default search action
Matthew Roughan
Person information
- affiliation: University of Adelaide, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Cameron Cornell, Lewis Mitchell, Matthew Roughan:
Rank is all you need: development and analysis of robust causal networks. Appl. Netw. Sci. 9(1): 39 (2024) - [c77]David Peter Shorten, Wathsala Karunarathne, Matthew Roughan:
How Is Starlink Manoeuvring? An Analysis of Patterns in the Manoeuvres of Starlink Satellites. IoTBDS 2024: 174-184 - [c76]Alexander Rohl, Matthew Roughan, Martin White, Alexander Chambers:
POSTER: Packet Field Tree: a hybrid approach, open database and evaluation methodology for Automated Protocol Reverse-Engineering. SIGCOMM (Posters and Demos) 2024: 13-15 - [i28]Wathsala Karunarathne, Indu Bala, Dikshit Chauhan, Matthew Roughan, Lewis Mitchell:
Modified CMA-ES Algorithm for Multi-Modal Optimization: Incorporating Niching Strategies and Dynamic Adaptation Mechanism. CoRR abs/2407.00939 (2024) - 2023
- [c75]Cameron Cornell, Lewis Mitchell, Matthew Roughan:
Rank Is All You Need: Robust Estimation of Complex Causal Networks. COMPLEX NETWORKS (3) 2023: 468-482 - [c74]Alex Rohl, Matthew Roughan, Martin White, Alexander Chambers:
Packet Field Tree: a hybrid approach to automated protocol reverse-engineering. TMA 2023: 1-4 - 2022
- [j44]Tobin South, Bridget Smart, Matthew Roughan, Lewis Mitchell:
Information flow estimation: A study of news on Twitter. Online Soc. Networks Media 31: 100231 (2022) - [j43]Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman:
Verifying and Monitoring IoTs Network Behavior Using MUD Profiles. IEEE Trans. Dependable Secur. Comput. 19(1): 1-18 (2022) - [j42]Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen:
Verifiable Policy-Defined Networking Using Metagraphs. IEEE Trans. Dependable Secur. Comput. 19(1): 482-494 (2022) - [j41]Prosha Rahman, Boris Beranger, Scott A. Sisson, Matthew Roughan:
Likelihood-Based Inference for Modelling Packet Transit From Thinned Flow Summaries. IEEE Trans. Signal Inf. Process. over Networks 8: 571-583 (2022) - [c73]Bridget Smart, Joshua Watt, Sara Benedetti, Lewis Mitchell, Matthew Roughan:
#IStandWithPutin Versus #IStandWithUkraine: The Interaction of Bots and Humans in Discussion of the Russia/Ukraine War. SocInfo 2022: 34-53 - [i27]Adam Hamilton, Matthew Roughan, Giang T. Nguyen:
Boolean Expressions in Firewall Analysis. CoRR abs/2205.04210 (2022) - [i26]Tobin South, Bridget Smart, Matthew Roughan, Lewis Mitchell:
Information flow estimation: a study of news on Twitter. CoRR abs/2205.06029 (2022) - [i25]Anna A. Kalenkova, Lewis Mitchell, Matthew Roughan:
Performance Analysis: Discovering Semi-Markov Models From Event Logs. CoRR abs/2206.14415 (2022) - [i24]Bridget Smart, Matthew Roughan, Lewis Mitchell:
The entropy rate of Linear Additive Markov Processes. CoRR abs/2211.05350 (2022) - 2021
- [j40]Samudra Herath, Matthew Roughan, Gary Glonek:
Generating Name-Like Vectors for Testing Large-Scale Entity Resolution. IEEE Access 9: 145288-145300 (2021) - [j39]Tobin South, Matthew Roughan, Lewis Mitchell:
Popularity and centrality in Spotify networks: critical transitions in eigenvector centrality. J. Complex Networks 8(6) (2021) - [j38]Adam Hamilton, Giang T. Nguyen, Matthew Roughan:
Counting Candy Crush configurations. Discret. Appl. Math. 295: 47-56 (2021) - [j37]Andrew Feutrill, Matthew Roughan:
A Review of Shannon and Differential Entropy Rate Estimation. Entropy 23(8): 1046 (2021) - [j36]Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen:
Mathematical Reconciliation of Medical Privacy Policies. ACM Trans. Manag. Inf. Syst. 12(1): 5:1-5:18 (2021) - [i23]Andrew Feutrill, Matthew Roughan:
Differential Entropy Rate Characterisations of Long Range Dependent Processes. CoRR abs/2102.05306 (2021) - [i22]Andrew Feutrill, Matthew Roughan:
NPD Entropy: A Non-Parametric Differential Entropy Rate Estimator. CoRR abs/2105.11580 (2021) - [i21]Andrew Feutrill, Matthew Roughan:
Convergence of Conditional Entropy for Long Range Dependent Markov Chains. CoRR abs/2110.14881 (2021) - [i20]Samudra Herath, Matthew Roughan, Gary Glonek:
High Performance Out-of-sample Embedding Techniques for Multidimensional Scaling. CoRR abs/2111.04067 (2021) - [i19]Samudra Herath, Matthew Roughan, Gary Glonek:
Em-K Indexing for Approximate Query Matching in Large-scale ER. CoRR abs/2111.04070 (2021) - 2020
- [j35]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Bayesian Inference of Network Structure From Information Cascades. IEEE Trans. Signal Inf. Process. over Networks 6: 371-381 (2020) - [c72]Michelle Edwards, Jonathan Tuke, Matthew Roughan, Lewis Mitchell:
The one comparing narrative social network extraction techniques. ASONAM 2020: 905-913 - [c71]Samudra Herath, Matthew Roughan, Gary Glonek:
Landmarks-based Blocking Method For Large-scale Entity Resolution. DSAA 2020: 773-774 - [c70]Caitlin Gray, Clemens Mosig, Randy Bush, Cristel Pelsser, Matthew Roughan, Thomas C. Schmidt, Matthias Wählisch:
BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap Damping. Internet Measurement Conference 2020: 492-505 - [c69]Andrew Feutrill, Matthew Roughan, Joshua Ross, Yuval Yarom:
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities. TPS-ISA 2020: 1-11 - [i18]Tobin South, Matthew Roughan, Lewis Mitchell:
Popularity and Centrality in Spotify Networks: Critical transitions in eigenvector centrality. CoRR abs/2008.11428 (2020) - [i17]Samudra Herath, Matthew Roughan, Gary Glonek:
Simulating Name-like Vectors for Testing Large-scale Entity Resolution. CoRR abs/2009.03014 (2020) - [i16]Matthew Roughan:
The Polylogarithm Function in Julia. CoRR abs/2010.09860 (2020)
2010 – 2019
- 2019
- [j34]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Generating connected random graphs. J. Complex Networks 7(6): 896-912 (2019) - [j33]Matthew Roughan:
Practically surreal: Surreal arithmetic in Julia. SoftwareX 9: 293-298 (2019) - [c68]Matthew Roughan, Jonathan Tuke, Eric Parsonage:
Estimating the Parameters of the Waxman Random Graph. WAW 2019: 71-86 - [i15]Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus Benson, Matthew Roughan, Vijay Sivaraman:
Verifying and Monitoring IoTs Network Behavior using MUD Profiles. CoRR abs/1902.02484 (2019) - [i14]Dinesha Ranathunga, Matthew Roughan, Paul Tune, Phil Kernick, Nick Falkner:
ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report). CoRR abs/1902.05689 (2019) - [i13]Matthew Roughan, Lewis Mitchell, Tobin South:
How the Avengers assemble: Ecological modelling of effective cast sizes for movies. CoRR abs/1906.08403 (2019) - [i12]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Bayesian inference of network structure from information cascades. CoRR abs/1908.03318 (2019) - [i11]Adam Hamilton, Giang T. Nguyen, Matthew Roughan:
Counting Candy Crush Configurations. CoRR abs/1908.09996 (2019) - 2018
- [j32]Hui Xia, Bin Fang, Matthew Roughan, Kenjiro Cho, Paul Tune:
A BasisEvolution framework for network traffic anomaly detection. Comput. Networks 135: 15-31 (2018) - [c67]Paul Tune, Matthew Roughan, Chris Wiren:
Hierarchical Traffic Matrices: Axiomatic Foundations to Practical Traffic Matrix Synthesis. APSIPA 2018: 1591-1600 - [c66]Andrew Feutrill, Dinesha Ranathunga, Yuval Yarom, Matthew Roughan:
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay. CANDAR 2018: 1-10 - [c65]George Geoffrey Michaelson, Matthew Roughan, Jonathan Tuke, Matt P. Wand, Randy Bush:
Rasch Analysis of HTTPS Reachability. Networking 2018: 1-9 - [c64]Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Matthew Roughan, Vijay Sivaraman:
Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles. IoT S&P@SIGCOMM 2018: 8-14 - [c63]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Super-blockers and the Effect of Network Structure on Information Cascades. WWW (Companion Volume) 2018: 1435-1441 - [i10]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Network structure inhibits information cascades in heavy-tailed social networks. CoRR abs/1802.05039 (2018) - [i9]Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Matthew Roughan, Vijay Sivaraman:
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report). CoRR abs/1804.04358 (2018) - [i8]Caitlin Gray, Lewis Mitchell, Matthew Roughan:
Generating Connected Random Graphs. CoRR abs/1806.11276 (2018) - [i7]Michelle Edwards, Lewis Mitchell, Jonathan Tuke, Matthew Roughan:
The one comparing narrative social network extraction techniques. CoRR abs/1811.01467 (2018) - 2017
- [j31]Dinesha Ranathunga, Hung X. Nguyen, Matthew Roughan:
MGtoolkit: A python package for implementing metagraphs. SoftwareX 6: 91-93 (2017) - [j30]Eric Parsonage, Matthew Roughan:
Fast Generation of Spatially Embedded Random Networks. IEEE Trans. Netw. Sci. Eng. 4(2): 112-119 (2017) - [j29]Paul Tune, Matthew Roughan:
Controlled Synthesis of Traffic Matrices. IEEE/ACM Trans. Netw. 25(3): 1582-1592 (2017) - [c62]Long Gong, Lanxi Huang, Paul Tune, Jinyoung Han, Chen-Nee Chuah, Matthew Roughan, Jun (Jim) Xu:
ForestStream: Accurate Measurement of Cascades in Online Social Networks. ICCCN 2017: 1-9 - [i6]George Michaelson, Matthew Roughan, Jonathan Tuke, Matt P. Wand, Randy Bush:
Rigorous statistical analysis of HTTPS reachability. CoRR abs/1706.02813 (2017) - 2016
- [j28]Dinesha Ranathunga, Matthew Roughan, Hung X. Nguyen, Phil Kernick, Nickolas J. G. Falkner:
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices. IEEE Trans. Netw. Serv. Manag. 13(4): 871-884 (2016) - [c61]Paul Tune, Matthew Roughan, Kenjiro Cho:
A comparison of information criteria for traffic model selection. ICSPCS 2016: 1-10 - [c60]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:
Malachite: Firewall policy comparison. ISCC 2016: 310-317 - [c59]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:
The Mathematical Foundations for Mapping Policies to Network Devices. SECRYPT 2016: 197-206 - [c58]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock:
Verifiable Policy-defined Networking for Security Management. SECRYPT 2016: 344-351 - [i5]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:
The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report). CoRR abs/1605.09115 (2016) - 2015
- [j27]Wilko Henecka, Matthew Roughan:
Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases. IEEE Trans. Dependable Secur. Comput. 12(6): 640-651 (2015) - [c57]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen:
Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy. CPSS@ASIACSS 2015: 37-48 - [c56]Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:
Towards Standardising Firewall Reporting. CyberICS/WOS-CPS@ESORICS 2015: 127-143 - [c55]Wilko Henecka, Matthew Roughan:
Lossy Compression of Dynamic, Weighted Graphs. FiCloud 2015: 427-434 - [c54]Matthew Roughan, Simon Jonathan Tuke:
The Hitchhikers Guide to Sharing Graph Data. FiCloud 2015: 435-442 - [c53]Paul Tune, Matthew Roughan:
Spatiotemporal Traffic Matrix Synthesis. SIGCOMM 2015: 579-592 - [i4]Matthew Roughan, Simon Jonathan Tuke:
Unravelling Graph-Exchange File Formats. CoRR abs/1503.02781 (2015) - [i3]Jonathan Tuke, Matthew Roughan:
All networks look the same to me: Testing for homogeneity in networks. CoRR abs/1512.00877 (2015) - [i2]Eric Parsonage, Matthew Roughan:
Fast Generation of Spatially Embedded Random Networks. CoRR abs/1512.03532 (2015) - 2014
- [j26]Paul Tune, Matthew Roughan:
Maximum entropy traffic matrix synthesis. SIGMETRICS Perform. Evaluation Rev. 42(2): 43-45 (2014) - [c52]Rhys Alistair Bowden, Matthew Roughan, Nigel G. Bean:
COLD: PoP-level Network Topology Synthesis. CoNEXT 2014: 173-184 - [c51]Paul Tune, Matthew Roughan:
Network-design sensitivity analysis. SIGMETRICS 2014: 449-461 - 2013
- [j25]Hung X. Nguyen, Matthew Roughan:
Rigorous Statistical Analysis of Internet Loss Measurements. IEEE/ACM Trans. Netw. 21(3): 734-745 (2013) - [j24]Hung X. Nguyen, Matthew Roughan:
Multi-Observer Privacy-Preserving Hidden Markov Models. IEEE Trans. Signal Process. 61(23): 6010-6019 (2013) - [c50]Simon Knight, Hung X. Nguyen, Olaf Maennel, Iain Phillips, Nickolas J. G. Falkner, Randy Bush, Matthew Roughan:
An automated system for emulated network experimentation. CoNEXT 2013: 235-246 - [c49]Wilko Henecka, Matthew Roughan:
STRIP: Privacy-preserving vector-based routing. ICNP 2013: 1-10 - [c48]Paul Tune, Hung X. Nguyen, Matthew Roughan:
Hidden Markov model identifiability via tensors. ISIT 2013: 2299-2303 - [e2]Matthew Roughan, Rocky K. C. Chang:
Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings. Lecture Notes in Computer Science 7799, Springer 2013, ISBN 978-3-642-36515-7 [contents] - [i1]Paul Tune, Hung X. Nguyen, Matthew Roughan:
Hidden Markov Model Identifiability via Tensors. CoRR abs/1305.0321 (2013) - 2012
- [j23]Simon Knight, Nickolas J. G. Falkner, Hung X. Nguyen, Paul Tune, Matthew Roughan:
I can see for miles: Re-visualizing the internet. IEEE Netw. 26(6): 26-32 (2012) - [j22]Hung X. Nguyen, Matthew Roughan:
Improving Hidden Markov Model Inferences With Private Data From Multiple Observers. IEEE Signal Process. Lett. 19(10): 696-699 (2012) - [j21]Matthew Roughan, Yin Zhang, Walter Willinger, Lili Qiu:
Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended Version). IEEE/ACM Trans. Netw. 20(3): 662-676 (2012) - [c47]Hung X. Nguyen, Matthew Roughan:
On the identifiability of multi-observer hidden Markov models. ICASSP 2012: 1873-1876 - [c46]Wilko Henecka, Nigel G. Bean, Matthew Roughan:
Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain. ICICS 2012: 131-141 - [c45]Hung X. Nguyen, Matthew Roughan:
Multi-observer privacy-preserving Hidden Markov Models. NOMS 2012: 514-517 - [c44]Simon Knight, Askar Jaboldinov, Olaf Maennel, Iain Phillips, Matthew Roughan:
AutoNetkit: simplifying large scale, open-source network experimentation. SIGCOMM 2012: 97-98 - 2011
- [j20]Simon Knight, Hung X. Nguyen, Nick Falkner, Rhys Alistair Bowden, Matthew Roughan:
The Internet Topology Zoo. IEEE J. Sel. Areas Commun. 29(9): 1765-1775 (2011) - [j19]Matthew Roughan, Walter Willinger, Olaf Maennel, Debbie Perouli, Randy Bush:
10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems. IEEE J. Sel. Areas Commun. 29(9): 1810-1821 (2011) - [j18]Matthew Roughan, Yin Zhang:
GATEway: symbiotic inter-domain traffic engineering. Telecommun. Syst. 47(1-2): 3-17 (2011) - [c43]Laura Balzano, Robert D. Nowak, Matthew Roughan:
On the success of network inference using a markov routing model. ICASSP 2011: 3108-3111 - [c42]Eric Parsonage, Hung X. Nguyen, Rhys Alistair Bowden, Simon Knight, Nickolas J. G. Falkner, Matthew Roughan:
Generalized graph products for network design and analysis. ICNP 2011: 79-88 - [c41]Joel Sommers, Rhys Alistair Bowden, Brian Eriksson, Paul Barford, Matthew Roughan, Nick G. Duffield:
Efficient network-wide flow record generation. INFOCOM 2011: 2363-2371 - [c40]Hui Tian, Matthew Roughan, Yingpeng Sang, Hong Shen:
Diffusion Wavelets-Based Analysis on Traffic Matrices. PDCAT 2011: 116-121 - [c39]Rhys Alistair Bowden, Matthew Roughan, Nigel G. Bean:
Network link tomography and compressive sensing. SIGMETRICS 2011: 159-160 - [c38]Rhys Alistair Bowden, Hung X. Nguyen, Nick Falkner, Simon Knight, Matthew Roughan:
Planarity of data networks. ITC 2011: 254-261 - 2010
- [j17]Ashley Flavel, Jeremy McMahon, Aman Shaikh, Matthew Roughan, Nigel G. Bean:
BGP route prediction within ISPs. Comput. Commun. 33(10): 1180-1190 (2010) - [j16]Matthew Roughan:
A Case Study of the Accuracy of SNMP Measurements. J. Electr. Comput. Eng. 2010: 812979:1-812979:7 (2010) - [c37]Brian Eriksson, Paul Barford, Rhys Alistair Bowden, Nick G. Duffield, Joel Sommers, Matthew Roughan:
BasisDetect: a model-based network event detection framework. Internet Measurement Conference 2010: 451-464 - [c36]Hung X. Nguyen, Matthew Roughan:
Rigorous statistical analysis of internet loss measurements. SIGMETRICS 2010: 361-362 - [c35]Hung X. Nguyen, Matthew Roughan, Simon Knight, Nick Falkner, Olaf Maennel, Randy Bush:
How to Build Complex, Large-Scale Emulated Networks. TRIDENTCOM 2010: 3-18
2000 – 2009
- 2009
- [j15]Matthew Roughan:
The Measurement Paradox in Valiant Network Design. J. Electr. Comput. Eng. 2009: 939840:1-939840:5 (2009) - [c34]Randy Bush, Olaf Maennel, Matthew Roughan, Steve Uhlig:
Internet optometry: assessing the broken glasses in internet reachability. Internet Measurement Conference 2009: 242-253 - [c33]Ashley Flavel, Jeremy McMahon, Aman Shaikh, Matthew Roughan, Nigel G. Bean:
Humpty Dumpty: Putting iBGP Back Together Again. Networking 2009: 52-65 - [c32]Ashley Flavel, Matthew Roughan:
Stable and flexible iBGP. SIGCOMM 2009: 183-194 - [c31]Yin Zhang, Matthew Roughan, Walter Willinger, Lili Qiu:
Spatio-temporal compressive sensing and internet traffic matrices. SIGCOMM 2009: 267-278 - [c30]Alice Bednarz, Nigel G. Bean, Matthew Roughan:
Hiccups on the road to privacy-preserving linear programming. WPES 2009: 117-120 - 2008
- [j14]Haakon Ringberg, Matthew Roughan, Jennifer Rexford:
