{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:07:55Z","timestamp":1755907675592,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,18]]},"DOI":"10.1145\/3696348.3696887","type":"proceedings-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:20:52Z","timestamp":1731284452000},"page":"255-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Flow\/Path Performance Consistency"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0701-749X","authenticated-orcid":false,"given":"Mahdi","family":"Hosseini","sequence":"first","affiliation":[{"name":"EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7419-2971","authenticated-orcid":false,"given":"Georgia","family":"Fragkouli","sequence":"additional","affiliation":[{"name":"ETHZ Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1344-188X","authenticated-orcid":false,"given":"Pavlos","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9470-2819","authenticated-orcid":false,"given":"Katerina","family":"Argyraki","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159940"},{"key":"e_1_3_2_1_4_1","volume-title":"The caida anonymized internet traces dataset (october","author":"CAIDA.","year":"2010","unstructured":"CAIDA. The caida anonymized internet traces dataset (october 2010). https:\/\/www.caida.org\/catalog\/datasets\/passive_dataset\/equinix-chicago\/20101029-130000.UTC\/, 2022. Accessed: August 2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229584.3229586"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.998081"},{"key":"e_1_3_2_1_8_1","first-page":"18","volume-title":"Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007","author":"Dhamdhere A.","year":"2007","unstructured":"A. Dhamdhere, R. Teixeira, C. Dovrolis, and C. Diot. Netdiagnoser: troubleshooting network unreachabilities using end-to-end probes and routing data. In J. Kurose and H. Schulzrinne, editors, Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007, page 18. ACM, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885460"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"e_1_3_2_1_11_1","first-page":"549","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2019","author":"Geng Y.","year":"2019","unstructured":"Y. Geng, S. Liu, Z. Yin, A. Naik, B. Prabhakar, M. Rosenblum, and A. Vahdat. SIMON: A simple and scalable method for sensing, inference and measurement in data center networks. In J. R. Lorch and M. Yu, editors, 16th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2019, Boston, MA, February 26-28, 2019, pages 549--564. USENIX Association, 2019."},{"key":"e_1_3_2_1_12_1","first-page":"24","volume-title":"Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11","author":"Ghita D.","year":"2011","unstructured":"D. Ghita, C. Karakus, K. J. Argyraki, and P. Thiran. Shifting network tomography toward a practical goal. In K. Cho and M. Crovella, editors, Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011, page 24. ACM, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.41.2.400"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787496"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2992"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132749"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524530"},{"key":"e_1_3_2_1_19_1","volume-title":"Performance Evaluation of Computer and Communication Systems","author":"Le Boudec J.-Y.","year":"2010","unstructured":"J.-Y. Le Boudec. Performance Evaluation of Computer and Communication Systems. EPFL Press, Lausanne, Switzerland, 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628190"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.245"},{"key":"e_1_3_2_1_23_1","first-page":"227","volume-title":"Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007","author":"Nguyen H. X.","year":"2007","unstructured":"H. X. Nguyen and P. Thiran. Network loss inference with second order statistics of end-to-end flows. In C. Dovrolis and M. Roughan, editors, Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pages 227--240. ACM, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208667"},{"key":"e_1_3_2_1_25_1","first-page":"25","volume-title":"End-to-End Routing Behavior in the Internet. SIGCOMM '96","author":"Paxson V.","year":"1996","unstructured":"V. Paxson. End-to-End Routing Behavior in the Internet. SIGCOMM '96, page 25--38, New York, NY, USA, 1996. Association for Computing Machinery."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109171"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604815"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3168"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.68"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140293"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1962.10490022"},{"issue":"2","key":"e_1_3_2_1_32_1","first-page":"223","volume":"30","author":"Wolff R. W.","year":"1982","unstructured":"R. W. Wolff. Poisson Arrivals See Time Averages. Oper. Res., 30(2):223--231, Apr. 1982.","journal-title":"Poisson Arrivals See Time Averages. Oper. Res."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787483"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098849"}],"event":{"name":"HotNets '24: The 23rd ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Irvine CA USA","acronym":"HotNets '24"},"container-title":["Proceedings of the 23rd ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696348.3696887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:05:59Z","timestamp":1755878759000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696348.3696887"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":36,"alternative-id":["10.1145\/3696348.3696887","10.1145\/3696348"],"URL":"https:\/\/doi.org\/10.1145\/3696348.3696887","relation":{},"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}