<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Du, Wei</style></author><author><style face="normal" font="default" size="100%">Liao, Yongjun</style></author><author><style face="normal" font="default" size="100%">Tao, Narisu</style></author><author><style face="normal" font="default" size="100%">Geurts, Pierre</style></author><author><style face="normal" font="default" size="100%">Fu, Xiaoming</style></author><author><style face="normal" font="default" size="100%">Leduc, Guy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Rating Network Paths for Locality-Aware Overlay Construction and Routing</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE/ACM Transactions on Networking</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">matrix factorization</style></keyword><keyword><style  face="normal" font="default" size="100%">network inference</style></keyword><keyword><style  face="normal" font="default" size="100%">rating-based network measurement</style></keyword><keyword><style  face="normal" font="default" size="100%">recommender system</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper investigates the rating of network paths,&amp;nbsp;i.e. acquiring quantized measures of path properties such as&amp;nbsp;round-trip time and available bandwidth. Comparing to finegrained&amp;nbsp;measurements, coarse-grained ratings are appealing in&amp;nbsp;that they are not only informative but also cheap to obtain.&lt;/p&gt;&lt;p&gt;Motivated by this insight, we firstly address the scalable&amp;nbsp;acquisition of path ratings by statistical inference. By observing&amp;nbsp;similarities to recommender systems, we examine the applicability&amp;nbsp;of solutions to recommender system and show that our&amp;nbsp;inference problem can be solved by a class of matrix factorization&amp;nbsp;techniques. A technical contribution is an active and progressive&amp;nbsp;inference framework that not only improves the accuracy by&amp;nbsp;selectively measuring more informative paths but also speeds&amp;nbsp;up the convergence for available bandwidth by incorporating its&amp;nbsp;measurement methodology.&lt;/p&gt;&lt;p&gt;Then, we investigate the usability of rating-based network&amp;nbsp;measurement and inference in applications. A case study is&amp;nbsp;performed on whether locality awareness can be achieved for&amp;nbsp;overlay networks of Pastry and BitTorrent using inferred ratings.&lt;/p&gt;&lt;p&gt;We show that such coarse-grained knowledge can improve the&amp;nbsp;performance of peer selection and that finer granularities do not&amp;nbsp;always lead to larger improvements.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue><section><style face="normal" font="default" size="100%">1661</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pierdomenico Fiadino</style></author><author><style face="normal" font="default" size="100%">Alessandro D'Alconzo</style></author><author><style face="normal" font="default" size="100%">Mirko Schiavone</style></author><author><style face="normal" font="default" size="100%">Pedro Casas</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RCATool - A Framework for Detecting and Diagnosing Anomalies in Cellular Networks</style></title><secondary-title><style face="normal" font="default" size="100%">27th International Teletraffic Congress (ITC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Papadimitriou, D.</style></author><author><style face="normal" font="default" size="100%">Fortz, B.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust cooperative monitoring problem</style></title><secondary-title><style face="normal" font="default" size="100%">Reliable Networks Design and Modeling (RNDM), 2015 7th International Workshop on</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">box+ellipsoidal perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">box+polyhedral perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperative communication</style></keyword><keyword><style  face="normal" font="default" size="100%">integer programming</style></keyword><keyword><style  face="normal" font="default" size="100%">linear programming</style></keyword><keyword><style  face="normal" font="default" size="100%">MILP</style></keyword><keyword><style  face="normal" font="default" size="100%">Minimization</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed-integer linear program</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Optimization</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point configuration</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point placement</style></keyword><keyword><style  face="normal" font="default" size="100%">robust cooperative monitoring problem</style></keyword><keyword><style  face="normal" font="default" size="100%">Robustness</style></keyword><keyword><style  face="normal" font="default" size="100%">Routing</style></keyword><keyword><style  face="normal" font="default" size="100%">telecommunication traffic</style></keyword><keyword><style  face="normal" font="default" size="100%">time-varying traffic flow monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Topology</style></keyword><keyword><style  face="normal" font="default" size="100%">Uncertainty</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Oct</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dimitri Papadimitriou</style></author><author><style face="normal" font="default" size="100%">Bernard Fortz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust Cooperative Monitoring Problem</style></title><secondary-title><style face="normal" font="default" size="100%">7th International Workshop on Reliable Networks Design and Modeling (RNDM) 2015</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2015</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">IEEE XPlore</style></publisher><pub-location><style face="normal" font="default" size="100%">Munich, Germany</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dimitri