{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:27:53Z","timestamp":1729621673091,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838225","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-9","source":"Crossref","is-referenced-by-count":10,"title":["Towards test-driven software defined networking"],"prefix":"10.1109","author":[{"given":"David","family":"Lebrun","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Vissicchio","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Compilers Principles Techniques and Tools","year":"1986","author":"aho","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"2001","author":"hopcroft","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413205"},{"key":"16","article-title":"Header space analysis: Static checking for networks","author":"kazemian","year":"2012","journal-title":"NSDI"},{"journal-title":"TASTE - A Toolkit for Automated Sdn TEsting","year":"0","author":"lebrun","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/357766.351266"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"journal-title":"PCRE - Perl compatible regular expressions","year":"0","author":"hazel","key":"12"},{"journal-title":"Top-Down Network Design","year":"2010","author":"oppenheimer","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2089640"},{"journal-title":"Enterprise Network Testing Testing Throughout the Network Lifecycle to Maximize Availability and Performance","year":"2011","author":"sholomon","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"24","article-title":"Composing software-defined networks","author":"monsanto","year":"2013","journal-title":"NSDI"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491187"},{"journal-title":"What's behind network downtime?","year":"2008","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339690"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.110311.100109"},{"key":"29","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/TNET.2012.2203144","article-title":"Quantifying and verifying reachability for access controlled networks","volume":"21","author":"liu","year":"2013","journal-title":"IEEE\/ACM Trans Netw"},{"journal-title":"Software Testing and Analysis Process Principles and Techniques","year":"2008","author":"pezze","key":"3"},{"key":"2","article-title":"Requirements engineering: From craft to discipline","author":"van lamsweerde","year":"2008","journal-title":"SIGSOFT"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413187"},{"journal-title":"Network Analysis Architecture and Design","year":"2010","author":"mccabe","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342359"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.21"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342458"},{"key":"31","article-title":"A NICE way to test openflow applications","author":"canini","year":"2012","journal-title":"NSDI"},{"key":"4","article-title":"Network functions virtualisation - Introductory white paper","author":"chiosi","year":"2012","journal-title":"The SDN and Open-Flow World Congress"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838225.pdf?arnumber=6838225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:26:14Z","timestamp":1498152374000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838225","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}