{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T17:00:08Z","timestamp":1725642008579},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642255748"},{"type":"electronic","value":"9783642255755"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25575-5_10","type":"book-chapter","created":{"date-parts":[[2011,12,11]],"date-time":"2011-12-11T20:05:26Z","timestamp":1323633926000},"page":"112-128","source":"Crossref","is-referenced-by-count":7,"title":["Performance Evaluation with Hidden Markov Models"],"prefix":"10.1007","author":[{"given":"E.","family":"de Souza e Silva","sequence":"first","affiliation":[]},{"given":"R. M. M.","family":"Le\u00e3o","sequence":"additional","affiliation":[]},{"given":"Richard R.","family":"Muntz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R., Salamatian, K.: Early application identification. In: CoNEXT 2006, pp. 1\u201312. ACM (2006)","DOI":"10.1145\/1368436.1368445"},{"key":"10_CR2","unstructured":"Capp\u00e9, O.: Ten years of HMMs (March 2001)"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0166-5316(98)00011-X","volume":"33","author":"R.M.L.R. Carmo","year":"1998","unstructured":"Carmo, R.M.L.R., de Carvalho, L.R., de Souza e Silva, E., Diniz, M.C., Muntz, R.R.: Performance\/Availability Modeling with the TANGRAM-II Modeling Environment. Performance Evaluation\u00a033(1), 45\u201365 (1998)","journal-title":"Performance Evaluation"},{"key":"10_CR4","unstructured":"de Vielmond, C.C.L.B., Le\u00e3o, R.M.M., de Souza e Silva, E.: A hierarchical HMM for iterative users acessing a multimedia server. In: Brazilian Symposium on Computer Networks, pp. 469\u2013482 (2007) (in Portuguese)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Dainotti, A., de Donato, W., Pescape, A., Salvo Rossi, P.: Classification of network traffic via packet-level Hidden Markov Models. In: IEEE GLOBECOM 2008, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"issue":"14","key":"10_CR6","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1016\/j.comnet.2008.05.004","volume":"52","author":"A. Dainotti","year":"2008","unstructured":"Dainotti, A., Pescap\u00e9, A., Rossi, P.S., Palmieri, F., Ventre, G.: Internet traffic modeling by means of hidden markov models. Computer Networks\u00a052(14), 2645\u20132662 (2008)","journal-title":"Computer Networks"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/1530873.1530886","volume":"36","author":"E. Souza e Silva de","year":"2009","unstructured":"de Souza e Silva, E., Figueiredo, D.R., Le\u00e3o, R.M.M.: The TANGRAM-II integrated modeling environment for computer systems and networks. Performance Evaluation Review\u00a036(4), 64\u201369 (2009)","journal-title":"Performance Evaluation Review"},{"key":"10_CR8","unstructured":"de Souza e Silva, E., Le\u00e3o, R.M.M., Santos, A.D., Azevedo, J.A., Machado Netto, B.C.: Multimedia Supporting Tools for the CEDERJ Distance Learning Initiative applied to the Computer Systems Course. In: 22nd ICDE World Conference on Distance Education, pp. 1\u201311 (2006)"},{"key":"10_CR9","unstructured":"de Souza e Silva, E., Le\u00e3o, R.M.M., Trindade, M.B., da Silva, A.P.C., Ribeiro, B.F., Duarte, F.P., Azevedo, J.A.: A methodology for dimensioning IP networks with QoS using Hidden Markov Models. Technical report, UFRJ-COPPE-PESC (2005)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Filho, F.S., Watanabe, E.H., de Souza e Silva, E.: Adaptive forward error correction for interactive streaming over the Internet. In: IEEE Globecom 2006, pp. 1\u20136 (2006)","DOI":"10.1109\/GLOCOM.2006.469"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1007469218079","volume":"32","author":"S. Fine","year":"1998","unstructured":"Fine, S., Singer, Y., Tishby, N.: The hierarchical Hidden Markov Model: Analysis and applications. Machine Learning\u00a032, 41\u201362 (1998)","journal-title":"Machine Learning"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kobayashi, H., Yu, S.-Z., Mark, B.L.: An integrated mobility and traffic model for resource allocation in wireless networks. In: 3rd ACM International Workshop on Wireless Mobile Multimedia (WOWMOM 2000), pp. 39\u201347. ACM (2000)","DOI":"10.1145\/345867.345880"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2), 257\u2013285 (1989)","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/384268.378439","volume":"29","author":"K. Salamatian","year":"2001","unstructured":"Salamatian, K., Vaton, S.: Hidden markov modeling for network communication channels. Performance Evaluation Review\u00a029(1), 92\u2013101 (2001)","journal-title":"Performance Evaluation Review"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1328690.1328698","volume":"35","author":"F. Silveira","year":"2007","unstructured":"Silveira, F., de Souza e Silva, E.: Predicting packet loss statistics with hidden Markov models. Performance Evaluation Review\u00a035(3), 19\u201321 (2007), http:\/\/www.land.ufrj.br\/~edmundo","journal-title":"Performance Evaluation Review"},{"key":"10_CR16","unstructured":"Tao, S., Guerin, R.: On-line estimation of internet path performance: An application perspective. In: IEEE Infocom (2004)"},{"issue":"1-4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0166-5316(02)00122-0","volume":"49","author":"W. Wei","year":"2002","unstructured":"Wei, W., Wang, B., Towsley, D.: Continuous-time hidden markov models for network performance evaluation. Performance Evaluation\u00a049(1-4), 129\u2013146 (2002)","journal-title":"Performance Evaluation"},{"issue":"4","key":"10_CR18","first-page":"10","volume":"53","author":"L.R. Welch","year":"2003","unstructured":"Welch, L.R.: Hidden markov models and the baum-welch algorithm. IEEE Information Theory Society Newsletter\u00a053(4), 10\u201314 (2003)","journal-title":"IEEE Information Theory Society Newsletter"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Wright, C., Monrose, F., Masson, G.M.: Hmm profiles for network traffic classification. In: The 2004 ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC\/DMSEC 2004), pp. 9\u201315. ACM (2004)","DOI":"10.1145\/1029208.1029211"},{"key":"10_CR20","unstructured":"The TANGRAM-II manual, http:\/\/www.land.ufrj.br"},{"issue":"1","key":"10_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2008.923716","volume":"17","author":"Y. Xie","year":"2009","unstructured":"Xie, Y., Yu, S.-Z.: A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors. IEEE\/ACM Transactions on Networking\u00a017(1), 54\u201365 (2009)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and modelling of the temporal dependence in packet loss. In: IEEE Infocom 2004 (1999)","DOI":"10.1109\/INFCOM.1999.749301"},{"issue":"1","key":"10_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/LSP.2002.806705","volume":"10","author":"S.-Z. Yu","year":"2003","unstructured":"Yu, S.-Z., Kobayashi, H.: An efficient forward-backward algorithm for an explicit-duration hidden markov model. IEEE Signal Processing Letters\u00a010(1), 11\u201314 (2003)","journal-title":"IEEE Signal Processing Letters"}],"container-title":["Lecture Notes in Computer Science","Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25575-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T15:16:23Z","timestamp":1561043783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25575-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642255748","9783642255755"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25575-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}