


default search action
IEEE/ACM Transactions on Networking, Volume 29
Volume 29, Number 1, February 2021
- Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos:

O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. 1-16 - Zehua Guo

, Yang Xu
, Ya-Feng Liu
, Sen Liu
, H. Jonathan Chao
, Zhi-Li Zhang
, Yuanqing Xia
:
AggreFlow: Achieving Power Efficiency, Load Balancing, and Quality of Service in Data Center Networks. 17-33 - Lin Wang

, Lei Jiao
, Ting He
, Jun Li
, Henri E. Bal
:
Service Placement for Collaborative Edge Applications. 34-47 - Haipeng Dai

, Yunhuai Liu, Nan Yu
, Chaofeng Wu, Guihai Chen
, Tian He
, Alex X. Liu
:
Radiation Constrained Wireless Charger Placement. 48-64 - Meng Jin, Yuan He

, Xin Meng, Dingyi Fang, Xiaojiang Chen
:
Parallel Backscatter in the Wild: When Burstiness and Randomness Play With You. 65-77 - Xiaoli Zhang

, Qi Li
, Zeyu Zhang
, Jianping Wu, Jiahai Yang
:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. 78-91 - Minmei Wang

, Chen Qian, Xin Li
, Shouqian Shi
, Shigang Chen
:
Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. 92-105 - Zahra Naghsh

, Shahrokh Valaee
:
Conflict-Free Scheduling in Cellular V2X Communications. 106-119 - Weng-Chon Ao

, Po-Han Huang
, Konstantinos Psounis
:
Joint Workload Distribution and Capacity Augmentation in Hybrid Datacenter Networks. 120-133 - Shaojun Zou, Jiawei Huang

, Jianxin Wang, Tian He
:
Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks. 134-147 - Yunpeng Li

, Costas Courcoubetis
, Lingjie Duan
, Richard R. Weber:
Optimal Pricing for Peer-to-Peer Sharing With Network Externalities. 148-161 - Chuanwen Luo

, Meghana N. Satpute
, Deying Li
, Yongcai Wang
, Wenping Chen, Weili Wu
:
Fine-Grained Trajectory Optimization of Multiple UAVs for Efficient Data Gathering from WSNs. 162-175 - Wenzheng Xu

, Weifa Liang
, Zichuan Xu
, Jian Peng, Dezhong Peng
, Tang Liu, Xiaohua Jia
, Sajal K. Das
:
Approximation Algorithms for the Generalized Team Orienteering Problem and its Applications. 176-189 - Zuyuan Zhang

, Fang-Ming Shao
, Nan Zhang, Yi-Feng Niu
:
Maximizing k-Terminal Network Reliability in Some Sparse Graphs. 190-202 - Huanhuan Huang

, Tong Ye
, Tony Tong Lee, Weiqiang Sun
:
Delay and Stability Analysis of Connection-Based Slotted-Aloha. 203-219 - Konstantinos Psychas

, Javad Ghaderi
:
High-Throughput Bin Packing: Scheduling Jobs With Random Resource Demands in Clusters. 220-233 - B. R. Vinay Kumar

, Navin Kashyap
:
Probabilistic Forwarding of Coded Packets on Networks. 234-247 - Jianchun Liu

, Hongli Xu
, Gongming Zhao
, Chen Qian, Xingpeng Fan
, Xuwei Yang
, He Huang
:
Incremental Server Deployment for Software-Defined NFV-Enabled Networks. 248-261 - Timmy Schüller

, Nils Aschenbruck
, Markus Chimani, Martin Horneffer
:
Failure Resiliency With Only a Few Tunnels - Enabling Segment Routing for Traffic Engineering. 262-274 - Vitalii Demianiuk

, Sergey Gorinsky
, Sergey I. Nikolenko
, Kirill Kogan
:
Robust Distributed Monitoring of Traffic Flows. 275-288 - Chunyu Qiao

, Jiliang Wang, Yunhao Liu:
Beyond QoE: Diversity Adaptation in Video Streaming at the Edge. 289-302 - Luca Maria Castiglione

, Paolo Falcone
, Alberto Petrillo
, Simon Pietro Romano
, Stefania Santini
:
Cooperative Intersection Crossing Over 5G. 303-317 - Ahsen Ejaz

, Vassilis Papaefstathiou, Ioannis Sourdis
:
HighwayNoC: Approaching Ideal NoC Performance With Dual Data Rate Routers. 318-331 - Peng Zhang, Fangzheng Zhang

, Shimin Xu, Zuoru Yang
, Hao Li
, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu:
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks. 332-345 - Saadallah Kassir

, Pablo Caballero Garces
, Gustavo de Veciana
, Nannan Wang
, Xi Wang, Paparao Palacharla:
An Analytical Model and Performance Evaluation of Multihomed Multilane VANETs. 346-359 - Zhiyuan Xu

, Dejun Yang
, Jian Tang
, Yinan Tang
, Tongtong Yuan
, Yanzhi Wang, Guoliang Xue
:
An Actor-Critic-Based Transfer Learning Framework for Experience-Driven Networking. 360-371 - Xinyu Tong

