{"id":"https://openalex.org/W2973377795","doi":"https://doi.org/10.15439/2019f355","title":"A formal method to detect possible P4 specific errors","display_name":"A formal method to detect possible P4 specific errors","publication_year":2019,"publication_date":"2019-09-20","ids":{"openalex":"https://openalex.org/W2973377795","doi":"https://doi.org/10.15439/2019f355","mag":"2973377795"},"language":"en","primary_location":{"id":"doi:10.15439/2019f355","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2019f355","pdf_url":"https://annals-csis.org/proceedings/2019/drp/pdf/355.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2019/drp/pdf/355.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082486589","display_name":"Gabriella T\u00f3th","orcid":"https://orcid.org/0000-0001-9657-7231"},"institutions":[{"id":"https://openalex.org/I31882830","display_name":"P\u00e1zm\u00e1ny P\u00e9ter Catholic University","ror":"https://ror.org/05v9kya57","country_code":"HU","type":"education","lineage":["https://openalex.org/I31882830"]}],"countries":["HU"],"is_corresponding":true,"raw_author_name":"Gabriella T\u00f3th","raw_affiliation_strings":["E\u00f6tv\u00f6s Lor\u00e1nd University Faculty of Informatics 1/C","P\u00e1zm\u00e1ny P\u00e9ter sny, Budapest, 1117, Hungary"],"affiliations":[{"raw_affiliation_string":"E\u00f6tv\u00f6s Lor\u00e1nd University Faculty of Informatics 1/C","institution_ids":[]},{"raw_affiliation_string":"P\u00e1zm\u00e1ny P\u00e9ter sny, Budapest, 1117, Hungary","institution_ids":["https://openalex.org/I31882830"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073882154","display_name":"M\u00e1t\u00e9 Tejfel","orcid":"https://orcid.org/0000-0001-8982-1398"},"institutions":[{"id":"https://openalex.org/I31882830","display_name":"P\u00e1zm\u00e1ny P\u00e9ter Catholic University","ror":"https://ror.org/05v9kya57","country_code":"HU","type":"education","lineage":["https://openalex.org/I31882830"]}],"countries":["HU"],"is_corresponding":false,"raw_author_name":"M\u00e1t\u00e9 Tejfel","raw_affiliation_strings":["P\u00e1zm\u00e1ny P\u00e9ter sny, Budapest, 1117, Hungary","E\u00f6tv\u00f6s Lor\u00e1nd University Faculty of Informatics 1/C"],"affiliations":[{"raw_affiliation_string":"P\u00e1zm\u00e1ny P\u00e9ter sny, Budapest, 1117, Hungary","institution_ids":["https://openalex.org/I31882830"]},{"raw_affiliation_string":"E\u00f6tv\u00f6s Lor\u00e1nd University Faculty of Informatics 1/C","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082486589"],"corresponding_institution_ids":["https://openalex.org/I31882830"],"apc_list":null,"apc_paid":null,"fwci":0.3546,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55435759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"19","issue":null,"first_page":"49","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5959842801094055},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5055124759674072},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2220352292060852}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5959842801094055},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5055124759674072},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2220352292060852}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2019f355","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2019f355","pdf_url":"https://annals-csis.org/proceedings/2019/drp/pdf/355.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:95154b0644a64764a3b71954ff066cc8","is_oa":true,"landing_page_url":"https://doaj.org/article/95154b0644a64764a3b71954ff066cc8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 19, Pp 49-56 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2019f355","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2019f355","pdf_url":"https://annals-csis.org/proceedings/2019/drp/pdf/355.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2973377795.pdf","grobid_xml":"https://content.openalex.org/works/W2973377795.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1710734607","https://openalex.org/W1994926493","https://openalex.org/W2339906640","https://openalex.org/W2754082843","https://openalex.org/W2786383442","https://openalex.org/W2791671434","https://openalex.org/W2795742902","https://openalex.org/W2816958343","https://openalex.org/W2832131618","https://openalex.org/W4253835178"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"P4":[0,65],"is":[1,41,70],"a":[2,59,73,97,118],"programming":[3],"language":[4],"to":[5,31,61,89,121],"develop":[6],"data":[7],"processing":[8],"of":[9,13,26,38,64,109,125],"networks.":[10],"This":[11],"kind":[12],"programs":[14,40],"are":[15,56],"used":[16],"in":[17],"network":[18],"devices":[19],"-like":[20],"switches":[21],"-to":[22],"describe":[23],"the":[24,28,32,36,51,84,102,107,123,126],"way":[25],"forwarding":[27],"received":[29],"packets":[30],"proper":[33],"device.":[34],"Checking":[35],"correctness":[37],"these":[39],"not":[42],"an":[43],"obvious":[44],"task,":[45],"because":[46],"they":[47],"can":[48,77],"easily":[49],"hide":[50],"run":[52],"time":[53],"errors.":[54],"We":[55,115],"working":[57],"on":[58,72],"method":[60,69],"detect":[62,78,90],"violation":[63],"specific":[66],"properties.":[67],"The":[68],"based":[71],"rule":[74],"system,":[75],"which":[76],"suspicious":[79],"program":[80],"parts":[81],"and":[82,91,112],"indicate":[83],"violated":[85],"property.":[86],"It":[87],"helps":[88],"correct":[92],"real":[93],"errors":[94],"easily.":[95],"As":[96],"first":[98],"step,":[99],"we":[100],"introduce":[101],"main":[103],"idea,":[104],"dealing":[105],"with":[106],"access":[108],"invalid":[110],"header":[111],"uninitialized":[113],"fields.":[114],"also":[116],"present":[117],"case":[119],"study":[120],"demonstrate":[122],"applicability":[124],"method.":[127]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
