{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:52:41Z","timestamp":1759146761642},"reference-count":31,"publisher":"Sociedade Brasileira de Computacao - SB","issue":"1","license":[{"start":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T00:00:00Z","timestamp":1453248000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Internet Serv Appl"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13174-016-0043-y","type":"journal-article","created":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T03:56:17Z","timestamp":1453262177000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Automatic belief network modeling via policy inference for SDN fault localization"],"prefix":"10.5753","volume":"7","author":[{"given":"Yongning","family":"Tang","sequence":"first","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Elmansor","sequence":"additional","affiliation":[]},{"given":"Yangxuan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"3742","published-online":{"date-parts":[[2016,1,20]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1186\/s13174-015-0035-3","volume":"6","author":"DM Batista","year":"2015","unstructured":"Batista DM, Blair G, Kon F, Boutaba R, Hutchison D, Jain R, Ramjee R, Rothenberg CE (2015) Perspectives on software-defined networks: interviews with five leading scientists from the networking community. J Internet Serv Appl 6: 22.","journal-title":"J Internet Serv Appl"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Al-Fares M, Loukissas A, Vahdat A (2008) A Scalable, Commodity Data Center Network Architecture In: Proceedings of the ACM SIGCOMM 2008 Conference.","DOI":"10.1145\/1402958.1402967"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Hong C-Y, Kandula S, Mahajan R, Zhang M, Gill V, Nanduri M, Wattenhofer R (2013) Achieving high utilization with software-driven WAN In: Proceedings of the ACM SIGCOMM 2013 Conference.","DOI":"10.1145\/2486001.2486012"},{"key":"43_CR4","volume-title":"What, Where, and When: Software Fault Localization for SDN","author":"RC Scott","year":"2012","unstructured":"Scott RC, Wundsam A, Zarifis K, Shenker S (2012) What, Where, and When: Software Fault Localization for SDN. EECS Department, University of California, Berkeley. Tech. Rep. UCB\/EECS-2012-178."},{"key":"43_CR5","unstructured":"Kazemian P, Varghese G, McKeown N (2012) Header Space Analysis: Static Checking for Networks In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. USENIX NSDI."},{"key":"43_CR6","unstructured":"Handigol N, Heller B, Jeyakumar V, Mazi\u2018eres D, McKeown N (2014) I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks In: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, NSDI 2014, 71\u201385, USA."},{"key":"43_CR7","unstructured":"Kazemian P, Chang M, Zeng H, Varghese G, McKeown N, Whyte S (2013) Real Time Network Policy Checking Using Header Space Analysis In: Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, NSDI 2013, 99\u2013112, CA, USA."},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Zeng H, Kazemian P, Varghese G, McKeown N (2012) Automatic Test Packet Generation In: Proceedings of the 8th International Conference on Emerging Networking, CoNEXT 2012, 241\u2013252, New York, NY, USA.","DOI":"10.1145\/2413176.2413205"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Mai H, Khurshid A, Agarwal R, Caesar M, Godfrey PB, King ST (2011) Debugging the Data Plane with Anteater In: Proceedings of the ACM SIGCOMM 2011 Conference, 290\u2013301, New York, NY, USA.","DOI":"10.1145\/2018436.2018470"},{"key":"43_CR10","unstructured":"Wundsam A, Levin D, Seetharaman S, Feldmann A (2011) Ofrewind: Enabling record and replay troubleshooting for networks In: Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, USENIXATC 2011, 29\u201329, USA."},{"issue":"6","key":"43_CR11","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/90.477721","volume":"3","author":"I Katzela","year":"1995","unstructured":"Katzela I, Schwartz M (1995) Schemes for fault identification in communication networks. IEEE\/ACM Trans Networking 3(6): 733\u2013764.","journal-title":"IEEE\/ACM Trans Networking"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Steinder M, Sethi AS (2002) End-to-end service failure diagnosis using belief networks In: Proc. Network Operation and Management Symposium, 375\u2013390, Florence, Italy. [91].","DOI":"10.1109\/NOMS.2002.1015595"},{"issue":"5","key":"43_CR13","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/35.492975","volume":"34","author":"SA Yemini","year":"1996","unstructured":"Yemini SA, Kliger S, Mozes E, Yemini Y, Ohsie D (1996) High speed and robust event correlation. IEEE Commun Mag 34(5): 82\u201390.","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"43_CR14","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TNSM.2008.080104","volume":"5","author":"Y Tang","year":"2008","unstructured":"Tang Y, Al-Shaer E, Boutaba R (2008) Efficient Fault Diagnosis Using Incremental Alarm Correlation and Active Investigation for Internet and Overlay Networks. IEEE Trans Netw Serv Manag 5(1): 36\u201349.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"43_CR15","unstructured":"Sanchez J, Yahia IGB, Crespi N (2014) Self-Healing Mechanisms for SoftwareDefined Networks In: Proceeding of the 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS)."},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Lebrun D, Vissicchio S, Bonaventure O (2014) Towards Test-Driven Software Defined Networking In: IEEE Network Operations and Management Symposium, 1\u20139.","DOI":"10.1109\/NOMS.2014.6838225"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Hinrichs TL, Gude NS, Casado M, Mitchell JC, Shenker S (2009) Practical declarative network management In: Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, WREN 09, 1C10, New York, NY, USA.","DOI":"10.1145\/1592681.1592683"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Al-Shaer E, Marrero W, El-Atawy A, ElBadawi K (2009) Network configuration in a box: Towards end-to-end verification of network reachability and security In: ICNP.","DOI":"10.1109\/ICNP.2009.5339690"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Khurshid A, Zhou W, Caesar M, Godfrey PB (2012) VeriFlow: Verifying Network-wide Invariants in Real Time In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN 2012, 49\u201354, New York, NY, USA.","DOI":"10.1145\/2342441.2342452"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Beckett R, Zou XK, Zhang S, Malik S, Rexford J, Walker D (2014) An Assertion Language for Debugging SDN Applications In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, HotSDN 2014, 91\u201396, New York, NY, USA.","DOI":"10.1145\/2620728.2620743"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Heller B, Scott C, McKeown N, Shenker S, Wundsam A, Zeng H, Whitlock S, Jeyakumar V, Handigol N, McCauley J, Zarifis K, Kazemian P (2013) Leveraging SDN Layering to Systematically Troubleshoot Networks. HotSDN.","DOI":"10.1145\/2491185.2491197"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Halpern J, Pignataro C (eds)2015. Service Function Chaining (SFC) Architecture. draft-ietf-sfc-architecture-11.","DOI":"10.17487\/RFC7665"},{"key":"43_CR23","unstructured":"Prakash C, Lee J, Turner Y, Kang J-M, Akella A, Banerjee S, Clark C, Ma Y, Sharma P, Zhang Y (2015) PGA: Using Graphs to Express and Automatically Reconcile Network Policies."},{"key":"43_CR24","unstructured":"Pearl J (1988) Probabilistic Reasoning in Intelligent Systems. Morgan-Kaufmann."},{"key":"43_CR25","unstructured":"OpenDaylight Platform. https:\/\/www.opendaylight.org\/ . Last access 01 Sept 2015."},{"key":"43_CR26","unstructured":"Project Floodlight. http:\/\/www.projectfloodlight.org\/ . Last access 01 Sept 2015."},{"key":"43_CR27","doi-asserted-by":"crossref","unstructured":"Sanchez J, Grida Ben Yahia I, Cresp I (2015) Self-Modeling based diagnosis of Software-Defined Networks In: Proceedings of the 2015 IEEE Conference on Network Softwarization (NetSoft).","DOI":"10.1109\/NETSOFT.2015.7116174"},{"key":"43_CR28","volume-title":"Concurrent Programming in Erlang","author":"J Armstrong","year":"1996","unstructured":"Armstrong J, Virding R, Williams M (1996) Concurrent Programming in Erlang. 2nd edition. Prentice Hall International, UK."},{"key":"43_CR29","unstructured":"Monsanto C, Reich J, Foster N, Rexford J, Walker D (2013) Composing Software Defined Networks In: Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation, NSDI 2013, 1\u201313, USA."},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Jaynes ET (2003) Probability Theory: The Logic of Science. Cambridge University Press. ISBN 0-521-59271-2.","DOI":"10.1017\/CBO9780511790423"},{"key":"43_CR31","doi-asserted-by":"crossref","unstructured":"Scott C, Wundsam A, Raghavan B, Panda A, Liu Z, Whitlock S, El-Hassany A, Or A, Lai J, Huang E, Acharya HB, Zarifis K, Shenker S (2014) Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences.. Proceedings of the ACM SIGCOMM 2014 Conference.","DOI":"10.1145\/2619239.2626304"}],"container-title":["Journal of Internet Services and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-016-0043-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13174-016-0043-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13174-016-0043-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T22:15:01Z","timestamp":1644444901000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jisajournal.com\/content\/7\/1\/1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,20]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["43"],"URL":"https:\/\/doi.org\/10.1186\/s13174-016-0043-y","relation":{},"ISSN":["1867-4828","1869-0238"],"issn-type":[{"value":"1867-4828","type":"print"},{"value":"1869-0238","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,20]]},"article-number":"1"}}