首页 > 最新文献

IEEE/ACM Transactions on Networking最新文献

英文 中文
FENDI: Toward High-Fidelity Entanglement Distribution in the Quantum Internet FENDI:在量子互联网中实现高保真纠缠分发
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-13 DOI: 10.1109/TNET.2024.3450271
Huayue Gu;Zhouyu Li;Ruozhou Yu;Xiaojian Wang;Fangtong Zhou;Jianqing Liu;Guoliang Xue
A quantum network distributes quantum entanglements between remote nodes, and is key to many applications in secure communication, quantum sensing and distributed quantum computing. This paper explores the fundamental trade-off between the throughput and the quality of entanglement distribution in a multi-hop quantum repeater network. Compared to existing work which aims to heuristically maximize the entanglement distribution rate (EDR) and/or entanglement fidelity, our goal is to characterize the maximum achievable worst-case fidelity, while satisfying a bound on the maximum achievable expected EDR between an arbitrary pair of quantum nodes. This characterization will provide fundamental bounds on the achievable performance region of a quantum network, which can assist with the design of quantum network topology, protocols and applications. However, the task is highly non-trivial and is NP-hard as we shall prove. Our main contribution is a fully polynomial-time approximation scheme to approximate the achievable worst-case fidelity subject to a strict expected EDR bound, combining an optimal fidelity-agnostic EDR-maximizing formulation and a worst-case isotropic noise model. The EDR and fidelity guarantees can be implemented by a post-selection-and-storage protocol with quantum memories. By developing a discrete-time quantum network simulator, we conduct simulations to show the characterized performance region (the approximate Pareto frontier) of a network, and demonstrate that the designed protocol can achieve the performance region while existing protocols exhibit a substantial gap.
量子网络在远程节点之间分配量子纠缠,是安全通信、量子传感和分布式量子计算等许多应用的关键。本文探讨了多跳量子中继网络中吞吐量与纠缠分布质量之间的基本权衡。与现有的旨在启发式地最大化纠缠分布率(EDR)和/或纠缠保真度的工作相比,我们的目标是表征可实现的最大最坏情况保真度,同时满足任意量子节点对之间可实现的最大期望EDR的界限。这种表征将提供量子网络可实现性能区域的基本边界,有助于量子网络拓扑、协议和应用的设计。然而,这个任务是非常重要的,我们将证明它是np困难的。我们的主要贡献是一个完全多项式时间近似方案,以在严格的预期EDR范围内近似可实现的最坏情况保真度,结合最优保真度不确定的EDR最大化公式和最坏情况各向同性噪声模型。EDR和保真度保证可以通过带有量子存储器的后选择和存储协议来实现。通过开发一个离散时间量子网络模拟器,对网络的特征性能区域(近似帕累托边界)进行了仿真,并证明设计的协议可以达到该性能区域,而现有协议存在很大差距。
{"title":"FENDI: Toward High-Fidelity Entanglement Distribution in the Quantum Internet","authors":"Huayue Gu;Zhouyu Li;Ruozhou Yu;Xiaojian Wang;Fangtong Zhou;Jianqing Liu;Guoliang Xue","doi":"10.1109/TNET.2024.3450271","DOIUrl":"10.1109/TNET.2024.3450271","url":null,"abstract":"A quantum network distributes quantum entanglements between remote nodes, and is key to many applications in secure communication, quantum sensing and distributed quantum computing. This paper explores the fundamental trade-off between the throughput and the quality of entanglement distribution in a multi-hop quantum repeater network. Compared to existing work which aims to heuristically maximize the entanglement distribution rate (EDR) and/or entanglement fidelity, our goal is to characterize the maximum achievable worst-case fidelity, while satisfying a bound on the maximum achievable expected EDR between an arbitrary pair of quantum nodes. This characterization will provide fundamental bounds on the achievable performance region of a quantum network, which can assist with the design of quantum network topology, protocols and applications. However, the task is highly non-trivial and is NP-hard as we shall prove. Our main contribution is a fully polynomial-time approximation scheme to approximate the achievable worst-case fidelity subject to a strict expected EDR bound, combining an optimal fidelity-agnostic EDR-maximizing formulation and a worst-case isotropic noise model. The EDR and fidelity guarantees can be implemented by a post-selection-and-storage protocol with quantum memories. By developing a discrete-time quantum network simulator, we conduct simulations to show the characterized performance region (the approximate Pareto frontier) of a network, and demonstrate that the designed protocol can achieve the performance region while existing protocols exhibit a substantial gap.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5033-5048"},"PeriodicalIF":3.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Critical Service After Large-Scale Failures With Bayesian Network Tomography 利用贝叶斯网络断层扫描在大规模故障后恢复关键服务
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1109/TNET.2024.3454478
Viviana Arrigoni;Matteo Prata;Novella Bartolini
Massive failures in communication networks result from natural disasters, heavy blackouts, and military and cyber attacks. After these events, an adequate network recovery plan is key to ensuring emergency-critical service restoration and preventing intolerable downtime and performance degradation. We tackle the problem of minimizing the time and number of interventions to sufficiently restore the communication network to support emergency services after large-scale failures. We propose Proton (Progressive RecOvery and Tomography-based mONitoring), an efficient algorithm for progressive recovery of emergency services. Unlike previous work, assuming centralized routing and complete network observability, Proton addresses the more realistic scenario in which the network relies on the existing routing protocols, and knowledge of the network state is partial and uncertain. Proton relies on Network Tomography for monitoring and acquiring information about the state of nodes and links. Simulation results on real topologies show that our algorithm outperforms previous solutions in terms of cumulative routed flow, repair costs and recovery time in static and dynamic failure scenarios.
