


default search action
IEEE/ACM Transactions on Networking, Volume 30
Volume 30, Number 1, February 2022
- Kuan-yin Chen

, Sen Liu
, Yang Xu
, Ishant Kumar Siddhrau, Siyu Zhou, Zehua Guo
, H. Jonathan Chao
:
SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane. 1-17 - Archana Bura

, Desik Rengarajan
, Dileep Kalathil
, Srinivas Shakkottai
, Jean-François Chamberland
:
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms. 18-31 - Rajarshi Bhattacharyya

, Archana Bura
, Desik Rengarajan
, Mason Rumuly, Bainan Xia
, Srinivas Shakkottai
, Dileep Kalathil
, Ricky K. P. Mok, Amogh Dhamdhere:
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge. 32-46 - Yi Ding

, Ling Liu, Yu Yang
, Yunhuai Liu, Desheng Zhang, Tian He:
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild. 47-61 - Vahid Khalilpour Akram

, Orhan Dagdeviren
, Bülent Tavli
:
A Coverage-Aware Distributed k-Connectivity Maintenance Algorithm for Arbitrarily Large k in Mobile Sensor Networks. 62-75 - Jeman Park

, Rhongho Jang
, Manar Mohaisen
, David Mohaisen
:
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet. 76-89 - Xilai Liu

, Yan Xu
, Peng Liu
, Tong Yang
, Jiaqi Xu
, Lun Wang
, Gaogang Xie, Xiaoming Li, Steve Uhlig
:
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges. 90-106 - Arani Bhattacharya

, Caitao Zhan
, Abhishek Maji, Himanshu Gupta, Samir R. Das
, Petar M. Djuric
:
Selection of Sensors for Efficient Transmitter Localization. 107-119 - Bangbang Ren, Deke Guo

, Yali Yuan, Guoming Tang
, Weijun Wang, Xiaoming Fu
:
Optimal Deployment of SRv6 to Enable Network Interconnection Service. 120-133 - Yu Zhang

, Tao Gu
, Xi Zhang
:
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing. 134-147 - Amirhossein Reisizadeh

, Saurav Prakash
, Ramtin Pedarsani
, Amir Salman Avestimehr:
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning. 148-161 - Umut Can Çabuk

, Mustafa Tosun
, Orhan Dagdeviren
:
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks. 162-175 - Zhiguo Shi

, Guang Yang
, Xiaowen Gong
, Shibo He
, Jiming Chen
:
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing. 176-189 - Xin Liu

, Lei Ying
:
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime. 190-201 - Muhammad Saad

, Victor Cook
, Lan N. Nguyen
, My T. Thai
, David Mohaisen
:
Exploring Partitioning Attacks on the Bitcoin Network. 202-214 - Xiaoxi Zhang

, Jianyu Wang
, Li-Feng Lee, Tom Yang, Akansha Kalra, Gauri Joshi
, Carlee Joe-Wong
:
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs. 215-228 - Cho-Hsin Tsai

, Chih-Chun Wang
:
Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination With Random Two-Way Delay. 229-242 - Xu Li, Feilong Tang

, Yanmin Zhu
, Luoyi Fu, Jiadi Yu
, Long Chen
, Jiacheng Liu
:
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs. 243-256 - Chong Li

, Sisu Xi, Chenyang Lu
, Roch Guérin
, Christopher D. Gill:
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen. 257-270 - Yuchong Hu

, Xiaoyang Zhang, Patrick P. C. Lee
, Pan Zhou
:
NCScale: Toward Optimal Storage Scaling via Network Coding. 271-284 - Sheng Zhang

, Can Wang, Yibo Jin
, Jie Wu
, Zhuzhong Qian
, Mingjun Xiao
, Sanglu Lu:
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics. 285-298 - Chaoyi Ma

, Shigang Chen
, Youlin Zhang
, Qingjun Xiao, Olufemi O. Odegbile:
Super Spreader Identification Using Geometric-Min Filter. 299-312 - Junjie Xie

, Chen Qian, Deke Guo
, Minmei Wang
, Ge Wang
, Honghui Chen:
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems. 313-326 - Xiaoyi Pang

, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. 327-340 - Tim Hellemans

, Benny Van Houdt
:
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting. 341-353 - Tom Barbette

, Erfan Wu, Dejan Kostic
, Gerald Q. Maguire Jr.
, Panagiotis Papadimitratos
, Marco Chiesa
:
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency. 354-367 - Ning Chen

, Tie Qiu
, Zilong Lu, Dapeng Oliver Wu
:
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things. 368-381 - Reuven Cohen

, Matty Kadosh, Alan Lo
, Qasem Sayah:
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless. 382-393 - Xiaobo Ma

, Jian Qu, Jianfeng Li, John C. S. Lui
, Zhenhua Li
, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. 394-408 - Xuewei Feng

