{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:27:14Z","timestamp":1765826834966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T00:00:00Z","timestamp":1193184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,24]]},"DOI":"10.1145\/1298306.1298333","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"189-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Networkmd"],"prefix":"10.1145","author":[{"given":"Yun","family":"Mao","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA"}]},{"given":"Hani","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Shu","family":"Tao","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Hawthorne, NY"}]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"Bishop C. M.","year":"1995","unstructured":"C. M. Bishop . Neural Networks for Pattern Recognition . Oxford University Press , 1995 . C. M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1995."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1157"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.03.001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511337"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948230"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064256"},{"key":"e_1_3_2_1_7_1","unstructured":"EMC. SMARTS. http:\/\/www.emc.com\/products\/software\/smarts\/smarts_family\/. EMC. SMARTS. http:\/\/www.emc.com\/products\/software\/smarts\/smarts_family\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Statistical Science","author":"Gang L.","year":"2004","unstructured":"L. Gang , M. Coates , G. Liang , R. Nowak , and B. Yu . Internet Tomography: Recent Developments . Statistical Science , Mar 2004 . L. Gang, M. Coates, G. Liang, R. Nowak, and B. Yu. Internet Tomography: Recent Developments. Statistical Science, Mar 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 4th USENIX Symposium on Networked System Design and Implementation (NSDI)","author":"He Y.","year":"2007","unstructured":"Y. He , G. Siganos , M. Faloutsos , and S. Krishnamurthy . A systematic framework for unearthing the missing links: Measurements and impact . In Proceedings of the 4th USENIX Symposium on Networked System Design and Implementation (NSDI) , 2007 . Y. He, G. Siganos, M. Faloutsos, and S. Krishnamurthy. A systematic framework for unearthing the missing links: Measurements and impact. In Proceedings of the 4th USENIX Symposium on Networked System Design and Implementation (NSDI), 2007."},{"key":"e_1_3_2_1_10_1","unstructured":"Hewlett-Packard. Management Software: HPOpenView. http:\/\/h20229.www2.hp.com\/. Hewlett-Packard. Management Software: HPOpenView. http:\/\/h20229.www2.hp.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"iGlass. iGlass. http:\/\/www.iglass.net. iGlass. iGlass. http:\/\/www.iglass.net."},{"key":"e_1_3_2_1_12_1","volume-title":"Service Assurance Process Re-Engineering Using Location-aware Infrastructure Intelligence. the Tenth IFIP\/IEEE International Symposium on Integrated Network Management","author":"Jamjoom H.","year":"2007","unstructured":"H. Jamjoom , N. Anerousis , R. Jennings , and D. Saha . Service Assurance Process Re-Engineering Using Location-aware Infrastructure Intelligence. the Tenth IFIP\/IEEE International Symposium on Integrated Network Management , May 2007 . H. Jamjoom, N. Anerousis, R. Jennings, and D. Saha. Service Assurance Process Re-Engineering Using Location-aware Infrastructure Intelligence. the Tenth IFIP\/IEEE International Symposium on Integrated Network Management, May 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"IETF","author":"Jones D.","year":"2002","unstructured":"D. Jones and R. Woundy . RFC3256: The DOCSIS (Data-Over-Cable Service Interface Specifications) Device Class DHCP (Dynamic Host Configuration Protocol) Relay Agent Information Sub-option . IETF , April 2002 . D. Jones and R. Woundy. RFC3256: The DOCSIS (Data-Over-Cable Service Interface Specifications) Device Class DHCP (Dynamic Host Configuration Protocol) Relay Agent Information Sub-option. IETF, April 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of NSDI","author":"Kompella R. R.","year":"2005","unstructured":"R. R. Kompella , J. Yates , A. Greenberg , and A. C. Snoeren . IP fault localization via risk modeling . In Proceedings of NSDI , 2005 . R. R. Kompella, J. Yates, A. Greenberg, and A. C. Snoeren. IP fault localization via risk modeling. In Proceedings of NSDI, 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.252"},{"key":"e_1_3_2_1_17_1","first-page":"556","volume-title":"Proceedings of Neural Information Processing Systems (NIPS)","author":"Lee D. D.","year":"2000","unstructured":"D. D. Lee and H. S. Seung . Algorithms for non-negative matrix factorization . In Proceedings of Neural Information Processing Systems (NIPS) , pages 556 -- 562 , 2000 . D. D. Lee and H. S. Seung. Algorithms for non-negative matrix factorization. In Proceedings of Neural Information Processing Systems (NIPS), pages 556--562, 2000."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081894"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of IEEE Infocom","author":"Mao Z. M.","year":"2004","unstructured":"Z. M. Mao , D. Johnson , J. Rexford , J. Wang , and R. Katz . Scalable and accurate identification of AS-level forwarding paths . In Proceedings of IEEE Infocom , Mar 2004 . Z. M. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz. Scalable and accurate identification of AS-level forwarding paths. In Proceedings of IEEE Infocom, Mar 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064257"},{"key":"e_1_3_2_1_21_1","volume-title":"Effectiveness of shared risk link group auto-discovery in optical networks","author":"Sebos P.","year":"2002","unstructured":"P. Sebos , J. Yates , D. Rubenstein , and A. Greenberg . Effectiveness of shared risk link group auto-discovery in optical networks , 2002 . P. Sebos, J. Yates, D. Rubenstein, and A. Greenberg. Effectiveness of shared risk link group auto-discovery in optical networks, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019274"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of Network Operations and Management Symposium'98","author":"Wu P.","year":"1998","unstructured":"P. Wu , R. Bhatnagar , L. Epshtein , M. Bhandaru , and Z. Shi . Alarm correlation engine (ACE) . In Proceedings of Network Operations and Management Symposium'98 , Feb. 1998 . P. Wu, R. Bhatnagar, L. Epshtein, M. Bhandaru, and Z. Shi. Alarm correlation engine (ACE). In Proceedings of Network Operations and Management Symposium'98, Feb. 1998."}],"event":{"name":"IMC07: Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"],"location":"San Diego California USA","acronym":"IMC07"},"container-title":["Proceedings of the 7th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298333","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298306.1298333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:08Z","timestamp":1750254968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298333"}},"subtitle":["topology inference and failure diagnosis in the last mile"],"short-title":[],"issued":{"date-parts":[[2007,10,24]]},"references-count":23,"alternative-id":["10.1145\/1298306.1298333","10.1145\/1298306"],"URL":"https:\/\/doi.org\/10.1145\/1298306.1298333","relation":{},"subject":[],"published":{"date-parts":[[2007,10,24]]},"assertion":[{"value":"2007-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}