


default search action
IEEE/ACM Transactions on Networking, Volume 27
Volume 27, Number 1, February 2019
- Wei Dong

, Chenhong Cao
, Xiaoyu Zhang, Yi Gao
:
Understanding Path Reconstruction Algorithms in Multihop Wireless Networks. 1-14 - Alireza Shams Shafigh

, Savo Glisic, Ekram Hossain
, Beatriz Lorenzo
, Luiz A. DaSilva
:
User-Centric Distributed Spectrum Sharing in Dynamic Network Architectures. 15-28 - Siddhartha S. Borkotoky

, Michael B. Pursley
:
Fountain-Coded Broadcast Distribution in Multiple-Hop Packet Radio Networks. 29-41 - Jihong Yu

, Wei Gong, Jiangchuan Liu
, Lin Chen, Kehao Wang
:
On Efficient Tree-Based Tag Search in Large-Scale RFID Systems. 42-55 - Alain Pegatoquet

, Trong Nhan Le, Michele Magno
:
A Wake-Up Radio-Based MAC Protocol for Autonomous Wireless Sensor Networks. 56-70 - Wahhab Albazrqaoe

, Jun Huang
, Guoliang Xing:
A Practical Bluetooth Traffic Sniffing System: Design, Implementation, and Countermeasure. 71-84 - Sladana Josilo

, György Dán
:
Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems. 85-97 - Guoming Tang

, Huan Wang, Kui Wu
, Deke Guo:
Tapping the Knowledge of Dynamic Traffic Demands for Optimal CDN Design. 98-111 - John Tadrous

, Atilla Eryilmaz
, Ashutosh Sabharwal
:
Action-Based Scheduling: Leveraging App Interactivity for Scheduler Efficiency. 112-125 - Jiaqi Liu, Luoyi Fu

, Yuhang Yao
, Xinzhe Fu, Xinbing Wang
, Guihai Chen
:
Modeling, Analysis and Validation of Evolving Networks With Hybrid Interactions. 126-142 - Qingjun Xiao

, Shigang Chen
, Jia Liu, Guang Cheng, Junzhou Luo:
A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System. 143-158 - Jia Liu

, Shigang Chen
, Qingjun Xiao, Min Chen
, Bin Xiao
, Lijun Chen:
Efficient Information Sampling in Multi-Category RFID Systems. 159-172 - Peng Zhang, Cheng Zhang, Chengchen Hu:

Fast Data Plane Testing for Software-Defined Networks With RuleChecker. 173-186 - Wenping Liu

, Hongbo Jiang
, Guoyin Jiang, Jiangchuan Liu
, Xiaoqiang Ma
, Yufu Jia, Fu Xiao
:
Indoor Navigation With Virtual Graph Representation: Exploiting Peak Intensities of Unmodulated Luminaries. 187-200 - Xiaofeng Gao

, Yuanning Gao
, Yichen Zhu
, Guihai Chen
:
U2-Tree: A Universal Two-Layer Distributed Indexing Scheme for Cloud Storage System. 201-213 - Yong Cui

, Yimin Jiang, Zeqi Lai, Xiaomeng Chen, Y. Charlie Hu, Kun Tan, Minglong Dai, Kai Zheng, Yi Li
:
Wireless Network Instabilities in the Wild: Measurement, Applications (Non)Resilience, and OS Remedy. 214-230 - Xu Zhang

, Edward W. Knightly
:
$CSIsnoop$ : Inferring Channel State Information in Multi-User MIMO WLANs. 231-244 - Linsong Cheng

, Jiliang Wang
:
Walls Have No Ears: A Non-Intrusive WiFi-Based User Identification System for Mobile Devices. 245-257 - Yigal Bejerano, Chandrashekhar Raman, Chun-Nam Yu, Varun Gupta

, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman
:
DyMo: Dynamic Monitoring of Large-Scale LTE-Multicast Systems. 258-271 - Jianer Zhou

, Zhenyu Li
, Qinghua Wu
, Peter Steenkiste
, Steve Uhlig
, Jun Li, Gaogang Xie
:
TCP Stalls at the Server Side: Measurement and Mitigation. 272-287 - Konstantinos Poularakis

, George Iosifidis
, Georgios Smaragdakis
, Leandros Tassiulas:
Optimizing Gradual SDN Upgrades in ISP Networks. 288-301 - Per Hurtig

