期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
In transitioning to 5G, the high infrastructure cost, the need for fast rollout of new services, and the frequent technology/system upgrades triggered......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (3)
To improve the application-level data efficiency, the scheduling of coflows, defined as a collection of parallel flows sharing the same objective, is ......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
Major commercial client-side video players employ adaptive bitrate (ABR) algorithms to improve the user quality of experience (QoE). With the evolveme......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
The link speed in production datacenters is growing fast, from 1 Gbps to 40 Gbps or even 100 Gbps. However, the buffer size of commodity switches incr......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (3)
Despite extensive research efforts, underwater sensor networks (UWSNs) still suffer from serious performance issues due to their inefficient and uncoo......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
Network resource reservation systems are being developed and deployed, driven by the demand and substantial benefits of providing performance predicta......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (3)
We develop an auction framework for privacy-preserving data aggregation in mobile crowdsensing, where the platform plays the role as an auctioneer to ......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (4)
Jobs in modern computing clusters have highly diverse processing duration and heterogeneous resource requirements. In this paper, we consider the prob......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (3)
Cross-Technology Communication (CTC) is an emerging technique that enables direct interconnection among incompatible wireless technologies. However, C......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (3)
As backscatter-based IoT applications get proliferated, how to exploit backscattered signals for efficient sensing becomes a significant issue. Backsc......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (4)
The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless netwo......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
Software-Defined Networking (SDN) continues to be deployed spanning from enterprise data centers to cloud computing with the proliferation of various ......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
As the size of available networks is continuously increasing (even with millions of nodes), large-scale complex networks are receiving significant att......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
Modern data analytics systems use long-running executors to run an application's entire DAG. Executors exhibit salient time-varying resource requireme......
期刊: IEEE-ACM TRANSACTIONS ON NETWORKING, 2021; 29 (2)
Accountability and privacy are considered valuable but conflicting properties in the Internet, which at present does not provide native support for ei......