Skip to main navigation
Skip to search
Skip to main content
Princeton University Home
Help & FAQ
Home
Profiles
Research units
Facilities
Projects
Research output
Press/Media
Search by expertise, name or affiliation
A general approach to network configuration verification
Ryan Beckett
,
Aarti Gupta
, Ratul Mahajan
,
David Walker
Computer Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
235
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'A general approach to network configuration verification'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Minesweeper
100%
Network Configuration
100%
Configuration Checking
100%
Stable State
75%
Router
50%
Fault Tolerance
25%
Functional Equivalence
25%
Four Properties
25%
Network State
25%
Routing Protocol
25%
Logical Formula
25%
Path Length
25%
Configuration Files
25%
Load Balancing
25%
Model Slicing
25%
Real-time Networks
25%
Security Vulnerabilities
25%
Synthetic Benchmarks
25%
Cloud Service Provider
25%
Reachability
25%
Static Route
25%
Large-scale Networks
25%
Computer Science
Network Configuration
100%
Routing Protocol
50%
Security Vulnerability
50%
fault-tolerance
50%
Black Holes
50%
Open Shortest Path First
50%
Configuration File
50%
cloud provider
50%
Load Balancing
50%