{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:48:22Z","timestamp":1742381302372},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228742"},{"type":"electronic","value":"9783642228759"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22875-9_36","type":"book-chapter","created":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T03:29:18Z","timestamp":1312428558000},"page":"395-404","source":"Crossref","is-referenced-by-count":13,"title":["Internet Traffic Source Based on Hidden Markov Model"],"prefix":"10.1007","author":[{"given":"Joanna","family":"Doma\u0144ska","sequence":"first","affiliation":[]},{"given":"Adam","family":"Doma\u0144ski","sequence":"additional","affiliation":[]},{"given":"Tadeusz","family":"Czach\u00f3rski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"36_CR1","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/49.700908","volume":"16","author":"A.T. Andersen","year":"1998","unstructured":"Andersen, A.T., Nielsen, B.F.: A Markovian approach for modeling packet traffic with long-range dependence. IEEE Journal on Selected Areas in Communications\u00a016(5), 719\u2013732 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"36_CR2","unstructured":"Willinger, W., Leland, W.E., Taqqu, M.S.: On the self-similar nature of ethernet traffic. IEEE\/ACM Transactions on Networking (1994)"},{"issue":"2","key":"36_CR3","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0166-5316(03)00067-1","volume":"54","author":"A. Klemm","year":"2003","unstructured":"Klemm, A., Lindemann, C., Lohmann, M.: Modeling IP traffic using the batch Markovian arrival process. Performance Evaluation\u00a054(2), 149\u2013173 (2003)","journal-title":"Performance Evaluation"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Veitch, D., Abry, P., Flandrin, P., Chainais, P.: Infinitely Divisible Cascade Analysis of Network Traffic Data. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000), Istanbul, Turkey, vol.\u00a01 (June 2000)","DOI":"10.1109\/ICASSP.2000.861931"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Erramilli, A.: Chaotic maps as models of packet traffic. ITC 14 (June 1994)","DOI":"10.1016\/B978-0-444-82031-0.50040-8"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Baiocchi, A., Melazzi, N.B., Listanti, M., Roveri, A., Winkler, R.: Loss Performance Analysis of an ATM Multiplexer Loaded with High-Speed ON-OFF Sources. IEEE-JSAC\u00a09(3) (April 1991)","DOI":"10.1109\/49.76637"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"De Vendictis, A., Baiocchi, A.: Wavelet Based Synthetic Generation of Internet Packet Delays. In: Proceedings of International Teletraffic Conference ITC17, Salvador, Brasil (December 2001)","DOI":"10.1016\/S1388-3437(01)80109-8"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Paxson, V., Floyd, S.: Wide Area Traffic: A Failure of Poisson Modeling. IEEE\/ACM Transactions on Networking (June 1995)","DOI":"10.1109\/90.392383"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Crovella, M., Bestavros, A.: Self-similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE\/ACM Transactions on Networking (December 1997)","DOI":"10.1109\/90.650143"},{"issue":"3","key":"36_CR10","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/90.266056","volume":"1","author":"S.Q. Li","year":"1993","unstructured":"Li, S.Q., Hwang, C.L.: Queue response to input correlation functions: continuous spectral analysis. IEEE\/\/ACM Trans. Networking\u00a01(3), 678\u2013692 (1993)","journal-title":"IEEE\/\/ACM Trans. Networking"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Garret, M., Willinger, W.: Analysis, modeling and generation of self-similar VBR video traffic. In: ACM SIGCOMM, London (September 1994)","DOI":"10.1145\/190314.190339"},{"key":"36_CR12","volume-title":"Queueing Systems","author":"L. Kleinrock","year":"1976","unstructured":"Kleinrock, L.: Queueing Systems, vol.\u00a0II. Wiley, New York (1976)"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Mandelbrot, B., Ness, J.V.: Fractional Brownian Motions, Fractional Noises and Applications. SIAM Review\u00a010 (October 1968)","DOI":"10.1137\/1010093"},{"key":"36_CR14","volume-title":"Statistics for Long-Memory Processes","author":"J. Beran","year":"1994","unstructured":"Beran, J.: Statistics for Long-Memory Processes. Chapman and Hall, Boca Raton (1994)"},{"key":"36_CR15","unstructured":"Cox, D.R.: Long-range dependance: A review. Statistics: An Appraisal (1984)"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Iannello, G., Palmieri, F., Pescap, A., Salvo Rossi, P.: End-to-end packet-channel Bayesian model applied to heterogeneous wireless networks. In: IEEE GLOBECOM, pp. 484\u2013489 (November 2005)","DOI":"10.1109\/GLOCOM.2005.1577673"},{"issue":"14","key":"36_CR17","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1016\/j.comnet.2008.05.004","volume":"52","author":"A. Dainotti","year":"2008","unstructured":"Dainotti, A., Pescape, A., Salvo Rossi, P., Palmieri, F., Ventre, G.: Internet Traffic Modeling by means of Hidden Markov Models. Computer Networks\u00a052(14), 2645\u20132662 (2008)","journal-title":"Computer Networks"},{"key":"36_CR18","unstructured":"Colonnese, S., Rinauro, S., Rossi, L., Scarano, G.: H.264 Video Traffic Modeling via Hidden Markov Process. In: 17th European Signal Processing Conference (EUSIPCO 2009), Glasgow, Scotland, August 24-28 (2009)"},{"key":"36_CR19","volume-title":"High-Speed Networks: TCP\/IP and ATM Design Principles","author":"W. Stallings","year":"1998","unstructured":"Stallings, W.: High-Speed Networks: TCP\/IP and ATM Design Principles. Prentice-Hall, Englewood Cliffs (1998)"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Salamatian, K., Vaton, S.: Hidden Markov Modeling for network communication channels. In: ACM SIGMETRICS 2001, vol.