default search action
IEEE/ACM Transactions on Networking, Volume 30
Volume 30, Number 1, February 2022
- Kuan-yin Chen, Sen Liu, Yang Xu, Ishant Kumar Siddhrau, Siyu Zhou, Zehua Guo, H. Jonathan Chao:
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane. 1-17 - Archana Bura, Desik Rengarajan, Dileep Kalathil, Srinivas Shakkottai, Jean-François Chamberland:
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms. 18-31 - Rajarshi Bhattacharyya, Archana Bura, Desik Rengarajan, Mason Rumuly, Bainan Xia, Srinivas Shakkottai, Dileep Kalathil, Ricky K. P. Mok, Amogh Dhamdhere:
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge. 32-46 - Yi Ding, Ling Liu, Yu Yang, Yunhuai Liu, Desheng Zhang, Tian He:
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild. 47-61 - Vahid Khalilpour Akram, Orhan Dagdeviren, Bülent Tavli:
A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks. 62-75 - Jeman Park, Rhongho Jang, Manar Mohaisen, David Mohaisen:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. 76-89 - Xilai Liu, Yan Xu, Peng Liu, Tong Yang, Jiaqi Xu, Lun Wang, Gaogang Xie, Xiaoming Li, Steve Uhlig:
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges. 90-106 - Arani Bhattacharya, Caitao Zhan, Abhishek Maji, Himanshu Gupta, Samir R. Das, Petar M. Djuric:
Selection of Sensors for Efficient Transmitter Localization. 107-119 - Bangbang Ren, Deke Guo, Yali Yuan, Guoming Tang, Weijun Wang, Xiaoming Fu:
Optimal Deployment of SRv6 to Enable Network Interconnection Service. 120-133 - Yu Zhang, Tao Gu, Xi Zhang:
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing. 134-147 - Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr:
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning. 148-161 - Umut Can Çabuk, Mustafa Tosun, Orhan Dagdeviren:
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks. 162-175 - Zhiguo Shi, Guang Yang, Xiaowen Gong, Shibo He, Jiming Chen:
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing. 176-189 - Xin Liu, Lei Ying:
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime. 190-201 - Muhammad Saad, Victor Cook, Lan N. Nguyen, My T. Thai, David Mohaisen:
Exploring Partitioning Attacks on the Bitcoin Network. 202-214 - Xiaoxi Zhang, Jianyu Wang, Li-Feng Lee, Tom Yang, Akansha Kalra, Gauri Joshi, Carlee Joe-Wong:
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs. 215-228 - Cho-Hsin Tsai, Chih-Chun Wang:
Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination With Random Two-Way Delay. 229-242 - Xu Li, Feilong Tang, Yanmin Zhu, Luoyi Fu, Jiadi Yu, Long Chen, Jiacheng Liu:
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs. 243-256 - Chong Li, Sisu Xi, Chenyang Lu, Roch Guérin, Christopher D. Gill:
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen. 257-270 - Yuchong Hu, Xiaoyang Zhang, Patrick P. C. Lee, Pan Zhou:
NCScale: Toward Optimal Storage Scaling via Network Coding. 271-284 - Sheng Zhang, Can Wang, Yibo Jin, Jie Wu, Zhuzhong Qian, Mingjun Xiao, Sanglu Lu:
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics. 285-298 - Chaoyi Ma, Shigang Chen, Youlin Zhang, Qingjun Xiao, Olufemi O. Odegbile:
Super Spreader Identification Using Geometric-Min Filter. 299-312 - Junjie Xie, Chen Qian, Deke Guo, Minmei Wang, Ge Wang, Honghui Chen:
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems. 313-326 - Xiaoyi Pang, Zhibo Wang, Defang Liu, John C. S. Lui, Qian Wang, Ju Ren:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. 327-340 - Tim Hellemans, Benny Van Houdt:
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting. 341-353 - Tom Barbette, Erfan Wu, Dejan Kostic, Gerald Q. Maguire Jr., Panagiotis Papadimitratos, Marco Chiesa:
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency. 354-367 - Ning Chen, Tie Qiu, Zilong Lu, Dapeng Oliver Wu:
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things. 368-381 - Reuven Cohen, Matty Kadosh, Alan Lo, Qasem Sayah:
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless. 382-393 - Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. 394-408 - Xuewei Feng, Qi Li, Kun Sun, Chuanpu Fu, Ke Xu:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. 409-422 - Lizhao You, Jiahua Zhang, Yili Jin, Hao Tang, Xiao Li:
Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks. 423-436 - Tal Shapira, Yuval Shavitt:
SASA: Source-Aware Self-Attention for IP Hijack Detection. 437-449 - Mehrnoosh Shafiee, Javad Ghaderi:
Scheduling Coflows With Dependency Graph. 450-463 - Prakirt Raj Jhunjhunwala, Siva Theja Maguluri:
Low-Complexity Switch Scheduling Algorithms: Delay Optimality in Heavy Traffic. 464-473
Volume 30, Number 2, April 2022
- Giovanni Neglia, Michele Garetto, Emilio Leonardi:
Similarity Caching: Theory and Algorithms. 475-486 - Jianhan Song, Gustavo de Veciana, Sanjay Shakkottai:
Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback. 487-500 - Cuiying Feng, Jianwei An, Kui Wu, Jianping Wang:
Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography. 501-514 - Dapeng Qu, Guoxin Lv, Shijun Qu, Haiying Shen, Yue Yang, Zhaoyang Heng:
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN. 515-528 - Zhuo Li, Jindian Liu, Liu Yan, Beichuan Zhang, Peng Luo, Kaihua Liu:
Smart Name Lookup for NDN Forwarding Plane via Neural Networks. 529-541 - Shuihai Hu, Gaoxiong Zeng, Wei Bai, Zilong Wang, Baochen Qiao, Kai Chen, Kun Tan, Yi Wang:
Aeolus: A Building Block for Proactive Transport in Datacenter Networks. 542-556 - Yu Sun, Chi Lin, Haipeng Dai, Pengfei Wang, Lei Wang, Guowei Wu, Qiang Zhang:
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs. 557-571 - Shuai Wang, Jinkun Geng, Dan Li:
Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology. 572-585 - Yuanpeng Li, Xiang Yu, Yilong Yang, Yang Zhou, Tong Yang, Zhuo Ma, Shigang Chen:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. 586-600 - Yan Huang, Shaoran Li, Y. Thomas Hou, Wenjing Lou:
GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR. 601-615 - Leonardo Lanante, Sumit Roy:
Performance Analysis of the IEEE 802.11ax OBSS_PD-Based Spatial Reuse. 616-628 - Penghao Sun, Zehua Guo, Junfei Li, Yang Xu, Julong Lan, Yuxiang Hu:
Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes. 629-640 - Xiuzhen Guo, Longfei Shangguan, Yuan He, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, Yunhao Liu:
Efficient Ambient LoRa Backscatter With On-Off Keying Modulation. 641-654 - Jorge Martín-Pérez, Francesco Malandrino, Carla-Fabiana Chiasserini, Milan Groshev, Carlos J. Bernardos:
KPI Guarantees in Network Slicing. 655-668 - Bahman Abolhassani, John Tadrous, Atilla Eryilmaz:
Single vs Distributed Edge Caching for Dynamic Content. 669-682 - Sergi Rene, Onur Ascigil, Ioannis Psaras, George Pavlou:
A Congestion Control Framework Based on In-Network Resource Pooling. 683-697 - Yuchen Liu, Yubing Jian, Raghupathy Sivakumar, Douglas M. Blough:
Maximizing Line-of-Sight Coverage for mmWave Wireless LANs With Multiple Access Points. 698-716 - Hankun Cao, Qifa Yan, Xiaohu Tang, Guojun Han:
Adaptive Gradient Coding. 717-734 - Pan Lai, Rui Fan, Xiao Zhang, Wei Zhang, Fang Liu, Joey Tianyi Zhou:
Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems. 735-748 - Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. 749-765 - Ingo van Duijn, Peter Gjøl Jensen, Jesper Stenbjerg Jensen, Troels Beck Krøgh, Jonas Sand Madsen, Stefan Schmid, Jirí Srba, Marc Tom Thorgersen:
Automata-Theoretic Approach to Verification of MPLS Networks Under Link Failures. 766-781 - Sabarish Krishna Moorthy, Maxwell McManus, Zhangyu Guan:
ESN Reinforcement Learning for Spectrum and Flight Control in THz-Enabled Drone Networks. 782-795 - Kurian Polachan, Joydeep Pal, Chandramani Singh, Prabhakar Venkata Tamma, Fernando A. Kuipers:
TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems. 796-811 - Wenzheng Xu, Tao Xiao, Junqi Zhang, Weifa Liang, Zichuan Xu, Xuxun Liu, Xiaohua Jia, Sajal K. Das:
Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks. 812-825 - Qiaolun Zhang, Omran Ayoub, Jun Wu, Francesco Musumeci, Gaolei Li, Massimo Tornatore:
Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures. 826-839 - Tzu-Hsuan Liu, Che-Hao Yu, Yi-Jheng Lin, Chia-Ming Chang, Cheng-Shang Chang, Duan-Shin Lee:
ALOHA Receivers: A Network Calculus Approach for Analyzing Coded Multiple Access With SIC. 840-854 - Renyong Wu, Jieming Ma, Zhixiang Tang, Xiehua Li, Kim-Kwang Raymond Choo:
A Generic Secure Transmission Scheme Based on Random Linear Network Coding. 855-866 - Chenghao Rong, Jessie Hui Wang, Juncai Liu, Jilong Wang, Fenghua Li, Xiaolei Huang:
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics. 867-880 - Wenzheng Xu, Yueying Sun, Rui Zou, Weifa Liang, Qiufen Xia, Feng Shan, Tian Wang, Xiaohua Jia, Zheng Li:
Throughput Maximization of UAV Networks. 881-895 - Yanjiao Chen, Meng Xue, Jian Zhang, Runmin Ou, Qian Zhang, Peng Kuang:
DetectDUI: An In-Car Detection System for Drink Driving and BACs. 896-910 - Jonatha Anselmi, Neil Walton:
Stability and Optimization of Speculative Queueing Networks. 911-922 - Ziyi Wang, Yong Cui, Xiaoyu Hu, Xin Wang, Wei Tsang Ooi, Zhen Cao, Yi Li:
MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming. 923-938 - Zhaowei Xi, Yu Zhou, Dai Zhang, Kai Gao, Chen Sun, Jiamin Cao, Yangyang Wang, Mingwei Xu, Jianping Wu:
Newton: Intent-Driven Network Traffic Monitoring. 939-952
Volume 30, Number 3, June 2022
- Ibrahim Kettaneh, Ahmed Alquraan, Hatem Takruri, Ali José Mashtizadeh, Samer Al-Kiswany:
Accelerating Reads With In-Network Consistency-Aware Load Balancing. 954-968 - Zehua Guo, Songshi Dou, Sen Liu, Wendi Feng, Wenchao Jiang, Yang Xu, Zhi-Li Zhang:
Maintaining Control Resiliency and Flow Programmability in Software-Defined WANs During Controller Failures. 969-984 - Yaniv Sadeh, Ori Rottenstreich, Haim Kaplan:
Optimal Weighted Load Balancing in TCAMs. 985-998 - Zhixiong Niu, Qiang Su, Peng Cheng, Yongqiang Xiong, Dongsu Han, Keith Winstein, Chun Jason Xue, Hong Xu:
NetKernel: Making Network Stack Part of the Virtualized Infrastructure. 999-1013 - Yordanos Tibebu Woldeyohannes, Besmir Tola, Yuming Jiang, K. K. Ramakrishnan:
CoShare: An Efficient Approach for Redundancy Allocation in NFV. 1014-1028 - Zhengkai Shi, Yipeng Zhou, Di Wu, Chen Wang:
PPVC: Online Learning Toward Optimized Video Content Caching. 1029-1044 - Ehsan Mohammadpour, Jean-Yves Le Boudec:
On Packet Reordering in Time-Sensitive Networks. 1045-1057 - Khashayar Kamran, Edmund Yeh, Qian Ma:
DECO: Joint Computation Scheduling, Caching, and Communication in Data-Intensive Computing Networks. 1058-1072 - Alon Rashelbach, Ori Rottenstreich, Mark Silberstein:
A Computational Approach to Packet Classification. 1073-1087 - Hao Li, Peng Zhang, Guangda Sun, Wanyue Cao, Chengchen Hu, Danfeng Shan, Tian Pan, Qiang Fu:
Compiling Cross-Language Network Programs Into Hybrid Data Plane. 1088-1103 - Shuai Tong, Jiliang Wang, Yunhao Liu:
Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs. 1104-1117 - Jia Liu, Xi Yu, Xuan Liu, Xingyu Chen, Haisong Liu, Yanyan Wang, Lijun Chen:
Time-Efficient Range Detection in Commodity RFID Systems. 1118-1131 - Kaiyang Liu, Jun Peng, Jingrong Wang, Jianping Pan:
Optimal Caching for Low Latency in Distributed Coded Storage Systems. 1132-1145 - Jingzhou Wang, Gongming Zhao, Hongli Xu, Yutong Zhai, Qianyu Zhang, He Huang, Yongqiang Yang:
A Robust Service Mapping Scheme for Multi-Tenant Clouds. 1146-1161 - Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam:
Network Traffic Shaping for Enhancing Privacy in IoT Systems. 1162-1177 - Chongrong Fang, Haoyu Liu, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng, Jiming Chen:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. 1178-1192 - Hehuan Shi, Lin Chen:
Downlink Transmission Scheduling With Data Sharing. 1193-1202 - Qingyu Liu, Haibo Zeng, Minghua Chen:
Minimizing AoI With Throughput Requirements in Multi-Path Network Communication. 1203-1216 - Fernando Pérez-Bueno, Luz García, Gabriel Maciá-Fernández, Rafael Molina:
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection. 1217-1229 - Huaqing Tu, Gongming Zhao, Hongli Xu, Yangming Zhao, Yutong Zhai:
A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds. 1230-1244 - Hehuan Shi, Lin Chen:
From Spectrum Bonding to Contiguous-Resource Batching Task Scheduling. 1245-1254 - Qiong Wu, Kaiwen He, Xu Chen, Shuai Yu, Junshan Zhang:
Deep Transfer Learning Across Cities for Mobile Traffic Prediction. 1255-1267 - Abdalla Hussein, Catherine Rosenberg, Patrick Mitran:
Hybrid NOMA in Multi-Cell Networks: From a Centralized Analysis to Practical Schemes. 1268-1282 - Yiwen Qi, Wenke Yu, Xudong Zhao, Xindi Xu:
Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks. 1283-1293 - Chaoyun Zhang, Xavier Costa-Pérez, Paul Patras:
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. 1294-1311 - Guocheng Liao, Xu Chen, Jianwei Huang:
Privacy-Aware Online Social Networking With Targeted Advertisement. 1312-1327 - Hongyi Zhou, Kefan Lv, Longbo Huang, Xiongfeng Ma:
Quantum Network: Security Assessment and Key Management. 1328-1339 - Yanyan Han, Hongyi Wu:
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks. 1340-1351 - Jian An, Zhenxing Wang, Xin He, Xiaolin Gui, Jindong Cheng, Ruowei Gui:
PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications. 1352-1367 - Zhiyuan Wang, Jiancheng Ye, Dong Lin, Yipei Chen, John C. S. Lui:
Approximate and Deployable Shortest Remaining Processing Time Scheduler. 1368-1381 - Hyeryung Jang, HyungSeok Song, Yung Yi:
On Cost-Efficient Learning of Data Dependency. 1382-1394 - Jiamin Cao, Ying Liu, Yu Zhou, Lin He, Mingwei Xu:
TurboNet: Faithfully Emulating Networks With Programmable Switches. 1395-1409 - Seungsoo Lee, Seungwon Woo, Jinwoo Kim, Jaehyun Nam, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. 1410-1423 - Xin He, Jiaqi Zheng, Haipeng Dai, Chong Zhang, Geng Li, Wanchun Dou, Wajid Rafique, Qiang Ni, Guihai Chen:
Continuous Network Update With Consistency Guaranteed in Software-Defined Networks. 1424-1438
