{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T19:28:28Z","timestamp":1765826908067,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T00:00:00Z","timestamp":1257292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,4]]},"DOI":"10.1145\/1644893.1644905","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"103-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Detecting traffic differentiation in backbone ISPs with NetPolice"],"prefix":"10.1145","author":[{"given":"Ying","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Zhuoqing Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arbor Ellacoya e100. http:\/\/www.arbornetworks.com.  Arbor Ellacoya e100. http:\/\/www.arbornetworks.com."},{"key":"e_1_3_2_1_2_1","unstructured":"AT&T Continues to Adjust TOS to Limit 3G Video. http:\/\/newteevee.com\/2009\/04\/29\/att-continues-to-adjust-tos-to-limit-3g-video.  AT&T Continues to Adjust TOS to Limit 3G Video. http:\/\/newteevee.com\/2009\/04\/29\/att-continues-to-adjust-tos-to-limit-3g-video."},{"key":"e_1_3_2_1_3_1","unstructured":"Schooner User-Configurable Lab Environment. http:\/\/www.schooner.wail.wisc.edu\/index.php3?stayhome=1.  Schooner User-Configurable Lab Environment. http:\/\/www.schooner.wail.wisc.edu\/index.php3?stayhome=1."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948219"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298329"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"Avramopoulos I.","year":"2006","unstructured":"I. Avramopoulos and J. Rexford . Stealth probing: Efficient data-plane security for IP routing . In Proceedings of USENIX Annual Technical Conference , 2006 . I. Avramopoulos and J. Rexford. Stealth probing: Efficient data-plane security for IP routing. In Proceedings of USENIX Annual Technical Conference, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 8th Passive and Active Measurement (PAM) Conference","author":"Beverly R.","year":"2007","unstructured":"R. Beverly , S. Bauer , and A. Berger . The Internet's Not a Big Truck: Toward Quantifying Network Neutrality . In Proceedings of the 8th Passive and Active Measurement (PAM) Conference , 2007 . R. Beverly, S. Bauer, and A. Berger. The Internet's Not a Big Truck: Toward Quantifying Network Neutrality. In Proceedings of the 8th Passive and Active Measurement (PAM) Conference, 2007."},{"key":"e_1_3_2_1_9_1","unstructured":"Cisco Systems. Configuring Port to Application Mapping. http:\/\/www.cisco.com\/en\/US\/products\/sw\/iosswrel\/ps1835\/products_configuration_guide_chapter09186a00800ca7c8.html.  Cisco Systems. Configuring Port to Application Mapping. http:\/\/www.cisco.com\/en\/US\/products\/sw\/iosswrel\/ps1835\/products_configuration_guide_chapter09186a00800ca7c8.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Cisco Systems. Configuring Priority Queueing. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_0\/qos\/configuration\/guide\/qcpq.html.  Cisco Systems. Configuring Priority Queueing. http:\/\/www.cisco.com\/en\/US\/docs\/ios\/12_0\/qos\/configuration\/guide\/qcpq.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Cisco Systems. Simple network management protocol.  Cisco Systems. Simple network management protocol."},{"key":"e_1_3_2_1_12_1","unstructured":"cPacket Networks Inc. Complete Packet Inspection on a Chip. http:\/\/www.cpacket.com\/.  cPacket Networks Inc. Complete Packet Inspection on a Chip. http:\/\/www.cpacket.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452523"},{"key":"e_1_3_2_1_14_1","unstructured":"Deep packet inspection. www.networkworld.com\/details\/6299.html.  Deep packet inspection. www.networkworld.com\/details\/6299.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749285"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. IEEE Global Internet Symposium","author":"Gao L.","year":"2000","unstructured":"L. Gao . On Inferring Autonomous System Relationships in the Internet . In Proc. IEEE Global Internet Symposium 2000 . L. Gao. On Inferring Autonomous System Relationships in the Internet. In Proc. IEEE Global Internet Symposium 2000."},{"key":"e_1_3_2_1_17_1","volume-title":"IP Quality of Service: Theory and best practices. www.sanog.org\/resources\/sanog4-kaulgud-qos-tutorial.pdf","author":"Kaulgud V. S.","year":"2004","unstructured":"V. S. Kaulgud . IP Quality of Service: Theory and best practices. www.sanog.org\/resources\/sanog4-kaulgud-qos-tutorial.pdf , 2004 . V. S. Kaulgud. IP Quality of Service: Theory and best practices. www.sanog.org\/resources\/sanog4-kaulgud-qos-tutorial.pdf, 2004."