{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:51:05Z","timestamp":1778604665247,"version":"3.51.4"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"1-4","license":[{"start":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T00:00:00Z","timestamp":1543536000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772305"],"award-info":[{"award-number":["61772305"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Netw."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s42045-018-0009-7","type":"journal-article","created":{"date-parts":[[2018,11,30]],"date-time":"2018-11-30T05:02:29Z","timestamp":1543554149000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Bridging machine learning and computer network research: a survey"],"prefix":"10.1007","volume":"1","author":[{"given":"Yang","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Jinkun","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Yanshu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,30]]},"reference":[{"key":"9_CR1","unstructured":"AMD.: Accelerators for High Performance Compute. http:\/\/www.amd.com\/en-us\/solutions\/professional\/hpc (2017)"},{"key":"9_CR2","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., Isard, M., Kudlur, M., Levenberg, J., Monga, R., Moore, S., Murray, D.G., Steiner, B., Tucker, P., Vasudevan, V., Warden, P., Wicke, M., Yu, Y., Zheng, X.: Tensorflow: A system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). pp. 265\u2013283. USENIX Association, GA (2016)"},{"key":"9_CR3","unstructured":"Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: Detecting the rise of dga-based malware. In: Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). pp. 491\u2013506. USENIX, Bellevue, WA (2012)"},{"key":"9_CR4","unstructured":"Archer, C., Blocksome, M.: Remote direct memory access https:\/\/www.google.com\/patents\/US8325633 . US Patent 8,325,633 (2012)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Ashfaq, A.B., Javed, M., Khayam, S.A., Radha, H.: An information-theoretic combining method for multi-classifier anomaly detection systems. In: 2010 IEEE International Conference on Communications. pp. 1\u20135 (2010)","DOI":"10.1109\/ICC.2010.5501984"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Ballani, H., Costa, P., Karagiannis, T., Rowstron, A.: Towards predictable datacenter networks, pp. 242\u2013253. SIGCOMM., \u201911, ACM, New York, NY, USA (2011)","DOI":"10.1145\/2018436.2018465"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bao, Y., Wu, H., Liu, X.: From prediction to action:a closed-loop approach for data-guided network resource allocation. In: In Proceedings of the SigKDD \u201916 Conference. pp. 1425\u20131434 (2016)","DOI":"10.1145\/2939672.2939871"},{"key":"9_CR8","unstructured":"Baralis, E.M., Mellia, M., Grimaudo, L.: Self-learning classifier for internet traffic (2013)"},{"key":"9_CR9","unstructured":"Bartos, K., Sofka, M., Franc, V.: Optimized invariant representation of network traffic for detecting unseen malware variants. In: 25th USENIX Security Symposium (USENIX Security 16). pp. 807\u2013822. USENIX Association, Austin, TX (2016)"},{"key":"9_CR10","unstructured":"Bartos, K., Sofka, M., Franc, V.: Optimized invariant representation of network traffic for detecting unseen malware variants. In: USENIX Security Symposium. pp. 807\u2013822 (2016)"},{"key":"9_CR11","unstructured":"Borgolte, K., Kruegel, C., Vigna, G.: Meerkat: Detecting website defacements through image-based object recognition. In: 24th USENIX Security Symposium (USENIX Security 15). pp. 595\u2013610. USENIX Association, Washington, DC (2015)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Botezatu, M.M., Giurgiu, I., Bogojeska, J., Wiesmann, D.: Predicting disk replacement towards reliable data centers. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 39\u201348 (2016)","DOI":"10.1145\/2939672.2939699"},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10107-012-0572-5","volume":"134","author":"RH Byrd","year":"2012","unstructured":"Byrd, R.H., Chin, G.M., Nocedal, J., Wu, Y.: Sample size selection in optimization methods for machine learning. Math. Program. 