Papadimitriou</style></author><author><style face="normal" font="default" size="100%">Bernard Fortz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust cooperative monitoring problem</style></title><secondary-title><style face="normal" font="default" size="100%">Reliable Networks Design and Modeling (RNDM), 2015 7th International Workshop on</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">box+ellipsoidal perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">box+polyhedral perturbation set</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperative communication</style></keyword><keyword><style  face="normal" font="default" size="100%">integer programming</style></keyword><keyword><style  face="normal" font="default" size="100%">linear programming</style></keyword><keyword><style  face="normal" font="default" size="100%">MILP</style></keyword><keyword><style  face="normal" font="default" size="100%">Minimization</style></keyword><keyword><style  face="normal" font="default" size="100%">mixed-integer linear program</style></keyword><keyword><style  face="normal" font="default" size="100%">Monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Optimization</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point configuration</style></keyword><keyword><style  face="normal" font="default" size="100%">passive monitoring point placement</style></keyword><keyword><style  face="normal" font="default" size="100%">robust cooperative monitoring problem</style></keyword><keyword><style  face="normal" font="default" size="100%">Robustness</style></keyword><keyword><style  face="normal" font="default" size="100%">Routing</style></keyword><keyword><style  face="normal" font="default" size="100%">telecommunication traffic</style></keyword><keyword><style  face="normal" font="default" size="100%">time-varying traffic flow monitoring</style></keyword><keyword><style  face="normal" font="default" size="100%">Topology</style></keyword><keyword><style  face="normal" font="default" size="100%">Uncertainty</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2015</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maurizio Dusi</style></author><author><style face="normal" font="default" size="100%">Roberto Bifulco</style></author><author><style face="normal" font="default" size="100%">Francesco Gringoli</style></author><author><style face="normal" font="default" size="100%">Fabian Schneider</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Reactive Logic in Software-Defined Networking: Measuring Flow-Table Requirements</style></title><secondary-title><style face="normal" font="default" size="100%">5th International Workshop on TRaffic Analysis and Characterization (TRAC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Nicosia, Cyprus</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">B. Trammell</style></author><author><style face="normal" font="default" size="100%">P. Aitken</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Revision of the tcpControlBits IP Flow Information Export (IPFIX) Information Element (RFC 7125)</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">02/2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.ietf.org/rfc/rfc7125.txt</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;pre&gt;This document revises the tcpControlBits IP Flow Information Export (IPFIX) Information Element as originally defined in &lt;a href=&quot;http://tools.ietf.org/html/rfc5102&quot;&gt;RFC 5102&lt;/a&gt; to reflect changes to the TCP Flags header field since &lt;a href=&quot;http://tools.ietf.org/html/rfc793&quot;&gt;RFC 793&lt;/a&gt;.&lt;/pre&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Revisiting size-based scheduling with estimated job sizes</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dell'Amico, Matteo</style></author><author><style face="normal" font="default" size="100%">Carra, Damiano</style></author><author><style face="normal" font="default" size="100%">Pastorelli, Mario</style></author><author><style face="normal" font="default" size="100%">Michiardi, Pietro</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Revisiting size-based scheduling with estimated job sizes</style></title><secondary-title><style face="normal" font="default" size="100%">{MASCOTS} 2014, {IEEE} 22nd {I}nternational {S}ymposium on {M}odeling analysis and simulation of computer and telecommunication systems, {S}eptember 9-11, 2014, {P}aris, {F}rance / {A}lso published on {A}r{X}iv</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">03</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.eurecom.fr/publication/4268</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">{P}aris, {FRANCE}</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">C. Chirichella</style></author><author><style face="normal" font="default" size="100%">D Rossi</style></author><author><style face="normal" font="default" size="100%">C. Testa</style></author><author><style face="normal" font="default" size="100%">T. Friedman</style></author><author><style face="normal" font="default" size="100%">A. Pescape</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Remotely Gauging Upstream Bufferbloat Delays</style></title><secondary-title><style face="normal" font="default" size="100%">Passive and Active Measurement (PAM)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.enst.fr/ drossi/paper/rossi13pam.pdf</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">  ``Bufferbloat'' is the growth in buffer size that has led Internet
  delays to occasionally exceed the light propagation delay from the Earth
  to the Moon. Manufacturers have built in large buffers to prevent
  losses on Wi-Fi, cable and ADSL links. But the combination of some links'
  limited bandwidth with TCP's tendency to saturate that
  bandwidth results in  excessive queuing delays. In response, new
  congestion control protocols such as BitTorrent's uTP/LEDBAT aim at
  explicitly limiting the delay that they add over the bottleneck link.
