{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:35:52Z","timestamp":1729658152769,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682300","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:08:43Z","timestamp":1294409323000},"page":"263-270","source":"Crossref","is-referenced-by-count":8,"title":["Internet topology on as-level: Model, generation methods and tool"],"prefix":"10.1109","author":[{"given":"Joanna","family":"Tomasik","sequence":"first","affiliation":[]},{"given":"Marc-Antoine","family":"Weisser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354576"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2001.948886"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"ref31","article-title":"Scalable and accurate identification on AS-level forwarding paths","author":"mao","year":"2004","journal-title":"INFOCOM"},{"key":"ref30","article-title":"The Internet AS-level topology: Three data sources and one definitive metric","volume":"512095","author":"mahadevan","year":"2005","journal-title":"CoRR"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061988"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096546"},{"key":"ref35","volume":"4","author":"rekhter","year":"2006","journal-title":"Rfc 4271-A Border Gateway Protocol 4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375482"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.892878"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019307"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.69"},{"key":"ref12","article-title":"On distinguishing between Internet power law topology generators","author":"bu","year":"2002","journal-title":"INFOCOM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.03.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.234"},{"key":"ref15","article-title":"A statistical approach to the traceroute-like exploration of networks: theory and simulations","author":"dall'asta","year":"2004","journal-title":"CoRR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1996.586131"},{"key":"ref18","article-title":"From biological networks to the Internet and WWW","author":"dorogovtsev","year":"2003","journal-title":"Oxford University Press"},{"key":"ref19","first-page":"290","article-title":"On random graphs","author":"erd\u00f6s","year":"1959","journal-title":"Publicationes Mathematic\ufffd"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208685"},{"journal-title":"University of Oregon Route Views Project","year":"0","key":"ref4"},{"key":"ref27","first-page":"85","article-title":"Complexity of Computer Computation","author":"karp","year":"1972","journal-title":"chapter Reducibility among combinatorial problems"},{"journal-title":"RIPE NCC Routing Information Service","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.5234"},{"key":"ref29","article-title":"iPlane: An information plane for distributed services","author":"madhyastha","year":"2006","journal-title":"OSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335326"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barab\u00e1si","year":"1999","journal-title":"Science"},{"key":"ref7","article-title":"The many facets of Internet topology and traffic","volume":"4","author":"alderson","year":"2006","journal-title":"AIMS J Netw Heterogeneous Media"},{"journal-title":"Caida AS links","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199065"},{"journal-title":"Archipelago","year":"0","key":"ref1"},{"key":"ref46","article-title":"How to model an internetwork","author":"zegura","year":"1996","journal-title":"INFOCOM"},{"key":"ref20","article-title":"On the strength of connectedness of a random graph","volume":"12","author":"erd\u00f6s","year":"1961","journal-title":"Acta Mathematica Hungarica"},{"key":"ref45","article-title":"Intelligent Quality of Service Technologies and Network Management","author":"weisser","year":"2010","journal-title":"Models for Enhancing Communication chapter Exploiting the inter-domain hierarchy for the QoS management IGI Global"},{"key":"ref22","article-title":"On inferring Autonomous System relationships in the Internet","volume":"9","author":"gao","year":"2001","journal-title":"IEEE\/ACM Trans on Networking"},{"journal-title":"Human Behavior and the Principle of Least Effort","year":"1949","author":"zipf","key":"ref47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/49.12889"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79232-1_1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.47"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.434397"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79549-0_41"},{"key":"ref26","article-title":"Inet: Internet topology generator","author":"jin","year":"2000","journal-title":"Technical report Dpt of EECS U of Michigan"},{"key":"ref43","article-title":"Automatic induction of inter-domain hierarchy in randomly generated network topologies","author":"weisser","year":"2007","journal-title":"Springsim 2007 (CNS'07)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.644557"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682300.pdf?arnumber=5682300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T10:54:15Z","timestamp":1592218455000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682300","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}