-
1
-
-
84907007614
-
-
Bit-Twist. http://bittwist.sourceforge.net/.
-
-
-
-
2
-
-
84907012578
-
-
CBMC. http://www.cprover.org/cbmc/.
-
CBMC
-
-
-
3
-
-
84907012952
-
-
Graphplan. http://www.cs.cmu.edu/~avrim/graphplan.html.
-
Graphplan
-
-
-
4
-
-
84907012951
-
-
Prolexic. http://www.prolexic.com/.
-
-
-
-
5
-
-
84907012950
-
-
pytbull. http://pytbull.sourceforge.net/.
-
-
-
-
6
-
-
84901611022
-
VeriCon: Towards verifying controller programs in software-defined networks
-
T. Ball, N. Bjorner, A. Gember, S. Itzhaky, A. Karbyshev, M. Sagiv, M. Schapira, and A. Valadarskyi. VeriCon: Towards verifying controller programs in software-defined networks. In Proc. PLDI, 2014.
-
Proc. PLDI, 2014
-
-
Ball, T.1
Bjorner, N.2
Gember, A.3
Itzhaky, S.4
Karbyshev, A.5
Sagiv, M.6
Schapira, M.7
Valadarskyi, A.8
-
7
-
-
84992193383
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proc. OSDI, 2008.
-
Proc. OSDI, 2008
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
8
-
-
85013634872
-
A NICE way to test openflow applications
-
M. Canini, D. Venzano, P. Perešíni, D. Kostić, and J. Rexford. A NICE way to test openflow applications. In Proc. NSDI, 2012.
-
Proc. NSDI, 2012
-
-
Canini, M.1
Venzano, D.2
Perešíni, P.3
Kostić, D.4
Rexford, J.5
-
9
-
-
84944406286
-
Counterexample-guided abstraction refinement
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample- guided abstraction refinement. In Computer Aided Verification, volume 1855, pages 154-169. 2000.
-
(2000)
Computer Aided Verification
, vol.1855
, pp. 154-169
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
10
-
-
85071935677
-
Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags
-
S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul. Enforcing network-wide policies in the presence of dynamic middlebox actions using FlowTags. In Proc. NSDI, 2014.
-
Proc. NSDI, 2014
-
-
Fayazbakhsh, S.K.1
Chiang, L.2
Sekar, V.3
Yu, M.4
Mogul, J.C.5
-
11
-
-
80053341773
-
Frenetic: A network programming language
-
Sept.
-
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker. Frenetic: A network programming language. SIGPLAN Not., 46(9):279-291, Sept. 2011.
-
(2011)
SIGPLAN Not.
, vol.46
, Issue.9
, pp. 279-291
-
-
Foster, N.1
Harrison, R.2
Freedman, M.J.3
Monsanto, C.4
Rexford, J.5
Story, A.6
Walker, D.7
-
12
-
-
84883295383
-
Stratos: A network-aware orchestration layer for middleboxes in the cloud
-
abs/1305.0209
-
A. Gember, A. Krishnamurthy, S. S. John, R. Grandl, X. Gao, A. Anand, T. Benson, V. Sekar, and A. Akella. Stratos: A network-aware orchestration layer for middleboxes in the cloud. CoRR, abs/1305.0209, 2013.
-
(2013)
CoRR
-
-
Gember, A.1
Krishnamurthy, A.2
John, S.S.3
Grandl, R.4
Gao, X.5
Anand, A.6
Benson, T.7
Sekar, V.8
Akella, A.9
-
14
-
-
84945273945
-
I know what your packet did last hop: Using packet histories to troubleshoot network
-
N. Handigol, B. Heller, V. Jeyakumar, D. Mazières, and N. McKeown. I know what your packet did last hop: Using packet histories to troubleshoot network. In Proc. NSDI, 2014.
-
Proc. NSDI, 2014
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Mazières, D.4
McKeown, N.5
-
15
-
-
82955186911
-
Is it still possible to extend TCP?
-
M. Honda, Y. Nishida, C. Raiciu, A. Greenhalgh, M. Handley, and H. Tokuda. Is it still possible to extend TCP? In Proc. IMC, 2011.
-
Proc. IMC, 2011
-
-
Honda, M.1
Nishida, Y.2
Raiciu, C.3
Greenhalgh, A.4
Handley, M.5
Tokuda, H.6
-
20
-
-
85076669711
-
Composing software-defined networks
-
C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing software-defined networks. In Proc. NSDI, 2013.
-
Proc. NSDI, 2013
-
-
Monsanto, C.1
Reich, J.2
Foster, N.3
Rexford, J.4
Walker, D.5
-
21
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using sdn
-
Z. Qazi, C. Tu, L. Chiang, R. Miao, and M. Yu. SIMPLE-fying middlebox policy enforcement using sdn. In Proc. SIGCOMM, 2013.
-
Proc. SIGCOMM, 2013
-
-
Qazi, Z.1
Tu, C.2
Chiang, L.3
Miao, R.4
Yu, M.5
-
25
-
-
84996432988
-
Design and implementation of a consolidated middlebox architecture
-
V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. Design and implementation of a consolidated middlebox architecture. In Proc. NSDI, 2012.
-
Proc. NSDI, 2012
-
-
Sekar, V.1
Egi, N.2
Ratnasamy, S.3
Reiter, M.K.4
Shi, G.5
-
26
-
-
84866513406
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
J. Sherry, S. Hasan, C. Scott, A. Krishnamurthy, S. Ratnasamy, and V. Sekar. Making middleboxes someone else's problem: Network processing as a cloud service. In Proc. SIGCOMM, 2012.
-
Proc. SIGCOMM, 2012
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
30
-
-
85013638751
-
NetCheck: Network diagnoses from blackbox traces
-
Y. Zhuang, E. Gessiou, S. Portzer, F. Fund, M. Muhammad, I. Beschastnikh, and J. Cappos. NetCheck: Network diagnoses from blackbox traces. In Proc. NSDI, 2014.
-
Proc. NSDI, 2014
-
-
Zhuang, Y.1
Gessiou, E.2
Portzer, S.3
Fund, F.4
Muhammad, M.5
Beschastnikh, I.6
Cappos, J.7
|