var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/service/mendeley/95e10851-cdf3-31de-9f82-1ab629e601b0/group/09500bf6-14e8-379d-a953-ea715d61ca19?jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/service/mendeley/95e10851-cdf3-31de-9f82-1ab629e601b0/group/09500bf6-14e8-379d-a953-ea715d61ca19?jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/service/mendeley/95e10851-cdf3-31de-9f82-1ab629e601b0/group/09500bf6-14e8-379d-a953-ea715d61ca19?jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model.\n \n \n \n \n\n\n \n Kaliappan, M.; and Paramasivan, B.\n\n\n \n\n\n\n Computers & Electrical Engineering, 41: 301-313. 1 2015.\n \n\n\n\n
\n\n\n\n \n \n \"EnhancingWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model},\n type = {article},\n year = {2015},\n keywords = {Belief updating system,Dynamic Bayesian Signalling Game,Mobile Ad Hoc Networks,Secure routing,Vulnerabilities},\n pages = {301-313},\n volume = {41},\n websites = {http://www.sciencedirect.com/science/article/pii/S0045790614003097},\n month = {1},\n id = {12e10b61-df66-39fc-b57e-de9163d708a1},\n created = {2015-04-11T19:07:34.000Z},\n accessed = {2015-03-31},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {Collaboration between mobile nodes is significant in Mobile Ad Hoc Networks (MANETs). The great challenges of MANETs are their vulnerabilities to various security attacks. Because of the lack of centralized administration, secure routing is challenging in MANETs. Effective secure routing is quite essential to protect nodes from anonymous behaviours. Game theory is currently employed as a tool to analyse, formulate and solve selfishness issues in MANETs. This work uses a Dynamic Bayesian Signalling Game to analyse strategy profiles for regular and malicious nodes. We calculate the Payoff to nodes for motivating the particular nodes involved in misbehaviour. Regular nodes monitor continuously to evaluate their neighbours by using the belief evaluation and belief updating system of the Bayes rule. Simulation results show that the proposed scheme could significantly minimize the misbehaving activities of malicious nodes and thereby enhance secure routing.},\n bibtype = {article},\n author = {Kaliappan, M. and Paramasivan, B.},\n doi = {10.1016/j.compeleceng.2014.11.011},\n journal = {Computers & Electrical Engineering}\n}
\n
\n\n\n
\n Collaboration between mobile nodes is significant in Mobile Ad Hoc Networks (MANETs). The great challenges of MANETs are their vulnerabilities to various security attacks. Because of the lack of centralized administration, secure routing is challenging in MANETs. Effective secure routing is quite essential to protect nodes from anonymous behaviours. Game theory is currently employed as a tool to analyse, formulate and solve selfishness issues in MANETs. This work uses a Dynamic Bayesian Signalling Game to analyse strategy profiles for regular and malicious nodes. We calculate the Payoff to nodes for motivating the particular nodes involved in misbehaviour. Regular nodes monitor continuously to evaluate their neighbours by using the belief evaluation and belief updating system of the Bayes rule. Simulation results show that the proposed scheme could significantly minimize the misbehaving activities of malicious nodes and thereby enhance secure routing.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Consequence-based framework for electric power providers using Bayesian belief network.\n \n \n \n \n\n\n \n Buriticá, J., A.; and Tesfamariam, S.\n\n\n \n\n\n\n International Journal of Electrical Power & Energy Systems, 64: 233-241. 1 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Consequence-basedWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Consequence-based framework for electric power providers using Bayesian belief network},\n type = {article},\n year = {2015},\n keywords = {Bayesian belief network,Consequence-based framework,Decision making,Power utility},\n pages = {233-241},\n volume = {64},\n websites = {http://www.sciencedirect.com/science/article/pii/S0142061514004669},\n month = {1},\n id = {12805927-7c42-3190-8aa3-aa0018c004b7},\n created = {2015-04-11T19:07:36.000Z},\n accessed = {2015-03-19},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {Novel consequence-based framework for electric power providers is proposed. This framework includes six performance objectives, such as reputation, health and safety, environmental, financial, reliability, and system conditions. The six performance objectives are quantified with the consideration of 41 key performance indicators (KPIs). The framework is illustrated with a case study of 10 Canadian power utilities. Furthermore, a sensitivity analysis is undertaken to identify importance of the KPIs on the decision framework.},\n bibtype = {article},\n author = {Buriticá, Jessica A. and Tesfamariam, Solomon},\n doi = {10.1016/j.ijepes.2014.07.034},\n journal = {International Journal of Electrical Power & Energy Systems}\n}
