{"id":"https://openalex.org/W2914227481","doi":"https://doi.org/10.1109/lcn.2018.8638123","title":"A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts","display_name":"A Case for Systematic Detection and Rigorous Location of SDN Control Conflicts","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2914227481","doi":"https://doi.org/10.1109/lcn.2018.8638123","mag":"2914227481"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2018.8638123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100302765","display_name":"Lan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I198089087","display_name":"Ball State University","ror":"https://ror.org/00k6tx165","country_code":"US","type":"education","lineage":["https://openalex.org/I198089087"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lan Lin","raw_affiliation_strings":["Department of Computer Science, Ball State University, Muncie, Indiana"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ball State University, Muncie, Indiana","institution_ids":["https://openalex.org/I198089087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101610222","display_name":"Xin Sun","orcid":"https://orcid.org/0000-0002-6532-2604"},"institutions":[{"id":"https://openalex.org/I198089087","display_name":"Ball State University","ror":"https://ror.org/00k6tx165","country_code":"US","type":"education","lineage":["https://openalex.org/I198089087"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xin Sun","raw_affiliation_strings":["Department of Computer Science, Ball State University, Muncie, Indiana"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ball State University, Muncie, Indiana","institution_ids":["https://openalex.org/I198089087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100302765"],"corresponding_institution_ids":["https://openalex.org/I198089087"],"apc_list":null,"apc_paid":null,"fwci":0.1845,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58741204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8335751295089722},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.6747198104858398},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6356073021888733},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.6291030645370483},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.6087892055511475},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4963453412055969},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.44545039534568787},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41226649284362793},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.31816792488098145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23658272624015808},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08656203746795654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8335751295089722},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.6747198104858398},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6356073021888733},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.6291030645370483},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.6087892055511475},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4963453412055969},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.44545039534568787},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41226649284362793},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31816792488098145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23658272624015808},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08656203746795654},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2018.8638123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638123","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320317283","display_name":"Engineering Research Centers","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W158224344","https://openalex.org/W1542964113","https://openalex.org/W1675033504","https://openalex.org/W1968678319","https://openalex.org/W2033392342","https://openalex.org/W2040340473","https://openalex.org/W2081198029","https://openalex.org/W2143840927","https://openalex.org/W2158699648","https://openalex.org/W2171918355","https://openalex.org/W2612153119","https://openalex.org/W6606536520","https://openalex.org/W6637274776"],"related_works":["https://openalex.org/W2378994405","https://openalex.org/W2385974820","https://openalex.org/W2373478030","https://openalex.org/W2378679551","https://openalex.org/W3149739944","https://openalex.org/W2392363776","https://openalex.org/W2063051341","https://openalex.org/W2591066345","https://openalex.org/W1494563618","https://openalex.org/W2357022711"],"abstract_inverted_index":{"We":[0,31,57,98],"take":[1],"the":[2,5,21,34,67,114,130,139,153,157,160],"position":[3],"that":[4,41,43],"interaction":[6],"of":[7,70,121,133,141,159],"multiple":[8,71,134],"software-defined":[9],"networking":[10],"(SDN)":[11],"apps":[12,46,85,136],"running":[13,152],"in":[14],"parallel":[15],"must":[16,27],"be":[17,28],"thoroughly":[18],"understood,":[19],"and":[20,88,119,144,155],"potential":[22],"conflict":[23],"arising":[24],"from":[25],"it":[26],"carefully":[29],"prevented.":[30],"first":[32],"motivate":[33],"problem":[35],"with":[36],"a":[37,49,53,60,105],"concrete":[38],"case":[39],"study":[40],"shows":[42],"two":[44],"SDN":[45,72,84,135],"can":[47],"cause":[48],"network":[50],"to":[51,94,101,112,127,151],"enter":[52],"permanent":[54],"oscillation":[55],"state.":[56],"then":[58,89],"sketch":[59],"rigorous":[61,107],"approach":[62,81,123],"for":[63,109],"systematically":[64],"reasoning":[65],"about":[66,129],"joint":[68,131],"effect":[69,132],"apps,":[73],"including":[74],"whether":[75],"conflicts":[76,146],"may":[77,147],"occur.":[78],"The":[79,116],"proposed":[80],"models":[82],"individual":[83],"as":[86],"automata,":[87],"uses":[90],"standard":[91],"automaton":[92],"operations":[93],"compute":[95],"their":[96],"interactions.":[97],"further":[99],"propose":[100],"apply":[102],"sequence-based":[103],"specification,":[104,111],"well-established":[106],"method":[108],"software":[110],"derive":[113],"automata.":[115],"key":[117],"novelty":[118],"strength":[120],"our":[122],"is":[124],"its":[125],"ability":[126],"reason":[128],"precisely":[137],"(with":[138],"capability":[140],"identifying":[142],"when":[143],"how":[145],"occur),":[148],"proactively":[149],"(prior":[150],"apps),":[154],"without":[156],"knowledge":[158],"apps'":[161],"implementation":[162],"details.":[163]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
