


default search action
IEEE/ACM Transactions on Networking, Volume 27
Volume 27, Number 1, February 2019
- Wei Dong
, Chenhong Cao
, Xiaoyu Zhang, Yi Gao
:
Understanding Path Reconstruction Algorithms in Multihop Wireless Networks. 1-14 - Alireza Shams Shafigh
, Savo Glisic, Ekram Hossain
, Beatriz Lorenzo
, Luiz A. DaSilva
:
User-Centric Distributed Spectrum Sharing in Dynamic Network Architectures. 15-28 - Siddhartha S. Borkotoky
, Michael B. Pursley
:
Fountain-Coded Broadcast Distribution in Multiple-Hop Packet Radio Networks. 29-41 - Jihong Yu
, Wei Gong, Jiangchuan Liu
, Lin Chen, Kehao Wang
:
On Efficient Tree-Based Tag Search in Large-Scale RFID Systems. 42-55 - Alain Pegatoquet
, Trong Nhan Le, Michele Magno
:
A Wake-Up Radio-Based MAC Protocol for Autonomous Wireless Sensor Networks. 56-70 - Wahhab Albazrqaoe
, Jun Huang, Guoliang Xing:
A Practical Bluetooth Traffic Sniffing System: Design, Implementation, and Countermeasure. 71-84 - Sladana Josilo
, György Dán
:
Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems. 85-97 - Guoming Tang
, Huan Wang, Kui Wu
, Deke Guo:
Tapping the Knowledge of Dynamic Traffic Demands for Optimal CDN Design. 98-111 - John Tadrous
, Atilla Eryilmaz
, Ashutosh Sabharwal
:
Action-Based Scheduling: Leveraging App Interactivity for Scheduler Efficiency. 112-125 - Jiaqi Liu, Luoyi Fu
, Yuhang Yao
, Xinzhe Fu, Xinbing Wang
, Guihai Chen
:
Modeling, Analysis and Validation of Evolving Networks With Hybrid Interactions. 126-142 - Qingjun Xiao
, Shigang Chen
, Jia Liu, Guang Cheng, Junzhou Luo:
A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System. 143-158 - Jia Liu
, Shigang Chen
, Qingjun Xiao, Min Chen
, Bin Xiao
, Lijun Chen:
Efficient Information Sampling in Multi-Category RFID Systems. 159-172 - Peng Zhang, Cheng Zhang, Chengchen Hu:
Fast Data Plane Testing for Software-Defined Networks With RuleChecker. 173-186 - Wenping Liu
, Hongbo Jiang
, Guoyin Jiang, Jiangchuan Liu
, Xiaoqiang Ma
, Yufu Jia, Fu Xiao
:
Indoor Navigation With Virtual Graph Representation: Exploiting Peak Intensities of Unmodulated Luminaries. 187-200 - Xiaofeng Gao
, Yuanning Gao
, Yichen Zhu
, Guihai Chen
:
U2-Tree: A Universal Two-Layer Distributed Indexing Scheme for Cloud Storage System. 201-213 - Yong Cui
, Yimin Jiang, Zeqi Lai, Xiaomeng Chen, Y. Charlie Hu, Kun Tan, Minglong Dai, Kai Zheng, Yi Li
:
Wireless Network Instabilities in the Wild: Measurement, Applications (Non)Resilience, and OS Remedy. 214-230 - Xu Zhang
, Edward W. Knightly
:
$CSIsnoop$ : Inferring Channel State Information in Multi-User MIMO WLANs. 231-244 - Linsong Cheng
, Jiliang Wang
:
Walls Have No Ears: A Non-Intrusive WiFi-Based User Identification System for Mobile Devices. 245-257 - Yigal Bejerano, Chandrashekhar Raman, Chun-Nam Yu, Varun Gupta
, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman
:
DyMo: Dynamic Monitoring of Large-Scale LTE-Multicast Systems. 258-271 - Jianer Zhou
, Zhenyu Li
, Qinghua Wu
, Peter Steenkiste
, Steve Uhlig
, Jun Li, Gaogang Xie
:
TCP Stalls at the Server Side: Measurement and Mitigation. 272-287 - Konstantinos Poularakis
, George Iosifidis
, Georgios Smaragdakis
, Leandros Tassiulas:
Optimizing Gradual SDN Upgrades in ISP Networks. 288-301 - Per Hurtig
, Karl-Johan Grinnemo, Anna Brunström, Simone Ferlin
, Ozgu Alay
, Nicolas Kuhn
:
Low-Latency Scheduling in MPTCP. 302-315 - Ali Maatouk
, Mohamad Assaad
, Anthony Ephremides:
Energy Efficient and Throughput Optimal CSMA Scheme. 316-329 - Meng Jin, Yuan He
, Xin Meng, Yilun Zheng, Dingyi Fang, Xiaojiang Chen
:
FlipTracer: Practical Parallel Decoding for Backscatter Communication. 330-343 - Zhenhua Han
, Haisheng Tan
, Rui Wang
, Guihai Chen
, Yupeng Li
, Francis C. M. Lau:
Energy-Efficient Dynamic Virtual Machine Management in Data Centers. 344-360 - Chengwen Luo
, Xiao Liu, Wanli Xue, Yiran Shen
, Jianqiang Li
, Wen Hu
, Alex X. Liu
:
Predictable Privacy-Preserving Mobile Crowd Sensing: A Tale of Two Roles. 361-374 - Yahui Sun
, Marcus Brazil
, Doreen A. Thomas
, Saman K. Halgamuge:
The Fast Heuristic Algorithms and Post-Processing Techniques to Design Large and Low-Cost Communication Networks. 375-388 - Sen Liu
, Jiawei Huang
, Yutao Zhou, Jianxin Wang
, Tian He
:
Task-Aware TCP in Data Center Networks. 389-404 - Taha Bouchoucha
, Chen-Nee Chuah
, Zhi Ding
:
Topology Inference of Unknown Networks Based on Robust Virtual Coordinate Systems. 405-418 - David Lynch
, Michael Fenton, David Fagan, Stepán Kucera, Holger Claussen
, Michael O'Neill:
Automated Self-Optimization in Heterogeneous Wireless Communications Networks. 419-432 - Satyam Agarwal
, Francesco Malandrino
, Carla-Fabiana Chiasserini
, Swades De
:
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks. 433-446 - Li Lu
, Jiadi Yu
, Yingying Chen
, Hongbo Liu
, Yanmin Zhu
, Linghe Kong
, Minglu Li:
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones. 447-460
Volume 27, Number 2, April 2019
- Oladele Theophilus Sule
, Roberto Rojas-Cessa
, Ziqian Dong
, Chuan-Bi Lin:
A Split-Central-Buffered Load-Balancing Clos-Network Switch With In-Order Forwarding. 467-476 - Mostafa Dehghan
, Weibo Chu
, Philippe Nain
, Don Towsley
, Zhi-Li Zhang:
Sharing Cache Resources Among Content Providers: A Utility-Based Approach. 477-490 - Chang-Heng Wang
, Jaime Llorca
, Antonia M. Tulino
, Tara Javidi
:
Dynamic Cloud Network Control Under Reconfiguration Delay and Cost. 491-504 - Vijay S. Rao
, R. Venkatesha Prasad
, Tamma V. Prabhakar, Chayan Sarkar
, Madhusudan Koppal, Ignas G. Niemegeers:
Understanding and Improving the Performance of Constructive Interference Using Destructive Interference in WSNs. 505-517 - Xianjin Xia
, ShiNing Li, Yu Zhang
, Bingqi Li
, Yuanqing Zheng
, Tao Gu
:
Enabling Out-of-Band Coordination of Wi-Fi Communications on Smartphones. 518-531 - Irem Koprulu
, Yoora Kim
, Ness B. Shroff:
Battle of Opinions Over Evolving Social Networks. 532-545 - Liang Song
, Chunyan Liu, Hejiao Huang
, Hongwei Du
, Xiaohua Jia
:
Minimum Connected Dominating Set Under Routing Cost Constraint in Wireless Sensor Networks With Different Transmission Ranges. 546-559 - Ahmed Osama Fathy Atya
, Zhiyun Qian
, Srikanth V. Krishnamurthy
, Thomas La Porta
, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. 560-576 - Vaibhav Bajpai
, Jürgen Schönwälder
:
A Longitudinal View of Dual-Stacked Websites - Failures, Latency and Happy Eyeballs. 577-590 - Balint Tillman
, Athina Markopoulou
, Minas Gjoka, Carter T. Butts:
2K+ Graph Construction Framework: Targeting Joint Degree Matrix and Beyond. 591-606 - S. Ramakrishnan
, Venkatesh Ramaiyan:
Completely Uncoupled Algorithms for Network Utility Maximization. 607-620 - Xin Li
, Minmei Wang, Huazhe Wang
, Ye Yu
, Chen Qian:
Toward Secure and Efficient Communication for the Internet of Things. 621-634 - Roman Naumann
, Stefan Dietzel
, Björn Scheuermann:
Push the Barrier: Discrete Event Protocol Emulation. 635-648 - Xiang Li
, J. David Smith, Thang N. Dinh
, My T. Thai
:
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks. 649-661 - Pablo Caballero Garces
, Albert Banchs
, Gustavo de Veciana
, Xavier Pérez Costa
:
Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks. 662-675 - Ming-Chun Lee
, Andreas F. Molisch
, Nishanth Sastry
, Aravindh Raman
:
Individual Preference Probability Modeling and Parameterization for Video Content in Wireless Caching Networks. 676-690 - Yehuda Afek, Anat Bremler-Barr
, Shir Landau Feibish
:
Zero-Day Signature Extraction for High-Volume Attacks. 691-706 - Cataldo Basile
, Fulvio Valenza
, Antonio Lioy
, Diego R. López
, Antonio Pastor Perales
:
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. 707-720 - Hui Cui
, Robert H. Deng
, Guilin Wang:
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks. 721-733 - Bijoy Chand Chatterjee
, Fujun He
, Eiji Oki
, Andrea Fumagalli, Naoaki Yamanaka:
A Span Power Management Scheme for Rapid Lightpath Provisioning and Releasing in Multi-Core Fiber Networks. 734-747 - Qingjun Xiao
, Youlin Zhang
, Shigang Chen
, Min Chen, Jia Liu, Guang Cheng, Junzhou Luo:
Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System. 748-762 - Peshal Nayak
, Michele Garetto
, Edward W. Knightly
:
Modeling Multi-User WLANs Under Closed-Loop Traffic. 763-776 - Chavoosh Ghasemi
, Hamed Yousefi
, Kang G. Shin
, Beichuan Zhang:
On the Granularity of Trie-Based Data Structures for Name Lookups and Updates. 777-789 - Shih-Hao Tseng
, Ao Tang
, Gagan L. Choudhury, Simon Tse:
Routing Stability in Hybrid Software-Defined Networks. 790-804 - Kai Gao
, Qiao Xiang
, Xin Wang, Yang Richard Yang, Jun Bi
:
An Objective-Driven On-Demand Network Abstraction for Adaptive Applications. 805-818 - Qiongzheng Lin
, Lei Yang
, Chunhui Duan
, Zhenlin An
:
Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs. 819-834 - Abubakr O. Al-Abbasi
, Vaneet Aggarwal
, Moo-Ryong Ra
:
Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems. 835-847 - Qian Wang
, Jing Huang, Yanjiao Chen
, Xin Tian, Qian Zhang
:
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum. 848-861 - Kunal Phalak, D. Manjunath
, Jayakrishnan Nair
:
Zero Rating: The Power in the Middle. 862-874 - Josu Doncel
, Samuli Aalto
, Urtzi Ayesta:
Performance Degradation in Parallel-Server Systems. 875-888 - Shuihai Hu
, Yibo Zhu, Peng Cheng
, Chuanxiong Guo
, Kun Tan, Jitendra Padhye, Kai Chen
:
Tagger: Practical PFC Deadlock Prevention in Data Center Networks. 889-902
Volume 27, Number 3, June 2019
- Michael J. Neely
:
Convergence and Adaptation for Utility Optimal Opportunistic Scheduling. 904-917 - Giovanni Chisci
, Hesham ElSawy
, Andrea Conti
, Mohamed-Slim Alouini
, Moe Z. Win
:
Uncoordinated Massive Wireless Networks: Spatiotemporal Models and Multiaccess Strategies. 918-931 - Zicheng Chi
, Yan Li, Hongyu Sun, Yao Yao, Ting Zhu:
Concurrent Cross-Technology Communication Among Heterogeneous IoT Devices. 932-947 - Jia Liu
, Bin Xiao
, Xuan Liu, Kai Bu
, Lijun Chen
, Changhai Nie:
Efficient Polling-Based Information Collection in RFID Systems. 948-961 - Abbas Kiani
, Nirwan Ansari
, Abdallah Khreishah
:
Hierarchical Capacity Provisioning for Fog Computing. 962-971 - Jiaxi Gu
, Jiliang Wang, Zhiwen Yu
, Kele Shen:
Traffic-Based Side-Channel Attack in Video Streaming. 972-985 - Meng Zhang, Lin Gao
, Jianwei Huang
, Michael L. Honig:
Hybrid Pricing for Mobile Collaborative Internet Access. 986-999 - Marco Di Bartolomeo
, Valentino Di Donato, Maurizio Pizzonia
, Claudio Squarcella, Massimo Rimondini
:
Extracting Routing Events From Traceroutes: A Matter of Empathy. 1000-1012 - Mostafa Dehghan
, Laurent Massoulié, Don Towsley
, Daniel Sadoc Menasché, Y. C. Tay
:
A Utility Optimization Approach to Network Cache Design. 1013-1027 - Tie Qiu
, Jie Liu, Weisheng Si
, Dapeng Oliver Wu
:
Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks. 1028-1042 - Semih Cayci
, Atilla Eryilmaz
:
Optimal Learning for Dynamic Coding in Deadline-Constrained Multi-Channel Networks. 1043-1054 - Linghe Kong
, Yifeng Cao, Liang He
, Guihai Chen
, Min-You Wu
, Tian He
:
Multi-Rate Selection in ZigBee. 1055-1068 - Wenchao Jiang
, Zhimeng Yin, Ruofeng Liu
, Zhijun Li
, Song Min Kim
, Tian He
:
Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices. 1069-1083 - Hirotada Honda
, Hiroshi Saito
:
Nation-Wide Disaster Avoidance Control Against Heavy Rain. 1084-1097 - Zongzong Lin
, Wenlian Lu, Shouhuai Xu
:
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. 1098-1111 - Kung-Jui Pai
, Jou-Ming Chang
:
Dual-CISTs: Configuring a Protection Routing on Some Cayley Networks. 1112-1123 - Zonghui Li
, Hai Wan
, Zaiyu Pang, Qiubo Chen, Yangdong Deng, Xibin Zhao, Yue Gao
, Xiaoyu Song, Ming Gu:
An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks. 1124-1137 - Anis Elgabli
, Muhamad Felemban
, Vaneet Aggarwal
:
GroupCast: Preference-Aware Cooperative Video Streaming With Scalable Video Coding. 1138-1150 - Duong Tung Nguyen
, Long Bao Le
, Vijay K. Bhargava:
A Market-Based Framework for Multi-Resource Allocation in Fog Computing. 1151-1164 - Federico Chiariotti
, Stepán Kucera, Andrea Zanella
, Holger Claussen
:
Analysis and Design of a Latency Control Protocol for Multi-Path Data Delivery With Pre-Defined QoS Guarantees. 1165-1178 - Xiulong Liu
, Jiannong Cao, Yanni Yang, Wenyu Qu
, Xibin Zhao, Keqiu Li, Didi Yao:
Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs. 1179-1191 - Thi-Minh Nguyen
, André Girard
, Catherine Rosenberg
, Serge Fdida:
Routing via Functions in Virtual Networks: The Curse of Choices. 1192-1205 - Jaehyun Nam
, Hyeonseong Jo
, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin
:
Operator-Defined Reconfigurable Network OS for Software-Defined Networks. 1206-1219 - Kaiping Xue
, Peixuan He, Xiang Zhang, Qiudong Xia, David S. L. Wei, Hao Yue
, Feng Wu:
A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks. 1220-1233 - Junjie Xie
, Deke Guo
, Chen Qian, Lei Liu, Bangbang Ren, Honghui Chen:
Validation of Distributed SDN Control Plane Under Uncertain Failures. 1234-1247 - Ahmed M. Bedewy
, Yin Sun
, Ness B. Shroff:
The Age of Information in Multihop Networks. 1248-1257 - Han Deng
, Tao Zhao
, I-Hong Hou
:
Online Routing and Scheduling With Capacity Redundancy for Timely Delivery Guarantees in Multihop Networks. 1258-1271 - Shiqiang Wang
, Rahul Urgaonkar, Murtaza Zafer, Ting He
, Kevin Chan
, Kin K. Leung:
Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process. 1272-1288 - Giuseppe Enrico Santagati, Tommaso Melodia
:
Corrections to "A Software-Defined Ultrasonic Networking Framework for Wearable Devices". 1289
Volume 27, Number 4, August 2019
- Giovanni Chisci
, Andrea Conti
, Lorenzo Mucchi
, Moe Z. Win
:
Intrinsic Secrecy in Inhomogeneous Stochastic Networks. 1291-1304 - Anvitha Nandigam, Suraj Jog
, D. Manjunath
, Jayakrishnan Nair
, Balakrishna J. Prabhu:
Sharing Within Limits: Partial Resource Pooling in Loss Systems. 1305-1318 - Tianheng Wang
, Andrea Conti
, Moe Z. Win
:
Network Navigation With Scheduling: Distributed Algorithms. 1319-1329 - Chien-Sheng Yang
, Ramtin Pedarsani
, Amir Salman Avestimehr:
Communication-Aware Scheduling of Serial Tasks for Dispersed Computing. 1330-1343 - George Trimponias
, Yan Xiao
, Xiaorui Wu
, Hong Xu
, Yanhui Geng
:
Node-Constrained Traffic Engineering: Theory and Applications. 1344-1358 - Igor Kadota
, Abhishek Sinha
, Eytan H. Modiano:
Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints. 1359-1372 - Shengchao Liu
, Jianping Weng, Jessie Hui Wang
, Changqing An
, Yipeng Zhou
, Jilong Wang:
An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm. 1373-1386 - Bruno Yuji Lino Kimura
, Demetrius C. S. F. Lima
, Leandro A. Villas
, Antonio A. F. Loureiro
:
Interpath Contention in MultiPath TCP Disjoint Paths. 1387-1400 - Vishal Shrivastav
, Ki Suh Lee
, Han Wang, Hakim Weatherspoon:
Globally Synchronized Time via Datacenter Networks. 1401-1416 - James Daly, Valerio Bruschi
, Leonardo Linguaglossa, Salvatore Pontarelli
, Dario Rossi
, Jerome Tollet
, Eric Torng
, Andrew Yourtchenko:
TupleMerge: Fast Software Packet Processing for Online Packet Classification. 1417-1431 - Ran Ben Basat, Xiaoqi Chen
, Gil Einziger
, Roy Friedman
, Yaron Kassner
:
Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation. 1432-1445 - Yahia Shabara
, C. Emre Koksal, Eylem Ekici
:
Beam Discovery Using Linear Block Codes for Millimeter Wave Communication Networks. 1446-1459 - Zhizhen Zhong
, Nan Hua, Massimo Tornatore, Jialong Li
, Yanhe Li, Xiaoping Zheng
, Biswanath Mukherjee
:
Provisioning Short-Term Traffic Fluctuations in Elastic Optical Networks. 1460-1473 - Miroslaw Klinkowski
, Krzysztof Walkowiak
:
An Efficient Optimization Framework for Solving RSSA Problems in Spectrally and Spatially Flexible Optical Networks. 1474-1486 - Jie Chuai
, Victor O. K. Li
:
An Analytical Framework for Resource Allocation Between Data and Delayed Network State Information. 1487-1500 - Hao Yu
, Michael J. Neely:
Learning-Aided Optimization for Energy-Harvesting Devices With Outdated State Information. 1501-1514 - Xiaonan Zhang
, Pei Huang
, Linke Guo
, Yuguang Fang
:
Social-Aware Energy-Efficient Data Offloading With Strong Stability. 1515-1528 - Thibaut Stimpfling
, Normand Bélanger, J. M. Pierre Langlois
, Yvon Savaria
:
SHIP: A Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics. 1529-1542 - Vincenzo Sciancalepore
, Xavier Costa-Pérez
, Albert Banchs
:
RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker. 1543-1557 - Yuedong Xu
, Zhujun Xiao, Tianyu Ni, Jessie Hui Wang
, Xin Wang, Eitan Altman:
On The Robustness of Price-Anticipating Kelly Mechanism. 1558-1571 - Arjun Bakshi
, Lu Chen, Kannan Srinivasan, C. Emre Koksal, Atilla Eryilmaz
:
EMIT: An Efficient MAC Paradigm for the Internet of Things. 1572-1583 - Cheng-Shang Chang
, Duan-Shin Lee
, Chun Wang:
Asynchronous Grant-Free Uplink Transmissions in Multichannel Wireless Networks With Heterogeneous QoS Guarantees. 1584-1597 - Yongquan Fu
, Dongsheng Li
, Pere Barlet-Ros
, Chun Huang, Zhen Huang, Siqi Shen
, Huayou Su:
A Skewness-Aware Matrix Factorization Approach for Mesh-Structured Cloud Services. 1598-1611 - Yong Cui
, Ningwei Dai, Zeqi Lai
, Minming Li
, Zhenhua Li
, Yuming Hu, Kui Ren, Yuchi Chen:
TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints. 1612-1628 - Ahmed Boubrima
, Walid Bechkit, Hervé Rivano
:
On the Deployment of Wireless Sensor Networks for Air Quality Mapping: Optimization Models and Algorithms. 1629-1642 - Ziyao Zhang
, Liang Ma
, Kin K. Leung, Franck Le, Sastry Kompella
, Leandros Tassiulas
:
How Advantageous Is It? An Analytical Study of Controller-Assisted Path Construction in Distributed SDN. 1643-1656 - Arpan Mukhopadhyay
, Nidhi Hegde
, Marc Lelarge:
Asymptotics of Replication and Matching in Large Caching Systems. 1657-1668 - Junyang Shi
, Mo Sha
, Zhicheng Yang
:
Distributed Graph Routing and Scheduling for Industrial Wireless Sensor-Actuator Networks. 1669-1682 - Nikolaos Liakopoulos
, Georgios S. Paschos, Thrasyvoulos Spyropoulos:
Robust Optimization Framework for Proactive User Association in UDNs: A Data-Driven Approach. 1683-1695 - Christos Liaskos
, Ageliki Tsioliaridou, Shuai Nie
, Andreas Pitsillides
, Sotiris Ioannidis, Ian F. Akyildiz
:
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments. 1696-1713 - Yu Zhou
, Jun Bi
, Cheng Zhang, Bingyang Liu
, Zhaogeng Li, Yangyang Wang
, Mingli Yu
:
P4DB: On-the-Fly Debugging for Programmable Data Planes. 1714-1727 - Siddhartha Satpathi
, Supratim Deb, R. Srikant, He Yan:
Learning Latent Events From Network Message Logs. 1728-1741 - Fujun He
, Takehiro Sato
, Eiji Oki
:
Optimization Model for Backup Resource Allocation in Middleboxes With Importance. 1742-1755 - Francesco Malandrino
, Carla-Fabiana Chiasserini
, Claudio Casetti
, Giada Landi
, Marco Capitani:
An Optimization-Enhanced MANO for Energy-Efficient 5G Networks. 1756-1769
Volume 27, Number 5, October 2019
- Haisheng Tan
, Shaofeng H.-C. Jiang
, Yupeng Li
, Xiang-Yang Li
, Chenzi Zhang, Zhenhua Han
, Francis Chi-Moon Lau:
Joint Online Coflow Routing and Scheduling in Data Center Networks. 1771-1786 - Cesar Ghali
, Gene Tsudik
, Ersin Uzun:
In Content We Trust: Network-Layer Trust in Content-Centric Networking. 1787-1800 - Huikang Li, Yi Gao
, Wei Dong
, Chun Chen:
Preferential Link Tomography in Dynamic Networks. 1801-1814 - Pan Zhou
, Jie Xu
, Wei Wang
, Yuchong Hu, Dapeng Oliver Wu
, Shouling Ji:
Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack. 1815-1829 - Majid Khabbazian
, Keyvan Gharouni Saffar:
The Gain of Energy Accumulation in Multi-Hop Wireless Network Broadcast. 1830-1844 - Tong Yang
, Haowei Zhang, Jinyang Li
, Junzhi Gong
, Steve Uhlig
, Shigang Chen, Xiaoming Li:
HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows. 1845-1858 - Jiaqi Zheng
, Hong Xu
, Xiaojun Zhu
, Guihai Chen
, Yanhui Geng
:
Sentinel: Failure Recovery in Centralized Traffic Engineering. 1859-1872 - Xiulong Liu
, Xin Xie
, Shangguang Wang
, Jia Liu, Didi Yao, Jiannong Cao, Keqiu Li
:
Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems. 1873-1886 - Qing He
, György Dán
, Viktoria Fodor
:
Joint Assignment and Scheduling for Minimizing Age of Correlated Information. 1887-1900 - Dalia Popescu
, Philippe Jacquet, Bernard Mans
, Robert Dumitru, Andra Pastrav
, Emanuel Puschita
:
Information Dissemination Speed in Delay Tolerant Urban Vehicular Networks in a Hyperfractal Setting. 1901-1914 - H. V. Kalpanie Mendis
, Indika A. M. Balapuwaduge
, Frank Y. Li
:
Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain. 1915-1930 - Ruozhou Yu
, Guoliang Xue
, Xiang Zhang
:
Provisioning QoS-Aware and Robust Applications in Internet of Things: A Network Perspective. 1931-1944 - Xiangyang Li
, Huiqi Liu
, Lan Zhang
, Zhenan Wu
, Yaochen Xie, Ge Chen, Chunxiao Wan, Zhongwei Liang:
Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint. 1945-1958 - Xiaowen Gong
, Ness B. Shroff:
Truthful Mobile Crowdsensing for Strategic Users With Private Data Quality. 1959-1972 - Zhenjie Yang
, Yong Cui
, Xin Wang
, Yadong Liu, Minming Li
, Shihan Xiao, Chuming Li:
Cost-Efficient Scheduling of Bulk Transfers in Inter-Datacenter WANs. 1973-1986 - Pablo Garrido
, Douglas J. Leith
, Ramón Agüero
:
Joint Scheduling and Coding for Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback. 1987-2000 - Arjun Roy
, Rajdeep Das
, Hongyi Zeng, Jasmeet Bagga, Alex C. Snoeren
:
Understanding the Limits of Passive Realtime Datacenter Fault Detection and Localization. 2001-2014 - Xuya Jia
, Dan Li, Jing Zhu
, Yong Jiang:
Metro: An Efficient Traffic Fast Rerouting Scheme With Low Overhead. 2015-2027 - Christos Pappas
, Taeho Lee, Raphael M. Reischuk, Pawel Szalachowski
, Adrian Perrig
:
Network Transparency for Better Internet Security. 2028-2042 - Kang Yang, Tianzhang Xing, Yang Liu
, Zhenjiang Li
, Xiaoqing Gong, Xiaojiang Chen
, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. 2043-2055 - Reza Motamedi, Bahador Yeganeh
, Balakrishnan Chandrasekaran
, Reza Rejaie, Bruce M. Maggs, Walter Willinger
:
On Mapping the Interconnections in Today's Internet. 2056-2070 - Matthias Rost
, Stefan Schmid
:
Virtual Network Embedding Approximations: Leveraging Randomized Rounding. 2071-2084 - Mikhail Hayhoe
, Fady Alajaji
, Bahman Gharesifard
:
Curing Epidemics on Networks Using a Polya Contagion Model. 2085-2097 - Reuven Cohen
, Yuval Nezri
:
Cardinality Estimation in a Virtualized Network Device Using Online Machine Learning. 2098-2110 - George Darzanos
, Iordanis Koutsopoulos
, George D. Stamoulis:
Cloud Federations: Economics, Games and Benefits. 2111-2124 - Luca Baldesi
, Athina Markopoulou
, Carter T. Butts:
Spectral Graph Forge: A Framework for Generating Synthetic Graphs With a Target Modularity. 2125-2136 - Benny Van Houdt
:
Randomized Work Stealing Versus Sharing in Large-Scale Systems With Non-Exponential Job Sizes. 2137-2149 - Kate Ching-Ju Lin
, Kai-Cheng Hsu, Hung-Yu Wei
:
Inter-Client Interference Cancellation for Full-Duplex Networks With Half-Duplex Clients. 2150-2163 - Kaiming Shen
, Wei Yu
, Licheng Zhao, Daniel P. Palomar
:
Optimization of MIMO Device-to-Device Networks via Matrix Fractional Programming: A Minorization-Maximization Approach. 2164-2177
Volume 27, Number 6, December 2019
- Alex X. Liu
, Eric Norige:
A De-Compositional Approach to Regular Expression Matching for Network Security. 2179-2191 - Orly Avner