\n
\n\n\n
\n Novel consequence-based framework for electric power providers is proposed. This framework includes six performance objectives, such as reputation, health and safety, environmental, financial, reliability, and system conditions. The six performance objectives are quantified with the consideration of 41 key performance indicators (KPIs). The framework is illustrated with a case study of 10 Canadian power utilities. Furthermore, a sensitivity analysis is undertaken to identify importance of the KPIs on the decision framework.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Topic tracking with Bayesian belief network.\n \n \n \n \n\n\n \n Xu, J.; Wu, S.; and Hong, Y.\n\n\n \n\n\n\n Optik - International Journal for Light and Electron Optics, 125(9): 2164-2169. 5 2014.\n \n\n\n\n
\n\n\n\n \n \n \"TopicWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Topic tracking with Bayesian belief network},\n type = {article},\n year = {2014},\n keywords = {Bayesian belief network,Dynamic topic model,Static topic model,Topic tracking},\n pages = {2164-2169},\n volume = {125},\n websites = {http://www.sciencedirect.com/science/article/pii/S0030402613013909},\n month = {5},\n id = {8aa54219-cf9f-366e-96d2-10eca0e5ac0c},\n created = {2015-04-11T18:56:31.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {The task of topic tracking is to monitor a stream of stories and find all subsequent stories that discuss the same topic. Using Bayesian belief network we give three topic tracking models: a static topic model BSTM and two dynamic topic models BDTM-I, BDTM-II. BDTM-II merges the advantages of BSTM and BDTM-I, has better tracking performance than the former two, and effectively alleviates topic drift phenomenon. Applying unrelated coming stories to update BDTM-I and BDTM-II can filter noises existed in topics. Experiments on TDT corpora show that BSTM decreases (Cdet)norm by 5.5% comparing to VSM, BDTM-II decreases (Cdet)norm by 6.3% and 6.0% comparing to BSTM and BDTM-I respectively, using unrelated stories can improve the tracking performance.},\n bibtype = {article},\n author = {Xu, Jian-min and Wu, Shu-fang and Hong, Yu},\n doi = {10.1016/j.ijleo.2013.10.044},\n journal = {Optik - International Journal for Light and Electron Optics},\n number = {9}\n}
\n
\n\n\n
\n The task of topic tracking is to monitor a stream of stories and find all subsequent stories that discuss the same topic. Using Bayesian belief network we give three topic tracking models: a static topic model BSTM and two dynamic topic models BDTM-I, BDTM-II. BDTM-II merges the advantages of BSTM and BDTM-I, has better tracking performance than the former two, and effectively alleviates topic drift phenomenon. Applying unrelated coming stories to update BDTM-I and BDTM-II can filter noises existed in topics. Experiments on TDT corpora show that BSTM decreases (Cdet)norm by 5.5% comparing to VSM, BDTM-II decreases (Cdet)norm by 6.3% and 6.0% comparing to BSTM and BDTM-I respectively, using unrelated stories can improve the tracking performance.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Academic Press Library in Signal Processing: Volume 1 - Signal Processing Theory and Machine Learning.\n \n \n \n \n\n\n \n Pernkopf, F.; Peharz, R.; and Tschiatschek, S.\n\n\n \n\n\n\n Volume 1 of Academic Press Library in Signal ProcessingElsevier, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"AcademicWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@book{\n title = {Academic Press Library in Signal Processing: Volume 1 - Signal Processing Theory and Machine Learning},\n type = {book},\n year = {2014},\n source = {Academic Press Library in Signal Processing},\n keywords = {Bayesian network,Factor graph,Markov network,Parameter learning,Probabilistic graphical model,Probabilistic inference},\n pages = {989-1064},\n volume = {1},\n websites = {http://www.sciencedirect.com/science/article/pii/B9780123965028000188},\n publisher = {Elsevier},\n series = {Academic Press Library in Signal Processing},\n id = {2a6abaab-f5f7-34ba-a615-39f16e254899},\n created = {2015-04-11T20:41:36.