{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:49:12Z","timestamp":1778258952853,"version":"3.51.4"},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T00:00:00Z","timestamp":1550620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2019,2,20]]},"abstract":"<jats:p>Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.<\/jats:p>","DOI":"10.1145\/3314212.3314217","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T17:01:44Z","timestamp":1550854904000},"page":"24-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["The Dagstuhl beginners guide to reproducibility for experimental networking research"],"prefix":"10.1145","volume":"49","author":[{"given":"Vaibhav","family":"Bajpai","sequence":"first","affiliation":[{"name":"TU Munich"}]},{"given":"Anna","family":"Brunstrom","sequence":"additional","affiliation":[{"name":"Karlstad University"}]},{"given":"Anja","family":"Feldmann","sequence":"additional","affiliation":[{"name":"MPI for Informatics"}]},{"given":"Wolfgang","family":"Kellerer","sequence":"additional","affiliation":[{"name":"TU Munich"}]},{"given":"Aiko","family":"Pras","sequence":"additional","affiliation":[{"name":"University of Twente"}]},{"given":"Henning","family":"Schulzrinne","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University"}]}],"member":"320","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Artifact Review and Badging. https:\/\/www.acm.org\/publications\/policies\/artifact-review-badging. (2018). Reviewed","author":"ACM.","year":"2018","unstructured":"ACM. 2018. Artifact Review and Badging. https:\/\/www.acm.org\/publications\/policies\/artifact-review-badging. (2018). Reviewed April 2018 ; accessed November 11, 2018. ACM. 2018. Artifact Review and Badging. https:\/\/www.acm.org\/publications\/policies\/artifact-review-badging. (2018). Reviewed April 2018; accessed November 11, 2018."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500110"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298327"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_2_1_6_1","volume-title":"Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar # 18412). Dagstuhl Reports","author":"Bajpai Vaibhav","year":"2019","unstructured":"Vaibhav Bajpai , Olivier Bonaventure , Kimberly Claffy , and Daniel Karrenberg . 2019. Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar # 18412). Dagstuhl Reports ( 2019 ). Vaibhav Bajpai, Olivier Bonaventure, Kimberly Claffy, and Daniel Karrenberg. 2019. Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar # 18412). Dagstuhl Reports (2019)."},{"key":"e_1_2_1_7_1","volume-title":"Reproducibility '17: Proceedings of the Reproducibility Workshop. ACM.","author":"Bonaventure Olivier","year":"2017","unstructured":"Olivier Bonaventure , Luigi Iannone , and Damien Saucez ( Eds .). 2017 . Reproducibility '17: Proceedings of the Reproducibility Workshop. ACM. Olivier Bonaventure, Luigi Iannone, and Damien Saucez (Eds.). 2017. Reproducibility '17: Proceedings of the Reproducibility Workshop. ACM."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/944773"},{"key":"e_1_2_1_9_1","unstructured":"Center for Open Science. 2018. Open Science Framework: A scholarly commons to connect the entire research cycle. https:\/\/osf.io\/. (2018).  Center for Open Science. 2018. Open Science Framework: A scholarly commons to connect the entire research cycle. https:\/\/osf.io\/. (2018)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899401"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_2_1_12_1","volume-title":"Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. RFC RFC 7011","author":"Claise Benoit","unstructured":"Benoit Claise , Brian Trammell , and Paul Aitken . 2013. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. RFC RFC 7011 . RFC Editor, Fremont, CA , USA. Benoit Claise, Brian Trammell, and Paul Aitken. 2013. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information. RFC RFC 7011. RFC Editor, Fremont, CA, USA."},{"key":"e_1_2_1_13_1","volume-title":"https:\/\/creativecommons.org\/. (2018). accessed","author":"Creative Commons Corporation","year":"2018","unstructured":"Creative Commons Corporation . 2018. Creative Commons . https:\/\/creativecommons.org\/. (2018). accessed December 31, 2018 . Creative Commons Corporation. 2018. Creative Commons. https:\/\/creativecommons.org\/. (2018). accessed December 31, 2018."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211864"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"e_1_2_1_17_1","unstructured":"Gernot Heiser. 2018. Systems Benchmarking Crimes. https:\/\/www.cse.unsw.edu.au\/~gernot\/benchmarking-crimes.html. (2018).  Gernot Heiser. 2018. Systems Benchmarking Crimes. https:\/\/www.cse.unsw.edu.au\/~gernot\/benchmarking-crimes.html. (2018)."},{"key":"e_1_2_1_18_1","unstructured":"Open Source Initiative. 2018. Licenses and Standards. https:\/\/opensource.org\/licenses. (2018).  Open Source Initiative. 2018. Licenses and Standards. https:\/\/opensource.org\/licenses. (2018)."},{"key":"e_1_2_1_19_1","volume-title":"Open Access Repository. https:\/\/zenodo.org. (2018). accessed","author":"Zenodo AIRE","year":"2018","unstructured":"Open AIRE and CERN. 2018. Zenodo , Open Access Repository. https:\/\/zenodo.org. (2018). accessed November 11, 2018 . OpenAIRE and CERN. 2018. Zenodo, Open Access Repository. https:\/\/zenodo.org. (2018). accessed November 11, 2018."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211852.3211856"},{"key":"e_1_2_1_21_1","volume-title":"Transforming science through open data and software. https:\/\/ropensci.org\/. (2018). accessed","year":"2018","unstructured":"rOpenSci. 2018. Transforming science through open data and software. https:\/\/ropensci.org\/. (2018). accessed November 11, 2018 . rOpenSci. 2018. Transforming science through open data and software. https:\/\/ropensci.org\/. (2018). accessed November 11, 2018."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2418435"},{"key":"e_1_2_1_24_1","volume-title":"Benchmarking Crimes: An Emerging Threat in Systems Security.","author":"van der Kouwe Erik","year":"2018","unstructured":"Erik van der Kouwe , Dennis Andriesse , Herbert Bos , Cristiano Giuffrida , and Gernot Heiser . 2018 . Benchmarking Crimes: An Emerging Threat in Systems Security. (2018). http:\/\/arxiv.org\/abs\/1801.02381 Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, and Gernot Heiser. 2018. Benchmarking Crimes: An Emerging Threat in Systems Security. (2018). http:\/\/arxiv.org\/abs\/1801.02381"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278551"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3089262.3089266"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314212.3314217","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314212.3314217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314212.3314217"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,20]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,2,20]]}},"alternative-id":["10.1145\/3314212.3314217"],"URL":"https:\/\/doi.org\/10.1145\/3314212.3314217","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2,20]]},"assertion":[{"value":"2019-02-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}