{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:33:32Z","timestamp":1726760012704},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1016\/j.comnet.2014.04.016","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T21:30:57Z","timestamp":1400103057000},"page":"30-44","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Assessing the service quality of an Internet path through end-to-end measurement"],"prefix":"10.1016","volume":"70","author":[{"given":"Atef","family":"Abdelkefi","sequence":"first","affiliation":[]},{"given":"Yuming","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Bjarne Emil","family":"Helvik","sequence":"additional","affiliation":[]},{"given":"Gergely","family":"Bicz\u00f3k","sequence":"additional","affiliation":[]},{"given":"Alexandru","family":"Calu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2014.04.016_b0005","unstructured":"Dragonlab Project. <https:\/\/openwiki.uninett.no\/dragonlab:start>."},{"key":"10.1016\/j.comnet.2014.04.016_b0010","unstructured":"Gomez Inc. <http:\/\/www.gomez.com\/>."},{"key":"10.1016\/j.comnet.2014.04.016_b0015","unstructured":"Keynote Systems. <http:\/\/www.keynote.com\/>."},{"key":"10.1016\/j.comnet.2014.04.016_b0020","unstructured":"Rfc 1305 \u2013 Network Time Protocol (version 3) Specification, impl. <http:\/\/www.ietf.org\/rfc\/rfc5905.html>."},{"key":"10.1016\/j.comnet.2014.04.016_b0025","unstructured":"Rude\/crude. <http:\/\/rude.sourceforge.net\/>."},{"key":"10.1016\/j.comnet.2014.04.016_b0030","doi-asserted-by":"crossref","unstructured":"A. Abdelkefi, Y. Jiang, A structural analysis of network delay, in: Proc. Conference on Communication Networks and Services Research (CNSR), IEEE Computer Society, 2011.","DOI":"10.1109\/CNSR.2011.15"},{"key":"10.1016\/j.comnet.2014.04.016_b0035","doi-asserted-by":"crossref","unstructured":"A. Abdelkefi, Y. Jiang, A. Oslebo, O. Kvittem, Robust traffic anomaly detection with principal component pursuit, in: Proc. ACM CONEXT, Student Workshop, ACM, 2010.","DOI":"10.1145\/1921206.1921217"},{"issue":"5","key":"10.1016\/j.comnet.2014.04.016_b0040","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1016\/j.jnca.2011.10.010","article-title":"Unified architecture for network measurement: the case of available bandwidth","volume":"35","author":"Aceto","year":"2012","journal-title":"J. Network Comput. Appl."},{"key":"10.1016\/j.comnet.2014.04.016_b0045","doi-asserted-by":"crossref","unstructured":"P. Barford, N. Duffield, A. Ron, J. Sommers, Network performance anomaly detection and localization, in: Proc. IEEE INFOCOM, IEEE, 2009.","DOI":"10.1109\/INFCOM.2009.5062053"},{"issue":"15","key":"10.1016\/j.comnet.2014.04.016_b0050","doi-asserted-by":"crossref","first-page":"2975","DOI":"10.1016\/j.comnet.2008.06.015","article-title":"An approach to the identification of network elements composing heterogeneous end-to-end paths","volume":"52","author":"Botta","year":"2008","journal-title":"Comput. Networks"},{"key":"10.1016\/j.comnet.2014.04.016_b0055","doi-asserted-by":"crossref","DOI":"10.1137\/080738970","article-title":"A singular value thresholding algorithm for matrix completion","author":"Cai","year":"2010","journal-title":"SIAM J. Optim."},{"issue":"3","key":"10.1016\/j.comnet.2014.04.016_b0060","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/1970392.1970395","article-title":"Robust principal component analysis?","volume":"58","author":"Cand\u00e8s","year":"2011","journal-title":"J. ACM"},{"key":"10.1016\/j.comnet.2014.04.016_b0065","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10208-009-9045-5","article-title":"Exact matrix completion via convex optimization","volume":"9","author":"Cand\u00e9s","year":"2009","journal-title":"Found. Comput. Math."},{"key":"10.1016\/j.comnet.2014.04.016_b0070","unstructured":"Z. Cataltepe, P. Moghe, Characterizing nature and location of congestion on the public internet, in: Proc. IEEE Symposium Computers and Communication, (ISCC), IEEE Computer Society, 2003."