由于自然灾害、严重停电、军事和网络攻击,通信网络出现了大规模故障。在这些事件发生后,适当的网络恢复计划是确保紧急关键业务恢复和防止无法忍受的停机和性能下降的关键。我们解决的问题是尽量减少干预的时间和数量,以充分恢复通信网络,以支持大规模故障后的紧急服务。我们提出质子(渐进恢复和基于层析成像的监测),一个有效的算法渐进恢复的紧急服务。与先前的工作不同,假设集中路由和完全的网络可观察性,质子解决了更现实的场景,其中网络依赖于现有的路由协议,并且网络状态的知识是部分和不确定的。质子依靠网络断层扫描来监测和获取有关节点和链路状态的信息。在实际拓扑上的仿真结果表明,在静态和动态故障情况下,我们的算法在累积路由流量、修复成本和恢复时间方面都优于先前的解决方案。
{"title":"Recovering Critical Service After Large-Scale Failures With Bayesian Network Tomography","authors":"Viviana Arrigoni;Matteo Prata;Novella Bartolini","doi":"10.1109/TNET.2024.3454478","DOIUrl":"10.1109/TNET.2024.3454478","url":null,"abstract":"Massive failures in communication networks result from natural disasters, heavy blackouts, and military and cyber attacks. After these events, an adequate network recovery plan is key to ensuring emergency-critical service restoration and preventing intolerable downtime and performance degradation. We tackle the problem of minimizing the time and number of interventions to sufficiently restore the communication network to support emergency services after large-scale failures. We propose Proton (Progressive RecOvery and Tomography-based mONitoring), an efficient algorithm for progressive recovery of emergency services. Unlike previous work, assuming centralized routing and complete network observability, Proton addresses the more realistic scenario in which the network relies on the existing routing protocols, and knowledge of the network state is partial and uncertain. Proton relies on Network Tomography for monitoring and acquiring information about the state of nodes and links. Simulation results on real topologies show that our algorithm outperforms previous solutions in terms of cumulative routed flow, repair costs and recovery time in static and dynamic failure scenarios.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5216-5231"},"PeriodicalIF":3.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10679612","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topologies for Blockchain Payment Channel Networks: Models and Constructions 区块链支付渠道网络拓扑:模型与构建
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1109/TNET.2024.3445274
Julia Khamis;Arad Kotzer;Ori Rottenstreich
Payment channel networks (PCNs), also known as off-chain networks, implement a common approach to deal with the scalability problem of blockchain networks. They enable users to execute payments without committing them to the blockchain by relying on predefined payment channels. A pair of users can employ a payment even without a direct channel between them, by routing the payment via payment channels involving other intermediate users. Users, together with the channels, form a graph known as the off-chain network topology. The off-chain topology and the payment characteristics affect network performance such as the average number of intermediate users a payment is routed through or the values of transaction fees. In this paper, we study two basic problems in payment channel network design. First, efficiently mapping users to an off-chain topology with a known structure. Second, constructing a topology with a bounded number of channels that can serve users well with associated payments. We design algorithms for both problems while considering several fundamental topologies. We study topology-related real data statistics of Raiden, the off-chain extension for Ethereum as well as of Lightning, the equivalent off-chain layer of Bitcoin. We conduct experiments to demonstrate the effectiveness of the algorithms for these networks.
支付通道网络(pcn),也被称为脱链网络,实现了一种通用的方法来处理区块链网络的可扩展性问题。它们使用户能够执行支付,而无需依赖预定义的支付通道将其提交给区块链。一对用户即使在没有直接通道的情况下也可以使用支付,方法是通过涉及其他中间用户的支付通道路由支付。用户与通道一起构成了一个被称为脱链网络拓扑的图。链下拓扑和支付特征会影响网络性能,例如支付路由经过的中间用户的平均数量或交易费用的值。本文研究了支付通道网络设计中的两个基本问题。首先,有效地将用户映射到具有已知结构的链外拓扑。其次,构建具有有限数量通道的拓扑结构,这些通道可以很好地为用户提供相关支付。我们在考虑几个基本拓扑的同时为这两个问题设计算法。我们研究了以太坊的脱链扩展Raiden以及比特币的等效脱链层Lightning的拓扑相关真实数据统计。我们通过实验来证明这些算法对这些网络的有效性。
{"title":"Topologies for Blockchain Payment Channel Networks: Models and Constructions","authors":"Julia Khamis;Arad Kotzer;Ori Rottenstreich","doi":"10.1109/TNET.2024.3445274","DOIUrl":"10.1109/TNET.2024.3445274","url":null,"abstract":"Payment channel networks (PCNs), also known as off-chain networks, implement a common approach to deal with the scalability problem of blockchain networks. They enable users to execute payments without committing them to the blockchain by relying on predefined payment channels. A pair of users can employ a payment even without a direct channel between them, by routing the payment via payment channels involving other intermediate users. Users, together with the channels, form a graph known as the off-chain network topology. The off-chain topology and the payment characteristics affect network performance such as the average number of intermediate users a payment is routed through or the values of transaction fees. In this paper, we study two basic problems in payment channel network design. First, efficiently mapping users to an off-chain topology with a known structure. Second, constructing a topology with a bounded number of channels that can serve users well with associated payments. We design algorithms for both problems while considering several fundamental topologies. We study topology-related real data statistics of Raiden, the off-chain extension for Ethereum as well as of Lightning, the equivalent off-chain layer of Bitcoin. We conduct experiments to demonstrate the effectiveness of the algorithms for these networks.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4781-4797"},"PeriodicalIF":3.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme in MCS 基于区块链的质量意识工人招聘计划的声誉隐私保护
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-11 DOI: 10.1109/TNET.2024.3453056
Qingyong Deng;Qinghua Zuo;Zhetao Li;Haolin Liu;Yong Xie