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {Over the last decades, probabilistic graphical models have become the method of choice for representing uncertainty. They are used in many research areas such as computer vision, speech processing, time-series and sequential data modeling, cognitive science, bioinformatics, probabilistic robotics, signal processing, communications and error-correcting coding theory, and in the area of artificial intelligence. This tutorial provides an introduction to probabilistic graphical models. We review three representations of probabilistic graphical models, namely, Markov networks or undirected graphical models, Bayesian networks or directed graphical models, and factor graphs. Then, we provide an overview about structure and parameter learning techniques. In particular, we discuss maximum likelihood and Bayesian learning, as well as generative and discriminative learning. Subsequently, we overview exact inference methods and briefly cover approximate inference techniques. Finally, we present typical applications for each of the three representations, namely, Bayesian networks for expert systems, dynamic Bayesian networks for speech processing, Markov random fields for image processing, and factor graphs for decoding error-correcting codes.},\n bibtype = {book},\n author = {Pernkopf, Franz and Peharz, Robert and Tschiatschek, Sebastian},\n doi = {10.1016/B978-0-12-396502-8.00018-8}\n}
\n
\n\n\n
\n Over the last decades, probabilistic graphical models have become the method of choice for representing uncertainty. They are used in many research areas such as computer vision, speech processing, time-series and sequential data modeling, cognitive science, bioinformatics, probabilistic robotics, signal processing, communications and error-correcting coding theory, and in the area of artificial intelligence. This tutorial provides an introduction to probabilistic graphical models. We review three representations of probabilistic graphical models, namely, Markov networks or undirected graphical models, Bayesian networks or directed graphical models, and factor graphs. Then, we provide an overview about structure and parameter learning techniques. In particular, we discuss maximum likelihood and Bayesian learning, as well as generative and discriminative learning. Subsequently, we overview exact inference methods and briefly cover approximate inference techniques. Finally, we present typical applications for each of the three representations, namely, Bayesian networks for expert systems, dynamic Bayesian networks for speech processing, Markov random fields for image processing, and factor graphs for decoding error-correcting codes.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Online state-of-health estimation of lithium-ion batteries using Dynamic Bayesian Networks.\n \n \n \n \n\n\n \n He, Z.; Gao, M.; Ma, G.; Liu, Y.; and Chen, S.\n\n\n \n\n\n\n Journal of Power Sources, 267: 576-583. 12 2014.\n \n\n\n\n
\n\n\n\n \n \n \"OnlineWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Online state-of-health estimation of lithium-ion batteries using Dynamic Bayesian Networks},\n type = {article},\n year = {2014},\n keywords = {Battery management system,Dynamic Bayesian Network,Lithium-ion battery,State of health},\n pages = {576-583},\n volume = {267},\n websites = {http://www.sciencedirect.com/science/article/pii/S0378775314007939},\n month = {12},\n id = {2bd03643-6f6e-3455-80aa-0f76b3dec2ad},\n created = {2015-04-11T20:41:36.000Z},\n accessed = {2015-01-12},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {Li-ion batteries are widely used in energy storage systems, electric vehicles, communication systems, etc. The State of Health (SOH) of batteries is of great importance to the safety of these systems. This paper presents a novel online method for the estimation of the SOH of Lithium (Li)-ion batteries based on Dynamic Bayesian Networks (DBNs). The structure of the DBN model is built according to the experience of experts, with the state of charges used as hidden states and the terminal voltages used as observations in the DBN. Parameters of the DBN model are learned based on training data collected through Li-ion battery aging experiments. A forward algorithm is applied for the inference of the DBN model in order to estimate the SOH in real-time. Experimental results show that the proposed method is effective and efficient in estimating the SOH of Li-ion batteries.},\n bibtype = {article},\n author = {He, Zhiwei and Gao, Mingyu and Ma, Guojin and Liu, Yuanyuan and Chen, Sanxin},\n doi = {10.1016/j.jpowsour.2014.05.100},\n journal = {Journal of Power Sources}\n}
\n
\n\n\n
