{"id":"https://openalex.org/W2095117802","doi":"https://doi.org/10.1145/1713254.1713260","title":"On the declarativity of declarative networking","display_name":"On the declarativity of declarative networking","publication_year":2010,"publication_date":"2010-01-27","ids":{"openalex":"https://openalex.org/W2095117802","doi":"https://doi.org/10.1145/1713254.1713260","mag":"2095117802"},"language":"en","primary_location":{"id":"doi:10.1145/1713254.1713260","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1713254.1713260","pdf_url":null,"source":{"id":"https://openalex.org/S50071195","display_name":"ACM SIGOPS Operating Systems Review","issn_l":"0163-5980","issn":["0163-5980","1943-586X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGOPS Operating Systems Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113786097","display_name":"Yun Mao","orcid":"https://orcid.org/0000-0002-3326-4729"},"institutions":[{"id":"https://openalex.org/I1283103587","display_name":"AT&T (United States)","ror":"https://ror.org/02bbd5539","country_code":"US","type":"company","lineage":["https://openalex.org/I1283103587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yun Mao","raw_affiliation_strings":["AT&amp;T Labs - Research, Florham Park, NJ"],"affiliations":[{"raw_affiliation_string":"AT&amp;T Labs - Research, Florham Park, NJ","institution_ids":["https://openalex.org/I1283103587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5113786097"],"corresponding_institution_ids":["https://openalex.org/I1283103587"],"apc_list":null,"apc_paid":null,"fwci":3.7191,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.93391169,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"43","issue":"4","first_page":"19","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8692106008529663},{"id":"https://openalex.org/keywords/declarative-programming","display_name":"Declarative programming","score":0.7701833248138428},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5956935286521912},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5955979824066162},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.5354421734809875},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48544174432754517},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.4279184341430664},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3463480472564697},{"id":"https://openalex.org/keywords/programming-paradigm","display_name":"Programming paradigm","score":0.2987702488899231},{"id":"https://openalex.org/keywords/inductive-programming","display_name":"Inductive programming","score":0.15583321452140808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14889782667160034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8692106008529663},{"id":"https://openalex.org/C146206909","wikidata":"https://www.wikidata.org/wiki/Q531152","display_name":"Declarative programming","level":4,"score":0.7701833248138428},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5956935286521912},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5955979824066162},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.5354421734809875},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48544174432754517},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.4279184341430664},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3463480472564697},{"id":"https://openalex.org/C34165917","wikidata":"https://www.wikidata.org/wiki/Q188267","display_name":"Programming paradigm","level":2,"score":0.2987702488899231},{"id":"https://openalex.org/C50033165","wikidata":"https://www.wikidata.org/wiki/Q15712089","display_name":"Inductive programming","level":3,"score":0.15583321452140808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14889782667160034},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1713254.1713260","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1713254.1713260","pdf_url":null,"source":{"id":"https://openalex.org/S50071195","display_name":"ACM SIGOPS Operating Systems Review","issn_l":"0163-5980","issn":["0163-5980","1943-586X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGOPS Operating Systems Review","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W179908819","https://openalex.org/W1517715981","https://openalex.org/W1576549127","https://openalex.org/W1778962283","https://openalex.org/W1819216168","https://openalex.org/W2010365467","https://openalex.org/W2044701300","https://openalex.org/W2073904762","https://openalex.org/W2096160379","https://openalex.org/W2105170773","https://openalex.org/W2121509107","https://openalex.org/W2122984971","https://openalex.org/W2124753887","https://openalex.org/W2124823841","https://openalex.org/W2132314614","https://openalex.org/W2134890934","https://openalex.org/W2136575791","https://openalex.org/W2139616859","https://openalex.org/W2147081775","https://openalex.org/W2153428489","https://openalex.org/W2337996024","https://openalex.org/W2753710282","https://openalex.org/W3149201378","https://openalex.org/W4245268933","https://openalex.org/W7018146823"],"related_works":["https://openalex.org/W27605384","https://openalex.org/W1778728081","https://openalex.org/W1587224678","https://openalex.org/W2099080307","https://openalex.org/W1483213041","https://openalex.org/W1894736207","https://openalex.org/W1548535723","https://openalex.org/W1597062518","https://openalex.org/W2155588070","https://openalex.org/W170948064"],"abstract_inverted_index":{"Initiated":[0],"by":[1,32],"the":[2,26,34,74,80,89,94],"declarative":[3,7,67,83],"networking":[4],"project,":[5],"rule-based":[6],"programming":[8,84],"languages":[9],"have":[10],"gained":[11],"increasing":[12],"popularity":[13],"in":[14,71],"building":[15],"complex":[16],"networked":[17],"systems":[18],"across":[19],"multiple":[20],"application":[21],"domains.":[22],"This":[23],"paper":[24],"investigates":[25],"declarativity":[27,96],"of":[28,52,73,82],"those":[29,105],"systems.":[30,76],"First,":[31],"analyzing":[33],"language":[35],"semantics,":[36],"we":[37,55],"classify":[38],"rules":[39,42,63],"into":[40],"deductive":[41],"and":[43,47,98],"Event-Condition-Action":[44],"(ECA)":[45],"rules,":[46],"reveal":[48],"their":[49],"different":[50],"levels":[51],"declarativities.":[53],"Then,":[54],"use":[56],"case":[57],"studies":[58],"to":[59],"show":[60],"that":[61,64,92],"ECA":[62],"are":[65,68],"less":[66],"dominantly":[69],"used":[70],"most":[72],"proposed":[75],"As":[77],"a":[78],"result,":[79],"benefit":[81],"is":[85],"undermined.":[86],"We":[87],"identify":[88],"key":[90],"factors":[91],"cause":[93],"low":[95],"effect,":[97],"present":[99],"our":[100],"ongoing":[101],"work":[102],"towards":[103],"addressing":[104],"challenges.":[106]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
