{"id":"https://openalex.org/W2152519519","doi":"https://doi.org/10.1109/.2006.1629446","title":"Monitor Placement for Stepping Stone Analysis","display_name":"Monitor Placement for Stepping Stone Analysis","publication_year":2006,"publication_date":"2006-05-25","ids":{"openalex":"https://openalex.org/W2152519519","doi":"https://doi.org/10.1109/.2006.1629446","mag":"2152519519"},"language":"en","primary_location":{"id":"doi:10.1109/.2006.1629446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103570765","display_name":"Yongping Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yongping Tang","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA#TAB#"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA#TAB#","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033159009","display_name":"Y. Liverpool","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Y. Liverpool","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104089687","display_name":"Thomas E. Daniels","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"T.E. Daniels","raw_affiliation_strings":["Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Iowa State University, Ames, IA, USA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5103570765"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.752,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7299791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"505","last_page":"512"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.7708652019500732},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7154682874679565},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5846801996231079},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.537392258644104},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.47940585017204285},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.47546714544296265},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.436617374420166},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4007090628147125},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.36528265476226807},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2917308807373047},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2659139633178711},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16839247941970825},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1566036343574524}],"concepts":[{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.7708652019500732},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7154682874679565},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5846801996231079},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.537392258644104},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.47940585017204285},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.47546714544296265},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.436617374420166},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4007090628147125},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.36528265476226807},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2917308807373047},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2659139633178711},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16839247941970825},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1566036343574524},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/.2006.1629446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/.2006.1629446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2006 IEEE International Performance Computing and Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323106","display_name":"Agricultural Research Development Agency","ror":"https://ror.org/01shbv660"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W127688506","https://openalex.org/W639714327","https://openalex.org/W1769673647","https://openalex.org/W1967570846","https://openalex.org/W1971937094","https://openalex.org/W1984953641","https://openalex.org/W1995875735","https://openalex.org/W2011039300","https://openalex.org/W2048093764","https://openalex.org/W2079886069","https://openalex.org/W2119030343","https://openalex.org/W2122403661","https://openalex.org/W2171707538","https://openalex.org/W3100931412"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W3119129187","https://openalex.org/W2765578992"],"abstract_inverted_index":{"The":[0,52],"precondition":[1],"for":[2,30,50,117],"stepping-stone":[3],"analysis":[4],"is":[5,55,106,108,137],"to":[6,20,124,148],"record":[7],"network":[8,11,39,70,143],"events":[9],"through":[10],"monitors.":[12,22],"Little":[13],"work":[14,90],"has":[15],"been":[16],"done":[17],"on":[18,44,113],"how":[19],"place":[21],"In":[23],"this":[24,126],"paper,":[25],"we":[26,140],"propose":[27],"the":[28,31,45,79,83,95,102,146],"technique":[29],"optimal":[32,96],"placement":[33,53,131],"of":[34,47,59,67,85],"passive":[35],"monitors":[36,49,68,89],"in":[37,57,82,145],"a":[38,64],"where":[40],"there":[41],"are":[42,92,122],"constraints":[43],"number":[46,66],"available":[48],"deployment.":[51],"problem":[54,105],"defined":[56],"terms":[58],"information":[60],"theory":[61],"metrics.":[62],"For":[63],"given":[65],"and":[69,74,139],"topology,":[71],"average":[72],"entropy":[73,76],"\"worst-case\"":[75],"that":[77,101],"describe":[78],"remaining":[80],"uncertainty":[81],"origin":[84],"an":[86],"attack":[87],"when":[88],"perfectly":[91],"considered":[93],"as":[94],"object.":[97],"A":[98],"brief":[99],"proof":[100],"worst-case":[103],"deployment":[104],"NP-complete":[107],"presented.":[109],"Greedy":[110],"algorithms":[111],"based":[112],"graph":[114],"centrality":[115],"heuristics":[116],"finding":[118],"high":[119],"quality":[120],"deployments":[121],"introduced":[123],"solve":[125],"problem.":[127],"An":[128],"automatic":[129],"monitor":[130],"tool,":[132],"which":[133],"implements":[134],"our":[135,150],"approach,":[136],"developed":[138],"use":[141],"real":[142],"topology":[144],"experiments":[147],"evaluate":[149],"results.":[151]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