, Qi Li
, Kun Sun
, Chuanpu Fu
, Ke Xu
:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. 409-422 - Lizhao You

, Jiahua Zhang
, Yili Jin, Hao Tang, Xiao Li:
Fast Configuration Change Impact Analysis for Network Overlay Data Center Networks. 423-436 - Tal Shapira

, Yuval Shavitt
:
SASA: Source-Aware Self-Attention for IP Hijack Detection. 437-449 - Mehrnoosh Shafiee

, Javad Ghaderi
:
Scheduling Coflows With Dependency Graph. 450-463 - Prakirt Raj Jhunjhunwala

, Siva Theja Maguluri
:
Low-Complexity Switch Scheduling Algorithms: Delay Optimality in Heavy Traffic. 464-473
Volume 30, Number 2, April 2022
- Giovanni Neglia

, Michele Garetto
, Emilio Leonardi
:
Similarity Caching: Theory and Algorithms. 475-486 - Jianhan Song

, Gustavo de Veciana, Sanjay Shakkottai
:
Meta-Scheduling for the Wireless Downlink Through Learning With Bandit Feedback. 487-500 - Cuiying Feng

, Jianwei An, Kui Wu
, Jianping Wang
:
Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography. 501-514 - Dapeng Qu

, Guoxin Lv, Shijun Qu, Haiying Shen
, Yue Yang, Zhaoyang Heng:
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDN. 515-528 - Zhuo Li

, Jindian Liu
, Liu Yan
, Beichuan Zhang, Peng Luo, Kaihua Liu
:
Smart Name Lookup for NDN Forwarding Plane via Neural Networks. 529-541 - Shuihai Hu

, Gaoxiong Zeng
, Wei Bai, Zilong Wang
, Baochen Qiao, Kai Chen
, Kun Tan, Yi Wang
:
Aeolus: A Building Block for Proactive Transport in Datacenter Networks. 542-556 - Yu Sun, Chi Lin

, Haipeng Dai
, Pengfei Wang
, Lei Wang
, Guowei Wu
, Qiang Zhang
:
Trading off Charging and Sensing for Stochastic Events Monitoring in WRSNs. 557-571 - Shuai Wang, Jinkun Geng

, Dan Li:
Impact of Synchronization Topology on DML Performance: Both Logical Topology and Physical Topology. 572-585 - Yuanpeng Li

, Xiang Yu
, Yilong Yang
, Yang Zhou
, Tong Yang
, Zhuo Ma
, Shigang Chen
:
Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement. 586-600 - Yan Huang

, Shaoran Li
, Y. Thomas Hou
, Wenjing Lou
:
GPF+: A Novel Ultrafast GPU-Based Proportional Fair Scheduler for 5G NR. 601-615 - Leonardo Lanante

, Sumit Roy
:
Performance Analysis of the IEEE 802.11ax OBSS_PD-Based Spatial Reuse. 616-628 - Penghao Sun

, Zehua Guo
, Junfei Li, Yang Xu
, Julong Lan, Yuxiang Hu:
Enabling Scalable Routing in Software-Defined Networks With Deep Reinforcement Learning on Critical Nodes. 629-640 - Xiuzhen Guo

, Longfei Shangguan, Yuan He
, Jia Zhang, Haotian Jiang, Awais Ahmad Siddiqi, Yunhao Liu:
Efficient Ambient LoRa Backscatter With On-Off Keying Modulation. 641-654 - Jorge Martín-Pérez

, Francesco Malandrino
, Carla-Fabiana Chiasserini
, Milan Groshev
, Carlos J. Bernardos
:
KPI Guarantees in Network Slicing. 655-668 - Bahman Abolhassani

, John Tadrous, Atilla Eryilmaz
:
Single vs Distributed Edge Caching for Dynamic Content. 669-682 - Sergi Rene, Onur Ascigil

, Ioannis Psaras, George Pavlou
:
A Congestion Control Framework Based on In-Network Resource Pooling. 683-697 - Yuchen Liu

, Yubing Jian
, Raghupathy Sivakumar, Douglas M. Blough
:
Maximizing Line-of-Sight Coverage for mmWave Wireless LANs With Multiple Access Points. 698-716 - Hankun Cao

, Qifa Yan
, Xiaohu Tang
, Guojun Han
:
Adaptive Gradient Coding. 717-734 - Pan Lai

, Rui Fan, Xiao Zhang
, Wei Zhang
, Fang Liu, Joey Tianyi Zhou
:
Utility Optimal Thread Assignment and Resource Allocation in Multi-Server Systems. 735-748 - Bingyu Li

, Jingqiang Lin
, Fengjun Li
, Qiongxiao Wang, Wei Wang
, Qi Li
, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. 749-765 - Ingo van Duijn, Peter Gjøl Jensen

, Jesper Stenbjerg Jensen, Troels Beck Krøgh, Jonas Sand Madsen, Stefan Schmid
, Jirí Srba
, Marc Tom Thorgersen:
Automata-Theoretic Approach to Verification of MPLS Networks Under Link Failures. 766-781 - Sabarish Krishna Moorthy

, Maxwell McManus
, Zhangyu Guan
:
ESN Reinforcement Learning for Spectrum and Flight Control in THz-Enabled Drone Networks. 782-795 - Kurian Polachan

, Joydeep Pal
, Chandramani Singh
, Prabhakar Venkata Tamma
, Fernando A. Kuipers
:
TCPSbed: A Modular Testbed for Tactile Internet-Based Cyber-Physical Systems. 796-811 - Wenzheng Xu

, Tao Xiao, Junqi Zhang, Weifa Liang
, Zichuan Xu
, Xuxun Liu
, Xiaohua Jia
, Sajal K. Das
:
Minimizing the Deployment Cost of UAVs for Delay-Sensitive Data Collection in IoT Networks. 812-825 - Qiaolun Zhang

, Omran Ayoub
, Jun Wu
, Francesco Musumeci
, Gaolei Li
, Massimo Tornatore
:
Progressive Slice Recovery With Guaranteed Slice Connectivity After Massive Failures. 826-839 - Tzu-Hsuan Liu, Che-Hao Yu

, Yi-Jheng Lin
, Chia-Ming Chang, Cheng-Shang Chang
, Duan-Shin Lee
:
ALOHA Receivers: A Network Calculus Approach for Analyzing Coded Multiple Access With SIC. 840-854 - Renyong Wu

, Jieming Ma
, Zhixiang Tang
, Xiehua Li, Kim-Kwang Raymond Choo
:
A Generic Secure Transmission Scheme Based on Random Linear Network Coding. 855-866 - Chenghao Rong

, Jessie Hui Wang
, Juncai Liu, Jilong Wang
, Fenghua Li, Xiaolei Huang
:
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics. 867-880 - Wenzheng Xu

, Yueying Sun, Rui Zou, Weifa Liang
, Qiufen Xia
, Feng Shan
, Tian Wang
, Xiaohua Jia
, Zheng Li:
Throughput Maximization of UAV Networks. 881-895 - Yanjiao Chen

, Meng Xue
, Jian Zhang
, Runmin Ou
, Qian Zhang
, Peng Kuang:
DetectDUI: An In-Car Detection System for Drink Driving and BACs. 896-910 - Jonatha Anselmi

, Neil Walton
:
Stability and Optimization of Speculative Queueing Networks. 911-922 - Ziyi Wang

, Yong Cui
, Xiaoyu Hu, Xin Wang
, Wei Tsang Ooi, Zhen Cao, Yi Li
:
MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming. 923-938 - Zhaowei Xi

, Yu Zhou, Dai Zhang
, Kai Gao
, Chen Sun, Jiamin Cao
, Yangyang Wang
, Mingwei Xu
, Jianping Wu:
Newton: Intent-Driven Network Traffic Monitoring. 939-952
Volume 30, Number 3, June 2022
- Ibrahim Kettaneh, Ahmed Alquraan

, Hatem Takruri, Ali José Mashtizadeh, Samer Al-Kiswany
:
Accelerating Reads With In-Network Consistency-Aware Load Balancing. 954-968 - Zehua Guo

, Songshi Dou
, Sen Liu
, Wendi Feng
, Wenchao Jiang
, Yang Xu
, Zhi-Li Zhang
:
Maintaining Control Resiliency and Flow Programmability in Software-Defined WANs During Controller Failures. 969-984 - Yaniv Sadeh

, Ori Rottenstreich
, Haim Kaplan
:
Optimal Weighted Load Balancing in TCAMs. 985-998 - Zhixiong Niu, Qiang Su

, Peng Cheng
, Yongqiang Xiong
, Dongsu Han
, Keith Winstein
, Chun Jason Xue
, Hong Xu
:
NetKernel: Making Network Stack Part of the Virtualized Infrastructure. 999-1013 - Yordanos Tibebu Woldeyohannes

, Besmir Tola
, Yuming Jiang
, K. K. Ramakrishnan
:
CoShare: An Efficient Approach for Redundancy Allocation in NFV. 1014-1028 - Zhengkai Shi

, Yipeng Zhou
, Di Wu
, Chen Wang:
PPVC: Online Learning Toward Optimized Video Content Caching. 1029-1044 - Ehsan Mohammadpour

, Jean-Yves Le Boudec
:
On Packet Reordering in Time-Sensitive Networks. 1045-1057 - Khashayar Kamran

, Edmund Yeh
, Qian Ma
:
DECO: Joint Computation Scheduling, Caching, and Communication in Data-Intensive Computing Networks. 1058-1072 - Alon Rashelbach

, Ori Rottenstreich
, Mark Silberstein
:
A Computational Approach to Packet Classification. 1073-1087 - Hao Li

, Peng Zhang
, Guangda Sun
, Wanyue Cao, Chengchen Hu, Danfeng Shan
, Tian Pan
, Qiang Fu
:
Compiling Cross-Language Network Programs Into Hybrid Data Plane. 1088-1103 - Shuai Tong

, Jiliang Wang
, Yunhao Liu:
Combating Packet Collisions Using Non-Stationary Signal Scaling in LPWANs. 1104-1117 - Jia Liu

, Xi Yu, Xuan Liu
, Xingyu Chen
, Haisong Liu, Yanyan Wang, Lijun Chen
:
Time-Efficient Range Detection in Commodity RFID Systems. 1118-1131 - Kaiyang Liu

, Jun Peng
, Jingrong Wang
, Jianping Pan
:
Optimal Caching for Low Latency in Distributed Coded Storage Systems. 1132-1145 - Jingzhou Wang

, Gongming Zhao
, Hongli Xu
, Yutong Zhai
, Qianyu Zhang
, He Huang
, Yongqiang Yang
:
A Robust Service Mapping Scheme for Multi-Tenant Clouds. 1146-1161 - Sijie Xiong

, Anand D. Sarwate
, Narayan B. Mandayam
:
Network Traffic Shaping for Enhancing Privacy in IoT Systems. 1162-1177 - Chongrong Fang

, Haoyu Liu
, Mao Miao, Jie Ye, Lei Wang, Wansheng Zhang, Daxiang Kang, Biao Lyu, Shunmin Zhu, Peng Cheng
, Jiming Chen
:
Towards Automatic Root Cause Diagnosis of Persistent Packet Loss in Cloud Overlay Network. 1178-1192 - Hehuan Shi, Lin Chen:

Downlink Transmission Scheduling With Data Sharing. 1193-1202 - Qingyu Liu

, Haibo Zeng
, Minghua Chen
:
Minimizing AoI With Throughput Requirements in Multi-Path Network Communication. 1203-1216 - Fernando Pérez-Bueno

, Luz García
, Gabriel Maciá-Fernández
, Rafael Molina
:
Leveraging a Probabilistic PCA Model to Understand the Multivariate Statistical Network Monitoring Framework for Network Security Anomaly Detection. 1217-1229 - Huaqing Tu

, Gongming Zhao
, Hongli Xu
, Yangming Zhao
, Yutong Zhai
:
A Robustness-Aware Real-Time SFC Routing Update Scheme in Multi-Tenant Clouds. 1230-1244 - Hehuan Shi, Lin Chen:

From Spectrum Bonding to Contiguous-Resource Batching Task Scheduling. 1245-1254 - Qiong Wu

, Kaiwen He
, Xu Chen
, Shuai Yu
, Junshan Zhang
:
Deep Transfer Learning Across Cities for Mobile Traffic Prediction. 1255-1267 - Abdalla Hussein

, Catherine Rosenberg
, Patrick Mitran
:
Hybrid NOMA in Multi-Cell Networks: From a Centralized Analysis to Practical Schemes. 1268-1282 - Yiwen Qi

, Wenke Yu
, Xudong Zhao
, Xindi Xu:
Event-Triggered Control for Network-Based Switched Systems With Switching Signals Subject to Dual-Terminal DoS Attacks. 1283-1293 - Chaoyun Zhang, Xavier Costa-Pérez

, Paul Patras
:
Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms. 1294-1311 - Guocheng Liao

, Xu Chen
, Jianwei Huang
:
Privacy-Aware Online Social Networking With Targeted Advertisement. 1312-1327 - Hongyi Zhou

, Kefan Lv
, Longbo Huang
, Xiongfeng Ma:
Quantum Network: Security Assessment and Key Management. 1328-1339 - Yanyan Han

, Hongyi Wu:
Privacy-Aware Participant Recruitment in Opportunistic Device to Device Networks. 1340-1351 - Jian An

, Zhenxing Wang, Xin He
, Xiaolin Gui
, Jindong Cheng, Ruowei Gui
:
PPQC: A Blockchain-Based Privacy-Preserving Quality Control Mechanism in Crowdsensing Applications. 1352-1367 - Zhiyuan Wang

, Jiancheng Ye
, Dong Lin, Yipei Chen
, John C. S. Lui
:
Approximate and Deployable Shortest Remaining Processing Time Scheduler. 1368-1381 - Hyeryung Jang

, HyungSeok Song, Yung Yi
:
On Cost-Efficient Learning of Data Dependency. 1382-1394 - Jiamin Cao

, Ying Liu
, Yu Zhou
, Lin He
, Mingwei Xu
:
TurboNet: Faithfully Emulating Networks With Programmable Switches. 1395-1409 - Seungsoo Lee

, Seungwon Woo, Jinwoo Kim
, Jaehyun Nam
, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin
:
A Framework for Policy Inconsistency Detection in Software-Defined Networks. 1410-1423 - Xin He

