-
3
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
March
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput. Commun. Rev., 38:69-74, March 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
5
-
-
70350656962
-
NOX: Towards an operating system for networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker. NOX: Towards an Operating System for Networks. SIGCOMM Comput. Commun. Rev., 38:105-110, July 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
6
-
-
69249218972
-
Rethinking enterprise network control
-
August
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McK-eown, and S. Shenker. Rethinking Enterprise Network Control. IEEE/ACM Transactions on Networking, 17(4), August 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.4
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
Gude, N.5
McK-Eown, N.6
Shenker, S.7
-
7
-
-
77955212375
-
Resonance: Dynamic access control for enterprise networks
-
A. Nayak, A. Reimers, N. Feamster, and R. Clark. Resonance: Dynamic Access Control for Enterprise Networks. In WREN, 2009.
-
(2009)
WREN
-
-
Nayak, A.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
9
-
-
84955445300
-
OpenFlow-based server load balancing gone wild
-
R. Wang, D. Butnariu, and J. Rexford. OpenFlow-Based Server Load Balancing Gone Wild. In Hot-ICE, 2011.
-
(2011)
Hot-ICE
-
-
Wang, R.1
Butnariu, D.2
Rexford, J.3
-
10
-
-
84885109587
-
ElasticTree: Saving energy in data center networks
-
B. Heller, S. Seetharaman, P. Mahadevan, Y. Yiakoumis, P. Sharma, S. Banerjee, and N. McKeown. ElasticTree: Saving Energy in Data Center Networks. In NSDI, 2010.
-
(2010)
NSDI
-
-
Heller, B.1
Seetharaman, S.2
Mahadevan, P.3
Yiakoumis, Y.4
Sharma, P.5
Banerjee, S.6
McKeown, N.7
-
13
-
-
0037384036
-
Model checking programs
-
W. Visser, K. Havelund, G. Brat, S. Park, and F. Lerda. Model Checking Programs. Automated Software Engineering, 10(2):203-232, 2003.
-
(2003)
Automated Software Engineering
, vol.10
, Issue.2
, pp. 203-232
-
-
Visser, W.1
Havelund, K.2
Brat, G.3
Park, S.4
Lerda, F.5
-
14
-
-
10844221463
-
Model checking large network protocol implementations
-
M. Musuvathi and D. R. Engler. Model Checking Large Network Protocol Implementations. In NSDI, 2004.
-
(2004)
NSDI
-
-
Musuvathi, M.1
Engler, D.R.2
-
15
-
-
85028155431
-
Life, death, and the critical transition: Finding liveness bugs in systems code
-
C. E. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, Death, and the Critical Transition: Finding Liveness Bugs in Systems Code. In NSDI, 2007.
-
(2007)
NSDI
-
-
Killian, C.E.1
Anderson, J.W.2
Jhala, R.3
Vahdat, A.4
-
16
-
-
85076916869
-
MODIST: Transparent model checking of unmodified distributed systems
-
J. Yang, T. Chen, M. Wu, Z. Xu, X. Liu, H. Lin, M. Yang, F. Long, L. Zhang, and L. Zhou. MODIST: Transparent Model Checking of Unmodified Distributed Systems. In NSDI, 2009.
-
(2009)
NSDI
-
-
Yang, J.1
Chen, T.2
Wu, M.3
Xu, Z.4
Liu, X.5
Lin, H.6
Yang, M.7
Long, F.8
Zhang, L.9
Zhou, L.10
-
17
-
-
67650790221
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
C. Cadar, D. Dunbar, and D. R. Engler. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI, 2008.
-
(2008)
OSDI
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.R.3
-
18
-
-
79955963313
-
Parallel symbolic execution for automated real-world software testing
-
S. Bucur, V. Ureche, C. Zamfir, and G. Candea. Parallel Symbolic Execution for Automated Real-World Software Testing. In EuroSys, 2011.
-
(2011)
EuroSys
-
-
Bucur, S.1
Ureche, V.2
Zamfir, C.3
Candea, G.4
-
22
-
-
77954523986
-
KleeNet: Discovering insidious interaction bugs in wireless sensor networks before deployment
-
R. Sasnauskas, O. Landsiedel, M. H. Alizai, C. Weise, S. Kowalewski, and K. Wehrle. KleeNet: Discovering Insidious Interaction Bugs in Wireless Sensor Networks Before Deployment. In IPSN, 2010.
