


Остановите войну!
for scientists:


default search action
IEEE/ACM Transactions on Networking, Volume 30
Volume 30, Number 1, February 2022
- Kuan-yin Chen
, Sen Liu
, Yang Xu
, Ishant Kumar Siddhrau, Siyu Zhou, Zehua Guo
, H. Jonathan Chao
:
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane. 1-17 - Archana Bura
, Desik Rengarajan
, Dileep Kalathil
, Srinivas Shakkottai
, Jean-François Chamberland
:
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms. 18-31 - Rajarshi Bhattacharyya
, Archana Bura
, Desik Rengarajan
, Mason Rumuly, Bainan Xia
, Srinivas Shakkottai
, Dileep Kalathil
, Ricky K. P. Mok, Amogh Dhamdhere:
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge. 32-46 - Yi Ding
, Ling Liu, Yu Yang
, Yunhuai Liu, Desheng Zhang, Tian He:
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild. 47-61 - Vahid Khalilpour Akram
, Orhan Dagdeviren
, Bülent Tavli
:
A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks. 62-75 - Jeman Park
, Rhongho Jang
, Manar Mohaisen, David Mohaisen
:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. 76-89 - Xilai Liu
, Yan Xu
, Peng Liu
, Tong Yang
, Jiaqi Xu
, Lun Wang
, Gaogang Xie, Xiaoming Li, Steve Uhlig
:
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges. 90-106 - Arani Bhattacharya
, Caitao Zhan
, Abhishek Maji, Himanshu Gupta, Samir R. Das
, Petar M. Djuric
:
Selection of Sensors for Efficient Transmitter Localization. 107-119 - Bangbang Ren, Deke Guo
, Yali Yuan, Guoming Tang
, Weijun Wang, Xiaoming Fu
:
Optimal Deployment of SRv6 to Enable Network Interconnection Service. 120-133 - Yu Zhang
, Tao Gu
, Xi Zhang
:
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing. 134-147 - Amirhossein Reisizadeh
, Saurav Prakash
, Ramtin Pedarsani
, Amir Salman Avestimehr:
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning. 148-161 - Umut Can Çabuk
, Mustafa Tosun
, Orhan Dagdeviren
:
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks. 162-175 - Zhiguo Shi
, Guang Yang
, Xiaowen Gong
, Shibo He
, Jiming Chen
:
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing. 176-189 - Xin Liu
, Lei Ying
:
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime. 190-201 - Muhammad Saad
, Victor Cook
, Lan N. Nguyen
, My T. Thai
, David Mohaisen
:
Exploring Partitioning Attacks on the Bitcoin Network. 202-214 - Xiaoxi Zhang
, Jianyu Wang
, Li-Feng Lee, Tom Yang, Akansha Kalra, Gauri Joshi
, Carlee Joe-Wong
:
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs. 215-228 - Cho-Hsin Tsai
, Chih-Chun Wang
:
Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination With Random Two-Way Delay. 229-242 - Xu Li, Feilong Tang
, Yanmin Zhu
, Luoyi Fu, Jiadi Yu
, Long Chen
, Jiacheng Liu
:
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs. 243-256 - Chong Li
, Sisu Xi, Chenyang Lu
, Roch Guérin
, Christopher D. Gill:
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen. 257-270 - Yuchong Hu
, Xiaoyang Zhang, Patrick P. C. Lee
, Pan Zhou
:
NCScale: Toward Optimal Storage Scaling via Network Coding. 271-284 - Sheng Zhang
, Can Wang, Yibo Jin
, Jie Wu
, Zhuzhong Qian
, Mingjun Xiao
, Sanglu Lu:
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics. 285-298 - Chaoyi Ma
, Shigang Chen
, Youlin Zhang
, Qingjun Xiao, Olufemi O. Odegbile:
Super Spreader Identification Using Geometric-Min Filter. 299-312 - Junjie Xie
, Chen Qian, Deke Guo
, Minmei Wang
, Ge Wang
, Honghui Chen:
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems. 313-326 - Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. 327-340 - Tim Hellemans
, Benny Van Houdt
:
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting. 341-353 - Tom Barbette
, Erfan Wu, Dejan Kostic
, Gerald Q. Maguire Jr.
, Panagiotis Papadimitratos
, Marco Chiesa
:
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency. 354-367 - Ning Chen
, Tie Qiu
, Zilong Lu, Dapeng Oliver Wu
:
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things. 368-381 - Reuven Cohen
, Matty Kadosh, Alan Lo
, Qasem Sayah:
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless. 382-393 - Xiaobo Ma
, Jian Qu, Jianfeng Li, John C. S. Lui
, Zhenhua Li
, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. 394-408 - Xuewei Feng
, Qi Li
, Kun Sun
, Chuanpu Fu
, Ke Xu
:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. 409-422 - Lizhao You
, Jiahua Zhang
, Yili Jin, Hao Tang, Xiao Li:
Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks. 423-436 - Tal Shapira
, Yuval Shavitt
:
SASA: Source-Aware Self-Attention for IP Hijack Detection. 437-449 - Mehrnoosh Shafiee
, Javad Ghaderi
:
Scheduling Coflows With Dependency Graph. 450-463 - Prakirt Raj Jhunjhunwala
, Siva Theja Maguluri
:
Low-Complexity Switch Scheduling Algorithms: Delay Optimality in Heavy Traffic. 464-473
Volume 30, Number 2, April 2022
- Giovanni Neglia
, Michele Garetto
, Emilio Leonardi
:
Similarity Caching: Theory and Algorithms. 475-486 - Jianhan Song
, Gustavo de Veciana, Sanjay Shakkottai
:
Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback. 487-500 - Cuiying Feng
, Jianwei An, Kui Wu
, Jianping Wang
:
Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography. 501-514 - Dapeng Qu
, Guoxin Lv, Shijun Qu, Haiying Shen
, Yue Yang, Zhaoyang Heng:
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN. 515-528 - Zhuo Li
, Jindian Liu
, Liu Yan
, Beichuan Zhang, Peng Luo, Kaihua Liu
:
Smart Name Lookup for NDN Forwarding Plane via Neural Networks. 529-541 - Shuihai Hu
, Gaoxiong Zeng
, Wei Bai, Zilong Wang
, Baochen Qiao, Kai Chen
, Kun Tan, Yi Wang
:
Aeolus: A Building Block for Proactive Transport in Datacenter Networks. 542-556 - Yu Sun, Chi Lin
, Haipeng Dai
, Pengfei Wang
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs. 557-571 - Shuai Wang, Jinkun Geng
, Dan Li:
Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology. 572-585 - Yuanpeng Li
, Xiang Yu
, Yilong Yang
, Yang Zhou
, Tong Yang
, Zhuo Ma
, Shigang Chen
:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. 586-600 - Yan Huang
, Shaoran Li
, Y. Thomas Hou
, Wenjing Lou
:
GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR. 601-615 - Leonardo Lanante
, Sumit Roy
:
Performance Analysis of the IEEE 802.11ax OBSS_PD-Based Spatial Reuse. 616-628 - Penghao Sun
, Zehua Guo
, Junfei Li, Yang Xu
, Julong Lan, Yuxiang Hu:
Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes. 629-640 - Xiuzhen Guo
, Longfei Shangguan, Yuan He
, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, Yunhao Liu:
Efficient Ambient LoRa Backscatter With On-Off Keying Modulation. 641-654 - Jorge Martín-Pérez
, Francesco Malandrino
, Carla-Fabiana Chiasserini
, Milan Groshev
, Carlos J. Bernardos
:
KPI Guarantees in Network Slicing. 655-668 - Bahman Abolhassani
, John Tadrous, Atilla Eryilmaz
:
Single vs Distributed Edge Caching for Dynamic Content. 669-682 - Sergi Rene, Onur Ascigil
, Ioannis Psaras, George Pavlou
:
A Congestion Control Framework Based on In-Network Resource Pooling. 683-697 - Yuchen Liu
, Yubing Jian
, Raghupathy Sivakumar, Douglas M. Blough
:
Maximizing Line-of-Sight Coverage for mmWave Wireless LANs With Multiple Access Points. 698-716 - Hankun Cao
, Qifa Yan
, Xiaohu Tang
, Guojun Han
:
Adaptive Gradient Coding. 717-734 - Pan Lai
, Rui Fan, Xiao Zhang
, Wei Zhang
, Fang Liu, Joey Tianyi Zhou
:
Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems. 735-748 - Bingyu Li
, Jingqiang Lin
, Fengjun Li
, Qiongxiao Wang, Wei Wang
, Qi Li
, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. 749-765 - Ingo van Duijn, Peter Gjøl Jensen
, Jesper Stenbjerg Jensen, Troels Beck Krøgh, Jonas Sand Madsen, Stefan Schmid
, Jirí Srba
, Marc Tom Thorgersen:
Automata-Theoretic Approach to Verification of MPLS Networks Under Link Failures. 766-781 - Sabarish Krishna Moorthy
, Maxwell McManus
, Zhangyu Guan
:
ESN Reinforcement Learning for Spectrum and Flight Control in THz-Enabled Drone Networks. 782-795 - Kurian Polachan
, Joydeep Pal
, Chandramani Singh
, Prabhakar Venkata Tamma
, Fernando A. Kuipers
:
TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems. 796-811 - Wenzheng Xu
, Tao Xiao, Junqi Zhang, Weifa Liang
, Zichuan Xu
, Xuxun Liu
, Xiaohua Jia
, Sajal K. Das
:
Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks. 812-825 - Qiaolun Zhang
, Omran Ayoub
, Jun Wu
, Francesco Musumeci
, Gaolei Li
, Massimo Tornatore
:
Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures. 826-839 - Tzu-Hsuan Liu, Che-Hao Yu
, Yi-Jheng Lin
, Chia-Ming Chang, Cheng-Shang Chang
, Duan-Shin Lee
:
ALOHA Receivers: A Network Calculus Approach for Analyzing Coded Multiple Access With SIC. 840-854 - Renyong Wu
, Jieming Ma
, Zhixiang Tang
, Xiehua Li, Kim-Kwang Raymond Choo
:
A Generic Secure Transmission Scheme Based on Random Linear Network Coding. 855-866 - Chenghao Rong
, Jessie Hui Wang
, Juncai Liu, Jilong Wang
, Fenghua Li, Xiaolei Huang
:
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics. 867-880 - Wenzheng Xu
, Yueying Sun, Rui Zou, Weifa Liang
, Qiufen Xia
, Feng Shan
, Tian Wang
, Xiaohua Jia
, Zheng Li:
Throughput Maximization of UAV Networks. 881-895 - Yanjiao Chen
, Meng Xue
, Jian Zhang
, Runmin Ou
, Qian Zhang
, Peng Kuang:
DetectDUI: An In-Car Detection System for Drink Driving and BACs. 896-910 - Jonatha Anselmi
, Neil Walton
:
Stability and Optimization of Speculative Queueing Networks. 911-922 - Ziyi Wang
, Yong Cui
, Xiaoyu Hu, Xin Wang
, Wei Tsang Ooi, Zhen Cao, Yi Li
:
MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming. 923-938 - Zhaowei Xi
, Yu Zhou, Dai Zhang
, Kai Gao
, Chen Sun, Jiamin Cao
, Yangyang Wang
, Mingwei Xu
, Jianping Wu:
Newton: Intent-Driven Network Traffic Monitoring. 939-952
Volume 30, Number 3, June 2022
- Ibrahim Kettaneh, Ahmed Alquraan
, Hatem Takruri, Ali José Mashtizadeh, Samer Al-Kiswany
:
Accelerating Reads With In-Network Consistency-Aware Load Balancing. 954-968 - Zehua Guo
, Songshi Dou
, Sen Liu
, Wendi Feng, Wenchao Jiang
, Yang Xu
, Zhi-Li Zhang
:
Maintaining Control Resiliency and Flow Programmability in Software-Defined WANs During Controller Failures. 969-984 - Yaniv Sadeh
, Ori Rottenstreich
, Haim Kaplan
:
Optimal Weighted Load Balancing in TCAMs. 985-998 - Zhixiong Niu, Qiang Su
, Peng Cheng
, Yongqiang Xiong
, Dongsu Han
, Keith Winstein
, Chun Jason Xue
, Hong Xu
:
NetKernel: Making Network Stack Part of the Virtualized Infrastructure. 999-1013 - Yordanos Tibebu Woldeyohannes
, Besmir Tola
, Yuming Jiang
, K. K. Ramakrishnan
:
CoShare: An Efficient Approach for Redundancy Allocation in NFV. 1014-1028 - Zhengkai Shi
, Yipeng Zhou
, Di Wu
, Chen Wang:
PPVC: Online Learning Toward Optimized Video Content Caching. 1029-1044 - Ehsan Mohammadpour
, Jean-Yves Le Boudec
:
On Packet Reordering in Time-Sensitive Networks. 1045-1057 - Khashayar Kamran
, Edmund Yeh
, Qian Ma
:
DECO: Joint Computation Scheduling, Caching, and Communication in Data-Intensive Computing Networks. 1058-1072 - Alon Rashelbach
, Ori Rottenstreich
, Mark Silberstein
:
A Computational Approach to Packet Classification. 1073-1087 - Hao Li
, Peng Zhang
, Guangda Sun
, Wanyue Cao, Chengchen Hu, Danfeng Shan
, Tian Pan
, Qiang Fu
:
Compiling Cross-Language Network Programs Into Hybrid Data Plane. 1088-1103 - Shuai Tong
, Jiliang Wang
, Yunhao Liu:
Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs. 1104-1117 - Jia Liu
, Xi Yu, Xuan Liu
, Xingyu Chen
, Haisong Liu, Yanyan Wang, Lijun Chen
:
Time-Efficient Range Detection in Commodity RFID Systems. 1118-1131 - Kaiyang Liu
, Jun Peng
, Jingrong Wang
, Jianping Pan
:
Optimal Caching for Low Latency in Distributed Coded Storage Systems. 1132-1145 - Jingzhou Wang
, Gongming Zhao
, Hongli Xu
, Yutong Zhai
, Qianyu Zhang, He Huang
, Yongqiang Yang
:
A Robust Service Mapping Scheme for Multi-Tenant Clouds. 1146-1161 - Sijie Xiong
, Anand D. Sarwate
, Narayan B. Mandayam
:
Network Traffic Shaping for Enhancing Privacy in IoT Systems. 1162-1177 - Chongrong Fang
, Haoyu Liu
, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng
, Jiming Chen
:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. 1178-1192 - Hehuan Shi, Lin Chen:
Downlink Transmission Scheduling With Data Sharing. 1193-1202 - Qingyu Liu
, Haibo Zeng
, Minghua Chen
:
Minimizing AoI With Throughput Requirements in Multi-Path Network Communication. 1203-1216 - Fernando Pérez-Bueno
, Luz García
, Gabriel Maciá-Fernández
, Rafael Molina
:
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection. 1217-1229 - Huaqing Tu
, Gongming Zhao
, Hongli Xu
, Yangming Zhao
, Yutong Zhai
:
A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds. 1230-1244 - Hehuan Shi, Lin Chen:
From Spectrum Bonding to Contiguous-Resource Batching Task Scheduling. 1245-1254 - Qiong Wu
, Kaiwen He
, Xu Chen
, Shuai Yu
, Junshan Zhang
:
Deep Transfer Learning Across Cities for Mobile Traffic Prediction. 1255-1267 - Abdalla Hussein
, Catherine Rosenberg
, Patrick Mitran
:
Hybrid NOMA in Multi-Cell Networks: From a Centralized Analysis to Practical Schemes. 1268-1282 - Yiwen Qi
, Wenke Yu
, Xudong Zhao
, Xindi Xu:
Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks. 1283-1293 - Chaoyun Zhang, Xavier Costa-Pérez
, Paul Patras
:
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. 1294-1311 - Guocheng Liao
, Xu Chen
, Jianwei Huang
:
Privacy-Aware Online Social Networking With Targeted Advertisement. 1312-1327 - Hongyi Zhou
, Kefan Lv
, Longbo Huang
, Xiongfeng Ma:
Quantum Network: Security Assessment and Key Management. 1328-1339 - Yanyan Han
, Hongyi Wu:
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks. 1340-1351 - Jian An
, Zhenxing Wang, Xin He
, Xiaolin Gui
, Jindong Cheng, Ruowei Gui:
PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications. 1352-1367 - Zhiyuan Wang
, Jiancheng Ye
, Dong Lin, Yipei Chen
, John C. S. Lui
:
Approximate and Deployable Shortest Remaining Processing Time Scheduler. 1368-1381 - Hyeryung Jang
, HyungSeok Song, Yung Yi
:
On Cost-Efficient Learning of Data Dependency. 1382-1394 - Jiamin Cao
, Ying Liu
, Yu Zhou
, Lin He
, Mingwei Xu
:
TurboNet: Faithfully Emulating Networks With Programmable Switches. 1395-1409 - Seungsoo Lee
, Seungwon Woo, Jinwoo Kim
, Jaehyun Nam
, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin
:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. 1410-1423 - Xin He
, Jiaqi Zheng
, Haipeng Dai
, Chong Zhang, Geng Li, Wanchun Dou
, Wajid Rafique
, Qiang Ni
, Guihai Chen
:
Continuous Network Update With Consistency Guaranteed in Software-Defined Networks. 1424-1438
Volume 30, Number 4, August 2022
- Ran Ben Basat, Gil Einziger
, Isaac Keslassy
, Ariel Orda
, Shay Vargaftik
, Erez Waisbard:
Memento: Making Sliding Windows Efficient for Heavy Hitters. 1440-1453 - Junghoon Kim
, Taejoon Kim
, Morteza Hashemi
, David J. Love
, Christopher G. Brinton
:
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks. 1454-1468 - Jie Zhao
, Xin Wang
:
On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks. 1469-1480 - Xuedou Xiao
, Wei Wang
, Tao Jiang
:
Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks. 1481-1493 - Akshay Jajoo
, Y. Charlie Hu
, Xiaojun Lin
:
A Case for Sampling-Based Learning Techniques in Coflow Scheduling. 1494-1508 - Rahul Vaze
, Jayakrishnan Nair
:
Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints. 1509-1524 - Yuntao Wang
, Weiwei Chen, Tom H. Luan
, Zhou Su
, Qichao Xu
, Ruidong Li
, Nan Chen
:
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks. 1525-1539 - Michael J. Neely
:
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling. 1540-1553