{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T16:24:56Z","timestamp":1649175896735},"reference-count":19,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2001,7,1]],"date-time":"2001-07-01T00:00:00Z","timestamp":993945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2001,7]]},"DOI":"10.1016\/s1389-1286(00)00188-2","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T14:29:16Z","timestamp":1034605756000},"page":"169-179","source":"Crossref","is-referenced-by-count":4,"title":["Two tools for network traffic analysis"],"prefix":"10.1016","volume":"36","author":[{"given":"M.","family":"Ayedemir","sequence":"first","affiliation":[]},{"given":"L.","family":"Bottomley","sequence":"additional","affiliation":[]},{"given":"M.","family":"Coffin","sequence":"additional","affiliation":[]},{"given":"C.","family":"Jeffries","sequence":"additional","affiliation":[]},{"given":"P.","family":"Kiessler","sequence":"additional","affiliation":[]},{"given":"K.","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"W.","family":"Ligon","sequence":"additional","affiliation":[]},{"given":"J.","family":"Marin","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nilsson","sequence":"additional","affiliation":[]},{"given":"J.","family":"McGovern","sequence":"additional","affiliation":[]},{"given":"A.","family":"Rindos","sequence":"additional","affiliation":[]},{"given":"K.","family":"Vu","sequence":"additional","affiliation":[]},{"given":"S.","family":"Woolet","sequence":"additional","affiliation":[]},{"given":"A.","family":"Zaglou","sequence":"additional","affiliation":[]},{"given":"K.","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00188-2_BIB1","doi-asserted-by":"crossref","unstructured":"W. Leland, M. Taqqu, W. Willinger, D. Wilson, On the self-similar nature of Ethernet traffic, in: Proceedings of the ACM Sigcomm'93 Conference, September 1993, pp. 183\u2013193","DOI":"10.1145\/166237.166255"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB2","doi-asserted-by":"crossref","unstructured":"A. Erramilli, W. Willinger, T. Lakshman, D. Heyman, A. Mukherjee, S. Li, O. Narayan, Performance impacts of self-similarity in traffic, in: (Panel) Proceedings of the ACM SIGMETRICS '95 Conference on Measurement and Modeling of Computer Systems, Ottawa, Canada, May 1995, pp. 265\u2013266","DOI":"10.1145\/223587.223617"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB3","doi-asserted-by":"crossref","unstructured":"R. Morris, TCP behavior with many flows, in: Proceedings of the IEEE International Conference on Network Protocols (ICNP'97), October 1997, pp. 205\u2013211","DOI":"10.1109\/ICNP.1997.643715"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB4","doi-asserted-by":"crossref","unstructured":"R. Morris, D. Lin, Variance of aggregated Web traffic, in: Proceedings of the IEEE Infocom'2000 Conference, March 2000, pp. 360\u2013366","DOI":"10.1109\/INFCOM.2000.832206"},{"issue":"5","key":"10.1016\/S1389-1286(00)00188-2_BIB5","first-page":"216","article-title":"Measurement-based traffic modeling","volume":"14","author":"Kulkarni","year":"1998","journal-title":"Journal of Stochastic Model"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB6","unstructured":"A. Sang, S. Li, A predictability analysis of network traffic, in: Proceedings of the IEEE Infocom'2000 Conference, March 2000, pp. 342\u2013351"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB7","series-title":"Computer Architecture a Quantitative Approach","author":"Hennessy","year":"1990"},{"issue":"1","key":"10.1016\/S1389-1286(00)00188-2_BIB8","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/4236.815868","article-title":"Measuring the internet","volume":"4","author":"Claffy","year":"2000","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB9","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1063\/1.102750","article-title":"Is there a radar clutter attractor?","volume":"56","author":"Leung","year":"1990","journal-title":"Applied Physics Letters"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB10","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1063\/1.166275","article-title":"Chaotic dynamics of sea clutter","volume":"7","author":"Haykin","year":"1997","journal-title":"Chaos"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB11","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1002\/j.1538-7305.1944.tb00874.x","article-title":"The mathematical analysis of random noise","volume":"23","author":"Rice","year":"1944","journal-title":"Bell System Technical Journal"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB12","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1002\/j.1538-7305.1945.tb00453.x","article-title":"The mathematical analysis of random noise","volume":"24","author":"Rice","year":"1945","journal-title":"Bell System Technical Journal"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB13","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/0167-2789(83)90298-1","article-title":"Measuring the strangeness of strange attractors","volume":"9","author":"Grassberger","year":"1983","journal-title":"Physica D"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB14","series-title":"Neural Networks, A Comprehensive Foundation","author":"Haykin","year":"1994"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB15","series-title":"A Modern Approach to Probability Theory","author":"Fristedt","year":"1997"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB16","series-title":"Linear Statistical Models: an Applied Approach","author":"Bowerman","year":"1990"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB17","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1103\/PhysRevLett.45.712","article-title":"Geometry from a time series","volume":"45","author":"Packard","year":"1980","journal-title":"Physical Review Letters"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB18","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1214\/aoms\/1177704477","article-title":"Asymptotic theory of certain goodness of fit criteria based on stochastic processes","volume":"33","author":"Anderson","year":"1962","journal-title":"Annals of Mathematical Statistics"},{"key":"10.1016\/S1389-1286(00)00188-2_BIB19","series-title":"Practical Nonparametric Statistics","author":"Conover","year":"1971"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001882?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001882?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T20:25:54Z","timestamp":1555705554000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600001882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,7]]},"references-count":19,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2001,7]]}},"alternative-id":["S1389128600001882"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00188-2","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2001,7]]}}}