{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:47:56Z","timestamp":1754110076932,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Research Council of Norway","award":["209954"],"award-info":[{"award-number":["209954"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3355369.3355591","type":"proceedings-article","created":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T12:57:15Z","timestamp":1571403435000},"page":"358-364","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Multiway Reliability Analysis of Mobile Broadband Networks"],"prefix":"10.1145","author":[{"given":"Mah-Rukh","family":"Fida","sequence":"first","affiliation":[{"name":"SimulaMet, Oslo, Norway"}]},{"given":"Evrim","family":"Acar","sequence":"additional","affiliation":[{"name":"SimulaMet, Oslo, Norway"}]},{"given":"Ahmed","family":"Elmokashfi","sequence":"additional","affiliation":[{"name":"SimulaMet, Oslo, Norway"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"volume-title":"Modeling and Multiway Analysis of Chatroom Tensors. In ISI: Proceedings of the IEEE International Conference on Intelligence and Security Informatics. 256--268","author":"Acar E.","key":"e_1_3_2_1_1_1","unstructured":"E. Acar , S. A. \u00c7amtepe , M. S. Krishnamoorthy , and B. Yener . 2005 . Modeling and Multiway Analysis of Chatroom Tensors. In ISI: Proceedings of the IEEE International Conference on Intelligence and Security Informatics. 256--268 . E. Acar, S. A. \u00c7amtepe, M. S. Krishnamoorthy, and B. Yener. 2005. Modeling and Multiway Analysis of Chatroom Tensors. In ISI: Proceedings of the IEEE International Conference on Intelligence and Security Informatics. 256--268."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2010.08.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.112"},{"volume-title":"Proceedings of the Internet Measurement Conference, IMC'14","author":"Baltrunas D.","key":"e_1_3_2_1_4_1","unstructured":"D. Baltrunas , A. Elmokashfi , and A. Kvalbein . 2014. Measuring the Reliability of Mobile Broadband Networks . In Proceedings of the Internet Measurement Conference, IMC'14 . 45--58. D. Baltrunas, A. Elmokashfi, and A. Kvalbein. 2014. Measuring the Reliability of Mobile Broadband Networks. In Proceedings of the Internet Measurement Conference, IMC'14. 45--58."},{"volume-title":"IEEE Conference on Computer Communications, INFOCOM'15","author":"Baltrunas D.","key":"e_1_3_2_1_5_1","unstructured":"D. Baltrunas , A. Elmokashfi , and A. Kvalbein . 2015. Dissecting packet loss in mobile broadband networks from the edge . In IEEE Conference on Computer Communications, INFOCOM'15 . 388--396. D. Baltrunas, A. Elmokashfi, and A. Kvalbein. 2015. Dissecting packet loss in mobile broadband networks from the edge. In IEEE Conference on Computer Communications, INFOCOM'15. 388--396."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(97)00032-4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/cem.801"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310791"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"M. D. Cirillo R. Mirdell F. Sj\u00f6berg and T. D. Pham. 2019. Tensor Decomposition for Colour Image Segmentation of Burn Wounds. Scientific Reports 9 1 (2019).  M. D. Cirillo R. Mirdell F. Sj\u00f6berg and T. D. Pham. 2019. Tensor Decomposition for Colour Image Segmentation of Burn Wounds. Scientific Reports 9 1 (2019).","DOI":"10.1038\/s41598-019-39782-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneumeth.2015.03.018"},{"volume-title":"Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom'17","author":"Elmokashfi A.","key":"e_1_3_2_1_11_1","unstructured":"A. Elmokashfi , D. Zhou , and D. Baltr\u00fcnas . 2017. Adding the Next Nine: An Investigation of Mobile Broadband Networks Availability . In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom'17 . 88--100. A. Elmokashfi, D. Zhou, and D. Baltr\u00fcnas. 2017. Adding the Next Nine: An Investigation of Mobile Broadband Networks Availability. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, MobiCom'17. 88--100."