


default search action
IEEE/ACM Transactions on Networking, Volume 29
Volume 29, Number 1, February 2021
- Vasileios Giotsas, George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos:
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs. 1-16 - Zehua Guo
, Yang Xu
, Ya-Feng Liu
, Sen Liu
, H. Jonathan Chao
, Zhi-Li Zhang
, Yuanqing Xia
:
AggreFlow: Achieving Power Efficiency, Load Balancing, and Quality of Service in Data Center Networks. 17-33 - Lin Wang
, Lei Jiao
, Ting He
, Jun Li
, Henri E. Bal
:
Service Placement for Collaborative Edge Applications. 34-47 - Haipeng Dai
, Yunhuai Liu, Nan Yu
, Chaofeng Wu, Guihai Chen
, Tian He
, Alex X. Liu
:
Radiation Constrained Wireless Charger Placement. 48-64 - Meng Jin, Yuan He
, Xin Meng, Dingyi Fang, Xiaojiang Chen
:
Parallel Backscatter in the Wild: When Burstiness and Randomness Play With You. 65-77 - Xiaoli Zhang
, Qi Li
, Zeyu Zhang
, Jianping Wu, Jiahai Yang
:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. 78-91 - Minmei Wang
, Chen Qian, Xin Li
, Shouqian Shi
, Shigang Chen
:
Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. 92-105 - Zahra Naghsh
, Shahrokh Valaee
:
Conflict-Free Scheduling in Cellular V2X Communications. 106-119 - Weng-Chon Ao
, Po-Han Huang
, Konstantinos Psounis
:
Joint Workload Distribution and Capacity Augmentation in Hybrid Datacenter Networks. 120-133 - Shaojun Zou, Jiawei Huang
, Jianxin Wang, Tian He
:
Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks. 134-147 - Yunpeng Li
, Costas Courcoubetis
, Lingjie Duan
, Richard R. Weber:
Optimal Pricing for Peer-to-Peer Sharing With Network Externalities. 148-161 - Chuanwen Luo
, Meghana N. Satpute
, Deying Li
, Yongcai Wang
, Wenping Chen, Weili Wu
:
Fine-Grained Trajectory Optimization of Multiple UAVs for Efficient Data Gathering from WSNs. 162-175 - Wenzheng Xu
, Weifa Liang
, Zichuan Xu
, Jian Peng, Dezhong Peng
, Tang Liu, Xiaohua Jia
, Sajal K. Das
:
Approximation Algorithms for the Generalized Team Orienteering Problem and its Applications. 176-189 - Zuyuan Zhang
, Fang-Ming Shao
, Nan Zhang, Yi-Feng Niu
:
Maximizing k-Terminal Network Reliability in Some Sparse Graphs. 190-202 - Huanhuan Huang
, Tong Ye
, Tony Tong Lee, Weiqiang Sun
:
Delay and Stability Analysis of Connection-Based Slotted-Aloha. 203-219 - Konstantinos Psychas
, Javad Ghaderi
:
High-Throughput Bin Packing: Scheduling Jobs With Random Resource Demands in Clusters. 220-233 - B. R. Vinay Kumar
, Navin Kashyap
:
Probabilistic Forwarding of Coded Packets on Networks. 234-247 - Jianchun Liu
, Hongli Xu
, Gongming Zhao
, Chen Qian, Xingpeng Fan
, Xuwei Yang
, He Huang
:
Incremental Server Deployment for Software-Defined NFV-Enabled Networks. 248-261 - Timmy Schüller
, Nils Aschenbruck
, Markus Chimani, Martin Horneffer
:
Failure Resiliency With Only a Few Tunnels - Enabling Segment Routing for Traffic Engineering. 262-274 - Vitalii Demianiuk
, Sergey Gorinsky
, Sergey I. Nikolenko
, Kirill Kogan
:
Robust Distributed Monitoring of Traffic Flows. 275-288 - Chunyu Qiao
, Jiliang Wang, Yunhao Liu:
Beyond QoE: Diversity Adaptation in Video Streaming at the Edge. 289-302 - Luca Maria Castiglione
, Paolo Falcone
, Alberto Petrillo
, Simon Pietro Romano
, Stefania Santini
:
Cooperative Intersection Crossing Over 5G. 303-317 - Ahsen Ejaz
, Vassilis Papaefstathiou, Ioannis Sourdis
:
HighwayNoC: Approaching Ideal NoC Performance With Dual Data Rate Routers. 318-331 - Peng Zhang, Fangzheng Zhang
