{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T05:12:02Z","timestamp":1744953122519,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icnp.2019.8888046","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T23:49:43Z","timestamp":1572565783000},"page":"1-11","source":"Crossref","is-referenced-by-count":8,"title":["Robust Distributed Monitoring of Traffic Flows"],"prefix":"10.1109","author":[{"given":"Vitalii","family":"Demianiuk","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Gorinsky","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Nikolenko","sequence":"additional","affiliation":[]},{"given":"Kirill","family":"Kogan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"A comprehensive study of Convergent and Commutative Replicated Data Types","author":"shapiro","year":"2011","journal-title":"Inria &#x2013; Centre Paris-Rocquencourt INRIA Research Report RR-7506"},{"key":"ref32","article-title":"Compact Alternate Marking Methods for Passive and Hybrid Performance Monitoring","author":"mizrahi","year":"2018","journal-title":"IETF"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8321"},{"key":"ref30","article-title":"vCRIB: Virtualized Rule Management in the Cloud","author":"moshref","year":"2012","journal-title":"HotCloud"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2270439"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.249"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.14778\/3137628.3137652","article-title":"Pyramid Sketch: A Sketch Framework for Frequency Estimation of Data Streams","volume":"10","author":"tong","year":"2017","journal-title":"Proc VLDB Endow"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836086"},{"journal-title":"Yet another packet simulator (YAPS)","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01325-7_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566832"},{"key":"ref27","first-page":"311","article-title":"FlowRadar: A Better NetFlow for Data Centers","author":"li","year":"2016","journal-title":"NSDI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.06.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851224"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185477"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.872573"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HOTI.2014.17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254903"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195564"},{"journal-title":"Robust Distributed Monitoring of Traffic Flows","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/40.988692"},{"key":"ref21","first-page":"107","article-title":"Analysis of a Statistics Counter Architecture","author":"shah","year":"2001","journal-title":"HotI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375472"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140314"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2621159"}],"event":{"name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2019,10,8]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2019,10,10]]}},"container-title":["2019 IEEE 27th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8884214\/8888028\/08888046.pdf?arnumber=8888046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:22:26Z","timestamp":1658262146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icnp.2019.8888046","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}