},{"key":"e_1_3_2_1_12_1","volume-title":"Foundations of the PARAFAC procedure: Models and conditions for an \"explanatory\" multi-modal factor analysis. UCLA working papers in phonetics 16","author":"Harshman R. A.","year":"1970","unstructured":"R. A. Harshman . 1970. Foundations of the PARAFAC procedure: Models and conditions for an \"explanatory\" multi-modal factor analysis. UCLA working papers in phonetics 16 ( 1970 ), 1--84. R. A. Harshman. 1970. Foundations of the PARAFAC procedure: Models and conditions for an \"explanatory\" multi-modal factor analysis. UCLA working papers in phonetics 16 (1970), 1--84."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(90)90014-6"},{"key":"e_1_3_2_1_14_1","volume-title":"Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended). Technical Report ISI-TR-724. usc-isi.","author":"Heidemann J.","year":"2018","unstructured":"J. Heidemann , Y. Pradkin , and A. Nisar . 2018 . Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended). Technical Report ISI-TR-724. usc-isi. J. Heidemann, Y. Pradkin, and A. Nisar. 2018. Back Out: End-to-end Inference of Common Points-of-Failure in the Internet (extended). Technical Report ISI-TR-724. usc-isi."},{"key":"e_1_3_2_1_15_1","unstructured":"N. E. Helwig. 2019. Package multiway. https:\/\/cran.r-project.org\/web\/packages\/multiway\/multiway.pdf.  N. E. Helwig. 2019. Package multiway. https:\/\/cran.r-project.org\/web\/packages\/multiway\/multiway.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"D. Hong T. G. Kolda and J. A. Duersch. 2019. Generalized Canonical Polyadic Tensor Decomposition. SIAM Rev. (2019).  D. Hong T. G. Kolda and J. A. Duersch. 2019. Generalized Canonical Polyadic Tensor Decomposition. SIAM Rev. (2019).","DOI":"10.1137\/18M1203626"},{"volume-title":"Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, Harvard Medical School","author":"Kim H.","key":"e_1_3_2_1_17_1","unstructured":"H. Kim , H. Park , and L. Eld\u00e9n . 2007. Non-negative Tensor Factorization Based on Alternating Large-scale Non-negativity-constrained Least Squares . In Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, Harvard Medical School , Boston, MA, USA. 1147--1151. H. Kim, H. Park, and L. Eld\u00e9n. 2007. Non-negative Tensor Factorization Based on Alternating Large-scale Non-negativity-constrained Least Squares. In Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, Harvard Medical School, Boston, MA, USA. 1147--1151."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(77)90069-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.036"},{"volume-title":"Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD'03","author":"Lin J.","key":"e_1_3_2_1_21_1","unstructured":"J. Lin , E. J. Keogh , S. Lonardi , and B. Yuan-chi Chiu . 2003. A symbolic representation of time series, with implications for streaming algorithms . In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD'03 . 2--11. J. Lin, E. J. Keogh, S. Lonardi, and B. Yuan-chi Chiu. 2003. A symbolic representation of time series, with implications for streaming algorithms. In Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, DMKD'03. 2--11."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1114856"},{"volume-title":"Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom'15","author":"Nguyen B.","key":"e_1_3_2_1_23_1","unstructured":"B. Nguyen , Z. Ge , J. E. van der Merwe, H. Yan, and J. Yates. 2015. ABSENCE: Usage-based Failure Detection in Mobile Networks . In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom'15 . 464--476. B. Nguyen, Z. Ge, J.E. van der Merwe, H. Yan, and J. Yates. 2015. ABSENCE: Usage-based Failure Detection in Mobile Networks. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, MobiCom'15. 464--476."},{"volume-title":"PAM'19","author":"Padmanabhan R.","key":"e_1_3_2_1_24_1","unstructured":"R. Padmanabhan , A. Schulman , A. Dainotti , D. Levin , and N. Spring . 2019. How to Find Correlated Internet Failures. In Passive and Active Measurement - 20th International Conference , PAM'19 , Proceedings. 210--227. R. Padmanabhan, A. Schulman, A. Dainotti, D. Levin, and N. Spring. 2019. How to Find Correlated Internet Failures. In Passive and Active Measurement - 20th International Conference, PAM'19, Proceedings. 210--227."