This work proposes and validate a methodology to monitor the upstream
    queuing delay experienced by remote hosts, both those using
  LEDBAT, through LEDBAT's native one-way delay measurements, and
  those using TCP (via the Time-stamp Option). 
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gregory Detal</style></author><author><style face="normal" font="default" size="100%">Benjamin Hesmans</style></author><author><style face="normal" font="default" size="100%">Olivier Bonaventure</style></author><author><style face="normal" font="default" size="100%">Yves Vanaubel</style></author><author><style face="normal" font="default" size="100%">Benoit Donnet</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Revealing Middlebox Interference with Tracebox</style></title><secondary-title><style face="normal" font="default" size="100%">ACM/USENIX Internet Measurement Conference (IMC)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">middlebox</style></keyword><keyword><style  face="normal" font="default" size="100%">network discovery</style></keyword><keyword><style  face="normal" font="default" size="100%">tracebox</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2013</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Middleboxes such as firewalls, NAT, proxies, or Deep Pack-et Inspection play an&amp;nbsp;increasingly important role in various types of IP networks, including&amp;nbsp;enterprise and cellular networks. Recent studies have shed the light on their&amp;nbsp;impact on real traffic and the complexity of managing them. Network operators&amp;nbsp;and researchers have few tools to understand the impact of those boxes on any&lt;br /&gt;path. In this paper, we propose tracebox, an extension to the widely used&amp;nbsp;traceroute tool, that is capable of detecting various types of middlebox&amp;nbsp;interference over almost any path. &amp;nbsp;tracebox sends IP packets containing TCP&amp;nbsp;segments with different TTL values and analyses the packet encapsulated in the&amp;nbsp;returned ICMP messages. Further, as recent routers quote, in the ICMP message,&amp;nbsp;the entire IP packet that they received, tracebox is able to detect any&amp;nbsp;modification performed by upstream middleboxes. In addition, tracebox can often&amp;nbsp;pinpoint the network hop where the middlebox interference occurs. We evaluate&amp;nbsp;tracebox with measurements performed on PlanetLab nodes. Our analysis reveals&amp;nbsp;various types of middleboxes that were not expected on such an experimental&amp;nbsp;testbed supposed to be connected to the Internet without any restriction.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Narseo Vallina-Rodriguez</style></author><author><style face="normal" font="default" size="100%">A. Aucinas</style></author><author><style face="normal" font="default" size="100%">M. Almeida</style></author><author><style face="normal" font="default" size="100%">Yan Grunenberger</style></author><author><style face="normal" font="default" size="100%">Konstantina Papagiannaki</style></author><author><style face="normal" font="default" size="100%">Jon Crowcroft</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">RILAnalyzer: a Comprehensive 3G Monitor on Your Phone</style></title><secondary-title><style face="normal" font="default" size="100%">Internet Measurement Conference (IMC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>