{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:19:31Z","timestamp":1725412771419},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/ngi.2010.5534457","type":"proceedings-article","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T16:23:28Z","timestamp":1280852608000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Empirical assessment of VoIP overload detection tests"],"prefix":"10.1109","author":[{"given":"Piotr","family":"Zuraniewski","sequence":"first","affiliation":[]},{"given":"Piotr","family":"\u017buraniewski","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Mandjes","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254856"},{"journal-title":"TCP Statistic and Analysis Tool","year":"2006","author":"mellia","key":"ref11"},{"key":"ref12","article-title":"Application of forecasting techniques and control charts for traffic anomaly detection","author":"m\u00fcnz","year":"2008","journal-title":"Proceedings of the 19th ITC Specialist Seminar on Network Usage and Traffic"},{"journal-title":"RFC 3550 RTP A transport protocol for real-time applications","year":"2002","author":"schulzrinne","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1862-1","author":"siegmund","year":"1985","journal-title":"Sequential Analysis"},{"key":"ref15","first-page":"331","article-title":"Changepoint detection in multichannel and distributed systems with applications","author":"tartakovsky","year":"2004","journal-title":"Applications of Sequential Methodologies"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/65.730748"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2006.1678244"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39889-9","article-title":"Big Queues","author":"ganesh","year":"2004","journal-title":"Lecture Notes in Mathematics 1838"},{"journal-title":"Large Deviation Techniques in Decision Simulation and Estimation","year":"1990","author":"bucklew","key":"ref3"},{"key":"ref6","article-title":"Adaptive CUSUM for anomaly detection and its application to detect shared congestion","author":"lin","year":"2007","journal-title":"Texas A&M University Technical Report"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/49.842990"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10406-0_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470515099"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.235"},{"journal-title":"Applied Probability and Queues","year":"2003","author":"asmussen","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853427"}],"event":{"name":"2010 6th EURO-NGI Conference on Next Generation Internet Networks (NGI)","start":{"date-parts":[[2010,6,2]]},"location":"Paris, France","end":{"date-parts":[[2010,6,4]]}},"container-title":["6th EURO-NGI Conference on Next Generation Internet"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5512517\/5534454\/05534457.pdf?arnumber=5534457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:01:26Z","timestamp":1559354486000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ngi.2010.5534457","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}