, Yang Wan, Qianru Li, Xiaohua Tian
, Xinbing Wang
:
CSI Fingerprinting Localization With Low Human Efforts. 372-385 - Jianxiong Guo

, Tiantian Chen
, Weili Wu
:
A Multi-Feature Diffusion Model: Rumor Blocking in Social Networks. 386-397 - Canh T. Dinh

, Nguyen Hoang Tran
, Minh N. H. Nguyen
, Choong Seon Hong
, Wei Bao
, Albert Y. Zomaya
, Vincent Gramoli:
Federated Learning Over Wireless Networks: Convergence Analysis and Resource Allocation. 398-409 - Zhichao Cao

, Jiliang Wang
, Daibo Liu
, Qiang Ma
, Xin Miao, XuFei Mao
:
Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks. 410-422 - Pamela Zave

, Fabrício B. Carvalho
, Ronaldo A. Ferreira
, Jennifer Rexford
, Masaharu Morimoto, Xuan Kelvin Zou:
A Verified Session Protocol for Dynamic Service Chaining. 423-437 - Yangming Zhao

, Chen Tian
, Jingyuan Fan
, Tong Guan, Xiaoning Zhang
, Chunming Qiao:
Joint Reducer Placement and Coflow Bandwidth Scheduling for Computing Clusters. 438-451 - Weiwei Chen

, Yunhuai Liu, Tian He
:
SoftHM: A Software-Based Hierarchical Modulation Design for Wireless System. 452-464 - Fengjiao Li

, Yu Sang, Zhongdong Liu
, Bin Li
, Huasen Wu, Bo Ji
:
Waiting But Not Aging: Optimizing Information Freshness Under the Pull Model. 465-478
Volume 29, Number 2, April 2021
- Wei Bai, Shuihai Hu

, Kai Chen
, Kun Tan, Yongqiang Xiong
:
One More Config is Enough: Saving (DC)TCP for High-Speed Extremely Shallow-Buffered Datacenters. 489-502 - Sándor Laki

, Szilveszter Nádas
, Gergo Gombos
, Ferenc Fejes, Péter Hudoba
, Zoltán Richard Turányi, Zoltán Kiss
, Csaba Keszei:
Core-Stateless Forwarding With QoS Revisited: Decoupling Delay and Bandwidth Requirements. 503-516 - Gal Mendelson

, Shay Vargaftik
, Katherine Barabash
, Dean H. Lorenz
, Isaac Keslassy
, Ariel Orda
:
AnchorHash: A Scalable Consistent Hash. 517-528 - Bahman Abolhassani

, John Tadrous, Atilla Eryilmaz
:
Delay Gain Analysis of Wireless Multicasting for Content Distribution. 529-542 - Fan Cheng

, Congtao Wang, Xingyi Zhang
, Yun Yang
:
A Local-Neighborhood Information Based Overlapping Community Detection Algorithm for Large-Scale Complex Networks. 543-556 - Wenjie Li

, Sharief M. A. Oteafy
, Marwan Fayed
, Hossam S. Hassanein
:
Quality of Experience in ICN: Keep Your Low- Bitrate Close and High-Bitrate Closer. 557-570 - Qiao Xiang

, Haitao Yu, James Aspnes, Franck Le, Chin Guok, Linghe Kong
, Yang Richard Yang
:
Optimizing in the Dark: Learning Optimal Network Resource Reservation Through a Simple Request Interface. 571-584 - Xin Wang

, Yinlong Xu, Richard T. B. Ma
:
Paid Peering, Settlement-Free Peering, or Both? 585-594 - Liekang Zeng

, Xu Chen
, Zhi Zhou
, Lei Yang
, Junshan Zhang
:
CoEdge: Cooperative DNN Inference With Adaptive Workload Partitioning Over Heterogeneous Edge Devices. 595-608 - Itamar Cohen

, Gil Einziger, Roy Friedman
, Gabriel Scalosub
:
Access Strategies for Network Caching. 609-622 - Menghao Zhang

, Guanyu Li
, Lei Xu, Jiasong Bai, Mingwei Xu
, Guofei Gu, Jianping Wu:
Control Plane Reflection Attacks and Defenses in Software-Defined Networks. 623-636 - Marco Chiesa

, Roshan Sedar
, Gianni Antichi
, Michael Borokhovich
, Andrzej Kamisinski
, Georgios Nikolaidis, Stefan Schmid
:
Fast ReRoute on Programmable Switches. 637-650 - Giuliano Casale

, Nicolas Gast
:
Performance Analysis Methods for List-Based Caches With Non-Uniform Access. 651-664 - Jing Hou

, Li Sun
, Tao Shu
, Yong Xiao
, Marwan Krunz:
Economics of Strategic Network Infrastructure Sharing: A Backup Reservation Approach. 665-680 - Libin Liu

, Hong Xu
:
Elasecutor: Elastic Executor Scheduling in Data Analytics Systems. 681-694 - Lin He

, Gang Ren, Ying Liu
, Jiahai Yang
:
PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet. 695-708 - Qian Ma, Edmund Yeh