\n Li-ion batteries are widely used in energy storage systems, electric vehicles, communication systems, etc. The State of Health (SOH) of batteries is of great importance to the safety of these systems. This paper presents a novel online method for the estimation of the SOH of Lithium (Li)-ion batteries based on Dynamic Bayesian Networks (DBNs). The structure of the DBN model is built according to the experience of experts, with the state of charges used as hidden states and the terminal voltages used as observations in the DBN. Parameters of the DBN model are learned based on training data collected through Li-ion battery aging experiments. A forward algorithm is applied for the inference of the DBN model in order to estimate the SOH in real-time. Experimental results show that the proposed method is effective and efficient in estimating the SOH of Li-ion batteries.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multiple small objects tracking based on dynamic Bayesian networks with spatial prior.\n \n \n \n \n\n\n \n Yao, R.; Zhang, Y.; Zhou, Y.; and Xia, S.\n\n\n \n\n\n\n Optik - International Journal for Light and Electron Optics, 125(10): 2243-2247. 5 2014.\n \n\n\n\n
\n\n\n\n \n \n \"MultipleWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Multiple small objects tracking based on dynamic Bayesian networks with spatial prior},\n type = {article},\n year = {2014},\n keywords = {Data association,Dynamic Bayesian Networks,Multi-cue integration,Multiple small objects tracking},\n pages = {2243-2247},\n volume = {125},\n websites = {http://www.sciencedirect.com/science/article/pii/S0030402613014964},\n month = {5},\n id = {76b024f7-c24e-308c-8db8-e253d38e492a},\n created = {2015-04-11T20:41:36.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {This paper proposes an end-to-end algorithm for multiple small objects tracking in noisy video using a combination of Gaussian mixture based background segmentation along with a Dynamic Bayesian Networks (DBNs) based tracking. Background segmentation is based on an adaptive backgrounding method that models each pixel as a mixture of Gaussians with spatial prior and uses an online approximation to update the model, the spatial prior is constructed for small objects. Furthermore, we create observation model with hidden variable based on multi-cue statistical object model and employ Kalman filter as inference algorithm. Finally, we use linear assignment problem (LAP) algorithm to perform the models matching. The experimental results show the proposed method outperforms competing method, and demonstrate the effectiveness of the proposed method.},\n bibtype = {article},\n author = {Yao, Rui and Zhang, Yanning and Zhou, Yong and Xia, Shixiong},\n doi = {10.1016/j.ijleo.2013.10.108},\n journal = {Optik - International Journal for Light and Electron Optics},\n number = {10}\n}
\n
\n\n\n
\n This paper proposes an end-to-end algorithm for multiple small objects tracking in noisy video using a combination of Gaussian mixture based background segmentation along with a Dynamic Bayesian Networks (DBNs) based tracking. Background segmentation is based on an adaptive backgrounding method that models each pixel as a mixture of Gaussians with spatial prior and uses an online approximation to update the model, the spatial prior is constructed for small objects. Furthermore, we create observation model with hidden variable based on multi-cue statistical object model and employ Kalman filter as inference algorithm. Finally, we use linear assignment problem (LAP) algorithm to perform the models matching. The experimental results show the proposed method outperforms competing method, and demonstrate the effectiveness of the proposed method.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Large scale probabilistic available bandwidth estimation.\n \n \n \n \n\n\n \n Thouin, F.; Coates, M.; and Rabbat, M.\n\n\n \n\n\n\n Computer Networks, 55(9): 2065-2078. 6 2011.\n \n\n\n\n
\n\n\n\n \n \n \"LargeWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Large scale probabilistic available bandwidth estimation},\n type = {article},\n year = {2011},\n keywords = {Active sampling,Bayesian inference,Belief propagation,Network monitoring},\n pages = {2065-2078},\n volume = {55},\n websites = {http://www.sciencedirect.com/science/article/pii/S1389128611000752},\n month = {6},\n id = {ec7f728f-66ff-3728-b2d6-b35f45a0094a},\n created = {2015-04-11T19:07:35.