Mobile Crowdsourcing (MCS) has become a novel paradigm for enabling data collection by worker recruitment, and the reputation plays a crucial role in achieving high-quality data. Although identity, data, and bid privacy preserving have been thoroughly investigated with the advance of blockchain technology, existing literature barely focuses on reputation privacy, which prevents malicious workers from submitting false data that could affect truth discovery for data requester. Therefore, we propose a Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme (BRPP-QWR). First, we design a lightweight privacy preserving scheme for the whole life cycle of the worker’s reputation, which adopts sub-address retrieval technique combined with Pedersen Commitment and Compact Linkable Spontaneous Anonymous Group (CLSAG) signature to enable fast and anonymous verification of the reputation update process. Subsequently, to tackle the unknown worker recruitment problem, we propose a Reputation, Selfishness, and Quality-based Multi-Armed Bandit (RSQ-MAB) learning algorithm to select reliable and high-quality workers. Lastly, we implement a prototype system on Hyperledger Fabric to evaluate the performance of the reputation management scheme. The results indicate that the execution latency for the reputation score verification and retrieval latency can be reduced by an average of 6.30%–56.90% compared with ARMS-MCS. In addition, experimental results on both real and synthetic datasets show that the proposed RSQ-MAB algorithm achieves an increase of at least 20.05% in regard to the data requester’s total revenue and a decrease of at least 48.55% and 3.18% in regret and Multi-round Average Error (MAE), respectively, compared with other benchmark methods.
移动众包(MCS)已经成为通过员工招聘收集数据的一种新模式,其声誉在获得高质量数据方面起着至关重要的作用。尽管随着区块链技术的进步,身份、数据和投标隐私保护已经得到了深入的研究,但现有文献几乎没有关注声誉隐私,这可以防止恶意工作者提交可能影响数据请求者发现真相的虚假数据。因此,我们提出了一种基于区块链的质量意识员工招聘计划(BRPP-QWR)的声誉隐私保护。首先,我们设计了一个工作者声誉全生命周期的轻量级隐私保护方案,该方案采用子地址检索技术,结合Pedersen承诺和Compact Linkable Spontaneous Anonymous Group (CLSAG)签名,实现了声誉更新过程的快速匿名验证。随后,为了解决未知工人招聘问题,我们提出了一种基于声誉、自私和质量的多武装强盗(RSQ-MAB)学习算法,以选择可靠、优质的工人。最后,我们在Hyperledger Fabric上实现了一个原型系统来评估声誉管理方案的性能。结果表明,与ARMS-MCS相比,信誉评分验证的执行延迟和检索延迟平均降低了6.30% ~ 56.90%。此外,在真实数据集和合成数据集上的实验结果表明,与其他基准方法相比,所提出的RSQ-MAB算法的数据请求者的总收入至少提高了20.05%,遗憾率和多轮平均误差(MAE)分别降低了48.55%和3.18%。
{"title":"Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme in MCS","authors":"Qingyong Deng;Qinghua Zuo;Zhetao Li;Haolin Liu;Yong Xie","doi":"10.1109/TNET.2024.3453056","DOIUrl":"10.1109/TNET.2024.3453056","url":null,"abstract":"Mobile Crowdsourcing (MCS) has become a novel paradigm for enabling data collection by worker recruitment, and the reputation plays a crucial role in achieving high-quality data. Although identity, data, and bid privacy preserving have been thoroughly investigated with the advance of blockchain technology, existing literature barely focuses on reputation privacy, which prevents malicious workers from submitting false data that could affect truth discovery for data requester. Therefore, we propose a Blockchain-Based Reputation Privacy Preserving for Quality-Aware Worker Recruitment Scheme (BRPP-QWR). First, we design a lightweight privacy preserving scheme for the whole life cycle of the worker’s reputation, which adopts sub-address retrieval technique combined with Pedersen Commitment and Compact Linkable Spontaneous Anonymous Group (CLSAG) signature to enable fast and anonymous verification of the reputation update process. Subsequently, to tackle the unknown worker recruitment problem, we propose a Reputation, Selfishness, and Quality-based Multi-Armed Bandit (RSQ-MAB) learning algorithm to select reliable and high-quality workers. Lastly, we implement a prototype system on Hyperledger Fabric to evaluate the performance of the reputation management scheme. The results indicate that the execution latency for the reputation score verification and retrieval latency can be reduced by an average of 6.30%–56.90% compared with ARMS-MCS. In addition, experimental results on both real and synthetic datasets show that the proposed RSQ-MAB algorithm achieves an increase of at least 20.05% in regard to the data requester’s total revenue and a decrease of at least 48.55% and 3.18% in regret and Multi-round Average Error (MAE), respectively, compared with other benchmark methods.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5188-5203"},"PeriodicalIF":3.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBTable: Leveraging Discriminative Bitsets for High-Performance Packet Classification DBTable:利用判别比特集实现高性能数据包分类
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-10 DOI: 10.1109/TNET.2024.3452780
Zhengyu Liao;Shiyou Qian;Zhonglong Zheng;Jiange Zhang;Jian Cao;Guangtao Xue;Minglu Li
Packet classification, as a crucial function of networks, has been extensively investigated. In recent years, the rapid advancement of software-defined networking (SDN) has introduced new demands for packet classification, particularly in supporting dynamic rule updates and fast lookup. This paper presents a novel structure called DBTable for efficient packet classification to achieve high overall performance. DBTable integrates the strengths of conventional packet classification methods and neural network concepts. Within DBTable, a straightforward indexing scheme is proposed to eliminate rule replication, thereby ensuring high update performance. Additionally, we propose an iterative method for generating a discriminative bitset (DBS) to evenly partition rules. By utilizing the DBS, rules can be efficiently mapped in a hash table, thus achieving exceptional lookup performance. Moreover, DBTable incorporates a hybrid structure to further optimize the worst-case lookup performance, primarily caused by data skewness. The experiment results on 12 256k rulesets show that, compared to seven state-of-the-art schemes, DBTable achieves an overall lookup speed improvement ranging from 1.53x to 7.29x, while maintaining the fastest update speed.