, Shimin Xu, Zuoru Yang
, Hao Li
, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu:
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks. 332-345 - Saadallah Kassir
, Pablo Caballero Garces
, Gustavo de Veciana
, Nannan Wang
, Xi Wang, Paparao Palacharla:
An Analytical Model and Performance Evaluation of Multihomed Multilane VANETs. 346-359 - Zhiyuan Xu
, Dejun Yang
, Jian Tang
, Yinan Tang
, Tongtong Yuan
, Yanzhi Wang, Guoliang Xue
:
An Actor-Critic-Based Transfer Learning Framework for Experience-Driven Networking. 360-371 - Xinyu Tong
, Yang Wan, Qianru Li, Xiaohua Tian
, Xinbing Wang
:
CSI Fingerprinting Localization With Low Human Efforts. 372-385 - Jianxiong Guo
, Tiantian Chen
, Weili Wu
:
A Multi-Feature Diffusion Model: Rumor Blocking in Social Networks. 386-397 - Canh T. Dinh
, Nguyen Hoang Tran
, Minh N. H. Nguyen
, Choong Seon Hong
, Wei Bao
, Albert Y. Zomaya
, Vincent Gramoli:
Federated Learning Over Wireless Networks: Convergence Analysis and Resource Allocation. 398-409 - Zhichao Cao
, Jiliang Wang
, Daibo Liu
, Qiang Ma
, Xin Miao, XuFei Mao
:
Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks. 410-422 - Pamela Zave
, Fabrício B. Carvalho
, Ronaldo A. Ferreira
, Jennifer Rexford
, Masaharu Morimoto, Xuan Kelvin Zou:
A Verified Session Protocol for Dynamic Service Chaining. 423-437 - Yangming Zhao
, Chen Tian
, Jingyuan Fan
, Tong Guan, Xiaoning Zhang
, Chunming Qiao:
Joint Reducer Placement and Coflow Bandwidth Scheduling for Computing Clusters. 438-451 - Weiwei Chen
, Yunhuai Liu, Tian He
:
SoftHM: A Software-Based Hierarchical Modulation Design for Wireless System. 452-464 - Fengjiao Li
, Yu Sang, Zhongdong Liu
, Bin Li
, Huasen Wu, Bo Ji
:
Waiting But Not Aging: Optimizing Information Freshness Under the Pull Model. 465-478
Volume 29, Number 2, April 2021
- Wei Bai, Shuihai Hu
, Kai Chen
, Kun Tan, Yongqiang Xiong
:
One More Config is Enough: Saving (DC)TCP for High-Speed Extremely Shallow-Buffered Datacenters. 489-502 - Sándor Laki
, Szilveszter Nádas, Gergo Gombos
, Ferenc Fejes, Péter Hudoba
, Zoltán Richard Turányi, Zoltán Kiss
, Csaba Keszei:
Core-Stateless Forwarding With QoS Revisited: Decoupling Delay and Bandwidth Requirements. 503-516 - Gal Mendelson
, Shay Vargaftik
, Katherine Barabash
, Dean H. Lorenz
, Isaac Keslassy
, Ariel Orda
:
AnchorHash: A Scalable Consistent Hash. 517-528 - Bahman Abolhassani
, John Tadrous, Atilla Eryilmaz
:
Delay Gain Analysis of Wireless Multicasting for Content Distribution. 529-542 - Fan Cheng
, Congtao Wang, Xingyi Zhang
, Yun Yang
:
A Local-Neighborhood Information Based Overlapping Community Detection Algorithm for Large-Scale Complex Networks. 543-556 - Wenjie Li
, Sharief M. A. Oteafy
, Marwan Fayed
, Hossam S. Hassanein:
Quality of Experience in ICN: Keep Your Low- Bitrate Close and High-Bitrate Closer. 557-570 - Qiao Xiang
, Haitao Yu, James Aspnes, Franck Le, Chin Guok, Linghe Kong
, Yang Richard Yang
:
Optimizing in the Dark: Learning Optimal Network Resource Reservation Through a Simple Request Interface. 571-584 - Xin Wang
, Yinlong Xu, Richard T. B. Ma
:
Paid Peering, Settlement-Free Peering, or Both? 585-594 - Liekang Zeng
, Xu Chen
, Zhi Zhou
, Lei Yang
, Junshan Zhang
:
CoEdge: Cooperative DNN Inference With Adaptive Workload Partitioning Over Heterogeneous Edge Devices. 595-608 - Itamar Cohen
, Gil Einziger, Roy Friedman
, Gabriel Scalosub
:
Access Strategies for Network Caching. 609-622 - Menghao Zhang
, Guanyu Li
, Lei Xu, Jiasong Bai, Mingwei Xu
, Guofei Gu, Jianping Wu:
Control Plane Reflection Attacks and Defenses in Software-Defined Networks. 623-636 - Marco Chiesa
, Roshan Sedar
, Gianni Antichi
, Michael Borokhovich
, Andrzej Kamisinski
, Georgios Nikolaidis, Stefan Schmid
:
Fast ReRoute on Programmable Switches. 637-650 - Giuliano Casale
, Nicolas Gast
:
Performance Analysis Methods for List-Based Caches With Non-Uniform Access. 651-664 - Jing Hou
, Li Sun
, Tao Shu
, Yong Xiao
, Marwan Krunz:
Economics of Strategic Network Infrastructure Sharing: A Backup Reservation Approach. 665-680 - Libin Liu
, Hong Xu
:
Elasecutor: Elastic Executor Scheduling in Data Analytics Systems. 681-694 - Lin He
, Gang Ren, Ying Liu
, Jiahai Yang
:
PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet. 695-708 - Qian Ma, Edmund Yeh
, Jianwei Huang
:
Selfish Caching Games on Directed Graphs. 709-722 - Zili Meng
, Yaning Guo, Yixin Shen
, Jing Chen, Chao Zhou, Minhu Wang, Jia Zhang
, Mingwei Xu
, Chen Sun
, Hongxin Hu
:
Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning. 723-736 - Gauri Joshi
, Dhruva Kaushal
:
Synergy via Redundancy: Adaptive Replication Strategies and Fundamental Limits. 737-749 - Jeongmin Bae
, Joohyun Lee
, Song Chong:
Learning to Schedule Network Resources Throughput and Delay Optimally Using Q+-Learning. 750-763 - Shaoran Li
, Yan Huang
, Chengzhang Li
, Brian Jalaian, Y. Thomas Hou
, Wenjing Lou
, Stephen Russell:
Maximize Spectrum Efficiency in Underlay Coexistence With Channel Uncertainty. 764-778 - Vajiheh Farhadi
, Fidan Mehmeti, Ting He
, Thomas F. La Porta
, Hana Khamfroush
, Shiqiang Wang
, Kevin S. Chan
, Konstantinos Poularakis
:
Service Placement and Request Scheduling for Data-Intensive Applications in Edge Clouds. 779-792 - Yong Huang
, Wei Wang
, Tao Jiang
, Qian Zhang
:
Detecting Colluding Sybil Attackers in Robotic Networks Using Backscatters. 793-804 - Galia Shabtai
, Danny Raz, Yuval Shavitt
:
Risk Aware Stochastic Placement of Cloud Services. 805-820 - Zicheng Chi
, Yan Li, Hongyu Sun, Zhichuan Huang
, Ting Zhu:
Simultaneous Bi-Directional Communications and Data Forwarding Using a Single ZigBee Data Stream. 821-833 - Fujie Fan
, Hangyu Meng
, Bing Hu
, Kwan L. Yeung
, Zhifeng Zhao
:
Roulette Wheel Balancing Algorithm With Dynamic Flowlet Switching for Multipath Datacenter Networks. 834-847 - Mohammad Jahanian
, K. K. Ramakrishnan
:
Name Space Analysis: Verification of Named Data Network Data Planes. 848-861 - Che-Hao Yu
, Lin Huang, Cheng-Shang Chang
, Duan-Shin Lee
:
Poisson Receivers: A Probabilistic Framework for Analyzing Coded Random Access. 862-875 - Ming Shi
, Xiaojun Lin
, Sonia Fahmy
:
Competitive Online Convex Optimization With Switching Costs and Ramp Constraints. 876-889 - Xiaofeng Shi
, Haofan Cai
, Minmei Wang
, Ge Wang
, Baiwen Huang, Junjie Xie
, Chen Qian:
TagAttention: Mobile Object Tracing With Zero Appearance Knowledge by Vision-RFID Fusion. 890-903 - Xinyu Tong
, Hao Li
, Xiaohua Tian
, Xinbing Wang
:
Wi-Fi Localization Enabling Self-Calibration. 904-917 - Yuchao Zhang
, Xiaohui Nie
, Junchen Jiang, Wendong Wang
, Ke Xu
, Youjian Zhao, Martin J. Reed
, Kai Chen
, Haiyang Wang, Guang Yao:
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation. 918-934 - Qiong Wu
, Xu Chen
, Zhi Zhou
, Liang Chen
, Junshan Zhang
:
Deep Reinforcement Learning With Spatio-Temporal Traffic Forecasting for Data-Driven Base Station Sleep Control. 935-948 - Peng Zou
, Omur Ozel
, Suresh Subramaniam
:
Optimizing Information Freshness Through Computation-Transmission Tradeoff and Queue Management in Edge Computing. 949-963
Volume 29, Number 3, June 2021
- Rukhsana Ruby
, Shuxin Zhong, Basem M. ElHalawany
, Hanjiang Luo
, Kaishun Wu
:
SDN-Enabled Energy-Aware Routing in Underwater Multi-Modal Communication Networks. 965-978 - Behrooz Farkiani
, Bahador Bakhshi
, S. Ali MirHassani
, Tim Wauters
, Bruno Volckaert
, Filip De Turck
:
Prioritized Deployment of Dynamic Service Function Chains. 979-993 - Dongxiao Yu
, Yifei Zou
, Yong Zhang
, Hao Sheng
, Weifeng Lv
, Xiuzhen Cheng
:
An Exact Implementation of the Abstract MAC Layer via Carrier Sensing in Dynamic Networks. 994-1007 - Jiadong Lou
, Xu Yuan
, Sastry Kompella
, Nian-Feng Tzeng
:
Boosting or Hindering: AoI and Throughput Interrelation in Routing-Aware Multi-Hop Wireless Networks. 1008-1021 - Chien-Sheng Yang
, Ramtin Pedarsani
, Amir Salman Avestimehr:
Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing. 1022-1031 - Kamran Ali
, Alex X. Liu
, Ioannis Pefkianakis, Kyu-Han Kim:
Distributed Spectrum Sharing for Enterprise Powerline Communication Networks. 1032-1045 - Mengyuan Zhang
, Lei Yang
, Shibo He
, Ming Li
, Junshan Zhang
:
Privacy-Preserving Data Aggregation for Mobile Crowdsensing With Externality: An Auction Approach. 1046-1059 - Gourav Saha
, Alhussein A. Abouzeid
, Zaheer Khan
, Marja Matinmikko-Blue
:
On the Optimal Duration of Spectrum Leases in Exclusive License Markets With Stochastic Demand. 1060-1073 - Ahmed Mohamed Abdelmoniem
, Brahim Bensaou:
T-RACKs: A Faster Recovery Mechanism for TCP in Data Center Networks. 1074-1087 - Tianming Zhao
, Weisheng Si
, Wei Li
, Albert Y. Zomaya
:
Optimizing the Maximum Vertex Coverage Attacks Under Knapsack Constraint. 1088-1104 - Guilherme Iecker Ricardo
, Alina Tuholukova, Giovanni Neglia
, Thrasyvoulos Spyropoulos:
Caching Policies for Delay Minimization in Small Cell Networks With Coordinated Multi-Point Joint Transmissions. 1105-1115 - Ciril Rozic
, Galen H. Sasaki:
Optical Protection Cost of Loop Free Alternates on Completely Connected IP Networks Over Optical Rings. 1116-1127 - Meng Jin, Yuan He
, Chengkun Jiang, Yunhao Liu:
Parallel Backscatter: Channel Estimation and Beyond. 1128-1140 - Vitalii Demianiuk
, Kirill Kogan
, Sergey I. Nikolenko
:
Approximate Packet Classifiers With Controlled Accuracy. 1141-1154 - Holger Boche
, Rafael F. Schaefer
, H. Vincent Poor
:
On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems. 1155-1168 - Dan Xia, Xiaolong Zheng
, Liang Liu
, Chaoyu Wang
, Huadong Ma
:
c-Chirp: Towards Symmetric Cross-Technology Communication Over Asymmetric Channels. 1169-1182 - Jiawei Huang
, Wenjun Lyu
, Weihe Li
, Jianxin Wang
, Tian He
:
Mitigating Packet Reordering for Random Packet Spraying in Data Center Networks. 1183-1196 - Yang Yang
, Yanjiao Chen
, Fei Chen
:
A Compressive Integrity Auditing Protocol for Secure Cloud Storage. 1197-1209 - Rahul Singh
, P. R. Kumar
:
Adaptive CSMA for Decentralized Scheduling of Multi-Hop Networks With End-to-End Deadline Constraints. 1224-1237 - Gamal Sallam
, Bo Ji
:
Joint Placement and Allocation of VNF Nodes With Budget and Capacity Constraints. 1238-1251 - Zhenlin An
, Lei Yang
, Qiongzheng Lin
:
Identifying UHF RFIDs in Range of Readers With WiFi. 1252-1265 - Mohammed Alasmar
, Richard G. Clegg, Nickolay Zakhleniuk
, George Parisis
:
Internet Traffic Volumes are Not Gaussian - They are Log-Normal: An 18-Year Longitudinal Study With Implications for Modelling and Prediction. 1266-1279 - Haisheng Tan