134(1), 127\u2013155 (2012)","journal-title":"Math. Program."},{"key":"9_CR14","unstructured":"Chen, T., Li, M., Li, Y., Lin, M., Wang, N., Wang, M., Xiao, T., Xu, B., Zhang, C., Zhang, Z.: Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems. CoRR abs\/1512.01274 (2015)"},{"key":"9_CR15","unstructured":"Chilimbi, T., Suzue, Y., Apacible, J., Kalyanaraman, K.: Project adam: Building an efficient and scalable deep learning training system. In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). pp. 571\u2013582. USENIX Association, Broomfield, CO (2014)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Chowdhury, M., Stoica, I.: Efficient coflow scheduling without prior knowledge, pp. 393\u2013406 (2015)","DOI":"10.1145\/2829988.2787480"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Comar, P.M., Liu, L., Saha, S., Tan, P.N., Nucci, A.: Combining supervised and unsupervised learning for zero-day malware detection. In: 2013 Proceedings IEEE INFOCOM, pp. 2022\u20132030 (2013)","DOI":"10.1109\/INFCOM.2013.6567003"},{"key":"9_CR18","unstructured":"Cotter, A., Shamir, O., Srebro, N., Sridharan, K.: Better mini-batch algorithms via accelerated gradient methods. In: Shawe-Taylor, J., Zemel, R.S., Bartlett, P.L., Pereira, F., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 24, pp. 1647\u20131655. Curran Associates, Inc. (2011)"},{"key":"9_CR19","unstructured":"Das, A.K., Pathak, P.H., Chuah, C.N., Mohapatra, P.: Contextual localization through network traffic analysis. In: INFOCOM, 2014 Proceedings IEEE, pp. 925\u2013933. IEEE (2014)"},{"key":"9_CR20","unstructured":"Dean, J., Corrado, G.S., Monga, R., Chen, K., Devin, M., Le, Q.V., Mao, M.Z., Ranzato, M., Senior, A., Tucker, P., Yang, K., Ng, A.Y.: Large scale distributed deep networks, pp. 1223\u20131231. Associates Inc., USA, NIPS\u201912, Curran (2012)"},{"key":"9_CR21","first-page":"2","volume":"1","author":"M Dong","year":"2015","unstructured":"Dong, M., Li, Q., Zarchy, D., Godfrey, P.B., Schapira, M.: Pcc: re-architecting congestion control for consistent high performance. NSDI 1, 2 (2015)","journal-title":"NSDI"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Borgnat, P., Abry, P., Fukuda, K.: Mawilab:combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: International Conference of CoNext, pp. 1\u201312 (2010)","DOI":"10.1145\/1921168.1921179"},{"key":"9_CR23","unstructured":"Foundation, T.A.S.: Hadoop project. http:\/\/hadoop.apache.org\/core\/ (2009)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Franc, V., Sofka, M., Bartos, K.: Learning detector of malicious network traffic from weak labels. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 85\u201399. Springer (2015)","DOI":"10.1007\/978-3-319-23461-8_6"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Franc, V., Sofka, M., Bartos, K.: Learning detector of malicious network traffic from weak labels. In: Proceedings, Part III, of the European Conference on Machine Learning and Knowledge Discovery in Databases \u2014Volume 9286. pp. 85\u201399. ECML PKDD 2015, Springer, New York, Inc., New York, NY, USA (2015)","DOI":"10.1007\/978-3-319-23461-8_6"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Furno, A., Fiore, M., Stanica, R.: Joint spatial and temporal classification of mobile traffic demands. In: INFOCOM\u201436th Annual IEEE International Conference on Computer Communications (2017)","DOI":"10.1109\/INFOCOM.2017.8057089"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Guo, C., Lu, G., Li, D., Wu, H., Zhang, X., Shi, Y., Tian, C., Zhang, Y., Lu, S.: Bcube:a high performance, server-centric network architecture for modular data centers, pp. 63\u201374 (2009)","DOI":"10.1145\/1594977.1592577"},{"key":"9_CR28","unstructured":"Hayes, J., Danezis, G.: k-fingerprinting: a robust scalable website fingerprinting technique. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 1187\u20131203. USENIX Association, Austin, TX (2016)"},{"key":"9_CR29","unstructured":"He, T., Goeckel, D., Raghavendra, R., Towsley, D.: Endhost-based shortest path routing in dynamic networks: An online learning approach. In: INFOCOM, 2013 Proceedings IEEE, pp. 2202\u20132210 (2013)"},{"key":"9_CR30","unstructured":"Hsieh, K., Harlap, A., Vijaykumar, N., Konomis, D., Ganger, G.R., Gibbons, P.B., Mutlu, O.: Gaia: Geo-distributed machine learning approaching LAN speeds. In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 629\u2013647. USENIX Association, Boston, MA (2017)"},{"issue":"6","key":"9_CR31","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/JSACOCN.2008.033508","volume":"26","author":"A Jayaraj","year":"2008","unstructured":"Jayaraj, A., Venkatesh, T., Murthy, C.S.R.: Loss classification in optical burst switching networks using machine learning techniques: improving the performance of TCP. IEEE J. Sel. Areas Commun. 26(6), 45\u201354 (2008)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9_CR32","first-page":"1","volume":"3","author":"C Jia","year":"2017","unstructured":"Jia, C., Liu, J., Jin, X., Lin, H., An, H., Han, W., Wu, Z., Chi, M.: Improving the performance of distributed tensorflow with RDMA. Int. J. Parallel Program. 3, 1\u201312 (2017)","journal-title":"Int. J. Parallel Program."},{"key":"9_CR33","unstructured":"Jiang, J., Sekar, V., Milner, H., Shepherd, D., Stoica, I., Zhang, H.: CFA: A practical prediction system for video QoE optimization. In: NSDI, pp. 137\u2013150 (2016)"},{"issue":"8","key":"9_CR34","doi-asserted-by":"publisher","first-page":"2248","DOI":"10.1109\/TPDS.2015.2489646","volume":"27","author":"D Li","year":"2016","unstructured":"Li, D., Chen, C., Guan, J., Zhang, Y., Zhu, J., Yu, R.: Dcloud: Deadline-aware resource allocation for cloud computing jobs. IEEE Trans. Parallel Distrib. Syst. 27(8), 2248\u20132260 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"9_CR35","unstructured":"Li, M., Andersen, D.G., Park, J.W., Smola, A.J., Ahmed, A., Josifovski, V., Long, J., Shekita, E.J., Su, B.Y.: Scaling distributed machine learning with the parameter server. In: Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, pp. 583\u2013598. OSDI\u201914, USENIX Association, Berkeley, CA, USA (2014a)"},{"key":"9_CR36","unstructured":"Li, M., Andersen, D.G., Smola, A.J., Yu, K.: Communication efficient distributed machine learning with the parameter server. In: International conference on neural information processing systems, MIT Press, Cambridge, pp. 19\u201327 (2014b)"},{"key":"9_CR37","doi-asserted-by":"crossref","unstructured":"Li, M., Zhang, T., Chen, Y., Smola, A.J.: Efficient mini-batch training for stochastic optimization. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 661\u2013670. ACM (2014c)","DOI":"10.1145\/2623330.2623612"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Li, W., Zhou, F., Meleis, W., Chowdhury, K.: Learning-based and data-driven tcp design for memory-constrained iot. In: Distributed Computing in Sensor Systems, pp. 199\u2013205. IEEE (2016)","DOI":"10.1109\/DCOSS.2016.8"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: ACM SIGCOMM Conference on Internet Measurement, pp. 147\u2013152 (2006)","DOI":"10.1145\/1177080.1177099"},{"key":"9_CR40","unstructured":"Lian, X., Zhang, C., Zhang, H., Hsieh, C.J., Zhang, W., Liu, J.: Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent (2017)"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Liu, D., Zhao, Y., Sui, K., Zou, L., Pei, D., Tao, Q., Chen, X., Tan, D.: Focus: Shedding light on the high search response time in the wild. In: IEEE INFOCOM 2016\u2014the IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","DOI":"10.1109\/INFOCOM.2016.7524413"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Liu, D., Zhao, Y., Xu, H., Sun, Y., Pei, D., Luo, J., Jing, X., Feng, M.: Opprentice: towards practical and automatic anomaly detection through machine learning, Tokyo, Japan (2015)","DOI":"10.1145\/2815675.2815679"},{"key":"9_CR43","unstructured":"Low, Y., Gonzalez, J.E., Kyrola, A., Bickson, D., Guestrin, C., Hellerstein, J.M.: Graphlab: a new framework for parallel machine learning. CoRR abs\/1408.2041 (2014)"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Lutu, A., Bagnulo, M., Cid-Sueiro, J., Maennel, O.: Separating wheat from chaff: Winnowing unintended prefixes using machine learning. In: IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, pp. 943\u2013951 (2014)","DOI":"10.1109\/INFOCOM.2014.6848023"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Ma, S., Jiang, J., Li, B., Li, B.: Maximizing container-based network isolation in parallel computing clusters. In: Edition of the IEEE International Conference on Network Protocols, pp. 1\u201310 (2016)","DOI":"10.1109\/ICNP.2016.7784434"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Mao, H., Alizadeh, M., Menache, I., Kandula, S.: Resource management with deep reinforcement learning, pp. 50\u201356., HotNets \u201916, ACM, New York, NY, USA (2016)","DOI":"10.1145\/3005745.3005750"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Mao, H., Netravali, R., Alizadeh, M.: Neural adaptive video streaming with pensieve, pp. 197\u2013210. ACM (2017)","DOI":"10.1145\/3098822.3098843"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Mirza, M., Sommers, J., Barford, P., Zhu, X.: A machine learning approach to tcp throughput prediction. In: ACM SIGMETRICS Performance Evaluation Review, vol.\u00a035, pp. 97\u2013108. ACM (2007)","DOI":"10.1145\/1269899.1254894"},{"key":"9_CR49","unstructured":"NVIDIA.: GPU APPLICATIONS: transforming computational research and engineering. http:\/\/www.nvidia.com\/object\/machine-learning.html (2017)"},{"key":"9_CR50","unstructured":"NVIDIA.: Developing a linux kernel module using gpudirect rdma. https:\/\/docs.nvidia.com\/cuda\/gpudirect-rdma\/index.html (2018)"},{"key":"9_CR51","unstructured":"NVIDIA.: Nvlink fabric. https:\/\/www.nvidia.com\/en-us\/data-center\/nvlink\/ (2018)"},{"key":"9_CR52","unstructured":"NVIDIA: Nvidia dgx-1: the fastest deep learning system. https:\/\/devblogs.nvidia.com\/parallelforall\/dgx-1-fastest-deep-learning-system\/ (2017)"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Nandi, A., Mandal, A., Atreja, S., Dasgupta, G.B., Bhattacharya, S.: Anomaly detection using program control flow graph mining from execution logs, pp. 215\u2013224., KDD \u201916, ACM, New York, NY, USA (2016)","DOI":"10.1145\/2939672.2939712"},{"key":"9_CR54","doi-asserted-by":"crossref","unstructured":"Neuvirth, H., Finkelstein, Y., Hilbuch, A., Nahum, S., Alon, D., Yom-Tov, E.: Early detection of fraud storms in the cloud. In: Proceedings, Part III, of the European Conference on Machine Learning and Knowledge Discovery in Databases \u2014volume 9286, pp. 53\u201367. ECML PKDD 2015, Springer-Verlag New York, Inc., New York, NY, USA (2015)","DOI":"10.1007\/978-3-319-23461-8_4"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Nunes, B.A., Veenstra, K., Ballenthin, W., Lukin, S., Obraczka, : K.: A machine learning approach to end-to-end rtt estimation and its application to tcp, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/ICCCN.2011.6006098"},{"key":"9_CR56","unstructured":"Research., B.: Bringing HPC techniques to deep learning. http:\/\/research.baidu.com\/bringing-hpc-techniques-deep-learning\/ (2017)"},{"key":"9_CR57","doi-asserted-by":"crossref","unstructured":"Santiago del Rio, P.M., Rossi, D., Gringoli, F., Nava, L., Salgarelli, L., Aracil, J.: Wire-speed statistical classification of network traffic on commodity hardware, pp. 65\u201372. ACM (2012)","DOI":"10.1145\/2398776.2398784"},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Sivaraman, A., Winstein, K., Thaker, P., Balakrishnan, H.: An experimental study of the learnability of congestion control. In: ACM SIGCOMM Computer Communication Review, vol.\u00a044, pp. 479\u2013490. ACM (2014)","DOI":"10.1145\/2740070.2626324"},{"key":"9_CR59","unstructured":"Soska, K., Christin, N.: Automatically detecting vulnerable websites before they turn malicious. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 625\u2013640, USENIX Association, San Diego, CA (2014)"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Soule, A., Taft, N.: Combining filtering and statistical methods for anomaly detection. In: Conference on Internet Measurement 2005, Berkeley, California, Usa, pp. 31\u201331 (2005)","DOI":"10.1145\/1330107.1330147"},{"key":"9_CR61","doi-asserted-by":"crossref","unstructured":"Stringhini, G., Kruegel, C., Vigna, G.: Shady paths: Leveraging surfing crowds to detect malicious web pages, pp. 133\u2013144., CCS \u201913, ACM, New York, NY, USA (2013)","DOI":"10.1145\/2508859.2516682"},{"key":"9_CR62","doi-asserted-by":"crossref","unstructured":"Sun, Y., Yin, X., Jiang, J., Sekar, V., Lin, F., Wang, N., Liu, T., Sinopoli, B.: Cs2p: Improving video bitrate selection and adaptation with data-driven throughput prediction. In: Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, pp. 272\u2013285, ACM (2016)","DOI":"10.1145\/2934872.2934898"},{"key":"9_CR63","doi-asserted-by":"crossref","unstructured":"Tan, H., Han, Z., Li, X., Lau, F.C.M.: Online job dispatching and scheduling in edge-clouds (2017)","DOI":"10.1109\/INFOCOM.2017.8057116"},{"key":"9_CR64","doi-asserted-by":"crossref","unstructured":"Taylor, V.F., Spolaor, R., Conti, M., Martinovic, I.: Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In: 2016 IEEE European Symposium on Security and Privacy (EuroS P). pp. 439\u2013454 (March 2016)","DOI":"10.1109\/EuroSP.2016.40"},{"key":"9_CR65","unstructured":"Wang, G., Wang, T., Zheng, H., Zhao, B.Y.: Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 239\u2013254. USENIX Association, San Diego, CA (2014)"},{"key":"9_CR66","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhang, Q.: A stochastic game for privacy preserving context sensing on mobile phone. In: IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, pp. 2328\u20132336 (2014)","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"9_CR67","unstructured":"Wang, Z.: The applications of deep learning on traffic identification. BlackHat USA (2015)"},{"key":"9_CR68","doi-asserted-by":"crossref","unstructured":"Wei, J., Dai, W., Qiao, A., Ho, Q., Cui, H., Ganger, G.R., Gibbons, P.B., Gibson, G.A., Xing, E.P.: Managed communication and consistency for fast data-parallel iterative analytics, pp. 381\u2013394. ACM (2015)","DOI":"10.1145\/2806777.2806778"},{"key":"9_CR69","doi-asserted-by":"crossref","unstructured":"Winstein, K., Balakrishnan, H.: Tcp ex machina: computer-generated congestion control. In: ACM SIGCOMM Computer Communication Review, vol.\u00a043, pp. 123\u2013134. ACM (2013)","DOI":"10.1145\/2534169.2486020"},{"key":"9_CR70","unstructured":"Xiao, W., Xue, J., Miao, Y., Li, Z., Chen, C., Wu, M., Li, W., Zhou, L.: Tux2: Distributed graph computation for machine learning. In: 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), pp. 669\u2013682. USENIX Association, Boston, MA (2017)"},{"issue":"4","key":"9_CR71","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/2377677.2377718","volume":"42","author":"D Xie","year":"2012","unstructured":"Xie, D., Ding, N., Hu, Y.C., Kompella, R.: The only constant is change: incorporating time-varying network reservations in data centers. ACM Sigcomm. Comput. Commun. Rev. 42(4), 199\u2013210 (2012)","journal-title":"ACM Sigcomm. Comput. Commun. Rev."},{"issue":"2","key":"9_CR72","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TBDATA.2015.2472014","volume":"1","author":"EP Xing","year":"2015","unstructured":"Xing, E.P., Ho, Q., Dai, W., Kim, J.K., Wei, J., Lee, S., Zheng, X., Xie, P., Kumar, A., Yu, Y.: Petuum: a new platform for distributed machine learning on big data. IEEE Trans. Big Data 1(2), 49\u201367 (2015)","journal-title":"IEEE Trans. Big Data"},{"key":"9_CR73","doi-asserted-by":"crossref","unstructured":"Xu, Q., Liao, Y., Miskovic, S., Mao, Z.M., Baldi, M., Nucci, A., Andrews, T.: Automatic generation of mobile app signatures from traffic observations. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 1481\u20131489 (2015)","DOI":"10.1109\/INFOCOM.2015.7218526"},{"key":"9_CR74","unstructured":"Xu, Y., Yao, J., Jacobsen, H.A., Guan, H.: Cost-efficient negotiation over multiple resources with reinforcement learning. Spain, Barcelona (2016)"},{"issue":"1","key":"9_CR75","first-page":"50","volume":"111","author":"M Yamada","year":"2013","unstructured":"Yamada, M., Kimura, A., Naya, F., Sawada, H.: Change-point detection with feature selection in high-dimensional time-series data. J. Catalysis 111(1), 50\u201358 (2013)","journal-title":"J. Catalysis"},{"key":"9_CR76","doi-asserted-by":"crossref","unstructured":"Yi, B., Xia, J., Chen, L., Chen, K.: Towards zero copy dataflows using rdma. In: Proceedings of the SIGCOMM Posters and Demos, vol. 2017. ACM (2017)","DOI":"10.1145\/3123878.3131975"},{"key":"9_CR77","doi-asserted-by":"crossref","unstructured":"Zadrozny, B.: Learning and evaluating classifiers under sample selection bias, pp. 114, ICML \u201904, ACM, New York, NY, USA (2004)","DOI":"10.1145\/1015330.1015425"},{"key":"9_CR78","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: Cluster computing with working sets. In: Proceedings of the 2Nd USENIX Conference on Hot Topics in Cloud Computing. pp. 10\u201310. HotCloud\u201910, USENIX Association, Berkeley, CA, USA (2010)"},{"key":"9_CR79","unstructured":"Zhang, H., Zheng, Z., Xu, S., Dai, W., Ho, Q., Liang, X., Hu, Z., Wei, J., Xie, P., Xing, E.P.: Poseidon: An efficient communication architecture for distributed deep learning on GPU clusters. In: 2017 USENIX Annual Technical Conference (USENIX ATC 17), pp. 181\u2013193. USENIX Association, Santa Clara, CA (2017)"},{"key":"9_CR80","doi-asserted-by":"crossref","unstructured":"Zhang, R., Qi, W., Wang, J.: Cross-vm covert channel risk assessment for cloud computing: An automated capacity profiler. In: 2014 IEEE 22nd International Conference on Network Protocols, pp. 25\u201336 (2014)","DOI":"10.1109\/ICNP.2014.24"},{"key":"9_CR81","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wu, C., Li, Z., Lau, F.C.M.: Proactive vnf provisioning with multi-timescale cloud resources: fusing online learning and online optimization. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications (INFOCOM), pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057118"},{"key":"9_CR82","unstructured":"Zhang, Z., Zhang, Z., Lee, P.P., Liu, Y., Xie, G.: Proword: an unsupervised approach to protocol feature word extraction. In: INFOCOM, 2014 Proceedings IEEE, pp. 1393\u20131401. IEEE (2014)"},{"issue":"11","key":"9_CR83","first-page":"3111","volume":"12","author":"R Zheng","year":"2013","unstructured":"Zheng, R., Le, T., Han, Z.: Approximate online learning for passive monitoring of multi-channel wireless networks. Proc. IEEE INFOCOM 12(11), 3111\u20133119 (2013)","journal-title":"Proc. IEEE INFOCOM"},{"key":"9_CR84","doi-asserted-by":"crossref","unstructured":"Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: User verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols, pp. 221\u2013232 (2014)","DOI":"10.1109\/ICNP.2014.43"},{"key":"9_CR85","unstructured":"Zhou, X., Wang, K., Jia, W., Guo, M.: Reinforcement learning-based adaptive resource management of differentiated services in geo-distributed data centers. Spain, Barcelona (2016)"},{"key":"9_CR86","doi-asserted-by":"crossref","unstructured":"Zhu, J., Li, D., Wu, J., Liu, H., Zhang, Y., Zhang, J.: Towards bandwidth guarantee in multi-tenancy cloud computing networks. In: IEEE International Conference on Network Protocols, pp. 1\u201310 (2012)","DOI":"10.1109\/ICNP.2012.6459986"}],"container-title":["CCF Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-018-0009-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42045-018-0009-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-018-0009-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:33:20Z","timestamp":1775288000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42045-018-0009-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,30]]},"references-count":86,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1007\/s42045-018-0009-7","relation":{},"ISSN":["2520-8462","2520-8470"],"issn-type":[{"value":"2520-8462","type":"print"},{"value":"2520-8470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,30]]},"assertion":[{"value":"6 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}