


default search action
IEEE/ACM Transactions on Networking, Volume 30
Volume 30, Number 1, February 2022
- Kuan-yin Chen
, Sen Liu
, Yang Xu
, Ishant Kumar Siddhrau, Siyu Zhou, Zehua Guo
, H. Jonathan Chao
:
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane. 1-17 - Archana Bura
, Desik Rengarajan
, Dileep Kalathil
, Srinivas Shakkottai
, Jean-François Chamberland
:
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms. 18-31 - Rajarshi Bhattacharyya
, Archana Bura
, Desik Rengarajan
, Mason Rumuly, Bainan Xia
, Srinivas Shakkottai
, Dileep Kalathil
, Ricky K. P. Mok, Amogh Dhamdhere:
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge. 32-46 - Yi Ding
, Ling Liu, Yu Yang
, Yunhuai Liu, Desheng Zhang, Tian He:
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild. 47-61 - Vahid Khalilpour Akram
, Orhan Dagdeviren
, Bülent Tavli
:
A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks. 62-75 - Jeman Park
, Rhongho Jang
, Manar Mohaisen, David Mohaisen
:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. 76-89 - Xilai Liu
, Yan Xu
, Peng Liu
, Tong Yang
, Jiaqi Xu
, Lun Wang
, Gaogang Xie, Xiaoming Li, Steve Uhlig
:
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges. 90-106 - Arani Bhattacharya
, Caitao Zhan
, Abhishek Maji, Himanshu Gupta, Samir R. Das
, Petar M. Djuric
:
Selection of Sensors for Efficient Transmitter Localization. 107-119 - Bangbang Ren, Deke Guo
, Yali Yuan, Guoming Tang
, Weijun Wang, Xiaoming Fu
:
Optimal Deployment of SRv6 to Enable Network Interconnection Service. 120-133 - Yu Zhang
, Tao Gu
, Xi Zhang
:
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing. 134-147 - Amirhossein Reisizadeh
, Saurav Prakash
, Ramtin Pedarsani
, Amir Salman Avestimehr:
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning. 148-161 - Umut Can Çabuk
, Mustafa Tosun
, Orhan Dagdeviren
:
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks. 162-175 - Zhiguo Shi
, Guang Yang
, Xiaowen Gong
, Shibo He
, Jiming Chen
:
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing. 176-189 - Xin Liu
, Lei Ying
:
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime. 190-201 - Muhammad Saad
, Victor Cook
, Lan N. Nguyen
, My T. Thai
, David Mohaisen
:
Exploring Partitioning Attacks on the Bitcoin Network. 202-214 - Xiaoxi Zhang
, Jianyu Wang
, Li-Feng Lee, Tom Yang, Akansha Kalra, Gauri Joshi
, Carlee Joe-Wong
:
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs. 215-228 - Cho-Hsin Tsai
, Chih-Chun Wang
:
Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination With Random Two-Way Delay. 229-242 - Xu Li, Feilong Tang
, Yanmin Zhu
, Luoyi Fu, Jiadi Yu
, Long Chen
, Jiacheng Liu
:
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs. 243-256 - Chong Li
, Sisu Xi, Chenyang Lu
, Roch Guérin
, Christopher D. Gill:
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen. 257-270 - Yuchong Hu
, Xiaoyang Zhang, Patrick P. C. Lee
, Pan Zhou
:
NCScale: Toward Optimal Storage Scaling via Network Coding. 271-284 - Sheng Zhang
, Can Wang, Yibo Jin
, Jie Wu
, Zhuzhong Qian
, Mingjun Xiao
, Sanglu Lu:
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics. 285-298 - Chaoyi Ma
, Shigang Chen
, Youlin Zhang
, Qingjun Xiao, Olufemi O. Odegbile:
Super Spreader Identification Using Geometric-Min Filter. 299-312 - Junjie Xie
, Chen Qian, Deke Guo
, Minmei Wang
, Ge Wang
, Honghui Chen:
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems. 313-326 - Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. 327-340 - Tim Hellemans
, Benny Van Houdt
:
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting. 341-353 - Tom Barbette
, Erfan Wu, Dejan Kostic
, Gerald Q. Maguire Jr.