分组分类作为网络的一项重要功能,已经得到了广泛的研究。近年来,软件定义网络(SDN)的快速发展对分组分类提出了新的要求,特别是在支持动态规则更新和快速查找方面。本文提出了一种名为DBTable的新颖结构,用于有效的分组分类,以达到较高的整体性能。DBTable综合了传统包分类方法和神经网络概念的优点。在DBTable中,提出了一个简单的索引方案来消除规则复制,从而确保高更新性能。此外,我们提出了一种迭代生成判别位集(DBS)的方法来均匀划分规则。通过利用DBS,可以有效地将规则映射到散列表中,从而实现卓越的查找性能。此外,DBTable合并了一个混合结构,以进一步优化主要由数据偏度引起的最坏情况查找性能。在12 256k规则集上的实验结果表明,与7种最先进的方案相比,DBTable实现了从1.53倍到7.29倍的总体查找速度提升,同时保持了最快的更新速度。
{"title":"DBTable: Leveraging Discriminative Bitsets for High-Performance Packet Classification","authors":"Zhengyu Liao;Shiyou Qian;Zhonglong Zheng;Jiange Zhang;Jian Cao;Guangtao Xue;Minglu Li","doi":"10.1109/TNET.2024.3452780","DOIUrl":"10.1109/TNET.2024.3452780","url":null,"abstract":"Packet classification, as a crucial function of networks, has been extensively investigated. In recent years, the rapid advancement of software-defined networking (SDN) has introduced new demands for packet classification, particularly in supporting dynamic rule updates and fast lookup. This paper presents a novel structure called DBTable for efficient packet classification to achieve high overall performance. DBTable integrates the strengths of conventional packet classification methods and neural network concepts. Within DBTable, a straightforward indexing scheme is proposed to eliminate rule replication, thereby ensuring high update performance. Additionally, we propose an iterative method for generating a discriminative bitset (DBS) to evenly partition rules. By utilizing the DBS, rules can be efficiently mapped in a hash table, thus achieving exceptional lookup performance. Moreover, DBTable incorporates a hybrid structure to further optimize the worst-case lookup performance, primarily caused by data skewness. The experiment results on 12 256k rulesets show that, compared to seven state-of-the-art schemes, DBTable achieves an overall lookup speed improvement ranging from 1.53x to 7.29x, while maintaining the fastest update speed.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5232-5246"},"PeriodicalIF":3.0,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-Temporal Multi-Metaverse Dynamic Streaming for Hybrid Quantum-Classical Systems 量子-经典混合系统的时空多元动态流
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-09 DOI: 10.1109/TNET.2024.3453067
Soohyun Park;Hankyul Baek;Joongheon Kim
According to the challenges related to the limited availability of quantum bits (qubits) in the era of noisy intermediate-scale quantum (NISQ), the immediate replacement of all components in existing network architectures with quantum computing devices may not be practical. As a result, implementing a hybrid quantum-classical system is regarded as one of effective strategies. In hybrid quantum-classical systems, quantum computing devices can be used for computation-intensive applications, such as massive scheduling in dynamic environments. Furthermore, one of most popular network applications is advanced social media services such as metaverse. Accordingly, this paper proposes an advanced multi-metaverse dynamic streaming algorithm in hybrid quantum-classical systems. For this purpose, the proposed algorithm consists of three stages. For the first stage, three-dimensional (3D) point cloud data gathering should be conducted using spatially scheduled observing devices from physical-spaces for constructing virtual multiple meta-spaces in metaverse server. This is for massive scheduling over dynamic situations, i.e., quantum multi-agent reinforcement learning-based scheduling is utilized for scheduling dimension reduction into a logarithmic-scale. For the second stage, a temporal low-delay metaverse server’s processor scheduler is designed for region-popularity-aware multiple virtual meta-spaces rendering contents allocation via modified bin-packing with hard real-time constraints. Lastly, a novel dynamic dynamic streaming algorithm is proposed for high-quality, differentiated, and stabilized meta-spaces rendering contents delivery to individual users via Lyapunov optimization theory. Our performance evaluation results verify that the proposed spatio-temporal algorithm outperforms benchmarks in various aspects over hybrid quantum-classical systems.
在嘈杂的中等规模量子(NISQ)时代,量子比特(qubit)的可用性有限,因此,用量子计算设备立即替换现有网络架构中的所有组件可能不现实。因此,实现量子-经典混合系统被认为是一种有效的策略。在混合量子-经典系统中,量子计算设备可用于计算密集型应用,例如动态环境中的大规模调度。此外,最流行的网络应用程序之一是高级社交媒体服务,如metaverse。据此,本文提出了一种先进的量子-经典混合系统中的多元宇宙动态流算法。为此,本文提出的算法分为三个阶段。第一阶段,利用物理空间的空间调度观测设备进行三维点云数据采集,在元宇宙服务器中构建虚拟多元空间。这是针对动态情况下的大规模调度,即利用基于量子多智能体强化学习的调度将调度维数降为对数尺度。对于第二阶段,设计了一个临时低延迟元空间服务器的处理器调度器,用于通过带有硬实时约束的修改bin-packing呈现具有区域知名度的多个虚拟元空间的内容分配。最后,提出了一种基于Lyapunov优化理论的高质量、差异化和稳定化元空间内容呈现算法。我们的性能评估结果验证了所提出的时空算法在各个方面优于混合量子经典系统的基准。
{"title":"Spatio-Temporal Multi-Metaverse Dynamic Streaming for Hybrid Quantum-Classical Systems","authors":"Soohyun Park;Hankyul Baek;Joongheon Kim","doi":"10.1109/TNET.2024.3453067","DOIUrl":"10.1109/TNET.2024.3453067","url":null,"abstract":"According to the challenges related to the limited availability of quantum bits (qubits) in the era of noisy intermediate-scale quantum (NISQ), the immediate replacement of all components in existing network architectures with quantum computing devices may not be practical. As a result, implementing a hybrid quantum-classical system is regarded as one of effective strategies. In hybrid quantum-classical systems, quantum computing devices can be used for computation-intensive applications, such as massive scheduling in dynamic environments. Furthermore, one of most popular network applications is advanced social media services such as metaverse. Accordingly, this paper proposes an advanced multi-metaverse dynamic streaming algorithm in hybrid quantum-classical systems. For this purpose, the proposed algorithm consists of three stages. For the first stage, three-dimensional (3D) point cloud data gathering should be conducted using spatially scheduled observing devices from physical-spaces for constructing virtual multiple meta-spaces in metaverse server. This is for massive scheduling over dynamic situations, i.e., quantum multi-agent reinforcement learning-based scheduling is utilized for scheduling dimension reduction into a logarithmic-scale. For the second stage, a temporal low-delay metaverse server’s processor scheduler is designed for region-popularity-aware multiple virtual meta-spaces rendering contents allocation via modified bin-packing with hard real-time constraints. Lastly, a novel dynamic dynamic streaming algorithm is proposed for high-quality, differentiated, and stabilized meta-spaces rendering contents delivery to individual users via Lyapunov optimization theory. Our performance evaluation results verify that the proposed spatio-temporal algorithm outperforms benchmarks in various aspects over hybrid quantum-classical systems.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5279-5294"},"PeriodicalIF":3.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Technology Federated Matching for Age of Information Minimization in Heterogeneous IoT 跨技术联盟匹配,实现异构物联网中的信息时代最小化
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-09 DOI: 10.1109/TNET.2024.3436712
Haitham H. Esmat;Xiaohao Xia;Yinxuan Wu;Beatriz Lorenzo;Linke Guo
Heterogeneous Internet of Things (IoT) networks, which operate using various protocols and spectrum bands like WiFi, Bluetooth, Zigbee, and LoRa, bring many opportunities to collaborate and achieve timely data collection. However, several challenges must be addressed due to heterogeneous data patterns, coverage, spectrum bands, and mobility. This paper introduces a cross-technology IoT network architecture design that facilitates collaboration between service providers (SPs) to share their spectrum bands and offload computing tasks from heterogeneous IoT devices using multi-protocol mobile gateways (M-MGs). The objective is to minimize the age of information (AoI) and energy consumption by jointly optimizing collaboration between M-MGs and SPs for bandwidth allocation, relaying, and cross-technology data scheduling. A pricing mechanism is presented to incentivize different levels of collaboration and matching between M-MGs and SPs. Given the uncertainty due to mobility and task requests, we design a cross-technology federated matching algorithm (CT-Fed-Match) based on a multi-agent actor-critic approach in which M-MGs and SPs learn their strategies in a distributed manner. Furthermore, we incorporate federated learning to enhance the convergence of the learning process. The numerical results demonstrate that our CT-Fed-Match-RC algorithm with cross-technology and relaying collaboration reduces the AoI by 30 times and collects 8 times more packets than existing approaches.
异构物联网(IoT)网络使用WiFi、蓝牙、Zigbee和LoRa等各种协议和频段运行,为协作和实现及时数据收集带来了许多机会。然而,由于异构数据模式、覆盖范围、频谱带和移动性,必须解决一些挑战。本文介绍了一种跨技术的物联网网络架构设计,该设计促进了服务提供商(sp)之间的协作,以共享其频谱带,并使用多协议移动网关(m - mg)从异构物联网设备中卸载计算任务。目标是通过共同优化m - mg和sp之间在带宽分配、中继和跨技术数据调度方面的协作,最大限度地减少信息年龄(AoI)和能源消耗。提出了一种定价机制来激励m - mg和sp之间不同程度的合作和匹配。考虑到移动性和任务请求所带来的不确定性,我们设计了一种基于多智能体参与者批评方法的跨技术联邦匹配算法(CT-Fed-Match),其中m - mg和sp以分布式方式学习他们的策略。此外,我们还结合了联邦学习来增强学习过程的收敛性。数值结果表明,采用跨技术和中继协作的CT-Fed-Match-RC算法比现有方法减少了30倍的AoI,收集的数据包数量增加了8倍。
{"title":"Cross-Technology Federated Matching for Age of Information Minimization in Heterogeneous IoT","authors":"Haitham H. Esmat;Xiaohao Xia;Yinxuan Wu;Beatriz Lorenzo;Linke Guo","doi":"10.1109/TNET.2024.3436712","DOIUrl":"10.1109/TNET.2024.3436712","url":null,"abstract":"Heterogeneous Internet of Things (IoT) networks, which operate using various protocols and spectrum bands like WiFi, Bluetooth, Zigbee, and LoRa, bring many opportunities to collaborate and achieve timely data collection. However, several challenges must be addressed due to heterogeneous data patterns, coverage, spectrum bands, and mobility. This paper introduces a cross-technology IoT network architecture design that facilitates collaboration between service providers (SPs) to share their spectrum bands and offload computing tasks from heterogeneous IoT devices using multi-protocol mobile gateways (M-MGs). The objective is to minimize the age of information (AoI) and energy consumption by jointly optimizing collaboration between M-MGs and SPs for bandwidth allocation, relaying, and cross-technology data scheduling. A pricing mechanism is presented to incentivize different levels of collaboration and matching between M-MGs and SPs. Given the uncertainty due to mobility and task requests, we design a cross-technology federated matching algorithm (CT-Fed-Match) based on a multi-agent actor-critic approach in which M-MGs and SPs learn their strategies in a distributed manner. Furthermore, we incorporate federated learning to enhance the convergence of the learning process. The numerical results demonstrate that our CT-Fed-Match-RC algorithm with cross-technology and relaying collaboration reduces the AoI by 30 times and collects 8 times more packets than existing approaches.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4901-4916"},"PeriodicalIF":3.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SLP: A Secure and Lightweight Scheme Against Content Poisoning Attacks in Named Data Networking Based on Probing SLP:一种基于探测的安全轻量级方案,用于防范命名数据网络中的内容中毒攻击
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-05 DOI: 10.1109/TNET.2024.3451231
Kunpeng Ding;Jiayu Yang;Kaiping Xue;Jiangping Han;Jian Li;Qibin Sun;Jun Lu
Named Data Networking (NDN) stands out as a promising Information Centric Networking architecture capable of facilitating large-scale content distribution through in-network caching and location-independent data access. However, attackers can easily inject poisoned content into the network, called content poisoning attacks, which leads to a substantial deterioration in user experience and transmission efficiency. In existing schemes, routers fail to determine the contamination source of received poisoned content, leading to the inability to accurately identify attacker nodes. Besides, attackers’ dynamic behaviors and network instability could disrupt identification results. In this paper, we propose a Secure and Lightweight scheme against content poisoning attacks based on Probing (SLP), where a proactive and reliable probing protocol is designed to identify adversaries quickly and precisely. In SLP, a router sends specifically chosen interest packets to probe a suspicious node, so that the returned corresponding content can straightly reflect its trustworthiness without other nodes’ interference. In addition, a hypothesis testing algorithm is developed to analyze the returned content, which can exclude the impact of transmission errors and adapt to dynamic attackers. Moreover, we utilize users’ feedback to avoid unnecessary probing costs on unaffected routers, with its reliability guaranteed by an efficient cuckoo-filter-based feedback validation mechanism. Security analysis shows that SLP achieves resistance against content poisoning attacks and malicious feedback. The experimental results demonstrate that SLP makes users hardly be affected by attacks and brings in only slight overhead.
命名数据网络(NDN)作为一种很有前途的以信息为中心的网络架构脱颖而出,能够通过网络内缓存和位置无关的数据访问促进大规模内容分发。然而,攻击者很容易将有毒的内容注入网络,称为内容中毒攻击,导致用户体验和传播效率大幅下降。在现有的方案中,路由器无法确定收到的有毒内容的污染源,导致无法准确识别攻击者节点。此外,攻击者的动态行为和网络的不稳定性也会破坏识别结果。在本文中,我们提出了一种基于探测(SLP)的安全轻量级的内容中毒攻击方案,其中设计了一个主动可靠的探测协议来快速准确地识别对手。在SLP中,路由器发送特定选择的兴趣包来探测可疑节点,这样返回的相应内容可以直接反映该节点的可信度,不受其他节点的干扰。此外,提出了一种假设检验算法对返回内容进行分析,可以排除传输错误的影响,适应动态攻击者。此外,我们利用用户的反馈来避免在未受影响的路由器上不必要的探测成本,并通过有效的基于杜鹃滤波器的反馈验证机制来保证其可靠性。安全性分析表明,SLP可以抵抗内容中毒攻击和恶意反馈。实验结果表明,SLP使用户几乎不受攻击的影响,只带来很小的开销。
{"title":"SLP: A Secure and Lightweight Scheme Against Content Poisoning Attacks in Named Data Networking Based on Probing","authors":"Kunpeng Ding;Jiayu Yang;Kaiping Xue;Jiangping Han;Jian Li;Qibin Sun;Jun Lu","doi":"10.1109/TNET.2024.3451231","DOIUrl":"10.1109/TNET.2024.3451231","url":null,"abstract":"Named Data Networking (NDN) stands out as a promising Information Centric Networking architecture capable of facilitating large-scale content distribution through in-network caching and location-independent data access. However, attackers can easily inject poisoned content into the network, called content poisoning attacks, which leads to a substantial deterioration in user experience and transmission efficiency. In existing schemes, routers fail to determine the contamination source of received poisoned content, leading to the inability to accurately identify attacker nodes. Besides, attackers’ dynamic behaviors and network instability could disrupt identification results. In this paper, we propose a Secure and Lightweight scheme against content poisoning attacks based on Probing (SLP), where a proactive and reliable probing protocol is designed to identify adversaries quickly and precisely. In SLP, a router sends specifically chosen interest packets to probe a suspicious node, so that the returned corresponding content can straightly reflect its trustworthiness without other nodes’ interference. In addition, a hypothesis testing algorithm is developed to analyze the returned content, which can exclude the impact of transmission errors and adapt to dynamic attackers. Moreover, we utilize users’ feedback to avoid unnecessary probing costs on unaffected routers, with its reliability guaranteed by an efficient cuckoo-filter-based feedback validation mechanism. Security analysis shows that SLP achieves resistance against content poisoning attacks and malicious feedback. The experimental results demonstrate that SLP makes users hardly be affected by attacks and brings in only slight overhead.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5128-5143"},"PeriodicalIF":3.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Whittle Index Approach to Minimizing Functions of Age of Information 最小化信息时代函数的惠特尔指数法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-05 DOI: 10.1109/TNET.2024.3452006
Vishrant Tripathi;Eytan Modiano
We consider a setting where multiple active sources send real-time updates over a single-hop wireless broadcast network to a monitoring station. Our goal is to design a scheduling policy that minimizes the time-average of general non-decreasing cost functions of Age of Information. We use a Whittle index based approach to find low complexity scheduling policies that have good performance. We prove that for a system with two sources, having possibly different cost functions and reliable channels, the Whittle index policy is exactly optimal. We derive structural properties of an optimal policy, that suggest that the performance of the Whittle index policy may be close to optimal in general. These results might also be of independent interest in the study of restless multi-armed bandit problems with similar underlying structure. We further establish that minimizing monitoring error for linear time-invariant systems and symmetric Markov chains is equivalent to minimizing appropriately chosen monotone functions of Age of Information. Finally, we provide simulations comparing the Whittle index policy with optimal scheduling policies found using dynamic programming, which support our results.
我们考虑一种设置,其中多个有源通过单跳无线广播网络向监测站发送实时更新。我们的目标是设计一种调度策略,使信息时代的一般非递减成本函数的时间平均值最小化。我们使用基于Whittle索引的方法来寻找具有良好性能的低复杂度调度策略。我们证明了对于一个有两个来源,可能有不同的代价函数和可靠通道的系统,Whittle指数策略是完全最优的。我们推导了最优策略的结构性质,这表明Whittle索引策略的性能在一般情况下可能接近最优。这些结果也可能对具有类似基础结构的不宁多臂强盗问题的研究具有独立的兴趣。进一步证明了线性定常系统和对称马尔可夫链的监测误差最小化等价于适当选择的信息时代单调函数的最小化。最后,我们将Whittle索引策略与使用动态规划找到的最优调度策略进行了仿真比较,这支持了我们的结果。
{"title":"A Whittle Index Approach to Minimizing Functions of Age of Information","authors":"Vishrant Tripathi;Eytan Modiano","doi":"10.1109/TNET.2024.3452006","DOIUrl":"10.1109/TNET.2024.3452006","url":null,"abstract":"We consider a setting where multiple active sources send real-time updates over a single-hop wireless broadcast network to a monitoring station. Our goal is to design a scheduling policy that minimizes the time-average of general non-decreasing cost functions of Age of Information. We use a Whittle index based approach to find low complexity scheduling policies that have good performance. We prove that for a system with two sources, having possibly different cost functions and reliable channels, the Whittle index policy is exactly optimal. We derive structural properties of an optimal policy, that suggest that the performance of the Whittle index policy may be close to optimal in general. These results might also be of independent interest in the study of restless multi-armed bandit problems with similar underlying structure. We further establish that minimizing monitoring error for linear time-invariant systems and symmetric Markov chains is equivalent to minimizing appropriately chosen monotone functions of Age of Information. Finally, we provide simulations comparing the Whittle index policy with optimal scheduling policies found using dynamic programming, which support our results.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5144-5158"},"PeriodicalIF":3.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JointCloud Resource Market Competition: A Game-Theoretic Approach 联合云资源市场竞争:博弈论方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-04 DOI: 10.1109/TNET.2024.3450098
