{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:28:03Z","timestamp":1772119683989,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s10922-023-09798-1","type":"journal-article","created":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T10:02:07Z","timestamp":1705140127000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["WoS-CoMS: Work Stealing-Based Congestion Management Scheme for SDN Programmable Networks"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6002-9719","authenticated-orcid":false,"given":"Yannick Florian","family":"Yankam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-1859","authenticated-orcid":false,"given":"Vianney Kengne","family":"Tchendji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3657-2556","authenticated-orcid":false,"given":"Jean Fr\u00e9d\u00e9ric","family":"Myoupo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,13]]},"reference":[{"key":"9798_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109867","volume":"233","author":"Y Zhou","year":"2023","unstructured":"Zhou, Y., Ren, B., Xie, J., Luo, L., Guo, D., Zhou, X.: Enable the proactively load-balanced control plane for SDN via intelligent switch-to-controller selection strategy. Comput. Netw. 233, 109867 (2023). https:\/\/doi.org\/10.1016\/j.comnet.2023.109867","journal-title":"Comput. Netw."},{"key":"9798_CR2","doi-asserted-by":"publisher","DOI":"10.1145\/3556973","author":"A Liatifis","year":"2023","unstructured":"Liatifis, A., Sarigiannidis, P., Argyriou, V., Lagkas, T.: Advancing SDN from openflow to p4: a survey. ACM Comput. Surv. (2023). https:\/\/doi.org\/10.1145\/3556973","journal-title":"ACM Comput. Surv."},{"key":"9798_CR3","first-page":"9","volume-title":"SDN: Software defined networks: an authoritative review of network programmability technologies","author":"TD Nadeau","year":"2013","unstructured":"Nadeau, T.D., Gray, K.: SDN: Software defined networks: an authoritative review of network programmability technologies, pp. 9\u201346. O\u2019Reilly Media Inc., Sebastopol, CA (2013)"},{"key":"9798_CR4","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1007\/s11277-020-07411-1","volume":"114","author":"A Bahnasse","year":"2020","unstructured":"Bahnasse, A., Louhab, F.E., Khiat, A., Badri, A., Talea, M., Pandey, B.: Smart hybrid SDN approach for mpls vpn management and adaptive multipath optimal routing. Wirel. Pers. Commun. 114, 1107\u20131131 (2020)","journal-title":"Wirel. Pers. Commun."},{"key":"9798_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107066","volume":"92","author":"A Al-Harbi","year":"2021","unstructured":"Al-Harbi, A., Bahnasse, A., Louhab, F.E., Talea, M.: Towards an efficient resource allocation based on software-defined networking approach. Comput. Electr. Eng. 92, 107066 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107066","journal-title":"Comput. Electr. Eng."},{"key":"9798_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.future.2018.04.066","volume":"87","author":"A Bahnasse","year":"2018","unstructured":"Bahnasse, A., Louhab, F.E., Ait Oulahyane, H., Talea, M., Bakali, A.: Novel SDN architecture for smart mpls traffic engineering-diffserv aware management. Futur. Gener. Comput. Syst. 87, 115\u2013126 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.04.066","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9798_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s11235-019-00603-6","volume":"73","author":"A Bahnasse","year":"2020","unstructured":"Bahnasse, A., Talea, M., Badri, A., Louhab, F.E., Laafar, S.: Smart hybrid SDN approach for MPLS VPN management on digital environment. Telecommun. Syst. 73, 155\u2013169 (2020)","journal-title":"Telecommun. Syst."},{"key":"9798_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09720-9","author":"X Marchal","year":"2023","unstructured":"Marchal, X., Graff, P., Ky, J.R., Cholez, T., Tuffin, S., Mathieu, B., Festor, O.: An analysis of cloud gaming platforms behaviour under synthetic network constraints and real cellular networks conditions. J. Netw. Syst. Manage. (2023). https:\/\/doi.org\/10.1007\/s10922-023-09720-9","journal-title":"J. Netw. Syst. Manage."},{"key":"9798_CR9","doi-asserted-by":"publisher","unstructured":"Tchendji, V.K., Yankam, Y.F.: Dynamic resource allocations in virtual networks through a knapsack problem\u2019s dynamic programming solution. In: Revue Africaine de Recherche en Informatique et Math\u00e9matiques Appliqu\u00e9es Vol. 31 - 2019 - CARI 2018 (2020) https:\/\/doi.org\/10.46298\/arima.5321","DOI":"10.46298\/arima.5321"},{"key":"9798_CR10","doi-asserted-by":"publisher","unstructured":"Andjamba, T.S., Zodi, G.-A.L.: A load balancing protocol for improved video on demand in sdn-based clouds. In: 2023 17th international conference on ubiquitous information management and communication (IMCOM), pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/IMCOM56909.2023.10035591","DOI":"10.1109\/IMCOM56909.2023.10035591"},{"key":"9798_CR11","doi-asserted-by":"publisher","unstructured":"Lin, C.