, Shie Mannor
:
Multi-User Communication Networks: A Coordinated Multi-Armed Bandit Approach. 2192-2207 - Haiming Jin
, Baoxiang He, Lu Su
, Klara Nahrstedt
, Xinbing Wang
:
Data-Driven Pricing for Sensing Effort Elicitation in Mobile Crowd Sensing Systems. 2208-2221 - Kun Xie
, Xiangge Wang, Xin Wang
, Yuxiang Chen, Gaogang Xie
, Yudian Ouyang, Jigang Wen, Jiannong Cao
, Dafang Zhang:
Accurate Recovery of Missing Network Measurement Data With Localized Tensor Completion. 2222-2235 - Tong Yang
, Jie Jiang
, Peng Liu, Qun Huang
, Junzhi Gong
, Yang Zhou
, Rui Miao, Xiaoming Li, Steve Uhlig
:
Adaptive Measurements Using One Elastic Sketch. 2236-2251 - Pedro Reviriego
, Ori Rottenstreich
:
The Tandem Counting Bloom Filter - It Takes Two Counters to Tango. 2252-2265 - Mehmet Fatih Aktas
, Emina Soljanin
:
Straggler Mitigation at Scale. 2266-2279 - Daqing Yun
, Chase Q. Wu
, Nageswara S. V. Rao
, Rajkumar Kettimuthu
:
Advising Big Data Transfer Over Dedicated Connections Based on Profiling Optimization. 2280-2293 - Haiqin Wu
, Liangmin Wang
, Guoliang Xue
, Jian Tang, Dejun Yang
:
Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing. 2294-2307 - Guo Chen
, Yuanwei Lu, Bojie Li
, Kun Tan, Yongqiang Xiong, Peng Cheng
, Jiansong Zhang, Thomas Moscibroda:
MP-RDMA: Enabling RDMA With Multi-Path Transport in Datacenters. 2308-2323 - Chen Chen
, Lei Liu, Tie Qiu
, Dapeng Oliver Wu
, Zhiyuan Ren
:
Delay-Aware Grid-Based Geographic Routing in Urban VANETs: A Backbone Approach. 2324-2337 - Jinbin Hu
, Jiawei Huang
, Wenjun Lv, Yutao Zhou, Jianxin Wang
, Tian He
:
CAPS: Coding-Based Adaptive Packet Spraying to Reduce Flow Completion Time in Data Center. 2338-2353 - Qian Chen, Xiaojuan Zhang
, Wei Lih Lim, Yuen Sam Kwok, Sumei Sun
:
High Reliability, Low Latency and Cost Effective Network Planning for Industrial Wireless Mesh Networks. 2354-2362 - Francesco Malandrino
, Carla-Fabiana Chiasserini
, Gil Einziger
, Gabriel Scalosub
:
Reducing Service Deployment Cost Through VNF Sharing. 2363-2376 - Mauro Cociglio
, Giuseppe Fioccola
, Guido Marchetto
, Amedeo Sapio
, Riccardo Sisto
:
Multipoint Passive Monitoring in Packet Networks. 2377-2390 - Ping Zhao
, Hongbo Jiang
, Jie Li
, Fanzi Zeng
, Zhu Xiao
, Kun Xie
, Guanglin Zhang:
Synthesizing Privacy Preserving Traces: Enhancing Plausibility With Social Networks. 2391-2404 - Anura P. Jayasumana
, Randy C. Paffenroth
, Gunjan Mahindre
, Sridhar Ramasamy
, Kelum Gajamannage
:
Network Topology Mapping From Partial Virtual Coordinates and Graph Geodesics. 2405-2417 - Yang Liu, Bo Li
, Brian D. O. Anderson
, Guodong Shi
:
Clique Gossiping. 2418-2431 - Sepideh Nazemi
, Kin K. Leung, Ananthram Swami:
Distributed Optimization Framework for In-Network Data Processing. 2432-2443 - Elaine Y.-N. Sun
, Hsiao-Chun Wu
, Scott C.-H. Huang
:
Theoretical Analysis of Various Software-Defined Multiplexing Codes. 2444-2457 - Han Zhang
, Haijun Geng
, Yahui Li
, Xia Yin, Xingang Shi
, Zhiliang Wang
, Qianhong Wu
, Jianwei Liu:
DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs. 2458-2471 - Zhenhua Han
, Haisheng Tan
, Xiang-Yang Li
, Shaofeng H.-C. Jiang
, Yupeng Li
, Francis C. M. Lau:
OnDisc: Online Latency-Sensitive Job Dispatching and Scheduling in Heterogeneous Edge-Clouds. 2472-2485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.