},{"issue":"1","key":"10.1016\/j.comnet.2014.04.016_b0075","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1093\/imanum\/drq039","article-title":"Matrix completion via an alternating direction method","volume":"32","author":"Chen","year":"2012","journal-title":"IMA J. Numer. Anal."},{"key":"10.1016\/j.comnet.2014.04.016_b0080","doi-asserted-by":"crossref","unstructured":"D.R. Choffnes, F.E. Bustamante, Z. Ge, Crowdsourcing service-level network event monitoring, in: Proc. ACM SIGCOMM, ACM, 2010.","DOI":"10.1145\/1851182.1851228"},{"issue":"2","key":"10.1016\/j.comnet.2014.04.016_b0085","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TNET.2003.810312","article-title":"End-to-end wan service availability","volume":"11","author":"Dahlin","year":"2003","journal-title":"IEEE\/ACM Trans. Network."},{"key":"10.1016\/j.comnet.2014.04.016_b0090","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","article-title":"Compressed sensing","volume":"52","author":"Donoho","year":"2006","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"1","key":"10.1016\/j.comnet.2014.04.016_b0095","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.ijforecast.2008.09.007","article-title":"Forecasting European industrial production with singular spectrum analysis","volume":"25","author":"Hassani","year":"2009","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.comnet.2014.04.016_b0100","unstructured":"E. Katz-Bassett, H.V. Madhyastha, J.P. John, A. Krishnamurthy, T. Anderson, Studying black holes in the internet with hubble, in: Proc. USENIX NSDI, ACM, 2008."},{"key":"10.1016\/j.comnet.2014.04.016_b0105","doi-asserted-by":"crossref","unstructured":"R. Kompella, J. Yates, A. Greenberg, A. Snoeren, Detection and localization of network black holes, in: Proc. IEEE INFOCOM, IEEE, 2007.","DOI":"10.1109\/INFCOM.2007.252"},{"key":"10.1016\/j.comnet.2014.04.016_b0110","doi-asserted-by":"crossref","unstructured":"F. Li, M. Thottan, End-to-end service quality measurement using source-routed probes, in: Proc. IEEE INFOCOM, IEEE, 2006.","DOI":"10.1109\/INFOCOM.2006.284"},{"issue":"4","key":"10.1016\/j.comnet.2014.04.016_b0115","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1109\/TNET.2009.2035115","article-title":"A system-theoretic approach to bandwidth estimation","volume":"18","author":"Liebeherr","year":"2010","journal-title":"IEEE\/ACM Trans. Network."},{"key":"10.1016\/j.comnet.2014.04.016_b0120","unstructured":"Z. Lin, M. Chen, Y. Ma, The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-rank Matrices, Technical Report, 2011. 1009.5055v2."},{"key":"10.1016\/j.comnet.2014.04.016_b0125","unstructured":"H.V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, A. Venkataramani, iPlane: an information plane for distributed services, in: Proc. USENIX OSDI, ACM, 2006."},{"key":"10.1016\/j.comnet.2014.04.016_b0130","unstructured":"H.V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, A. Venkataramani, iPlane nano: path prediction for peer-to-peer applications, in: Proc. USENIX NSDI, ACM, 2009."},{"key":"10.1016\/j.comnet.2014.04.016_b0135","doi-asserted-by":"crossref","unstructured":"R. Mahajan, N. Spring, D. Wetherall, T. Anderson, User-level internet path diagnosis, in: Proc. of the Nineteenth ACM Symposium on Operating Systems Principles, ACM, 2003.","DOI":"10.1145\/945445.945456"},{"issue":"4","key":"10.1016\/j.comnet.2014.04.016_b0140","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/TNET.2007.902727","article-title":"Characterization of failures in an operational ip backbone network","volume":"16","author":"Markopoulou","year":"2008","journal-title":"IEEE\/ACM Trans. Network."