


default search action
IEEE/ACM Transactions on Networking, Volume 31
Volume 31, Number 1, February 2023
- Huikang Li
, Yi Gao
, Wei Dong
, Chun Chen
:
Bound-Based Network Tomography for Inferring Interesting Path Metrics. 1-14 - Eric Ruzomberka
, David J. Love
:
Interference Moral Hazard in Large Multihop Networks. 15-29 - Anirudh Sabnis
, Tareq Si Salem
, Giovanni Neglia
, Michele Garetto
, Emilio Leonardi
, Ramesh K. Sitaraman
:
GRADES: Gradient Descent for Similarity Caching. 30-41 - Xi Chen, Qiao Xiang
, Linghe Kong
, Huisan Xu, Xue Liu
:
Learning From FM Communications: Toward Accurate, Efficient, All-Terrain Vehicle Localization. 42-57 - Haoyu Wang
, Zetian Liu, Haiying Shen
:
Machine Learning Feature Based Job Scheduling for Distributed Machine Learning Clusters. 58-73 - Xujin Zhou
, Irem Koprulu
, Atilla Eryilmaz
, Michael J. Neely
:
Efficient Distributed MAC for Dynamic Demands: Congestion and Age Based Designs. 74-87 - Federico Mason
, Gianfranco Nencioni
, Andrea Zanella
:
Using Distributed Reinforcement Learning for Resource Orchestration in a Network Slicing Scenario. 88-102 - Jiao Zhang
, Xiaolong Zhong
, Zirui Wan, Yu Tian, Tian Pan
, Tao Huang
:
RCC: Enabling Receiver-Driven RDMA Congestion Control With Congestion Divide-and-Conquer in Datacenter Networks. 103-117 - Shaopeng Zhu, Xiaolong Zheng
, Liang Liu
, Huadong Ma
:
CSMA/PJ: A Protective Jamming Based MAC Protocol to Harmonize the Long and Short Links. 118-132 - Konstantinos Oikonomou
, George Koufoudakis
, Sonia Aïssa
, Ioannis Stavrakakis
:
Probabilistic Flooding Performance Analysis Exploiting Graph Spectra Properties. 133-146 - Juncheng Wang
, Min Dong
, Ben Liang
, Gary Boudreau
, Hatem Abou-Zeid:
Delay-Tolerant OCO With Long-Term Constraints: Algorithm and Its Application to Network Resource Allocation. 147-163 - Xiaochun Yun
, Yipeng Wang
, Yongzheng Zhang, Chen Zhao
, Zijian Zhao
:
Encrypted TLS Traffic Classification on Cloud Platforms. 164-177 - Shouxi Luo
, Pingzhi Fan, Huanlai Xing
, Hongfang Yu
:
Meeting Coflow Deadlines in Data Center Networks With Policy-Based Selective Completion. 178-191 - Zhehui Zhang
, Yuanjie Li
, Qianru Li
, Jinghao Zhao
, Ghufran Baig, Lili Qiu, Songwu Lu:
Movement-Based Reliable Mobility Management for Beyond 5G Cellular Networks. 192-207 - Tongyu Zong
, Chen Li
, Yuanyuan Lei, Guangyu Li
, Houwei Cao
, Yong Liu:
Cocktail Edge Caching: Ride Dynamic Trends of Content Popularity With Ensemble Learning. 208-219 - Cao Chen
, Fen Zhou
, Massimo Tornatore
, Shilin Xiao
:
Maximizing Revenue With Adaptive Modulation and Multiple FECs in Flexible Optical Networks. 220-233 - Chia-Ming Chang, Yi-Jheng Lin
, Cheng-Shang Chang
, Duan-Shin Lee
:
On the Stability Regions of Coded Poisson Receivers With Multiple Classes of Users and Receivers. 234-247 - Gongming Zhao
, Luyao Luo
, Hongli Xu
, Chun-Jen Chung
, Liguang Xie
:
Southbound Message Delivery With Virtual Network Topology Awareness in Clouds. 248-263 - Francesco Malandrino
, Carla-Fabiana Chiasserini
, Nuria Molner, Antonio de la Oliva
:
Network Support for High-Performance Distributed Machine Learning. 264-278 - Chao Xu
, Jessie Hui Wang
, Jilong Wang
, Tao Yu, Yipeng Zhou
, Yuedong Xu
, Di Wu
, Changqing An
:
Offloading Elastic Transfers to Opportunistic Vehicular Networks Based on Imperfect Trajectory Prediction. 279-293 - João Luis Sobrinho
, Miguel Alves Ferreira
:
From Non-Optimal Routing Protocols to Routing on Multiple Optimality Criteria. 294-307 - Xudong Qin
, Bin Li
, Lei Ying
:
Efficient Distributed Threshold-Based Offloading for Large-Scale Mobile Cloud Computing. 308-321 - Akbar Majidi
, Xiaofeng Gao
, Shunjia Zhu, Nazila Jahanbakhsh, Jiaqi Zheng
, Guihai Chen:
MiFi: Bounded Update to Optimize Network Performance in Software-Defined Data Centers. 322-335 - Ge Wang
, Xiaofeng Shi
, Haofan Cai
, Chen Qian, Han Ding
, Wei Xi, Kun Zhao
, Jizhong Zhao, Jinsong Han
:
A Generalized Method to Combat Multipaths for RFID Sensing. 336-351 - Chi Zhang
, Haisheng Tan
, Haoqiang Huang
, Zhenhua Han
, Shaofeng H.-C. Jiang
, Guopeng Li
, Xiangyang Li
:
Online Approximation Scheme for Scheduling Heterogeneous Utility Jobs in Edge Computing. 352-365 - Qiang Wu, Xiangping Bryce Zhai
, Xi Liu, Chunming Wu
, Fangliang Lou, Hongke Zhang
:
Performance Tuning via Lean Measurements for Acceleration of Network Functions Virtualization. 366-379 - Yijun Hao
, Fang Li, Cong Zhao
, Shusen Yang
:
Delay-Oriented Scheduling in 5G Downlink Wireless Networks Based on Reinforcement Learning With Partial Observations. 380-394 - Shaoke Xi, Kai Bu
, Wensen Mao, Xiaoyu Zhang
, Kui Ren
, Xinxin Ren:
RuleOut Forwarding Anomalies for SDN. 395-407 - Jiayu Pan
, Ahmed M. Bedewy
, Yin Sun
, Ness B. Shroff
:
Optimal Sampling for Data Freshness: Unreliable Transmissions With Random Two-Way Delay. 408-420 - Shaofei Tang
, Sicheng Zhao, Xiaoqin Pan, Zuqing Zhu
:
How to Use In-Band Network Telemetry Wisely: Network-Wise Orchestration of Sel-INT. 421-435 - Cheng Huang
, Xudong Wang
:
Distributed Scheduling With Centralized Coordination for Scalable Wireless Mesh Networking. 436-451 - Chuanpu Fu
, Qi Li
, Meng Shen
, Ke Xu
:
Frequency Domain Feature Based Robust Malicious Traffic Detection. 452-467
Volume 31, Number 2, April 2023
- Hao-Hsuan Chang
, Hao Chen
, Jianzhong Zhang
, Lingjia Liu
:
Decentralized Deep Reinforcement Learning Meets Mobility Load Balancing. 473-484 - Yunhua He
, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood
, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. 485-496 - Tuo Shi
, Zhipeng Cai
, Jianzhong Li
, Hong Gao
, Jiancheng Chen, Ming Yang
:
Services Management and Distributed Multihop Requests Routing in Mobile Edge Networks. 497-510 - Kai Lei
, Guanjie Lin
, Meimei Zhang, Keke Li, Qi Li, Xiaojun Jing, Peng Wang:
Measuring the Consistency Between Data and Control Plane in SDN. 511-525 - Xinle Du
, Ke Xu
, Lei Xu, Kai Zheng, Meng Shen
, Bo Wu
, Tong Li
:
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers. 526-541 - Yi Zhao
, Meina Qiao
, Haiyang Wang, Rui Zhang
, Dan Wang
, Ke Xu
:
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework. 542-557 - Haibo Wang
, Chaoyi Ma
, Olufemi O. Odegbile, Shigang Chen
, Jih-Kwon Peir:
Randomized Error Removal for Online Spread Estimation in High-Speed Networks. 558-573 - Yi Ding
, Yu Yang
, Wenchao Jiang
, Yunhuai Liu, Tian He, Desheng Zhang:
Nationwide Deployment and Operation of a Virtual Arrival Detection System in the Wild. 574-589 - Lili Chen
, Kai Chen
, Jie Xiong
, Ke Li
, Sunghoon Ivan Lee
, Fuwei Wang
, Zhanyong Tang
, Zheng Wang
, Dingyi Fang, Xiaojiang Chen
:
Toward Wide-Area Contactless Wireless Sensing. 590-605 - François Michel
, Alejandro Cohen
, Derya Malak
, Quentin De Coninck
, Muriel Médard
, Olivier Bonaventure
:
FlEC: Enhancing QUIC With Application-Tailored Reliability Mechanisms. 606-619 - Xiang Tian
, Baoxian Zhang
, Cheng Li
:
Distributed Stable Multisource Global Broadcast for SINR-Based Wireless Multihop Networks. 620-633 - Yixin Bao
, Yanghua Peng
, Chuan Wu
:
Deep Learning-Based Job Placement in Distributed Machine Learning Clusters With Heterogeneous Workloads. 634-647 - En Wang
, Mijia Zhang
, Wenbin Liu
, Haoyi Xiong
, Bo Yang
, Yongjian Yang
, Jie Wu
:
Outlier-Concerned Data Completion Exploiting Intra- and Inter-Data Correlations in Sparse CrowdSensing. 648-663 - Na Ruan, Hanyi Sun
, Zenan Lou, Jie Li
:
A General Quantitative Analysis Framework for Attacks in Blockchain. 664-679 - Waseem Ozan
, Izzat Darwazeh
, Kyle Jamieson
:
Partial OFDM Symbol Recovery to Improve Interfering Wireless Networks Operation in Collision Environments. 680-694 - Feridun Tütüncüoglu
, Sladana Josilo
, György Dán
:
Online Learning for Rate-Adaptive Task Offloading Under Latency Constraints in Serverless Edge Computing. 695-709 - Jianpeng Qi
, Rui Wang
:
R2: A Distributed Remote Function Execution Mechanism With Built-In Metadata. 710-723 - Lu Tang, Yao Xiao, Qun Huang
, Patrick P. C. Lee
:
A High-Performance Invertible Sketch for Network-Wide Superspreader Detection. 724-737 - Jiawei Huang
, Wenlu Zhang, Yijun Li, Lin Li, Zhaoyi Li
, Jin Ye, Jianxin Wang
:
ChainSketch: An Efficient and Accurate Sketch for Heavy Flow Detection. 738-753 - Mukhtiar Ahmad
, Syed Muhammad Nawazish Ali, Muhammad Taimoor Tariq, Syed Usman Jafri, Adnan Abbas
, Syeda Mashal Abbas Zaidi, Muhammad Basit Iqbal Awan, Zartash Afzal Uzmi
, Zafar Ayyub Qazi:
Neutrino: A Fast and Consistent Edge-Based Cellular Control Plane. 754-769 - Viviana Arrigoni
, Novella Bartolini
, Annalisa Massini
, Federico Trombetti:
A Bayesian Approach to Network Monitoring for Progressive Failure Localization. 770-783 - Vishrant Tripathi
, Rajat Talak
, Eytan H. Modiano:
Information Freshness in Multihop Wireless Networks. 784-799 - Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li
, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie
, Guan-Hua Tu
:
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. 800-815 - Jielun Zhang
, Fuhao Li
, Feng Ye
:
Sustaining the High Performance of AI-Based Network Traffic Classification Models. 816-827 - Tianjian Dong
, Qi Qi
, Jingyu Wang
, Zirui Zhuang
, Haifeng Sun
, Jianxin Liao
, Zhu Han
:
Standing on the Shoulders of Giants: Cross-Slice Federated Meta Learning for Resource Orchestration to Cold-Start Slice. 828-845 - Shicheng Wang
, Menghao Zhang
, Guanyu Li
, Chang Liu, Zhiliang Wang
, Ying Liu
, Mingwei Xu
:
Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable Switches. 846-861 - Guangtao Xue
, Yijie Li
, Hao Pan
, Lanqing Yang
, Yi-Chao Chen
, Xiaoyu Ji
, Jiadi Yu
:
ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature. 862-876 - Jiawei Li
, Chuyu Wang
, Ang Li
, Dianqi Han
, Yan Zhang
, Jinhang Zuo, Rui Zhang
, Lei Xie
, Yanchao Zhang
:
Rhythmic RFID Authentication. 877-890 - Yang Gao
, Hongli Zhang
, Xiangzhan Yu:
Higher-Order Community Detection: On Information Degeneration and Its Elimination. 891-903 - Dezhang Kong
, Yi Shen, Xiang Chen
, Qiumei Cheng
, Hongyan Liu
, Dong Zhang
, Xuan Liu
, Shuangxi Chen, Chunming Wu
:
Combination Attacks and Defenses on SDN Topology Discovery. 904-919 - Haojun Huang, Zhaoxi Li, Jialin Tian, Geyong Min
, Wang Miao
, Dapeng Oliver Wu
:
Accurate Prediction of Required Virtual Resources via Deep Reinforcement Learning. 920-933 - Jaehyun Nam
, Seungsoo Lee
, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin
:
Secure Inter-Container Communications Using XDP/eBPF. 934-947
Volume 31, Number 3, June 2023
- Wei Yang, Chi Lin
, Haipeng Dai
, Pengfei Wang
, Jiankang Ren
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Robust Wireless Rechargeable Sensor Networks. 949-964 - Xiong Wang
, Jiancheng Ye
, John C. S. Lui
:
Decentralized Scheduling and Dynamic Pricing for Edge Computing: A Mean Field Game Approach. 965-978 - Marco Faltelli
, Giacomo Belocchi, Francesco Quaglia
, Salvatore Pontarelli
, Giuseppe Bianchi
:
Metronome: Adaptive and Precise Intermittent Packet Retrieval in DPDK. 979-993 - Haoxian Chen
, Chenyuan Wu, Andrew Zhao, Mukund Raghothaman
, Mayur Naik, Boon Thau Loo
:
Synthesizing Formal Network Specifications From Input-Output Examples. 994-1009 - Yang Du
, He Huang
, Yu-E Sun
, Shigang Chen
, Guoju Gao
, Xiaocan Wu
:
Self-Adaptive Sampling Based Per-Flow Traffic Measurement. 1010-1025 - Feng Lin
, Ming Gao
, Lingfeng Zhang
, Yimin Li, Weiye Xu
, Jinsong Han
, Xian Xu, Wenyao Xu
, Kui Ren
:
Mobile Communication Among COTS IoT Devices via a Resonant Gyroscope With Ultrasound. 1026-1041 - Kan Yu
, Jiguo Yu
, Chuanwen Luo
:
The Impact of Mobility on Physical Layer Security of 5G IoT Networks. 1042-1055 - Min Yee Teh
, Shizhen Zhao
, Peirui Cao
, Keren Bergman
:
Enabling Quasi-Static Reconfigurable Networks With Robust Topology Engineering. 1056-1070 - Yipeng Wang
, Huijie He, Yingxu Lai
, Alex X. Liu
:
A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic. 1071-1086 - Karim Elsayed
, Amr Rizk
:
Time-to-Live Caching With Network Delays: Exact Analysis and Computable Approximations. 1087-1100 - Xiaofeng Lu
, Fan Yang, Luwen Zou, Pietro Liò
, Pan Hui:
An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key. 1101-1116 - Jianwei Liu
, Kaiyan Cui
, Xiang Zou
, Jinsong Han
, Feng Lin
, Kui Ren
:
Reliable Multi-Factor User Authentication With One Single Finger Swipe. 1117-1131 - Longzhi Yuan
, Qiwei Wang, Jia Zhao
, Wei Gong
:
Multiprotocol Backscatter With Commodity Radios for Personal IoT Sensors. 1132-1144 - Jingling Liu
, Jiawei Huang
, Weihe Li
, Jianxin Wang
, Tian He
:
Asymmetry-Aware Load Balancing With Adaptive Switching Granularity in Data Center. 1145-1158 - Ningning Hou
, Xianjin Xia
, Yuanqing Zheng
:
CloakLoRa: A Covert Channel Over LoRa PHY. 1159-1172 - Tareq Si Salem
, Giovanni Neglia
, Damiano Carra
:
Ascent Similarity Caching With Approximate Indexes. 1173-1186 - Vishwaraj Doshi
, Shailaja Mallick
, Do Young Eun
:
Convergence of Bi-Virus Epidemic Models With Non-Linear Rates on Networks - A Monotone Dynamical Systems Approach. 1187-1201 - JunNyung Hur
, Hyeon Gy Shon, Young Jae Kim, Myungkeun Yoon
:
Packet Chunking for File Detection. 1202-1215 - Wenzheng Xu
, Hongbin Xie, Chenxi Wang, Weifa Liang
, Xiaohua Jia
, Zichuan Xu
, Pan Zhou
, Weigang Wu
, Xiang Chen
:
An Approximation Algorithm for the h-Hop Independently Submodular Maximization Problem and Its Applications. 1216-1229 - Alon Rashelbach
, Ori Rottenstreich
, Mark Silberstein
:
Scaling by Learning: Accelerating Open vSwitch Data Path With Neural Networks. 1230-1243 - Erfan Meskar, Ben Liang
:
Fair Multi-Resource Allocation in Heterogeneous Servers With an External Resource Type. 1244-1262 - Anders E. Kalør
, Petar Popovski
:
Timely Monitoring of Dynamic Sources With Observations From Multiple Wireless Sensors. 1263-1276 - Berksan Serbetci
, Eleftherios Lampiris
, Thrasyvoulos Spyropoulos, Giuseppe Caire
, Petros Elia
:
Multi-Transmitter Coded Caching Networks With Transmitter-Side Knowledge of File Popularity. 1277-1292 - Matteo Salani
, Cristina Rottondi
, Leopoldo Ceré, Massimo Tornatore
:
Dual-Stage Planning for Elastic Optical Networks Integrating Machine-Learning-Assisted QoT Estimation. 1293-1307 - Shuqin Gao
, Costas Courcoubetis, Lingjie Duan
:
Distributed Double Auction Mechanisms for Large-Scale Device-to-Device Resource Trading. 1308-1323 - Pietro Bressana
, Noa Zilberman
, Robert Soulé
:
PTA: Finding Hard-to-Find Data Plane Bugs. 1324-1337 - Noor Felemban
, Fidan Mehmeti
, Thomas F. La Porta
:
VidQ: Video Query Using Optimized Audio-Visual Processing. 1338-1352 - Haodi Ping
, Yongcai Wang
, Deying Li
, Wenping Chen:
Understanding Node Localizability in Barycentric Linear Localization. 1353-1368 - Peng Lin
, Kejiang Ye
, Yishen Hu, Yanying Lin
, Cheng-Zhong Xu
:
A Novel Multimodal Deep Learning Framework for Encrypted Traffic Classification. 1369-1384 - Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao
, Haichao Shi
, Qiang Wang
:
ProGraph: Robust Network Traffic Identification With Graph Propagation. 1385-1399 - Xiang Chen
, Hongyan Liu
, Qun Huang
, Dong Zhang
, Haifeng Zhou
, Chunming Wu
, Xuan Liu
, Qiang Yang
:
Toward Low-Latency and Accurate State Synchronization for Programmable Networks. 1400-1415 - Jiahao Cao
, Mingwei Xu
, Qi Li
, Kun Sun
, Yuan Yang
:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. 1416-1431
Volume 31, Number 4, August 2023
- Minghao Ye
, Junjie Zhang
, Zehua Guo
, H. Jonathan Chao
:
FlexDATE: Flexible and Disturbance-Aware Traffic Engineering With Reinforcement Learning in Software-Defined Networks. 1433-1448 - Yongmin Zhang
, Wei Wang
, Ju Ren
, Jinge Huang, Shibo He
, Yaoxue Zhang
:
Efficient Revenue-Based MEC Server Deployment and Management in Mobile Edge-Cloud Computing. 1449-1462 - Xu Lin
, Deke Guo
, Yulong Shen
, Guoming Tang
, Bangbang Ren, Ming Xu:
SFT-Box: An Online Approach for Minimizing the Embedding Cost of Multiple Hybrid SFCs. 1463-1477 - Songtao Fu
, Qi Li
, Min Zhu, Xiaoliang Wang
, Su Yao
, Yangfei Guo
, Xinle Du
, Ke Xu
:
MASK: Practical Source and Path Verification Based on Multi-AS-Key. 1478-1493 - Junchao Ma
, Lingjia Liu
, Bodong Shang
, Shashank Jere
, Pingzhi Fan:
Performance Analysis and Optimization for Layer-Based Scalable Video Caching in 6G Networks. 1494-1506 - Jian Su
, Zhengguo Sheng
, Chenxi Huang
, Gang Li
, Alex X. Liu
, Zhangjie Fu
:
Identifying RFID Tags in Collisions. 1507-1520 - Guy Goren
, Shay Vargaftik
, Yoram Moses
:
Distributed Dispatching in the Parallel Server Model. 1521-1534 - Qi Shi
, Dong Hao
:
Social Sourcing: Incorporating Social Networks Into Crowdsourcing Contest Design. 1535-1549 - Na Wang
, Junsong Fu
, Shancheng Zhang
, Zheng Zhang, Jiawen Qiao, Jianwei Liu
, Bharat K. Bhargava
:
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain. 1550-1565 - Jianer Zhou
, Xinyi Qiu
, Zhenyu Li
, Qing Li
, Gareth Tyson, Jingpu Duan, Yi Wang, Heng Pan
, Qinghua Wu
:
A Machine Learning-Based Framework for Dynamic Selection of Congestion Control Algorithms. 1566-1581 - Shiva Raj Pokhrel
, Jinho Choi
, Anwar Walid
:
Fair and Efficient Distributed Edge Learning With Hybrid Multipath TCP. 1582-1594 - Juhyeng Han
, Insu Yun
, Seongmin Kim
, Taesoo Kim
, Sooel Son
, Dongsu Han
:
Scalable and Secure Virtualization of HSM With ScaleTrust. 1595-1610 - Xia Cheng
, Junyang Shi
, Mo Sha
, Linke Guo
:
Revealing Smart Selective Jamming Attacks in WirelessHART Networks. 1611-1625 - Tim Hellemans, Grzegorz Kielanski, Benny Van Houdt
:
Performance of Load Balancers With Bounded Maximum Queue Length in Case of Non-Exponential Job Sizes. 1626-1641 - Steffen Lindner
, Gabriel Paradzik
, Michael Menth
:
Alternative Best Effort (ABE) for Service Differentiation: Trading Loss Versus Delay. 1642-1656 - Chi Lin
, Shibo Hao
, Wei Yang, Pengfei Wang
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Maximizing Energy Efficiency of Period-Area Coverage With a UAV for Wireless Rechargeable Sensor Networks. 1657-1673 - Dheeraj Narasimha
, Srinivas Shakkottai
, Lei Ying
:
Age-Dependent Distributed MAC for Ultra-Dense Wireless Networks. 1674-1687 - Christos Tsanikidis
, Javad Ghaderi
:
Randomized Scheduling of Real-Time Traffic in Wireless Networks Over Fading Channels. 1688-1701 - Francesco Malandrino
, Carla-Fabiana Chiasserini
, Giuseppe Di Giacomo
:
Efficient Distributed DNNs in the Mobile-Edge-Cloud Continuum. 1702-1716 - Xiang Chen
, Hongyan Liu
, Dong Zhang
, Qun Huang
, Haifeng Zhou
, Chunming Wu
, Qiang Yang
:
Eliminating Control Plane Overload via Measurement Task Placement. 1717-1731 - Kaihui Gao
, Chen Sun, Shuai Wang, Dan Li
, Yu Zhou, Hongqiang Harry Liu, Lingjun Zhu, Ming Zhang, Xiang Deng, Cheng Zhou, Lu Lu:
Buffer-Based High-Coverage and Low-Overhead Request Event Monitoring in the Cloud. 1732-1747 - Kaihui Gao
, Shuai Wang
, Kun Qian
, Dan Li
, Rui Miao, Bo Li, Yu Zhou, Ennan Zhai
, Chen Sun, Jiaqi Gao, Dai Zhang, Binzhang Fu, Frank Kelly
, Dennis Cai, Hongqiang Harry Liu, Yan Li, Hongwei Yang, Tao Sun:
Dependable Virtualized Fabric on Programmable Data Plane. 1748-1764 - Zheng Yang
, Xu Wang
, Jiahang Wu, Yi Zhao
, Qiang Ma, Xin Miao, Li Zhang
, Zimu Zhou
:
EdgeDuet: Tiling Small Object Detection for Edge Assisted Autonomous Mobile Vision. 1765-1778 - Cho-Hsin Tsai
, Chih-Chun Wang
:
Distribution-Oblivious Online Algorithms for Age-of-Information Penalty Minimization. 1779-1794 - Meng Jin
, Xinbing Wang
, Chenghu Zhou:
Key Agreement on IoT Devices With Echo Profiling. 1795-1808 - Bai Liu
, Qingkai Liang, Eytan H. Modiano:
Tracking MaxWeight: Optimal Control for Partially Observable and Controllable Networks. 1809-1821 - Apoorv Shukla
, Kevin Nico Hudemann, Zsolt Vági, Lily Hügerich
, Georgios Smaragdakis
, Artur Hecker, Stefan Schmid
, Anja Feldmann:
Runtime Verification for Programmable Switches. 1822-1837 - Young-Mok Ha
, Eunji Pak
, Jongkil Park
, Taeho Kim
, Ji Won Yoon
:
Clock Offset Estimation for Systems With Asymmetric Packet Delays. 1838-1853 - Qilong Shi
, Yuchen Xu
, Jiuhua Qi, Wenjun Li
, Tong Yang, Yang Xu
, Yi Wang:
Cuckoo Counter: Adaptive Structure of Counters for Accurate Frequency and Top-k Estimation. 1854-1869 - Bingnan Hou
, Zhiping Cai
, Kui Wu
, Tao Yang, Tongqing Zhou
:
6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding. 1870-1885 - Zhenhua Li
, Xingyao Li
, Xinlei Yang
, Xianlong Wang, Feng Qian, Yunhao Liu:
Fast Uplink Bandwidth Testing for Internet Users. 1886-1901 - Jiahui Li
, Geng Sun
, Hui Kang
, Aimin Wang, Shuang Liang
, Yanheng Liu
, Ying Zhang
:
Multi-Objective Optimization Approaches for Physical Layer Secure Communications Based on Collaborative Beamforming in UAV Networks. 1902-1917
Volume 31, Number 5, October 2023
- Qingjun Xiao
, Xuyuan Cai, Yifei Qin, Zhiying Tang, Shigang Chen
, Yu Liu:
Universal and Accurate Sketch for Estimating Heavy Hitters and Moments in Data Streams. 1919-1934 - Daron Anderson
, George Iosifidis
, Douglas J. Leith
:
Lazy Lagrangians for Optimistic Learning With Budget Constraints. 1935-1949 - Shangyao Yan
, Zhimeng Yin, Guang Tan:
CurveLight: An Accurate and Practical Light Positioning System. 1950-1964 - Zehua Guo
, Songshi Dou
, Wenfei Wu
, Yuanqing Xia
:
Toward Flexible and Predictable Path Programmability Recovery Under Multiple Controller Failures in Software-Defined WANs. 1965-1980 - Tinghao Zhang
, Kwok-Yan Lam
, Jun Zhao
, Feng Li
, Huimei Han
, Norziana Jamil
:
Enhancing Federated Learning With Spectrum Allocation Optimization and Device Selection. 1981-1996 - Xinzhe Fu
, Eytan H. Modiano
:
Optimal Routing to Parallel Servers With Unknown Utilities - Multi-Armed Bandit With Queues. 1997-2012 - Suhan Jiang
, Jie Wu
:
Approaching an Optimal Bitcoin Mining Overlay. 2013-2026 - Jincheng Zhong
, Ziling Wei
, Shuang Zhao
, Shuhui Chen
:
TupleTree: A High-Performance Packet Classification Algorithm Supporting Fast Rule-Set Updates. 2027-2041 - Rui Xia
, Haipeng Dai
, Jiaqi Zheng
, Rong Gu
, Xiaoyu Wang
, Weijun Wang
, Guihai Chen
:
SAFE: Service Availability via Failure Elimination Through VNF Scaling. 2042-2057 - Tianyou Qiu
, Yiping Li
, Xisheng Feng:
Optimal Broadcast Scheduling Algorithm for a Multi-AUV Acoustic Communication Network. 2058-2069 - Qian Chen
, Jiliang Wang
:
AlignTrack: Push the SNR Limit of LoRa Collision Decoding. 2070-2085 - Rajeev Sahay
, Serena Nicoll, Minjun Zhang, Tsung-Yen Yang, Carlee Joe-Wong
, Kerrie A. Douglas
, Christopher G. Brinton
:
Predicting Learning Interactions in Social Learning Networks: A Deep Learning Enabled Approach. 2086-2100 - Kun Xie
, Yudian Ouyang, Xin Wang
, Gaogang Xie
, Kenli Li
, Wei Liang
, Jiannong Cao
, Jigang Wen:
Deep Adversarial Tensor Completion for Accurate Network Traffic Measurement. 2101-2116 - Hao Kong
, Li Lu
, Jiadi Yu
, Yingying Chen
, Xiangyu Xu
, Feng Lyu
:
Toward Multi-User Authentication Using WiFi Signals. 2117-2132 - Keerthi Priya Dasala
, Josep Miquel Jornet
, Edward W. Knightly
:
Scaling Multi-User mmWave WLANs: The Case for Concurrent Uplink Transmissions on a Single RF Chain. 2133-2146 - Guojun Xiong
, Shufan Wang
, Gang Yan
, Jian Li
:
Reinforcement Learning for Dynamic Dimensioning of Cloud Caches: A Restless Bandit Approach. 2147-2161 - Jia Zhang
, Shaorui Ren, Enhuan Dong
, Zili Meng
, Yuan Yang
, Mingwei Xu
, Sijie Yang
, Miao Zhang, Yang Yue:
Reducing Mobile Web Latency Through Adaptively Selecting Transport Protocol. 2162-2177 - Bahman Abolhassani
, John Tadrous, Atilla Eryilmaz
:
Optimal Load-Splitting and Distributed-Caching for Dynamic Content Over the Wireless Edge. 2178-2190 - Andrea Baiocchi
, Ion Turcanu
:
On Flow Control and Optimized Back-Off in Non-Saturated CSMA. 2191-2206 - Yijing Zeng
, Roberto Calvo-Palomino
, Domenico Giustiniano
, Gérôme Bovet
, Suman Banerjee:
Adaptive Uplink Data Compression in Spectrum Crowdsensing Systems. 2207-2221 - Renpeng Zou
, Xixiang Lyu
, Jing Ma
, Bowen Zhang, Danfang Wu:
BCMIX: A Blockchain-Based Dynamic Self-Reconfigurable Mixnet. 2222-2235 - Yuanyuan Li
, Yuezhou Liu
, Lili Su
, Edmund Yeh
, Stratis Ioannidis
:
Experimental Design Networks: A Paradigm for Serving Heterogeneous Learners Under Networking Constraints. 2236-2250 - Sarath Yasodharan
, Anurag Kumar
:
Revenue Optimal Bandwidth Allocation in a Class of Multihop Networks: Algorithms and Asymptotic Optimality. 2251-2266 - Jin Fang
, Gongming Zhao
, Hongli Xu
, Changbo Wu
, Zhuolong Yu:
GRID: Gradient Routing With In-Network Aggregation for Distributed Training. 2267-2280 - Md Shahbaz Akhtar, Krishnakumar G, Vishnu B, Abhishek Sinha
:
Fast and Secure Routing Algorithms for Quantum Key Distribution Networks. 2281-2296 - Yitao Xing
, Kaiping Xue
, Yuan Zhang
, Jiangping Han
, Jian Li
, David S. L. Wei
:
An Online Learning Assisted Packet Scheduler for MPTCP in Mobile Networks. 2297-2312 - Yibo Jin
, Lei Jiao
, Mingtao Ji
, Zhuzhong Qian
, Sheng Zhang
, Ning Chen
, Sanglu Lu:
Scheduling In-Band Network Telemetry With Convergence-Preserving Federated Learning. 2313-2328 - Pengtao Fu
, Lailong Luo
, Deke Guo
, Shangsen Li
, Yun Zhou
:
A Shifting Filter Framework for Dynamic Set Queries. 2329-2344 - Riheng Jia
, Jinhao Wu
, Xiong Wang
, Jianfeng Lu
, Feilong Lin
, Zhonglong Zheng
, Minglu Li
:
Energy Cost Minimization in Wireless Rechargeable Sensor Networks. 2345-2360 - Yiran Zhang
, Qingkai Meng
, Yifan Liu, Fengyuan Ren:
Revisiting Congestion Detection in Lossless Networks. 2361-2375 - Shengling Wang
, Xidi Qu
, Qin Hu
, Xia Wang, Xiuzhen Cheng
:
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain. 2376-2388 - Vahid Khalilpour Akram
, Onur Ugurlu
:
Detecting the Most Vital Articulation Points in Wireless Multi-Hop Networks. 2389-2402
Volume 31, Number 6, December 2023
- Han Zhang
, Xia Yin, Xingang Shi
, Jilong Wang
, Zhiliang Wang
, Yingya Guo
, Tian Lan
, Yahui Li, Yongqing Zhu, Ke Ruan, Haijun Geng
:
Achieving High Availability in Inter-DC WAN Traffic Engineering. 2406-2421 - Yuntao Wang
, Zhou Su
, Qichao Xu
, Ruidong Li
, Tom H. Luan
, Pinghui Wang
:
A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue. 2422-2438 - Hong Xie
, John C. S. Lui
:
Cooperation Preference Aware Shapley Value: Modeling, Algorithms and Applications. 2439-2453 - Congkai An
, Anfu Zhou
, Jialiang Pei, Xi Liu, Dongzhu Xu
, Liang Liu
, Huadong Ma
:
Octopus: Exploiting the Edge Intelligence for Accessible 5G Mobile Performance Enhancement. 2454-2469 - Sara Garcia Sanchez
, Guillem Reus Muns, Carlos Bocanegra
, Yanyu Li, Ufuk Muncuk, M. Yousof Naderi
, Yanzhi Wang
, Stratis Ioannidis
, Kaushik Roy Chowdhury
:
AirNN: Over-the-Air Computation for Neural Networks via Reconfigurable Intelligent Surfaces. 2470-2482 - Kiril Danilchenko, Zeev Nutov, Michael Segal
:
Covering Users With QoS by a Connected Swarm of Drones: Graph Theoretical Approach and Experiments. 2483-2498 - Won Joon Yun
, Yunseok Kwak, Hankyul Baek, Soyi Jung
, Mingyue Ji
, Mehdi Bennis
, Jihong Park
, Joongheon Kim
:
SlimFL: Federated Learning With Superposition Coding Over Slimmable Neural Networks. 2499-2514 - Guocheng Liao
, Xu Chen
, Jianwei Huang
:
Privacy Protection Under Incomplete Social and Data Correlation Information. 2515-2528 - Qian Lv, Zuqing Zhu
:
On the Multilayer Planning of Filterless Optical Networks With OTN Encryption. 2529-2544 - Wei Wang
, Xin Liu
, Yao Yao, Zicheng Chi
, Stuart Ray, Ting Zhu
, Yanchao Zhang
:
Simultaneous Data Dissemination Among WiFi and ZigBee Devices. 2545-2558 - Zeqi Lai
, Hewu Li
, Qi Zhang
, Qian Wu
, Jianping Wu:
StarFront: Cooperatively Constructing Pervasive and Low-Latency CDNs Upon Emerging LEO Satellites and Clouds. 2559-2574 - Songshi Dou
, Li Qi, Chao Yao
, Zehua Guo
:
Exploring the Impact of Critical Programmability on Controller Placement for Software-Defined Wide Area Networks. 2575-2588 - Yevheniya Nosyk
, Maciej Korczynski
, Qasim Lone, Marcin Skwarek, Baptiste Jonglez
, Andrzej Duda
:
The Closed Resolver Project: Measuring the Deployment of Inbound Source Address Validation. 2589-2603 - Yongquan Fu
, Lun An, Siqi Shen
, Kai Chen
, Pere Barlet-Ros
:
A One-Pass Clustering Based Sketch Method for Network Monitoring. 2604-2613 - Ahmed M. Abdelmoniem
, Brahim Bensaou:
Enhancing TCP via Hysteresis Switching: Theoretical Analysis and Empirical Evaluation. 2614-2623 - Fusheng Lin
, Hongyu Wang
, Guo Chen
, Guihua Zhou, Tingting Xu
, Dehui Wei
, Li Chen, Yuanwei Lu, Andrew Qu, Hua Shao, Hongbo Jiang
:
Fast, Scalable and Robust Centralized Routing for Data Center Networks. 2624-2639 - Xuezheng Liu
, Zirui Yan
, Yipeng Zhou
, Di Wu
, Xu Chen
, Jessie Hui Wang
:
Optimizing Parameter Mixing Under Constrained Communications in Parallel Federated Learning. 2640-2652 - Ruijie Miao
, Yinda Zhang
, Zihao Zheng
, Ruixin Wang
, Ruwen Zhang
, Tong Yang
, Zaoxing Liu, Junchen Jiang:
CocoSketch: High-Performance Sketch-Based Measurement Over Arbitrary Partial Key Query. 2653-2668 - Kanatip Chitavisutthivong
, Sucha Supittayapornpong
, Pooria Namyar
, Mingyang Zhang, Minlan Yu
, Ramesh Govindan
:
Optimal Oblivious Routing With Concave Objectives for Structured Networks. 2669-2681 - Bhargav Ganguly
, Seyyedali Hosseinalipour
, Kwang Taik Kim
, Christopher G. Brinton
, Vaneet Aggarwal
, David J. Love
, Mung Chiang:
Multi-Edge Server-Assisted Dynamic Federated Learning With an Optimized Floating Aggregation Point. 2682-2697 - Jiaxiao Zheng
, Albert Banchs
, Gustavo de Veciana
:
Constrained Network Slicing Games: Achieving Service Guarantees and Network Efficiency. 2698-2713 - Qi Shao
, Man Hon Cheung
, Jianwei Huang
:
Crowdfunding With Cognitive Limitations. 2714-2729 - Chen Wang
, Qin Hu
, Dongxiao Yu
, Xiuzhen Cheng
:
Online Learning for Failure-Aware Edge Backup of Service Function Chains With the Minimum Latency. 2730-2744 - Dian Shen
, Junzhou Luo, Fang Dong
, Xiaolin Guo
, Ciyuan Chen
, Kai Wang
, John C. S. Lui
:
Enabling Distributed and Optimal RDMA Resource Sharing in Large-Scale Data Center Networks: Modeling, Analysis, and Implementation. 2745-2760 - Linh T. Hoang, Chuyen T. Nguyen
, Anh T. Pham
:
Deep Reinforcement Learning-Based Online Resource Management for UAV-Assisted Edge Computing With Dual Connectivity. 2761-2776 - Yangming Zhao
, Chunming Qiao
:
Distributed Transport Protocols for Quantum Data Networks. 2777-2792 - Ruixuan Li
, Xiaofeng Jia
, Zhenyong Zhang, Jun Shao
, Rongxing Lu
, Jingqiang Lin
, Xiaoqi Jia, Guiyi Wei
:
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy. 2793-2808 - Dong Yang
, Zongrong Cheng
, Weiting Zhang
, Hongke Zhang
, Xuemin Shen
:
Burst-Aware Time-Triggered Flow Scheduling With Enhanced Multi-CQF in Time-Sensitive Networks. 2809-2824 - Lailong Luo
, Pengtao Fu
, Shangsen Li
, Deke Guo, Qianzhen Zhang, Huaimin Wang:
Ark Filter: A General and Space-Efficient Sketch for Network Flow Analysis. 2825-2839 - Xiuqi Huang
, Yuanning Gao
, Xinyi Zhou
, Xiaofeng Gao
, Guihai Chen
:
An Adaptive Metadata Management Scheme Based on Deep Reinforcement Learning for Large-Scale Distributed File Systems. 2840-2853 - Zhibo Zhang
, Huiqiang Wang
, Hongwu Lv
, Jiayu Sun, Guodong Li, Xin Han:
CHAT: Accurate Network Latency Measurement for 5G E2E Networks. 2854-2869 - Peirui Cao
, Shizhen Zhao
, Dai Zhang
, Zhuotao Liu, Mingwei Xu
, Min Yee Teh
, Yunzhuo Liu, Xinbing Wang
, Chenghu Zhou:
Threshold-Based Routing-Topology Co-Design for Optical Data Center. 2870-2885 - Adeel Malik
, Berksan Serbetci
, Petros Elia
:
Coded Caching in Networks With Heterogeneous User Activity. 2886-2901 - Ehsan Mohammadpour
