


default search action
IEEE/ACM Transactions on Networking, Volume 28
Volume 28, Number 1, February 2020
- Haipeng Dai

, Meng Li
, Alex X. Liu
, Jiaqi Zheng
, Guihai Chen
:
Finding Persistent Items in Distributed Datasets. 1-14 - Rajat Talak

, Sertac Karaman
, Eytan H. Modiano:
Optimizing Information Freshness in Wireless Networks Under General Interference Constraints. 15-28 - Giuseppe Enrico Santagati

, Neil Dave, Tommaso Melodia
:
Design and Performance Evaluation of an Implantable Ultrasonic Networking Platform for the Internet of Medical Things. 29-42 - Yan Qiao

, Jun Jiao, Xinhong Cui, Yuan Rao
:
Robust Loss Inference in the Presence of Noisy Measurements and Hidden Fault Diagnosis. 43-56 - Jia Zhao

, Jiangchuan Liu
, Haiyang Wang, Chi Xu
, Wei Gong
, Changqiao Xu
:
Measurement, Analysis, and Enhancement of Multipath TCP Energy Efficiency for Datacenters. 57-70 - Guocheng Liao

, Xu Chen
, Jianwei Huang
:
Prospect Theoretic Analysis of Privacy-Preserving Mechanism. 71-83 - Seokhyun Kim, Kimin Lee

, Yeonkeun Kim, Jinwoo Shin
, Seungwon Shin
, Song Chong:
Dynamic Control for On-Demand Interference-Managed WLAN Infrastructures. 84-97 - Danfeng Shan

, Fengyuan Ren, Peng Cheng
, Ran Shu, Chuanxiong Guo
:
Observing and Mitigating Micro-Burst Traffic in Data Center Networks. 98-111 - Lorenzo Saino

, Ioannis Psaras, Emilio Leonardi
, George Pavlou
:
Load Imbalance and Caching Performance of Sharded Systems. 112-125 - Xiulong Liu

, Sheng Chen, Jia Liu, Wenyu Qu
, Fengjun Xiao
, Alex X. Liu, Jiannong Cao, Jiangchuan Liu
:
Fast and Accurate Detection of Unknown Tags for RFID Systems - Hash Collisions are Desirable. 126-139 - Shuyi Chen

, Xiqing Liu, Tianyu Zhao, Hsiao-Hwa Chen
, Weixiao Meng
:
Performance Analysis of Joint Transmission Schemes in Ultra-Dense Networks - A Unified Approach. 154-167 - Miralem Mehic

, Peppino Fazio
, Stefan Rass
, Oliver Maurhart, Momtchil Peev
, Andreas Poppe, Jan Rozhon
, Marcin Niemiec
, Miroslav Voznák
:
A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks. 168-181 - Ashwin Ganesan

:
Performance Guarantees of Distributed Algorithms for QoS in Wireless Ad Hoc Networks. 182-195 - Zongqing Lu

, Kevin Chan
, Rahul Urgaonkar, Shiliang Pu, Thomas La Porta
:
NetVision: On-Demand Video Processing in Wireless Networks. 196-209 - Minh Pham

, Doan B. Hoang
, Zenon Chaczko
:
Congestion-Aware and Energy-Aware Virtual Network Embedding. 210-223 - Caixia Kou

, Dedong Hu, Jianhua Yuan
, Wenbao Ai:
Bisection and Exact Algorithms Based on the Lagrangian Dual for a Single-Constrained Shortest Path Problem. 224-233 - Xiong Wang

, Qi Deng
, Jing Ren, Mehdi Malboubi
, Sheng Wang, Shizhong Xu, Chen-Nee Chuah
:
The Joint Optimization of Online Traffic Matrix Measurement and Traffic Engineering For Software-Defined Networks. 234-247 - Yannis Thomas

, Merkourios Karaliopoulos
, George Xylomenos
, George C. Polyzos
:
Low Latency Friendliness for Multipath TCP. 248-261 - Sangeeta Bhattacharjee

, Tamaghna Acharya
, Uma Bhattacharya:
Energy-Efficient Multicasting in Hybrid Cognitive Small Cell Networks: A Cross-Layer Approach. 262-274 - Levente Csikor

, Márk Szalay
, Gábor Rétvári, Gergely Pongrácz
, Dimitrios P. Pezaros
, László Toka:
Transition to SDN is HARMLESS: Hybrid Architecture for Migrating Legacy Ethernet Switches to SDN. 275-288 - Alija Pasic

, Péter Babarczi
, János Tapolcai
, Erika R. Bérczi-Kovács, Zoltán Király
, Lajos Rónyai:
Minimum Cost Survivable Routing Algorithms for Generalized Diversity Coding. 289-300 - Xiuzhen Guo

, Yuan He
, Xiaolong Zheng
, Liangcheng Yu
, Omprakash Gnawali
:
ZigFi: Harnessing Channel State Information for Cross-Technology Communication. 301-311 - Ze Yang

, Kwan L. Yeung:
SDN Candidate Selection in Hybrid IP/SDN Networks for Single Link Failure Protection. 312-321 - Jiachen Xue, Muhammad Usama Chaudhry, Balajee Vamanan

