w/in this Title
IEEE/ACM Transactions on Networking
1-10 of 171 reviews
Optimal online scheduling with arbitrary hard deadlines in multihop communication networks
Mao Z., Koksal C., Shroff N. IEEE/ACM Transactions on Networking 24(1): 177-189, 2016. Type: Article
This carefully written paper from Mao et al. makes important contributions to optimal online packet scheduling in the context of hard deadlines and a multihop wired network. A modification of the familiar earliest deadline first (EDF) algorithm, c...
Jul 26 2016
CEDAR: a low-latency and distributed strategy for packet recovery in wireless networks
Qiu C., Shen H., Soltani S., Sapra K., Jiang H., Hallstrom J. IEEE/ACM Transactions on Networking 23(5): 1514-1527, 2015. Type: Article
Error detection and correction in wireless networks is a very popular topic of research. Many improvements and enhancements are continually being developed, implemented, tested, and theorized about. Against such a rich backdrop of research materia...
Jul 11 2016
Cost-effective viral marketing for time-critical campaigns in large-scale social networks
Dinh T., Zhang H., Nguyen D., Thai M. IEEE/ACM Transactions on Networking 22(6): 2001-2011, 2014. Type: Article
To remain competitive, businesses need to maintain profitable online social networks (OSNs) for promoting different merchandise to diverse customers. How should commercial industries allocate marketing resources to online social networking product...
Nov 11 2015
Optimal distributed P2P streaming under node degree bounds
Zhang S., Shao Z., Chen M., Jiang L. IEEE/ACM Transactions on Networking 22(3): 717-730, 2014. Type: Article
The problem of maximizing the rate of a broadcast operation in peer-to-peer (P2P) systems that are bounded by a node degree is studied in this paper. The authors “address this problem by providing the first distributed solution that achieves...
May 12 2015
Efficient data capturing for network forensics in cognitive radio networks
Chen S., Zeng K., Mohapatra P. IEEE/ACM Transactions on Networking 22(6): 1988-2000, 2014. Type: Article
Law enforcement agencies need effective cognitive radio networks (CRNs) for pursuing forensics data essential to disentangling cybercrimes. The currently expensive traditional wireless networks obligate individual monitors to capture data from eac...
Apr 23 2015
Demystifying Internet-wide service discovery
Leonard D., Loguinov D. IEEE/ACM Transactions on Networking 21(6): 1760-1773, 2013. Type: Article
Internet-wide service discovery is used to figure out various characteristics about the Internet. It can also be used for tasks such as estimating the global impact of a known security virus or determining how Internet worms create massive botnets...
Apr 21 2014
ICTCP: incast congestion control for TCP in data-center networks
Wu H., Feng Z., Guo C., Zhang Y. IEEE/ACM Transactions on Networking 21(2): 345-358, 2013. Type: Article
Transmission control protocol (TCP) is a reliable, widely used protocol on the Internet. It provides opportunities for both flow control (the receiver regulates the speed of the transmission) and congestion control (the sender must react to overlo...
Oct 8 2013
Per-flow traffic measurement through randomized counter sharing
Li T., Chen S., Ling Y. IEEE/ACM Transactions on Networking 20(5): 1622-1634, 2012. Type: Article
Network traffic measurement is quite an important requirement for network administration for a variety of reasons, including traffic and capacity planning, accounting, billing, network forensics, and anomaly detection. Measurements need to be as n...
Mar 22 2013
FairTorrent: a deficit-based distributed algorithm to ensure fairness in peer-to-peer systems
Sherman A., Nieh J., Stein C. IEEE/ACM Transactions on Networking 20(5): 1361-1374, 2012. Type: Article
Peer-to-peer (P2P) file-sharing applications such as BitTorrent have attracted a fair amount of controversy, due in no small part to their widespread use in disseminating copyrighted material. They are nevertheless a subject ripe for research. By ...
Mar 19 2013
Capacity bounds of three-dimensional wireless ad hoc networks
Li P., Pan M., Fang Y. IEEE/ACM Transactions on Networking 20(4): 1304-1315, 2012. Type: Article
Vehicular ad hoc networks (VANETs), mesh networks, and other kinds of networks are constantly used in the context of unmanned aerial and ground vehicles. This paper proposes the use of 3D wireless ad hoc networks to allow the fusion of the digital...
Dec 11 2012
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.