, Karl-Johan Grinnemo, Anna Brunström, Simone Ferlin
, Ozgu Alay
, Nicolas Kuhn
:
Low-Latency Scheduling in MPTCP. 302-315 - Ali Maatouk

, Mohamad Assaad
, Anthony Ephremides:
Energy Efficient and Throughput Optimal CSMA Scheme. 316-329 - Meng Jin, Yuan He

, Xin Meng, Yilun Zheng, Dingyi Fang, Xiaojiang Chen
:
FlipTracer: Practical Parallel Decoding for Backscatter Communication. 330-343 - Zhenhua Han

, Haisheng Tan
, Rui Wang
, Guihai Chen
, Yupeng Li
, Francis C. M. Lau:
Energy-Efficient Dynamic Virtual Machine Management in Data Centers. 344-360 - Chengwen Luo

, Xiao Liu, Wanli Xue, Yiran Shen
, Jianqiang Li
, Wen Hu
, Alex X. Liu
:
Predictable Privacy-Preserving Mobile Crowd Sensing: A Tale of Two Roles. 361-374 - Yahui Sun

, Marcus Brazil
, Doreen A. Thomas
, Saman K. Halgamuge:
The Fast Heuristic Algorithms and Post-Processing Techniques to Design Large and Low-Cost Communication Networks. 375-388 - Sen Liu

, Jiawei Huang
, Yutao Zhou, Jianxin Wang
, Tian He
:
Task-Aware TCP in Data Center Networks. 389-404 - Taha Bouchoucha

, Chen-Nee Chuah
, Zhi Ding
:
Topology Inference of Unknown Networks Based on Robust Virtual Coordinate Systems. 405-418 - David Lynch

, Michael Fenton, David Fagan, Stepán Kucera, Holger Claussen
, Michael O'Neill:
Automated Self-Optimization in Heterogeneous Wireless Communications Networks. 419-432 - Satyam Agarwal

, Francesco Malandrino
, Carla-Fabiana Chiasserini
, Swades De
:
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks. 433-446 - Li Lu

, Jiadi Yu
, Yingying Chen
, Hongbo Liu
, Yanmin Zhu
, Linghe Kong
, Minglu Li:
Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones. 447-460
Volume 27, Number 2, April 2019
- Oladele Theophilus Sule

, Roberto Rojas-Cessa
, Ziqian Dong
, Chuan-Bi Lin:
A Split-Central-Buffered Load-Balancing Clos-Network Switch With In-Order Forwarding. 467-476 - Mostafa Dehghan

, Weibo Chu
, Philippe Nain
, Don Towsley
, Zhi-Li Zhang:
Sharing Cache Resources Among Content Providers: A Utility-Based Approach. 477-490 - Chang-Heng Wang

, Jaime Llorca
, Antonia M. Tulino
, Tara Javidi
:
Dynamic Cloud Network Control Under Reconfiguration Delay and Cost. 491-504 - Vijay S. Rao

, R. Venkatesha Prasad
, Tamma V. Prabhakar, Chayan Sarkar
, Madhusudan Koppal, Ignas G. Niemegeers:
Understanding and Improving the Performance of Constructive Interference Using Destructive Interference in WSNs. 505-517 - Xianjin Xia

, ShiNing Li, Yu Zhang
, Bingqi Li
, Yuanqing Zheng
, Tao Gu
:
Enabling Out-of-Band Coordination of Wi-Fi Communications on Smartphones. 518-531 - Irem Koprulu

, Yoora Kim
, Ness B. Shroff:
Battle of Opinions Over Evolving Social Networks. 532-545 - Liang Song

, Chunyan Liu, Hejiao Huang
, Hongwei Du
, Xiaohua Jia
:
Minimum Connected Dominating Set Under Routing Cost Constraint in Wireless Sensor Networks With Different Transmission Ranges. 546-559 - Ahmed Osama Fathy Atya

, Zhiyun Qian
, Srikanth V. Krishnamurthy
, Thomas La Porta
, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. 560-576 - Vaibhav Bajpai

, Jürgen Schönwälder
:
A Longitudinal View of Dual-Stacked Websites - Failures, Latency and Happy Eyeballs. 577-590 - Balint Tillman

, Athina Markopoulou
, Minas Gjoka, Carter T. Butts:
2K+ Graph Construction Framework: Targeting Joint Degree Matrix and Beyond. 591-606 - S. Ramakrishnan

