{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T02:30:33Z","timestamp":1775788233861,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1109\/jsac.2020.3036958","type":"journal-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T20:58:28Z","timestamp":1604955508000},"page":"265-279","source":"Crossref","is-referenced-by-count":40,"title":["Wanna Make Your TCP Scheme Great for Cellular Networks? Let Machines Do It for You!"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0036-7107","authenticated-orcid":false,"given":"Soheil","family":"Abbasloo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5232-5988","authenticated-orcid":false,"given":"Chen-Yu","family":"Yen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3554-0272","authenticated-orcid":false,"given":"H. Jonathan","family":"Chao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"1998","journal-title":"GR-1230-Core SONET bidirectional line-switched ring equipment generic criteria"},{"key":"ref38","first-page":"417","article-title":"Mahimahi: Accurate record-and-replay for {HTTP}","author":"netravali","year":"2015","journal-title":"Proc Usenix Ann Technical Conf (Usenix '99)"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref32","first-page":"387","article-title":"Deterministic policy gradient algorithms","volume":"32","author":"silver","year":"2014","journal-title":"Proc 31st Int Conf Mach Learn"},{"key":"ref31","article-title":"Continuous control with deep reinforcement learning","author":"lillicrap","year":"2015","journal-title":"arXiv 1509 02971"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/72.410363"},{"key":"ref37","author":"abadi","year":"2015","journal-title":"TensorFlow Large-Scale"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.36.823"},{"key":"ref35","first-page":"2483","article-title":"How does batch normalization help optimization","author":"santurkar","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref34","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","author":"ioffe","year":"2015","journal-title":"arXiv 1502 03167"},{"key":"ref60","author":"sparks","year":"2018","journal-title":"5G Network Slicing Whitepaper"},{"key":"ref28","author":"nixon","year":"2012","journal-title":"Feature Extraction in Computer Vision and Image Processing"},{"key":"ref27","author":"jensen","year":"1996","journal-title":"Introductory Digital Image Processing A Remote Sensing Perspective"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016590112381"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405892"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"ref24","first-page":"2","article-title":"Toward optimal performance with network assisted TCP at mobile edge","author":"abbasloo","year":"2019","journal-title":"Proc 2nd USENIX Workshop Hot Topics Edge Comput (HotEdge)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904350"},{"key":"ref26","volume":"31999","author":"bracewell","year":"1986","journal-title":"The Fourier Transform and Its Applications"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2018.8696844"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/9780470978504"},{"key":"ref51","article-title":"A quantitative measure of fairness and discrimination for resource allocation in shared computer systems","author":"jain","year":"1998","journal-title":"arXiv cs\/9809099"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s42045-020-00032-z"},{"key":"ref58","article-title":"Learning and generalization in overparameterized neural networks, going beyond two layers","author":"allen-zhu","year":"2018","journal-title":"arXiv 1811 04918"},{"key":"ref57","article-title":"On the generalization gap in reparameterizable reinforcement learning","author":"wang","year":"2019","journal-title":"arXiv 1905 12654"},{"key":"ref56","first-page":"1282","article-title":"Quantifying generalization in reinforcement learning","volume":"97","author":"cobbe","year":"2019","journal-title":"Proceedings 36th Int Conf Mach Learn"},{"key":"ref55","first-page":"1480","article-title":"Darla: Improving zero-shot transfer in reinforcement learning","volume":"70","author":"higgins","year":"2017","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref54","article-title":"Learning to adapt in dynamic, real-world environments through meta-reinforcement learning","author":"nagabandi","year":"2018","journal-title":"arXiv 1803 11347"},{"key":"ref53","first-page":"4055","article-title":"Successor features for transfer in reinforcement learning","author":"barreto","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref52","year":"2014","journal-title":"Mobile-edge computing - introductory technical white paper"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787498"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2898758"},{"key":"ref40","year":"1999","journal-title":"GR-1400-Core SONET Dual-Fed Unidirectional Path Switched Ring (UPSR) Equipment Generic Criteria"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281430"},{"key":"ref13","first-page":"1","article-title":"Mobile content delivery optimization based on throughput guidance","author":"szil\u00e1gyi","year":"2015","journal-title":"Proc ICCRG Meeting IETF (Work Prog )"},{"key":"ref14","article-title":"Deep reinforcement learning: An overview","author":"li","year":"2017","journal-title":"arXiv 1701 07274"},{"key":"ref15","first-page":"3132","article-title":"Interactive control of diverse complex characters with neural networks","author":"mordatch","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref16","first-page":"1329","article-title":"Benchmarking deep reinforcement learning for continuous control","author":"duan","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref17","article-title":"Playing atari with deep reinforcement learning","author":"mnih","year":"2013","journal-title":"arXiv 1312 5602"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1038\/nature16961","article-title":"Mastering the game of go with deep neural networks and tree search","volume":"529","author":"silver","year":"2016","journal-title":"Nature"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560080"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232783"},{"key":"ref3","first-page":"343","article-title":"PCC vivace: Online-learning congestion control","author":"dong","year":"2018","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.12.007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"ref8","first-page":"731","article-title":"Pantheon: The training ground for Internet congestion-control research","author":"yan","year":"2018","journal-title":"Proc of USENIX Annual Technical Conf (USENIX)"},{"key":"ref7","first-page":"3050","article-title":"A deep reinforcement learning perspective on Internet congestion control","author":"jay","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2013.6602305"},{"key":"ref9","first-page":"459","article-title":"Stochastic forecasts achieve high throughput and low delay over cellular networks","author":"winstein","year":"2013","journal-title":"Proc NSDI"},{"key":"ref46","author":"lecun","year":"2017","journal-title":"My Take on Ali Rahimi&#x2019;s &#x2018;Test of Time&#x2019; Award Talk at NIPS"},{"key":"ref45","author":"rahimi","year":"2017","journal-title":"Back When We Were Kids"},{"key":"ref48","article-title":"Bounding queue delay in cellular networks to support ultra-low latency applications","author":"abbasloo","year":"2019","journal-title":"arXiv 1908 00953"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209264"},{"key":"ref42","year":"2000","journal-title":"Ansi t1 105 02 Synchronous Optical Network (SoNet)-Automatic Protection"},{"key":"ref41","year":"1998","journal-title":"Types and Characteristics of SDH Network Protection Architectures"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref43","year":"2015","journal-title":"Ethernet Ring Protection Switching"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/9295467\/09252929.pdf?arnumber=9252929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T19:26:23Z","timestamp":1627586783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9252929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":60,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2020.3036958","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"value":"0733-8716","type":"print"},{"value":"1558-0008","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]}}}