{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:23:02Z","timestamp":1775665382780,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472214"],"award-info":[{"award-number":["61472214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472210"],"award-info":[{"award-number":["61472210"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing National Research Center for Information Science and Technology (BNRist) Key Projects"},{"name":"Global Talent Recruitment (Youth) Program"},{"name":"Okawa Foundation Research Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/jsac.2019.2904350","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T18:19:10Z","timestamp":1552933150000},"page":"1231-1247","source":"Crossref","is-referenced-by-count":113,"title":["Dynamic TCP Initial Windows and Congestion Control Schemes Through Reinforcement Learning"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0371-854X","authenticated-orcid":false,"given":"Xiaohui","family":"Nie","sequence":"first","affiliation":[]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhihan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kaixin","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Jiyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zijie","family":"Ye","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5113-838X","authenticated-orcid":false,"given":"Dan","family":"Pei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787498"},{"key":"ref38","first-page":"459","article-title":"Stochastic forecasts achieve high throughput and low delay over cellular networks","author":"winstein","year":"2013","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref33","year":"2018","journal-title":"The Go Programming Language"},{"key":"ref32","year":"2018","journal-title":"A Free Open-Source High-Performance"},{"key":"ref31","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","author":"sutton","year":"2000","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.05.015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref36","first-page":"395","article-title":"PCC: Re-architecting congestion control for consistent high performance","author":"dong","year":"2015","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref35","year":"2018","journal-title":"Linux traffic control"},{"key":"ref34","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6077"},{"key":"ref40","first-page":"417","article-title":"Mahimahi: Accurate record-and-replay for HTTP","author":"netravali","year":"2015","journal-title":"Proc of USENIX ATC Annu Tech Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/3012426.3022184","article-title":"BBR: Congestion-based congestion control","volume":"14","author":"cardwell","year":"2016","journal-title":"ACM Queue"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232783"},{"key":"ref15","first-page":"393","article-title":"Pytheas: Enabling data-driven quality of experience optimization using group-based exploration-exploitation","author":"jiang","year":"2017","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"ref17","first-page":"2533","article-title":"Contextual bandits with similarity information","volume":"15","author":"slivkins","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-49819-5_6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24455-1_33"},{"key":"ref28","year":"2018","journal-title":"DB-IP"},{"key":"ref4","year":"2018","journal-title":"Latency is Everywhere and it Costs You Sales"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787510"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524413"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486014"},{"key":"ref29","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609627"},{"key":"ref8","first-page":"731","article-title":"Pantheon: The training ground for Internet congestion-control research","author":"yan","year":"2018","journal-title":"Proc Annu Tech Conf (USENIX ATC)"},{"key":"ref7","first-page":"343","article-title":"PCC vivace: Online-learning congestion control","author":"dong","year":"2018","journal-title":"Proc 12th USENIX Symp Netw Syst Des Implement (NSDI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1823844.1823848"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624175"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/JSAC.2002.807336","article-title":"TCP veno: TCP enhancement for transmission over wireless access networks","volume":"21","author":"fu","year":"2003","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836107"},{"key":"ref45","first-page":"29","article-title":"Fast and cautious: Leveraging multi-path diversity for transport loss recovery in data centers","author":"chen","year":"2016","journal-title":"Proc Annu Tech Conf (USENIX ATC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486020"},{"key":"ref21","first-page":"1","article-title":"TCP fast start: A technique for speeding up Web transfers","volume":"34","author":"padmanabhan","year":"1998","journal-title":"Proc IEEE Globecom"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.886335"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/248157.248180"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836094"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190317"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.188"},{"key":"ref25","author":"garivier","year":"2008","journal-title":"On Upper-confidence Bound Policies for Non-stationary Bandit Problems"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/8715825\/08668690.pdf?arnumber=8668690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:09:14Z","timestamp":1657746554000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8668690\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":46,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2019.2904350","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"value":"0733-8716","type":"print"},{"value":"1558-0008","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6]]}}}