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915921"},{"volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2080--2089","author":"Perros I.","key":"e_1_3_2_1_26_1","unstructured":"I. Perros , E. E. Papalexakis , H. Park , R. W. Vuduc , X. Yan , C. Defilippi , W. F. Stewart , and J. Sun . 2018. SUSTain: Scalable Unsupervised Scoring for Tensors and its Application to Phenotyping . In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2080--2089 . I. Perros, E. E. Papalexakis, H. Park, R. W. Vuduc, X. Yan, C. Defilippi, W. F. Stewart, and J. Sun. 2018. SUSTain: Scalable Unsupervised Scoring for Tensors and its Application to Phenotyping. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2080--2089."},{"volume-title":"Proceedings of the Internet Measurement Conference, IMC '18","author":"Richter P.","key":"e_1_3_2_1_27_1","unstructured":"P. Richter , R. Padmanabhan , N. Spring , A. W. Berger , and D. Clark . 2018. Advancing the Art of Internet Edge Outage Detection . In Proceedings of the Internet Measurement Conference, IMC '18 . 350--363. P. Richter, R. Padmanabhan, N. Spring, A. W. Berger, and D. Clark. 2018. Advancing the Art of Internet Edge Outage Detection. In Proceedings of the Internet Measurement Conference, IMC '18. 350--363."},{"volume-title":"Proceedings of the Twenty-Second International Conference (ICML '05)","author":"Shashua A.","key":"e_1_3_2_1_28_1","unstructured":"A. Shashua and T. Hazan . 2005. Non-negative tensor factorization with applications to statistics and computer vision. In Machine Learning , Proceedings of the Twenty-Second International Conference (ICML '05) . 792--799. A. Shashua and T. Hazan. 2005. Non-negative tensor factorization with applications to statistics and computer vision. In Machine Learning, Proceedings of the Twenty-Second International Conference (ICML '05). 792--799."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"A. Smilde R. Bro and P. Geladi. 2004. Multi-Way Analysis: Applications in the Chemical Sciences. Wiley West Sussex England.  A. Smilde R. Bro and P. Geladi. 2004. Multi-Way Analysis: Applications in the Chemical Sciences. Wiley West Sussex England.","DOI":"10.1002\/0470012110"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2004.07.003"},{"volume-title":"Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies, CoNEXT'18","author":"Trevisan M.","key":"e_1_3_2_1_31_1","unstructured":"M. Trevisan , D. Giordano , I. Drago , M. Mellia , and M. M. Munaf\u00f2 . 2018. Five years at the edge: watching Internet from the ISP network . In Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies, CoNEXT'18 . 1--12. M. Trevisan, D. Giordano, I. Drago, M. Mellia, and M. M. Munaf\u00f2. 2018. Five years at the edge: watching Internet from the ISP network. In Proceedings of the 14th International Conference on emerging Networking Experiments and Technologies, CoNEXT'18. 1--12."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289464"},{"volume-title":"IEEE Conference on Computer Communications, INFOCOM '18","author":"Xie K.","key":"e_1_3_2_1_33_1","unstructured":"K. Xie , X. Li , X. Wang , G. Xie , J. Wen , and D. Zhang . 2018. Graph based Tensor Recovery for Accurate Internet Anomaly Detection . In IEEE Conference on Computer Communications, INFOCOM '18 . 1502--1510. K. Xie, X. Li, X. Wang, G. Xie, J. Wen, and D. Zhang. 2018. Graph based Tensor Recovery for Accurate Internet Anomaly Detection. In IEEE Conference on Computer Communications, INFOCOM '18. 1502--1510."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2623950"}],"event":{"name":"IMC '19: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Amsterdam Netherlands","acronym":"IMC '19"},"container-title":["Proceedings of the Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3355369.3355591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:33Z","timestamp":1750202613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3355369.3355591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":34,"alternative-id":["10.1145\/3355369.3355591","10.1145\/3355369"],"URL":"https:\/\/doi.org\/10.1145\/3355369.3355591","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}