{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T06:54:17Z","timestamp":1773557657253,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1804003"],"award-info":[{"award-number":["2019YFB1804003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tnsm.2023.3340848","type":"journal-article","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T14:20:19Z","timestamp":1702045219000},"page":"1634-1647","source":"Crossref","is-referenced-by-count":4,"title":["End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8593-0558","authenticated-orcid":false,"given":"Weiping","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minli","family":"Hong","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruihao","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8160-1294","authenticated-orcid":false,"given":"Xiaomao","family":"Fan","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2817-7337","authenticated-orcid":false,"given":"Yuxuan","family":"Liang","sequence":"additional","affiliation":[{"name":"Intelligent Transportation Thrust, Hong Kong University of Science and Technology, Guangzhou, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1526-5326","authenticated-orcid":false,"given":"Gansen","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, South China Normal University, Guangzhou, Guangdong, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7410-2590","authenticated-orcid":false,"given":"Roger","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"School of Computing, National University of Singapore, Cluny Road, Singapore"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3215669"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3138808.3138810"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047843"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109329"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3229607.3229613"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162765"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007528"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000405"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314357"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342317"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3538394.3546038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO56286.2022.9965050"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2021.3077537"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102985"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3235719"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.03.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3077736"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.053"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3038918"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685656"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2925393"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2023.3269983"},{"key":"ref27","first-page":"1725","article-title":"Simple and deep graph convolutional networks","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10048915"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/505"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"ref32","first-page":"1","article-title":"Graph transformer networks","volume-title":"Proc. 33rd Adv. Neural Inf. Process. Syst.","author":"Yun"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108146"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.12.033"},{"key":"ref35","first-page":"21618","article-title":"Rethinking graph transformers with spectral attention","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Kreuzer"},{"key":"ref36","first-page":"3469","article-title":"Structure-aware transformer for graph representation learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref37","first-page":"12559","article-title":"Self-supervised graph transformer on large-scale molecular data","volume-title":"Proc. 34th Adv. Neural Inf. Process. Syst.","author":"Rong"},{"key":"ref38","first-page":"1","article-title":"A generalization of transformer networks to graphs","volume-title":"Proc. AAAI Workshop Deep Learn. Graphs Methods Appl.","author":"Dwivedi"},{"key":"ref39","first-page":"13266","article-title":"Representing long-range context for graph neural networks with global attention","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Wu"},{"key":"ref40","first-page":"28877","article-title":"Do transformers really perform badly for graph representation?","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Ying"},{"key":"ref41","first-page":"1","article-title":"Grpe: Relative positional encoding for graph transformer","volume-title":"Proc. ICLR Mach. Learn. Drug Discov.","author":"Park"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3202195"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3477141"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342327"},{"key":"ref45","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. ICLR","author":"Velickovic"},{"key":"ref46","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Kipf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210006"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845132"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-3007"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10499985\/10349684.pdf?arnumber=10349684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T18:26:17Z","timestamp":1766687177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10349684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2023.3340848","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}