{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:30:25Z","timestamp":1755221425837,"version":"3.43.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/ciss.2013.6552253","type":"proceedings-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T16:26:57Z","timestamp":1373560017000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Active learning of multiple source multiple destination topologies"],"prefix":"10.1109","author":[{"given":"Pegah","family":"Sattari","sequence":"first","affiliation":[{"name":"Department of EECS, University of California, Irvine, USA"}]},{"given":"Maciej","family":"Kurant","sequence":"additional","affiliation":[{"name":"Department of EECS, University of California, Irvine, USA"}]},{"given":"Animashree","family":"Anandkumar","sequence":"additional","affiliation":[{"name":"Department of EECS, University of California, Irvine, USA"}]},{"given":"Athina","family":"Markopoulou","sequence":"additional","affiliation":[{"name":"Department of EECS, University of California, Irvine, USA"}]},{"given":"Michael","family":"Rabbat","sequence":"additional","affiliation":[{"name":"Dept. of ECE, McGill University, Canada"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2008.4601041"},{"key":"17","article-title":"Active topology inference using network coding","author":"sattari","year":"2012","journal-title":"Elsevier PHYCOM Special Issue on Network Coding"},{"key":"18","article-title":"Topology inference using network coding","author":"fragouli","year":"2006","journal-title":"Proc of Allerton Conf"},{"key":"15","first-page":"1771","article-title":"Learning latent tree graphical models","volume":"12","author":"choi","year":"2011","journal-title":"JMLR"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191391"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2022538"},{"journal-title":"Network Tomography Based on Additive Metrics","year":"2008","author":"ni","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.838612"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461970"},{"key":"21","article-title":"Mapping and visualizing the internet","author":"cheswick","year":"2000","journal-title":"Proc of USENIX ATC"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2002.994558"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832534"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/633038.633039"},{"journal-title":"Biological Sequence Analysis Probabilistic Models of Proteins and Nucleic Acids","year":"1999","author":"durbin","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(86)90023-3"},{"journal-title":"Python Implementations of Bottom-up and Gbs Algorithms","year":"2012","author":"sattari","key":"26"},{"journal-title":"Active Learning of Multiple Source Multiple Destination Topologies","year":"2012","author":"sattari","key":"27"},{"journal-title":"The Geometry of Generalized Binary Search","year":"2011","author":"nowak","key":"28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948229.948230"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354575"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511337"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.884020"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749302"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195532"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993774"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.971737"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916660"}],"event":{"name":"2013 47th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2013,3,20]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 47th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6542220\/6552191\/06552253.pdf?arnumber=6552253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T18:29:09Z","timestamp":1754677749000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6552253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ciss.2013.6552253","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}