Volume 30, Number 4, August 2022
- Ran Ben Basat, Gil Einziger, Isaac Keslassy, Ariel Orda, Shay Vargaftik, Erez Waisbard:
Memento: Making Sliding Windows Efficient for Heavy Hitters. 1440-1453 - Junghoon Kim, Taejoon Kim, Morteza Hashemi, David J. Love, Christopher G. Brinton:
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks. 1454-1468 - Jie Zhao, Xin Wang:
On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks. 1469-1480 - Xuedou Xiao, Wei Wang, Tao Jiang:
Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks. 1481-1493 - Akshay Jajoo, Y. Charlie Hu, Xiaojun Lin:
A Case for Sampling-Based Learning Techniques in Coflow Scheduling. 1494-1508 - Rahul Vaze, Jayakrishnan Nair:
Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints. 1509-1524 - Yuntao Wang, Weiwei Chen, Tom H. Luan, Zhou Su, Qichao Xu, Ruidong Li, Nan Chen:
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks. 1525-1539 - Michael J. Neely:
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling. 1540-1553 - Hassan Iqbal, Anand Singh, Muhammad Shahzad:
Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants. 1554-1568 - Seyyedali Hosseinalipour, Sheikh Shams Azam, Christopher G. Brinton, Nicolò Michelusi, Vaneet Aggarwal, David J. Love, Huaiyu Dai:
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks. 1569-1584 - Deepak Nadig, Byrav Ramamurthy, Brian Bockelman:
SNAG: SDN-Managed Network Architecture for GridFTP Transfers Using Application-Awareness. 1585-1598 - Zhuozhao Li, Haiying Shen:
Co-Scheduler: A Coflow-Aware Data-Parallel Job Scheduler in Hybrid Electrical/Optical Datacenter Networks. 1599-1612 - Jun Du, Chunxiao Jiang, Abderrahim Benslimane, Song Guo, Yong Ren:
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach. 1613-1628 - Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, Xiaowen Quan:
DET: Enabling Efficient Probing of IPv6 Active Addresses. 1629-1643 - Zhuozhao Li, Tanmoy Sen, Haiying Shen, Mooi Choo Chuah:
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes. 1644-1658 - Alden Hilton, Joel Hirschmann, Casey T. Deccio:
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. 1659-1673 - Haibo Wang, Chaoyi Ma, Shigang Chen, Yuanda Wang:
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps. 1674-1688 - Xiao-Yan Li, Wanling Lin, Jou-Ming Chang, Xiaohua Jia:
Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers. 1689-1702 - Yunxiang Cai, Hongzi Zhu, Shan Chang, Xiao Wang, Jiangang Shen, Minyi Guo:
PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing. 1703-1716 - Chang Liu, Jean Tourrilhes, Chen-Nee Chuah, Puneet Sharma:
Voyager: Revisiting Available Bandwidth Estimation With a New Class of Methods - Decreasing- Chirp-Train Methods. 1717-1732 - Edwin Yang, Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu:
Wireless Training-Free Keystroke Inference Attack and Defense. 1733-1748 - Swaroop Gopalam, Stephen V. Hanly, Philip Whiting:
Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul. 1749-1764 - Junsong Fu, Na Wang, Leyao Nie, Baojiang Cui, Bharat K. Bhargava:
Defending Trace-Back Attack in 3D Wireless Internet of Things. 1765-1779 - Ehsan Mohammadpour, Jean-Yves Le Boudec:
Analysis of Dampers in Time-Sensitive Networks With Non-Ideal Clocks. 1780-1794 - Zaid H. Nasralla, Taisir E. H. El-Gorashi, Ali Hammadi, Mohamed O. I. Musa, Jaafar M. H. Elmirghani:
Blackout Resilient Optical Core Network. 1795-1806 - Yuting Wang, Xiaolong Zheng, Liang Liu, Huadong Ma:
PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks. 1807-1821 - Artur Sterz, Patrick Felka, Bernd Simon, Sabrina Klos, Anja Klein, Oliver Hinz, Bernd Freisleben:
Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information. 1822-1837 - Chen Avin, Kaushik Mondal, Stefan Schmid:
Demand-Aware Network Design With Minimal Congestion and Route Lengths. 1838-1848 - Kaiping Xue, Peixuan He, Jiayu Yang, Qiudong Xia, David S. L. Wei:
SCD2: Secure Content Delivery and Deduplication With Multiple Content Providers in Information Centric Networking. 1849-1864 - Sladana Josilo, György Dán:
Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection. 1865-1878 - Shivang Aggarwal, Swetank Kumar Saha, Imran Khan, Rohan Pathak, Dimitrios Koutsonikolas, Joerg Widmer:
MuSher: An Agile Multipath-TCP Scheduler for Dual-Band 802.11ad/ac Wireless LANs. 1879-1894 - Bin Shi, Haiying Shen, Bo Dong, Qinghua Zheng:
Memory/Disk Operation Aware Lightweight VM Live Migration. 1895-1910
Volume 30, Number 5, October 2022
- Jirí Matousek, Adam Lucanský, David Janecek, Jozef Sabo, Jan Korenek, Gianni Antichi:
ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era. 1912-1925 - Mohammad Jahanian, K. K. Ramakrishnan:
CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response. 1926-1939 - Nilanjan Biswas, Goutam Das, Priyadip Ray:
Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: A Cross-Layer Approach. 1940-1954 - Kun Xie, Jiazheng Tian, Xin Wang, Gaogang Xie, Jiannong Cao, Hongbo Jiang, Jigang Wen:
Fast Retrieval of Large Entries With Incomplete Measurement Data. 1955-1969 - Sushovan Das, Afsaneh Rahbar, Xinyu Crystal Wu, Zhuang Wang, Weitao Wang, Ang Chen, T. S. Eugene Ng:
Shufflecast: An Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters. 1970-1985 - Hai Anh Tran, Duc Tran, Abdelhamid Mellouk:
State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks. 1986-2001 - Nurullah Karakoç, Anna Scaglione, Martin Reisslein, Ruiyuan Wu:
Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence. 2002-2017 - Pooja Vyavahare, Jayakrishnan Nair, D. Manjunath:
Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures. 2018-2031 - Zhenghao Zhang, Raghav Rathi, Steven Perez, Jumana Bukhari, Yaoguang Zhong:
ZCNET: Achieving High Capacity in Low Power Wide Area Networks. 2032-2045 - Chengzhang Li, Qingyu Liu, Shaoran Li, Yongce Chen, Y. Thomas Hou, Wenjing Lou, Sastry Kompella:
Scheduling With Age of Information Guarantee. 2046-2059 - Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Mamoun Alazab:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. 2060-2073 - Gaoxiong Zeng, Wei Bai, Ge Chen, Kai Chen, Dongsu Han, Yibo Zhu, Lei Cui:
Congestion Control for Cross-Datacenter Networks. 2074-2089 - Chun Li, Yunyun Yang, Hui Liang, Boying Wu:
Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning. 2090-2101 - Kevin D. Smith, Saber Jafarpour, Ananthram Swami, Francesco Bullo:
Topology Inference With Multivariate Cumulants: The Möbius Inference Algorithm. 2102-2116 - Guangyang Zeng, Biqiang Mu, Jieqiang Wei, Wing Shing Wong, Junfeng Wu:
Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis. 2117-2130 - Yunshu Liu, Zhixuan Fang, Man Hon Cheung, Wei Cai, Jianwei Huang:
An Incentive Mechanism for Sustainable Blockchain Storage. 2131-2144 - Hui Yang, Qiuyan Yao, Bowen Bao, Ao Yu, Jie Zhang, Athanasios V. Vasilakos:
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks. 2145-2157 - Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. 2158-2172 - Lin Dai:
A Theoretical Framework for Random Access: Stability Regions and Transmission Control. 2173-2200 - Xuezheng Liu, Zhicong Zhong, Yipeng Zhou, Di Wu, Xu Chen, Min Chen, Quan Z. Sheng:
Accelerating Federated Learning via Parallel Servers: A Theoretically Guaranteed Approach. 2201-2215 - Seyed Mohammadhossein Tabatabaee, Jean-Yves Le Boudec:
Deficit Round-Robin: A Second Network Calculus Analysis. 2216-2230 - Feng Li, Jichao Zhao, Dongxiao Yu, Xiuzhen Cheng, Weifeng Lv:
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers. 2231-2245 - Hongli Xu, Peng Xi, Gongming Zhao, Jianchun Liu, Chen Qian, Liusheng Huang:
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks. 2246-2261 - Lin Chen, Shan Lin, Hua Huang, Weihua Yang:
Charging Path Optimization in Mobile Networks. 2262-2273 - Lei Zhang, Yong Cui, Mowei Wang, Kewei Zhu, Yibo Zhu, Yong Jiang:
DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization. 2274-2288 - Minghui Liwang, Xianbin Wang:
Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks. 2289-2303 - Lei Shi, Yuhua Cheng, Jinliang Shao, Qingchen Liu, Wei Xing Zheng:
Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition. 2304-2314 - Bahman Abolhassani, John Tadrous, Atilla Eryilmaz, Edmund Yeh:
Fresh Caching of Dynamic Content Over the Wireless Edge. 2315-2327 - Zhenlin An, Qiongzheng Lin, Lei Yang, Lei Xie:
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost. 2328-2342 - Hyunseok Chang, Matteo Varvello, Fang Hao, Sarit Mukherjee:
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet. 2343-2358 - Carlo Augusto Grazia, Natale Patriciello, Toke Høiland-Jørgensen, Martin Klapez, Maurizio Casoni:
Aggregating Without Bloating: Hard Times for TCP on Wi-Fi. 2359-2373 - Jingling Liu, Jiawei Huang, Zhaoyi Li, Yijun Li, Jianxin Wang, Tian He:
Achieving Per-Flow Fairness and High Utilization With Limited Priority Queues in Data Center. 2374-2387
Volume 30, Number 6, December 2022
- Zhenhua Han, Haisheng Tan, Rui Wang, Yuncong Hong, Francis C. M. Lau:
Efficient Online Learning Based Cross-Tier Uplink Scheduling in HetNets. 2389-2402 - Gregor Bankhamer, Robert Elsässer, Stefan Schmid:
Local Fast Rerouting With Low Congestion: A Randomized Approach. 2403-2418 - Chen Avin, Kaushik Mondal, Stefan Schmid:
Push-Down Trees: Optimal Self-Adjusting Complete Trees. 2419-2432 - Tian Xie, Namitha Nambiar, Ting He, Patrick D. McDaniel:
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation. 2433-2447 - Marcel Blöcher, Lin Wang, Patrick Eugster, Max Schmidt:
Holistic Resource Scheduling for Data Center In-Network Computing. 2448-2463 - Theo Jepsen, Ali Fattaholmanan, Masoud Moshref, Nate Foster, Antonio Carzaniga, Robert Soulé:
Forwarding and Routing With Packet Subscriptions. 2464-2479 - Tianjiao Wang, Zengfu Wang, William Moran, Moshe Zukerman:
Submarine Cable Network Design for Regional Connectivity. 2480-2492 - Xiaozhe Shao, Zibin Chen, Daniel E. Holcomb, Lixin Gao:
Accelerating BGP Configuration Verification Through Reducing Cycles in SMT Constraints. 2493-2504 - Yang Cai, Jaime Llorca, Antonia M. Tulino, Andreas F. Molisch:
Ultra-Reliable Distributed Cloud Network Control With End-to-End Latency Constraints. 2505-2520 - Reena Chackochan, Albert Sunny, Senthilkumar Dhanasekaran:
Approximate Aggregate Utility Maximization Using Greedy Maximal Scheduling. 2521-2530 - Massieh Kordi Boroujeny, Brian L. Mark:
Design of a Stochastic Traffic Regulator for End-to-End Network Delay Guarantees. 2531-2543 - Darryl Veitch, Sathiya Kumaran Mani, Yi Cao, Paul Barford:
iHorology: Lowering the Barrier to Microsecond-Level Internet Time. 2544-2558 - Sijiang Huang, Mowei Wang, Yong Cui:
Traffic-Aware Buffer Management in Shared Memory Switches. 2559-2573 - Qingfeng Tan, Xuebin Wang, Wei Shi, Jian Tang, Zhihong Tian:
An Anonymity Vulnerability in Tor. 2574-2587 - Xuehe Wang, Lingjie Duan:
Dynamic Pricing and Mean Field Analysis for Controlling Age of Information. 2588-2600 - Zichuan Xu, Haozhe Ren, Weifa Liang, Qiufen Xia, Wanlei Zhou, Pan Zhou, Wenzheng Xu, Guowei Wu, Mingchu Li:
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks. 2601-2615 - Xianhao Chen, Guangyu Zhu, Haichuan Ding, Lan Zhang, Haixia Zhang, Yuguang Fang:
End-to-End Service Auction: A General Double Auction Mechanism for Edge Computing Services. 2616-2629 - Keerthi Priya Dasala, Josep Miquel Jornet, Edward W. Knightly:
Scaling mmWave WLANs With Single RF Chain Multiuser Beamforming. 2630-2643 - Tie Qiu, Lidi Zhang, Ning Chen, Songwei Zhang, Wenyuan Liu, Dapeng Oliver Wu:
Born This Way: A Self-Organizing Evolution Scheme With Motif for Internet of Things Robustness. 2644-2657 - Zhiyuan Yao, Yoann Desmouceaux, Juan Antonio Cordero Fuertes, Mark Townsley, Thomas H. Clausen:
HLB: Toward Load-Aware Load Balancing. 2658-2673 - Itamar Cohen, Gil Einziger, Gabriel Scalosub:
False Negative Awareness in Indicator-Based Caching Systems. 2674-2687 - Dianxiong Liu, Zhiyong Du, Xiaodu Liu, Heyu Luan, Yitao Xu, Yifan Xu:
Task-Based Network Reconfiguration in Distributed UAV Swarms: A Bilateral Matching Approach. 2688-2700 - Ludovic Thomas, Ahlem Mifdaoui, Jean-Yves Le Boudec:
Worst-Case Delay Bounds in Time-Sensitive Networks With Packet Replication and Elimination. 2701-2715 - Zhiwei Zhao, Wenliang Mao, Geyong Min, Weifeng Gao:
Joint Multichannel-Spatial Diversity for Efficient Opportunistic Routing in Low-Power Wireless Networks. 2716-2729 - Miao Zhang, Yifei Zhu, Jiangchuan Liu, Feng Wang, Fangxin Wang:
CharmSeeker: Automated Pipeline Configuration for Serverless Video Processing. 2730-2743 - Luoyi Fu, Jiapeng Zhang, Shan Qu, Huquan Kang, Xinbing Wang, Guihai Chen:
Measuring Social Network De-Anonymizability by Means of Morphism Property. 2744-2759 - Yao Xin, Wenjun Li, Guoming Tang, Tong Yang, Xiaohe Hu, Yi Wang:
FPGA-Based Updatable Packet Classification Using TSS-Combined Bit-Selecting Tree. 2760-2775 - Nishant Shakya, Fan Li, Jinyuan Chen:
On Distributed Computing With Heterogeneous Communication Constraints. 2776-2787 - Xinzhe Fu, Eytan H. Modiano:
Learning-NUM: Network Utility Maximization With Unknown Utility Functions and Queueing Delay. 2788-2803 - Zhirong Shen, Guanglin Zhang:
Competitive Online Stay-or-Switch Algorithms With Minimum Commitment and Switching Cost. 2804-2817 - Chaoyi Ma, Haibo Wang, Olufemi O. Odegbile, Shigang Chen, Dimitrios Melissourgos:
Virtual Filter for Non-Duplicate Sampling With Network Applications. 2818-2833 - Feng Shan, Haodong Huo, Jiaxin Zeng, Zengbao Li, Weiwei Wu, Junzhou Luo:
Ultra-Wideband Swarm Ranging Protocol for Dynamic and Dense Networks. 2834-2848 - Liang Zhang, Guangdeng Zong, Xudong Zhao, Ning Zhao:
Output Reachable Set Synthesis of Event-Triggered Control for Singular Markov Jump Systems Under Multiple Cyber-Attacks. 2849-2857 - Wei Chen, Ye Tian, Zhongxiang Wei, Jiangyu Pan, Xinming Zhang:
Task Scheduling for Probabilistic In -Band Network Telemetry. 2858-2869
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.