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: (i) most tools report a point estimate of average available bandwidth over a measurement interval and do not provide a confidence interval; (ii) the commonly adopted models used to relate the available bandwidth metric to the measured data are invalid in almost all practical scenarios; (iii) existing tools do not scale well and are not suited to the task of multi-path estimation in large-scale networks; (iv) almost all tools use ad hoc techniques to address measurement noise; and (v) tools do not provide enough flexibility in terms of accuracy, overhead, latency and reliability to adapt to the requirements of various applications. In this paper we propose a new definition for available bandwidth and a novel framework that addresses these issues. We define probabilistic available bandwidth (PAB) as the largest input rate at which we can send a traffic flow along a path while achieving, with specified probability, an output rate that is almost as large as the input rate. PAB is expressed directly in terms of the measurable output rate and includes adjustable parameters that allow the user to adapt to different application requirements. Our probabilistic framework to estimate network-wide probabilistic available bandwidth is based on packet trains, Bayesian inference, factor graphs and active sampling. We deploy our tool on the PlanetLab network and our results show that we can obtain accurate estimates with a much smaller measurement overhead than Pathload.},\n bibtype = {article},\n author = {Thouin, Frederic and Coates, Mark and Rabbat, Michael},\n doi = {10.1016/j.comnet.2011.02.011},\n journal = {Computer Networks},\n number = {9}\n}
\n
\n\n\n
\n The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: (i) most tools report a point estimate of average available bandwidth over a measurement interval and do not provide a confidence interval; (ii) the commonly adopted models used to relate the available bandwidth metric to the measured data are invalid in almost all practical scenarios; (iii) existing tools do not scale well and are not suited to the task of multi-path estimation in large-scale networks; (iv) almost all tools use ad hoc techniques to address measurement noise; and (v) tools do not provide enough flexibility in terms of accuracy, overhead, latency and reliability to adapt to the requirements of various applications. In this paper we propose a new definition for available bandwidth and a novel framework that addresses these issues. We define probabilistic available bandwidth (PAB) as the largest input rate at which we can send a traffic flow along a path while achieving, with specified probability, an output rate that is almost as large as the input rate. PAB is expressed directly in terms of the measurable output rate and includes adjustable parameters that allow the user to adapt to different application requirements. Our probabilistic framework to estimate network-wide probabilistic available bandwidth is based on packet trains, Bayesian inference, factor graphs and active sampling. We deploy our tool on the PlanetLab network and our results show that we can obtain accurate estimates with a much smaller measurement overhead than Pathload.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Scalable diagnosis in IP networks using path-based measurement and inference: A learning framework.\n \n \n \n \n\n\n \n Narasimha, R.; Dihidar, S.; Ji, C.; and McLaughlin, S., W.\n\n\n \n\n\n\n Journal of Visual Communication and Image Representation, 21(2): 175-191. 2 2010.\n \n\n\n\n
\n\n\n\n \n \n \"ScalableWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Scalable diagnosis in IP networks using path-based measurement and inference: A learning framework},\n type = {article},\n year = {2010},\n keywords = {Bayesian belief networks,Congestion,Inference,Link failure,Low density parity check codes,Machine learning,Measurements,Multimedia networks,Scalable diagnosis,Variational inference},\n pages = {175-191},\n volume = {21},\n websites = {http://www.sciencedirect.com/science/article/pii/S1047320309000972},\n month = {2},\n id = {6e08a17b-4ad4-3dee-8903-2818097bf1be},\n created = {2015-04-11T18:56:31.