, T. N. Vijaykumar, Mithuna Thottethodi
:
Dart: Divide and Specialize for Fast Response to Congestion in RDMA-Based Datacenter Networks. 322-335 - Bin Tang

, Xiaoliang Wang
, Cam-Tu Nguyen, Baoliu Ye
, Sanglu Lu:
Construction of Subexponential-Size Optical Priority Queues With Switches and Fiber Delay Lines. 336-346 - Amr Kamal Albanna, Homayoun Yousefi'zadeh

:
Congestion Minimization of LTE Networks: A Deep Learning Approach. 347-359 - Luoyi Fu

, Jiapeng Zhang
, Shuaiqi Wang
, Xinyu Wu, Xinbing Wang
, Guihai Chen
:
De-Anonymizing Social Networks With Overlapping Community Structure. 360-375 - Teng Liu

, Alhussein A. Abouzeid
, A. Agung Julius
:
Traffic Flow Control in Vehicular Multi-Hop Networks With Data Caching and Infrastructure Support. 376-386 - Takuro Fukunaga

:
Adaptive Algorithm for Finding Connected Dominating Sets in Uncertain Graphs. 387-398 - Fuad Shamieh

, Xianbin Wang
:
Steganographic-Based Header Size Reduction Technique for Multimedia Streams. 399-412 - Mahbubur Rahman

, Abusayeed Saifullah
:
Integrating Low-Power Wide-Area Networks for Enhanced Scalability and Extended Coverage. 413-426
Volume 28, Number 2, April 2020
- Qingjun Xiao

, Shigang Chen
, You Zhou, Junzhou Luo:
Estimating Cardinality for Arbitrarily Large Data Stream With Improved Memory Efficiency. 433-446 - Wei Dong

, Yi Gao
, Chenhong Cao
, Xiaoyu Zhang, Wenbin Wu:
Universal Path Tracing for Large-Scale Sensor Networks. 447-460 - Jona Beysens

, Qing Wang
, Ander Galisteo
, Domenico Giustiniano
, Sofie Pollin
:
A Cell-Free Networking System With Visible Light. 461-476 - Arjun Anand

, Gustavo de Veciana
, Sanjay Shakkottai
:
Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks. 477-490 - Alejandro Cohen

, Asaf Cohen
, Omer Gurewitz
:
Efficient Data Collection Over Multiple Access Wireless Sensors Network. 491-504 - Tingwei Liu

, John C. S. Lui
:
FAVE: A Fast and Efficient Network Flow AVailability Estimation Method With Bounded Relative Error. 505-518 - Mingjun Xiao

, Guoju Gao
, Jie Wu
, Sheng Zhang
, Liusheng Huang:
Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing. 519-532 - Matthew A. Clark

, Konstantinos Psounis
:
Optimizing Primary User Privacy in Spectrum Sharing Systems. 533-546 - Ge Wang

, Haofan Cai
, Chen Qian, Jinsong Han
, Shouqian Shi
, Xin Li
, Han Ding
, Wei Xi, Jizhong Zhao:
Hu-Fu: Replay-Resilient RFID Authentication. 547-560 - Martino Trevisan

, Danilo Giordano
, Idilio Drago
, Maurizio M. Munafò
, Marco Mellia
:
Five Years at the Edge: Watching Internet From the ISP Network. 561-574 - Yilong Hui

, Zhou Su
, Tom H. Luan
:
Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks. 575-587 - Novella Bartolini

, Ting He
, Viviana Arrigoni, Annalisa Massini
, Federico Trombetti
, Hana Khamfroush
:
On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography. 588-601 - Wei Wang

, Shiyue He
, Qian Zhang
, Tao Jiang
:
Enabling Low-Power OFDM for IoT by Exploiting Asymmetric Clock Rates. 602-611 - Yongrui Chen

, Shuai Wang, Zhijun Li
, Tian He
:
Reliable Physical-Layer Cross-Technology Communication With Emulation Error Correction. 612-624 - Georgios S. Paschos, Apostolos Destounis

, George Iosifidis
:
Online Convex Optimization for Caching Networks. 625-638 - Sameer G. Kulkarni

, Wei Zhang, Jinho Hwang
, Shriram Rajagopalan
, K. K. Ramakrishnan
, Timothy Wood
, Mayutan Arumaithurai, Xiaoming Fu
:
NFVnice: Dynamic Backpressure and Scheduling for NFV Service Chains. 639-652 - Wenjia Wei, Kaiping Xue

, Jiangping Han, David S. L. Wei, Peilin Hong
:
Shared Bottleneck-Based Congestion Control and Packet Scheduling for Multipath TCP. 653-666 - Sladana Josilo

, György Dán
:
Computation Offloading Scheduling for Periodic Tasks in Mobile Edge Computing. 667-680 - Yahui Sun

, Daniel Rehfeldt, Marcus Brazil, Doreen A. Thomas, Saman K. Halgamuge
:
A Physarum-Inspired Algorithm for Minimum-Cost Relay Node Placement in Wireless Sensor Networks. 681-694 - Sameer G. Kulkarni

, Guyue Liu, K. K. Ramakrishnan
, Mayutan Arumaithurai, Timothy Wood
, Xiaoming Fu
:
REINFORCE: Achieving Efficient Failure Resiliency for Network Function Virtualization-Based Services. 695-708 - Ajay Badita

, Parimal Parag
, Vaneet Aggarwal
:
Optimal Server Selection for Straggler Mitigation. 709-721 - Jaya Prakash Champati

, Hussein Al-Zubaidy
, James Gross
:
Transient Analysis for Multihop Wireless Networks Under Static Routing. 722-735 - Michael Lin, Novella Bartolini

, Michael Giallorenzo, Thomas F. La Porta
:
On Interference Aware Power Adjustment and Scheduling in Femtocell Networks. 736-749 - Sen Lin

, Junshan Zhang
, Lei Ying
:
Crowdsensing for Spectrum Discovery: A Waze-Inspired Design via Smartphone Sensing. 750-763 - Tingjun Chen

, Jelena Diakonikolas
, Javad Ghaderi
, Gil Zussman
:
Hybrid Scheduling in Heterogeneous Half- and Full-Duplex Wireless Networks. 764-777 - Hani Sami

, Azzam Mourad
, Wassim El-Hajj
:
Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services. 778-790 - Matthias Rost

, Stefan Schmid
:
On the Hardness and Inapproximability of Virtual Network Embeddings. 791-803 - Xijian Zhong

, Yan Guo
, Ning Li
, Yancheng Chen:
Joint Optimization of Relay Deployment, Channel Allocation, and Relay Assignment for UAVs-Aided D2D Networks. 804-817 - Ali Maatouk

, Mohamad Assaad
, Anthony Ephremides:
On the Age of Information in a CSMA Environment. 818-831 - Haibo Wang

, Jessie Hui Wang
, Jilong Wang
, Weizhen Dang, Jing'an Xue, Fenghua Li, Jinzhe Shan:
Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network. 832-845 - Tracy Yingying Cheng

, Xiaohua Jia
:
NAMP: Network-Aware Multipathing in Software-Defined Data Center Networks. 846-859 - Xiaomeng Yi

, Li Pan, Yanqi Jin, Fangming Liu
, Minghua Chen
:
eDirect: Energy-Efficient D2D-Assisted Relaying Framework for Cellular Signaling Reduction. 860-873 - Shuangke Wu, Yanjiao Chen

, Minghui Li, Xiangyang Luo
, Zhe Liu, Lan Liu:
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools. 874-887 - Weijun Wang

, Haipeng Dai
, Chao Dong
, Xiao Cheng
, Xiaoyu Wang
, Panlong Yang
, Guihai Chen
, Wanchun Dou:
Placement of Unmanned Aerial Vehicles for Directional Coverage in 3D Space. 888-901 - Shengxin Liu

, Carlee Joe-Wong
, Jiasi Chen
, Christopher G. Brinton
, Chee-Wei Tan
, Liang Zheng
:
Economic Viability of a Virtual ISP. 902-916 - Peng Zhang

, Hui Wu
, Dan Zhang
, Qi Li
:
Verifying Rule Enforcement in Software Defined Networks With REV. 917-929 - Yaniv Sadeh

, Ori Rottenstreich
, Arye Barkan, Yossi Kanizo, Haim Kaplan
:
Optimal Representations of a Traffic Distribution in Switch Memories. 930-943 - Yi Cao

, Darryl Veitch
:
Toward Trusted Time: Remote Server Vetting and the Misfiring Heart of Internet Timing. 944-956
Volume 28, Number 3, June 2020
- Kun Xie

, Yuxiang Chen, Xin Wang
, Gaogang Xie
, Jiannong Cao
, Jigang Wen:
Accurate and Fast Recovery of Network Monitoring Data: A GPU Accelerated Matrix Completion. 958-971 - Jie Wang

, Wenye Wang, Cliff Wang:
Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon. 972-985 - Gioacchino Tangari

, Marinos Charalambides
, Daphné Tuncer
, George Pavlou:
Accuracy-Aware Adaptive Traffic Monitoring for Software Dataplanes. 986-1001 - Yongce Chen

, Yan Huang
, Yi Shi
, Y. Thomas Hou
, Wenjing Lou
, Sastry Kompella
:
On DoF-Based Interference Cancellation Under General Channel Rank Conditions. 1002-1016 - Avinash Mohan

, Aditya Gopalan
, Anurag Kumar
:
Reduced-State, Optimal Scheduling for Decentralized Medium Access Control of a Class of Wireless Networks. 1017-1032 - Meng Li

, Haipeng Dai
, Xiaoyu Wang
, Rui Xia
, Alex X. Liu
, Guihai Chen
:
Thresholded Monitoring in Distributed Data Streams. 1033-1046 - Konstantinos Poularakis

, Jaime Llorca
, Antonia M. Tulino
, Ian J. Taylor
, Leandros Tassiulas
:
Service Placement and Request Routing in MEC Networks With Storage, Computation, and Communication Constraints. 1047-1060 - Ziyue Luo

, Chuan Wu
:
An Online Algorithm for VNF Service Chain Scaling in Datacenters. 1061-1073 - Juan Brenes

, Alberto García-Martínez
, Marcelo Bagnulo
, Andra Lutu
, Cristel Pelsser
:
Power Prefixes Prioritization for Smarter BGP Reconvergence. 1074-1087 - Vitalii Demianiuk

, Sergey I. Nikolenko
, Pavel Chuprikov
, Kirill Kogan
:
New Alternatives to Optimize Policy Classifiers. 1088-1101 - Bo Cheng

, Shoulu Hou
, Ming Wang
, Shuai Zhao, Junliang Chen:
HSOP: A Hybrid Service Orchestration Platform for Internet-Telephony Networks. 1102-1115 - Xiaofeng Cao

, Guoming Tang
, Deke Guo, Yan Li, Weiming Zhang:
Edge Federation: Towards an Integrated Service Provisioning Model. 1116-1129 - Milad Mahdian, Armin Moharrer

, Stratis Ioannidis
, Edmund Yeh
:
Kelly Cache Networks. 1130-1143 - Ning Xie

, Shengli Zhang
, Alex X. Liu
:
Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems. 1144-1157 - Ramon Fernandes

, César A. M. Marcon
, Rodrigo Cataldo
, Johanna Sepúlveda
:
Using Smart Routing for Secure and Dependable NoC-Based MPSoCs. 1158-1171 - Ran Ben Basat

, Xiaoqi Chen
, Gil Einziger, Ori Rottenstreich
:
Designing Heavy-Hitter Detection Algorithms for Programmable Switches. 1172-1185 - Shay Vargaftik

, Isaac Keslassy
, Ariel Orda
:
LSQ: Load Balancing in Large-Scale Heterogeneous Systems With Multiple Dispatchers. 1186-1198 - Ali Yekkehkhany

, Rakesh Nagi
:
Blind GB-PANDAS: A Blind Throughput-Optimal Load Balancing Algorithm for Affinity Scheduling. 1199-1212 - Alia Asheralieva

, Dusit Niyato
:
Combining Contract Theory and Lyapunov Optimization for Content Sharing With Edge Caching and Device-to-Device Communications. 1213-1226 - Yongmin Zhang

, Xiaolong Lan
, Ju Ren
, Lin Cai
:
Efficient Computing Resource Sharing for Mobile Edge-Cloud Computing Networks. 1227-1240 - Qingyu Liu

, Lei Deng
, Haibo Zeng
, Minghua Chen
:
A Tale of Two Metrics in Network Delay Optimization. 1241-1254 - Fangxin Wang

, Cong Zhang
, Feng Wang
, Jiangchuan Liu
, Yifei Zhu
, Haitian Pang
, Lifeng Sun
:
DeepCast: Towards Personalized QoE for Edge-Assisted Crowdcast With Deep Reinforcement Learning. 1255-1268 - Kai Ding

, Homayoun Yousefi'zadeh
, Faryar Jabbari
:
Connectivity Maintenance in Mobile Networks. 1269-1282 - Damiano Carra

, Giovanni Neglia
, Pietro Michiardi
:
Elastic Provisioning of Cloud Caches: A Cost-Aware TTL Approach. 1283-1296 - Youlin Zhang

, Shigang Chen
, You Zhou, Yuguang Fang
:
Missing-Tag Detection With Unknown Tags. 1297-1310 - Francesca Fossati

, Stefano Moretti
, Patrice Perny, Stefano Secci
:
Multi-Resource Allocation for Network Slicing. 1311-1324 - Jing Fu

, Bill Moran
:
Energy-Efficient Job-Assignment Policy With Asymptotically Guaranteed Performance Deviation. 1325-1338 - Xiaocan Li

, Kun Xie
, Xin Wang
, Gaogang Xie
, Dongliang Xie
, Zhenyu Li
, Jigang Wen, Zulong Diao, Tian Wang
:
Quick and Accurate False Data Detection in Mobile Crowd Sensing. 1339-1352 - Attila Korösi, András Gulyás

, Zalán Heszberger
, József Bíró, Gábor Rétvári:
On the Memory Requirement of Hop-by-Hop Routing: Tight Bounds and Optimal Address Spaces. 1353-1363 - Yang Li

, Jianwei Zheng
, Zhenhua Li
, Yunhao Liu, Feng Qian, Sen Bai, Yao Liu
, Xianlong Xin:
Understanding the Ecosystem and Addressing the Fundamental Concerns of Commercial MVNO. 1364-1377 - Ning Xie

, Le Ou-Yang
, Alex X. Liu
:
Spectrum Sharing in mmWave Cellular Networks Using Clustering Algorithms. 1378-1390 - Jiao Zhang

, Shubo Wen
, Jinsheng Zhang, Hua Chai
, Tian Pan
, Tao Huang
, Linquan Zhang, Yunjie Liu, F. Richard Yu
:
Fast Switch-Based Load Balancer Considering Application Server States. 1391-1404 - Pavlos Athanasios Apostolopoulos

, Eirini-Eleni Tsiropoulou
, Symeon Papavassiliou
:
Risk-Aware Data Offloading in Multi-Server Multi-Access Edge Computing Environment. 1405-1418 - Shang Gao

, Zhe Peng
, Bin Xiao
, Aiqun Hu
, Yubo Song
, Kui Ren:
Detection and Mitigation of DoS Attacks in Software Defined Networks. 1419-1433
Volume 28, Number 4, August 2020
- Mohammad Hassan Lotfi

, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? 1435-1448 - Ankur Sarker

, Chenxi Qiu
, Haiying Shen
:
Connectivity Maintenance for Next-Generation Decentralized Vehicle Platoon Networks. 1449-1462 - He Huang

, Yu-E Sun
, Chaoyi Ma
, Shigang Chen
, You Zhou, Wenjian Yang, Shaojie Tang, Hongli Xu
, Yan Qiao:
An Efficient K-Persistent Spread Estimator for Traffic Measurement in High-Speed Networks. 1463-1476 - Yilei Lin

, Ting He
, Shiqiang Wang
, Kevin Chan
, Stephen Pasteris:
Looking Glass of NFV: Inferring the Structure and State of NFV Network From External Observations. 1477-1490 - Zhangyu Guan

, Nan Cen
, Tommaso Melodia
, Scott M. Pudlewski
:
Distributed Joint Power, Association and Flight Control for Massive-MIMO Self-Organizing Flying Drones. 1491-1505 - Sudeep Bhattarai

, Jung-Min Park
, William H. Lehr
:
Dynamic Exclusion Zones for Protecting Primary Users in Database-Driven Spectrum Sharing. 1506-1519 - Reza Banirazi

, Edmond A. Jonckheere
, Bhaskar Krishnamachari
:
Heat-Diffusion: Pareto Optimal Dynamic Routing for Time-Varying Wireless Networks. 1520-1533 - Anfu Zhou

, Shaoqing Xu, Song Wang, Jingqi Huang
, Shaoyuan Yang, Teng Wei, Xinyu Zhang
, Huadong Ma
:
Robotic Millimeter-Wave Wireless Networks. 1534-1549 - Wojciech Kabacinski

, Mustafa Abdulsahib:
Wide-Sense Nonblocking Converting-Space-Converting Switching Node Architecture Under XsVarSWITCH Control Algorithm. 1550-1561 - Zengfu Wang

, Qing Wang
, Bill Moran
, Moshe Zukerman
:
Optimal Submarine Cable Path Planning and Trunk-and-Branch Tree Network Topology Design. 1562-1572 - Ying Tian

, Zhiliang Wang
, Xia Yin, Xingang Shi
, Yingya Guo
, Haijun Geng, Jiahai Yang
:
Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning. 1573-1586 - Chenglong Shao

, Hoorin Park
, Heejun Roh
, Wonjun Lee
, Hyoil Kim
:
PolarScout: Wi-Fi Interference-Resilient ZigBee Communication via Shell-Shaping. 1587-1600 - Kun Xie

, Yuxiang Chen, Xin Wang
, Gaogang Xie
, Jiannong Cao
, Jigang Wen, Guangming Yang, Jiaqi Sun:
Accurate and Fast Recovery of Network Monitoring Data With GPU-Accelerated Tensor Completion. 1601-1614 - Vignesh Sivaraman

, Dibyajyoti Guha
, Biplab Sikdar
:
Optimal Pending Interest Table Size for ICN With Mobile Producers. 1615-1628 - Zhe Wang

, Yifeng Cao, Linghe Kong
, Guihai Chen
, Jiadi Yu
, Shaojie Tang
, Yingying Chen
:
Reference Waveforms Forward Concurrent Transmissions in ZigBee Communications. 1629-1642 - Yixin Li

, Bin Cao
, Mugen Peng
, Long Zhang
, Lei Zhang
, Daquan Feng, Jihong Yu
:
Direct Acyclic Graph-Based Ledger for Internet of Things: Performance and Security Analysis. 1643-1656 - Konstantinos Konstantinidis

, Aditya Ramamoorthy
:
Resolvable Designs for Speeding Up Distributed Computing. 1657-1670 - Guocheng Liao

, Xu Chen
, Jianwei Huang
:
Social-Aware Privacy-Preserving Mechanism for Correlated Data. 1671-1683 - Sheng Zhang

, Yu Liang, Jidong Ge
, Mingjun Xiao
, Jie Wu
:
Provably Efficient Resource Allocation for Edge Service Entities Using Hermes. 1684-1697 - Kevin Spiteri

, Rahul Urgaonkar, Ramesh K. Sitaraman
:
BOLA: Near-Optimal Bitrate Adaptation for Online Videos. 1698-1711 - Yue Cao

, Ahmed Osama Fathy Atya
, Shailendra Singh
, Zhiyun Qian
, Srikanth V. Krishnamurthy
, Thomas F. La Porta
, Prashant Krishnamurthy, Lisa M. Marvel:
Packet Header Obfuscation Using MIMO. 1712-1725 - Huynh Tu Dang, Pietro Bressana

, Han Wang
, Ki Suh Lee
, Noa Zilberman
, Hakim Weatherspoon, Marco Canini
, Fernando Pedone
, Robert Soulé
:
P4xos: Consensus as a Network Service. 1726-1738 - Rahul Vaze

, Jayakrishnan Nair
:
Multiple Server SRPT With Speed Scaling Is Competitive. 1739-1751 - Songtao Wang

, Dan Li, Yang Cheng, Jinkun Geng
, Yanshu Wang, Shuai Wang, Shutao Xia
, Jianping Wu:
A Scalable, High-Performance, and Fault-Tolerant Network Architecture for Distributed Machine Learning. 1752-1764 - Rajat Talak

, Sertac Karaman
, Eytan H. Modiano:
Improving Age of Information in Wireless Networks With Perfect Channel State Information. 1765-1778 - Sarhad Arisdakessian, Omar Abdel Wahab, Azzam Mourad

, Hadi Otrok
, Nadjia Kara:
FoGMatch: An Intelligent Multi-Criteria IoT-Fog Scheduling Approach Using Game Theory. 1779-1789 - Yidan Hu

, Rui Zhang
:
A Spatiotemporal Approach for Secure Crowdsourced Radio Environment Map Construction. 1790-1803 - Zhenlin An

, Qiongzheng Lin, Lei Yang
, Wei Lou
, Lei Xie
:
Acquiring Bloom Filters Across Commercial RFIDs in Physical Layer. 1804-1817 - Pedram Kheirkhah Sangdeh

, Hossein Pirayesh
, Adnan Quadri
, Huacheng Zeng
:
A Practical Spectrum Sharing Scheme for Cognitive Radio Networks: Design and Experiments. 1818-1831 - Yuqi Fan

, Wenlong Liu, Dan Guo
, Weili Wu, Ding-Zhu Du:
Shuffle Scheduling for MapReduce Jobs Based on Periodic Network Status. 1832-1844 - Lijia Deng, Wenzheng Xu

, Weifa Liang
, Jian Peng, Yingjie Zhou
, Lei Duan
, Sajal K. Das
:
Approximation Algorithms for the Min-Max Cycle Cover Problem With Neighborhoods. 1845-1858 - Cuiying Feng

, Luning Wang, Kui Wu
, Jianping Wang
:
Bound Inference in Network Performance Tomography With Additive Metrics. 1859-1871 - Garegin Grigoryan

, Yaoqing Liu
, Minseok Kwon
:
PFCA: A Programmable FIB Caching Architecture. 1872-1884 - Shie-Yuan Wang

, Hsien-Wen Hu
, Yi-Bing Lin
:
Design and Implementation of TCP-Friendly Meters in P4 Switches. 1885-1898 - Peng-Yong Kong

:
Routing in Communication Networks With Interdependent Power Grid. 1899-1911
Volume 28, Number 5, October 2020
- Alireza Ameli Renani

, Jun Huang
, Guoliang Xing, Abdol-Hossein Esfahanian
, Weiguo Wu:
Harnessing Hardware Defects for Improving Wireless Link Performance. 1913-1924 - Ruomu Hou

, Irvan Jahja
, Loi Luu, Prateek Saxena, Haifeng Yu:
Randomized View Reconciliation in Permissionless Distributed Systems. 1925-1938 - Dheeraj Narasimha

, Srinivas Shakkottai
, Lei Ying
:
A Mean Field Game Analysis of Distributed MAC in Ultra-Dense Multichannel Wireless Networks. 1939-1952 - Mohammed Hawari

, Juan Antonio Cordero Fuertes, Thomas H. Clausen
:
High-Accuracy Packet Pacing on Commodity Servers for Constant-Rate Flows. 1953-1967 - Nai-Wen Chang

, Sun-Yuan Hsieh
:
Conditional Diagnosability of Alternating Group Networks Under the PMC Model. 1968-1980 - Fardin Derogarian

, João Canas Ferreira
, Vítor M. Grade Tavares
, José Machado da Silva
, Fernando J. Velez
:
A Multifunctional Integrated Circuit Router for Body Area Network Wearable Systems. 1981-1994 - Ye Li

, Hong Xie
, John C. S. Lui
, Kenneth L. Calvert:
Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models. 1995-2008 - Hao Li

, Zhengda Bian
, Peng Zhang
, Zhun Sun, Chengchen Hu, Qiang Fu
, Tian Pan
, Jia Lv:
Application-Oblivious L7 Parsing Using Recurrent Neural Networks. 2009-2022 - Jia Liu

, Shigang Chen
, Min Chen
, Qingjun Xiao, Lijun Chen
:
Pose Sensing With a Single RFID Tag. 2023-2036 - Haojun Huang

, Wang Miao
, Geyong Min
, Chengqiang Huang
, Xu Zhang
, Chen Wang
:
Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks. 2037-2050 - Zina Chkirbene

, Rachid Hadjidj, Sebti Foufou, Ridha Hamila
:
LaScaDa: A Novel Scalable Topology for Data Center Network. 2051-2064 - Sara El Alaoui

, Byrav Ramamurthy
:
MARS: A Multi-Attribute Routing and Scheduling Algorithm for DTN Interplanetary Networks. 2065-2076 - Nurullah Karakoç

, Anna Scaglione
, Angelia Nedic
, Martin Reisslein
:
Multi-Layer Decomposition of Network Utility Maximization Problems. 2077-2091 - Yutong Zhai

, Hongli Xu
, Haibo Wang
, Zeyu Meng, He Huang
:
Joint Routing and Sketch Configuration in Software-Defined Networking. 2092-2105 - Conor Sexton

, Nicola Marchetti
, Luiz A. DaSilva:
On Provisioning Slices and Overbooking Resources in Service Tailored Networks of the Future. 2106-2119 - Si Chen

, Wei Gong
, Jia Zhao
, Jiangchuan Liu
:
High-Throughput and Robust Rate Adaptation for Backscatter Networks. 2120-2131 - Qingyu Liu

, Haibo Zeng
, Minghua Chen
:
Network Utility Maximization Under Maximum Delay Constraints and Throughput Requirements. 2132-2145 - Hooshang Ghasemi

, Aditya Ramamoorthy
:
Asynchronous Coded Caching With Uncoded Prefetching. 2146-2159 - Jian Su

, Alex X. Liu
, Zhengguo Sheng
, Yongrui Chen
:
A Partitioning Approach to RFID Identification. 2160-2173 - Youlin Zhang

, Shigang Chen
, You Zhou, Olufemi O. Odegbile, Yuguang Fang
:
Efficient Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets With Unreliable Channels. 2174-2187 - Dingwen Yuan

, Hsuan-Yin Lin
, Jörg Widmer
, Matthias Hollick
:
Optimal and Approximation Algorithms for Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. 2188-2202 - Francesco Devoti

, Ilario Filippini
:
Planning mm-Wave Access Networks Under Obstacle Blockages: A Reliability-Aware Approach. 2203-2214 - Ali Maatouk

, Saad Kriouile, Mohamad Assaad
, Anthony Ephremides
:
The Age of Incorrect Information: A New Performance Metric for Status Updates. 2215-2228 - David A. Hayes

, Michael Welzl
, Simone Ferlin
, David Ros
, Safiqul Islam
:
Online Identification of Groups of Flows Sharing a Network Bottleneck. 2229-2242 - Huanle Xu

, Yang Liu, Wing Cheong Lau
, Tiantong Zeng, Jun Guo
, Alex X. Liu
:
Online Resource Allocation With Machine Variability: A Bandit Perspective. 2243-2256 - Ziling Wei

, Jinshu Su
, Baokang Zhao
, Xicheng Lu:
Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting. 2257-2270 - Jaeyoung Choi

, Sangwoo Moon, Jiin Woo, Kyunghwan Son, Jinwoo Shin
, Yung Yi
:
Information Source Finding in Networks: Querying With Budgets. 2271-2284 - Peter B. Key

, Richard Steinberg
:
Pricing, Competition and Content for Internet Service Providers. 2285-2298 - Cheng Chen

, Randall A. Berry
, Michael L. Honig, Vijay G. Subramanian
:
Pricing, Bandwidth Allocation, and Service Competition in Heterogeneous Wireless Networks. 2299-2308 - Ning Xie

, Le Ou-Yang
, Alex X. Liu
:
A Machine Learning Approach to Blind Multi-Path Classification for Massive MIMO Systems. 2309-2322 - Hang Guo

, John S. Heidemann:
Detecting IoT Devices in the Internet. 2323-2336 - Kirill Kogan

, Danushka Menikkumbura
, Gustavo Petri, Youngtae Noh
, Sergey I. Nikolenko
, Alexander Sirotkin, Patrick Eugster
:
Towards Software-Defined Buffer Management. 2337-2349 - Lu Tang

, Qun Huang
, Patrick P. C. Lee
:
A Fast and Compact Invertible Sketch for Network-Wide Heavy Flow Detection. 2350-2363 - Tao Zhang

, Jiawei Huang
, Kai Chen
, Jianxin Wang
, Jianer Chen, Yi Pan
, Geyong Min
:
Rethinking Fast and Friendly Transport in Data Center Networks. 2364-2377 - Can Wang, Sheng Zhang

, Zhuzhong Qian
, Mingjun Xiao
, Jie Wu
, Baoliu Ye
, Sanglu Lu:
Joint Server Assignment and Resource Management for Edge-Based MAR System. 2378-2391
Volume 28, Number 6, December 2020
- Quang-Trung Luu

, Sylvaine Kerboeuf
, Alexandre Mouradian, Michel Kieffer
:
A Coverage-Aware Resource Provisioning Method for Network Slicing. 2393-2406 - Stefano Coniglio

, Luca Giovanni Gianoli
, Edoardo Amaldi, Antonio Capone
:
Elastic Traffic Engineering Subject to a Fair Bandwidth Allocation via Bilevel Programming. 2407-2420 - János Tapolcai

, Lajos Rónyai, Balázs Vass
, László Gyimóthi:
Fast Enumeration of Regional Link Failures Caused by Disasters With Limited Size. 2421-2434 - Ali Munir

, Ting He
, Ramya Raghavendra, Franck Le, Alex X. Liu
:
Network Scheduling and Compute Resource Aware Task Placement in Datacenters. 2435-2448 - Xiuzhen Guo

, Yuan He
, Xiaolong Zheng
:
WiZig: Cross-Technology Energy Communication Over a Noisy Channel. 2449-2460 - Guocong Quan

, Jian Tan, Atilla Eryilmaz
:
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels. 2461-2474 - Jingxuan Zhang

, Kai Gao
, Yang Richard Yang
, Jun Bi
:
Prophet: Toward Fast, Error-Tolerant Model-Based Throughput Prediction for Reactive Flows in DC Networks. 2475-2488 - Yuxuan Jiang

, Mohammad Shahrad
, David Wentzlaff, Danny H. K. Tsang
, Carlee Joe-Wong
:
Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue Maximization. 2489-2502 - Hao Zhou

, Xiaofeng Gao
, Jiaqi Zheng
, Guihai Chen
:
Scheduling Relaxed Loop-Free Updates Within Tight Lower Bounds in SDNs. 2503-2516 - Thomas Stahlbuhk

, Brooke Shrader, Eytan H. Modiano:
Throughput Maximization in Uncooperative Spectrum Sharing Networks. 2517-2530 - Zhanzhan Zhang, Yin Sun

, Ashutosh Sabharwal
, Zhiyong Chen
, Bin Xia
:
Scheduling and Power Allocation Dampens the Negative Effect of Channel Misreporting in Massive MIMO. 2531-2544 - Zhiwei Zhao

, Geyong Min
, Wei Dong
, Xue Liu
, Weifeng Gao
, Tao Gu
, Minghang Yang:
Exploiting Link Diversity for Performance-Aware and Repeatable Simulation in Low-Power Wireless Networks. 2545-2558 - Ali Mohammadkhan

, K. K. Ramakrishnan
, Vivek A. Jain:
CleanG - Improving the Architecture and Protocols for Future Cellular Networks With NFV. 2559-2572 - Xianjin Xia

, Yuanqing Zheng
, Tao Gu
:
FTrack: Parallel Decoding for LoRa Transmissions. 2573-2586 - Muhammad Shahbaz

, Lalith Suresh, Jennifer Rexford
, Nick Feamster, Ori Rottenstreich
, Mukesh Hira:
Elmo: Source Routed Multicast for Public Clouds. 2587-2600 - Mark Shifrin

, Daniel S. Menasché
, Asaf Cohen
, Dennis Goeckel
, Omer Gurewitz
:
Optimal PHY Configuration in Wireless Networks. 2601-2614 - Jinyong Chang

, Yanyan Ji
, Bilin Shao
, Maozhi Xu, Rui Xue
:
Certificateless Homomorphic Signature Scheme for Network Coding. 2615-2628 - Jinlong E

, Yong Cui
, Zhenhua Li
, Mingkang Ruan
, Ennan Zhai
:
HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting. 2629-2642 - Lingnan Gao

, George N. Rouskas
:
Congestion Minimization for Service Chain Routing Problems With Path Length Considerations. 2643-2656 - Sicheng Zhao, Xing Wu, Zuqing Zhu

:
On Parallel and Hitless vSDN Reconfiguration. 2657-2670 - Fehmina Malik

, Manjesh Kumar Hanawal
, Yezekael Hayel
:
Zero-Rating of Content and Its Effect on the Quality of Service in the Internet. 2671-2684 - Kemi Ding

, Junshan Zhang
:
Multi-Party Privacy Conflict Management in Online Social Networks: A Network Game Perspective. 2685-2698 - Tong Ye

, Jingjie Ding, Tony Tong Lee, Guido Maier:
AWG-Based Nonblocking Shuffle-Exchange Networks. 2699-2712 - Huazhe Wang

, Xin Li
, Yang Wang
, Yu Zhao, Ye Yu
, Hongkun Yang
, Chen Qian:
SICS: Secure and Dynamic Middlebox Outsourcing. 2713-2726 - Juhyeng Han

, Seong-Min Kim
, Daeyang Cho, Byungkwon Choi, Jaehyeong Ha, Dongsu Han
:
A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols. 2727-2740 - Hui Xia

, Rui Zhang
, Xiangguo Cheng
, Tie Qiu
, Dapeng Oliver Wu
:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. 2741-2754 - Boyuan Yan

, Yongli Zhao
, Xiaosong Yu
, Yajie Li
, Sabidur Rahman
, Yongqi He, Xiangjun Xin
, Jie Zhang:
Service Function Path Provisioning With Topology Aggregation in Multi-Domain Optical Networks. 2755-2767 - Yiming Zhang

, Haonan Wang, Menghan Jia
, Jinyan Wang, Dong Sheng Li, Guangtao Xue, Kian-Lee Tan
:
TopoX: Topology Refactorization for Minimizing Network Communication in Graph Computations. 2768-2782 - Xi Huang

, Simeng Bian, Ziyu Shao
, Hong Xu
:
Predictive Switch-Controller Association and Control Devolution for SDN Systems. 2783-2796 - Lei Deng

, Haifeng Zheng
, Xiao-Yang Liu
, Xinxin Feng
, Zhizhang (David) Chen
:
Network Latency Estimation With Leverage Sampling for Personal Devices: An Adaptive Tensor Completion Approach. 2797-2808 - Ammar Hawbani

, Xingfu Wang
, Liang Zhao
, Ahmed Al-Dubai
, Geyong Min
, Omar Busaileh
:
Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks. 2809-2822 - Xin Wang

, Richard T. B. Ma
:
On the Tussle Between Over-the-Top and Internet Service Providers: Analysis of the Netflix- Comcast Type of Deals. 2823-2835 - Alihan Hüyük

, Cem Tekin
:
Thompson Sampling for Combinatorial Network Optimization in Unknown Environments. 2836-2849

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














