We study the problem of identifiability of distributions of flows on a graph from aggregate measurements collected on its edges. This is a canonical example of a statistical inverse problem motivated by recent developments in computer networks. In this paper (i) we introduce a number of models for multi-modal data that capture their spatio-temporal correlation, (ii) provide sufficient conditions for the identifiability of nth order cumulants and also for a special class of heavy tailed distributions. Further, we investigate conditions on network routing for the flows that prove sufficient for identifiability of their distributions (up to mean). Finally, we extend our results to directed acyclic graphs and discuss some open problems.Peer Rev...
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to exis...
We study Bayesian models and methods for analysing network traffic counts in problems of inference a...
Mapping the Internet generally consists in sampling the network from a limited set of sources by usi...
Estimation of flow volumes in computer networks involves the use of data that are either highly aggr...
In the Internet, a statistical perspective of global traffic flows has been considered as an importa...
Central to network tomography is the problem of identifiability, the ability to identify internal ne...
Accurate estimation of origin-to-destination (OD) traffic flows pro-vides valuable input for network...
This paper investigates the potential contributions of traffic flow measurements in monitoring and n...
In this thesis, we investigate the problem of identifying individual link metrics in a communication...
The relevance of flow-based monitoring in tasks such as the detection of anomalies and denial of use...
We investigate the problem of identifying individual link metrics in a communication network from en...
Traffic assignment models are used to estimate and distribute flows in a road network so that conges...
Abstract—In the backbone of large-scale networks, traffic flows experience abrupt unusual changes wh...
We investigate the problem of identifying individual link metrics in a communication network from ac...
International audienceAfter the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed...
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to exis...
We study Bayesian models and methods for analysing network traffic counts in problems of inference a...
Mapping the Internet generally consists in sampling the network from a limited set of sources by usi...
Estimation of flow volumes in computer networks involves the use of data that are either highly aggr...
In the Internet, a statistical perspective of global traffic flows has been considered as an importa...
Central to network tomography is the problem of identifiability, the ability to identify internal ne...
Accurate estimation of origin-to-destination (OD) traffic flows pro-vides valuable input for network...
This paper investigates the potential contributions of traffic flow measurements in monitoring and n...
In this thesis, we investigate the problem of identifying individual link metrics in a communication...
The relevance of flow-based monitoring in tasks such as the detection of anomalies and denial of use...
We investigate the problem of identifying individual link metrics in a communication network from en...
Traffic assignment models are used to estimate and distribute flows in a road network so that conges...
Abstract—In the backbone of large-scale networks, traffic flows experience abrupt unusual changes wh...
We investigate the problem of identifying individual link metrics in a communication network from ac...
International audienceAfter the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed...
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to exis...
We study Bayesian models and methods for analysing network traffic counts in problems of inference a...
Mapping the Internet generally consists in sampling the network from a limited set of sources by usi...