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {In this paper, we investigate scalability and performance of measurement-based network monitoring, focusing on failure and congestion diagnosis in IP networks for network-based multimedia applications. Path-based measurements using unicast probe-packets are obtained at end-hosts, and diagnosis is performed by exploiting the spatial dependence among those measurements. We formulate network monitoring in a machine learning framework using probabilistic graphical models which perform inference of the network states (on/off) using unicast measurements. We provide fundamental limits on the relationship between the number of probe packets, the size of a network and the ability to diagnose either failed links or congested network components. Specifically, the diagnosis problem is dealt in a two-fold manner. Initially for fault diagnosis, we construct a graphical model using a Bayesian belief network for path-based measurements. We then provide a lower bound on the average number of probes per edge for link failure diagnosis using variational inference under “noisy” probe measurements. Variational inference provides a feasible approximation to address the number of spatially dependent measurements needed for diagnosis in large networks. We then develop an entropy lower (EL) bound by drawing similarities between coding over a binary symmetric channel (BSC) and link failure diagnosis. Both bounds show that the number of measurements needed for diagnosis grows linearly with respect to the number of links. The analytical results are validated by simulation. On the other hand, for congestion diagnosis, we propose a solution based on decoding of linear error control codes on a BSC. In this scenario, we consider path-based probing experiments under both noiseless and “noisy” measurements and compare its performance against the fundamental limits. To identify the congested nodes we construct a factor graph, and congestion is inferred using belief-propagation algorithm. Simulation results demonstrate the ability of our approach to perfectly localize congested nodes using a scalable number of measurements and a computationally efficient algorithm. We believe that this study can ease the problem arising due to lack of QoS support and provide good-quality broadband multimedia services.},\n bibtype = {article},\n author = {Narasimha, Rajesh and Dihidar, Souvik and Ji, Chuanyi and McLaughlin, Steven W.},\n doi = {10.1016/j.jvcir.2009.07.007},\n journal = {Journal of Visual Communication and Image Representation},\n number = {2}\n}
\n
\n\n\n
\n In this paper, we investigate scalability and performance of measurement-based network monitoring, focusing on failure and congestion diagnosis in IP networks for network-based multimedia applications. Path-based measurements using unicast probe-packets are obtained at end-hosts, and diagnosis is performed by exploiting the spatial dependence among those measurements. We formulate network monitoring in a machine learning framework using probabilistic graphical models which perform inference of the network states (on/off) using unicast measurements. We provide fundamental limits on the relationship between the number of probe packets, the size of a network and the ability to diagnose either failed links or congested network components. Specifically, the diagnosis problem is dealt in a two-fold manner. Initially for fault diagnosis, we construct a graphical model using a Bayesian belief network for path-based measurements. We then provide a lower bound on the average number of probes per edge for link failure diagnosis using variational inference under “noisy” probe measurements. Variational inference provides a feasible approximation to address the number of spatially dependent measurements needed for diagnosis in large networks. We then develop an entropy lower (EL) bound by drawing similarities between coding over a binary symmetric channel (BSC) and link failure diagnosis. Both bounds show that the number of measurements needed for diagnosis grows linearly with respect to the number of links. The analytical results are validated by simulation. On the other hand, for congestion diagnosis, we propose a solution based on decoding of linear error control codes on a BSC. In this scenario, we consider path-based probing experiments under both noiseless and “noisy” measurements and compare its performance against the fundamental limits. To identify the congested nodes we construct a factor graph, and congestion is inferred using belief-propagation algorithm. Simulation results demonstrate the ability of our approach to perfectly localize congested nodes using a scalable number of measurements and a computationally efficient algorithm. We believe that this study can ease the problem arising due to lack of QoS support and provide good-quality broadband multimedia services.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Research on the self-defence electronic jamming decision-making based on the discrete dynamic Bayesian network.\n \n \n \n \n\n\n \n Zheng, T.; and Xiaoguang, G.\n\n\n \n\n\n\n Journal of Systems Engineering and Electronics, 19(4): 702-708. 8 2008.\n \n\n\n\n