, Eleni Stai
, Jean-Yves Le Boudec
:
Improved Network-Calculus Nodal Delay-Bounds in Time-Sensitive Networks. 2902-2917 - Mohammad Moltafet
, Markus Leinonen
, Marian Codreanu
, Roy D. Yates
:
Status Update Control and Analysis Under Two-Way Delay. 2918-2933 - Zhengzhe Xiang
, Yuhang Zheng, Zengwei Zheng
, Shuiguang Deng
, Minyi Guo
, Schahram Dustdar
:
Cost-Effective Traffic Scheduling and Resource Allocation for Edge Service Provisioning. 2934-2949 - Shihao Shen
, Yiwen Han
, Xiaofei Wang
, Shiqiang Wang
, Victor C. M. Leung
:
Collaborative Learning-Based Scheduling for Kubernetes-Oriented Edge-Cloud Network. 2950-2964 - Siddhartha S. Borkotoky
, Michael B. Pursley
:
Analytical Techniques for Performance Evaluation of Fountain-Coded File Distribution in Packet Radio Networks. 2965-2977 - Jose A. Ayala-Romero
, Andres Garcia-Saavedra
, Xavier Pérez Costa
, George Iosifidis
:
EdgeBOL: A Bayesian Learning Approach for the Joint Orchestration of vRANs and Mobile Edge AI. 2978-2993 - Qingjun Xiao
, Yuexiao Cai
, Yunpeng Cao, Shigang Chen
:
Accurate and O(1)-Time Query of Per-Flow Cardinality in High-Speed Networks. 2994-3009 - Lei Deng
, Xiao-Yang Liu
, Haifeng Zheng
, Xinxin Feng
, Zhizhang Chen
:
Graph-Tensor Neural Networks for Network Traffic Data Imputation. 3010-3024 - Reshma Prasad
, Albert Sunny
:
Scheduling Slice Requests in 5G Networks. 3025-3036 - Paizhuo Chen
, Zhice Yang
:
Understanding PTP Performance in Today's Wi-Fi Networks. 3037-3050 - Balázs Vass
, Erika R. Bérczi-Kovács
, Ábel Barabás
, Zsombor L. Hajdú
, János Tapolcai
:
A Whirling Dervish: Polynomial-Time Algorithm for the Regional SRLG-Disjoint Paths Problem. 3051-3062 - Qianyu Zhang
, Gongming Zhao
, Liguang Xie
, Hongli Xu
, Zhuolong Yu, Yangming Zhao
, Chunming Qiao
, Liusheng Huang
, Ying Xiong:
Scalable and Robust East-West Forwarding Framework for Hyperscale Clouds. 3063-3079 - Miquel Ferriol Galmés
, Jordi Paillisse
, José Suárez-Varela
, Krzysztof Rusek
, Shihan Xiao, Xiang Shi
, Xiangle Cheng
, Pere Barlet-Ros, Albert Cabellos-Aparicio:
RouteNet-Fermi: Network Modeling With Graph Neural Networks. 3080-3095 - Itamar Cohen
, Carla-Fabiana Chiasserini
, Paolo Giaccone
, Gabriel Scalosub
:
Dynamic Service Provisioning in the Edge-Cloud Continuum With Bounded Resources. 3096-3111 - Xionglve Li
, Tongqing Zhou
, Zhiping Cai
, Jinshu Su
:
Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process. 3112-3127 - Jiangqi Hu
, Sabarish Krishna Moorthy
, Ankush Harindranath, Josh Zhaoxi Zhang, Zhiyuan Zhao, Nicholas Mastronarde
, Elizabeth Serena Bentley, Scott Pudlewski, Zhangyu Guan
:
A Mobility-Resilient Spectrum Sharing Framework for Operating Wireless UAVs in the 6 GHz Band. 3128-3142 - Bin Tang
, Hung Ngo, Yan Ma, Basil Alhakami:
DAO2: Overcoming Overall Storage Overflow in Intermittently Connected Sensor Networks. 3143-3158 - Yongjian Yang
, Kaihao Lou
, En Wang
, Wenbin Liu
, Jianwen Shang, Xueting Song, Dawei Li
, Jie Wu
:
Multi-Agent Reinforcement Learning Based File Caching Strategy in Mobile Edge Computing. 3159-3174 - Swaroop Gopalam
, Stephen V. Hanly
, Philip Whiting
:
Distributed Resource Allocation and Flow Control Algorithms for mmWave IAB Networks. 3175-3190 - Zhuochen Fan
, Zhoujing Hu
, Yuhan Wu
, Jiarui Guo
, Sha Wang, Wenrui Liu, Tong Yang
, Yaofeng Tu, Steve Uhlig:
PISketch: Finding Persistent and Infrequent Flows. 3191-3206 - Lu Tang, Qun Huang
, Patrick P. C. Lee
:
MVPipe: Enabling Lightweight Updates and Fast Convergence in Hierarchical Heavy Hitter Detection. 3207-3221 - Feng Li
, Xuyang Yuan, Lina Wang, Huan Yang
, Dongxiao Yu
, Weifeng Lyu, Xiuzhen Cheng
:
Collaborative Learning in General Graphs With Limited Memorization: Complexity, Learnability, and Reliability. 3222-3237 - Kai Liu
, Chunhui Liu
, Guozhi Yan
, Victor C. S. Lee
, Jiannong Cao
:
Accelerating DNN Inference With Reliability Guarantee in Vehicular Edge Computing. 3238-3253 - Xiaolong Wang
, Haipeng Yao
, Tianle Mai
, Song Guo
, Yun-Jie Liu:
Reinforcement Learning-Based Particle Swarm Optimization for End-to-End Traffic Scheduling in TSN-5G Networks. 3254-3268 - Elias Rohrer
, Florian Tschorsch
:
Kadcast-NG: A Structured Broadcast Protocol for Blockchain Networks. 3269-3283 - Huawei Huang
, Xiaowen Peng, Yue Lin
, Miaoyong Xu, Guang Ye
, Zibin Zheng
, Song Guo
:
Scheduling Most Valuable Committees for the Sharded Blockchain. 3284-3299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.