Jianzhi Shi;Bo Yi;Xingwei Wang;Min Huang;Yang Song;Qiang He;Chao Zeng;Keqin Li
The current global economy is undergoing a transformative phase, emphasizing collaboration among multiple competing entities rather than monopolization. Economic globalization is accelerating the adoption of globalized cloud services, and in line with this trend, cloud 2.0 introduces the concept of “cloud cooperation”. JointCloud, as a novel computing model for Cloud 2.0, advocates for the establishment of an evolving cloud ecosystem. However, a critical challenge arises due to the lack of direct incentives for a cloud to join the JointCloud ecosystem, leading to uncertainty regarding the rationale for the existence of the JointCloud ecosystem. To address this ambiguity, we draw inspiration from supply chain competition and formulate the market dynamics of resources within the JointCloud ecosystem. Our focus is particularly on the analysis of data resource trade within the JointCloud market. To comprehensively analyze the JointCloud market, we propose a market game that examines the competition among clouds within the ecosystem. We theoretically prove that a Nash Equilibrium always exists under the JointCloud market. Subsequently, we conduct an in-depth analysis of the profits of cloud resource manufacturers and cloud resource retailers as the number of clouds varies within the JointCloud ecosystem. Based on our analysis, we further explore the incentives for a cloud to participate in the JointCloud ecosystem. We then evaluate the performance of the proposed market game through extensive experiments, illustrating how process variables and profits change with the market size. The experiments demonstrate that the trends of various variables are aligned with our analysis obtained from the market game. Compared with the Cournot model, our proposed model captures the market power of both manufacturers and retailers, resulting in a model that closely mirrors real market dynamics. Our findings provide valuable insights into the cloud market within Cloud 2.0, offering guidance for stakeholders navigating the evolving landscape of cloud cooperation and competition.
当前全球经济正处于变革阶段,强调多个竞争实体之间的合作,而不是垄断。经济全球化正在加速采用全球化的云服务,顺应这一趋势,云2.0引入了“云合作”的概念。JointCloud作为Cloud 2.0的一种新型计算模式,倡导建立一个演进的云生态系统。然而,由于缺乏对云加入JointCloud生态系统的直接激励,导致JointCloud生态系统存在的不确定性,从而产生了一个关键的挑战。为了解决这种模糊性,我们从供应链竞争中汲取灵感,并在JointCloud生态系统中制定了资源的市场动态。我们的重点是分析JointCloud市场内的数据资源交易。为了全面分析JointCloud市场,我们提出了一个市场博弈,该博弈考察了生态系统中云之间的竞争。从理论上证明了在JointCloud市场下存在纳什均衡。随后,我们深入分析了云资源制造商和云资源零售商在JointCloud生态系统中随着云数量的变化而产生的利润。基于我们的分析,我们进一步探讨了云参与JointCloud生态系统的动机。然后,我们通过广泛的实验来评估所提出的市场博弈的绩效,说明过程变量和利润如何随市场规模而变化。实验表明,各变量的变化趋势与我们从市场博弈中得到的分析是一致的。与古诺模型相比,我们提出的模型捕捉到了制造商和零售商的市场力量,从而形成了一个更接近真实市场动态的模型。我们的研究结果为cloud 2.0中的云市场提供了有价值的见解,为利益相关者提供了在不断变化的云合作和竞争环境中导航的指导。
{"title":"JointCloud Resource Market Competition: A Game-Theoretic Approach","authors":"Jianzhi Shi;Bo Yi;Xingwei Wang;Min Huang;Yang Song;Qiang He;Chao Zeng;Keqin Li","doi":"10.1109/TNET.2024.3450098","DOIUrl":"10.1109/TNET.2024.3450098","url":null,"abstract":"The current global economy is undergoing a transformative phase, emphasizing collaboration among multiple competing entities rather than monopolization. Economic globalization is accelerating the adoption of globalized cloud services, and in line with this trend, cloud 2.0 introduces the concept of “cloud cooperation”. JointCloud, as a novel computing model for Cloud 2.0, advocates for the establishment of an evolving cloud ecosystem. However, a critical challenge arises due to the lack of direct incentives for a cloud to join the JointCloud ecosystem, leading to uncertainty regarding the rationale for the existence of the JointCloud ecosystem. To address this ambiguity, we draw inspiration from supply chain competition and formulate the market dynamics of resources within the JointCloud ecosystem. Our focus is particularly on the analysis of data resource trade within the JointCloud market. To comprehensively analyze the JointCloud market, we propose a market game that examines the competition among clouds within the ecosystem. We theoretically prove that a Nash Equilibrium always exists under the JointCloud market. Subsequently, we conduct an in-depth analysis of the profits of cloud resource manufacturers and cloud resource retailers as the number of clouds varies within the JointCloud ecosystem. Based on our analysis, we further explore the incentives for a cloud to participate in the JointCloud ecosystem. We then evaluate the performance of the proposed market game through extensive experiments, illustrating how process variables and profits change with the market size. The experiments demonstrate that the trends of various variables are aligned with our analysis obtained from the market game. Compared with the Cournot model, our proposed model captures the market power of both manufacturers and retailers, resulting in a model that closely mirrors real market dynamics. Our findings provide valuable insights into the cloud market within Cloud 2.0, offering guidance for stakeholders navigating the evolving landscape of cloud cooperation and competition.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5112-5127"},"PeriodicalIF":3.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE/ACM Transactions on Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1