Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 32, Issue 1Feb. 2024
Publisher:
  • IEEE Press
ISSN:1063-6692
Reflects downloads up to 08 Feb 2025Bibliometrics
research-article
Enabling Delay-Guaranteed Congestion Control With One-Bit Feedback in Cellular Networks

Unexpected large packet delays are often observed in cellular networks due to huge network queuing caused by excessive traffic coming into the network. To deal with the large queue problem, many congestion control algorithms try to find out how much ...

research-article
Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet Missions

Unmanned Aerial Vehicles (UAVs) or drones are increasingly used for urban applications like traffic monitoring and construction surveys. Autonomous navigation allows drones to visit waypoints and accomplish activities as part of their mission. A common ...

research-article
Enforcing Fairness in the Traffic Policer Among Heterogeneous Congestion Control Algorithms

Traffic policing is widely used by ISPs to limit their customers’ traffic rates. It has long been believed that a well-tuned traffic policer offers a satisfactory performance for TCP. However, we find this belief breaks with the emergence of new ...

research-article
Joint Optimization of QoE and Fairness for Adaptive Video Streaming in Heterogeneous Mobile Environments

The rapid growth of mobile video traffic and user demand poses a more stringent requirement for efficient bandwidth allocation in mobile networks where multiple users may share a bottleneck link. This provides content providers an opportunity to jointly ...

research-article
A Blockchain-Based Scheme for Secure Data Offloading in Healthcare With Deep Reinforcement Learning

With the widespread popularity of the Internet of Things and various intelligent medical devices, the amount of medical data is rising sharply, and thus medical data processing has become increasingly challenging. Mobile edge computing technology allows ...

research-article
State Disaggregation for Dynamic Scaling of Network Functions

Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network functions (NFs) are stateful and require state updates on a per-packet basis. During a scaling ...

research-article
TrafAda: Cost-Aware Traffic Adaptation for Maximizing Bitrates in Live Streaming

The business growth of live streaming causes expensive bandwidth costs from the Content Delivery Network service. It necessitates traffic adaptation, i.e., adapting video bitrates for cost-efficient bandwidth utilization, especially under the 95 <inline-...

research-article
Joint Request Updating and Elastic Resource Provisioning With QoS Guarantee in Clouds

In a commercial cloud, service providers (e.g., video streaming service provider) rent resources from cloud vendors (e.g., Google Cloud Platform) and provide services to cloud users, making a profit from the price gap. Cloud users acquire services by ...

research-article
Improvement of Copa: Behaviors and Friendliness of Delay-Based Congestion Control Algorithm

Delay-based congestion control has drawn a lot of attention in both academics and industry recently. Specifically, the Copa algorithm proposed in NSDI can achieve consistent high performance under various network environments and has already been deployed ...

research-article
Toward Improved Path Programmability Recovery for Software-Defined WANs Under Multiple Controller Failures

Enabling path programmability is an essential feature of Software-Defined Networking (SDN). During controller failures in Software-Defined Wide Area Networks (SD-WANs), a resilient design should maintain path programmability for offline flows, which were ...

research-article
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds

In the trend of network middleboxes as a service, enterprise customers adopt in-the-cloud deep packet inspection (DPI) services to protect networks. As network misconfigurations and hardware failures notoriously exist, recent efforts envision to ensure ...

research-article
Decentralized Caching Under Nonuniform File Popularity and Size: Memory-Rate Tradeoff Characterization

This paper aims to characterize the memory-rate tradeoff for decentralized caching under nonuniform file popularity and size. We consider a recently proposed decentralized modified coded caching scheme (D-MCCS) and formulate the cache placement ...

research-article
Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions

To date, security researchers evaluate their solutions of mitigating distributed denial-of-service (DDoS) attacks via kernel-based or kernel-bypassing testing tools. However, kernel-based tools exhibit poor scalability in attack traffic generation while ...

research-article
Covert Communication With Acoustic Noise

Along with the proliferation of IoT devices, people have a lot of concerns on the privacy issues brought by them. Existing solutions, employing encryption or trying to hide the communication in PHY layer, often suffer from the limited capability of IoT ...

research-article
Parallel Successive Learning for Dynamic Distributed Model Training Over Heterogeneous Wireless Networks