, Venkatesh Ramaiyan:
Completely Uncoupled Algorithms for Network Utility Maximization. 607-620 - Xin Li

, Minmei Wang, Huazhe Wang
, Ye Yu
, Chen Qian:
Toward Secure and Efficient Communication for the Internet of Things. 621-634 - Roman Naumann

, Stefan Dietzel
, Björn Scheuermann:
Push the Barrier: Discrete Event Protocol Emulation. 635-648 - Xiang Li

, J. David Smith, Thang N. Dinh
, My T. Thai
:
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks. 649-661 - Pablo Caballero Garces

, Albert Banchs
, Gustavo de Veciana
, Xavier Pérez Costa
:
Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks. 662-675 - Ming-Chun Lee

, Andreas F. Molisch
, Nishanth Sastry
, Aravindh Raman
:
Individual Preference Probability Modeling and Parameterization for Video Content in Wireless Caching Networks. 676-690 - Yehuda Afek, Anat Bremler-Barr

, Shir Landau Feibish
:
Zero-Day Signature Extraction for High-Volume Attacks. 691-706 - Cataldo Basile

, Fulvio Valenza
, Antonio Lioy
, Diego R. López
, Antonio Pastor Perales
:
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. 707-720 - Hui Cui

, Robert H. Deng
, Guilin Wang:
An Attribute-Based Framework for Secure Communications in Vehicular Ad Hoc Networks. 721-733 - Bijoy Chand Chatterjee

, Fujun He
, Eiji Oki
, Andrea Fumagalli, Naoaki Yamanaka:
A Span Power Management Scheme for Rapid Lightpath Provisioning and Releasing in Multi-Core Fiber Networks. 734-747 - Qingjun Xiao

, Youlin Zhang
, Shigang Chen
, Min Chen, Jia Liu, Guang Cheng, Junzhou Luo:
Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System. 748-762 - Peshal Nayak

, Michele Garetto
, Edward W. Knightly
:
Modeling Multi-User WLANs Under Closed-Loop Traffic. 763-776 - Chavoosh Ghasemi

, Hamed Yousefi
, Kang G. Shin
, Beichuan Zhang:
On the Granularity of Trie-Based Data Structures for Name Lookups and Updates. 777-789 - Shih-Hao Tseng

, Ao Tang
, Gagan L. Choudhury, Simon Tse:
Routing Stability in Hybrid Software-Defined Networks. 790-804 - Kai Gao

, Qiao Xiang
, Xin Wang, Yang Richard Yang, Jun Bi
:
An Objective-Driven On-Demand Network Abstraction for Adaptive Applications. 805-818 - Qiongzheng Lin

, Lei Yang
, Chunhui Duan
, Zhenlin An
:
Tash: Toward Selective Reading as Hash Primitives for Gen2 RFIDs. 819-834 - Abubakr O. Al-Abbasi

, Vaneet Aggarwal
, Moo-Ryong Ra
:
Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems. 835-847 - Qian Wang

, Jing Huang, Yanjiao Chen
, Xin Tian, Qian Zhang
:
Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum. 848-861 - Kunal Phalak, D. Manjunath

, Jayakrishnan Nair
:
Zero Rating: The Power in the Middle. 862-874 - Josu Doncel

, Samuli Aalto
, Urtzi Ayesta:
Performance Degradation in Parallel-Server Systems. 875-888 - Shuihai Hu

, Yibo Zhu, Peng Cheng
, Chuanxiong Guo
, Kun Tan, Jitendra Padhye, Kai Chen
:
Tagger: Practical PFC Deadlock Prevention in Data Center Networks. 889-902
Volume 27, Number 3, June 2019
- Michael J. Neely

:
Convergence and Adaptation for Utility Optimal Opportunistic Scheduling. 904-917 - Giovanni Chisci

, Hesham ElSawy
, Andrea Conti
, Mohamed-Slim Alouini
, Moe Z. Win
:
Uncoordinated Massive Wireless Networks: Spatiotemporal Models and Multiaccess Strategies. 918-931 - Zicheng Chi

, Yan Li, Hongyu Sun, Yao Yao, Ting Zhu:
Concurrent Cross-Technology Communication Among Heterogeneous IoT Devices. 932-947 - Jia Liu

, Bin Xiao
, Xuan Liu, Kai Bu
, Lijun Chen
, Changhai Nie:
Efficient Polling-Based Information Collection in RFID Systems. 948-961 - Abbas Kiani

