{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:01Z","timestamp":1750307401716,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:00:00Z","timestamp":1277683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CRI-0551542"],"award-info":[{"award-number":["CRI-0551542"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000180","name":"U.S. Department of Homeland Security","doi-asserted-by":"publisher","award":["NBCHCC040159"],"award-info":[{"award-number":["NBCHCC040159"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,28]]},"DOI":"10.1145\/1815396.1815506","type":"proceedings-article","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T13:05:15Z","timestamp":1277816715000},"page":"473-478","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Estimating routing symmetry on single links by passive flow measurements"],"prefix":"10.1145","author":[{"given":"Wolfgang","family":"John","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Sweden"}]},{"given":"Maurizio","family":"Dusi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Brescia, Italy"}]},{"given":"K. C.","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA, UCSD San Diego"}]}],"member":"320","published-online":{"date-parts":[[2010,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064257"},{"key":"e_1_3_2_1_2_1","volume-title":"Quantifying Routing Asymmetry in the Internet at the AS Level,\" in IEEE GLOBECOM","author":"He Y.","year":"2004","unstructured":"Y. He , M. Faloutsos , and S. Krishnamurthy , \" Quantifying Routing Asymmetry in the Internet at the AS Level,\" in IEEE GLOBECOM , 2004 . Y. He, M. Faloutsos, and S. Krishnamurthy, \"Quantifying Routing Asymmetry in the Internet at the AS Level,\" in IEEE GLOBECOM, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316233"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"key":"e_1_3_2_1_5_1","volume-title":"Differences between In- and Outbound Internet Backbone Traffic,\" in TERENA Networking Conference","author":"John W.","year":"2007","unstructured":"W. John and S. Tafvelin , \" Differences between In- and Outbound Internet Backbone Traffic,\" in TERENA Networking Conference , Copenhagen, DK , 2007 . W. John and S. Tafvelin, \"Differences between In- and Outbound Internet Backbone Traffic,\" in TERENA Networking Conference, Copenhagen, DK, 2007."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.10.021"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368445"},{"key":"e_1_3_2_1_9_1","volume-title":"Antibes Juan-les-Pins","author":"McGregor A.","year":"2004","unstructured":"A. McGregor , M. Hall , P. Lorier , and J. Brunskill , \" Flow Clustering Using Machine Learning Techniques,\" in Passive and Active Measurement Conference , Antibes Juan-les-Pins , France , 2004 . A. McGregor, M. Hall, P. Lorier, and J. Brunskill, \"Flow Clustering Using Machine Learning Techniques,\" in Passive and Active Measurement Conference, Antibes Juan-les-Pins, France, 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"e_1_3_2_1_11_1","volume-title":"Honololou","author":"Crotti M.","year":"2009","unstructured":"M. Crotti , F. Gringoli , and L. Salgarelli , \" Impact of Asymmetric Routing on Statistical Traffic Classification,\" in IEEE GLOBECOM , Honololou , Hawaii, USA , 2009 . M. Crotti, F. Gringoli, and L. Salgarelli, \"Impact of Asymmetric Routing on Statistical Traffic Classification,\" in IEEE GLOBECOM, Honololou, Hawaii, USA, 2009."},{"key":"e_1_3_2_1_12_1","volume-title":"Amst.","author":"Keys K.","year":"2001","unstructured":"K. Keys , D. Moore , R. Koga , E. Lagache , M. Tesch , and k claffy, \" The Architecture of CoralReef : An Internet Traffic Monitoring Software Suite,\" in Passive and Active Measurement Workshop , Amst. , NL , 2001 . K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k claffy, \"The Architecture of CoralReef: An Internet Traffic Monitoring Software Suite,\" in Passive and Active Measurement Workshop, Amst., NL, 2001."},{"key":"e_1_3_2_1_13_1","volume-title":"Oct.","author":"Claise B.","year":"2004","unstructured":"B. Claise , \" Cisco Systems NetFlow Services Export Version 9,\" RFC 3954 (Informational) , Internet Engineering Task Force , Oct. 2004 . {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc3954.txt B. Claise, \"Cisco Systems NetFlow Services Export Version 9,\" RFC 3954 (Informational), Internet Engineering Task Force, Oct. 2004. {Online}. Available: http:\/\/www.ietf.org\/rfc\/rfc3954.txt"},{"key":"e_1_3_2_1_14_1","volume-title":"USA","author":"John W.","year":"2008","unstructured":"W. John , S. Tafvelin , and T. Olovsson , \" Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic,\" in Passive and Active Measurement Conference, Ohio , USA , 2008 . W. John, S. Tafvelin, and T. Olovsson, \"Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic,\" in Passive and Active Measurement Conference, Ohio, USA, 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298321"},{"key":"e_1_3_2_1_17_1","unstructured":"\"Real Time CoralReef Report Generator \" http:\/\/www.caida.org\/data\/realtime (accessed 2010-01-14).  \"Real Time CoralReef Report Generator \" http:\/\/www.caida.org\/data\/realtime (accessed 2010-01-14)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273448"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.003"}],"event":{"name":"IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference","sponsor":["Computer and Information Society","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCOMM ACM Special Interest Group on Data Communication","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Caen France","acronym":"IWCMC '10"},"container-title":["Proceedings of the 6th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1815396.1815506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:23Z","timestamp":1750246763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1815396.1815506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,28]]},"references-count":19,"alternative-id":["10.1145\/1815396.1815506","10.1145\/1815396"],"URL":"https:\/\/doi.org\/10.1145\/1815396.1815506","relation":{},"subject":[],"published":{"date-parts":[[2010,6,28]]},"assertion":[{"value":"2010-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}