{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:20:24Z","timestamp":1725672024690},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/iwcmc.2012.6314275","type":"proceedings-article","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T22:07:23Z","timestamp":1349820443000},"page":"619-624","source":"Crossref","is-referenced-by-count":6,"title":["Internet traffic clustering with constraints"],"prefix":"10.1109","author":[{"given":"Yu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shunzheng","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"19","article-title":"Semi-supervised learning by seeding","author":"basu","year":"2002","journal-title":"Proceedings of the 19th International Conference on Machine Learning (ICML '02"},{"key":"17","first-page":"577","article-title":"Constrained K-means Clustering with Background Knowledge","author":"wagstaff","year":"2001","journal-title":"Proceedings of 18th International Conference on Machine Learning (ICML '01"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015360"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644908"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177123"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1882486.1882539"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254934"},{"year":"0","key":"21"},{"key":"20","first-page":"674","article-title":"K-Means with large and noisy constraint sets","author":"pelleg","year":"0","journal-title":"Proceedings of ECML 2007"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330110"},{"year":"0","key":"23"},{"key":"24","article-title":"When is constrained clustering beneficial, and why?","author":"wagstaff","year":"2006","journal-title":"Proc AAAI'06"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080119"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"27","article-title":"Taekyoung\" kwon and yanghee choi, internet traffic classification demystified: On the sources of the discriminative power","author":"lim","year":"2010","journal-title":"Proc ACM CoNEXT"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059997"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.883010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"Flow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Proc Passive and Active Measurement Workshop"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879184"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198257"},{"key":"4","article-title":"Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networks","author":"nguyen","year":"2006","journal-title":"Proc IEEE 31st Conference on Local Computer Networks (LCN '06"},{"key":"9","article-title":"Internet traffic identification using machine learning techniques","author":"erman","year":"2006","journal-title":"Proc of 49th IEEE Global Telecommunications Conference (GLOBECOM '06"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"}],"event":{"name":"2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC 2012)","start":{"date-parts":[[2012,8,27]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2012,8,31]]}},"container-title":["2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6299140\/6314161\/06314275.pdf?arnumber=6314275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:11:45Z","timestamp":1498007505000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6314275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2012.6314275","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}