{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T13:58:04Z","timestamp":1768399084005,"version":"3.49.0"},"reference-count":25,"publisher":"Elsevier","isbn-type":[{"value":"9780128008874","type":"print"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/b978-0-12-800887-4.00010-9","type":"book-chapter","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T19:14:18Z","timestamp":1429902858000},"page":"285-311","source":"Crossref","is-referenced-by-count":4,"title":["On the self-similarity of traffic generated by network traffic simulators"],"prefix":"10.1016","author":[{"given":"Diogo A.B.","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Neto","sequence":"additional","affiliation":[]},{"given":"Liliana F.B.","family":"Soares","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]},{"given":"Pedro R.M.","family":"In\u00e1cio","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/B978-0-12-800887-4.00010-9_bib1","doi-asserted-by":"crossref","first-page":"21:1","DOI":"10.1145\/1823746.1823755","article-title":"Source traffic analysis","volume":"6","author":"Gomes","year":"2010","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"issue":"1","key":"10.1016\/B978-0-12-800887-4.00010-9_bib2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/90.282603","article-title":"On the Self-Similar Nature of ethernet traffic (extended version)","volume":"2","author":"Leland","year":"1994","journal-title":"IEEE\/ACM Trans Netw"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib3","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1061\/TACEAT.0006518","article-title":"Long-term storage capacity of reservoirs","volume":"116","author":"Hurst","year":"1951","journal-title":"Trans Am Soc Civ Eng"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib4","first-page":"77","volume":"11","author":"Kenkel","year":"1996","journal-title":"Fract Biol Sci"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib5","first-page":"1","article-title":"Classification of breast masses on contrast-enhanced magnetic resonance images through log detrended fluctuation cumulant-based multifractal analysis","volume":"99","author":"Soares","year":"2013","journal-title":"IEEE Syst J"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib6","doi-asserted-by":"crossref","unstructured":"Leland WE, Wilson DV. High time-resolution measurement and analysis of LAN traffic: Implications for LAN interconnection, In: Proceedings of the 10th annual joint conference of the IEEE computer and communications societies (INFOCOM), vol. 3; Apr. 1991. p. 1360\u20136.","DOI":"10.1109\/INFCOM.1991.147663"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib7","doi-asserted-by":"crossref","unstructured":"Elbiaze H, Cherkaoui O, McGibbon B, Blais M. A Structure- preserving method of sampling self-similar traffic, in 13th IEEE International Symposium on Modeling, Analysis, and simulation of computer and telecommunication systems (MASCOTS). Atlanta, GA, USA; Sep. 2005, p. 161\u20138.","DOI":"10.1109\/MASCOTS.2005.7"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib8","unstructured":"Mandelbrot BB, Fisher AJ, Calvet LE. A multifractal model of asset returns, Cowles foundation for research in economics, Yale University, Cowles Foundation Discussion Papers 1164, Sep. 1997."},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib9","unstructured":"Racine R. Estimating the hurst parameter, Eidgen\u00f6ssische Technische Hochschule Z\u00fcrich, B.Sc. Thesis, 2011."},{"issue":"2","key":"10.1016\/B978-0-12-800887-4.00010-9_bib10","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TNET.2011.2172984","article-title":"SLAW: Self-similar Least-action Human Walk","volume":"20","author":"Lee","year":"2012","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"12","key":"10.1016\/B978-0-12-800887-4.00010-9_bib11","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1029\/WR020i012p01898","article-title":"Modeling persistence in hydrological time series using fractional differencing","volume":"20","author":"Hosking","year":"1984","journal-title":"Water Resour Res"},{"issue":"2","key":"10.1016\/B978-0-12-800887-4.00010-9_bib12","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2133390.2133395","article-title":"Fast synthesis of persistent fractional brownian motion","volume":"22","author":"In\u00e1cio","year":"2012","journal-title":"ACM Trans Model Comput Simul"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib13","unstructured":"Dieker T. Simulation of fractional Brownian motion, Master\u2019s thesis, University of Twente, P.O. Box 94079, 1090 GB. Amsterdam; The Netherlands; 2004."},{"issue":"5","key":"10.1016\/B978-0-12-800887-4.00010-9_bib14","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/269790.269792","article-title":"Fast, approximate synthesis of fractional gaussian noise for generating self-similar network traffic, SIGCOMM","volume":"27","author":"Paxson","year":"1997","journal-title":"Comput Commun Rev"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib15","doi-asserted-by":"crossref","unstructured":"Jeong H-DJ, McNickle D, Pawlikowski K. Fast self-similar teletraffic generation based on FGN and wavelets, In: IEEE International Conference on networks (ICON). Brisbane, Queensland, Australia: IEEE Computer Society; Sep. 1999, p. 75\u201382.","DOI":"10.1109\/ICON.1999.796163"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib16","unstructured":"Karagiannis T, Faloutsos M. SELFIS: A tool for self-similarity and long-range dependence analysis, in 1st Workshop on fractals and Self-similarity in data mining: Issues and approaches (held in conjunction with ACM SIGKDD 2002). New York, NY, USA; ACM, Jul. 2002."},{"issue":"1","key":"10.1016\/B978-0-12-800887-4.00010-9_bib17","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/18.650984","article-title":"Wavelet analysis of long-range-dependent traffic","volume":"44","author":"Abry","year":"1998","journal-title":"Inform Theory IEEE Trans"},{"issue":"4","key":"10.1016\/B978-0-12-800887-4.00010-9_bib18","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/LSP.2004.824031","article-title":"Estimating the Hurst index of a self-similar process via the crossing tree","volume":"11","author":"Jones","year":"2004","journal-title":"IEEE Signal Proc Lett"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib19","doi-asserted-by":"crossref","unstructured":"Mandelbrot BB, Wallis JR. Robustness of R\/S in measuring noncyclic global statistical dependence, vol. 5; 1969. p. 967\u201388.","DOI":"10.1029\/WR005i005p00967"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib20","series-title":"A practical guide to heavy tails","first-page":"27","article-title":"Self-similarity and heavy tails: structural modeling of network traffic","author":"Willinger","year":"1998"},{"issue":"1","key":"10.1016\/B978-0-12-800887-4.00010-9_bib21","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/90.554723","article-title":"Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level","volume":"5","author":"Willinger","year":"1997","journal-title":"IEEE\/ACM Tran Net"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib22","first-page":"83","article-title":"Internet traffic tends toward poisson and independent as the load increases","volume":"vol. 171","author":"Cao","year":"2003"},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib23","unstructured":"Network Simulator, \u201cNetwork Simulator Web Page,\u201d Available from: <http:\/\/www.nsnam.org\/>. 2014, [accessed Apr. 2014]."},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib24","unstructured":"OMNeT++, \u201cOMNeT++ Web Page,\u201d Available from, <http:\/\/www.omnetpp.org\/>; 2013, [accessed Apr. 2014]."},{"key":"10.1016\/B978-0-12-800887-4.00010-9_bib25","unstructured":"The Internet Traffic Archive, Bellcore network traffic traces, Available from: <http:\/\/ita.ee.lbl.gov\/html\/contrib\/BC.html>; 2008, [accessed Apr. 2014]."}],"container-title":["Modeling and Simulation of Computer Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128008874000109?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128008874000109?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T22:34:24Z","timestamp":1747953264000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128008874000109"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9780128008874"],"references-count":25,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-800887-4.00010-9","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}