Federated learning (FedL) has emerged as a popular technique for distributing model training over a set of wireless devices, via iterative local updates (at devices) and global aggregations (at the server). In this paper, we develop parallel successive ...

research-article
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling

Link scheduling plays a pivotal role in accommodating stringent reliability and latency requirements. In this paper, we focus on the availability and effectiveness of applying protocol interference model (PIM) under Rayleigh fading model to solve the ...

research-article
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage

Secret sharing is a useful method for secure distributed data storage. Such a distributed data storage can avoid the information leakage under an attack to a limited number of distributed servers. While such distributed servers send their shares to an end ...

research-article
Segmented Entanglement Establishment With All-Optical Switching in Quantum Networks

There are two conventional methods to establish an entanglement connection in a Quantum Data Networks (QDN). One is to create single-hop entanglement links first and then connect them with quantum swapping, and the other is forwarding one of the entangled ...

research-article
Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults

With the increasing scale of communication networks, the likelihood of failures grows as well. Since these networks form a critical backbone of our digital society, it is important that they rely on robust routing algorithms which ensure connectivity ...

research-article
Experimental Evaluation on Priority-Aware Guaranteed Resource Allocation for Resource Pool Based Reconfigurable Hardware

This paper proposes a priority-aware guaranteed hardware resource allocation in virtual packet optical nodes (VPONs) and describes experimental evidence of service provisioning with the proposed method on testbed. A network based on the VPON brings ...

research-article
Wi-Fi Multi-Link Operation: An Experimental Study of Latency and Throughput

In this article, we investigate the real-world capability of the multi-link operation (MLO) framework&#x2014;one of the key MAC-layer features included in the IEEE 802.11be amendment&#x2014;by using a large dataset containing 5 GHz spectrum occupancy ...

research-article
Approximation Algorithms for Computing Virtual Backbones Considering Routing Costs in Wireless Networks

The strategy of constructing a virtual backbone (VB) to perform routing tasks is considered a mature method for addressing the broadcast storm problem in wireless sensor networks (WSNs). A WSN can be regarded as a unit disk graph (UDG), and its VBs can be ...

research-article
High-Granularity Modulation for OFDM Backscatter

Orthogonal frequency-division multiplexing (OFDM) has been widely used in WiFi, LTE, and adopted in 5G. Recently, researchers have proposed multiple OFDM-based WiFi backscatter systems that use the same underlying design principle (i.e., codeword ...

research-article
Entanglement Routing Design Over Quantum Networks

Quantum networks have emerged as a future platform for quantum information exchange and applications, with promising capabilities far beyond traditional communication networks. Remote quantum entanglement is an essential component of a quantum network. ...

research-article
Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks

The quantum network that allows users to communicate in a quantum way will be available in the foreseeable future. The network capable of distributing Bell state entangled pairs faces many challenges due to entanglement decoherence and limited network ...

research-article
Empowering In-Network Classification in Programmable Switches by Binary Decision Tree and Knowledge Distillation

Given the high packet processing efficiency of programmable switches (e.g., P4 switches of Tbps), several works are proposed to offload the decision tree (DT) to P4 switches for in-network classification. Although the DT is suitable for the match-action ...

research-article
Resource Critical Flow Monitoring in Software-Defined Networks

Flow monitoring is widely applied in software-defined networks (SDNs) for monitoring network performance. Especially, detecting heavy hitters can prevent the Distributed Denial of Service (DDoS) attack. However, many existing approaches fall into one of ...

research-article
Per-Flow Network Measurement With Distributed Sketch

Sketch-based method has emerged as a promising direction for per-flow measurement in data center networks. Usually in such a measurement system, a sketch data structure is placed as a whole at one switch for counting all passing packets, but when ...

research-article
Enabling OFDMA in Wi-Fi Backscatter

This paper for the first time demonstrates how to enable OFDMA in Wi-Fi backscatter for capacity and concurrency enhancement. With our design, the excitation signal is reflected, modulated and shifted to lie in the frequency band of the OFDM subcarrier by ...

research-article
ViChaser: Chase Your Viewpoint for Live Video Streaming With Block-Oriented Super-Resolution

The usage of live streaming services has led to a substantial increase in live video traffic. However, the perceived quality of experience of users is frequently limited by variations in the upstream bandwidth of streamers. To address this issue, several ...

Subjects

Currently Not Available

Comments