{"id":"https://openalex.org/W2922173126","doi":"https://doi.org/10.23919/apsipa.2018.8659531","title":"Accurate OD Traffic Matrix Estimation Based on Resampling of Observed Flow Data","display_name":"Accurate OD Traffic Matrix Estimation Based on Resampling of Observed Flow Data","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2922173126","doi":"https://doi.org/10.23919/apsipa.2018.8659531","mag":"2922173126"},"language":"en","primary_location":{"id":"doi:10.23919/apsipa.2018.8659531","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://kyutech.repo.nii.ac.jp/records/6244","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057533086","display_name":"Simon Kase","orcid":null},"institutions":[{"id":"https://openalex.org/I4210161669","display_name":"ID Pharma (Japan)","ror":"https://ror.org/05yk8hs36","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210161669"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Simon Kase","raw_affiliation_strings":["iD Corporation, Japan"],"affiliations":[{"raw_affiliation_string":"iD Corporation, Japan","institution_ids":["https://openalex.org/I4210161669"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003044063","display_name":"Masato Tsuru","orcid":"https://orcid.org/0000-0001-7340-6798"},"institutions":[{"id":"https://openalex.org/I207014233","display_name":"Kyushu Institute of Technology","ror":"https://ror.org/02278tr80","country_code":"JP","type":"education","lineage":["https://openalex.org/I207014233"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masato Tsuru","raw_affiliation_strings":["Kyushu Institute of Technology, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu Institute of Technology, Fukuoka, Japan","institution_ids":["https://openalex.org/I207014233"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000225743","display_name":"Masato Uchida","orcid":"https://orcid.org/0000-0002-1998-0788"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masato Uchida","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057533086"],"corresponding_institution_ids":["https://openalex.org/I4210161669"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22728874,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1574","last_page":"1579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6956668496131897},{"id":"https://openalex.org/keywords/resampling","display_name":"Resampling","score":0.6118828058242798},{"id":"https://openalex.org/keywords/unobservable","display_name":"Unobservable","score":0.6031331419944763},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5136610865592957},{"id":"https://openalex.org/keywords/traffic-flow","display_name":"Traffic flow (computer networking)","score":0.4933885633945465},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet traffic","score":0.4730450510978699},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4669415056705475},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.45214352011680603},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.447762131690979},{"id":"https://openalex.org/keywords/recursion","display_name":"Recursion (computer science)","score":0.4116584062576294},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.41146326065063477},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3938213884830475},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2652270793914795},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.2318609356880188},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2254847288131714},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.11049064993858337}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6956668496131897},{"id":"https://openalex.org/C150921843","wikidata":"https://www.wikidata.org/wiki/Q1170431","display_name":"Resampling","level":2,"score":0.6118828058242798},{"id":"https://openalex.org/C2780695315","wikidata":"https://www.wikidata.org/wiki/Q3799040","display_name":"Unobservable","level":2,"score":0.6031331419944763},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5136610865592957},{"id":"https://openalex.org/C207512268","wikidata":"https://www.wikidata.org/wiki/Q3074551","display_name":"Traffic flow (computer networking)","level":2,"score":0.4933885633945465},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.4730450510978699},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4669415056705475},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.45214352011680603},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.447762131690979},{"id":"https://openalex.org/C168773036","wikidata":"https://www.wikidata.org/wiki/Q264164","display_name":"Recursion (computer