{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T10:59:14Z","timestamp":1772621954003,"version":"3.50.1"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3488511","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T17:55:34Z","timestamp":1730310934000},"page":"159622-159634","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time TCP Packet Loss Prediction Using Machine Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8179-599X","authenticated-orcid":false,"given":"Michael","family":"Welzl","sequence":"first","affiliation":[{"name":"Department of Informatics, University of Oslo, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4683-8792","authenticated-orcid":false,"given":"Safiqul","family":"Islam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Oslo Metropolitan University, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5445-1981","authenticated-orcid":false,"given":"Maximilian","family":"von Stephanides","sequence":"additional","affiliation":[{"name":"Dintero AS, Oslo, Norway"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"TCP Congestion Control","author":"Blanton","year":"2009"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9438","volume-title":"CUBIC for Fast and Long-Distance Networks","author":"Xu","year":"2023"},{"issue":"5","key":"ref3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/3012426.3022184","article-title":"BBR: Congestion-based congestion control","volume":"14","author":"Cardwell","year":"2016","journal-title":"Queue"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6817","volume-title":"Low Extra Delay Background Transport (LEDBAT)","author":"Shalunov","year":"2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787498"},{"key":"ref6","first-page":"329","article-title":"Copa: Practical delay-based congestion control for the Internet","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Arun"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8698","volume-title":"Network-Assisted Dynamic Adaptation (NADA): A Unified Congestion Control Scheme for Real-Time Media","author":"Zhu","year":"2020"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8298","volume-title":"Self-Clocked Rate Adaptation for Multimedia","author":"Johansson","year":"2017"},{"key":"ref9","volume-title":"The Addition of Explicit Congestion Notification (ECN) to IP","author":"Floyd","year":"2001"},{"key":"ref10","author":"Kuhn","year":"2022","journal-title":"Forward Erasure Correction (FEC) Coding and Congestion Control in Transport"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3113891"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.082212.00018"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9330","volume-title":"Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture","author":"Briscoe","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3366693"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117540"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3673422.3674889"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672223"},{"key":"ref19","volume-title":"BBR Congestion Control","author":"Cardwell","year":"2024"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/263932.264023"},{"key":"ref21","volume-title":"The NewReno Modification to TCP\u2019s Fast Recovery Algorithm","author":"Gurtov","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626324"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000603"},{"key":"ref25","first-page":"395","article-title":"PCC: Re-architecting congestion control for consistent high performance","volume-title":"Proc. 12th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Dong"},{"key":"ref26","first-page":"343","article-title":"PCC Vivace: Online-learning congestion control","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement.","author":"Don"},{"key":"ref27","first-page":"731","article-title":"Pantheon: The training ground for Internet congestion-control research","volume-title":"Proc. USENIX Annu. Tech. Conf. (ATC)","author":"Yan"},{"key":"ref28","first-page":"3050","article-title":"A deep reinforcement learning perspective on Internet congestion control","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Jay"},{"key":"ref29","article-title":"Reinforcement learning for bandwidth estimation and congestion control in real-time communications","author":"Fang","year":"2019","journal-title":"arXiv:1912.02222"},{"key":"ref30","article-title":"MVFST-RL: An asynchronous RL framework for congestion control with delayed actions","author":"Sivakumar","year":"2019","journal-title":"arXiv:1910.04054"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405892"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2835758"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892046"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933761"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488851"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3650069"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2005.4798299"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-47"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.future.2019.07.053","article-title":"A machine learning approach for packet loss prediction in science flows","volume":"102","author":"Giannakou","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.891681"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937277"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AMC.2014.6823315"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845132"},{"key":"ref44","article-title":"Predicting traffic overflows on private peering","author":"Rapaport","year":"2020","journal-title":"arXiv:2010.01380"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651937"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437769"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945582"},{"issue":"18","key":"ref48","doi-asserted-by":"crossref","first-page":"6164","DOI":"10.3390\/app10186164","article-title":"Can we exploit machine learning to predict congestion over mmWave 5G channels?","volume":"10","author":"Diez","year":"2020","journal-title":"Appl. Sci."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3229161"},{"key":"ref50","first-page":"424","article-title":"A comparison of LSTM and XGBoost for predicting firemen interventions","volume-title":"Proc. World Conf. Inf. Syst. Technol.","author":"\u00d1ahuis"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71419-1_2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2016.7818414"},{"key":"ref53","volume-title":"The Curious Case of Parallel Connections in HTTP\/2\u2014Presentation Slides","author":"Manzoor","year":"2016"},{"key":"ref54","article-title":"COP2: Continuously observing protocol performance","author":"Tilmans","year":"2019","journal-title":"arXiv:1902.04280"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10738808.pdf?arnumber=10738808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:38:38Z","timestamp":1732682318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10738808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3488511","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}