1","first-page":"V8","article-title":"3rd Generation Partnership Project","volume":"21","year":"2009","unstructured":"2009 . 3rd Generation Partnership Project , TS 21 .101 V8 .0.0. 2009. 3rd Generation Partnership Project, TS 21.101 V8.0.0.","journal-title":"TS"},{"key":"e_1_3_2_2_3_1","first-page":"V9","article-title":"3rd Generation Partnership Project","volume":"36","year":"2010","unstructured":"2010 . 3rd Generation Partnership Project , TS 36 .213 V9 .2.0. 2010. 3rd Generation Partnership Project, TS 36.213 V9.2.0.","journal-title":"TS"},{"key":"e_1_3_2_2_4_1","first-page":"V10","article-title":"3rd Generation Partnership Project","volume":"32","year":"2011","unstructured":"2011 . 3rd Generation Partnership Project , TS 32 .541 V10 .0.0. 2011. 3rd Generation Partnership Project, TS 32.541 V10.0.0.","journal-title":"TS"},{"key":"e_1_3_2_2_5_1","unstructured":"2011. Self-Optimizing Networks: The Benefits of SON in LTE.  2011. Self-Optimizing Networks: The Benefits of SON in LTE."},{"key":"e_1_3_2_2_6_1","volume-title":"Telecommunication management","author":"GPP LTE TS","unstructured":"2015. 3 GPP LTE TS 32.500. Telecommunication management ; Self-Organizing Networks (SON); Concepts and requirements. 2015. 3GPP LTE TS 32.500. Telecommunication management; Self-Organizing Networks (SON); Concepts and requirements."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431304"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2009.5285232"},{"key":"e_1_3_2_2_9_1","volume-title":"Self-X RAN: Autonomous Self Organizing Radio Access Networks","author":"Barth U.","year":"2009","unstructured":"U. Barth . 2009. Self-X RAN: Autonomous Self Organizing Radio Access Networks .. In IEEE WiOpt . http:\/\/dblp.uni-trier.de\/db\/conf\/wiopt\/wiopt 2009 .html#Barth09 U. Barth. 2009. Self-X RAN: Autonomous Self Organizing Radio Access Networks.. In IEEE WiOpt. http:\/\/dblp.uni-trier.de\/db\/conf\/wiopt\/wiopt2009.html#Barth09"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934909"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062367"},{"key":"e_1_3_2_2_13_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Birkner R\u00fcdiger","year":"2020","unstructured":"R\u00fcdiger Birkner , Dana Drachsler-Cohen , Laurent Vanbever , and Martin Vechev . 2020 . Config2Spec: Mining Network Specifications from Network Configurations . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA. R\u00fcdiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin Vechev. 2020. Config2Spec: Mining Network Specifications from Network Configurations. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20096"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation","author":"El-Hassany Ahmed","year":"2018","unstructured":"Ahmed El-Hassany , Petar Tsankov , Laurent Vanbever , and Martin Vechev . 2018 . Netcomplete: Practical Network-Wide Configuration Synthesis with Autocompletion . In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation ( Renton, WA, USA) (NSDI'18). USENIX Association, USA, 579--594. Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev. 2018. Netcomplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation (Renton, WA, USA) (NSDI'18). USENIX Association, USA, 579--594."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026895"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132753"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934876"},{"key":"e_1_3_2_2_20_1","volume-title":"Clustering the rows and columns of a contingency table. Journal of Classification","author":"Greenacre Michael J.","year":"1988","unstructured":"Michael J. Greenacre . 1988. Clustering the rows and columns of a contingency table. Journal of Classification ( 1988 ). Michael J. Greenacre. 1988. Clustering the rows and columns of a contingency table. Journal of Classification (1988)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"S. Hamalainen H. Sanneck and C. Sartori. 2012. LTE Self-Organising Networks (SON): Network Management Automation for Operational Efficiency. Wiley 1st edition (2012).  S. Hamalainen H. Sanneck and C. Sartori. 2012. LTE Self-Organising Networks (SON): Network Management Automation for Operational Efficiency. Wiley 1st edition (2012).","DOI":"10.1002\/9781119961789"},{"key":"e_1_3_2_2_22_1","volume-title":"Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Hu Yigong","year":"2020","unstructured":"Yigong Hu , Gongqi Huang , and Peng Huang . 2020 . Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . USENIX Association, 719--734. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/hu Yigong Hu, Gongqi Huang, and Peng Huang. 2020. Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 719--734. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/hu"},{"key":"e_1_3_2_2_23_1","volume-title":"GRoot: Proactive Verification of DNS Configurations. In SIGCOMM","author":"Reddy Kakarla Siva Kesava","year":"2020","unstructured":"Siva Kesava Reddy Kakarla , Ryan Beckett , Behnaz Arzani , Todd Millstein , and George Varghese . 2020 . GRoot: Proactive Verification of DNS Configurations. In SIGCOMM 2020. https:\/\/www.microsoft.com\/en-us\/research\/publication\/groot-proactive-verification-of-dns-configurations\/ Best Paper Award. Siva Kesava Reddy Kakarla, Ryan Beckett, Behnaz Arzani, Todd Millstein, and George Varghese. 2020. GRoot: Proactive Verification of DNS Configurations. In SIGCOMM 2020. https:\/\/www.microsoft.com\/en-us\/research\/publication\/groot-proactive-verification-of-dns-configurations\/ Best Paper Award."},{"key":"e_1_3_2_2_24_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Reddy Kakarla Siva Kesava","year":"2020","unstructured":"Siva Kesava Reddy Kakarla , Alan Tang , Ryan Beckett , Karthick Jayaraman , Todd Millstein , Yuval Tamir , and George Varghese . 2020 . Finding Network Misconfigurations by Automatic Template Inference . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/kakarla Siva Kesava Reddy Kakarla, Alan Tang, Ryan Beckett, Karthick Jayaraman, Todd Millstein, Yuval Tamir, and George Varghese. 2020. Finding Network Misconfigurations by Automatic Template Inference. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/kakarla"},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header Space Analysis: Static Checking for Networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation ( San Jose, CA) (NSDI'12). USENIX Association, USA. Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (San Jose, CA) (NSDI'12). USENIX Association, USA."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483441"},{"key":"e_1_3_2_2_27_1","volume-title":"Minerals: Using Data Mining to Detect Router.","author":"Le Franck","year":"2006","unstructured":"Franck Le , Sihyung Lee , Tina Wong , Hyong S. Kim , and Darrell Newcomb . 2006 . Minerals: Using Data Mining to Detect Router. Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, and Darrell Newcomb. 2006. Minerals: Using Data Mining to Detect Router."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162538"},{"key":"e_1_3_2_2_29_1","unstructured":"W. Li P. Yu Z. Jiang and Z. Li. 2012. Centralized Management Mechanism for Cell Outage Compensation in LTE Networks. IJDSN (2012). http:\/\/dblp.uni-trier.de\/db\/journals\/ijdsn\/ijdsn2012.html#LiYJL12  W. Li P. Yu Z. Jiang and Z. Li. 2012. Centralized Management Mechanism for Cell Outage Compensation in LTE Networks. IJDSN (2012). http:\/\/dblp.uni-trier.de\/db\/journals\/ijdsn\/ijdsn2012.html#LiYJL12"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229585"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Ajay Mahimkar Zihui Ge Jia Wang Jennifer Yates Yin Zhang Joanne Emmons Brian Huntley and Mark Stockert. 2011. Rapid detection of maintenance induced changes in service performance. In ACM CoNEXT.  Ajay Mahimkar Zihui Ge Jia Wang Jennifer Yates Yin Zhang Joanne Emmons Brian Huntley and Mark Stockert. 2011. Rapid detection of maintenance induced changes in service performance. In ACM CoNEXT.","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Ajay Mahimkar Zihui Ge Jennifer Yates Chris Hristov Vincent Cordaro Shane Smith Jing Xu and Mark Stockert. 2013. Robust Assessment of Changes in Cellular Networks. In ACM CoNEXT.  Ajay Mahimkar Zihui Ge Jennifer Yates Chris Hristov Vincent Cordaro Shane Smith Jing Xu and Mark Stockert. 2013. Robust Assessment of Changes in Cellular Networks. In ACM CoNEXT.","DOI":"10.1145\/2535372.2535382"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472906"},{"key":"e_1_3_2_2_34_1","volume-title":"Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, and Joanne Emmons.","author":"Mahimkar Ajay","year":"2010","unstructured":"Ajay Mahimkar , Han Hee Song , Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, and Joanne Emmons. 2010 . Detecting the Performance Impact of Upgrades in Large Operational Networks. In ACM SIGCOMM. Ajay Mahimkar, Han Hee Song, Zihui Ge, Aman Shaikh, Jia Wang, Jennifer Yates, Yin Zhang, and Joanne Emmons. 2010. Detecting the Performance Impact of Upgrades in Large Operational Networks. In ACM SIGCOMM."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018470"},{"key":"e_1_3_2_2_36_1","unstructured":"W. Mohr. 2009. Self-Organisation in Wireless Networks - Use Cases and Their Interrelation.  W. Mohr. 2009. Self-Organisation in Wireless Networks - Use Cases and Their Interrelation."},{"key":"e_1_3_2_2_37_1","volume-title":"Configtron: Tackling network diversity with heterogeneous configurations. In ACM HotCloud.","author":"Naseer Usama","year":"2017","unstructured":"Usama Naseer and Theophilus Benson . 2017 . Configtron: Tackling network diversity with heterogeneous configurations. In ACM HotCloud. Usama Naseer and Theophilus Benson. 