{"id":"https://openalex.org/W2566395968","doi":"https://doi.org/10.1109/icnp.2016.7784433","title":"Redactor: Reconcile network control with declarative control programs In SDN","display_name":"Redactor: Reconcile network control with declarative control programs In SDN","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2566395968","doi":"https://doi.org/10.1109/icnp.2016.7784433","mag":"2566395968"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2016.7784433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047749907","display_name":"Wen Wang","orcid":"https://orcid.org/0000-0002-6832-105X"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Wen Wang","raw_affiliation_strings":["McGill University"],"affiliations":[{"raw_affiliation_string":"McGill University","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665461","display_name":"Wenbo He","orcid":"https://orcid.org/0000-0001-8606-2920"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Wenbo He","raw_affiliation_strings":["McGill University"],"affiliations":[{"raw_affiliation_string":"McGill University","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055375948","display_name":"Jinshu Su","orcid":"https://orcid.org/0000-0001-9273-616X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinshu Su","raw_affiliation_strings":["National University of Defense Technology"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047749907"],"corresponding_institution_ids":["https://openalex.org/I5023651"],"apc_list":null,"apc_paid":null,"fwci":2.1251,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.89155702,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7978028059005737},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.7288122177124023},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6773079037666321},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.5882683396339417},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.42625537514686584},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3713272213935852},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1340876817703247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7978028059005737},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.7288122177124023},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6773079037666321},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.5882683396339417},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.42625537514686584},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3713272213935852},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1340876817703247},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icnp.2016.7784433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2016.7784433","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W121467848","https://openalex.org/W1461485317","https://openalex.org/W1590488181","https://openalex.org/W1792894036","https://openalex.org/W2011316745","https://openalex.org/W2021234005","https://openalex.org/W2043234774","https://openalex.org/W2062013187","https://openalex.org/W2064322639","https://openalex.org/W2071187149","https://openalex.org/W2081198029","https://openalex.org/W2099501333","https://openalex.org/W2115442705","https://openalex.org/W2121527371","https://openalex.org/W2123548135","https://openalex.org/W2124497098","https://openalex.org/W2138556012","https://openalex.org/W2143840927","https://openalex.org/W2163593754","https://openalex.org/W2171918355","https://openalex.org/W2324910104","https://openalex.org/W2469196338","https://openalex.org/W2911820873","https://openalex.org/W3160659792","https://openalex.org/W6605024607","https://openalex.org/W6628618980","https://openalex.org/W6638359055","https://openalex.org/W6665891038","https://openalex.org/W6684118736"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2025641871","https://openalex.org/W4252107351"],"abstract_inverted_index":{"With":[0],"SDN":[1,125],"control":[2,13,17,28,33,47,82,92,95,111,121,126,134,157,162,184,189],"programs":[3,14,34,127,135,158],"from":[4],"multi-domains":[5],"configuring":[6],"the":[7,42,55,69,78,91,105,161,168,176],"network,":[8],"it":[9],"is":[10,57],"inevitable":[11],"that":[12,179],"make":[15,119,141],"conflicting":[16],"decisions,":[18],"which":[19],"probably":[20,71],"lead":[21],"to":[22,35,49,64,77,89,103,137,140,152,159,186],"misconfiguration":[23],"or":[24,40],"performance":[25],"degradation.":[26],"Existing":[27],"coordination":[29],"approaches":[30,86],"either":[31],"compose":[32,133],"derive":[36],"consistent":[37,142],"solutions":[38,75],"jointly":[39],"examine":[41],"generated":[43],"rules":[44],"of":[45,59,81,94,109,156],"each":[46],"program":[48],"ensure":[50],"they":[51],"are":[52],"consistent.":[53],"However,":[54],"former":[56],"usually":[58],"great":[60],"complexity":[61],"and":[62,68,107,115,132,172,175,191],"hard":[63],"be":[65],"conducted":[66],"automatically,":[67],"latter":[70],"results":[72,177],"in":[73,112],"suboptimal":[74],"due":[76],"independent":[79],"execution":[80],"programs.":[83,96],"Moreover,":[84],"these":[85],"all":[87],"fail":[88],"consider":[90],"utility":[93,108],"In":[97],"this":[98],"paper,":[99],"we":[100,123,147],"propose":[101],"Redactor":[102,166,180],"optimize":[104],"consistency":[106,190],"network":[110,120],"an":[113],"automatic":[114],"dynamic":[116],"manner.":[117],"To":[118],"consistent,":[122],"implement":[124],"with":[128,167],"declarative":[129],"language":[130],"Prolog,":[131],"automatically":[136],"execute":[138],"together":[139],"decisions.":[143],"When":[144],"conflicts":[145],"occur,":[146],"use":[148],"a":[149,154],"heuristic":[150],"approach":[151],"compromise":[153],"subset":[155],"maximize":[160],"utility.":[163,192],"We":[164],"compare":[165],"static":[169],"priority":[170],"mechanism":[171],"Athens":[173],"[1],":[174],"show":[178],"always":[181],"satisfies":[182],"more":[183],"objectives":[185],"achieve":[187],"better":[188]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
