{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:05:33Z","timestamp":1743059133650,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642203046"},{"type":"electronic","value":"9783642203053"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20305-3_1","type":"book-chapter","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T02:55:14Z","timestamp":1301972114000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["On Profiling Residential Customers"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Pietrzyk","sequence":"first","affiliation":[]},{"given":"Louis","family":"Plissonneau","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Urvoy-Keller","sequence":"additional","affiliation":[]},{"given":"Taoufik","family":"En-Najjary","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Antoniades, D., Markatos, E.P., Dovrolis, C.: One-click hosting services: a file-sharing hideout. In: IMC (2009)","DOI":"10.1145\/1644893.1644920"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: CoNEXT (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Breslau, L., Cao, P., Fan, L., Phillips, G., Shenker, S.: Web caching and Zipf-like distributions: evidence and implications. In: INFOCOM (1999)","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"1_CR4","first-page":"18","volume":"4","author":"K. Cho","year":"2009","unstructured":"Cho, K.: Broadband Traffic Report. Internet Infrastructure Review\u00a04, 18\u201323 (2009)","journal-title":"Internet Infrastructure Review"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Cho, K., Fukuda, K., Esaki, H., Kato, A.: The impact and implications of the growth in residential user-to-user traffic. In: SIGCOMM (2006)","DOI":"10.1145\/1159913.1159938"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Erman, J., Gerber, A., Hajiaghayi, M.T., Pei, D., Spatscheck, O.: Network-aware forward caching. In: WWW (2009)","DOI":"10.1145\/1526709.1526749"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/90.929850","volume":"9","author":"A. Feldmann","year":"2001","unstructured":"Feldmann, A., Greenberg, A., Lund, C., Reingold, N., Rexford, J., True, F.: Deriving traffic demands for operational IP networks: methodology and experience. IEEE\/ACM Trans. Netw.\u00a09(3), 265\u2013280 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Fessant, F., Lemaire, V., Clrot, F.: Combining Several SOM Approaches in Data Mining: Application to ADSL Customer Behaviours Analysis. In: Data Analysis, Machine Learning and Applications (2008)","DOI":"10.1007\/978-3-540-78246-9_41"},{"key":"1_CR9","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2006","unstructured":"Han, J.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2006)","edition":"2"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-71617-4_19","volume-title":"Passive and Active Network Measurement","author":"T. Karagiannis","year":"2007","unstructured":"Karagiannis, T., Papagiannaki, K., Taft, N., Faloutsos, M.: Profiling the end host. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 186\u2013196. Springer, Heidelberg (2007)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Maier, G., Feldmann, A., Paxson, V., Allman, M.: On dominant characteristics of residential broadband internet traffic. In: IMC (2009)","DOI":"10.1145\/1644893.1644904"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Pietrzyk, M., Costeux, J.-L., Urvoy-Keller, G., En-Najjary, T.: Challenging statistical classification for operational usage: the ADSL case. In: IMC (2009)","DOI":"10.1145\/1644893.1644908"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Pietrzyk, M., Urvoy-Keller, G., Costeux, J.-L.: Revealing the unknown ADSL traffic using statistical methods. In: COST (2009)","DOI":"10.1007\/978-3-642-01645-5_9"},{"key":"1_CR14","unstructured":"Plissonneau, L., En-Najjary, T., Urvoy-Keller, G.: Revisiting web traffic from a DSL provider perspective: the case of YouTube. In: ITC Specialist Seminar on Network Usage and Traffic (2008)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-71617-4_15","volume-title":"Passive and Active Network Measurement","author":"M. Siekkinen","year":"2007","unstructured":"Siekkinen, M., Collange, D., Urvoy-Keller, G., Biersack, E.W.: Performance Limitations of ADSL Users: A Case Study. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol.\u00a04427, pp. 145\u2013154. Springer, Heidelberg (2007)"},{"key":"1_CR16","unstructured":"Tanimoto, T.: An elementary mathematical theory of classification and prediction. In: IBM Program IBCLF (1959)"},{"key":"1_CR17","unstructured":"Vu-Brugier, G.: Analysis of the impact of early fiber access deployment on residential Internet traffic. In: ITC 21 (2009)"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20305-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:39:23Z","timestamp":1558535963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20305-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203046","9783642203053"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20305-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}