, Jianwei Huang
:
Selfish Caching Games on Directed Graphs. 709-722 - Zili Meng

, Yaning Guo, Yixin Shen
, Jing Chen, Chao Zhou, Minhu Wang, Jia Zhang
, Mingwei Xu
, Chen Sun
, Hongxin Hu
:
Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning. 723-736 - Gauri Joshi

, Dhruva Kaushal
:
Synergy via Redundancy: Adaptive Replication Strategies and Fundamental Limits. 737-749 - Jeongmin Bae

, Joohyun Lee
, Song Chong:
Learning to Schedule Network Resources Throughput and Delay Optimally Using Q+-Learning. 750-763 - Shaoran Li

, Yan Huang
, Chengzhang Li
, Brian Jalaian, Y. Thomas Hou
, Wenjing Lou
, Stephen Russell:
Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty. 764-778 - Vajiheh Farhadi

, Fidan Mehmeti, Ting He
, Thomas F. La Porta
, Hana Khamfroush
, Shiqiang Wang
, Kevin S. Chan
, Konstantinos Poularakis
:
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds. 779-792 - Yong Huang

, Wei Wang
, Tao Jiang
, Qian Zhang
:
Detecting Colluding Sybil Attackers in Robotic Networks Using Backscatters. 793-804 - Galia Shabtai

, Danny Raz, Yuval Shavitt
:
Risk Aware Stochastic Placement of Cloud Services. 805-820 - Zicheng Chi

, Yan Li, Hongyu Sun, Zhichuan Huang
, Ting Zhu:
Simultaneous Bi-Directional Communications and Data Forwarding Using a Single ZigBee Data Stream. 821-833 - Fujie Fan

, Hangyu Meng
, Bing Hu
, Kwan L. Yeung
, Zhifeng Zhao
:
Roulette Wheel Balancing Algorithm With Dynamic Flowlet Switching for Multipath Datacenter Networks. 834-847 - Mohammad Jahanian

, K. K. Ramakrishnan
:
Name Space Analysis: Verification of Named Data Network Data Planes. 848-861 - Che-Hao Yu

, Lin Huang, Cheng-Shang Chang
, Duan-Shin Lee
:
Poisson Receivers: A Probabilistic Framework for Analyzing Coded Random Access. 862-875 - Ming Shi

, Xiaojun Lin
, Sonia Fahmy
:
Competitive Online Convex Optimization With Switching Costs and Ramp Constraints. 876-889 - Xiaofeng Shi

, Haofan Cai
, Minmei Wang
, Ge Wang
, Baiwen Huang, Junjie Xie
, Chen Qian:
TagAttention: Mobile Object Tracing With Zero Appearance Knowledge by Vision-RFID Fusion. 890-903 - Xinyu Tong

, Hao Li
, Xiaohua Tian
, Xinbing Wang
:
Wi-Fi Localization Enabling Self-Calibration. 904-917 - Yuchao Zhang

, Xiaohui Nie
, Junchen Jiang, Wendong Wang
, Ke Xu
, Youjian Zhao, Martin J. Reed
, Kai Chen
, Haiyang Wang, Guang Yao:
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation. 918-934 - Qiong Wu

, Xu Chen
, Zhi Zhou
, Liang Chen
, Junshan Zhang
:
Deep Reinforcement Learning With Spatio-Temporal Traffic Forecasting for Data-Driven Base Station Sleep Control. 935-948 - Peng Zou

, Omur Ozel
, Suresh Subramaniam
:
Optimizing Information Freshness Through Computation-Transmission Tradeoff and Queue Management in Edge Computing. 949-963
Volume 29, Number 3, June 2021
- Rukhsana Ruby

, Shuxin Zhong, Basem M. ElHalawany
, Hanjiang Luo
, Kaishun Wu
:
SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks. 965-978 - Behrooz Farkiani

, Bahador Bakhshi
, S. Ali MirHassani
, Tim Wauters
, Bruno Volckaert
, Filip De Turck
:
Prioritized Deployment of Dynamic Service Function Chains. 979-993 - Dongxiao Yu

, Yifei Zou
, Yong Zhang
, Hao Sheng
, Weifeng Lv
, Xiuzhen Cheng
:
An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks. 994-1007 - Jiadong Lou

, Xu Yuan
, Sastry Kompella
, Nian-Feng Tzeng
:
Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks. 1008-1021 - Chien-Sheng Yang

, Ramtin Pedarsani
, Amir Salman Avestimehr:
Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing. 1022-1031 - Kamran Ali

, Alex X. Liu
, Ioannis Pefkianakis, Kyu-Han Kim:
Distributed Spectrum Sharing for Enterprise Powerline Communication Networks. 1032-1045 - Mengyuan Zhang

, Lei Yang
, Shibo He
, Ming Li
, Junshan Zhang
:
Privacy-Preserving Data Aggregation for Mobile Crowdsensing With Externality: An Auction Approach. 1046-1059 - Gourav Saha

, Alhussein A. Abouzeid
, Zaheer Khan
, Marja Matinmikko-Blue
:
On the Optimal Duration of Spectrum Leases in Exclusive License Markets With Stochastic Demand. 1060-1073 - Ahmed Mohamed Abdelmoniem

, Brahim Bensaou:
T-RACKs: A Faster Recovery Mechanism for TCP in Data Center Networks. 1074-1087 - Tianming Zhao

, Weisheng Si
, Wei Li
, Albert Y. Zomaya
:
Optimizing the Maximum Vertex Coverage Attacks Under Knapsack Constraint. 1088-1104 - Guilherme Iecker Ricardo

, Alina Tuholukova, Giovanni Neglia
, Thrasyvoulos Spyropoulos:
Caching Policies for Delay Minimization in Small Cell Networks With Coordinated Multi-Point Joint Transmissions. 1105-1115 - Ciril Rozic

, Galen H. Sasaki:
Optical Protection Cost of Loop Free Alternates on Completely Connected IP Networks Over Optical Rings. 1116-1127 - Meng Jin, Yuan He

, Chengkun Jiang, Yunhao Liu:
Parallel Backscatter: Channel Estimation and Beyond. 1128-1140 - Vitalii Demianiuk

, Kirill Kogan
, Sergey I. Nikolenko
:
Approximate Packet Classifiers With Controlled Accuracy. 1141-1154 - Holger Boche

, Rafael F. Schaefer
, H. Vincent Poor
:
On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems. 1155-1168 - Dan Xia, Xiaolong Zheng

, Liang Liu
, Chaoyu Wang
, Huadong Ma
:
c-Chirp: Towards Symmetric Cross-Technology Communication Over Asymmetric Channels. 1169-1182 - Jiawei Huang

, Wenjun Lyu
, Weihe Li
, Jianxin Wang
, Tian He
:
Mitigating Packet Reordering for Random Packet Spraying in Data Center Networks. 1183-1196 - Yang Yang

, Yanjiao Chen
, Fei Chen
:
A Compressive Integrity Auditing Protocol for Secure Cloud Storage. 1197-1209 - Rahul Singh

, P. R. Kumar
:
Adaptive CSMA for Decentralized Scheduling of Multi-Hop Networks With End-to-End Deadline Constraints. 1224-1237 - Gamal Sallam

, Bo Ji
:
Joint Placement and Allocation of VNF Nodes With Budget and Capacity Constraints. 1238-1251 - Zhenlin An

, Lei Yang
, Qiongzheng Lin
:
Identifying UHF RFIDs in Range of Readers With WiFi. 1252-1265 - Mohammed Alasmar

, Richard G. Clegg, Nickolay Zakhleniuk
, George Parisis
:
Internet Traffic Volumes are Not Gaussian - They are Log-Normal: An 18-Year Longitudinal Study With Implications for Modelling and Prediction. 1266-1279 - Haisheng Tan

, Chi Zhang
, Chao Xu, Yupeng Li
, Zhenhua Han
, Xiang-Yang Li
:
Regularization-Based Coflow Scheduling in Optical Circuit Switches. 1280-1293 - Cho-Chun Chiu

, Ting He
:
Stealthy DGoS Attack: DeGrading of Service Under the Watch of Network Tomography. 1294-1307 - Deke Guo

, Junjie Xie
, Xiaofeng Shi
, Haofan Cai
, Chen Qian, Honghui Chen:
HDS: A Fast Hybrid Data Location Service for Hierarchical Mobile Edge Computing. 1308-1320 - Feihong Yang

, Yuan Shen
:
Critical Intensity for Unbounded Sequential Localizability. 1321-1334 - Liangxiao Xin

, David Starobinski
:
Countering Cascading Denial of Service Attacks on Wi-Fi Networks. 1335-1348 - Trupil Limbasiya

, Debasis Das
, Sajal K. Das
:
MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles. 1349-1361 - Subhramoy Mohanti

, Elif Bozkaya
, M. Yousof Naderi
, Berk Canberk
, Gokhan Secinti
, Kaushik R. Chowdhury
:
WiFED Mobile: WiFi Friendly Energy Delivery With Mobile Distributed Beamforming. 1362-1375 - Chunqiang Hu

, Xiuzhen Cheng
, Zhi Tian
, Jiguo Yu
, Weifeng Lv:
Achieving Privacy Preservation and Billing via Delayed Information Release. 1376-1390 - Zhangyu Guan

, Lorenzo Bertizzolo
, Emrecan Demirors
, Tommaso Melodia
:
WNOS: Enabling Principled Software-Defined Wireless Networking. 1391-1407 - Hanine Tout

, Azzam Mourad
, Nadjia Kara, Chamseddine Talhi:
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading. 1408-1421 - Bo Cheng

, Ming Wang
, Xiangtao Lin, Junliang Chen:
Context-Aware Cognitive QoS Management for Networking Video Transmission. 1422-1434
Volume 29, Number 4, August 2021
- Jinwei Liu

, Haiying Shen
, Hongmei Chi
, Husnu S. Narman
, Yongyi Yang, Long Cheng
, Wingyan Chung:
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage. 1436-1451 - Yan Gu

