{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T03:40:18Z","timestamp":1742787618912,"version":"3.40.2"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,3,28]],"date-time":"2012-03-28T00:00:00Z","timestamp":1332892800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10922-012-9231-7","type":"journal-article","created":{"date-parts":[[2012,3,27]],"date-time":"2012-03-27T14:29:18Z","timestamp":1332858558000},"page":"169-193","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Loss Inference Algorithm Using Unicast End-to-End Measurements"],"prefix":"10.1007","volume":"21","author":[{"given":"Yan","family":"Qiao","sequence":"first","affiliation":[]},{"given":"Xuesong","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Luoming","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Ran","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,28]]},"reference":[{"key":"9231_CR1","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Spring, N., Wetherall, D., Anderson, T.: User-level internet path diagnosis. ACM Symposium on Operating Systems Principles, pp. 106\u2013119. New York, USA (2003)","DOI":"10.1145\/1165389.945456"},{"key":"9231_CR2","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K., Greenwald, M., Ryger, R., Cing.: Measuring network-internal delays using only existing infrastructure. Proceedings of the IEEE International Conference on Computer Communications. California, USA (2003)","DOI":"10.1109\/INFCOM.2003.1209232"},{"key":"9231_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, H.X., Thiran, P.: Network loss inference with second order statistics of end-to-end flows. Proceedings of the ACM Internet Measurement Conference, pp. 227\u2013240. New York, USA (2007)","DOI":"10.1145\/1298306.1298339"},{"issue":"12","key":"9231_CR4","doi-asserted-by":"crossref","first-page":"5373","DOI":"10.1109\/TIT.2006.885460","volume":"52","author":"N.G. Duffield","year":"2006","unstructured":"Duffield, N.G.: Network tomography of binary network performance characteristic. IEEE Trans. Inf. Theory 52(12), 5373\u20135388 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"9231_CR5","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/35.841840","volume":"38","author":"A. Adams","year":"2000","unstructured":"Adams, A., Bu, T., Friedman, T., Horowitz, J.: The use of end-to-end multicast measurements for characterizing internal network behavior. IEEE Commun. Mag. 38(5), 152\u2013159 (2000)","journal-title":"IEEE Commun. Mag."},{"key":"9231_CR6","doi-asserted-by":"crossref","unstructured":"Bu, T., Duffield, N., Presti, F.L., Towsley, D.: Network tomography on general topologies. Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems, pp. 21\u201330. California, USA (2002)","DOI":"10.1145\/511335.511338"},{"issue":"7","key":"9231_CR7","doi-asserted-by":"crossref","first-page":"2462","DOI":"10.1109\/18.796384","volume":"45","author":"R. Caceres","year":"1999","unstructured":"Caceres, R., Duffield, N.G., Horowitz, J., Towsley, D.: Multicast-based inference of network-internal loss characteristics. IEEE Trans. Inf. Theory 45(7), 2462\u20132480 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9231_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Bindel, D., Song, H., Katz, R.H.: Network tomography: Identifiability and fourier domain estimation. Proceedings of the IEEE International Conference on Computer Communications, pp. 1875\u20131883. Alaska, USA (2007)","DOI":"10.1109\/INFCOM.2007.218"},{"key":"9231_CR9","unstructured":"Coates, M., Nowak, R.: Network loss inference using unicast end-to-end measurement. Proceedings of the ITC specialist seminar IP traffic measurement, modeling and management. California, USA (2000)"},{"key":"9231_CR10","doi-asserted-by":"crossref","unstructured":"Duffield, N., Presti, F.L., Paxson, V., Towsley, D.: Inferring link loss using striped unicast probes. Proceedings of the IEEE International Conference on Computer Communications, vol. 2, pp. 915\u2013923. Alaska, USA (2001)","DOI":"10.1109\/INFCOM.2001.916283"},{"key":"9231_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen, H.X., Thiran, P.: The boolean solution to the congested IP link location problem: theory and practice. Proceedings of the IEEE International Conference on Computer Communications, pp. 2117\u20132125. Alaska, USA (2007)","DOI":"10.1109\/INFCOM.2007.245"},{"key":"9231_CR12","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Qiu, L., Wang, H.J.: Server-based inference of internet performance. Proceedings of the IEEE International Conference on Computer Communications, vol. 1, pp. 145\u2013155. California, USA (2003)","DOI":"10.1109\/INFCOM.2003.1208667"},{"key":"9231_CR13","doi-asserted-by":"crossref","unstructured":"Ghita, D., Nguyen, H., Kurant, M., Argyraki, K., Thiran, P.: Netscope: practical network loss tomography. Proceedings of the IEEE International Conference on Computer Communications, pp. 1\u20139. California, USA (2010)","DOI":"10.1109\/INFCOM.2010.5461918"},{"key":"9231_CR14","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, Y., Bindel, D.: Toward unbiased end-to-end network diagnosis. Proceedings of the ACM Special Interest Group on Data Communication, pp. 219\u2013230. Pisa, Italy (2006)","DOI":"10.1145\/1151659.1159939"},{"key":"9231_CR15","doi-asserted-by":"crossref","unstructured":"Y. Zhang, N. Duffield, V. Paxson.: On the constancy of internet path properties. Proceedings of ACM SIGCOMM Internet Measurement Workshop. California, USA (2001)","DOI":"10.1145\/505202.505228"},{"key":"9231_CR16","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"J. Pearl","year":"1988","unstructured":"Pearl, J.: Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Mate, Canada (1988)"},{"key":"9231_CR17","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Cheng, L., Qiu, X.S., Meng, L.M.: A methodology used to optimize probe selection for fault localization. IEEE Global Communications Conference. FL, USA (2010)","DOI":"10.1109\/GLOCOM.2010.5684146"},{"issue":"3","key":"9231_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1057\/palgrave.jors.2600523","volume":"49","author":"F.P. Kelly","year":"1998","unstructured":"Kelly, F.P., Maulloo, A.K., Tan, D.K.H.: Rate control for communication networks: shadow prices, proportional fairness and stability. J. Oper. Res. Soc. 49(3), 237\u2013252 (1998)","journal-title":"J. Oper. Res. Soc."},{"key":"9231_CR19","doi-asserted-by":"crossref","unstructured":"Shetty, N., Gueye, A., Walrand, J.: A novel approach to Bottleneck analysis in networks. Proceedings of the IEEE Network Operations and Management Symposium, pp. 65\u201372. Salvador, Bahia (2008)","DOI":"10.1109\/NOMS.2008.4575118"},{"key":"9231_CR20","volume-title":"Linear and Nonlinear Programming","author":"K.G. Murty","year":"1988","unstructured":"Linear Complementarity: Linear and Nonlinear Programming. Heldermann Verlag, Berlin, Germany (1988)"},{"key":"9231_CR21","doi-asserted-by":"crossref","unstructured":"Odintsova, N., Rish, I.: Empirical study of topology effects on diagnosis in computer networks. Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems, pp. 1\u20136. Pisa, Italy (2007)","DOI":"10.1109\/MOBHOC.2007.4428682"},{"key":"9231_CR22","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/49.12889","volume":"6","author":"B.M. Waxman","year":"1988","unstructured":"Waxman, B.M.: Routing of multipoint connections. IEEE J. Sel. Areas Commun. 6, 1617\u20131622 (1988)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9231_CR23","doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. Massachusetts, pp. 251\u2013262, USA (1999)","DOI":"10.1145\/316188.316229"},{"key":"9231_CR24","unstructured":"Winick, J., Jamin, S.: Inet-3.0: Internet topology generator. University of Michigan, Michigan, USA. CSE-TR-456-02 (2002)"},{"key":"9231_CR25","doi-asserted-by":"crossref","unstructured":"Cheng, L., Qiu, X.S., Meng, L.M., Qiao, Y.: Probabilistic fault diagnosis for IT services in Noisy and dynamic environments. Proceedings of the IEEE\/IFIP International Symposium on Integrated Network Management, pp. 149\u2013156. NY, USA (2009)","DOI":"10.1109\/INM.2009.5188804"},{"key":"9231_CR26","doi-asserted-by":"crossref","unstructured":"Cheng, L., Qiu, X.S., Meng, L.M., Qiao, Y.: Efficient active probing for fault diagnosis in large scale and noisy networks. Proceedings of the 29th Conference on Information Communications, pp. 2169\u20132177. CA, USA. (2010)","DOI":"10.1109\/INFCOM.2010.5462041"},{"key":"9231_CR27","doi-asserted-by":"crossref","unstructured":"Botta, A., de Donato, W., Pescape\u2019, A., Ventre, G.: Discovering Topologies at Router Level: Part II. IEEE Global Communications Conference, Washington, DC, USA (2007)","DOI":"10.1109\/GLOCOM.2007.511"},{"key":"9231_CR28","doi-asserted-by":"crossref","unstructured":"Augustin, B., Cuvellier, X., Orgogozo, B., Vige, F.: Avoiding Traceroute Anomalies with Paris Traceroute. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. New York, NY, USA (2006)","DOI":"10.1145\/1177080.1177100"},{"issue":"1\u20134","key":"9231_CR29","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/COMST.2007.4444750","volume":"9","author":"B. Donnet","year":"2007","unstructured":"Donnet, B.: Internet topology discovery: a survey. IEEE Communications Surveys and Tutorials 9(1\u20134), 56\u201369 (2007)","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"9","key":"9231_CR30","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/MCOM.2010.5560600","volume":"48","author":"A. Botta","year":"2010","unstructured":"Botta, A., Dainotti, A., Pescap, A.: Do you trust your software-based traffic generator?. IEEE Commun. Mag. 48(9), 158\u2013165 (2010)","journal-title":"IEEE Commun. Mag."},{"key":"9231_CR31","doi-asserted-by":"crossref","unstructured":"Chen, Y., Bindel, D., Song, H., Katz, R.H.: An algebraic approach to practical and scalable overlay network monitoring. Proceedings of the ACM Special Interest Group on Data Communication. Oregon, USA (2004)","DOI":"10.1145\/1015467.1015475"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-012-9231-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-012-9231-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-012-9231-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T03:08:45Z","timestamp":1742785725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-012-9231-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,28]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["9231"],"URL":"https:\/\/doi.org\/10.1007\/s10922-012-9231-7","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2012,3,28]]}}}