, Nirwan Ansari
, Abdallah Khreishah
:
Hierarchical Capacity Provisioning for Fog Computing. 962-971 - Jiaxi Gu

, Jiliang Wang, Zhiwen Yu
, Kele Shen:
Traffic-Based Side-Channel Attack in Video Streaming. 972-985 - Meng Zhang, Lin Gao

, Jianwei Huang
, Michael L. Honig:
Hybrid Pricing for Mobile Collaborative Internet Access. 986-999 - Marco Di Bartolomeo

, Valentino Di Donato, Maurizio Pizzonia
, Claudio Squarcella, Massimo Rimondini
:
Extracting Routing Events From Traceroutes: A Matter of Empathy. 1000-1012 - Mostafa Dehghan

, Laurent Massoulié, Don Towsley
, Daniel Sadoc Menasché, Y. C. Tay
:
A Utility Optimization Approach to Network Cache Design. 1013-1027 - Tie Qiu

, Jie Liu, Weisheng Si
, Dapeng Oliver Wu
:
Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks. 1028-1042 - Semih Cayci

, Atilla Eryilmaz
:
Optimal Learning for Dynamic Coding in Deadline-Constrained Multi-Channel Networks. 1043-1054 - Linghe Kong

, Yifeng Cao, Liang He
, Guihai Chen
, Min-You Wu
, Tian He
:
Multi-Rate Selection in ZigBee. 1055-1068 - Wenchao Jiang

, Zhimeng Yin, Ruofeng Liu
, Zhijun Li
, Song Min Kim
, Tian He
:
Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices. 1069-1083 - Hirotada Honda

, Hiroshi Saito
:
Nation-Wide Disaster Avoidance Control Against Heavy Rain. 1084-1097 - Zongzong Lin

, Wenlian Lu, Shouhuai Xu
:
Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. 1098-1111 - Kung-Jui Pai

, Jou-Ming Chang
:
Dual-CISTs: Configuring a Protection Routing on Some Cayley Networks. 1112-1123 - Zonghui Li

, Hai Wan
, Zaiyu Pang, Qiubo Chen, Yangdong Deng, Xibin Zhao, Yue Gao
, Xiaoyu Song, Ming Gu:
An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks. 1124-1137 - Anis Elgabli

, Muhamad Felemban
, Vaneet Aggarwal
:
GroupCast: Preference-Aware Cooperative Video Streaming With Scalable Video Coding. 1138-1150 - Duong Tung Nguyen

, Long Bao Le
, Vijay K. Bhargava:
A Market-Based Framework for Multi-Resource Allocation in Fog Computing. 1151-1164 - Federico Chiariotti

, Stepán Kucera, Andrea Zanella
, Holger Claussen
:
Analysis and Design of a Latency Control Protocol for Multi-Path Data Delivery With Pre-Defined QoS Guarantees. 1165-1178 - Xiulong Liu

, Jiannong Cao, Yanni Yang, Wenyu Qu
, Xibin Zhao, Keqiu Li, Didi Yao:
Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs. 1179-1191 - Thi-Minh Nguyen

, André Girard
, Catherine Rosenberg
, Serge Fdida:
Routing via Functions in Virtual Networks: The Curse of Choices. 1192-1205 - Jaehyun Nam

, Hyeonseong Jo
, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin
:
Operator-Defined Reconfigurable Network OS for Software-Defined Networks. 1206-1219 - Kaiping Xue

, Peixuan He, Xiang Zhang, Qiudong Xia, David S. L. Wei, Hao Yue
, Feng Wu:
A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks. 1220-1233 - Junjie Xie

, Deke Guo
, Chen Qian, Lei Liu, Bangbang Ren, Honghui Chen:
Validation of Distributed SDN Control Plane Under Uncertain Failures. 1234-1247 - Ahmed M. Bedewy

, Yin Sun
, Ness B. Shroff:
The Age of Information in Multihop Networks. 1248-1257 - Han Deng

, Tao Zhao
, I-Hong Hou
:
Online Routing and Scheduling With Capacity Redundancy for Timely Delivery Guarantees in Multihop Networks. 1258-1271 - Shiqiang Wang

, Rahul Urgaonkar, Murtaza Zafer, Ting He
, Kevin Chan
, Kin K. Leung:
Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process. 1272-1288 - Giuseppe Enrico Santagati, Tommaso Melodia

:
Corrections to "A Software-Defined Ultrasonic Networking Framework for Wearable Devices". 1289
Volume 27, Number 4, August 2019
- Giovanni Chisci

