{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T17:39:11Z","timestamp":1769535551985,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T00:00:00Z","timestamp":1275350400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T00:00:00Z","timestamp":1275350400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/iscc.2010.5546725","type":"proceedings-article","created":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T14:16:52Z","timestamp":1282141012000},"page":"796-801","source":"Crossref","is-referenced-by-count":0,"title":["Efficient method of station selection for passive monitoring in distributed network using information gain"],"prefix":"10.1109","author":[{"family":"Xiang Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China, 100876"}]},{"family":"Feng Qi","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China, 100876"}]},{"family":"Yi-guo Yuan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China, 100876"}]},{"family":"Xue-song Qiu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, China, 100876"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028810"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579435"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6377(03)00062-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-7152(84)90020-8"},{"key":"ref14","article-title":"Experiences with NIMI","author":"paxson","year":"2000","journal-title":"Passive and Active Measurement Workshop (PAM) 2003"},{"key":"ref15","article-title":"Framework for IP Performance Metrics","author":"paxson","year":"1998","journal-title":"IETF RFC 2330"},{"key":"ref16","article-title":"Requirements for IP Flow Information Export","author":"quittek","year":"2004","journal-title":"IETF RFC 3917"},{"key":"ref17","year":"2005","journal-title":"Submodular Functions and Optimization"},{"key":"ref18","article-title":"Inet-3.0: Internet topology generator","author":"winick","year":"2002"},{"key":"ref19","article-title":"The budgeted maximum coverage problem","author":"khuller","year":"1997","journal-title":"Information Processing Letters"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.comcom.2005.07.009","article-title":"Locating network monitors: complexity, heuristics, and coverage","author":"suh","year":"2006","journal-title":"Computer Communications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402992"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208955"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208666"},{"key":"ref8","article-title":"On the placement of monitoring devices in an IP network","author":"sharma","year":"2004","journal-title":"Sprint ATL"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948231"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832198"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.846400"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.284"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973068.59"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00225"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1095921.1095932"}],"event":{"name":"2010 IEEE Symposium on Computers and Communications (ISCC)","location":"Riccione, Italy","start":{"date-parts":[[2010,6,22]]},"end":{"date-parts":[[2010,6,25]]}},"container-title":["The IEEE symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532341\/5546495\/05546725.pdf?arnumber=5546725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T04:58:44Z","timestamp":1769489924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5546725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscc.2010.5546725","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}