{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:01Z","timestamp":1750307401387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:00:00Z","timestamp":1277683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["INFSO-ICT-223936"],"award-info":[{"award-number":["INFSO-ICT-223936"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,28]]},"DOI":"10.1145\/1815396.1815505","type":"proceedings-article","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T13:05:15Z","timestamp":1277816715000},"page":"468-472","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Emulation platform for network wide traffic sampling and monitoring"],"prefix":"10.1145","author":[{"given":"Amir","family":"Krifa","sequence":"first","affiliation":[{"name":"INRIA Sophia Antipolis - EPI Plan\u00e8te - France"}]},{"given":"Imed","family":"Lassoued","sequence":"additional","affiliation":[{"name":"INRIA Sophia Antipolis - EPI Plan\u00e8te - France"}]},{"given":"Chadi","family":"Barakat","sequence":"additional","affiliation":[{"name":"INRIA Sophia Antipolis - EPI Plan\u00e8te - France"}]}],"member":"320","published-online":{"date-parts":[[2010,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"e_1_3_2_1_2_1","volume-title":"A Flow-Level Anomaly Modeling Engine;\" in proceedings of CSET","author":"Brauckhoff D.","year":"2008","unstructured":"D. Brauckhoff , A. Wagner , M. May , \"FLAME : A Flow-Level Anomaly Modeling Engine;\" in proceedings of CSET , 2008 . D. Brauckhoff, A. Wagner, M. May, \"FLAME: A Flow-Level Anomaly Modeling Engine;\" in proceedings of CSET, 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"Introduction to Algorithms,\" MIT Press and McGraw-Hill","author":"Cormen T. H.","year":"2001","unstructured":"T. H. Cormen , C. E. Leiserson , R. L. Rivest and C. Stein , \" Introduction to Algorithms,\" MIT Press and McGraw-Hill , 2001 . T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, \"Introduction to Algorithms,\" MIT Press and McGraw-Hill, 2001."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Duffield Nick and Lund Carsten and Thorup Mikkel \"Optimal combination of sampled network measurements \" Proceedings of IMC Berkeley CA 2005.   Duffield Nick and Lund Carsten and Thorup Mikkel \"Optimal combination of sampled network measurements \" Proceedings of IMC Berkeley CA 2005.","DOI":"10.1145\/1330107.1330118"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316235"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863456"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_8_1","unstructured":"MAWI Working Group Traffic Archive http:\/\/tracer.csl.sony.co.jp\/mawi\/.  MAWI Working Group Traffic Archive http:\/\/tracer.csl.sony.co.jp\/mawi\/."},{"key":"e_1_3_2_1_9_1","unstructured":"The Network Simulator (NS-3) http:\/\/www.nsnam.org\/.  The Network Simulator (NS-3) http:\/\/www.nsnam.org\/."},{"key":"e_1_3_2_1_10_1","unstructured":"PlanetLab http:\/\/www.planet-lab.org\/.  PlanetLab http:\/\/www.planet-lab.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"},{"key":"e_1_3_2_1_12_1","volume-title":"cSamp: A System for Network-Wide Flow Monitoring,\" in proceedings of the 5th USENIX NSDI","author":"Sekar V.","year":"2008","unstructured":"V. Sekar , M. Reiter , W. Willinger , H. Zhang , R. Kompella , and D. Andersen , \" cSamp: A System for Network-Wide Flow Monitoring,\" in proceedings of the 5th USENIX NSDI , San Francisco , 2008 . V. Sekar, M. Reiter, W. Willinger, H. Zhang, R. Kompella, and D. Andersen, \"cSamp: A System for Network-Wide Flow Monitoring,\" in proceedings of the 5th USENIX NSDI, San Francisco, 2008."},{"key":"e_1_3_2_1_13_1","unstructured":"Softflowd and Flowd http:\/\/www.mindrot.org\/projects\/flowd\/.  Softflowd and Flowd http:\/\/www.mindrot.org\/projects\/flowd\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Mar","author":"Suh K.","year":"2005","unstructured":"K. Suh , Y. Guo , J. Kurose , and D. Towsley , \" Locating network monitors: Complexity, heuristics and coverage,\" in proceedings of IEEE INFOCOM , Mar 2005 . K. Suh, Y. Guo, J. Kurose, and D. Towsley, \"Locating network monitors: Complexity, heuristics and coverage,\" in proceedings of IEEE INFOCOM, Mar 2005."},{"key":"e_1_3_2_1_15_1","unstructured":"TcpDump\/LibPcap http:\/\/www.tcpdump.org\/.  TcpDump\/LibPcap http:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Tcpdpriv http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html\/.  Tcpdpriv http:\/\/ita.ee.lbl.gov\/html\/contrib\/tcpdpriv.html\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"e_1_3_2_1_18_1","unstructured":"XML description of the GEANT topology http:\/\/planete.inria.fr\/NWTSM.  XML description of the GEANT topology http:\/\/planete.inria.fr\/NWTSM."}],"event":{"name":"IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference","sponsor":["Computer and Information Society","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Caen France","acronym":"IWCMC '10"},"container-title":["Proceedings of the 6th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815396.1815505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:23Z","timestamp":1750246763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,28]]},"references-count":18,"alternative-id":["10.1145\/1815396.1815505","10.1145\/1815396"],"URL":"https:\/\/doi.org\/10.1145\/1815396.1815505","relation":{},"subject":[],"published":{"date-parts":[[2010,6,28]]},"assertion":[{"value":"2010-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}