, Andrea Conti
, Lorenzo Mucchi
, Moe Z. Win
:
Intrinsic Secrecy in Inhomogeneous Stochastic Networks. 1291-1304 - Anvitha Nandigam, Suraj Jog

, D. Manjunath
, Jayakrishnan Nair
, Balakrishna J. Prabhu:
Sharing Within Limits: Partial Resource Pooling in Loss Systems. 1305-1318 - Tianheng Wang

, Andrea Conti
, Moe Z. Win
:
Network Navigation With Scheduling: Distributed Algorithms. 1319-1329 - Chien-Sheng Yang

, Ramtin Pedarsani
, Amir Salman Avestimehr:
Communication-Aware Scheduling of Serial Tasks for Dispersed Computing. 1330-1343 - George Trimponias

, Yan Xiao
, Xiaorui Wu
, Hong Xu
, Yanhui Geng
:
Node-Constrained Traffic Engineering: Theory and Applications. 1344-1358 - Igor Kadota

, Abhishek Sinha
, Eytan H. Modiano:
Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints. 1359-1372 - Shengchao Liu

, Jianping Weng, Jessie Hui Wang
, Changqing An
, Yipeng Zhou
, Jilong Wang:
An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm. 1373-1386 - Bruno Yuji Lino Kimura

, Demetrius C. S. F. Lima
, Leandro A. Villas
, Antonio A. F. Loureiro
:
Interpath Contention in MultiPath TCP Disjoint Paths. 1387-1400 - Vishal Shrivastav

, Ki Suh Lee
, Han Wang, Hakim Weatherspoon:
Globally Synchronized Time via Datacenter Networks. 1401-1416 - James Daly, Valerio Bruschi

, Leonardo Linguaglossa, Salvatore Pontarelli
, Dario Rossi
, Jerome Tollet
, Eric Torng
, Andrew Yourtchenko:
TupleMerge: Fast Software Packet Processing for Online Packet Classification. 1417-1431 - Ran Ben Basat, Xiaoqi Chen

, Gil Einziger
, Roy Friedman
, Yaron Kassner
:
Randomized Admission Policy for Efficient Top-k, Frequency, and Volume Estimation. 1432-1445 - Yahia Shabara

, C. Emre Koksal, Eylem Ekici
:
Beam Discovery Using Linear Block Codes for Millimeter Wave Communication Networks. 1446-1459 - Zhizhen Zhong

, Nan Hua, Massimo Tornatore, Jialong Li
, Yanhe Li, Xiaoping Zheng
, Biswanath Mukherjee
:
Provisioning Short-Term Traffic Fluctuations in Elastic Optical Networks. 1460-1473 - Miroslaw Klinkowski

, Krzysztof Walkowiak
:
An Efficient Optimization Framework for Solving RSSA Problems in Spectrally and Spatially Flexible Optical Networks. 1474-1486 - Jie Chuai

, Victor O. K. Li
:
An Analytical Framework for Resource Allocation Between Data and Delayed Network State Information. 1487-1500 - Hao Yu

, Michael J. Neely:
Learning-Aided Optimization for Energy-Harvesting Devices With Outdated State Information. 1501-1514 - Xiaonan Zhang

, Pei Huang
, Linke Guo
, Yuguang Fang
:
Social-Aware Energy-Efficient Data Offloading With Strong Stability. 1515-1528 - Thibaut Stimpfling

, Normand Bélanger, J. M. Pierre Langlois
, Yvon Savaria
:
SHIP: A Scalable High-Performance IPv6 Lookup Algorithm That Exploits Prefix Characteristics. 1529-1542 - Vincenzo Sciancalepore

, Xavier Costa-Pérez
, Albert Banchs
:
RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker. 1543-1557 - Yuedong Xu

, Zhujun Xiao, Tianyu Ni, Jessie Hui Wang
, Xin Wang, Eitan Altman:
On The Robustness of Price-Anticipating Kelly Mechanism. 1558-1571 - Arjun Bakshi

, Lu Chen, Kannan Srinivasan, C. Emre Koksal, Atilla Eryilmaz
:
EMIT: An Efficient MAC Paradigm for the Internet of Things. 1572-1583 - Cheng-Shang Chang

, Duan-Shin Lee
, Chun Wang:
Asynchronous Grant-Free Uplink Transmissions in Multichannel Wireless Networks With Heterogeneous QoS Guarantees. 1584-1597 - Yongquan Fu

