{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:53:36Z","timestamp":1725530016149},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642009716"},{"type":"electronic","value":"9783642009723"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00972-3_2","type":"book-chapter","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T21:33:26Z","timestamp":1239053606000},"page":"13-27","source":"Crossref","is-referenced-by-count":6,"title":["Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking"],"prefix":"10.1007","author":[{"given":"I.","family":"Dedinski","sequence":"first","affiliation":[]},{"given":"H.","family":"De Meer","sequence":"additional","affiliation":[]},{"given":"L.","family":"Han","sequence":"additional","affiliation":[]},{"given":"L.","family":"Mathy","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Pezaros","sequence":"additional","affiliation":[]},{"given":"J. S.","family":"Sventek","sequence":"additional","affiliation":[]},{"given":"X. Y.","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-31963-4_16","volume-title":"Wireless Systems and Mobility in Next Generation Internet","author":"F.U. Andersen","year":"2005","unstructured":"Andersen, F.U., De Meer, H., Dedinski, I., Kappler, C., M\u00e4der, A., Oberender, J., Tutschku, K.: Enabling Mobile P2P Networking. In: Kotsis, G., Spaniol, O. (eds.) Euro-NGI 2004. LNCS, vol.\u00a03427, pp. 219\u2013234. Springer, Heidelberg (2005)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Azzouna, N.B., Guillemin, F.: Analysis of ADSL traffic on an IP Backbone link. In: Proceedings of IEEE Globecom 2003, San Francisco, USA, December 1-5 (2003)","DOI":"10.1109\/GLOCOM.2003.1258932"},{"key":"2_CR3","volume-title":"Multiresolution signal decomposition \u2013Transforms, Subbands, and Wavelets","author":"A.N. Akansu","year":"2001","unstructured":"Akansu, A.N., Haddad, R.A.: Multiresolution signal decomposition \u2013Transforms, Subbands, and Wavelets. Academic Press, London (2001)"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/18.650984","volume":"44","author":"P. Abry","year":"1998","unstructured":"Abry, P., Veitch, D.: Wavelet Analysis of Long Range Dependent Traffic. IEEE Transactions on Information Theory\u00a044(1), 2\u201315 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Brownlee, N.: Traffic Flow Measurement: Experiences with NeTraMet, IETF, Network Working Group, RFC2123 (March 1997)","DOI":"10.17487\/rfc2123"},{"issue":"8","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1109\/49.464717","volume":"13","author":"K.C. Claffy","year":"1995","unstructured":"Claffy, K.C., Braun, H.-W., Polyzos, G.C.: A Parameterizable Methodology for Internet Traffic Flow Profiling. IEEE Journal On Sketched Areas In Communications\u00a013(8), 1481\u20131494 (1995)","journal-title":"IEEE Journal On Sketched Areas In Communications"},{"key":"2_CR7","volume-title":"An introduction to the wavelets","author":"C.K. Chui","year":"1992","unstructured":"Chui, C.K.: An introduction to the wavelets. Academic Press, London (1992)"},{"key":"2_CR8","unstructured":"Claffy, K.C.: Internet Traffic Characterization. PhD thesis, University of California, San Diego, CA (1994)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Claffy, K., Polyzos, G., Braun, H.-W.: Application of Sampling Methodologies to Network Traffic Characterisation. In: ACM SIGCOMM 1993, San Francisco, California, USA, September 13-14 (1993)","DOI":"10.1145\/166237.166256"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Daubechies, I. (ed.): Ten Lectures on Wavelets. S.I.A.M (1992)","DOI":"10.1137\/1.9781611970104"},{"volume-title":"Wavelets: Theory and Applications","year":"1996","key":"2_CR11","unstructured":"Erlebacher, G., Hussaini, M.Y., Jameson, L.M. (eds.): Wavelets: Theory and Applications. Oxford University Press, Oxford (1996)"},{"key":"2_CR12","unstructured":"http:\/\/www.endace.com"},{"issue":"7","key":"2_CR13","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/S0169-7552(98)00293-1","volume":"31","author":"M. Fry","year":"1999","unstructured":"Fry, M., Ghosh, A.: Application Level Active Networking. Computer Networks\u00a031(7), 655\u2013667 (1999)","journal-title":"Computer Networks"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: Proceedings of the nineteenth ACM symposium on Operating systems principles, Boston, October 19-22 (2003)","DOI":"10.1145\/945445.945475"},{"key":"2_CR15","unstructured":"Gnutella, http:\/\/www.gnutella.com\/"},{"key":"2_CR16","volume-title":"The Internet as a Large-Scale Complex System","author":"M. Grossglauser","year":"2002","unstructured":"Grossglauser, M., Rexford, J.: Passive Traffic Measurement for IP Operations. In: Park, K., Willinger, W. (eds.) The Internet as a Large-Scale Complex System. Oxford University Press, Oxford (2002)"},{"key":"2_CR17","unstructured":"KaZaa, http:\/\/www.kazaa.com\/"},{"key":"2_CR18","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M.: File-sharing in the Internet: A characterization of P2P traffic in the backbone. Technical report (November 2003)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Brownlee, N., Claffy, K.C., Faloutsos, M.: Is P2P dying or just hiding? In: IEEE Global Internet and Next Generation Networks (Globecom 2004), Dallas, Texas, USA, 29 November - 3 December, 2004,","DOI":"10.1109\/GLOCOM.2004.1378239"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Broido, A., Faloutsos, M., Claffy, K.: Transport layer identification of P2P traffic. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement 2004 (2004)","DOI":"10.1145\/1028788.1028804"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, D., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: ACM SIGCOMM 2005, Philadelphia, PA, USA (August 2005)","DOI":"10.1145\/1080091.1080119"},{"key":"2_CR22","unstructured":"Leibowitz, N., Bergman, A., Ben-Shaul, R., Shavit, A.: Are File Swapping Networks Cacheable? Characterizing P2P Traffic. In: 7th International Workshop on Web Content Caching and Distribution (WCW 2003), Boulder, CO (2002)"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-30183-7_21","volume-title":"Peer-to-Peer Systems III","author":"F. Fessant Le","year":"2005","unstructured":"Le Fessant, F., Handurukande, S., Kermarrec, A.-M., Massoulie, L.: Clustering in peer-to-peer file sharing workloads. In: Voelker, G.M., Shenker, S. (eds.) IPTPS 2004. LNCS, vol.\u00a03279, pp. 217\u2013226. Springer, Heidelberg (2005)"},{"key":"2_CR24","volume-title":"A Wavelet Tour of Signal Processing","author":"S. Mallat","year":"2001","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press, San Diego (2001)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"de Meer, H., Tutschku, K., Tran-Gia, P.: Dynamic Operation in Peer-to-Peer Overlay Networks. Praxis der Informationsverarbeitung und Kommunikation -Special Issue on Peer-to-Peer Systems (PIK Journal) (June 2003)","DOI":"10.1515\/PIKO.2003.65"},{"key":"2_CR26","unstructured":"Cisco IOS Netflow, on-line resource, http:\/\/www.cisco.com\/warp\/public\/732\/Tech\/nmp\/netflow\/index.shtml"},{"key":"2_CR27","unstructured":"http:\/\/www.nlanr.net\/NA\/Learn\/packetsizes.html"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Oram, A. (ed.): Peer-to-Peer: Harnessing the Benefits of a Disruptive Technology. O\u2019 Reilly (2001)","DOI":"10.1145\/375348.377427"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Schmid, S., Finney, J., Scott, A.C., Shepherd, W.D.: Component-based Active Network Architecture. In: IEEE Symposium on Computers and Communications (July 2001)","DOI":"10.1109\/ISCC.2001.935363"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Sen, S., Spatscheck, O., Wang, D.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: Proceedings of the 13th international conference on World Wide Web (2004)","DOI":"10.1145\/988672.988742"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Sen, S., Wong, J.: Analyzing peer-to-peer traffic across large networks. In: Second Annual ACM Internet Measurement Workshop (2002)","DOI":"10.1145\/637201.637222"},{"key":"2_CR32","volume-title":"Proceedings of the Fourth International Conference on Peer-to-Peer Computing","author":"B. Tagami","year":"2004","unstructured":"Tagami, B., Hasegawa, T., Hasegawa, T.: Analysis and Application of Passive Peer Influence on Peer-to-Peer Inter-Domain Traffic. In: Proceedings of the Fourth International Conference on Peer-to-Peer Computing. IEEE, Los Alamitos (2004)"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-540-24668-8_2","volume-title":"Passive and Active Network Measurement","author":"K. Tutschku","year":"2004","unstructured":"Tutschku, K.: A measurement-based traffic profile of the eDonkey filesharing service. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 12\u201321. Springer, Heidelberg (2004)"},{"issue":"2-3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0167-739X(97)00018-6","volume":"13","author":"M. Zait","year":"1997","unstructured":"Zait, M., Messatfa, H.: Comparative study of clustering methods. Future Gener. Comput. Syst.\u00a013(2-3), 149\u2013159 (1997)","journal-title":"Future Gener. Comput. Syst."},{"key":"2_CR35","unstructured":"Zseby, T.: Sampling Techniques for Non-Intrusive QoS Measurements: Challenges and Strategies. In: Computer Communications Special Issue on Monitoring and Measurement (to appear, 2005)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Campbell, A.T., de Meer, H., Kounavis, M.E., Miki, K., Vicente, J.B., Villela, D.: A Survey of Programmable Networks. ACM SIGCOMM Comput. Commun.\u00a029(2) (April 1999)","DOI":"10.1145\/505733.505735"}],"container-title":["Lecture Notes in Computer Science","Active and Programmable Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00972-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T06:09:47Z","timestamp":1558246187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00972-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009716","9783642009723"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00972-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}