{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T07:32:56Z","timestamp":1774078376142,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSF of China","doi-asserted-by":"crossref","award":["62422207"],"award-info":[{"award-number":["62422207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ton.2026.3670142","type":"journal-article","created":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:51:28Z","timestamp":1772571088000},"page":"4126-4137","source":"Crossref","is-referenced-by-count":0,"title":["Handling Traffic Uncertainty in Failure-Tolerant Traffic Engineering"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-5185-7595","authenticated-orcid":false,"given":"Shiju","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-9655","authenticated-orcid":false,"given":"Jiaqi","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604860"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230545"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref5","first-page":"325","article-title":"Decentralized cloud wide-area network traffic engineering with BLASTSHIELD","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Krishnaswamy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342069"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405858"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626336"},{"key":"ref9","first-page":"157","article-title":"Semi-oblivious traffic engineering: The road not taken","volume-title":"Proc. 15th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Kumar"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626314"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672258"},{"key":"ref12","first-page":"1557","article-title":"DOTE: Rethinking (predictive) WAN traffic engineering","volume-title":"Proc. 20th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Perry"},{"key":"ref13","first-page":"201","article-title":"Cost-effective cloud edge traffic engineering with cascara","volume-title":"Proc. 18th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Singh"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472895"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472921"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3410048.3410079"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993756"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851218"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2016.7784449"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604857"},{"key":"ref22","first-page":"217","article-title":"A social network under social distancing: Risk-driven backbone management during COVID-19 and beyond","volume-title":"Proc. 18th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Xia"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3922"},{"key":"ref24","first-page":"9558","article-title":"Differentiable convex optimization layers","volume-title":"Proc. Neural Inf. Process. Syst","volume":"32","author":"Agrawal"},{"key":"ref25","first-page":"136","article-title":"OptNet: Differentiable optimization as a layer in neural networks","volume-title":"Proc. Intl. Conf. Mach. Learn.","author":"Amos"},{"key":"ref26","first-page":"46505","article-title":"TaskMet: Task-driven metric learning for model learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst","author":"Amos"},{"key":"ref27","first-page":"5484","article-title":"Task-based end-to-end model learning in stochastic optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst","volume":"30","author":"Donti"},{"key":"ref28","first-page":"1320","article-title":"Decision-focused learning without decision-making: Learning locally optimized decision losses","volume-title":"Proc. Adv. Neural Inf. Process. Syst","author":"Perrault"},{"key":"ref29","first-page":"27332","article-title":"Landscape surrogate: Learning decision losses for mathematical optimization under partial information","volume-title":"Proc. Adv. Neural Inf. Process. Syst","author":"Amos"},{"key":"ref30","author":"Zhao","year":"2025","journal-title":"Tuftte: Handling Traffic Uncertainty in Failure-Tolerant Traffic Engineering"},{"key":"ref31","first-page":"347","article-title":"Robust validation of network designs under uncertain demands and failures","volume-title":"Proc. 14th USENIX Symp. Networked Syst. Design Implement","author":"Chang"},{"key":"ref32","first-page":"545","article-title":"Meaningful availability","volume-title":"Proc. 17th USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Hauer"},{"key":"ref33","article-title":"SNDlib: Survivable Network Design Library","year":"2025","journal-title":"ZIB Solver Collection Team"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472918"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604854"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181881"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195833"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159926"},{"key":"ref39","year":"2025","journal-title":"Python 3.13.7 Documentation"},{"key":"ref40","volume-title":"Gurobi Optimizer Reference Manual","author":"Optimization","year":"2025"},{"issue":"83","key":"ref41","first-page":"1","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"Diamond","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.845527"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863991"},{"key":"ref44","first-page":"175","article-title":"Contracting wide-area network topologies to solve flow problems quickly","volume-title":"Proc. 18th USENIX Symp. Networked Syst. Design Implement","author":"Abuzaid"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483588"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/11317935\/11419644.pdf?arnumber=11419644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T04:34:45Z","timestamp":1774067685000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11419644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/ton.2026.3670142","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}