, Chi Zhang
, Chao Xu, Yupeng Li
, Zhenhua Han
, Xiang-Yang Li
:
Regularization-Based Coflow Scheduling in Optical Circuit Switches. 1280-1293 - Cho-Chun Chiu
, Ting He
:
Stealthy DGoS Attack: DeGrading of Service Under the Watch of Network Tomography. 1294-1307 - Deke Guo
, Junjie Xie
, Xiaofeng Shi
, Haofan Cai
, Chen Qian, Honghui Chen:
HDS: A Fast Hybrid Data Location Service for Hierarchical Mobile Edge Computing. 1308-1320 - Feihong Yang
, Yuan Shen
:
Critical Intensity for Unbounded Sequential Localizability. 1321-1334 - Liangxiao Xin
, David Starobinski
:
Countering Cascading Denial of Service Attacks on Wi-Fi Networks. 1335-1348 - Trupil Limbasiya
, Debasis Das
, Sajal K. Das
:
MComIoV: Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles. 1349-1361 - Subhramoy Mohanti
, Elif Bozkaya
, M. Yousof Naderi
, Berk Canberk
, Gokhan Secinti
, Kaushik R. Chowdhury
:
WiFED Mobile: WiFi Friendly Energy Delivery With Mobile Distributed Beamforming. 1362-1375 - Chunqiang Hu
, Xiuzhen Cheng
, Zhi Tian
, Jiguo Yu
, Weifeng Lv:
Achieving Privacy Preservation and Billing via Delayed Information Release. 1376-1390 - Zhangyu Guan
, Lorenzo Bertizzolo
, Emrecan Demirors
, Tommaso Melodia
:
WNOS: Enabling Principled Software-Defined Wireless Networking. 1391-1407 - Hanine Tout
, Azzam Mourad
, Nadjia Kara, Chamseddine Talhi:
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading. 1408-1421 - Bo Cheng
, Ming Wang
, Xiangtao Lin, Junliang Chen:
Context-Aware Cognitive QoS Management for Networking Video Transmission. 1422-1434
Volume 29, Number 4, August 2021
- Jinwei Liu
, Haiying Shen
, Hongmei Chi
, Husnu S. Narman
, Yongyi Yang, Long Cheng
, Wingyan Chung:
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage. 1436-1451 - Yan Gu
, Bo Liu
, Xiaojun Shen
:
Asymptotically Optimal Online Scheduling With Arbitrary Hard Deadlines in Multi-Hop Communication Networks. 1452-1466 - Amir Behrouzi-Far
, Emina Soljanin
:
Efficient Replication for Fast and Predictable Performance in Distributed Computing. 1467-1476 - Jiancheng Ye
, Ka-Cheong Leung
, Steven H. Low
:
Combating Bufferbloat in Multi-Bottleneck Networks: Theory and Algorithms. 1477-1493 - Sneihil Gopal
, Sanjit K. Kaul
, Rakesh Chaturvedi
, Sumit Roy
:
Coexistence of Age and Throughput Optimizing Networks: A Spectrum Sharing Game. 1494-1508 - Guanyu Li
, Menghao Zhang
, Shicheng Wang
, Chang Liu, Mingwei Xu
, Ang Chen, Hongxin Hu
, Guofei Gu, Qi Li
, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. 1509-1526 - Guanhao Wu, Xiaofeng Gao
, Jiaqi Zheng
, Guihai Chen
:
Achieving Fast Loop-Free Updates With Ingress Port in Software-Defined Networks. 1527-1539 - Miguel C. Neves
, Bradley Huffaker, Kirill Levchenko
, Marinho P. Barcellos
:
Dynamic Property Enforcement in Programmable Data Planes. 1540-1552 - Huanle Xu
, Yang Liu, Wing Cheong Lau
:
Optimal Job Scheduling With Resource Packing for Heterogeneous Servers. 1553-1566 - Yuan He
, Xiuzhen Guo
, Jia Zhang, Haotian Jiang:
WIDE: Physical-Level CTC via Digital Emulation. 1567-1579 - Ziyao Zhang
, Liang Ma, Kin K. Leung, Franck Le:
More Is Not Always Better: An Analytical Study of Controller Synchronizations in Distributed SDN. 1580-1590 - Tingjun Chen
, Mahmood Baraani Dastjerdi
, Harish Krishnaswamy
, Gil Zussman
:
Wideband Full-Duplex Phased Array With Joint Transmit and Receive Beamforming: Optimization and Rate Gains. 1591-1604