, Bo Liu
, Xiaojun Shen
:
Asymptotically Optimal Online Scheduling With Arbitrary Hard Deadlines in Multi-Hop Communication Networks. 1452-1466 - Amir Behrouzi-Far

, Emina Soljanin
:
Efficient Replication for Fast and Predictable Performance in Distributed Computing. 1467-1476 - Jiancheng Ye

, Ka-Cheong Leung
, Steven H. Low
:
Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms. 1477-1493 - Sneihil Gopal

, Sanjit K. Kaul
, Rakesh Chaturvedi
, Sumit Roy
:
Coexistence of Age and Throughput Optimizing Networks: A Spectrum Sharing Game. 1494-1508 - Guanyu Li

, Menghao Zhang
, Shicheng Wang
, Chang Liu, Mingwei Xu
, Ang Chen, Hongxin Hu
, Guofei Gu, Qi Li
, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. 1509-1526 - Guanhao Wu, Xiaofeng Gao

, Jiaqi Zheng
, Guihai Chen
:
Achieving Fast Loop-Free Updates With Ingress Port in Software-Defined Networks. 1527-1539 - Miguel C. Neves

, Bradley Huffaker, Kirill Levchenko
, Marinho P. Barcellos
:
Dynamic Property Enforcement in Programmable Data Planes. 1540-1552 - Huanle Xu

, Yang Liu, Wing Cheong Lau
:
Optimal Job Scheduling With Resource Packing for Heterogeneous Servers. 1553-1566 - Yuan He

, Xiuzhen Guo
, Jia Zhang, Haotian Jiang:
WIDE: Physical-Level CTC via Digital Emulation. 1567-1579 - Ziyao Zhang

, Liang Ma, Kin K. Leung, Franck Le:
More Is Not Always Better: An Analytical Study of Controller Synchronizations in Distributed SDN. 1580-1590 - Tingjun Chen

, Mahmood Baraani Dastjerdi
, Harish Krishnaswamy
, Gil Zussman
:
Wideband Full-Duplex Phased Array With Joint Transmit and Receive Beamforming: Optimization and Rate Gains. 1591-1604 - Zhe Chen

, Xu Zhang, Sulei Wang
, Yuedong Xu
, Jie Xiong
, Xin Wang:
Enabling Practical Large-Scale MIMO in WLANs With Hybrid Beamforming. 1605-1619 - Cheng-Shang Chang

, Jang-Ping Sheu
, Yi-Jheng Lin
:
On the Theoretical Gap of Channel Hopping Sequences With Maximum Rendezvous Diversity in the Multichannel Rendezvous Problem. 1620-1633 - Bijoy Chand Chatterjee

, Abdul Wadud
, Imran Ahmed
, Eiji Oki
:
Priority-Based Inter-Core and Inter-Mode Crosstalk-Avoided Resource Allocation for Spectrally-Spatially Elastic Optical Networks. 1634-1647 - Balázs Vass

, János Tapolcai
, Erika R. Bérczi-Kovács
:
Enumerating Maximal Shared Risk Link Groups of Circular Disk Failures Hitting k Nodes. 1648-1661 - Yifei Zou

, Dongxiao Yu
, Jiguo Yu
, Yong Zhang
, Falko Dressler
, Xiuzhen Cheng
:
Distributed Byzantine-Resilient Multiple-Message Dissemination in Wireless Networks. 1662-1675 - Yuhui Zhang

, Dejun Yang
:
RobustPay+: Robust Payment Routing With Approximation Guarantee in Blockchain-Based Payment Channel Networks. 1676-1686 - Ning Li

, Zhaoxin Zhang, Alex X. Liu
, Xin Yuan
, Yexia Cheng
:
Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network. 1687-1702 - Christos Tsanikidis

, Javad Ghaderi
:
On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks. 1703-1716 - Si Chen

, Maolin Zhang
, Jia Zhao
, Wei Gong
, Jiangchuan Liu
:
Reliable and Practical Bluetooth Backscatter With Commodity Devices. 1717-1729 - Gayane Vardoyan

, C. V. Hollot, Don Towsley
:
Towards Stability Analysis of Data Transport Mechanisms: A Fluid Model and Its Applications. 1730-1744 - Qian Ma, Jianwei Huang

, Tamer Basar
, Ji Liu
, Xudong Chen:
Reputation and Pricing Dynamics in Online Markets. 1745-1759 - Jianan Zhang

, Abhishek Sinha
, Jaime Llorca
, Antonia M. Tulino
, Eytan H. Modiano:
Optimal Control of Distributed Computing Networks With Mixed-Cast Traffic Flows. 1760-1773 - Himaja Kesavareddigari

, Atilla Eryilmaz
:
Counter-Intuitive Characteristics of Rational Decision-Making Using Biased Inputs in Information Networks. 1774-1785 - Raimund Kirner

, Peter P. Puschner
:
A Quantitative Analysis of Interfaces to Time-Triggered Communication Buses. 1786-1797 - Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu

:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. 1798-1812 - Ming Tang

, Jianwei Huang
:
How Do You Earn Money on Live Streaming Platforms? - A Study of Donation-Based Markets. 1813-1826 - Ning Xie

, Hai Jun Tan
, Lei Huang
, Alex X. Liu
:
Physical-Layer Authentication in Wirelessly Powered Communication Networks. 1827-1840 - Haisheng Tan

, Shaofeng H.-C. Jiang
, Zhenhua Han
, Mingxia Li:
Asymptotically Optimal Online Caching on Multiple Caches With Relaying and Bypassing. 1841-1852 - Jing Hou

, Li Sun
, Tao Shu
, Husheng Li:
The Value of Traded Target Information in Security Games. 1853-1866 - Xi Huang

, Simeng Bian, Xin Gao
, Weijie Wu, Ziyu Shao
, Yang Yang
, John C. S. Lui
:
Online VNF Chaining and Predictive Scheduling: Optimality and Trade-Offs. 1867-1880 - Salvatore D'Oro

, Leonardo Bonati
, Francesco Restuccia
, Tommaso Melodia
:
Coordinated 5G Network Slicing: How Constructive Interference Can Boost Network Throughput. 1881-1894 - Di Wu

, He Xu
, Zhongkai Jiang
, Weiren Yu, Xuetao Wei
, Jiwu Lu:
EdgeLSTM: Towards Deep and Sequential Edge Computing for IoT Applications. 1895-1908
Volume 29, Number 5, October 2021
- Huy Quang Duong, Brigitte Jaumard

, David Coudert
, Romualdas Armolavicius:
Efficient Make-Before-Break Layer 2 Reoptimization. 1910-1921 - Dianqi Han

, Ang Li
, Lili Zhang
, Yan Zhang
, Jiawei Li
, Tao Li
, Ting Zhu, Yanchao Zhang
:
Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and Defense. 1922-1932 - Isfar Tariq

, Rajat Sen, Thomas David Novlan, Salam Akoum, Milap Majmundar, Gustavo de Veciana
, Sanjay Shakkottai
:
Auto-Tuning for Cellular Scheduling Through Bandit-Learning and Low-Dimensional Clustering. 1933-1947 - Gourav Saha

, Alhussein A. Abouzeid
:
Optimal Spectrum Partitioning and Licensing in Tiered Access Under Stochastic Market Models. 1948-1961 - Tasmeen Zaman Ornee

, Yin Sun
:
Sampling and Remote Estimation for the Ornstein-Uhlenbeck Process Through Queues: Age of Information and Beyond. 1962-1975 - Tian Pan

, Xingchen Lin, Enge Song, Cheng Xu, Jiao Zhang
, Hao Li
, Jianhui Lv, Tao Huang
, Bin Liu, Beichuan Zhang:
NB-Cache: Non-Blocking In-Network Caching for High-Performance Content Routers. 1976-1989 - Wei Sun, Lisong Xu

, Sebastian G. Elbaum
, Di Zhao:
Model-Agnostic and Efficient Exploration of Numerical Congestion Control State Space of Real-World TCP Implementations. 1990-2004 - Dai Zhang

, Yu Zhou
, Zhaowei Xi
, Yangyang Wang
, Mingwei Xu
, Jianping Wu:
HyperTester: High-Performance Network Testing Driven by Programmable Switches. 2005-2018 - Su Wang

, Yichen Ruan, Yuwei Tu, Satyavrat Wagle, Christopher G. Brinton
, Carlee Joe-Wong
:
Network-Aware Optimization of Distributed Learning for Fog Computing. 2019-2032 - I-Chieh Lin

, Yu-Hsuan Yeh
, Kate Ching-Ju Lin
:
Toward Optimal Partial Parallelization for Service Function Chaining. 2033-2044 - Zai Shi

, Atilla Eryilmaz
:
A Flexible Distributed Stochastic Optimization Framework for Concurrent Tasks in Processing Networks. 2045-2058 - Xuwei Yang

, Hongli Xu
, Shigang Chen
, He Huang
:
Indirect Multi-Mapping for Burstiness Management in Software Defined Networks. 2059-2072 - He Huang

, Yu-E Sun
, Chaoyi Ma
, Shigang Chen
, Yang Du
, Haibo Wang
, Qingjun Xiao:
Spread Estimation With Non-Duplicate Sampling in High-Speed Networks. 2073-2086 - Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

:
Preacher: Network Policy Checker for Adversarial Environments. 2087-2100 - Sergio Barrachina-Muñoz

, Boris Bellalta
, Edward W. Knightly
:
Wi-Fi Channel Bonding: An All-Channel System and Experimental Study From Urban Hotspots to a Sold-Out Stadium. 2101-2114 - Qixia Zhang

, Fangming Liu
, Chaobing Zeng:
Online Adaptive Interference-Aware VNF Deployment and Migration for 5G Network Slice. 2115-2128 - Ahmed M. Bedewy

, Yin Sun
, Rahul Singh
, Ness B. Shroff
:
Low-Power Status Updates via Sleep-Wake Scheduling. 2129-2141 - Dongxiao Yu

, Yifei Zou
, Jiguo Yu
, Yu Wu, Weifeng Lv
, Xiuzhen Cheng
, Falko Dressler
, Francis C. M. Lau:
Distributed Broadcasting in Dynamic Networks. 2142-2155 - Wenbin Liu

