{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:33Z","timestamp":1772163993553,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,2]],"date-time":"2008-06-02T00:00:00Z","timestamp":1212364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,2]]},"DOI":"10.1145\/1375457.1375471","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T10:13:22Z","timestamp":1213092802000},"page":"109-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Confident estimation for multistage measurement sampling and aggregation"],"prefix":"10.1145","author":[{"given":"Edith","family":"Cohen","sequence":"first","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]},{"given":"Nick","family":"Duffield","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]},{"given":"Carsten","family":"Lund","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]},{"given":"Mikkel","family":"Thorup","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065209"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177101"},{"key":"e_1_3_2_1_3_1","unstructured":"Cisco. White paper - netflow services and applications. http:\/\/www.cisco.com\/warp\/public\/cc\/pd\/iosw\/ioft\/neflct\/tech\/napps_wp.htm.  Cisco. White paper - netflow services and applications. http:\/\/www.cisco.com\/warp\/public\/cc\/pd\/iosw\/ioft\/neflct\/tech\/napps_wp.htm."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/167954.166256"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265566"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368446"},{"key":"e_1_3_2_1_7_1","volume-title":"June","author":"Duffield N.","year":"2007","unstructured":"N. Duffield . (Ed.) A Framework for Packet Selection and Reporting. Internet Draft , June 2007 . Work in Progress . N. Duffield. (Ed.) A Framework for Packet Selection and Reporting. Internet Draft, June 2007. Work in Progress."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354570"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948228"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505232"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005699"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.852874"},{"key":"e_1_3_2_1_13_1","first-page":"2005","volume-title":"Proc. 5th ACM SIGCOMM Internet Measurement Workshop (IMC)","author":"Duffield N.","unstructured":"N. Duffield , C. Lund , and M. Thorup . Optimal combination of sampled network measurements . In Proc. 5th ACM SIGCOMM Internet Measurement Workshop (IMC) , page to appear, 2005 . N. Duffield, C. Lund, and M. Thorup. Optimal combination of sampled network measurements. In Proc. 5th ACM SIGCOMM Internet Measurement Workshop (IMC), page to appear, 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929851"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276334"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066159"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064223"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251095"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177102"},{"key":"e_1_3_2_1_25_1","volume-title":"Inmon corporation's sflow: A method for monitoring traffic in switched and routed networks. RFC","author":"Phaal P.","year":"2001","unstructured":"P. Phaal , S. Panchen , and N. McKee . Inmon corporation's sflow: A method for monitoring traffic in switched and routed networks. RFC 3176, September 2001 . url:http:\/\/www.ietf.org\/rfc\/rfc3176.txt. P. Phaal, S. Panchen, and N. McKee. Inmon corporation's sflow: A method for monitoring traffic in switched and routed networks. RFC 3176, September 2001. url:http:\/\/www.ietf.org\/rfc\/rfc3176.txt."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of Passive and Active Measurement Workshop (PAM 2002","author":"Reeves J.","year":"2002","unstructured":"J. Reeves and S. Panchen . Traffic monitoring with packet-based sampling for defense against security threats . In Proceedings of Passive and Active Measurement Workshop (PAM 2002 ), Fort Collins, CO, USA , March 25-26 2002 . J. Reeves and S. Panchen. Traffic monitoring with packet-based sampling for defense against security threats. In Proceedings of Passive and Active Measurement Workshop (PAM 2002), Fort Collins, CO, USA, March 25-26 2002."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132516.1132539"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140307"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1631828.1631831"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of Passive and Active Measurement Workshop (PAM 2002","author":"Zseby T.","year":"2002","unstructured":"T. Zseby . Deployment of sampling methods for sla validation with non-intrusive measurements . In Proceedings of Passive and Active Measurement Workshop (PAM 2002 ), Fort Collins, CO, USA , March 25-26 2002 . T. Zseby. Deployment of sampling methods for sla validation with non-intrusive measurements. In Proceedings of Passive and Active Measurement Workshop (PAM 2002), Fort Collins, CO, USA, March 25-26 2002."}],"event":{"name":"SIGMETRICS08: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","location":"Annapolis MD USA","acronym":"SIGMETRICS08","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375457.1375471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1375457.1375471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:57:56Z","timestamp":1750240676000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375457.1375471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,2]]},"references-count":28,"alternative-id":["10.1145\/1375457.1375471","10.1145\/1375457"],"URL":"https:\/\/doi.org\/10.1145\/1375457.1375471","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1384529.1375471","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,6,2]]},"assertion":[{"value":"2008-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}