Joint TMA publications - journals and magazines

Warning: usort() expects parameter 1 to be array, boolean given in /www/htdocs/w0149d27/ on line 76

Warning: array_reverse() expects parameter 1 to be array, boolean given in /www/htdocs/w0149d27/ on line 79

Warning: Invalid argument supplied for foreach() in /www/htdocs/w0149d27/ on line 86
  • [oldfriend-abry] bibtex
    P. Abry, P. Borgnat, F. Ricciato, A. Scherrer, and D. Veitch, "Revisiting an old friend: on the observability of the relation between long range dependence and heavy tail," Telecommunication Systems, 2009.
    Visit  |  Download
    @article{oldfriend-abry, abstract = {Abstract  Taqqu’s Theorem plays a fundamental role in Internet traffic modeling, for two reasons: First, its theoretical formulation matches closely and in a meaningful manner some of the key network mechanisms controlling traffic characteristics; Second,it offers a plausible explanation for the origin of the long range dependence property in relation with the heavy tail natureof the traffic components. Numerous attempts have since been made to observe its predictions empirically, either from realInternet traffic data or from numerical simulations based on popular traffic models, yet rarely has this resulted in satisfactoryquantitative agreements. This raised in the literature a number of comments and questions, ranging from the adequacy of thetheorem to real world data to the relevance of the statistical tools involved in practical analyses. The present contributionaims at studying under which conditions this fundamental theorem can be actually seen at work on real or simulated data. Todo so, numerical simulations based on standard traffic models are analyzed in a wavelet framework. The key time scales involvedare derived, enabling a discussion of the origin and nature of the difficulties encountered in attempts to empirically observeTaqqu’s Theorem.},
      author = {Abry, Patrice and Borgnat, Pierre and Ricciato, Fabio and Scherrer, Antoine and Veitch, Darryl},
      interhash = {3b12f6cc7a9da0383f9b6b8ad381d3f4},
      intrahash = {493934aa6b1c14182b16db9c21a37a71},
      journal = {Telecommunication Systems},
      pages = {--},
      title = {Revisiting an old friend: on the observability of the relation between long range dependence and heavy tail},
      url = {},
      year = 2009 }
  • [dalconzo-IJNM-2010] bibtex
    A. D'Alconzo, A. Coluccia, and P. Romirer-Maierhofer, "Distribution-Based Anomaly Detection in 3G Mobile Networks: From Theory to Practice," International Journal of Network Management, 2010.
    @article{dalconzo-IJNM-2010, abstract = {The design of Anomaly Detection (AD) methods for network traffic has been intensively investigated by the research community in the recent years. However, less attention has been devoted to the issues which eventually arise when deploying such tools in a real operational context. We designed a statistical based change-detection algorithm for identifying deviations in distribution timeseries. The proposed method has been applied to the analysis of large dataset from an operational 3G mobile network, in the perspective of the adoption of such a tool in production. Our algorithm is designed to cope with the marked non-stationarity and daily/weekly seasonality that characterize the traffic mix in a large public network. Several practical issues emerged during the study including the need to handle incompleteness of the collected data, the difficulty to drill down the cause of certain alarms, the need for human assistance in resetting the algorithm after a persistent change of the network configuration (e.g. a capacity upgrade). We report on our practical experience, highlighting the key lessons learned and the hands-on experience matured from such an analysis. Finally, we propose a novel methodology based on semi-synthetic traces for tuning and performance assessment of the proposed AD algorithm.},
      author = {D'Alconzo, Alessandro and Coluccia, Angelo and Romirer-Maierhofer, Peter},
      interhash = {78a5c27d205845d793e213afaa008cd1},
      intrahash = {f91917aa7adbb1eef8e27d1cabf69c55},
      journal = {International Journal of Network Management},
      key = {Anomaly detection, 3G mobile networks},
      month = {August},