\n\n\n\n \n \n \"ResearchWebsite\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{\n title = {Research on the self-defence electronic jamming decision-making based on the discrete dynamic Bayesian network},\n type = {article},\n year = {2008},\n keywords = {decision-making model,discrete dynamic Bayesian network,self-defense electronic jamming},\n pages = {702-708},\n volume = {19},\n websites = {http://www.sciencedirect.com/science/article/pii/S1004413208601425},\n month = {8},\n id = {e997028e-32c9-3791-9c40-7547b328ef1e},\n created = {2015-04-11T19:52:02.000Z},\n accessed = {2015-04-11},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = {The manner and conditions of running the decision-making system with self-defense electronic jammingare given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making withself-defense electronic jamming, a decision-making model with self-defense electronic jamming based on the discretedynamic Bayesian network is established. Then jamming decision inferences by the aid of the algorithm of discretedynamic Bayesian network are carried on. The simulating result shows that this method is able to synthesizedifferent targets which are not predominant. In this way, various features at the same time, as well as the samefeature appearing at different time complement mutually; in addition, the accuracy and reliability of electronicjamming decision making are enhanced significantly.},\n bibtype = {article},\n author = {Zheng, Tang and Xiaoguang, Gao},\n doi = {10.1016/S1004-4132(08)60142-5},\n journal = {Journal of Systems Engineering and Electronics},\n number = {4}\n}
\n
\n\n\n
\n The manner and conditions of running the decision-making system with self-defense electronic jammingare given. After proposing the scenario of applying discrete dynamic Bayesian network to the decision making withself-defense electronic jamming, a decision-making model with self-defense electronic jamming based on the discretedynamic Bayesian network is established. Then jamming decision inferences by the aid of the algorithm of discretedynamic Bayesian network are carried on. The simulating result shows that this method is able to synthesizedifferent targets which are not predominant. In this way, various features at the same time, as well as the samefeature appearing at different time complement mutually; in addition, the accuracy and reliability of electronicjamming decision making are enhanced significantly.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n Bayesian network-based trust model.\n \n \n \n\n\n \n Wang, Y.; and Vassileva, J.\n\n\n \n\n\n\n Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003). 2003.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{\n title = {Bayesian network-based trust model},\n type = {article},\n year = {2003},\n id = {a7aa2096-bbc9-32ed-a144-57d42b54767c},\n created = {2015-04-11T19:07:34.000Z},\n file_attached = {false},\n profile_id = {95e10851-cdf3-31de-9f82-1ab629e601b0},\n group_id = {09500bf6-14e8-379d-a953-ea715d61ca19},\n last_modified = {2017-03-14T14:28:50.201Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n private_publication = {false},\n abstract = { We propose a Bayesian network-based trust model. Since trust is multifaceted, even in the same context, agents still need to develop differentiated trust in different aspects of other agents' behaviors. The agent's needs are different in different situations. Depending on the situation, an agent may need to consider its trust in a specific aspect of another agent's capability or in a combination of multiple aspects. Bayesian networks provide a flexible method to present differentiated trust and combine different aspects of trust. A Bayesian network-based trust model is presented for a file sharing peer-to-peer application.},\n bibtype = {article},\n author = {Wang, Y. and Vassileva, J.},\n journal = {Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003)}\n}
\n
\n\n\n
\n We propose a Bayesian network-based trust model. Since trust is multifaceted, even in the same context, agents still need to develop differentiated trust in different aspects of other agents' behaviors. The agent's needs are different in different situations. Depending on the situation, an agent may need to consider its trust in a specific aspect of another agent's capability or in a combination of multiple aspects. Bayesian networks provide a flexible method to present differentiated trust and combine different aspects of trust. A Bayesian network-based trust model is presented for a file sharing peer-to-peer application.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);