, Jiaqi Zheng
, Haipeng Dai
, Chong Zhang, Geng Li, Wanchun Dou
, Wajid Rafique
, Qiang Ni
, Guihai Chen
:
Continuous Network Update With Consistency Guaranteed in Software-Defined Networks. 1424-1438
Volume 30, Number 4, August 2022
- Ran Ben Basat, Gil Einziger

, Isaac Keslassy
, Ariel Orda
, Shay Vargaftik
, Erez Waisbard:
Memento: Making Sliding Windows Efficient for Heavy Hitters. 1440-1453 - Junghoon Kim

, Taejoon Kim
, Morteza Hashemi
, David J. Love
, Christopher G. Brinton
:
Minimum Overhead Beamforming and Resource Allocation in D2D Edge Networks. 1454-1468 - Jie Zhao

, Xin Wang
:
On the Efficiency of Multi-Beam Medium Access for Millimeter-Wave Networks. 1469-1480 - Xuedou Xiao

, Wei Wang
, Tao Jiang
:
Sensor-Assisted Rate Adaptation for UAV MU-MIMO Networks. 1481-1493 - Akshay Jajoo

, Y. Charlie Hu
, Xiaojun Lin
:
A Case for Sampling-Based Learning Techniques in Coflow Scheduling. 1494-1508 - Rahul Vaze

, Jayakrishnan Nair
:
Speed Scaling on Parallel Servers With MapReduce Type Precedence Constraints. 1509-1524 - Yuntao Wang

, Weiwei Chen, Tom H. Luan
, Zhou Su
, Qichao Xu
, Ruidong Li
, Nan Chen
:
Task Offloading for Post-Disaster Rescue in Unmanned Aerial Vehicles Networks. 1525-1539 - Michael J. Neely

:
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling. 1540-1553 - Hassan Iqbal

, Anand Singh
, Muhammad Shahzad
:
Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants. 1554-1568 - Seyyedali Hosseinalipour

, Sheikh Shams Azam
, Christopher G. Brinton
, Nicolò Michelusi
, Vaneet Aggarwal
, David J. Love
, Huaiyu Dai
:
Multi-Stage Hybrid Federated Learning Over Large-Scale D2D-Enabled Fog Networks. 1569-1584 - Deepak Nadig

, Byrav Ramamurthy
, Brian Bockelman
:
SNAG: SDN-Managed Network Architecture for GridFTP Transfers Using Application-Awareness. 1585-1598 - Zhuozhao Li

, Haiying Shen
:
Co-Scheduler: A Coflow-Aware Data-Parallel Job Scheduler in Hybrid Electrical/Optical Datacenter Networks. 1599-1612 - Jun Du

, Chunxiao Jiang
, Abderrahim Benslimane
, Song Guo
, Yong Ren
:
SDN-Based Resource Allocation in Edge and Cloud Computing Systems: An Evolutionary Stackelberg Differential Game Approach. 1613-1628 - Guanglei Song

, Jiahai Yang
, Zhiliang Wang
, Lin He
, Jinlei Lin, Long Pan, Chenxin Duan
, Xiaowen Quan:
DET: Enabling Efficient Probing of IPv6 Active Addresses. 1629-1643 - Zhuozhao Li

, Tanmoy Sen
, Haiying Shen
, Mooi Choo Chuah
:
A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes. 1644-1658 - Alden Hilton

, Joel Hirschmann
, Casey T. Deccio
:
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. 1659-1673 - Haibo Wang

, Chaoyi Ma
, Shigang Chen
, Yuanda Wang:
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps. 1674-1688 - Xiao-Yan Li

, Wanling Lin
, Jou-Ming Chang
, Xiaohua Jia
:
Transmission Failure Analysis of Multi-Protection Routing in Data Center Networks With Heterogeneous Edge-Core Servers. 1689-1702 - Yunxiang Cai

, Hongzi Zhu
, Shan Chang
, Xiao Wang
, Jiangang Shen, Minyi Guo
:
PeerProbe: Estimating Vehicular Neighbor Distribution With Adaptive Compressive Sensing. 1703-1716 - Chang Liu

, Jean Tourrilhes
, Chen-Nee Chuah
, Puneet Sharma:
Voyager: Revisiting Available Bandwidth Estimation With a New Class of Methods - Decreasing- Chirp-Train Methods. 1717-1732 - Edwin Yang

, Song Fang
, Ian D. Markwood
, Yao Liu
, Shangqing Zhao, Zhuo Lu
, Haojin Zhu
:
Wireless Training-Free Keystroke Inference Attack and Defense. 1733-1748 - Swaroop Gopalam

, Stephen V. Hanly
, Philip Whiting
:
Distributed and Local Scheduling Algorithms for mmWave Integrated Access and Backhaul. 1749-1764 - Junsong Fu