, Dongsheng Li
, Pere Barlet-Ros
, Chun Huang, Zhen Huang, Siqi Shen
, Huayou Su:
A Skewness-Aware Matrix Factorization Approach for Mesh-Structured Cloud Services. 1598-1611 - Yong Cui

, Ningwei Dai, Zeqi Lai
, Minming Li
, Zhenhua Li
, Yuming Hu, Kui Ren, Yuchi Chen:
TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints. 1612-1628 - Ahmed Boubrima

, Walid Bechkit, Hervé Rivano
:
On the Deployment of Wireless Sensor Networks for Air Quality Mapping: Optimization Models and Algorithms. 1629-1642 - Ziyao Zhang

, Liang Ma
, Kin K. Leung, Franck Le, Sastry Kompella
, Leandros Tassiulas
:
How Advantageous Is It? An Analytical Study of Controller-Assisted Path Construction in Distributed SDN. 1643-1656 - Arpan Mukhopadhyay

, Nidhi Hegde
, Marc Lelarge:
Asymptotics of Replication and Matching in Large Caching Systems. 1657-1668 - Junyang Shi

, Mo Sha
, Zhicheng Yang
:
Distributed Graph Routing and Scheduling for Industrial Wireless Sensor-Actuator Networks. 1669-1682 - Nikolaos Liakopoulos

, Georgios S. Paschos, Thrasyvoulos Spyropoulos:
Robust Optimization Framework for Proactive User Association in UDNs: A Data-Driven Approach. 1683-1695 - Christos Liaskos

, Ageliki Tsioliaridou, Shuai Nie
, Andreas Pitsillides
, Sotiris Ioannidis, Ian F. Akyildiz
:
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments. 1696-1713 - Yu Zhou

, Jun Bi
, Cheng Zhang, Bingyang Liu
, Zhaogeng Li, Yangyang Wang
, Mingli Yu
:
P4DB: On-the-Fly Debugging for Programmable Data Planes. 1714-1727 - Siddhartha Satpathi

, Supratim Deb, R. Srikant, He Yan:
Learning Latent Events From Network Message Logs. 1728-1741 - Fujun He

, Takehiro Sato
, Eiji Oki
:
Optimization Model for Backup Resource Allocation in Middleboxes With Importance. 1742-1755 - Francesco Malandrino

, Carla-Fabiana Chiasserini
, Claudio Casetti
, Giada Landi
, Marco Capitani:
An Optimization-Enhanced MANO for Energy-Efficient 5G Networks. 1756-1769
Volume 27, Number 5, October 2019
- Haisheng Tan

, Shaofeng H.-C. Jiang
, Yupeng Li
, Xiang-Yang Li
, Chenzi Zhang, Zhenhua Han
, Francis Chi-Moon Lau:
Joint Online Coflow Routing and Scheduling in Data Center Networks. 1771-1786 - Cesar Ghali

, Gene Tsudik
, Ersin Uzun
:
In Content We Trust: Network-Layer Trust in Content-Centric Networking. 1787-1800 - Huikang Li, Yi Gao

, Wei Dong
, Chun Chen:
Preferential Link Tomography in Dynamic Networks. 1801-1814 - Pan Zhou

, Jie Xu
, Wei Wang
, Yuchong Hu, Dapeng Oliver Wu
, Shouling Ji:
Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack. 1815-1829 - Majid Khabbazian

, Keyvan Gharouni Saffar:
The Gain of Energy Accumulation in Multi-Hop Wireless Network Broadcast. 1830-1844 - Tong Yang

, Haowei Zhang, Jinyang Li
, Junzhi Gong
, Steve Uhlig
, Shigang Chen, Xiaoming Li:
HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows. 1845-1858 - Jiaqi Zheng

, Hong Xu
, Xiaojun Zhu
, Guihai Chen
, Yanhui Geng
:
Sentinel: Failure Recovery in Centralized Traffic Engineering. 1859-1872 - Xiulong Liu

, Xin Xie
, Shangguang Wang
, Jia Liu, Didi Yao, Jiannong Cao, Keqiu Li
:
Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems. 1873-1886 - Qing He

, György Dán
, Viktoria Fodor
:
Joint Assignment and Scheduling for Minimizing Age of Correlated Information. 1887-1900 - Dalia Popescu

