{"id":"https://openalex.org/W2040226383","doi":"https://doi.org/10.1109/tnsm.2014.2326297","title":"Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks","display_name":"Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks","publication_year":2014,"publication_date":"2014-06-02","ids":{"openalex":"https://openalex.org/W2040226383","doi":"https://doi.org/10.1109/tnsm.2014.2326297","mag":"2040226383"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2014.2326297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2014.2326297","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075655373","display_name":"Syed Fida Gillani","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Syed Fida Gillani","raw_affiliation_strings":["Cyber Defense and Network Assurability (CyberDNA) Center, College of Computing and Informatics, University of North Carolina at Charlotte, Charlotte, NC, USA","Cyber Defense & Network Assurability (CyberDNA) Center, Univ. of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Defense and Network Assurability (CyberDNA) Center, College of Computing and Informatics, University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Cyber Defense & Network Assurability (CyberDNA) Center, Univ. of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019231758","display_name":"Mehmet Demirci","orcid":"https://orcid.org/0000-0002-1088-5215"},"institutions":[{"id":"https://openalex.org/I95634034","display_name":"Gazi University","ror":"https://ror.org/054xkpr46","country_code":"TR","type":"education","lineage":["https://openalex.org/I95634034"]},{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["TR","US"],"is_corresponding":false,"raw_author_name":"Mehmet Demirci","raw_affiliation_strings":["Georgia Institute of Technology, Gazi University, Ankara, GA, Turkey","Georgia Institute of Technology Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Gazi University, Ankara, GA, Turkey","institution_ids":["https://openalex.org/I95634034","https://openalex.org/I130701444"]},{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043893479","display_name":"Ehab Al\u2010Shaer","orcid":"https://orcid.org/0000-0002-7665-8293"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ehab Al-Shaer","raw_affiliation_strings":["Cyber Defense and Network Assurability (CyberDNA) Center, College of Computing and Informatics, University of North Carolina at Charlotte, Charlotte, NC, USA","Cyber Defense & Network Assurability (CyberDNA) Center, Univ. of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"Cyber Defense and Network Assurability (CyberDNA) Center, College of Computing and Informatics, University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Cyber Defense & Network Assurability (CyberDNA) Center, Univ. of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011035030","display_name":"Mostafa Ammar","orcid":"https://orcid.org/0000-0003-2803-300X"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa H. Ammar","raw_affiliation_strings":["School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075655373"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":1.0344,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7975601,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"11","issue":"3","first_page":"307","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8773730993270874},{"id":"https://openalex.org/keywords/overlay-network","display_name":"Overlay network","score":0.7297532558441162},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7264218330383301},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.7140439748764038},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5946124196052551},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.5701691508293152},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5562651753425598},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.5511302351951599},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5456628203392029},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5383507013320923},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4833495318889618},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4643664062023163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8773730993270874},{"id":"https://openalex.org/C169851745","wikidata":"https://www.wikidata.org/wiki/Q1331985","display_name":"Overlay network","level":3,"score":0.7297532558441162},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7264218330383301},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.7140439748764038},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5946124196052551},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.5701691508293152},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5562651753425598},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.5511302351951599},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5456628203392029},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5383507013320923},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4833495318889618},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4643664062023163},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2014.2326297","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2014.2326297","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5908941174","display_name":null,"funder_award_id":"CNS-1017237","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1542881316","https://openalex.org/W1829889325","https://openalex.org/W2023140037","https://openalex.org/W2088425351","https://openalex.org/W2116398767","https://openalex.org/W2116962306","https://openalex.org/W2122175474","https://openalex.org/W2123185744","https://openalex.org/W2124500665","https://openalex.org/W2133310300","https://openalex.org/W2135214856","https://openalex.org/W2137351629","https://openalex.org/W2138556012","https://openalex.org/W2140720699","https://openalex.org/W2144553078","https://openalex.org/W2146615718","https://openalex.org/W2146934567","https://openalex.org/W2157393168","https://openalex.org/W2161526037","https://openalex.org/W2166641359","https://openalex.org/W2166734840","https://openalex.org/W2170378215","https://openalex.org/W4250950595","https://openalex.org/W6632555927","https://openalex.org/W6656373810","https://openalex.org/W6677795410","https://openalex.org/W6679873357","https://openalex.org/W6683824082"],"related_works":["https://openalex.org/W89955905","https://openalex.org/W1691715735","https://openalex.org/W1637847238","https://openalex.org/W2042060105","https://openalex.org/W2126533264","https://openalex.org/W2122565901","https://openalex.org/W2041341978","https://openalex.org/W2749656779","https://openalex.org/W4210965064","https://openalex.org/W2134691083"],"abstract_inverted_index":{"Overlay":[0],"(virtual)":[1],"networks":[2],"are":[3],"mainly":[4],"used":[5],"to":[6,24,26,68,93],"improve":[7],"Internet":[8],"reliability":[9],"and":[10,51,72,99,123,144,146,151,162],"facilitate":[11],"a":[12,31,64,116],"rapid":[13],"deployment":[14],"of":[15,36,153],"new":[16],"services.":[17],"However,":[18],"in":[19,30,77,101],"order":[20],"for":[21],"overlay":[22,42],"services":[23],"adapt":[25],"dynamic":[27],"network":[28,50,79,103,120,158],"conditions":[29],"timely":[32],"manner,":[33],"efficient":[34],"diagnosis":[35,43,66,127],"performance":[37,70],"problems":[38],"is":[39,83,128],"required.":[40],"Existing":[41],"approaches":[44],"assume":[45],"extensive":[46],"knowledge":[47],"about":[48,95],"the":[49,74,91,96,102,113,148],"require":[52],"invasive":[53],"monitoring":[54],"sensors":[55],"or":[56,108,133],"active":[57,106],"measurements.":[58],"In":[59],"this":[60],"paper,":[61],"we":[62],"propose":[63],"novel":[65],"technique":[67],"localize":[69],"anomalies":[71],"determine":[73],"packet":[75,87],"loss":[76,88,97,121],"each":[78],"component.":[80],"Our":[81,126],"approach":[82,140,155],"purely":[84],"based":[85],"on":[86],"observations":[89,132],"at":[90],"end-points":[92],"reason":[94],"location":[98],"severity":[100],"without":[104],"any":[105],"probing":[107],"sensor":[109],"deployment.":[110],"We":[111,137],"formulate":[112],"problem":[114,118],"as":[115],"constraint-satisfaction":[117],"using":[119,142],"properties":[122],"end-user":[124,135],"observations.":[125],"robust":[129],"against":[130],"insufficient":[131],"malicious":[134,163],"participation.":[136],"evaluate":[138],"our":[139,154],"extensively":[141],"simulation":[143],"experimentation":[145],"demonstrate":[147],"accuracy,":[149],"effectiveness,":[150],"scalability":[152],"under":[156],"various":[157],"sizes,":[159],"participation":[160],"ratio,":[161],"observation":[164],"ratio.":[165]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