, Na Wang
, Leyao Nie, Baojiang Cui, Bharat K. Bhargava
:
Defending Trace-Back Attack in 3D Wireless Internet of Things. 1765-1779 - Ehsan Mohammadpour

, Jean-Yves Le Boudec
:
Analysis of Dampers in Time-Sensitive Networks With Non-Ideal Clocks. 1780-1794 - Zaid H. Nasralla

, Taisir E. H. El-Gorashi
, Ali Hammadi
, Mohamed O. I. Musa
, Jaafar M. H. Elmirghani
:
Blackout Resilient Optical Core Network. 1795-1806 - Yuting Wang

, Xiaolong Zheng
, Liang Liu
, Huadong Ma
:
PolarTracker: Attitude-Aware Channel Access for Floating Low Power Wide Area Networks. 1807-1821 - Artur Sterz

, Patrick Felka
, Bernd Simon
, Sabrina Klos
, Anja Klein
, Oliver Hinz
, Bernd Freisleben
:
Multi-Stakeholder Service Placement via Iterative Bargaining With Incomplete Information. 1822-1837 - Chen Avin

, Kaushik Mondal
, Stefan Schmid
:
Demand-Aware Network Design With Minimal Congestion and Route Lengths. 1838-1848 - Kaiping Xue

, Peixuan He, Jiayu Yang, Qiudong Xia, David S. L. Wei
:
SCD2: Secure Content Delivery and Deduplication With Multiple Content Providers in Information Centric Networking. 1849-1864 - Sladana Josilo

, György Dán
:
Joint Wireless and Edge Computing Resource Management With Dynamic Network Slice Selection. 1865-1878 - Shivang Aggarwal

, Swetank Kumar Saha, Imran Khan, Rohan Pathak, Dimitrios Koutsonikolas
, Joerg Widmer
:
MuSher: An Agile Multipath-TCP Scheduler for Dual-Band 802.11ad/ac Wireless LANs. 1879-1894 - Bin Shi

, Haiying Shen
, Bo Dong
, Qinghua Zheng:
Memory/Disk Operation Aware Lightweight VM Live Migration. 1895-1910
Volume 30, Number 5, October 2022
- Jirí Matousek

, Adam Lucanský, David Janecek, Jozef Sabo, Jan Korenek
, Gianni Antichi
:
ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era. 1912-1925 - Mohammad Jahanian

, K. K. Ramakrishnan
:
CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response. 1926-1939 - Nilanjan Biswas

, Goutam Das
, Priyadip Ray:
Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: A Cross-Layer Approach. 1940-1954 - Kun Xie

, Jiazheng Tian
, Xin Wang
, Gaogang Xie
, Jiannong Cao
, Hongbo Jiang
, Jigang Wen:
Fast Retrieval of Large Entries With Incomplete Measurement Data. 1955-1969 - Sushovan Das

, Afsaneh Rahbar
, Xinyu Crystal Wu, Zhuang Wang
, Weitao Wang
, Ang Chen, T. S. Eugene Ng
:
Shufflecast: An Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters. 1970-1985 - Hai Anh Tran

, Duc Tran, Abdelhamid Mellouk
:
State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks. 1986-2001 - Nurullah Karakoç

, Anna Scaglione
, Martin Reisslein
, Ruiyuan Wu:
Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence. 2002-2017 - Pooja Vyavahare

, Jayakrishnan Nair
, D. Manjunath
:
Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures. 2018-2031 - Zhenghao Zhang

, Raghav Rathi
, Steven Perez, Jumana Bukhari
, Yaoguang Zhong
:
ZCNET: Achieving High Capacity in Low Power Wide Area Networks. 2032-2045 - Chengzhang Li

, Qingyu Liu
, Shaoran Li
, Yongce Chen
, Y. Thomas Hou
, Wenjing Lou
, Sastry Kompella
:
Scheduling With Age of Information Guarantee. 2046-2059 - Meng Li

, Liehuang Zhu
, Zijian Zhang
, Chhagan Lal
, Mauro Conti
, Mamoun Alazab
:
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack. 2060-2073 - Gaoxiong Zeng

, Wei Bai, Ge Chen, Kai Chen
, Dongsu Han
, Yibo Zhu, Lei Cui
:
Congestion Control for Cross-Datacenter Networks. 2074-2089 - Chun Li

, Yunyun Yang
, Hui Liang, Boying Wu:
Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning. 2090-2101 - Kevin D. Smith

, Saber Jafarpour, Ananthram Swami, Francesco Bullo
:
Topology Inference With Multivariate Cumulants: The Möbius Inference Algorithm. 2102-2116 - Guangyang Zeng

, Biqiang Mu
, Jieqiang Wei
, Wing Shing Wong
, Junfeng Wu
:
Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis. 2117-2130 - Yunshu Liu

, Zhixuan Fang
, Man Hon Cheung
, Wei Cai
, Jianwei Huang
:
An Incentive Mechanism for Sustainable Blockchain Storage. 2131-2144 - Hui Yang