, Philippe Jacquet, Bernard Mans
, Robert Dumitru, Andra Pastrav
, Emanuel Puschita
:
Information Dissemination Speed in Delay Tolerant Urban Vehicular Networks in a Hyperfractal Setting. 1901-1914 - H. V. Kalpanie Mendis

, Indika A. M. Balapuwaduge
, Frank Y. Li
:
Dependability-Based Reliability Analysis in URC Networks: Availability in the Space Domain. 1915-1930 - Ruozhou Yu

, Guoliang Xue
, Xiang Zhang
:
Provisioning QoS-Aware and Robust Applications in Internet of Things: A Network Perspective. 1931-1944 - Xiangyang Li

, Huiqi Liu
, Lan Zhang
, Zhenan Wu
, Yaochen Xie, Ge Chen, Chunxiao Wan, Zhongwei Liang:
Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint. 1945-1958 - Xiaowen Gong

, Ness B. Shroff:
Truthful Mobile Crowdsensing for Strategic Users With Private Data Quality. 1959-1972 - Zhenjie Yang

, Yong Cui
, Xin Wang
, Yadong Liu, Minming Li
, Shihan Xiao, Chuming Li:
Cost-Efficient Scheduling of Bulk Transfers in Inter-Datacenter WANs. 1973-1986 - Pablo Garrido

, Douglas J. Leith
, Ramón Agüero
:
Joint Scheduling and Coding for Low In-Order Delivery Delay Over Lossy Paths With Delayed Feedback. 1987-2000 - Arjun Roy

, Rajdeep Das
, Hongyi Zeng
, Jasmeet Bagga, Alex C. Snoeren
:
Understanding the Limits of Passive Realtime Datacenter Fault Detection and Localization. 2001-2014 - Xuya Jia

, Dan Li, Jing Zhu
, Yong Jiang:
Metro: An Efficient Traffic Fast Rerouting Scheme With Low Overhead. 2015-2027 - Christos Pappas

, Taeho Lee, Raphael M. Reischuk, Pawel Szalachowski
, Adrian Perrig
:
Network Transparency for Better Internet Security. 2028-2042 - Kang Yang, Tianzhang Xing, Yang Liu

, Zhenjiang Li
, Xiaoqing Gong, Xiaojiang Chen
, Dingyi Fang:
cDeepArch: A Compact Deep Neural Network Architecture for Mobile Sensing. 2043-2055 - Reza Motamedi, Bahador Yeganeh

, Balakrishnan Chandrasekaran
, Reza Rejaie, Bruce M. Maggs, Walter Willinger
:
On Mapping the Interconnections in Today's Internet. 2056-2070 - Matthias Rost

, Stefan Schmid
:
Virtual Network Embedding Approximations: Leveraging Randomized Rounding. 2071-2084 - Mikhail Hayhoe

, Fady Alajaji
, Bahman Gharesifard
:
Curing Epidemics on Networks Using a Polya Contagion Model. 2085-2097 - Reuven Cohen

, Yuval Nezri
:
Cardinality Estimation in a Virtualized Network Device Using Online Machine Learning. 2098-2110 - George Darzanos

, Iordanis Koutsopoulos
, George D. Stamoulis:
Cloud Federations: Economics, Games and Benefits. 2111-2124 - Luca Baldesi

, Athina Markopoulou
, Carter T. Butts:
Spectral Graph Forge: A Framework for Generating Synthetic Graphs With a Target Modularity. 2125-2136 - Benny Van Houdt

:
Randomized Work Stealing Versus Sharing in Large-Scale Systems With Non-Exponential Job Sizes. 2137-2149 - Kate Ching-Ju Lin

, Kai-Cheng Hsu, Hung-Yu Wei
:
Inter-Client Interference Cancellation for Full-Duplex Networks With Half-Duplex Clients. 2150-2163 - Kaiming Shen

, Wei Yu
, Licheng Zhao, Daniel P. Palomar
:
Optimization of MIMO Device-to-Device Networks via Matrix Fractional Programming: A Minorization-Maximization Approach. 2164-2177
Volume 27, Number 6, December 2019
- Alex X. Liu

, Eric Norige:
A De-Compositional Approach to Regular Expression Matching for Network Security. 2179-2191 - Orly Avner

, Shie Mannor
:
Multi-User Communication Networks: A Coordinated Multi-Armed Bandit Approach. 2192-2207 - Haiming Jin