, Yongjian Yang
, En Wang
, Hengzhi Wang
, Zihe Wang, Jie Wu
:
Dynamic Online User Recruitment With (Non-) Submodular Utility in Mobile CrowdSensing. 2156-2169 - Hongzi Zhu

, Yuxiao Zhang, Zifan Liu, Xiao Wang
, Shan Chang
, Yingying Chen
:
Localizing Acoustic Objects on a Single Phone. 2170-2183 - Yuhang Ye

, Brian Lee, Ronan Flynn
, Jin Xu
, Guiming Fang, Yuansong Qiao
:
Delay-Based Network Utility Maximization Modelling for Congestion Control in Named Data Networking. 2184-2197 - Anastasios Giovanidis

, Bruno Baynat, Clémence Magnien
, Antoine Vendeville
:
Ranking Online Social Users by Their Influence. 2198-2214 - Ouri Poupko

, Gal Shahaf, Ehud Shapiro, Nimrod Talmon
:
Building a Sybil-Resilient Digital Community Utilizing Trust-Graph Connectivity. 2215-2227 - Hongbo Jiang

, Mengyuan Wang
, Ping Zhao
, Zhu Xiao
, Schahram Dustdar
:
A Utility-Aware General Framework With Quantifiable Privacy Preservation for Destination Prediction in LBSs. 2228-2241 - Jianghong Wei

, Xiaofeng Chen
, Jianfeng Ma
, Xuexian Hu
, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. 2242-2253 - Tianqi Yu

, Xianbin Wang
, Jianling Hu
:
A Fast Hierarchical Physical Topology Update Scheme for Edge-Cloud Collaborative IoT Systems. 2254-2266 - Zhenhua Han

, Haisheng Tan
, Shaofeng H.-C. Jiang
, Wanli Cao, Xiaoming Fu
, Lan Zhang
, Francis C. M. Lau:
SPIN: BSP Job Scheduling With Placement-Sensitive Execution. 2267-2280 - Federico Chiariotti

, Andrea Zanella
, Stepán Kucera, Kariem Fahmi, Holger Claussen
:
The HOP Protocol: Reliable Latency-Bounded End-to-End Multipath Communication. 2281-2295 - Luoyi Fu

, Jiasheng Xu
, Shan Qu
, Zhiying Xu, Xinbing Wang
, Guihai Chen
:
Seeking the Truth in a Decentralized Manner. 2296-2312 - Xin Yao

, Rui Zhang
, Dingquan Huang, Yanchao Zhang
:
Verifiable Query Processing Over Outsourced Social Graph. 2313-2326 - Liyang Sun

, Tongyu Zong
, Siquan Wang, Yong Liu
, Yao Wang
:
Towards Optimal Low-Latency Live Video Streaming. 2327-2338 - Zain Shamsi

, Daren B. H. Cline
, Dmitri Loguinov
:
Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting. 2339-2352 - Nicola Cordeschi

, Floriano De Rango
, Mauro Tropea
:
Exploiting an Optimal Delay-Collision Tradeoff in CSMA-Based High-Dense Wireless Systems. 2353-2366 - Jinbin Hu

, Jiawei Huang
, Wenjun Lyu
, Weihe Li
, Zhaoyi Li
, Wenchao Jiang
, Jianxin Wang, Tian He
:
Adjusting Switching Granularity of Load Balancing for Heterogeneous Datacenter Traffic. 2367-2384
Volume 29, Number 6, December 2021
- Ran Ben-Basat, Gil Einziger

, Shir Landau Feibish
, Jalil Moraney, Bilal Tayh
, Danny Raz:
Routing-Oblivious Network-Wide Measurements. 2386-2398 - Víctor Valls

, George Iosifidis
, Leandros Tassiulas:
Birkhoff's Decomposition Revisited: Sparse Scheduling for High-Speed Circuit Switches. 2399-2412 - Ajay Badita

, Parimal Parag
, Vaneet Aggarwal
:
Single-Forking of Coded Subtasks for Straggler Mitigation. 2413-2424 - Melih Bastopcu

, Sennur Ulukus
:
Age of Information for Updates With Distortion: Constant and Age-Dependent Distortion Constraints. 2425-2438 - Mohammad Jahanian

, Jiachen Chen, K. K. Ramakrishnan
:
Graph-Based Namespaces and Load Sharing for Efficient Information Dissemination. 2439-2452 - Van Sy Mai

, Richard J. La
, Abdella Battou
:
Optimal Cybersecurity Investments in Large Networks Using SIS Model: Algorithm Design. 2453-2466 - Mahdieh Ahmadi

, Morteza Golkarifard
, Ali Movaghar
, Hamed Yousefi
:
Processor Sharing Queues With Impatient Customers and State-Dependent Rates. 2467-2477 - Chi Lin

, Ziwei Yang, Haipeng Dai
, Liangxian Cui, Lei Wang
, Guowei Wu
:
Minimizing Charging Delay for Directional Charging. 2478-2493 - Zun Yan