The need for simulation in evaluating anomaly detectors. Comput. Commun. Rev. 38(1): 55-59 (2008) - [j13]Matthew Roughan, Steve Uhlig, Walter Willinger:
Guest editorial - internet scalability: properties and evolution. IEEE Netw. 22(2): 4-5 (2008) - [c29]Ashley Flavel, Matthew Roughan, Nigel G. Bean, Aman Shaikh:
Where's Waldo? practical searches for stability in iBGP. ICNP 2008: 308-317 - [c28]Andrew Coyle, Miro Kraetzl, Olaf Maennel, Matthew Roughan:
On the predictive power of shortest-path weight inference. Internet Measurement Conference 2008: 305-310 - [c27]Matthew Roughan, Simon Jonathan Tuke, Olaf Maennel:
Bigfoot, sasquatch, the yeti and other missing links: what we don't know about the as graph. Internet Measurement Conference 2008: 325-330 - [c26]David Rincón, Matthew Roughan, Walter Willinger:
Towards a meaningful MRA of traffic matrices. Internet Measurement Conference 2008: 331-336 - [c25]Hui Tian, Hong Shen, Matthew Roughan:
Maximizing Networking Lifetime in Wireless Sensor Networks with Regular Topologies. PDCAT 2008: 211-217 - [c24]Matthew Roughan, Yin Zhang:
GATEway: symbiotic inter-domain traffic engineering. VALUETOOLS 2008: 11 - 2007
- [j12]Matthew Roughan, Darryl Veitch:
Some remarks on unexpected scaling exponents. Comput. Commun. Rev. 37(5): 71-74 (2007) - [c23]Matthew Roughan, Jon Arnold:
Multiple Target Localisation in Sensor Networks with Location Privacy. ESAS 2007: 116-128 - [c22]Jon Arnold, Nigel G. Bean, Miro Kraetzl, Matthew Roughan, Matthew Sorell:
Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks. ICC 2007: 3546-3553 - [c21]Jon Arnold, Nigel G. Bean, Miro Kraetzl, Matthew Roughan:
Node Localisation in Wireless Ad Hoc Networks. ICON 2007: 1-6 - [c20]Randy Bush, James Hiebert, Olaf Maennel, Matthew Roughan, Steve Uhlig:
Testing the reachability of (new) address space. INM@SIGCOMM 2007: 236-241 - [c19]Ashley Flavel, Matthew Roughan, Nigel G. Bean, Olaf Maennel:
Modeling BGP Table Fluctuations. ITC 2007: 141-153 - [e1]Constantine Dovrolis, Matthew Roughan:
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007. ACM 2007, ISBN 978-1-59593-908-1 [contents] - 2006
- [j11]Matthew Roughan, Yin Zhang:
Secure distributed data-mining and its application to large-scale network measurements. Comput. Commun. Rev. 36(1): 7-14 (2006) - [j10]Matthew Roughan:
Public review for the devil and packet trace anonymization. Comput. Commun. Rev. 36(1): 27-28 (2006) - [j9]Matthew Roughan:
A Comparison of Poisson and Uniform Sampling for Active Measurements. IEEE J. Sel. Areas Commun. 24(12): 2299-2312 (2006) - [j8]David L. Alderson, Hyunseok Chang, Matthew Roughan, Steve Uhlig, Walter Willinger:
The many facets of internet topology and traffic. Networks Heterog. Media 1(4): 569-600 (2006) - [c18]Matthew Roughan, Yin Zhang:
Privacy-preserving performance measurements. MineNet 2006: 329-334 - [c17]Wolfgang Mühlbauer, Anja Feldmann, Olaf Maennel, Matthew Roughan, Steve Uhlig:
Building an AS-topology model that captures route diversity. SIGCOMM 2006: 195-206 - 2005
- [j7]Matthew Roughan:
Simplifying the synthesis of internet traffic matrices. Comput. Commun. Rev. 35(5): 93-96 (2005) - [j6]Yin Zhang, Matthew Roughan, Carsten Lund, David L. Donoho:
Estimating point-to-point and point-to-multipoint traffic matrices: an information-theoretic approach. IEEE/ACM Trans. Netw. 13(5): 947-960 (2005) - [c16]Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew Roughan:
Network Anomography. Internet Measurement Conference 2005: 317-330 - [c15]Renata Teixeira, Nick G. Duffield, Jennifer Rexford, Matthew Roughan:
Traffic Matrix Reloaded: Impact of Routing Changes. PAM 2005: 251-264 - [c14]Matthew Roughan:
Fundamental bounds on the accuracy of network performance measurements. SIGMETRICS 2005: 253-264 - 2004
- [c13]Matthew Roughan, Subhabrata Sen, Oliver Spatscheck, Nick G. Duffield:
Class-of-service mapping for QoS: a statistical signature-based approach to IP traffic classification. Internet Measurement Conference 2004: 135-148 - [c12]Matthew Roughan, Timothy G. Griffin, Z. Morley Mao, Albert G. Greenberg, Brian Freeman:
IP forwarding anomalies and improving their detection using multiple data sources. NetT@SIGCOMM 2004: 307-312 - [c11]Matthew Roughan, Timothy Griffin, Zhuoqing Morley Mao, Albert G. Greenberg, Brian Freeman:
Combining routing and traffic data for detection of IP forwarding anomalies. SIGMETRICS 2004: 416-417 - 2003
- [j5]Matthew Roughan, Charles R. Kalmanek:
Pragmatic modeling of broadband access traffic. Comput. Commun. 26(8): 804-816 (2003) - [c10]Zhuoqing Morley Mao, Randy Bush, Timothy Griffin, Matthew Roughan:
BGP beacons. Internet Measurement Conference 2003: 1-14 - [c9]Matthew Roughan, Mikkel Thorup, Yin Zhang:
Traffic engineering with estimated traffic matrices. Internet Measurement Conference 2003: 248-258 - [c8]Yin Zhang, Matthew Roughan, Carsten Lund, David L. Donoho:
An information-theoretic approach to traffic matrix estimation. SIGCOMM 2003: 301-312 - [c7]Yin Zhang, Matthew Roughan, Nick G. Duffield, Albert G. Greenberg:
Fast accurate computation of large-scale IP traffic matrices from link loads. SIGMETRICS 2003: 206-217 - [c6]Matthew Roughan, Mikkel Thorup, Yin Zhang:
Performance of estimated traffic matrices in traffic engineering. SIGMETRICS 2003: 326-327 - 2002
- [j4]Ashok Erramilli, Matthew Roughan, Darryl Veitch, Walter Willinger:
Self-similar traffic and network dynamics. Proc. IEEE 90(5): 800-819 (2002) - [j3]Matthew Roughan, Charles E. M. Pearce:
Martingale Methods for Analysing Single-Server Queues. Queueing Syst. Theory Appl. 41(3): 205-239 (2002) - [c5]Matthew Roughan, Albert G. Greenberg, Charles R. Kalmanek, Michael P. Rumsewicz, Jennifer Yates, Yin Zhang:
Experience in measuring backbone traffic variability: models, metrics, measurements and meaning. Internet Measurement Workshop 2002: 91-92 - [c4]Aman Shaikh, Chris Isett, Albert G. Greenberg, Matthew Roughan, Joel Gottlieb:
A case study of OSPF behavior in a large enterprise network. Internet Measurement Workshop 2002: 217-230 - 2000
- [j2]Matthew Roughan, Darryl Veitch, Patrice Abry:
Real-time estimation of the parameters of long-range dependence. IEEE/ACM Trans. Netw. 8(4): 467-478 (2000)
1990 – 1999
- 1999
- [c3]John N. Daigle, Matthew Roughan:
Queue-Length Distributions for Multi-Priority Queueing Systems. INFOCOM 1999: 641-648 - [c2]Matthew Roughan, Darryl Veitch:
Measuring Long-Range Dependence under Changing Traffic Conditions. INFOCOM 1999: 1513-1521 - 1998
- [c1]Matthew Roughan, Darryl Veitch, Michael P. Rumsewicz:
Computing Queue-Length Distributions for Power-Law Queues. INFOCOM 1998: 356-363 - 1996
- [j1]Matthew Roughan, Kenneth Pope:
The Determinant of a Triangular-Block Matrix. SIAM Rev. 38(3): 513-514 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint