Ieee-acm Transactions On Networking

Ieee-acm Transactions On Networking

IEEE-acm 网络事务

  • 3区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks 35
Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks 29
Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks 29
One More Tag Enables Fine-Grained RFID Localization and Tracking 25
Deploying Chains of Virtual Network Functions: On the Relation Between Link and Server Usage 22
Delay-Aware Grid-Based Geographic Routing in Urban VANETs: A Backbone Approach 22
Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters 21
An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks With Mobile Edge Computing 19
On-Line Anomaly Detection With High Accuracy 19
Incentive Mechanism for Privacy-Aware Data Aggregation in Mobile Crowd Sensing Systems 19
Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process 18
Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold 17
Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks 17
Stable Local Broadcast in Multihop Wireless Networks Under SINR 17
Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs 14
Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems 14
Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously 14
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks 14
Radiation Constrained Scheduling of Wireless Charging Tasks 13
Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs 13
Optimal Network Service Chain Provisioning 13
Low-Complexity Distributed Radio Access Network Slicing: Algorithms and Experimental Results 12
Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems 12
On Efficient Tree-Based Tag Search in Large-Scale RFID Systems 11
Joint Resource Allocation for Software-Defined Networking, Caching, and Computing 11
On the Network-Layer Modeling and Configuration of Programmable Wireless Environments 11
Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements 11
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach 10
A Distributed Computation Offloading Strategy in Small-Cell Networks Integrated With Mobile Edge Computing 9
Wireless Charger Placement for Directional Charging 9
Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems 9
An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications 9
P-3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization 9
Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints 9
RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker 9
Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis 8
LBP: Robust Rate Adaptation Algorithm for SVC Video Streaming 8
Sponsoring Mobile Data: Analyzing the Impact on Internet Stakeholders 8
Low-Latency Scheduling in MPTCP 8
Achieving High Scalability Through Hybrid Switching in Software-Defined Networking 8
A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems 7
TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks 7
Efficient Loop-Free Rerouting of Multiple SDN Flows 7
Approximation Algorithms for Sweep Coverage Problem With Multiple Mobile Sensors 7
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries 7
Statistical Multiplexing and Traffic Shaping Games for Network Slicing 7
Breach-Free Sleep-Wakeup Scheduling for Barrier Coverage With Heterogeneous Wireless Sensors 7
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic 7
Security Policy Violations in SDN Data Plane 7
Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals 7