{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T15:50:30Z","timestamp":1723650630789},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/infocom.2016.7524410","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T20:47:54Z","timestamp":1469738874000},"source":"Crossref","is-referenced-by-count":37,"title":["SCMon: Leveraging segment routing to improve network monitoring"],"prefix":"10.1109","author":[{"given":"Francois","family":"Aubry","sequence":"first","affiliation":[]},{"given":"David","family":"Lebrun","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Vissicchio","sequence":"additional","affiliation":[]},{"given":"Minh Thanh","family":"Khong","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Deville","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880182"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7417124"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787495"},{"key":"ref14","article-title":"Bidirectional forwarding detection (bfd)","author":"katz","year":"2010","journal-title":"RFC 5880"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.227"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(97)00082-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2015.06.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0095-8956(83)90056-4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921175"},{"key":"ref3","article-title":"RSVP-TE: Extensions to RSVP for LSP Tunnels","author":"awduche","year":"2001","journal-title":"RFC 3209"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916285"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218434"},{"key":"ref8","article-title":"Cisco service-level assurance protocol","author":"chiba","year":"2013","journal-title":"RFC 6812"},{"key":"ref7","article-title":"Topology Aware Blackbox Monitoring","author":"cartlidge","year":"2013","journal-title":"NANOG Presentation"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298329"},{"key":"ref9","article-title":"Introduction to Algorithms","author":"cormen","year":"2001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504765"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"ref21","author":"sedgewick","year":"2011","journal-title":"Algorithms Pearson Education"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539794267255"},{"key":"ref26","article-title":"Alarm correlation engine (ACE)","author":"wu","year":"1998","journal-title":"NOMS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673868"}],"event":{"name":"IEEE INFOCOM 2016 - IEEE Conference on Computer Communications","location":"San Francisco, CA, USA","start":{"date-parts":[[2016,4,10]]},"end":{"date-parts":[[2016,4,14]]}},"container-title":["IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7515093\/7524326\/07524410.pdf?arnumber=7524410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T23:48:34Z","timestamp":1475192914000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7524410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/infocom.2016.7524410","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}