-X., Huang, T.-W., Wong, M.D.F.: An efficient work-stealing scheduler for task dependency graph. In: 2020 IEEE 26th international conference on parallel and distributed systems (ICPADS), pp. 64\u201371 (2020). https:\/\/doi.org\/10.1109\/ICPADS51040.2020.00018","DOI":"10.1109\/ICPADS51040.2020.00018"},{"issue":"3","key":"9798_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/3371927.3371932","volume":"49","author":"A Mushtaq","year":"2019","unstructured":"Mushtaq, A., Mittal, R., McCauley, J., Alizadeh, M., Ratnasamy, S., Shenker, S.: Datacenter congestion control: Identifying what is essential and making it practical: identifying what is essential and making it practical. ACM SIGCOMM Comput. Commun. Rev. 49(3), 32\u201338 (2019). https:\/\/doi.org\/10.1145\/3371927.3371932","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"9798_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TSUSC.2022.3210564","volume":"8","author":"L Gu","year":"2023","unstructured":"Gu, L., Zhang, W., Wang, Z., Zeng, D., Jin, H.: Service management and energy scheduling toward low-carbon edge computing. IEEE Trans. Sustain. Comput. 8(1), 109\u2013119 (2023). https:\/\/doi.org\/10.1109\/TSUSC.2022.3210564","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"12","key":"9798_CR14","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.17706\/jcp.13.12.1335-1348","volume":"13","author":"S Horiuchi","year":"2018","unstructured":"Horiuchi, S., Tachibana, T.: Dynamic replacement of virtual service resources based on tree topology for mobile users in virtual networks. J. Comput. 13(12), 1335\u20131349 (2018). https:\/\/doi.org\/10.17706\/jcp.13.12.1335-1348","journal-title":"J. Comput."},{"issue":"1","key":"9798_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.17706\/jcp.15.1.10-21","volume":"15","author":"JF Myoupo","year":"2020","unstructured":"Myoupo, J.F., Yankam, Y.F., Tchendji, V.K.: On the dynamic replacement of virtual service resources for mobile users in virtual networks. J. Comput. 15(1), 10\u201321 (2020)","journal-title":"J. Comput."},{"key":"9798_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8891481","author":"JF Myoupo","year":"2020","unstructured":"Myoupo, J.F., Kengne Tchendji, V., Yankam, Y.F., Tagne, J.C., Tan, L.: FSB-dreviser: Flow splitting-based dynamic replacement of virtual service resources for mobile users in virtual heterogeneous networks. J. Comput. Netw. Commun. (2020). https:\/\/doi.org\/10.1155\/2020\/8891481","journal-title":"J. Comput. Netw. Commun."},{"key":"9798_CR17","unstructured":"Seddiki, M.S.: Allocation dynamique des ressources et gestion de la qualit\u00e9 de service dans la virtualisation des r\u00e9seaux. PhD thesis, Universit\u00e9 de Lorraine (2015)"},{"key":"9798_CR18","doi-asserted-by":"publisher","first-page":"478","DOI":"10.2197\/ipsjjip.29.478","volume":"29","author":"R Nakashima","year":"2021","unstructured":"Nakashima, R., Yasugi, M., Yoritaka, H., Hiraishi, T., Umatani, S.: Work-stealing strategies that consider work amount and hierarchy. J. Inform. Process. 29, 478\u2013489 (2021). https:\/\/doi.org\/10.2197\/ipsjjip.29.478","journal-title":"J. Inform. Process."},{"key":"9798_CR19","doi-asserted-by":"publisher","DOI":"10.1145\/3016078.2851151","author":"J Li","year":"2016","unstructured":"Li, J., Agrawal, K., Elnikety, S., He, Y., Lee, I.-T.A., Lu, C., McKinley, K.S.: Work stealing for interactive services to meet target latency. SIGPLAN Not. (2016). https:\/\/doi.org\/10.1145\/3016078.2851151","journal-title":"SIGPLAN Not."},{"key":"9798_CR20","unstructured":"Gaud, F., Geneves, S., Mottet, F.: Vol de t\u00e2ches efficace pour syst\u00e8mes \u00e9v\u00e9nementiels multi-c\u0153urs. In: Conf\u00e9rence Fran\u00e7aise en Syst\u00e8mes d\u2019Exploitation (CFSE\u20197) (2009)"},{"key":"9798_CR21","doi-asserted-by":"publisher","unstructured":"Larkins, D.B., Snyder, J., Dinan, J.: Accelerated work stealing. In: Proceedings of the 48th international conference on parallel processing. ICPP \u201919. Association for computing machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3337821.3337878","DOI":"10.1145\/3337821.3337878"},{"key":"9798_CR22","unstructured":"Kehrer, S., Blochinger, W.: A survey on cloud migration strategies for high performance computing. In: Proceedings of the 13th symposium and summer school on service-oriented computing (SummerSoc19), pp. 57\u201369 (2019). IBM Research Division"},{"key":"9798_CR23","doi-asserted-by":"publisher","DOI":"10.1145\/3510422","author":"J Chen","year":"2022","unstructured":"Chen, J., Manivannan, M., Abduljabbar, M., Peric\u00e0s, M.: Erase: energy efficient task mapping and resource management for work stealing runtimes. ACM Trans. Archit. Code Optim. (2022). https:\/\/doi.org\/10.1145\/3510422","journal-title":"ACM Trans. Archit. Code Optim."