, Panagiotis Papadimitratos
, Marco Chiesa
:
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency. 354-367 - Ning Chen
, Tie Qiu
, Zilong Lu, Dapeng Oliver Wu
:
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things. 368-381 - Reuven Cohen
, Matty Kadosh, Alan Lo
, Qasem Sayah:
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless. 382-393 - Xiaobo Ma
, Jian Qu, Jianfeng Li, John C. S. Lui
, Zhenhua Li
, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. 394-408 - Xuewei Feng
, Qi Li
, Kun Sun
, Chuanpu Fu
, Ke Xu
:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. 409-422 - Lizhao You
, Jiahua Zhang
, Yili Jin, Hao Tang, Xiao Li:
Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks. 423-436 - Tal Shapira
, Yuval Shavitt
:
SASA: Source-Aware Self-Attention for IP Hijack Detection. 437-449 - Mehrnoosh Shafiee
, Javad Ghaderi
:
Scheduling Coflows With Dependency Graph. 450-463 - Prakirt Raj Jhunjhunwala
, Siva Theja Maguluri
:
Low-Complexity Switch Scheduling Algorithms: Delay Optimality in Heavy Traffic. 464-473
Volume 30, Number 2, April 2022
- Giovanni Neglia
, Michele Garetto
, Emilio Leonardi
:
Similarity Caching: Theory and Algorithms. 475-486 - Jianhan Song
, Gustavo de Veciana, Sanjay Shakkottai
:
Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback. 487-500 - Cuiying Feng
, Jianwei An, Kui Wu
, Jianping Wang
:
Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography. 501-514 - Dapeng Qu
, Guoxin Lv, Shijun Qu, Haiying Shen
, Yue Yang, Zhaoyang Heng:
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN. 515-528 - Zhuo Li
, Jindian Liu
, Liu Yan
, Beichuan Zhang, Peng Luo, Kaihua Liu
:
Smart Name Lookup for NDN Forwarding Plane via Neural Networks. 529-541 - Shuihai Hu
, Gaoxiong Zeng
, Wei Bai, Zilong Wang
, Baochen Qiao, Kai Chen
, Kun Tan, Yi Wang
:
Aeolus: A Building Block for Proactive Transport in Datacenter Networks. 542-556 - Yu Sun, Chi Lin
, Haipeng Dai
, Pengfei Wang
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs. 557-571 - Shuai Wang, Jinkun Geng
, Dan Li:
Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology. 572-585 - Yuanpeng Li
, Xiang Yu
, Yilong Yang
, Yang Zhou
, Tong Yang
, Zhuo Ma
, Shigang Chen
:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. 586-600 - Yan Huang
, Shaoran Li
, Y. Thomas Hou
, Wenjing Lou
:
GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR. 601-615 - Leonardo Lanante
, Sumit Roy
:
Performance Analysis of the IEEE 802.11ax OBSS_PD-Based Spatial Reuse. 616-628 - Penghao Sun
, Zehua Guo
, Junfei Li, Yang Xu
, Julong Lan, Yuxiang Hu:
Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes. 629-640 - Xiuzhen Guo
, Longfei Shangguan, Yuan He
, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, Yunhao Liu:
Efficient Ambient LoRa Backscatter With On-Off Keying Modulation. 641-654 - Jorge Martín-Pérez
, Francesco Malandrino
, Carla-Fabiana Chiasserini
, Milan Groshev
, Carlos J. Bernardos
:
KPI Guarantees in Network Slicing. 655-668 - Bahman Abolhassani
, John Tadrous, Atilla Eryilmaz
:
Single vs Distributed Edge Caching for Dynamic Content. 669-682 - Sergi Rene, Onur Ascigil
, Ioannis Psaras, George Pavlou
:
A Congestion Control Framework Based on In-Network Resource Pooling. 683-697 - Yuchen Liu
, Yubing Jian
, Raghupathy Sivakumar, Douglas M. Blough
:
Maximizing Line-of-Sight Coverage for mmWave Wireless LANs With Multiple Access Points. 698-716 - Hankun Cao
, Qifa Yan
, Xiaohu Tang
, Guojun Han
:
Adaptive Gradient Coding. 717-734 - Pan Lai
, Rui Fan, Xiao Zhang
, Wei Zhang
, Fang Liu, Joey Tianyi Zhou
:
Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems. 735-748 - Bingyu Li
, Jingqiang Lin
, Fengjun Li
, Qiongxiao Wang, Wei Wang
, Qi Li
, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. 749-765 - Ingo van Duijn, Peter Gjøl Jensen
, Jesper Stenbjerg Jensen, Troels Beck Krøgh, Jonas Sand Madsen, Stefan Schmid
, Jirí Srba
, Marc Tom Thorgersen:
Automata-Theoretic Approach to Verification of MPLS Networks Under Link Failures. 766-781 - Sabarish Krishna Moorthy
, Maxwell McManus
, Zhangyu Guan
:
ESN Reinforcement Learning for Spectrum and Flight Control in THz-Enabled Drone Networks. 782-795 - Kurian Polachan
, Joydeep Pal
, Chandramani Singh
, Prabhakar Venkata Tamma
, Fernando A. Kuipers
:
TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems. 796-811 - Wenzheng Xu
, Tao Xiao, Junqi Zhang, Weifa Liang
, Zichuan Xu
, Xuxun Liu
, Xiaohua Jia
, Sajal K. Das
:
Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks. 812-825 - Qiaolun Zhang
, Omran Ayoub
, Jun Wu
, Francesco Musumeci
, Gaolei Li
, Massimo Tornatore
:
Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures. 826-839 - Tzu-Hsuan Liu, Che-Hao Yu
, Yi-Jheng Lin
, Chia-Ming Chang, Cheng-Shang Chang
, Duan-Shin Lee
:
ALOHA Receivers: A Network Calculus Approach for Analyzing Coded Multiple Access With SIC. 840-854 - Renyong Wu
, Jieming Ma
, Zhixiang Tang
, Xiehua Li, Kim-Kwang Raymond Choo
:
A Generic Secure Transmission Scheme Based on Random Linear Network Coding. 855-866 - Chenghao Rong
, Jessie Hui Wang
, Juncai Liu, Jilong Wang
, Fenghua Li, Xiaolei Huang
:
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics. 867-880 - Wenzheng Xu
, Yueying Sun, Rui Zou, Weifa Liang
, Qiufen Xia
, Feng Shan
, Tian Wang
, Xiaohua Jia
, Zheng Li:
Throughput Maximization of UAV Networks. 881-895 - Yanjiao Chen
, Meng Xue
, Jian Zhang
, Runmin Ou
, Qian Zhang
, Peng Kuang:
DetectDUI: An In-Car Detection System for Drink Driving and BACs. 896-910 - Jonatha Anselmi
, Neil Walton
:
Stability and Optimization of Speculative Queueing Networks. 911-922 - Ziyi Wang
, Yong Cui
, Xiaoyu Hu, Xin Wang
, Wei Tsang Ooi, Zhen Cao, Yi Li
:
MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming. 923-938 - Zhaowei Xi
, Yu Zhou, Dai Zhang
, Kai Gao
, Chen Sun, Jiamin Cao
, Yangyang Wang
, Mingwei Xu
, Jianping Wu:
Newton: Intent-Driven Network Traffic Monitoring. 939-952
Volume 30, Number 3, June 2022
- Ibrahim Kettaneh, Ahmed Alquraan
, Hatem Takruri, Ali José Mashtizadeh, Samer Al-Kiswany
:
Accelerating Reads With In-Network Consistency-Aware Load Balancing. 954-968 - Zehua Guo
, Songshi Dou
, Sen Liu
, Wendi Feng
, Wenchao Jiang
, Yang Xu
, Zhi-Li Zhang
:
Maintaining Control Resiliency and Flow Programmability in Software-Defined WANs During Controller Failures. 969-984 - Yaniv Sadeh
, Ori Rottenstreich
, Haim Kaplan
:
Optimal Weighted Load Balancing in TCAMs. 985-998 - Zhixiong Niu, Qiang Su
, Peng Cheng
, Yongqiang Xiong
, Dongsu Han
, Keith Winstein
, Chun Jason Xue
, Hong Xu
:
NetKernel: Making Network Stack Part of the Virtualized Infrastructure. 999-1013 - Yordanos Tibebu Woldeyohannes
, Besmir Tola
, Yuming Jiang
, K. K. Ramakrishnan
:
CoShare: An Efficient Approach for Redundancy Allocation in NFV. 1014-1028 - Zhengkai Shi
, Yipeng Zhou
, Di Wu
, Chen Wang:
PPVC: Online Learning Toward Optimized Video Content Caching. 1029-1044 - Ehsan Mohammadpour
, Jean-Yves Le Boudec
:
On Packet Reordering in Time-Sensitive Networks. 1045-1057 - Khashayar Kamran
, Edmund Yeh
, Qian Ma
:
DECO: Joint Computation Scheduling, Caching, and Communication in Data-Intensive Computing Networks. 1058-1072 - Alon Rashelbach
, Ori Rottenstreich
, Mark Silberstein
:
A Computational Approach to Packet Classification. 1073-1087 - Hao Li
, Peng Zhang
, Guangda Sun
, Wanyue Cao, Chengchen Hu, Danfeng Shan
, Tian Pan
, Qiang Fu
:
Compiling Cross-Language Network Programs Into Hybrid Data Plane. 1088-1103 - Shuai Tong
, Jiliang Wang
, Yunhao Liu:
Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs. 1104-1117 - Jia Liu
, Xi Yu, Xuan Liu
, Xingyu Chen
, Haisong Liu, Yanyan Wang, Lijun Chen
:
Time-Efficient Range Detection in Commodity RFID Systems. 1118-1131 - Kaiyang Liu
, Jun Peng
, Jingrong Wang
, Jianping Pan
:
Optimal Caching for Low Latency in Distributed Coded Storage Systems. 1132-1145 - Jingzhou Wang
, Gongming Zhao
, Hongli Xu
, Yutong Zhai
, Qianyu Zhang
, He Huang
, Yongqiang Yang
:
A Robust Service Mapping Scheme for Multi-Tenant Clouds. 1146-1161 - Sijie Xiong
, Anand D. Sarwate
, Narayan B. Mandayam
:
Network Traffic Shaping for Enhancing Privacy in IoT Systems. 1162-1177 - Chongrong Fang
, Haoyu Liu
, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng
, Jiming Chen
:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. 1178-1192 - Hehuan Shi, Lin Chen:
Downlink Transmission Scheduling With Data Sharing. 1193-1202 - Qingyu Liu
, Haibo Zeng
, Minghua Chen
:
Minimizing AoI With Throughput Requirements in Multi-Path Network Communication. 1203-1216 - Fernando Pérez-Bueno
, Luz García
, Gabriel Maciá-Fernández
, Rafael Molina
:
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection. 1217-1229 - Huaqing Tu
, Gongming Zhao
, Hongli Xu
, Yangming Zhao
, Yutong Zhai
:
A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds. 1230-1244 - Hehuan Shi, Lin Chen:
From Spectrum Bonding to Contiguous-Resource Batching Task Scheduling. 1245-1254 - Qiong Wu
, Kaiwen He
, Xu Chen
, Shuai Yu
, Junshan Zhang
:
Deep Transfer Learning Across Cities for Mobile Traffic Prediction. 1255-1267 - Abdalla Hussein
, Catherine Rosenberg
, Patrick Mitran
:
Hybrid NOMA in Multi-Cell Networks: From a Centralized Analysis to Practical Schemes. 1268-1282 - Yiwen Qi
, Wenke Yu
, Xudong Zhao
, Xindi Xu:
Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks. 1283-1293 - Chaoyun Zhang, Xavier Costa-Pérez
, Paul Patras
:
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. 1294-1311 - Guocheng Liao
, Xu Chen
, Jianwei Huang
:
Privacy-Aware Online Social Networking With Targeted Advertisement. 1312-1327 - Hongyi Zhou
, Kefan Lv
, Longbo Huang
, Xiongfeng Ma:
Quantum Network: Security Assessment and Key Management. 1328-1339 - Yanyan Han
, Hongyi Wu:
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks. 1340-1351 - Jian An
, Zhenxing Wang, Xin He
, Xiaolin Gui
, Jindong Cheng, Ruowei Gui:
PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications. 1352-1367 - Zhiyuan Wang
, Jiancheng Ye
, Dong Lin, Yipei Chen
, John C. S. Lui
:
Approximate and Deployable Shortest Remaining Processing Time Scheduler. 1368-1381 - Hyeryung Jang
, HyungSeok Song, Yung Yi
:
On Cost-Efficient Learning of Data Dependency. 1382-1394 - Jiamin Cao
, Ying Liu
, Yu Zhou
, Lin He
, Mingwei Xu
:
TurboNet: Faithfully Emulating Networks With Programmable Switches. 1395-1409 - Seungsoo Lee
, Seungwon Woo, Jinwoo Kim
, Jaehyun Nam
, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin
:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. 1410-1423 - Xin He
, Jiaqi Zheng
, Haipeng Dai
, Chong Zhang, Geng Li, Wanchun Dou
, Wajid Rafique
, Qiang Ni
, Guihai Chen
:
Continuous Network Update With Consistency Guaranteed in Software-Defined Networks. 1424-1438
Volume 30, Number 4, August 2022
- Ran Ben Basat, Gil Einziger
, Isaac Keslassy
, Ariel Orda
, Shay Vargaftik
, Erez Waisbard:
Memento: Making Sliding Windows Efficient for Heavy Hitters. 1440-1453 - Junghoon Kim
, Taejoon Kim
, Morteza Hashemi
, David J. Love
, Christopher G. Brinton
:
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks. 1454-1468 - Jie Zhao
, Xin Wang
:
On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks. 1469-1480 - Xuedou Xiao
, Wei Wang
, Tao Jiang
:
Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks. 1481-1493 - Akshay Jajoo
, Y. Charlie Hu
, Xiaojun Lin
:
A Case for Sampling-Based Learning Techniques in Coflow Scheduling. 1494-1508 - Rahul Vaze
, Jayakrishnan Nair
:
Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints. 1509-1524 - Yuntao Wang
, Weiwei Chen, Tom H. Luan
, Zhou Su
, Qichao Xu
, Ruidong Li
, Nan Chen
:
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks. 1525-1539 - Michael J. Neely
:
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling. 1540-1553 - Hassan Iqbal
, Anand Singh
, Muhammad Shahzad
:
Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants. 1554-1568 - Seyyedali Hosseinalipour
, Sheikh Shams Azam
, Christopher G. Brinton
, Nicolò Michelusi
, Vaneet Aggarwal
, David J. Love
, Huaiyu Dai
:
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks. 1569-1584 - Deepak Nadig
, Byrav Ramamurthy
, Brian Bockelman
:
SNAG: SDN-Managed Network Architecture for GridFTP Transfers Using Application-Awareness. 1585-1598 - Zhuozhao Li
, Haiying Shen
:
Co-Scheduler: A Coflow-Aware Data-Parallel Job Scheduler in Hybrid Electrical/Optical Datacenter Networks. 1599-1612 - Jun Du
, Chunxiao Jiang
, Abderrahim Benslimane
, Song Guo
, Yong Ren
:
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach. 1613-1628 - Guanglei Song
, Jiahai Yang
, Zhiliang Wang
, Lin He
, Jinlei Lin, Long Pan, Chenxin Duan
, Xiaowen Quan:
DET: Enabling Efficient Probing of IPv6 Active Addresses. 1629-1643 - Zhuozhao Li
, Tanmoy Sen
, Haiying Shen
, Mooi Choo Chuah
:
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes. 1644-1658 - Alden Hilton
, Joel Hirschmann
, Casey T. Deccio
:
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. 1659-1673 - Haibo Wang
, Chaoyi Ma
, Shigang Chen
, Yuanda Wang:
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps. 1674-1688 - Xiao-Yan Li
, Wanling Lin
, Jou-Ming Chang
, Xiaohua Jia
:
Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers. 1689-1702 - Yunxiang Cai
, Hongzi Zhu
, Shan Chang
, Xiao Wang
, Jiangang Shen, Minyi Guo
:
PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing. 1703-1716 - Chang Liu
, Jean Tourrilhes
, Chen-Nee Chuah
, Puneet Sharma:
Voyager: Revisiting Available Bandwidth Estimation With a New Class of Methods - Decreasing- Chirp-Train Methods. 1717-1732 - Edwin Yang
, Song Fang
, Ian D. Markwood
, Yao Liu
, Shangqing Zhao, Zhuo Lu
, Haojin Zhu
:
Wireless Training-Free Keystroke Inference Attack and Defense. 1733-1748 - Swaroop Gopalam
, Stephen V. Hanly
, Philip Whiting
:
Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul. 1749-1764 - Junsong Fu
, Na Wang
, Leyao Nie, Baojiang Cui, Bharat K. Bhargava
:
Defending Trace-Back Attack in 3D Wireless Internet of Things. 1765-1779 - Ehsan Mohammadpour
, Jean-Yves Le Boudec
:
Analysis of Dampers in Time-Sensitive Networks With Non-Ideal Clocks. 1780-1794 - Zaid H. Nasralla
, Taisir E. H. El-Gorashi
, Ali Hammadi
, Mohamed O. I. Musa
, Jaafar M. H. Elmirghani
:
Blackout Resilient Optical Core Network. 1795-1806 - Yuting Wang
, Xiaolong Zheng
, Liang Liu
, Huadong Ma
:
PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks. 1807-1821 - Artur Sterz
, Patrick Felka
, Bernd Simon
, Sabrina Klos
, Anja Klein
, Oliver Hinz
, Bernd Freisleben
:
Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information. 1822-1837 - Chen Avin
, Kaushik Mondal
, Stefan Schmid
:
Demand-Aware Network Design With Minimal Congestion and Route Lengths. 1838-1848 - Kaiping Xue
, Peixuan He, Jiayu Yang, Qiudong Xia, David S. L. Wei
:
SCD2: Secure Content Delivery and Deduplication With Multiple Content Providers in Information Centric Networking. 1849-1864 - Sladana Josilo
, György Dán
:
Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection. 1865-1878 - Shivang Aggarwal
, Swetank Kumar Saha, Imran Khan, Rohan Pathak, Dimitrios Koutsonikolas
, Joerg Widmer
:
MuSher: An Agile Multipath-TCP Scheduler for Dual-Band 802.11ad/ac Wireless LANs. 1879-1894 - Bin Shi
, Haiying Shen
, Bo Dong
, Qinghua Zheng:
Memory/Disk Operation Aware Lightweight VM Live Migration. 1895-1910
Volume 30, Number 5, October 2022
- Jirí Matousek
, Adam Lucanský, David Janecek, Jozef Sabo, Jan Korenek
, Gianni Antichi
:
ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era. 1912-1925 - Mohammad Jahanian
, K. K. Ramakrishnan
:
CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response. 1926-1939 - Nilanjan Biswas
, Goutam Das
, Priyadip Ray:
Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: A Cross-Layer Approach. 1940-1954 - Kun Xie
, Jiazheng Tian
, Xin Wang
, Gaogang Xie
, Jiannong Cao
, Hongbo Jiang
, Jigang Wen:
Fast Retrieval of Large Entries With Incomplete Measurement Data. 1955-1969 - Sushovan Das
, Afsaneh Rahbar
, Xinyu Crystal Wu, Zhuang Wang
, Weitao Wang
, Ang Chen, T. S. Eugene Ng
:
Shufflecast: An Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters. 1970-1985 - Hai Anh Tran
, Duc Tran, Abdelhamid Mellouk
:
State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks. 1986-2001 - Nurullah Karakoç
, Anna Scaglione
, Martin Reisslein
, Ruiyuan Wu:
Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence. 2002-2017 - Pooja Vyavahare
, Jayakrishnan Nair
, D. Manjunath
:
Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures. 2018-2031 - Zhenghao Zhang
, Raghav Rathi
, Steven Perez, Jumana Bukhari
, Yaoguang Zhong
:
ZCNET: Achieving High Capacity in Low Power Wide Area Networks. 2032-2045 - Chengzhang Li
, Qingyu Liu
, Shaoran Li
, Yongce Chen
, Y. Thomas Hou
, Wenjing Lou
, Sastry Kompella
:
Scheduling With Age of Information Guarantee. 2046-2059 - Meng Li
, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. 2060-2073 - Gaoxiong Zeng
, Wei Bai, Ge Chen, Kai Chen
, Dongsu Han
, Yibo Zhu, Lei Cui
:
Congestion Control for Cross-Datacenter Networks. 2074-2089 - Chun Li
, Yunyun Yang
, Hui Liang, Boying Wu:
Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning. 2090-2101 - Kevin D. Smith
, Saber Jafarpour, Ananthram Swami, Francesco Bullo
:
Topology Inference With Multivariate Cumulants: The Möbius Inference Algorithm. 2102-2116 - Guangyang Zeng
, Biqiang Mu
, Jieqiang Wei
, Wing Shing Wong
, Junfeng Wu
:
Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis. 2117-2130 - Yunshu Liu
, Zhixuan Fang
, Man Hon Cheung
, Wei Cai
, Jianwei Huang
:
An Incentive Mechanism for Sustainable Blockchain Storage. 2131-2144 - Hui Yang
, Qiuyan Yao
, Bowen Bao
, Ao Yu
, Jie Zhang, Athanasios V. Vasilakos
:
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks. 2145-2157 - Renjie Xie, Jiahao Cao
, Qi Li
, Kun Sun
, Guofei Gu
, Mingwei Xu
, Yuan Yang
:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. 2158-2172 - Lin Dai
:
A Theoretical Framework for Random Access: Stability Regions and Transmission Control. 2173-2200 - Xuezheng Liu
, Zhicong Zhong, Yipeng Zhou
, Di Wu
, Xu Chen
, Min Chen
, Quan Z. Sheng
:
Accelerating Federated Learning via Parallel Servers: A Theoretically Guaranteed Approach. 2201-2215 - Seyed Mohammadhossein Tabatabaee
, Jean-Yves Le Boudec
:
Deficit Round-Robin: A Second Network Calculus Analysis. 2216-2230 - Feng Li
, Jichao Zhao, Dongxiao Yu
, Xiuzhen Cheng
, Weifeng Lv:
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers. 2231-2245 - Hongli Xu
, Peng Xi
, Gongming Zhao
, Jianchun Liu, Chen Qian, Liusheng Huang
:
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks. 2246-2261 - Lin Chen, Shan Lin
, Hua Huang
, Weihua Yang:
Charging Path Optimization in Mobile Networks. 2262-2273 - Lei Zhang
, Yong Cui
, Mowei Wang
, Kewei Zhu, Yibo Zhu, Yong Jiang
:
DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization. 2274-2288 - Minghui Liwang
, Xianbin Wang
:
Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks. 2289-2303 - Lei Shi, Yuhua Cheng, Jinliang Shao
, Qingchen Liu
, Wei Xing Zheng
:
Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition. 2304-2314 - Bahman Abolhassani
, John Tadrous, Atilla Eryilmaz
, Edmund Yeh
:
Fresh Caching of Dynamic Content Over the Wireless Edge. 2315-2327 - Zhenlin An
, Qiongzheng Lin
, Lei Yang
, Lei Xie
:
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost. 2328-2342 - Hyunseok Chang
, Matteo Varvello, Fang Hao, Sarit Mukherjee
:
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet. 2343-2358 - Carlo Augusto Grazia
, Natale Patriciello
, Toke Høiland-Jørgensen, Martin Klapez
, Maurizio Casoni
:
Aggregating Without Bloating: Hard Times for TCP on Wi-Fi. 2359-2373 - Jingling Liu
, Jiawei Huang
, Zhaoyi Li
, Yijun Li, Jianxin Wang
, Tian He
:
Achieving Per-Flow Fairness and High Utilization With Limited Priority Queues in Data Center. 2374-2387
Volume 30, Number 6, December 2022
- Zhenhua Han
, Haisheng Tan
, Rui Wang, Yuncong Hong
, Francis C. M. Lau:
Efficient Online Learning Based Cross-Tier Uplink Scheduling in HetNets. 2389-2402 - Gregor Bankhamer
, Robert Elsässer
, Stefan Schmid
:
Local Fast Rerouting With Low Congestion: A Randomized Approach. 2403-2418 - Chen Avin
, Kaushik Mondal
, Stefan Schmid
:
Push-Down Trees: Optimal Self-Adjusting Complete Trees. 2419-2432 - Tian Xie
, Namitha Nambiar, Ting He
, Patrick D. McDaniel
:
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation. 2433-2447 - Marcel Blöcher
, Lin Wang
, Patrick Eugster
, Max Schmidt
:
Holistic Resource Scheduling for Data Center In-Network Computing. 2448-2463 - Theo Jepsen
, Ali Fattaholmanan
, Masoud Moshref, Nate Foster
, Antonio Carzaniga
, Robert Soulé
:
Forwarding and Routing With Packet Subscriptions. 2464-2479 - Tianjiao Wang
, Zengfu Wang
, William Moran
, Moshe Zukerman
:
Submarine Cable Network Design for Regional Connectivity. 2480-2492 - Xiaozhe Shao
, Zibin Chen
, Daniel E. Holcomb
, Lixin Gao
:
Accelerating BGP Configuration Verification Through Reducing Cycles in SMT Constraints. 2493-2504 - Yang Cai
, Jaime Llorca
, Antonia M. Tulino
, Andreas F. Molisch
:
Ultra-Reliable Distributed Cloud Network Control With End-to-End Latency Constraints. 2505-2520 - Reena Chackochan
, Albert Sunny
, Senthilkumar Dhanasekaran
:
Approximate Aggregate Utility Maximization Using Greedy Maximal Scheduling. 2521-2530 - Massieh Kordi Boroujeny
, Brian L. Mark
:
Design of a Stochastic Traffic Regulator for End-to-End Network Delay Guarantees. 2531-2543 - Darryl Veitch
, Sathiya Kumaran Mani
, Yi Cao
, Paul Barford
:
iHorology: Lowering the Barrier to Microsecond-Level Internet Time. 2544-2558 - Sijiang Huang
, Mowei Wang
, Yong Cui
:
Traffic-Aware Buffer Management in Shared Memory Switches. 2559-2573 - Qingfeng Tan
, Xuebin Wang
, Wei Shi
, Jian Tang
, Zhihong Tian
:
An Anonymity Vulnerability in Tor. 2574-2587 - Xuehe Wang
, Lingjie Duan
:
Dynamic Pricing and Mean Field Analysis for Controlling Age of Information. 2588-2600 - Zichuan Xu
, Haozhe Ren
, Weifa Liang
, Qiufen Xia
, Wanlei Zhou, Pan Zhou
, Wenzheng Xu
, Guowei Wu
, Mingchu Li
:
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks. 2601-2615 - Xianhao Chen
, Guangyu Zhu, Haichuan Ding
, Lan Zhang
, Haixia Zhang
, Yuguang Fang
:
End-to-End Service Auction: A General Double Auction Mechanism for Edge Computing Services. 2616-2629 - Keerthi Priya Dasala
, Josep Miquel Jornet
, Edward W. Knightly
:
Scaling mmWave WLANs With Single RF Chain Multiuser Beamforming. 2630-2643 - Tie Qiu
, Lidi Zhang, Ning Chen
, Songwei Zhang
, Wenyuan Liu
, Dapeng Oliver Wu
:
Born This Way: A Self-Organizing Evolution Scheme With Motif for Internet of Things Robustness. 2644-2657 - Zhiyuan Yao
, Yoann Desmouceaux
, Juan Antonio Cordero Fuertes
, Mark Townsley
, Thomas H. Clausen
:
HLB: Toward Load-Aware Load Balancing. 2658-2673 - Itamar Cohen
, Gil Einziger, Gabriel Scalosub
:
False Negative Awareness in Indicator-Based Caching Systems. 2674-2687 - Dianxiong Liu
, Zhiyong Du
, Xiaodu Liu
, Heyu Luan, Yitao Xu
, Yifan Xu
:
Task-Based Network Reconfiguration in Distributed UAV Swarms: A Bilateral Matching Approach. 2688-2700 - Ludovic Thomas
, Ahlem Mifdaoui
, Jean-Yves Le Boudec
:
Worst-Case Delay Bounds in Time-Sensitive Networks With Packet Replication and Elimination. 2701-2715 - Zhiwei Zhao
, Wenliang Mao
, Geyong Min
, Weifeng Gao
:
Joint Multichannel-Spatial Diversity for Efficient Opportunistic Routing in Low-Power Wireless Networks. 2716-2729 - Miao Zhang
, Yifei Zhu
, Jiangchuan Liu
, Feng Wang
, Fangxin Wang
:
CharmSeeker: Automated Pipeline Configuration for Serverless Video Processing. 2730-2743 - Luoyi Fu
, Jiapeng Zhang
, Shan Qu
, Huquan Kang, Xinbing Wang
, Guihai Chen:
Measuring Social Network De-Anonymizability by Means of Morphism Property. 2744-2759 - Yao Xin
, Wenjun Li
, Guoming Tang
, Tong Yang, Xiaohe Hu, Yi Wang:
FPGA-Based Updatable Packet Classification Using TSS-Combined Bit-Selecting Tree. 2760-2775 - Nishant Shakya, Fan Li
, Jinyuan Chen
:
On Distributed Computing With Heterogeneous Communication Constraints. 2776-2787 - Xinzhe Fu
, Eytan H. Modiano:
Learning-NUM: Network Utility Maximization With Unknown Utility Functions and Queueing Delay. 2788-2803 - Zhirong Shen
, Guanglin Zhang
:
Competitive Online Stay-or-Switch Algorithms With Minimum Commitment and Switching Cost. 2804-2817 - Chaoyi Ma
, Haibo Wang
, Olufemi O. Odegbile, Shigang Chen
, Dimitrios Melissourgos
:
Virtual Filter for Non-Duplicate Sampling With Network Applications. 2818-2833 - Feng Shan
, Haodong Huo
, Jiaxin Zeng
, Zengbao Li, Weiwei Wu
, Junzhou Luo:
Ultra-Wideband Swarm Ranging Protocol for Dynamic and Dense Networks. 2834-2848 - Liang Zhang
, Guangdeng Zong
, Xudong Zhao
, Ning Zhao
:
Output Reachable Set Synthesis of Event-Triggered Control for Singular Markov Jump Systems Under Multiple Cyber-Attacks. 2849-2857 - Wei Chen, Ye Tian
, Zhongxiang Wei
, Jiangyu Pan
, Xinming Zhang
:
Task Scheduling for Probabilistic In -Band Network Telemetry. 2858-2869

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.