{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:15:00Z","timestamp":1766733300606,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-2113893"],"award-info":[{"award-number":["CNS-2113893"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/tnet.2021.3138923","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:14:00Z","timestamp":1643667240000},"page":"1494-1508","source":"Crossref","is-referenced-by-count":11,"title":["A Case for Sampling-Based Learning Techniques in Coflow Scheduling"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2788-2886","authenticated-orcid":false,"given":"Akshay","family":"Jajoo","sequence":"first","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1136-9909","authenticated-orcid":false,"given":"Y. Charlie","family":"Hu","sequence":"additional","affiliation":[{"name":"Elmore Family School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9117-7212","authenticated-orcid":false,"given":"Xiaojun","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1830-3_8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1830-3_14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742790"},{"volume-title":"Coflow Trace From Facebook Datacenter","year":"2021","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-33669-0_7"},{"volume-title":"Philae Simulator","year":"2021","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230569"},{"key":"ref8","first-page":"19","article-title":"Hedera: Dynamic flow scheduling for data center networks","volume-title":"Proc. NSDI","author":"Al-Fares"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486031"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966472"},{"key":"ref11","first-page":"185","article-title":"Effective straggler mitigation: Attack of the clones","volume-title":"Proc. NSDI","author":"Ananthanarayanan"},{"key":"ref12","first-page":"265","article-title":"Reining in the outliers in map-reduce clusters using mantri","volume-title":"Proc. OSDI","author":"Ananthanarayanan"},{"issue":"2","key":"ref13","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref14","first-page":"8","article-title":"MicroTE","volume-title":"Proc. 7th Conf. Emerg. Netw. Exp. Technol. (CoNEXT)","author":"Benson"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/2200000024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098840"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787480"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390237"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018448"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626315"},{"key":"ref22","first-page":"21","article-title":"MapReduce online","volume-title":"Proc. NSDI","author":"Condie"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626322"},{"key":"ref25","first-page":"565","article-title":"Is advance knowledge of flow sizes a plausible assumption?","volume-title":"NSDI","author":"Dukic","year":"2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63574-2_24"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/9780470980033"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999592"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273005"},{"key":"ref31","article-title":"A study on the Morris Worm","author":"Jajoo","year":"2021","journal-title":"arXiv:2112.07647"},{"article-title":"Graviton: Twisting space and time to speed-up coflows","volume-title":"Proc. 8th USENIX Workshop Hot Topics Cloud Comput. (HotCloud)","author":"Jajoo","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143364"},{"key":"ref34","article-title":"Saath: Speeding up coflows by exploiting the spatial dimension","author":"Jajoo","year":"2021","journal-title":"arXiv:2111.08572"},{"key":"ref35","first-page":"833","article-title":"Your coflow has many flows: Sampling them for fun and speed","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Jajoo"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3138923"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3222649"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2022.3222649"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787488"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(85)90002-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60153-8_35"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934879"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/9780470374597"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626309"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522715"},{"key":"ref46","first-page":"629","article-title":"Analysis of first-come-first-serve parallel job scheduling","volume-title":"Proc. SODA","author":"Schwiegelshohn"},{"key":"ref47","first-page":"349","article-title":"Performance isolation and fairness for multi-tenant cloud storage","volume-title":"Proc. OSDI","author":"Shue"},{"volume-title":"Process Scheduling. Operating System Concepts","year":"1998","author":"Silberschatz","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755940"},{"key":"ref50","first-page":"10","article-title":"Spark","volume-title":"Proc. HotCloud","author":"Zaharia"},{"key":"ref51","first-page":"29","article-title":"Improving mapreduce performance in heterogeneous environments","volume-title":"Proc. OSDI","author":"Zaharia"},{"key":"ref52","first-page":"160","article-title":"Coda","volume-title":"Proc. SIGCOMM","author":"Zhang"},{"volume-title":"Exploiting the spatial dimension of big data jobs for efficient cluster job scheduling","year":"2020","author":"Jajoo","key":"ref53"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/9859542\/9697334-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9859542\/09697334.pdf?arnumber=9697334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:16:25Z","timestamp":1705533385000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9697334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":53,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2021.3138923","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"type":"print","value":"1063-6692"},{"type":"electronic","value":"1558-2566"}],"subject":[],"published":{"date-parts":[[2022,8]]}}}