, Qiuyan Yao
, Bowen Bao
, Ao Yu
, Jie Zhang, Athanasios V. Vasilakos
:
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks. 2145-2157 - Renjie Xie, Jiahao Cao

, Qi Li
, Kun Sun
, Guofei Gu
, Mingwei Xu
, Yuan Yang
:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. 2158-2172 - Lin Dai

:
A Theoretical Framework for Random Access: Stability Regions and Transmission Control. 2173-2200 - Xuezheng Liu

, Zhicong Zhong, Yipeng Zhou
, Di Wu
, Xu Chen
, Min Chen
, Quan Z. Sheng
:
Accelerating Federated Learning via Parallel Servers: A Theoretically Guaranteed Approach. 2201-2215 - Seyed Mohammadhossein Tabatabaee

, Jean-Yves Le Boudec
:
Deficit Round-Robin: A Second Network Calculus Analysis. 2216-2230 - Feng Li

, Jichao Zhao, Dongxiao Yu
, Xiuzhen Cheng
, Weifeng Lv:
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers. 2231-2245 - Hongli Xu

, Peng Xi
, Gongming Zhao
, Jianchun Liu, Chen Qian, Liusheng Huang
:
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks. 2246-2261 - Lin Chen, Shan Lin

, Hua Huang
, Weihua Yang:
Charging Path Optimization in Mobile Networks. 2262-2273 - Lei Zhang

, Yong Cui
, Mowei Wang
, Kewei Zhu, Yibo Zhu, Yong Jiang
:
DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization. 2274-2288 - Minghui Liwang

, Xianbin Wang
:
Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks. 2289-2303 - Lei Shi, Yuhua Cheng, Jinliang Shao

, Qingchen Liu
, Wei Xing Zheng
:
Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition. 2304-2314 - Bahman Abolhassani

, John Tadrous, Atilla Eryilmaz
, Edmund Yeh
:
Fresh Caching of Dynamic Content Over the Wireless Edge. 2315-2327 - Zhenlin An

, Qiongzheng Lin
, Lei Yang
, Lei Xie
:
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost. 2328-2342 - Hyunseok Chang

, Matteo Varvello, Fang Hao, Sarit Mukherjee
:
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet. 2343-2358 - Carlo Augusto Grazia

, Natale Patriciello
, Toke Høiland-Jørgensen, Martin Klapez
, Maurizio Casoni
:
Aggregating Without Bloating: Hard Times for TCP on Wi-Fi. 2359-2373 - Jingling Liu

, Jiawei Huang
, Zhaoyi Li
, Yijun Li, Jianxin Wang
, Tian He
:
Achieving Per-Flow Fairness and High Utilization With Limited Priority Queues in Data Center. 2374-2387
Volume 30, Number 6, December 2022
- Zhenhua Han

, Haisheng Tan
, Rui Wang, Yuncong Hong
, Francis C. M. Lau:
Efficient Online Learning Based Cross-Tier Uplink Scheduling in HetNets. 2389-2402 - Gregor Bankhamer

, Robert Elsässer
, Stefan Schmid
:
Local Fast Rerouting With Low Congestion: A Randomized Approach. 2403-2418 - Chen Avin

, Kaushik Mondal
, Stefan Schmid
:
Push-Down Trees: Optimal Self-Adjusting Complete Trees. 2419-2432 - Tian Xie

, Namitha Nambiar, Ting He
, Patrick D. McDaniel
:
Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation. 2433-2447 - Marcel Blöcher

, Lin Wang
, Patrick Eugster
, Max Schmidt
:
Holistic Resource Scheduling for Data Center In-Network Computing. 2448-2463 - Theo Jepsen

, Ali Fattaholmanan
, Masoud Moshref, Nate Foster
, Antonio Carzaniga
, Robert Soulé
:
Forwarding and Routing With Packet Subscriptions. 2464-2479 - Tianjiao Wang

, Zengfu Wang
, William Moran
, Moshe Zukerman
:
Submarine Cable Network Design for Regional Connectivity. 2480-2492 - Xiaozhe Shao

, Zibin Chen
, Daniel E. Holcomb
, Lixin Gao
:
Accelerating BGP Configuration Verification Through Reducing Cycles in SMT Constraints. 2493-2504 - Yang Cai

, Jaime Llorca
, Antonia M. Tulino
, Andreas F. Molisch
:
Ultra-Reliable Distributed Cloud Network Control With End-to-End Latency Constraints. 2505-2520 - Reena Chackochan

, Albert Sunny
, Senthilkumar Dhanasekaran
:
Approximate Aggregate Utility Maximization Using Greedy Maximal Scheduling. 2521-2530 - Massieh Kordi Boroujeny

, Brian L. Mark
:
Design of a Stochastic Traffic Regulator for End-to-End Network Delay Guarantees. 2531-2543 - Darryl Veitch

