Author:
Backes John,Bayless Sam,Cook Byron,Dodge Catherine,Gacek Andrew,Hu Alan J.,Kahsai Temesghen,Kocik Bill,Kotelnikov Evgenii,Kukovec Jure,McLaughlin Sean,Reed Jason,Rungta Neha,Sizemore John,Stalzer Mark,Srinivasan Preethi,Subotić Pavle,Varming Carsten,Whaley Blake
Publisher
Springer International Publishing
Reference28 articles.
1. Al-Shaer, E., Marrero, W., El-Atawy, A., Elbadawi, K.: Network configuration in A box: towards end-to-end verification of network reachability and security. In: Proceedings of the 17th Annual IEEE International Conference on Network Protocols, 2009. ICNP 2009, Princeton, NJ, USA, 13–16 October 2009, pp. 123–132 (2009).
https://doi.org/10.1109/ICNP.2009.5339690
2. Ball, T., et al.: VeriCon: towards verifying controller programs in software-defined networks. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, Edinburgh, UK, 9–11 June 2014, pp. 282–293 (2014).
https://doi.org/10.1145/2594291.2594317
,
http://doi.acm.org/10.1145/2594291.2594317
3. Bayless, S., Bayless, N., Hoos, H.H., Hu, A.J.: SAT modulo monotonic theories. In: Proceedings of AAAI, pp. 3702–3709 (2015)
4. Lecture Notes in Computer Science;A Biere,1999
5. Lecture Notes in Computer Science;N Bjørner,2015
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Relational Network Verification;Proceedings of the ACM SIGCOMM 2024 Conference;2024-08-04
2. Proactive Telemetry in Large-Scale Multi-Tenant Cloud Overlay Networks;IEEE/ACM Transactions on Networking;2024-08
3. An intent-based solution for network isolation in Kubernetes;2024 IEEE 10th International Conference on Network Softwarization (NetSoft);2024-06-24
4. Automated Infrastructure as Code Program Testing;IEEE Transactions on Software Engineering;2024-06
5. Adaptive Recursive Query Optimization;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13