{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T15:53:15Z","timestamp":1725724395116},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,12]]},"DOI":"10.1145\/1254882.1254921","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T12:07:37Z","timestamp":1189771657000},"page":"325-336","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Theoretical bounds on control-plane self-monitoring in routing protocols"],"prefix":"10.1145","author":[{"given":"Raj Kumar","family":"Rajendran","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Vishal","family":"Misra","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Dan","family":"Rubenstein","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2007,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637233"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383776"},{"key":"e_1_3_2_1_4_1","unstructured":"J. Farrar. C&w routing instability. nanog mail archives. Available at http:\/\/www.merit.edu\/mail.archives\/nanog\/2001-04\/msg00209.html. J. Farrar. C&w routing instability. nanog mail archives. Available at http:\/\/www.merit.edu\/mail.archives\/nanog\/2001-04\/msg00209.html."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781043"},{"key":"e_1_3_2_1_6_1","volume-title":"NANOG25","author":"Feamster N.","year":"2002","unstructured":"N. Feamster , J. Borkenhagen , and J. Rexford . Controlling the impact of bgp policy changes on ip traffic . In NANOG25 , 2002 . N. Feamster, J. Borkenhagen, and J. Rexford. Controlling the impact of bgp policy changes on ip traffic. In NANOG25, 2002."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080096"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. IEEE Global Internet Symposium","author":"Gao L.","year":"2000","unstructured":"L. Gao . On inferring autonomous system relationships in the internet . In Proc. IEEE Global Internet Symposium , November 2000 ., 2000. L. Gao. On inferring autonomous system relationships in the internet. In Proc. IEEE Global Internet Symposium, November 2000., 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316231"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941317"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.731185"},{"key":"e_1_3_2_1_17_1","volume-title":"Addison-Wesley Publishing Co.: Reading Mass","author":"Luenberger D.","year":"1984","unstructured":"D. Luenberger . Linear and Nonlinear Programming . Addison-Wesley Publishing Co.: Reading Mass , 1984 . D. Luenberger. Linear and Nonlinear Programming. Addison-Wesley Publishing Co.: Reading Mass, 1984."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"G. Malkin. Routing Information Protocol Version 2. RFC 2453 November 1998. G. Malkin. Routing Information Protocol Version 2. RFC 2453 November 1998.","DOI":"10.17487\/rfc2453"},{"key":"e_1_3_2_1_20_1","unstructured":"A. Medina A. Lakhina I. Matta and J. Byers. Brite: Universal topology generation from a user's perspective. Available at http:\/\/www.cs.bu.edu\/brite\/. A. Medina A. Lakhina I. Matta and J. Byers. Brite: Universal topology generation from a user's perspective. Available at http:\/\/www.cs.bu.edu\/brite\/."},{"key":"e_1_3_2_1_21_1","unstructured":"S. Misel.Wow as7007! Available at http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340.html. S. Misel.Wow as7007! Available at http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.49"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.251910"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258478"},{"key":"e_1_3_2_1_26_1","volume-title":"Ad hoc on-demand distance vector (aodv) routing","author":"Perkins C.","year":"2003","unstructured":"C. Perkins , E. Belding-Royer , and S. Das . Ad hoc on-demand distance vector (aodv) routing , 2003 . C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector (aodv) routing, 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073821"},{"key":"e_1_3_2_1_29_1","volume-title":"Forty-Fourth Annual Allerton Conference on Communication, Control and Computing (ALLERTON)","author":"Rajendran R. K.","year":"2006","unstructured":"R. K. Rajendran , V. Misra , and D. Rubenstein . Detecting misconfigurations: The method of strong-detection . Forty-Fourth Annual Allerton Conference on Communication, Control and Computing (ALLERTON) , September 2006 . R. K. Rajendran, V. Misra, and D. Rubenstein. Detecting misconfigurations: The method of strong-detection. Forty-Fourth Annual Allerton Conference on Communication, Control and Computing (ALLERTON), September 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354576"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1996.586129"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863970"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073880"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of First Symposium on Networked System Design and Implementation (NSDI 2004)","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. Katz . Listen and whisper: Security mechanisms for bgp . In Proceedings of First Symposium on Networked System Design and Implementation (NSDI 2004) , March 2004 . L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for bgp. In Proceedings of First Symposium on Networked System Design and Implementation (NSDI 2004), March 2004."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/504136.504172"}],"event":{"name":"SIGMETRICS07: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","ACM Association for Computing Machinery"],"location":"San Diego California USA","acronym":"SIGMETRICS07"},"container-title":["Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1254882.1254921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T11:48:24Z","timestamp":1693828104000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1254882.1254921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,12]]},"references-count":35,"alternative-id":["10.1145\/1254882.1254921","10.1145\/1254882"],"URL":"https:\/\/doi.org\/10.1145\/1254882.1254921","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1269899.1254921","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,6,12]]},"assertion":[{"value":"2007-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}