2017. Configtron: Tackling network diversity with heterogeneous configurations. In ACM HotCloud."},{"key":"e_1_3_2_2_38_1","volume-title":"Configanator: A Data-driven Approach to Improving CDN Performance. In USENIX NSDI.","author":"Naseer Usama","year":"2022","unstructured":"Usama Naseer and Theophilus Benson . 2022 . Configanator: A Data-driven Approach to Improving CDN Performance. In USENIX NSDI. Usama Naseer and Theophilus Benson. 2022. Configanator: A Data-driven Approach to Improving CDN Performance. In USENIX NSDI."},{"key":"e_1_3_2_2_39_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Prabhu Santhosh","year":"2020","unstructured":"Santhosh Prabhu , Kuan-Yen Chou , Ali Kheradmand , P. Brighten Godfrey , and Matthew Caesar . 2020 . Plankton: Scalable network configuration verification through model checking . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) . USENIX Association, Santa Clara, CA. Santhosh Prabhu, Kuan-Yen Chou, Ali Kheradmand, P. Brighten Godfrey, and Matthew Caesar. 2020. Plankton: Scalable network configuration verification through model checking. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787506"},{"key":"e_1_3_2_2_41_1","volume-title":"Communication Networks: Principles and Design Paradigms. Communications Magazine","author":"Prehofer C.","year":"2005","unstructured":"C. Prehofer and C. Bettstetter . 2005 . Self-Organization in Communication Networks: Principles and Design Paradigms. Communications Magazine , IEEE ( 2005). C. Prehofer and C. Bettstetter. 2005. Self-Organization in Communication Networks: Principles and Design Paradigms. Communications Magazine, IEEE (2005)."},{"key":"e_1_3_2_2_42_1","volume-title":"Self-Optimization and Self-Healing for GSM, UMTS and LTE.","author":"Ramiro Juan","year":"2011","unstructured":"Juan Ramiro and Khalid Hamied . 2011. Self-Organizing Networks (SON): Self-Planning , Self-Optimization and Self-Healing for GSM, UMTS and LTE. ( 2011 ). Juan Ramiro and Khalid Hamied. 2011. Self-Organizing Networks (SON): Self-Planning, Self-Optimization and Self-Healing for GSM, UMTS and LTE. (2011)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3375069.3375074"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775006"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.8"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"e_1_3_2_2_47_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Sun Xudong","year":"2020","unstructured":"Xudong Sun , Runxiang Cheng , Jianyan Chen , Elaine Ang , Owolabi Legunsen , and Tianyin Xu . 2020 . Testing Configuration Changes in Context to Prevent Production Failures . In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20) . USENIX Association, 735--751. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/sun Xudong Sun, Runxiang Cheng, Jianyan Chen, Elaine Ang, Owolabi Legunsen, and Tianyin Xu. 2020. Testing Configuration Changes in Context to Prevent Production Failures. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 735--751. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/sun"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815401"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342088"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/wicom.2011.6036713"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836106"},{"key":"e_1_3_2_2_53_1","volume-title":"Differential Network Analysis. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Zhang Peng","year":"2022","unstructured":"Peng Zhang , Aaron Gember-Jacobson , Yueshang Zuo , Yuhao Huang , Xu Liu , and Hao Li . 2022 . Differential Network Analysis. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22) . USENIX Association, Renton, WA. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/zhang-peng Peng Zhang, Aaron Gember-Jacobson, Yueshang Zuo, Yuhao Huang, Xu Liu, and Hao Li. 2022. Differential Network Analysis. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/zhang-peng"}],"event":{"name":"IMC '22: ACM Internet Measurement Conference","location":"Nice France","acronym":"IMC '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 22nd ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561455","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517745.3561455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:17Z","timestamp":1750182557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517745.3561455"}},"subtitle":["conformity-based configuration recommendation to improve LTE\/5G service"],"short-title":[],"issued":{"date-parts":[[2022,10,25]]},"references-count":53,"alternative-id":["10.1145\/3517745.3561455","10.1145\/3517745"],"URL":"https:\/\/doi.org\/10.1145\/3517745.3561455","relation":{},"subject":[],"published":{"date-parts":[[2022,10,25]]},"assertion":[{"value":"2022-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}