{"id":"https://openalex.org/W4416298001","doi":"https://doi.org/10.1145/3772356.3772406","title":"Just-in-Time Logic Enforcement","display_name":"Just-in-Time Logic Enforcement","publication_year":2025,"publication_date":"2025-11-17","ids":{"openalex":"https://openalex.org/W4416298001","doi":"https://doi.org/10.1145/3772356.3772406"},"language":null,"primary_location":{"id":"doi:10.1145/3772356.3772406","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772406","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772406","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772406","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088675790","display_name":"Hongyu H\u00e8","orcid":"https://orcid.org/0009-0006-9707-7291"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hongyu H\u00e8","raw_affiliation_strings":["Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA"],"raw_orcid":"https://orcid.org/0009-0006-9707-7291","affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026774096","display_name":"Maria Apostolaki","orcid":"https://orcid.org/0000-0003-0342-2631"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maria Apostolaki","raw_affiliation_strings":["Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA"],"raw_orcid":"https://orcid.org/0000-0003-0342-2631","affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088675790"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.38448932,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"184","last_page":"192"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3783999979496002,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3783999979496002,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.2743000090122223,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.033900000154972076,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6866000294685364},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5767999887466431},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.4657000005245209},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.42500001192092896},{"id":"https://openalex.org/keywords/rule-of-inference","display_name":"Rule of inference","score":0.3140000104904175},{"id":"https://openalex.org/keywords/probabilistic-logic-network","display_name":"Probabilistic logic network","score":0.29120001196861267}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6866000294685364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6198999881744385},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5767999887466431},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.499099999666214},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.4657000005245209},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.4390000104904175},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.42500001192092896},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.37529999017715454},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3560999929904938},{"id":"https://openalex.org/C3746660","wikidata":"https://www.wikidata.org/wiki/Q1068763","display_name":"Rule of inference","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C18998212","wikidata":"https://www.wikidata.org/wiki/Q7246856","display_name":"Probabilistic logic network","level":5,"score":0.29120001196861267},{"id":"https://openalex.org/C2779814899","wikidata":"https://www.wikidata.org/wiki/Q332880","display_name":"Common sense","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.267300009727478},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C2994165510","wikidata":"https://www.wikidata.org/wiki/Q131160","display_name":"Political correctness","level":3,"score":0.25690001249313354}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3772356.3772406","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772406","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772406","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3772356.3772406","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3772356.3772406","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3772356.3772406","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th ACM Workshop on Hot Topics in Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1716514692","display_name":"CAREER: Contextual Robustness for ML-powered Network-based Functions","funder_award_id":"2442625","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416298001.pdf","grobid_xml":"https://content.openalex.org/works/W4416298001.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W2110025251","https://openalex.org/W2157256407","https://openalex.org/W2526174560","https://openalex.org/W2899283552","https://openalex.org/W2981638325","https://openalex.org/W4230846333","https://openalex.org/W4288039037","https://openalex.org/W4290991003","https://openalex.org/W4307020348","https://openalex.org/W4388625574","https://openalex.org/W4388629193","https://openalex.org/W4388644506","https://openalex.org/W4388644518","https://openalex.org/W4388644524","https://openalex.org/W4391590983","https://openalex.org/W4391989542","https://openalex.org/W4399803256","https://openalex.org/W4401176274","https://openalex.org/W4404240381","https://openalex.org/W4404534210"],"related_works":[],"abstract_inverted_index":{"While":[0],"ML":[1,36,67],"can":[2],"greatly":[3],"aid":[4],"network":[5],"management,":[6],"it":[7],"often":[8],"makes":[9],"glaring":[10],"mistakes":[11],"that":[12,51],"contradict":[13],"common":[14],"sense":[15],"or":[16,44],"domain-specific":[17],"constraints,":[18],"undermining":[19],"its":[20],"trustworthiness":[21],"and":[22,68],"hindering":[23],"adoption.":[24],"To":[25],"address":[26],"this":[27,29,52],"mismatch,":[28],"paper":[30],"advocates":[31],"for":[32],"enforcing":[33],"logic":[34],"during":[35,42],"inference":[37],"(or":[38],"Just-In-Time),":[39],"rather":[40],"than":[41],"training":[43],"post-inference":[45],"in":[46],"prior":[47],"work.":[48],"We":[49],"find":[50],"approach":[53],"offers":[54],"correctness":[55],"guarantees":[56],"without":[57],"sacrificing":[58],"statistical":[59],"fidelity,":[60],"thereby":[61],"maximizing":[62],"the":[63],"benefits":[64],"of":[65],"both":[66],"formal":[69],"reasoning.":[70]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-11-17T00:00:00"}