science)","level":2,"score":0.4116584062576294},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.41146326065063477},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3938213884830475},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2652270793914795},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2318609356880188},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2254847288131714},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.11049064993858337},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.23919/apsipa.2018.8659531","is_oa":false,"landing_page_url":"https://doi.org/10.23919/apsipa.2018.8659531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"proceedings-article"},{"id":"pmh:oai:irdb.nii.ac.jp:01216:0004319215","is_oa":true,"landing_page_url":"https://kyutech.repo.nii.ac.jp/records/6244","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"conference paper"},{"id":"pmh:oai:kyutech.repo.nii.ac.jp:00006244","is_oa":false,"landing_page_url":"http://hdl.handle.net/10228/00007454","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"AM"}],"best_oa_location":{"id":"pmh:oai:irdb.nii.ac.jp:01216:0004319215","is_oa":true,"landing_page_url":"https://kyutech.repo.nii.ac.jp/records/6244","pdf_url":null,"source":{"id":"https://openalex.org/S7407056385","display_name":"Institutional Repositories DataBase (IRDB)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184597095","host_organization_name":"National Institute of Informatics","host_organization_lineage":["https://openalex.org/I184597095"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)","raw_type":"conference paper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1520718206","https://openalex.org/W1634637767","https://openalex.org/W1970701242","https://openalex.org/W2004287727","https://openalex.org/W2113657406","https://openalex.org/W2126281557","https://openalex.org/W2564478194","https://openalex.org/W4238970673"],"related_works":["https://openalex.org/W2159656221","https://openalex.org/W2096319108","https://openalex.org/W1538599242","https://openalex.org/W1985609408","https://openalex.org/W2943019377","https://openalex.org/W1933691230","https://openalex.org/W1480832057","https://openalex.org/W3103749384","https://openalex.org/W2013428012","https://openalex.org/W2121217657"],"abstract_inverted_index":{"It":[0],"is":[1,32,44,155,162],"important":[2],"to":[3,49,83,100,119,145,179,198],"observe":[4],"the":[5,21,26,30,52,64,68,88,121,127,136,140,158,166,174,222,230],"statistical":[6,54],"characteristics":[7,55],"of":[8,16,25,56,66,71,91,95,139,143,147,160,169,173,195,202,212],"global":[9,57,74],"flows,":[10],"which":[11,103],"are":[12],"defined":[13],"as":[14,84,101],"series":[15],"packets":[17],"between":[18,76],"networks,":[19],"for":[20,205],"management":[22],"and":[23,35,171,183],"operation":[24],"Internet.":[27],"However,":[28,149],"because":[29,150],"Internet":[31],"a":[33,115,189,193,200,216],"diverse":[34],"large-scale":[36],"system":[37],"organized":[38],"by":[39,165],"multiple":[40],"distributed":[41],"authorities,":[42],"it":[43],"not":[45],"practical":[46],"(sometimes":[47],"impossible)":[48],"directly":[50],"measure":[51],"precise":[53],"flows.":[58],"In":[59,117,177],"this":[60,151,181],"paper,":[61],"we":[62,187],"consider":[63],"problem":[65],"estimating":[67],"traffic":[69,93,123,141,207,218],"rate":[70,142],"every":[72],"unobservable":[73],"flow":[75],"corresponding":[77],"origin-destination":[78],"(OD)":[79],"pair":[80],"(hereafter":[81,98],"referred":[82,99],"\u201cindividual-flows\u201d)":[85],"based":[86,191],"on":[87,192],"measured":[89,107],"data":[90,197],"aggregated":[92],"rates":[94],"individual":[96],"flows":[97],"\u201caggregated-flows\u201d),":[102],"can":[104],"be":[105],"easily":[106],"at":[108],"certain":[109],"links":[110],"(e.g.,":[111],"router":[112],"interfaces)":[113],"in":[114],"network.":[116],"order":[118,178],"solve":[120,180],"OD":[122,206],"matrix":[124,208],"estimation":[125,161,185,227],"problem,":[126],"prior":[128,231],"method":[129,154,190,224],"uses":[130],"an":[131],"inverse":[132,152],"function":[133,153],"mapping":[134],"from":[135],"probability":[137],"distributions":[138],"aggregated-flows":[144],"those":[146],"individual-flows.":[148],"executed":[156],"recursively,":[157],"accuracy":[159,228],"heavily":[163],"affected":[164],"initial":[167],"values":[168],"recursion":[170],"variation":[172],"measurement":[175,196],"data.":[176],"issue":[182],"improve":[184],"accuracy,":[186],"propose":[188],"resampling":[194],"obtain":[199],"set":[201],"solution":[203],"candidates":[204],"estimation.":[209],"The":[210],"results":[211],"performance":[213],"evaluations":[214],"using":[215],"real":[217],"trace":[219],"demonstrate":[220],"that":[221],"proposed":[223],"achieves":[225],"better":[226],"than":[229],"method.":[232]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