, Peng Cheng
, Zhuo Chen
, Branka Vucetic
, Yonghui Li
:
Two-Dimensional Task Offloading for Mobile Networks: An Imitation Learning Framework. 2494-2507 - Kan Yu

, Jiguo Yu
, Xiuzhen Cheng
, Dongxiao Yu
, Anming Dong
:
Efficient Link Scheduling Solutions for the Internet of Things Under Rayleigh Fading. 2508-2521 - Beatriz Lorenzo

, Francisco Javier González-Castaño
, Linke Guo
, Felipe J. Gil-Castiñeira
, Yuguang Fang
:
Autonomous Robustness Control for Fog Reinforcement in Dynamic Wireless Networks. 2522-2535 - Giovanni Neglia

, Emilio Leonardi
, Guilherme Iecker Ricardo
, Thrasyvoulos Spyropoulos:
A Swiss Army Knife for Online Caching in Small Cell Networks. 2536-2547 - Vamseedhar R. Reddyvari

, Sarat Chandra Bobbili
, Parimal Parag
, Srinivas Shakkottai
:
Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks. 2548-2559 - Tom Barbette

, Cyril Soldani, Laurent Mathy:
Combined Stateful Classification and Session Splicing for High-Speed NFV Service Chaining. 2560-2573 - Panagiotis Promponas

, Christos Pelekis, Eirini-Eleni Tsiropoulou
, Symeon Papavassiliou
:
Games in Normal and Satisfaction Form for Efficient Transmission Power Allocation Under Dual 5G Wireless Multiple Access Paradigm. 2574-2587 - Ravi Kiran Raman

, Lav R. Varshney
:
Coding for Scalable Blockchains via Dynamic Distributed Storage. 2588-2601 - Xuying Meng

, Yequan Wang
, Suhang Wang
, Di Yao
, Yujun Zhang
:
Interactive Anomaly Detection in Dynamic Communication Networks. 2602-2615 - Deliang Yang

, Xuan Huang
, Jun Huang
, Xiangmao Chang
, Guoliang Xing
, Yang Yang
:
A First Look at Energy Consumption of NB-IoT in the Wild: Tools and Large-Scale Measurement. 2616-2631 - Xianjin Xia

, Yuanqing Zheng
, Tao Gu
:
LiteNap: Downclocking LoRa Reception. 2632-2645 - Shrayan Das

, Kirtan Gopal Panda, Debarati Sen
, Wasim Arif
:
Maximizing Last-Minute Backup in Endangered Time-Varying Inter-Datacenter Networks. 2646-2663 - Xingpeng Fan

, Hongli Xu, He Huang
, Xuwei Yang
:
Real-Time Update of Joint SFC and Routing in Software Defined Networks. 2664-2677 - Tong Li

, Kai Zheng, Ke Xu
, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein
, Kun Tan:
Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation. 2678-2692 - Ying Wan

, Haoyu Song
, Yang Xu
, Yilun Wang, Tian Pan
, Chuwen Zhang
, Yi Wang
, Bin Liu
:
T-Cache: Efficient Policy-Based Forwarding Using Small TCAM. 2693-2708 - Vignesh Sivaraman

, Biplab Sikdar
:
A Defense Mechanism Against Timing Attacks on User Privacy in ICN. 2709-2722 - Mohammed Alasmar

, George Parisis
, Jon Crowcroft
:
SCDP: Systematic Rateless Coding for Efficient Data Transport in Data Centers. 2723-2736 - Jiazheng Tian, Kun Xie

, Xin Wang
, Gaogang Xie
, Kenli Li
, Jigang Wen, Dafang Zhang, Jiannong Cao
:
Efficiently Inferring Top-k Largest Monitoring Data Entries Based on Discrete Tensor Completion. 2737-2750 - Yuanyuan Li

, Stratis Ioannidis
:
Cache Networks of Counting Queues. 2751-2764 - Xinyi Zhang

, Gaogang Xie
, Xin Wang
, Penghao Zhang, Yanbiao Li
, Kavé Salamatian
:
Fast Online Packet Classification With Convolutional Neural Network. 2765-2778 - Tao Hou

, Tao Wang
, Zhuo Lu
, Yao Liu
:
Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation. 2779-2792 - Mingli Yu

, Tian Xie
, Ting He
, Patrick D. McDaniel, Quinn K. Burke
:
Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks. 2793-2806 - Wei Wang

, Xin Liu
, Yao Yao, Zicheng Chi
, Yan Pan, Ting Zhu:
Coexistent Routing and Flooding Using WiFi Packets in Heterogeneous IoT Network. 2807-2819 - Teng Liang

, Junxiao Shi
, Yi Wang
, Beichuan Zhang:
On the Prefix Granularity Problem in NDN Adaptive Forwarding. 2820-2833 - Romano Fantacci

, Tommaso Pecorella
, Benedetta Picano
, Laura Pierucci
:
Martingale Theory Application to the Delay Analysis of a Multi-Hop Aloha NOMA Scheme in Edge Computing Systems. 2834-2842 - Richard T. B. Ma

:
Internet Transport Economics: Model and Analysis. 2843-2854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