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2005.05.002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.208"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. Operating Systems Design and Implementation","author":"Madhyastha H. V.","year":"2006","unstructured":"H. V. Madhyastha , T. Isdal , M. Piatek , C. Dixon , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane: An Information Plane for Distributed Services . In Proc. Operating Systems Design and Implementation , 2006 . H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In Proc. Operating Systems Design and Implementation, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637237"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945456"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceeding of NSDI","author":"Mahajan R.","year":"2008","unstructured":"R. Mahajan , M. Zhang , L. Poole , and V. Pai . Uncovering Performance Differences in Backbone ISPs with Netdiff . In Proceeding of NSDI , 2008 . R. Mahajan, M. Zhang, L. Poole, and V. Pai. Uncovering Performance Differences in Backbone ISPs with Netdiff. In Proceeding of NSDI, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.707817"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of ACM HotNets","author":"Peterson L.","year":"2002","unstructured":"L. Peterson , T. Anderson , D. Culler , and T. Roscoe . A Blueprint for Introducing Disruptive Technology Into the Internet . In Proc. of ACM HotNets , 2002 . L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A Blueprint for Introducing Disruptive Technology Into the Internet. In Proc. of ACM HotNets, 2002."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298348"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. ACM HotNets","author":"Spring N.","year":"2002","unstructured":"N. Spring , D. Wetherall , and T. Anderson . Reverse-Engineering the Internet . In Proc. ACM HotNets , 2002 . N. Spring, D. Wetherall, and T. Anderson. Reverse-Engineering the Internet. In Proc. ACM HotNets, 2002."},{"key":"e_1_3_2_1_31_1","volume-title":"Kendall's Advanced Theory of Statistics","author":"Stuart A.","year":"1999","unstructured":"A. Stuart , K. Ord , and S. Arnold . Kendall's Advanced Theory of Statistics . Wiley , 1999 . A. Stuart, K. Ord, and S. Arnold. Kendall's Advanced Theory of Statistics. Wiley, 1999."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of ACM HotNets","author":"Tariq M. B.","year":"2008","unstructured":"M. B. Tariq , M. Motiwala , and N. Feamster . NANO: Network Access Neutrality Observatory . In Proceedings of ACM HotNets , 2008 . M. B. Tariq, M. Motiwala, and N. Feamster. NANO: Network Access Neutrality Observatory . In Proceedings of ACM HotNets, 2008."},{"key":"e_1_3_2_1_33_1","volume-title":"Ann. Math. Statist","author":"Tukey J.","year":"1958","unstructured":"J. Tukey . Bias and confidence in not quite large samples . Ann. Math. Statist , 1958 . J. Tukey. Bias and confidence in not quite large samples. Ann. Math. Statist, 1958."},{"key":"e_1_3_2_1_34_1","author":"Wright C.","year":"2006","unstructured":"C. Wright , F. Monrose , and G. Masson . On inferring application protocol behaviors in encrypted network traffic. In Journal of Machine Learning Research (JMLR): Special issue on Machine Learning for Computer Security , 2006 . C. Wright, F. Monrose, and G. Masson. On inferring application protocol behaviors in encrypted network traffic. In Journal of Machine Learning Research (JMLR): Special issue on Machine Learning for Computer Security, 2006.","journal-title":"In Journal of Machine Learning Research (JMLR): Special issue on Machine Learning for Computer Security"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of ACM HotNets","author":"Zhang Y.","year":"2008","unstructured":"Y. Zhang , M. Mao , and M. Zhang . Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs . In Proceedings of ACM HotNets , 2008 . Y. Zhang, M. Mao, and M. Zhang. Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs. In Proceedings of ACM HotNets, 2008."}],"event":{"name":"IMC '09: Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Chicago Illinois USA","acronym":"IMC '09"},"container-title":["Proceedings of the 9th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1644893.1644905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:18Z","timestamp":1750250478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,4]]},"references-count":35,"alternative-id":["10.1145\/1644893.1644905","10.1145\/1644893"],"URL":"https:\/\/doi.org\/10.1145\/1644893.1644905","relation":{},"subject":[],"published":{"date-parts":[[2009,11,4]]},"assertion":[{"value":"2009-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}