-
(2010)
IPSN
-
-
Sasnauskas, R.1
Landsiedel, O.2
Alizai, M.H.3
Weise, C.4
Kowalewski, S.5
Wehrle, K.6
-
23
-
-
4544361507
-
Generalized symbolic execution for model checking and testing
-
S. Khurshid, C. S. Pasareanu, and W. Visser. Generalized Symbolic Execution for Model Checking and Testing. In TACAS, 2003.
-
(2003)
TACAS
-
-
Khurshid, S.1
Pasareanu, C.S.2
Visser, W.3
-
24
-
-
31844450371
-
DART: Directed automated random testing
-
P. Godefroid, N. Klarlund, and K. Sen. DART: Directed Automated Random Testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
25
-
-
67650336319
-
A decision procedure for bit-vectors and arrays
-
V. Ganesh and D. L. Dill. A Decision Procedure for Bit-Vectors and Arrays. In CAV, 2007.
-
(2007)
CAV
-
-
Ganesh, V.1
Dill, D.L.2
-
27
-
-
33746241288
-
Dynamic partial-order reduction for model checking software
-
C. Flanagan and P. Godefroid. Dynamic Partial-Order Reduction for Model Checking Software. In POPL, 2005.
-
(2005)
POPL
-
-
Flanagan, C.1
Godefroid, P.2
-
28
-
-
84891392021
-
Identifying and using energy-critical paths
-
N. Vasic, D. Novakovic, S. Shekhar, P. Bhurat, M. Canini, and D. Kostic. Identifying and using energy-critical paths. In CoNEXT, 2011.
-
(2011)
CoNEXT
-
-
Vasic, N.1
Novakovic, D.2
Shekhar, S.3
Bhurat, P.4
Canini, M.5
Kostic, D.6
-
29
-
-
80054087519
-
Frenetic: A network programming language
-
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker. Frenetic: A Network Programming Language. In ICFP, 2011.
-
(2011)
ICFP
-
-
Foster, N.1
Harrison, R.2
Freedman, M.J.3
Monsanto, C.4
Rexford, J.5
Story, A.6
Walker, D.7
-
31
-
-
80053150074
-
Debugging the data plane with anteater
-
H. Mai, A. Khurshid, R. Agarwal, M. Caesar, P. B. Godfrey, and S. T. King. Debugging the Data Plane with Anteater. In SIG- COMM, 2011.
-
(2011)
SIG- COMM
-
-
Mai, H.1
Khurshid, A.2
Agarwal, R.3
Caesar, M.4
Godfrey, P.B.5
King, S.T.6
-
32
-
-
84866483348
-
FlowChecker: Configuration analysis and verification of federated openflow infrastructures
-
E. Al-Shaer and S. Al-Haj. FlowChecker: Configuration Analysis and Verification of Federated OpenFlow Infrastructures. In SafeConfig, 2010.
-
(2010)
SafeConfig
-
-
Al-Shaer, E.1
Al-Haj, S.2
-
33
-
-
47249160193
-
Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets
-
S. Bishop, M. Fairbairn, M. Norrish, P. Sewell, M. Smith, and K. Wansbrough. Rigorous Specification and Conformance Testing Techniques for Network Protocols, as applied to TCP, UDP, and Sockets. In SIGCOMM, 2005.
-
(2005)
SIGCOMM
-
-
Bishop, S.1
Fairbairn, M.2
Norrish, M.3
Sewell, P.4
Smith, M.5
Wansbrough, K.6
-
34
-
-
80053145619
-
Finding protocol manipulation attacks
-
N. Kothari, R. Mahajan, T. Millstein, R. Govindan, and M. Musuvathi. Finding Protocol Manipulation Attacks. In SIGCOMM, 2011.
-
(2011)
SIGCOMM
-
-
Kothari, N.1
Mahajan, R.2
Millstein, T.3
Govindan, R.4
Musuvathi, M.5
|