{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:45:54Z","timestamp":1740894354116,"version":"3.38.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,1,26]],"date-time":"2011-01-26T00:00:00Z","timestamp":1296000000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s12083-010-0100-4","type":"journal-article","created":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T10:59:59Z","timestamp":1295953199000},"page":"439-452","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic and reactive fault diagnosis for dynamic overlay networks"],"prefix":"10.1007","volume":"4","author":[{"given":"Yongning","family":"Tang","sequence":"first","affiliation":[]},{"given":"Guang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,26]]},"reference":[{"key":"100_CR1","unstructured":"Akamai Global Content Delivery Technology Overview. http:\/\/www.akamai.com\/html\/technology\/ . Last access: October 20, 2010"},{"issue":"3","key":"100_CR2","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1023\/A:1019814627444","volume":"10","author":"E Al-Shaer","year":"2002","unstructured":"Al-Shaer E, Tang Y (2002) QoS path monitoring for multicast networks. J Netw Syst Manag (JNSM) 10(3):357\u2013381","journal-title":"J Netw Syst Manag (JNSM)"},{"key":"100_CR3","unstructured":"Anagnostakis KG, Greenwald MB, Ryger RS (2003) Cing: measuring network-internal delays using only existing infrastructure. In: IEEE INFOCOM"},{"key":"100_CR4","unstructured":"Applety K et al (2002) Yemanja\u2014a layered event correlation system for multi-domain computing utilities. J Netw Syst Manag 10"},{"key":"100_CR5","doi-asserted-by":"crossref","unstructured":"Brodie M, Rish I, Ma S (2001) Optimizing probe selection for fault localization. In: IEEE\/IFIP (DSOM)","DOI":"10.3990\/2.9"},{"key":"100_CR6","doi-asserted-by":"crossref","unstructured":"Chen Y, Bindel D, Song H, Katz RH (2004) An algebraic approach to practical and scalable overlay network monitoring. In: Proceeding of ACM SIGCOMM","DOI":"10.1145\/1015467.1015475"},{"key":"100_CR7","doi-asserted-by":"crossref","unstructured":"Chu Y-h, Rao SG, Zhang H (2000) A case for end system multicast. In: Proceedings of ACM SIGMETRICS. Santa Clara, CA","DOI":"10.1145\/339331.339337"},{"issue":"3","key":"100_CR8","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/79.998081","volume":"19","author":"M Coates","year":"2002","unstructured":"Coates M, Hero A, Nowak R, Yu B (2002) Internet tomography. IEEE Signal Process Mag 19(3):47\u201365","journal-title":"IEEE Signal Process Mag"},{"key":"100_CR9","unstructured":"CoMon\u2014a monitoring infrastructure for PlanetLab. http:\/\/comon.cs.princeton.edu\/ . Last access: October 20, 2010"},{"key":"100_CR10","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2001","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms, 2nd edn. MIT Press, Cambridge","edition":"2"},{"key":"100_CR11","unstructured":"Guo J, Kar G, Kermani P (2004) Approaches to building self healing system using dependency analysis. In: IEEE\/IFIP (NOMS). Seoul, Korea"},{"key":"100_CR12","doi-asserted-by":"crossref","unstructured":"Hessler S (2006) BPB: a novel approach for obtaining network path characteristics in non-cooperative environments. In: Student\u2019s workshop at INFOCOM","DOI":"10.1109\/INFOCOM.2006.68"},{"key":"100_CR13","doi-asserted-by":"crossref","unstructured":"Houck K, Calo S, Finkel A (1995) Towards a practical alarm correlation system. In: Integrated network management IV. Santa Barbara, CA","DOI":"10.1007\/978-0-387-34890-2_20"},{"key":"100_CR14","unstructured":"Howell F, McNab R (1998) Simjava: a discrete event simulation package for Java with applications in computer systems modelling. In: First international conference on Web-based modelling and simulation"},{"key":"100_CR15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/65.244794","volume":"7","author":"G Jakobson","year":"1993","unstructured":"Jakobson G, Weissman MD (1993) Alarm correlation. IEEE Netw 7:52\u201359","journal-title":"IEEE Netw"},{"key":"100_CR16","doi-asserted-by":"crossref","unstructured":"Kliger S, Yemini S, Yemini Y, Ohsie D, Stolfo S (1995) A coding approach to event correlation. In: Proceedings of the fourth international symposium on intelligent network management","DOI":"10.1007\/978-0-387-34890-2_24"},{"key":"100_CR17","doi-asserted-by":"crossref","unstructured":"Liu G, Mok AK, Yang EJ (1999) Composite events for network event correlation. In: Integrated network management VI, pp 247\u2013260. Boston, MA","DOI":"10.1109\/INM.1999.770687"},{"key":"100_CR18","unstructured":"Mao ZM et al (2004) Scalable and accurate identification of as-level forwarding paths. In: IEEE Infocom"},{"key":"100_CR19","doi-asserted-by":"crossref","unstructured":"Mahajan R, Spring N, Wetherall D, Anderson T (2003) User-level Internet path diagnosis. In: Proc. ACM SOSP","DOI":"10.1145\/945453.945456"},{"key":"100_CR20","doi-asserted-by":"crossref","unstructured":"McCloghrie K, Rose M (1991) Management information base for network management of TCP\/IP-based Internets: MIB-II, RFC1213","DOI":"10.17487\/rfc1213"},{"key":"100_CR21","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/505680.505683","volume":"30","author":"A Medina","year":"2000","unstructured":"Medina A, Matta I, Byers J (2000) On the origin of power laws in Internet topologies. ACM Comput Commun Rev 30:18\u201328","journal-title":"ACM Comput Commun Rev"},{"key":"100_CR22","doi-asserted-by":"crossref","unstructured":"Peterson L, Anderson T, Culler D, Roscoe T (2002) A blueprint for introducing disruptive technology into the Internet. In: The proceedings of ACM HotNets-I workshop","DOI":"10.1145\/774763.774772"},{"key":"100_CR23","unstructured":"PlanetLab. http:\/\/www.planet-lab.org . Last access: October 20, 2010"},{"key":"100_CR24","unstructured":"Rish I, Brodie M, Odintsova N, Ma S, Grabarnik G (2004) Real-time problem determination in distributed systems using active probing. In: IEEE\/IFIP (NOMS). Seoul, Korea"},{"key":"100_CR25","unstructured":"Savage S (1999) Sting: a TCP-based network measurement tool. In: Proceedings of the 1999 USENIX symposium on Internet technologies and systems"},{"key":"100_CR26","unstructured":"Skitter. CAIDAs topology measurement tool. http:\/\/www.caida.org\/tools\/measurement\/skitter\/ . Last access: October 20, 2010"},{"key":"100_CR27","unstructured":"Steinder M, Sethi AS (2002) Increasing robustness of fault localization through analysis of lost, spurious, and positive symptoms. In: Proc. of IEEE INFOCOM. New York, NY"},{"issue":"4","key":"100_CR28","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.comnet.2004.01.007","volume":"45","author":"M Steinder","year":"2004","unstructured":"Steinder M, Sethi AS (2004) Probabilistic fault diagnosis in communication systems through incremental hypothesis updating. Comput Netw 45(4):537\u2013562","journal-title":"Comput Netw"},{"key":"100_CR29","doi-asserted-by":"crossref","unstructured":"Tang Y, Al-Shaer E (2008) Towards user-level collaborative overlay fault diagnosis. In: The 27th IEEE INFOCOM mini-conference. Phoenix, AZ","DOI":"10.1109\/INFOCOM.2007.318"},{"key":"100_CR30","doi-asserted-by":"crossref","unstructured":"Tang Y, Al-Shaer E (2009) Sharing end-user negative symptoms for improving overlay network dependability. In: The 39th IEEE\/IFIP international conference on dependable systems and networks (DSN). Lisbon, Portugal","DOI":"10.1109\/DSN.2009.5270328"},{"issue":"1","key":"100_CR31","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/TNSM.2008.080104","volume":"5","author":"Y Tang","year":"2008","unstructured":"Tang Y, Al-Shaer E, Boutaba R (2008) Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. IEEE Transactions on Network and Service Management 5(1):36\u201349","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"100_CR32","unstructured":"Team Cymru IP to ASN Lookup. http:\/\/asn.cymru.com\/cgi-bin\/whois.cgi . Last access: October 20, 2010"},{"key":"100_CR33","doi-asserted-by":"crossref","unstructured":"Xie H, Yang YR, Krishnamurthy A, Liu Y, Silberschatz A (2008) P4P: portal for (P2P) applications. In: Proceedings of SIGCOMM","DOI":"10.1145\/1402958.1402999"},{"key":"100_CR34","unstructured":"Zhang M, Zhang C, Pai V, Peterson L, Wang R (2004) PlanetSeer: Internet path failure monitoring and characterization in wide-area services. In: Proc. sixth symposium on operating systems design and implementation"},{"key":"100_CR35","doi-asserted-by":"crossref","unstructured":"Zhao Y, Chen Y, Bindel D (2006) Towards unbiased end-to-end network diagnosis. In: Proceeding of ACM SIGCOMM","DOI":"10.1145\/1159913.1159939"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0100-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-010-0100-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0100-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T04:31:11Z","timestamp":1740889871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-010-0100-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,26]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["100"],"URL":"https:\/\/doi.org\/10.1007\/s12083-010-0100-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2011,1,26]]}}}