{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:43:47Z","timestamp":1760057027398,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3750022.3750459","type":"proceedings-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T13:46:39Z","timestamp":1755611199000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ConfSum: Towards Automatic Summarization of Network-scale Operational Intents from Device Configurations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3453-4872","authenticated-orcid":false,"given":"Rundi","family":"Zhai","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications and Zhongguancun Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6373-6566","authenticated-orcid":false,"given":"Jianmin","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6401-5979","authenticated-orcid":false,"given":"Yukai","family":"Miao","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-7885","authenticated-orcid":false,"given":"Li","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-8865","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6937-4068","authenticated-orcid":false,"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7721-2675","authenticated-orcid":false,"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4352-7497","authenticated-orcid":false,"given":"Ennan","family":"Zhai","sequence":"additional","affiliation":[{"name":"Alibaba, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0803-5609","authenticated-orcid":false,"given":"Zishuo","family":"Ding","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology (Guangzhou), China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al.","author":"Achiam Josh","year":"2023","unstructured":"Josh Achiam, Steven Adler, Sandhini Agarwal, Lama Ahmad, Ilge Akkaya, Florencia Leoni Aleman, Diogo Almeida, Janko Altenschmidt, Sam Altman, Shyamal Anadkat, et al. 2023. Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062367"},{"key":"e_1_3_2_1_3_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Birkner Rudiger","year":"2020","unstructured":"Rudiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin Vechev. 2020. Config2Spec: Mining Network Specifications from Network Configurations. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). USENIX Association, Santa Clara, CA, 969--984. https:\/\/www.usenix.org\/conference\/nsdi20\/presentation\/birkner"},{"key":"e_1_3_2_1_4_1","volume-title":"Multi-Functionality, Multi-Granularity Text Embeddings Through Self-Knowledge Distillation.","author":"Chen Jianlv","year":"2024","unstructured":"Jianlv Chen, Shitao Xiao, Peitian Zhang, Kun Luo, Defu Lian, and Zheng Liu. 2024. BGE M3-Embedding: Multi-Lingual, Multi-Functionality, Multi-Granularity Text Embeddings Through Self-Knowledge Distillation. (2024). arXiv:cs.CL\/2402.03216"},{"key":"e_1_3_2_1_5_1","volume-title":"Lisandro Zambenedetti Granville, and Jeff Tantsura","author":"Clemm Alexander","year":"2022","unstructured":"Alexander Clemm, Laurent Ciavaglia, Lisandro Zambenedetti Granville, and Jeff Tantsura. 2022. Intent-based networking-concepts and definitions. Technical Report. IETF RFC 9315, Oct."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63390-9_14"},{"key":"e_1_3_2_1_7_1","volume-title":"NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"El-Hassany Ahmed","year":"2018","unstructured":"Ahmed El-Hassany, Petar Tsankov, Laurent Vanbever, and Martin Vechev. 2018. NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). USENIX Association, Renton, WA, 579--594. https:\/\/www.usenix.org\/conference\/nsdi18\/presentation\/el-hassany"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2789770.2789803"},{"key":"e_1_3_2_1_9_1","unstructured":"William L. Hamilton Rex Ying and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281431"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"e_1_3_2_1_12_1","volume-title":"PreConfig: A Pretrained Model for Automating Network Configuration. arXiv preprint arXiv:2403.09369","author":"Li Fuliang","year":"2024","unstructured":"Fuliang Li, Haozhi Lang, Jiajie Zhang, Jiaxing Shen, and Xingwei Wang. 2024. PreConfig: A Pretrained Model for Automating Network Configuration. arXiv preprint arXiv:2403.09369 (2024)."},{"key":"e_1_3_2_1_13_1","volume-title":"The Twelfth International Conference on Learning Representations.","author":"Liu Xin","year":"2024","unstructured":"Xin Liu, Muhammad Khalifa, and Lu Wang. 2024. LitCab: Lightweight Language Model Calibration over Short-and Long-form Responses. In The Twelfth International Conference on Learning Representations."},{"volume-title":"Published on","year":"2024","key":"e_1_3_2_1_14_1","unstructured":"Meta. 2024. Introducing Llama 3.1: Our most capable models to date. https:\/\/ai.meta.com\/blog\/meta-llama-3-1\/. (2024). Published on July 23, 2024."},{"key":"e_1_3_2_1_15_1","volume-title":"Mohit Iyyer, Luke Zettlemoyer, and Hannaneh Hajishirzi.","author":"Min Sewon","year":"2023","unstructured":"Sewon Min, Kalpesh Krishna, Xinxi Lyu, Mike Lewis, Wen-tau Yih, Pang Wei Koh, Mohit Iyyer, Luke Zettlemoyer, and Hannaneh Hajishirzi. 2023. Factscore: Fine-grained atomic evaluation of factual precision in long form text generation. arXiv preprint arXiv:2305.14251 (2023)."},{"key":"e_1_3_2_1_16_1","volume-title":"Practical Intent-driven Routing Configuration Synthesis. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Ramanathan Sivaramakrishnan","year":"2023","unstructured":"Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, and Jelena Mirkovic. 2023. Practical Intent-driven Routing Configuration Synthesis. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 629--644. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/ramanathan"},{"key":"e_1_3_2_1_17_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Ramanathan Sivaramakrishnan","year":"2023","unstructured":"Sivaramakrishnan Ramanathan, Ying Zhang, Mohab Gawish, Yogesh Mundada, Zhaodong Wang, Sangki Yun, Eric Lippert, Walid Taha, Minlan Yu, and Jelena Mirkovic. 2023. Practical intent-driven routing configuration synthesis. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). 629--644."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243318.3243324"},{"key":"e_1_3_2_1_19_1","volume-title":"Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, et al.","author":"Tian Bingchuan","year":"2019","unstructured":"Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, et al. 2019. Safely and automatically updating in-network acl configurations with intent language. In Proceedings of the ACM Special Interest Group on Data Communication.214-226."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672268"}],"event":{"name":"SIGCOMM '25: ACM SIGCOMM 2025 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Coimbra Portugal","acronym":"SIGCOMM '25"},"container-title":["Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3750022.3750459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T14:11:51Z","timestamp":1760019111000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3750022.3750459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":20,"alternative-id":["10.1145\/3750022.3750459","10.1145\/3750022"],"URL":"https:\/\/doi.org\/10.1145\/3750022.3750459","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-09-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}