Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
IEEE/ACM Transactions on Networking
ACM Press
 
   
 
Options:
 
  1-10 of 171 reviews Date Reviewed 
  Optimal online scheduling with arbitrary hard deadlines in multihop communication networks
Mao Z., Koksal C., Shroff N.  IEEE/ACM Transactions on Networking 24(1): 177-189, 2016. Type: Article

This carefully written paper from Mao et al. makes important contributions to optimal online packet scheduling in the context of hard deadlines and a multihop wired network. A modification of the familiar earliest deadline first (EDF) algorithm, c...

Jul 26 2016
  CEDAR: a low-latency and distributed strategy for packet recovery in wireless networks
Qiu C., Shen H., Soltani S., Sapra K., Jiang H., Hallstrom J.  IEEE/ACM Transactions on Networking 23(5): 1514-1527, 2015. Type: Article

Error detection and correction in wireless networks is a very popular topic of research. Many improvements and enhancements are continually being developed, implemented, tested, and theorized about. Against such a rich backdrop of research materia...

Jul 11 2016
  Cost-effective viral marketing for time-critical campaigns in large-scale social networks
Dinh T., Zhang H., Nguyen D., Thai M.  IEEE/ACM Transactions on Networking 22(6): 2001-2011, 2014. Type: Article

To remain competitive, businesses need to maintain profitable online social networks (OSNs) for promoting different merchandise to diverse customers. How should commercial industries allocate marketing resources to online social networking product...

Nov 11 2015
  Optimal distributed P2P streaming under node degree bounds
Zhang S., Shao Z., Chen M., Jiang L.  IEEE/ACM Transactions on Networking 22(3): 717-730, 2014. Type: Article

The problem of maximizing the rate of a broadcast operation in peer-to-peer (P2P) systems that are bounded by a node degree is studied in this paper. The authors “address this problem by providing the first distributed solution that achieves...

May 12 2015
  Efficient data capturing for network forensics in cognitive radio networks
Chen S., Zeng K., Mohapatra P.  IEEE/ACM Transactions on Networking 22(6): 1988-2000, 2014. Type: Article

Law enforcement agencies need effective cognitive radio networks (CRNs) for pursuing forensics data essential to disentangling cybercrimes. The currently expensive traditional wireless networks obligate individual monitors to capture data from eac...

Apr 23 2015
  Demystifying Internet-wide service discovery
Leonard D., Loguinov D.  IEEE/ACM Transactions on Networking 21(6): 1760-1773, 2013. Type: Article

Internet-wide service discovery is used to figure out various characteristics about the Internet. It can also be used for tasks such as estimating the global impact of a known security virus or determining how Internet worms create massive botnets...

Apr 21 2014
  ICTCP: incast congestion control for TCP in data-center networks
Wu H., Feng Z., Guo C., Zhang Y.  IEEE/ACM Transactions on Networking 21(2): 345-358, 2013. Type: Article

Transmission control protocol (TCP) is a reliable, widely used protocol on the Internet. It provides opportunities for both flow control (the receiver regulates the speed of the transmission) and congestion control (the sender must react to overlo...

Oct 8 2013
  Per-flow traffic measurement through randomized counter sharing
Li T., Chen S., Ling Y.  IEEE/ACM Transactions on Networking 20(5): 1622-1634, 2012. Type: Article

Network traffic measurement is quite an important requirement for network administration for a variety of reasons, including traffic and capacity planning, accounting, billing, network forensics, and anomaly detection. Measurements need to be as n...

Mar 22 2013
  FairTorrent: a deficit-based distributed algorithm to ensure fairness in peer-to-peer systems
Sherman A., Nieh J., Stein C.  IEEE/ACM Transactions on Networking 20(5): 1361-1374, 2012. Type: Article

Peer-to-peer (P2P) file-sharing applications such as BitTorrent have attracted a fair amount of controversy, due in no small part to their widespread use in disseminating copyrighted material. They are nevertheless a subject ripe for research. By ...

Mar 19 2013
  Capacity bounds of three-dimensional wireless ad hoc networks
Li P., Pan M., Fang Y.  IEEE/ACM Transactions on Networking 20(4): 1304-1315, 2012. Type: Article

Vehicular ad hoc networks (VANETs), mesh networks, and other kinds of networks are constantly used in the context of unmanned aerial and ground vehicles. This paper proposes the use of 3D wireless ad hoc networks to allow the fusion of the digital...

Dec 11 2012
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy