{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T22:05:08Z","timestamp":1709244308464},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2006,8,1]],"date-time":"2006-08-01T00:00:00Z","timestamp":1154390400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1007\/s00502-006-0362-y","type":"journal-article","created":{"date-parts":[[2006,10,10]],"date-time":"2006-10-10T06:29:16Z","timestamp":1160461756000},"page":"288-296","source":"Crossref","is-referenced-by-count":11,"title":["Traffic monitoring and analysis in 3G networks: lessons learned from the METAWIN project"],"prefix":"10.1007","volume":"123","author":[{"given":"F.","family":"Ricciato","sequence":"first","affiliation":[]},{"given":"P.","family":"Svoboda","sequence":"additional","affiliation":[]},{"given":"J.","family":"Motz","sequence":"additional","affiliation":[]},{"given":"W.","family":"Fleischer","sequence":"additional","affiliation":[]},{"given":"M.","family":"Sedlak","sequence":"additional","affiliation":[]},{"given":"M.","family":"Karner","sequence":"additional","affiliation":[]},{"given":"R.","family":"Pilz","sequence":"additional","affiliation":[]},{"given":"P.","family":"Romirer-Maierhofer","sequence":"additional","affiliation":[]},{"given":"E.","family":"Hasenleithner","sequence":"additional","affiliation":[]},{"given":"W.","family":"J\u00e4ger","sequence":"additional","affiliation":[]},{"given":"P.","family":"Kr\u00fcger","sequence":"additional","affiliation":[]},{"given":"F.","family":"Vacirca","sequence":"additional","affiliation":[]},{"given":"M.","family":"Rupp","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"362_CR1","doi-asserted-by":"crossref","unstructured":"Bannister, J., Mather, P., Coope, S. (2004): Convergence technologies for 3G networks. Wiley.","DOI":"10.1002\/0470860936"},{"key":"362_CR2","doi-asserted-by":"crossref","unstructured":"Benko, P., Malicsko, G., Veres, A. (2004): A large-scale, passive analysis of end-to-end TCP performance over GPRS. Proc. IEEE INFOCOM, Hong Kong, 2004.","DOI":"10.1109\/INFCOM.2004.1354598"},{"key":"362_CR3","doi-asserted-by":"crossref","unstructured":"Borsos, T., Szabo, I., Wieland, J., Zarandi, P. (2006): A measurement based solution for service quality assurance in operational GPRS networks. Proc. IEEE INFOCOM, Barcelona, April 2006.","DOI":"10.1109\/INFOCOM.2006.283"},{"key":"362_CR4","unstructured":"Keshav, S. (2005): Why cell phones will dominate the tuture Internet. ACM Computer Comm. Review, vol. 35, n. 2, April 2005."},{"key":"362_CR5","unstructured":"Kleinrock, L. (2005): The Internet: history and future. Lectio Magistralis at Politecnico di Torino, October 2005 ( http:\/\/www.tlc.polito.it\/nordio\/seminars )."},{"key":"362_CR6","unstructured":"Lee, Y. (2006): Measured TCP performance in CDMA 1x EV-DO network. Proc. of PAM 2006, Adelaide, Australia, March 30\u201331, 2006."},{"issue":"3","key":"362_CR7","first-page":"108","volume":"122","author":"T. Neubauer","year":"2005","unstructured":"Neubauer, T., Toeltsch, M. (2005): UMTS radio network planning \u2013 maximizing return on investment, e&i (122), H. 3: 108\u2013113.","journal-title":"e&i"},{"key":"362_CR8","doi-asserted-by":"crossref","unstructured":"Pang, R., et al. (2004): Characteristics of Internet background radiation. IMC'04, Taormina, Italy, October 2004.","DOI":"10.1145\/1028788.1028794"},{"issue":"3","key":"362_CR9","first-page":"102","volume":"122","author":"G. Pospischil","year":"2005","unstructured":"Pospischil, G., Miladinovich, I., Kunczier, H. (2005): Hot topics for mobile services. e&i (122), H. 3: 102\u2013107.","journal-title":"e&i"},{"key":"362_CR10","unstructured":"Ricciato, F. (2006): Unwanted Traffic in 3G, editorial for ACM Computer Comm. Review, vol. 36, n. 2, April 2006."},{"key":"362_CR11","doi-asserted-by":"crossref","unstructured":"Ricciato, F., Fleischer, W. (2006): Bottleneck detection via aggregate rate analysis: a real case in a 3G network. Short paper at IEEE\/IFIP NOMS'06, Vancouver, April 2006.","DOI":"10.1109\/NOMS.2006.1687628"},{"key":"362_CR12","unstructured":"Ricciato, F., Pilz, R., Hasenleithner, E. (2006): Measurement-based optimization of a 3G core network: a case study. Accepted to 6th Int. Conf. on Next Generation Teletraffic and Wired\/Wireless Advanced Networking (NEW2AN'06), St. Petersburg, Russia, May 29, 2006."},{"key":"362_CR13","doi-asserted-by":"crossref","unstructured":"Ricciato, F., Vacirca, F., Karner, M. (2005): Bottleneck detection in UMTS via TCP passive monitoring: a real case. Proc. of ACM CoNEXT'05, Toulouse, France, October 24\u201327, 2005.","DOI":"10.1145\/1095921.1095949"},{"key":"362_CR14","unstructured":"Ricciato, F., Vacirca, F., Fleischer, W., Motz, J., Rupp, M. (2006a): Passive tomography of a 3G network: challenges and opportunities. Poster at IEEE INFOCOM, Barcelona, April 2006."},{"key":"362_CR15","unstructured":"Ricciato, F., Svoboda, P., Hasenleithner, E., Fleischer, W. (2006b): On the impact of unwanted traffic onto a 3G network. Proc. of 2nd Int. workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPeru06), Lyon, France, June 29, 2006."},{"key":"362_CR16","unstructured":"Svoboda, P., Ricciato, F., Hasenleithner, E., Pilz, R. (2006): Composition of GPRS\/UMTS traffic: snapshots from a live network. Proc. of 4th Int. Workshop on Internet Performance, Simulation, Monitoring and Measurement, Salzburg (IPS-MOME'06), Austria, February 27\u201328, 2006."},{"key":"362_CR17","doi-asserted-by":"crossref","unstructured":"Vacirca, F., Ricciato, F., Pilz, R. (2005): Large-scale RTT measurements from an operational UMTS\/GPRS network. Proc. of the 1st Int. Conf. on Wireless Internet (IEEE WICON 05), Budapest, Hungary, July 2005.","DOI":"10.1109\/WICON.2005.19"},{"key":"362_CR18","doi-asserted-by":"crossref","unstructured":"Vacirca, F., Ziegler, T., Hasenleithner, E. (2006): An algorithm to detect TCP spurious timeouts and its application to operational UMTS\/GPRS networks. To appear in Journal of Computer Networks, Elsevier.","DOI":"10.1016\/j.comnet.2005.11.003"},{"key":"362_CR19","unstructured":"Yang, H., Ricciato, F., Lu, S., Zhang, L. (2006): Securing a wireless world. Proc. of IEEE \u2013 Special Issue on Cryptography and Security Issues, vol. 94, n. 2, February 2006."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-006-0362-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00502-006-0362-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-006-0362-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T21:48:24Z","timestamp":1559080104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00502-006-0362-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":19,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2006,8]]}},"alternative-id":["362"],"URL":"https:\/\/doi.org\/10.1007\/s00502-006-0362-y","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"value":"0932-383X","type":"print"},{"value":"1613-7620","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,8]]}}}