, Sathiya Kumaran Mani
, Yi Cao
, Paul Barford
:
iHorology: Lowering the Barrier to Microsecond-Level Internet Time. 2544-2558 - Sijiang Huang

, Mowei Wang
, Yong Cui
:
Traffic-Aware Buffer Management in Shared Memory Switches. 2559-2573 - Qingfeng Tan

, Xuebin Wang
, Wei Shi
, Jian Tang
, Zhihong Tian
:
An Anonymity Vulnerability in Tor. 2574-2587 - Xuehe Wang

, Lingjie Duan
:
Dynamic Pricing and Mean Field Analysis for Controlling Age of Information. 2588-2600 - Zichuan Xu

, Haozhe Ren
, Weifa Liang
, Qiufen Xia
, Wanlei Zhou, Pan Zhou
, Wenzheng Xu
, Guowei Wu
, Mingchu Li
:
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks. 2601-2615 - Xianhao Chen

, Guangyu Zhu, Haichuan Ding
, Lan Zhang
, Haixia Zhang
, Yuguang Fang
:
End-to-End Service Auction: A General Double Auction Mechanism for Edge Computing Services. 2616-2629 - Keerthi Priya Dasala

, Josep Miquel Jornet
, Edward W. Knightly
:
Scaling mmWave WLANs With Single RF Chain Multiuser Beamforming. 2630-2643 - Tie Qiu

, Lidi Zhang, Ning Chen
, Songwei Zhang
, Wenyuan Liu
, Dapeng Oliver Wu
:
Born This Way: A Self-Organizing Evolution Scheme With Motif for Internet of Things Robustness. 2644-2657 - Zhiyuan Yao

, Yoann Desmouceaux
, Juan Antonio Cordero Fuertes
, Mark Townsley
, Thomas H. Clausen
:
HLB: Toward Load-Aware Load Balancing. 2658-2673 - Itamar Cohen

, Gil Einziger, Gabriel Scalosub
:
False Negative Awareness in Indicator-Based Caching Systems. 2674-2687 - Dianxiong Liu

, Zhiyong Du
, Xiaodu Liu
, Heyu Luan, Yitao Xu
, Yifan Xu
:
Task-Based Network Reconfiguration in Distributed UAV Swarms: A Bilateral Matching Approach. 2688-2700 - Ludovic Thomas

, Ahlem Mifdaoui
, Jean-Yves Le Boudec
:
Worst-Case Delay Bounds in Time-Sensitive Networks With Packet Replication and Elimination. 2701-2715 - Zhiwei Zhao

, Wenliang Mao
, Geyong Min
, Weifeng Gao
:
Joint Multichannel-Spatial Diversity for Efficient Opportunistic Routing in Low-Power Wireless Networks. 2716-2729 - Miao Zhang

, Yifei Zhu
, Jiangchuan Liu
, Feng Wang
, Fangxin Wang
:
CharmSeeker: Automated Pipeline Configuration for Serverless Video Processing. 2730-2743 - Luoyi Fu

, Jiapeng Zhang
, Shan Qu
, Huquan Kang, Xinbing Wang
, Guihai Chen:
Measuring Social Network De-Anonymizability by Means of Morphism Property. 2744-2759 - Yao Xin

, Wenjun Li
, Guoming Tang
, Tong Yang, Xiaohe Hu, Yi Wang:
FPGA-Based Updatable Packet Classification Using TSS-Combined Bit-Selecting Tree. 2760-2775 - Nishant Shakya, Fan Li

, Jinyuan Chen
:
On Distributed Computing With Heterogeneous Communication Constraints. 2776-2787 - Xinzhe Fu

, Eytan H. Modiano:
Learning-NUM: Network Utility Maximization With Unknown Utility Functions and Queueing Delay. 2788-2803 - Zhirong Shen

, Guanglin Zhang
:
Competitive Online Stay-or-Switch Algorithms With Minimum Commitment and Switching Cost. 2804-2817 - Chaoyi Ma

, Haibo Wang
, Olufemi O. Odegbile, Shigang Chen
, Dimitrios Melissourgos
:
Virtual Filter for Non-Duplicate Sampling With Network Applications. 2818-2833 - Feng Shan

, Haodong Huo
, Jiaxin Zeng
, Zengbao Li, Weiwei Wu
, Junzhou Luo:
Ultra-Wideband Swarm Ranging Protocol for Dynamic and Dense Networks. 2834-2848 - Liang Zhang

, Guangdeng Zong
, Xudong Zhao
, Ning Zhao
:
Output Reachable Set Synthesis of Event-Triggered Control for Singular Markov Jump Systems Under Multiple Cyber-Attacks. 2849-2857 - Wei Chen, Ye Tian

, Zhongxiang Wei
, Jiangyu Pan
, Xinming Zhang
:
Task Scheduling for Probabilistic In -Band Network Telemetry. 2858-2869

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














