{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:48:31Z","timestamp":1771710511719,"version":"3.50.1"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972144"],"award-info":[{"award-number":["61972144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572184"],"award-info":[{"award-number":["61572184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61725206"],"award-info":[{"award-number":["61725206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61976087"],"award-info":[{"award-number":["61976087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2017JJ1010"],"award-info":[{"award-number":["2017JJ1010"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"U.S. NSF","award":["ECCS 78929"],"award-info":[{"award-number":["ECCS 78929"]}]},{"name":"U.S. NSF","award":["CNS 1526843"],"award-info":[{"award-number":["CNS 1526843"]}]},{"name":"Open Project Funding of State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences","award":["CARCH201809"],"award-info":[{"award-number":["CARCH201809"]}]},{"name":"CERNET Innovation Project","award":["NGII20190118"],"award-info":[{"award-number":["NGII20190118"]}]},{"name":"Open Foundation of State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications","award":["SKLNST-2018-1-20"],"award-info":[{"award-number":["SKLNST-2018-1-20"]}]},{"name":"Peng Cheng Laboratory Project of Guangdong Province","award":["PCL2018KP004"],"award-info":[{"award-number":["PCL2018KP004"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/tnet.2020.2987845","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T23:56:54Z","timestamp":1588636614000},"page":"1601-1614","source":"Crossref","is-referenced-by-count":25,"title":["Accurate and Fast Recovery of Network Monitoring Data With GPU-Accelerated Tensor Completion"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-2723","authenticated-orcid":false,"given":"Kun","family":"Xie","sequence":"first","affiliation":[]},{"given":"Yuxiang","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8639-3818","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4964-1135","authenticated-orcid":false,"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jigang","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Guangming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2392756"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2016.7495635"},{"key":"ref71","year":"2018","journal-title":"Randomness is Hard Learning About the Fisher-Yates Shuffle Algorithm Random Number Generation"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(83)90009-X"},{"key":"ref76","author":"bader","year":"2012","journal-title":"Matlab Tensor Toolbox Version 2 5"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1137\/120899066"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.862083"},{"key":"ref75","first-page":"8","article-title":"NVIDIA CUDA C programming guide","volume":"120","year":"2011","journal-title":"nVidia Corp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524463"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2010.06.030"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.08.272"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/164810"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057218"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111341"},{"key":"ref35","year":"2014","journal-title":"Abilene Observatory Data Collections"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2016.30"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783322"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"ref61","article-title":"CuMF_SGD: Fast and scalable matrix factorization","author":"xie","year":"2016","journal-title":"arXiv 1610 05838"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1137\/100805510"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-299-3"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1186785.1186794"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.2297439"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2797094"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2940147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2012.12.007"},{"key":"ref67","article-title":"Statistical tables for biological, agricultural and medical research","author":"fisher","year":"1949","journal-title":"Statistical Tables for Biological Agricultural and Medical Research"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/364520.364540"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/355666.355670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018451"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787471"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638517"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398818"},{"key":"ref21","first-page":"30","article-title":"VANET based traffic estimation: A matrix completion approach","author":"du","year":"2013","journal-title":"Proc IEEE Global Commun Conf (GLOBECOM)"},{"key":"ref24","first-page":"26","article-title":"The TOPHITS model for higher-order Web link analysis","volume":"7","author":"kolda","year":"2006","journal-title":"Proc Workshop Link Analysis Counterterrorism and Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639129"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1021\/ac00236a025"},{"key":"ref25","first-page":"3","article-title":"Toward an architecture for never-ending language learning","volume":"5","author":"carlson","year":"2010","journal-title":"Proc 24th AAAI Conf Artif Intell"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310791"},{"key":"ref51","first-page":"84","article-title":"Foundations of the PARAFAC procedure: Models and conditions for an &#x2018;explanatory&#x2019; multimodal factor analysis","volume":"16","author":"harshman","year":"1970","journal-title":"Psychology"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14778\/2732967.2732973"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507164"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020426"},{"key":"ref56","first-page":"1296","article-title":"DFacTo: Distributed factorization of tensors","author":"choi","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.27"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113355"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339583"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289464"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-828-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2819507"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.914732"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486332"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2761704"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.21236\/ADA439086"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857115"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/2291416"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/637209.637210"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2169424"},{"key":"ref4","author":"adams","year":"2017","journal-title":"NetNO-RAD Troubleshooting networks via end-to-end probing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787496"},{"key":"ref6","first-page":"55","article-title":"Detector: A topology-aware monitoring system for data center networks","author":"peng","year":"2017","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402968"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2819504"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592600"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1088\/0266-5611\/27\/2\/025010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218633"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.39"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046205"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/cem.1335"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2010.08.004"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"ref41","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2001","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10208-009-9045-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s12532-012-0044-1"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/9169972\/9085953-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9169972\/09085953.pdf?arnumber=9085953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:42:25Z","timestamp":1651070545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9085953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":76,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2020.2987845","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}