},{"issue":"10","key":"10.1016\/j.comnet.2014.04.016_b0145","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1016\/j.comcom.2005.07.011","article-title":"Loss and delay measurements of internet backbones","volume":"29","author":"Markopoulou","year":"2006","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2014.04.016_b0150","author":"Moskvina","year":"2003","journal-title":"Commun. Stat.: Simul. Comput."},{"key":"10.1016\/j.comnet.2014.04.016_b0155","doi-asserted-by":"crossref","DOI":"10.1007\/s11235-011-9586-1","article-title":"An analysis of interdomain availability and causes of failures based on active measurements","author":"Myakotnykh","year":"2011","journal-title":"Telecommun. Syst."},{"issue":"4","key":"10.1016\/j.comnet.2014.04.016_b0160","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/248157.248160","article-title":"End-to-end routing behavior in the internet","volume":"26","author":"Paxson","year":"1996","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"10.1016\/j.comnet.2014.04.016_b0165","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1109\/90.779192","article-title":"End-to-end internet packet dynamics","volume":"7","author":"Paxson","year":"1999","journal-title":"IEEE\/ACM Trans. Network."},{"key":"10.1016\/j.comnet.2014.04.016_b0170","series-title":"Proc. ACM SIGMETRICS, SIGMETRICS \u201907","first-page":"109","article-title":"Sensitivity of PCA for traffic anomaly detection","author":"Ringberg","year":"2007"},{"key":"10.1016\/j.comnet.2014.04.016_b0175","doi-asserted-by":"crossref","unstructured":"F. Silveira, C. Diot, URCA: pulling out anomalies by their root causes, in: Proc. IEEE INFOCOM, IEEE, 2010.","DOI":"10.1109\/INFCOM.2010.5462151"},{"key":"10.1016\/j.comnet.2014.04.016_b0180","doi-asserted-by":"crossref","unstructured":"F. Silveira, C. Diot, N. Taft, R. Govindan, ASTUTE: detecting a different class of traffic anomalies, in: Proc. ACM SIGCOMM, ACM, 2010.","DOI":"10.1145\/1851182.1851215"},{"key":"10.1016\/j.comnet.2014.04.016_b0185","unstructured":"R.C. Teixeira, Network Troubleshooting from End Hosts, Technical Report, Universite Pierre et Marie Curie Paris6, 2010."},{"key":"10.1016\/j.comnet.2014.04.016_b0190","doi-asserted-by":"crossref","unstructured":"D. Turner, K. Levchenko, A.C. Snoeren, S. Savage, California fault lines: understanding the causes and impact of network failures, in: Proc. ACM SIGCOMM, ACM, 2010.","DOI":"10.1145\/1851182.1851220"},{"key":"10.1016\/j.comnet.2014.04.016_b0195","doi-asserted-by":"crossref","unstructured":"F. Wang, Z.M. Mao, J. Wang, L. Gao, R. Bush, A measurement study on the impact of routing events on end-to-end internet path performance, in: Proc. ACM SIGCOMM, ACM, 2006.","DOI":"10.1145\/1159913.1159956"},{"key":"10.1016\/j.comnet.2014.04.016_b0200","doi-asserted-by":"crossref","unstructured":"H. Yan, A. Flavel, Z. Ge, A. Gerber, D. Massey, C. Papadopoulos, H. Shah, J. Yates. Argus: end-to-end service anomaly detection and localization from an isp point of view, in: Proc. IEEE INFOCOM, IEEE, 2012.","DOI":"10.1109\/INFCOM.2012.6195694"},{"key":"10.1016\/j.comnet.2014.04.016_b0205","unstructured":"M. Zhang, C. Zhang, V. Pai, L. Peterson, R. Wang, PlanetSeer: Internet path failure monitoring and characterization in wide area services, in: Proc. USENIX NSDI, ACM, 2004."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128614001698?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128614001698?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T05:20:40Z","timestamp":1538630440000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128614001698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":41,"alternative-id":["S1389128614001698"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2014.04.016","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2014,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Assessing the service quality of an Internet path through end-to-end measurement","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2014.04.016","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}