\u00a029, pp. 92\u2013101 (2001)","DOI":"10.1145\/378420.378439"},{"issue":"2","key":"36_CR21","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TSP.2005.861066","volume":"54","author":"P. Salvo Rossi","year":"2006","unstructured":"Salvo Rossi, P., Romano, G., Palmieri, F., Iannello, G.: Joint end-to-end loss-delay Hidden Markov Model for periodic UDP traffic over the Internet. IEEE Transactions on Signal Processing\u00a054(2), 530\u2013541 (2006)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2) (1989)","DOI":"10.1109\/5.18626"},{"key":"36_CR23","unstructured":"Bilmes, J.A.: A Gentle Tutorial od the EM Algorithm and its Application to Parameter Estimation for Gaussian Mixture and Hidden Markov Models. University of Berkeley (1998)"},{"key":"36_CR24","unstructured":"Norros, I.: On the use of fractional Brownian motion in the theory of connectionless networks. Technical contribution, TD94-33 (September 1994)"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communication\u00a0Com-28 (1980)","DOI":"10.1109\/TCOM.1980.1094577"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Romaszewski, M., G\u0142omb, P.: 3D Mesh Approximation Using Vector Quantization. Advances in Soft Computing\u00a057 (2009)","DOI":"10.1007\/978-3-540-93905-4_9"},{"key":"36_CR27","unstructured":"Robert, S.: Mod\u00e9lisation Markovienne du Trafic dans R\u00e9seaux de Communication. PhD thesis, Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne, Nr 1479 (1996)"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Robert, S., Boudec, J.Y.L.: New models for pseudo self-similar traffic. Performance Evaluation\u00a030(1-2) (1997)","DOI":"10.1016\/S0166-5316(96)00055-7"},{"issue":"1-2","key":"36_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1023\/A:1023672904130","volume":"23","author":"P. Salvador","year":"2003","unstructured":"Salvador, P., Valadas, R., Pacheco, A.: Multiscale fitting procedure using markov modulated poisson processes. Telecommunication Systems Journal\u00a023(1-2), 123\u2013148 (2003)","journal-title":"Telecommunication Systems Journal"},{"key":"36_CR30","unstructured":"The Cooperative Association for Internet Data Analysis, http:\/\/www.caida.org"},{"key":"36_CR31","doi-asserted-by":"crossref","unstructured":"Horvath, A., Telek, M.: A Markovian Point Process Exhibiting Multifractal Behavior and its Application to Traffic Modeling. In: Proceedings of Fourth International Conference on Matrix-analytic Methods in Stochastic Models, Adelaide, Australia (July 2002)","DOI":"10.1142\/9789812777164_0011"},{"issue":"1-4","key":"36_CR32","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0166-5316(02)00122-0","volume":"49","author":"W. Wei","year":"2002","unstructured":"Wei, W., Wang, B., Towsley, D.: Continuous-time Hidden Markov Models for network performance evaluation. Performance Evaluation\u00a049(1-4), 129\u2013146 (2002)","journal-title":"Performance Evaluation"},{"key":"36_CR33","unstructured":"Doma\u0144ska, J.: Procesy Markowa w modelowaniu nate\u017cenia ruchu w sieciach komputerowych. PhD thesis, IITiS PAN, Gliwice (2005)"},{"key":"36_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-74833-5_6","volume-title":"Next Generation Teletraffic and Wired\/Wireless Advanced Networking","author":"J. Doma\u0144ska","year":"2007","unstructured":"Doma\u0144ska, J., Doma\u0144ski, A., Czach\u00f3rski, T.: The Drop-From-Front Strategy in AQM. In: Koucheryavy, Y., Harju, J., Sayenko, A. (eds.) NEW2AN 2007. LNCS, vol.\u00a04712, pp. 61\u201372. Springer, Heidelberg (2007)"},{"key":"36_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85500-2_14","volume-title":"Next Generation Teletraffic and Wired\/Wireless Advanced Networking","author":"A. Doma\u0144ski","year":"2008","unstructured":"Doma\u0144ski, A., Doma\u0144ska, J., Czach\u00f3rski, T.: The impact of self-similarity on traffic shaping in wireless LAN. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN 2008. LNCS, vol.\u00a05174, pp. 156\u2013168. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Smart Spaces and Next Generation Wired\/Wireless Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22875-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T19:17:00Z","timestamp":1560453420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22875-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228742","9783642228759"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22875-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}