},{"key":"9798_CR24","doi-asserted-by":"publisher","unstructured":"Gu, F., Lu, H., Wu, H., Wang, Y.: Research on congestion control link algorithm of computer network based on sdn. In: 2023 Asia-Europe conference on electronics, data processing and informatics (ACEDPI), pp. 82\u201386 (2023). https:\/\/doi.org\/10.1109\/ACEDPI58926.2023.00023","DOI":"10.1109\/ACEDPI58926.2023.00023"},{"issue":"5","key":"9798_CR25","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/LCOMM.2015.2403322","volume":"19","author":"Y Jim\u00e9nez","year":"2015","unstructured":"Jim\u00e9nez, Y., Cervell\u00f3-Pastor, C., Garc\u00eda, A.: Dynamic resource discovery protocol for software defined networks. IEEE Commun. Lett. 19(5), 743\u2013746 (2015). https:\/\/doi.org\/10.1109\/LCOMM.2015.2403322","journal-title":"IEEE Commun. Lett."},{"key":"9798_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/app11156999","author":"R Wazirali","year":"2021","unstructured":"Wazirali, R., Ahmad, R., Alhiyari, S.: SDN-openflow topology discovery: an overview of performance issues. Appl. Sci. (2021). https:\/\/doi.org\/10.3390\/app11156999","journal-title":"Appl. Sci."},{"issue":"1","key":"9798_CR27","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10922-022-09702-3","volume":"31","author":"I Bedhief","year":"2023","unstructured":"Bedhief, I., Kassar, M., Aguili, T.: Empowering SDN-docker based architecture for internet of things heterogeneity. J. Netw. Syst. Manage. 31(1), 14 (2023)","journal-title":"J. Netw. Syst. Manage."},{"key":"9798_CR28","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1002\/9781119005100.ch2","volume-title":"Software networks: virtualization, SDN, 5G and security","author":"G Pujolle","year":"2015","unstructured":"Pujolle, G.: Software networks: virtualization, SDN, 5G and security, vol. 1, pp. 15\u201348. Wiley, Hoboken, NJ (2015)"},{"issue":"3","key":"9798_CR29","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.-N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9798_CR30","unstructured":"Servin, C.: R\u00e9seaux et T\u00e9l\u00e9coms-4\u00e8me \u00e9dition, pp. 188\u2013190. Dunod, Paris (2013)"},{"key":"9798_CR31","doi-asserted-by":"publisher","unstructured":"Tanaka, D., Kawarasaki, M.: Congestion control in named data networking. In: 2016 IEEE international symposium on local and metropolitan area networks (LANMAN), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/LANMAN.2016.7548848","DOI":"10.1109\/LANMAN.2016.7548848"},{"issue":"1","key":"9798_CR32","first-page":"872","volume":"13","author":"T Alwada\u2019n","year":"2023","unstructured":"Alwada\u2019n, T., Al-Tamimi, A.-K., Mohammad, A., Salem, M., Muhammad, Y.: Dynamic congestion management system for cloud service broker. Int. J. Electr. Comput. Eng. 13(1), 872\u2013883 (2023)","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"9798_CR33","unstructured":"Zeldovich, N., Yip, A., Dabek, F., Morris, R.T., Mazi\u00e8res, D.: Multiprocessor support for Event-Driven programs. In: 2003 USENIX annual technical conference (USENIX ATC 03). USENIX Association, San Antonio, TX (2003). https:\/\/www.usenix.org\/conference\/2003-usenix-annual-technical-conference\/multiprocessor-support-event-driven-programs"},{"key":"9798_CR34","unstructured":"Shah, D., Xie, Q.: Centralized congestion control and scheduling in a datacenter. arXiv:1710.02548 (2017)"},{"issue":"3","key":"9798_CR35","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.icte.2017.03.002","volume":"4","author":"S-P Chung","year":"2018","unstructured":"Chung, S.-P., Lu, Y.-J., Lai, Y.-C.: Cloud computing with single server threshold and double congestion thresholds. ICT Express 4(3), 119\u2013123 (2018). https:\/\/doi.org\/10.1016\/j.icte.2017.03.002","journal-title":"ICT Express"},{"key":"9798_CR36","doi-asserted-by":"publisher","unstructured":"Lin, Y.-D., Teng, H.-Y., Hsu, C.-R., Liao, C.-C., Lai, Y.-C.: Fast failover and switchover for link failures and congestion in software defined networks. In: 2016 IEEE international conference on communications (ICC), pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/ICC.2016.7510886","DOI":"10.1109\/ICC.2016.7510886"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09798-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-023-09798-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-023-09798-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T23:39:45Z","timestamp":1706312385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-023-09798-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["9798"],"URL":"https:\/\/doi.org\/10.1007\/s10922-023-09798-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3213604\/v1","asserted-by":"object"}]},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"28 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing or conflict of interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"23"}}