{"id":"https://openalex.org/W2023414968","doi":"https://doi.org/10.1109/noms.2014.6838384","title":"In-network real-time performance monitoring with distributed event processing","display_name":"In-network real-time performance monitoring with distributed event processing","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2023414968","doi":"https://doi.org/10.1109/noms.2014.6838384","mag":"2023414968"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2014.6838384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103904281","display_name":"Masanori Miyazawa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Masanori Miyazawa","raw_affiliation_strings":["Inc., KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino, Saitama, JAPAN"],"affiliations":[{"raw_affiliation_string":"Inc., KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078763967","display_name":"Michiaki Hayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Michiaki Hayashi","raw_affiliation_strings":["Inc., KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino, Saitama, JAPAN"],"affiliations":[{"raw_affiliation_string":"Inc., KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI R&D Laboratories, Inc., 2-1-15 Ohara, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103904281"],"corresponding_institution_ids":["https://openalex.org/I4210164495"],"apc_list":null,"apc_paid":null,"fwci":1.7241,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8607141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.7783157825469971},{"id":"https://openalex.org/keywords/fault-management","display_name":"Fault management","score":0.7299914360046387},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7253156900405884},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.7143031358718872},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5602138638496399},{"id":"https://openalex.org/keywords/network-management-application","display_name":"Network management application","score":0.5490784645080566},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.5435500144958496},{"id":"https://openalex.org/keywords/millisecond","display_name":"Millisecond","score":0.5312853455543518},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5146859288215637},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44074803590774536},{"id":"https://openalex.org/keywords/it-service-continuity","display_name":"IT service continuity","score":0.43629083037376404},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4270501732826233},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.324928879737854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3032677173614502},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.21749573945999146},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.14976948499679565},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11611735820770264},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11041426658630371}],"concepts":[{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.7783157825469971},{"id":"https://openalex.org/C108074857","wikidata":"https://www.wikidata.org/wiki/Q3067360","display_name":"Fault management","level":3,"score":0.7299914360046387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7253156900405884},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.7143031358718872},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5602138638496399},{"id":"https://openalex.org/C89094514","wikidata":"https://www.wikidata.org/wiki/Q7001060","display_name":"Network management application","level":4,"score":0.5490784645080566},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.5435500144958496},{"id":"https://openalex.org/C60327585","wikidata":"https://www.wikidata.org/wiki/Q723733","display_name":"Millisecond","level":2,"score":0.5312853455543518},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5146859288215637},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44074803590774536},{"id":"https://openalex.org/C67069471","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"IT service continuity","level":2,"score":0.43629083037376404},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4270501732826233},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.324928879737854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3032677173614502},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.21749573945999146},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.14976948499679565},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11611735820770264},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11041426658630371},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms.2014.6838384","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838384","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1568996271","https://openalex.org/W1969499893","https://openalex.org/W1999731981","https://openalex.org/W2053236806","https://openalex.org/W2103038289","https://openalex.org/W2155094577","https://openalex.org/W2161482686","https://openalex.org/W6633888203"],"related_works":["https://openalex.org/W2375035220","https://openalex.org/W3181805982","https://openalex.org/W2362598763","https://openalex.org/W224643466","https://openalex.org/W2112813137","https://openalex.org/W2380400043","https://openalex.org/W2367286711","https://openalex.org/W2351250842","https://openalex.org/W2751645446","https://openalex.org/W1567040545"],"abstract_inverted_index":{"A":[0],"key":[1],"important":[2],"issue":[3],"for":[4,28,46],"telecom":[5],"management":[6,19,30,69,85,133],"is":[7,55,75,87,99,125],"the":[8,22,40,50,67,102,104,130],"delay":[9,15],"in":[10,52,58],"comprehending":[11],"network":[12,18,44,97],"conditions.":[13],"This":[14],"harms":[16],"precise":[17],"activities":[20],"because":[21],"amount":[23],"of":[24,66,73,122],"managed":[25,53],"data":[26,54],"required":[27],"performance":[29,84,92],"has":[31],"been":[32],"increasing":[33],"due":[34],"to":[35],"emerging":[36],"technology":[37],"such":[38],"as":[39],"virtualization":[41],"tailoring":[42],"dedicated":[43],"service":[45],"an":[47],"enterprise.":[48],"Hence,":[49],"increase":[51],"accelerating,":[56],"and":[57,89,118],"future,":[59],"we":[60],"will":[61],"see":[62],"a":[63,82,90,119],"fatal":[64],"limitation":[65],"current":[68],"approach.":[70,134],"Timely":[71],"monitoring":[72,93],"failure":[74,124],"increasingly":[76],"valuable.":[77],"To":[78],"tackle":[79],"this":[80],"issue,":[81],"decentralized":[83],"system":[86,103],"assumed,":[88],"real-time":[91],"implemented":[94],"inside":[95],"distributed":[96],"devices":[98],"proposed.":[100],"In":[101],"demonstration":[105],"result":[106],"shows":[107],"that":[108],"burst":[109],"traffic":[110],"was":[111],"successfully":[112],"detected":[113],"at":[114],"250":[115],"millisecond":[116],"intervals,":[117],"detection":[120],"resolution":[121],"its":[123],"significantly":[126],"improved,":[127],"compared":[128],"with":[129],"conventional":[131],"centralized":[132]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