      title = {Distribution-Based Anomaly Detection in 3G Mobile Networks: From Theory to Practice},
      year = 2010 }
  • P. Marchetta, P. Mérindol, B. Donnet, A. Pescapé, J.-J. Pansiot. Topology Discovery at the Router Level: A New Hybrid Tool Targeting ISP Networks. In IEEE Journal on Selected Areas in Communication, Special Issue on Measurement of Internet Topologies, 29(9), October 2011. (link, this work of this paper has been carried out during a TMA STSM of Pietro Marchetta (from University of Napoli) at University of Louvain Le Neuve)
  • D. Rossi, D. Tammaro, S. Valenti, A. Pescapé. “Exploiting packet sampling measurements for traffic characterization and classification” International Journal of Network Management (Wiley), to appear, 2012.
  • A. Coluccia, A. D'Alconzo, F. Ricciato, On the optimality of max-min fairness in Resource Allocation, Annals of Telecommunications, March 2011 (link).
  • M. Mandjes and P. Zuraniewski, Tail asymptotics of the M/G/inf model, Stochastic Models, Vol. 27 Issue 1, pp.77-93, 2011, Download
  • M. Mandjes and P. Zuraniewski, M/G/inf transience, and its applications to overload detection, Performance Evaluation, Vol. 68 (6), 2011, pp. 507-527 Download
  • Markovich N.M., Krieger, U.R.. Statistical Analysis and Modeling of Skype VoIP Flows. Computer Communications (COMCOM), Vol.31, Supplement 1, S11-S21, 2010.
  • N. M. Markovich and U. R. Krieger. Statistical Analysis and Modeling of Peer-to-Peer Multimedia Traffic. In D. Kouvatsos  (ed.), Next Generation Internet,  Lecture Notes in Computer Science 5233,  Springer, 2011.
  • N.M. Markovich and U. R. Krieger. Statistical Inspection and Analysis Techniques for Traffic Data Arising from the Internet. Traffic and Performance Engineering for Heterogeneous Networks, D.D. Kouvatsos (Ed.), River Publishers Series in Information Science and Technology - Vol. 1, Chapter 2,pp. 41-60, 2009.
  • L. A. Grieco, C. Barakat, and M. Marzulli," Spectral Models for Bitrate Measurement from Packet Sampled Traffic", IEEE Trans. on Network and Service Management, vol. 8, no. 2, Jun., 2011.
  • B. Donnet, B. Gueye, and M. Kaafar. A Survey on Network Coordinates Systems, Design, and Security. In IEEE Communications Survey and Tutorial, vol. 12, no. 4, December 2010, pp. 488-503.
  • Antonio Barbuzzi, Fabio Ricciato, and Gennaro Boggia," Discovering parameter setting in 3G networks via active measurements", IEEE Commun. Letters, vol. 12, no. 10, Oct., 2008.
  • L. Jakab, A. Cabellos-Aparicio, F. Coras, D. Saucez, and O. Bonaventure, “LISP-TREE: A DNS Hierarchy to Support the LISP Mapping System,” In IEEE Journal on Selected Areas in Communications, vol. 28, no. 8, pp. 1332–1343, 2010.
  • Lucjan Janowski, Philippe Owezarski, "Assessing the accuracy of using aggregated traffic traces in network engineering", Telecommunication Systems, vol. 43, pp. 223-236, 2010
  • A. Finamore, M. Mellia, M. Meo and D. Rossi, KISS: Stochastic Packet Inspection Classifier for UDP Traffic, IEEE Transactions on Networking, 18(5):1505 - 1515, October 2010 (extended version of this TMA paper)
  • "Quality of Experience from user and network perspectives", J. Shaikh, M. Fiedler, D. Collange, Annals of Telecommunications, vol 65 N° 1-2, pp 47-57, February 2010 [pdf].
  • A. Finamore, M. Mellia, M. Meo, M. Munafo, D. Rossi, Experiences of Internet Traffic Monitoring with Tstat . IEEE Network Magazine, Special Issue on Network Traffic Monitoring and Analysis, May 2011.
  • M. Molina, I. Paredes-Oliva, W. Routly and P. Barlet-Ros. Operational Experiences with Anomaly Detection in Backbone Networks. Computers & Security, 2012.
  • A. Sperotto, M. Mandjes, R. Sadre, P.T. de Boer, A. Pras. Autonomic parameter tuning of anomaly-based IDSs: an SSH case study. To appear in IEEE Trans. Netw. Serv. Man. 2012
  • F. Fusco, X. Dimitropoulos, M. Vlachos, L. Deri. pcapIndex: An Index for Network Packet Traces with Legacy Compatibility. ACM SIGCOMM Computer Communication Review (CCR). Jan. 2012. [link]
  • Selim Ickin, Katarzyna Wac, Markus Fiedler, Lucjan Janowski, Jin-Huyk Hong, Anind K. Dey. Factors Influencing Quality of Experience of Commonly-Used Mobile Applications, IEEE Communications Magazine, Special Issue on QoE Management in Emerging Multimedia Services, April 2012.