, Baoxiang He, Lu Su
, Klara Nahrstedt
, Xinbing Wang
:
Data-Driven Pricing for Sensing Effort Elicitation in Mobile Crowd Sensing Systems. 2208-2221 - Kun Xie

, Xiangge Wang, Xin Wang
, Yuxiang Chen, Gaogang Xie
, Yudian Ouyang
, Jigang Wen, Jiannong Cao
, Dafang Zhang:
Accurate Recovery of Missing Network Measurement Data With Localized Tensor Completion. 2222-2235 - Tong Yang

, Jie Jiang
, Peng Liu, Qun Huang
, Junzhi Gong
, Yang Zhou
, Rui Miao, Xiaoming Li, Steve Uhlig
:
Adaptive Measurements Using One Elastic Sketch. 2236-2251 - Pedro Reviriego

, Ori Rottenstreich
:
The Tandem Counting Bloom Filter - It Takes Two Counters to Tango. 2252-2265 - Mehmet Fatih Aktas

, Emina Soljanin
:
Straggler Mitigation at Scale. 2266-2279 - Daqing Yun

, Chase Q. Wu
, Nageswara S. V. Rao
, Rajkumar Kettimuthu
:
Advising Big Data Transfer Over Dedicated Connections Based on Profiling Optimization. 2280-2293 - Haiqin Wu

, Liangmin Wang
, Guoliang Xue
, Jian Tang, Dejun Yang
:
Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing. 2294-2307 - Guo Chen

, Yuanwei Lu, Bojie Li
, Kun Tan, Yongqiang Xiong, Peng Cheng
, Jiansong Zhang, Thomas Moscibroda:
MP-RDMA: Enabling RDMA With Multi-Path Transport in Datacenters. 2308-2323 - Chen Chen

, Lei Liu, Tie Qiu
, Dapeng Oliver Wu
, Zhiyuan Ren
:
Delay-Aware Grid-Based Geographic Routing in Urban VANETs: A Backbone Approach. 2324-2337 - Jinbin Hu

, Jiawei Huang
, Wenjun Lv, Yutao Zhou, Jianxin Wang
, Tian He
:
CAPS: Coding-Based Adaptive Packet Spraying to Reduce Flow Completion Time in Data Center. 2338-2353 - Qian Chen, Xiaojuan Zhang

, Wei Lih Lim, Yuen Sam Kwok, Sumei Sun
:
High Reliability, Low Latency and Cost Effective Network Planning for Industrial Wireless Mesh Networks. 2354-2362 - Francesco Malandrino

, Carla-Fabiana Chiasserini
, Gil Einziger
, Gabriel Scalosub
:
Reducing Service Deployment Cost Through VNF Sharing. 2363-2376 - Mauro Cociglio

, Giuseppe Fioccola
, Guido Marchetto
, Amedeo Sapio
, Riccardo Sisto
:
Multipoint Passive Monitoring in Packet Networks. 2377-2390 - Ping Zhao

, Hongbo Jiang
, Jie Li
, Fanzi Zeng
, Zhu Xiao
, Kun Xie
, Guanglin Zhang:
Synthesizing Privacy Preserving Traces: Enhancing Plausibility With Social Networks. 2391-2404 - Anura P. Jayasumana

, Randy C. Paffenroth
, Gunjan Mahindre
, Sridhar Ramasamy
, Kelum Gajamannage
:
Network Topology Mapping From Partial Virtual Coordinates and Graph Geodesics. 2405-2417 - Yang Liu, Bo Li

, Brian D. O. Anderson
, Guodong Shi
:
Clique Gossiping. 2418-2431 - Sepideh Nazemi

, Kin K. Leung, Ananthram Swami:
Distributed Optimization Framework for In-Network Data Processing. 2432-2443 - Elaine Y.-N. Sun

, Hsiao-Chun Wu
, Scott C.-H. Huang
:
Theoretical Analysis of Various Software-Defined Multiplexing Codes. 2444-2457 - Han Zhang

, Haijun Geng
, Yahui Li
, Xia Yin, Xingang Shi
, Zhiliang Wang
, Qianhong Wu
, Jianwei Liu:
DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs. 2458-2471 - Zhenhua Han

, Haisheng Tan
, Xiang-Yang Li
, Shaofeng H.-C. Jiang
, Yupeng Li
, Francis C. M. Lau:
OnDisc: Online Latency-Sensitive Job Dispatching and Scheduling in Heterogeneous Edge-Clouds. 2472-2485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














