{"id":"https://openalex.org/W4413311718","doi":"https://doi.org/10.1145/3750022.3750454","title":"Incremental Network Configuration Verification via Localized Subspecification","display_name":"Incremental Network Configuration Verification via Localized Subspecification","publication_year":2025,"publication_date":"2025-08-19","ids":{"openalex":"https://openalex.org/W4413311718","doi":"https://doi.org/10.1145/3750022.3750454"},"language":"en","primary_location":{"id":"doi:10.1145/3750022.3750454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3750022.3750454","pdf_url":null,"source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3750022.3750454","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001082353","display_name":"Haoxian Chen","orcid":"https://orcid.org/0000-0002-8574-2120"},"institutions":[{"id":"https://openalex.org/I30809798","display_name":"ShanghaiTech University","ror":"https://ror.org/030bhh786","country_code":"CN","type":"education","lineage":["https://openalex.org/I30809798"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoxian Chen","raw_affiliation_strings":["ShanghaiTech University, China"],"raw_orcid":"https://orcid.org/0000-0002-8574-2120","affiliations":[{"raw_affiliation_string":"ShanghaiTech University, China","institution_ids":["https://openalex.org/I30809798"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001082353"],"corresponding_institution_ids":["https://openalex.org/I30809798"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20949098,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6412438154220581}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6412438154220581}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3750022.3750454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3750022.3750454","pdf_url":null,"source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3750022.3750454","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3750022.3750454","pdf_url":null,"source":null,"license":"cc-by-nd","license_id":"https://openalex.org/licenses/cc-by-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd Workshop on Formal Methods Aided Network Operation","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W95608104","https://openalex.org/W1249296113","https://openalex.org/W2742515467","https://openalex.org/W3017350605","https://openalex.org/W3046445220","https://openalex.org/W4224320107","https://openalex.org/W4290991530","https://openalex.org/W4386385142"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Verifying":[0],"large":[1],"network":[2,11,30,104],"configurations":[3],"can":[4],"take":[5],"hours":[6],"or":[7],"even":[8],"days.":[9],"Yet,":[10],"updates":[12,37],"occur":[13],"frequently":[14],"as":[15],"operational":[16],"goals":[17],"and":[18,69,99],"conditions":[19,60],"evolve.":[20],"In":[21],"this":[22],"work,":[23],"we":[24,40,54],"study":[25],"the":[26,33,57,73,77,80],"problem":[27],"of":[28,63],"incremental":[29],"verification.":[31,88],"Leveraging":[32],"observation":[34],"that":[35,65],"many":[36],"are":[38],"small,":[39],"propose":[41],"a":[42,61,92],"lightweight":[43],"verification":[44,59,97],"method":[45],"based":[46],"on":[47],"localized":[48],"subspecifications.":[49],"Given":[50],"an":[51],"update":[52,78],"location,":[53],"extract":[55],"from":[56],"original":[58],"subset":[62],"constraints":[64],"is":[66,83],"both":[67],"necessary":[68],"sufficient":[70],"to":[71],"preserve":[72],"global":[74],"property.":[75],"If":[76],"satisfies":[79],"subspecification,":[81],"correctness":[82],"guaranteed":[84],"without":[85],"re-running":[86],"full":[87],"This":[89],"approach":[90],"offers":[91],"promising":[93],"direction":[94],"for":[95],"reducing":[96],"overhead":[98],"enabling":[100],"timely":[101],"feedback":[102],"during":[103],"evolution.":[105]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
