{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:30:13Z","timestamp":1765269013691,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"The Youth Project of National Natural Science Foundation of China"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202242","62402248"],"award-info":[{"award-number":["62202242","62402248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Openning Project of Key Laboratory of Computing Power Network and Information Security"},{"DOI":"10.13039\/100010449","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010449","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014890","name":"Qilu University of Technology","doi-asserted-by":"publisher","award":["2023ZD014"],"award-info":[{"award-number":["2023ZD014"]}],"id":[{"id":"10.13039\/501100014890","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tpds.2024.3508275","type":"journal-article","created":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T19:00:39Z","timestamp":1732820439000},"page":"197-211","source":"Crossref","is-referenced-by-count":1,"title":["Slark: A Performance Robust Decentralized Inter-Datacenter Deadline-Aware Coflows Scheduling Framework With Local Information"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9254-3963","authenticated-orcid":false,"given":"Xiaodong","family":"Dong","sequence":"first","affiliation":[{"name":"College of Cyber Science and the College of Computer Science, Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8569-3739","authenticated-orcid":false,"given":"Lihai","family":"Nie","sequence":"additional","affiliation":[{"name":"College of Cyber Science and the College of Computer Science, Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2984-2661","authenticated-orcid":false,"given":"Zheli","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Cyber Science and the College of Computer Science, Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2735365"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.06.015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390237"},{"key":"ref4","first-page":"507","article-title":"Siphon: Expediting inter-datacenter coflows in wide-area data analytics","volume-title":"Proc. 2018 USENIX Conf. Usenix Annu. Tech. Conf.","author":"Liu"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934893"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787505"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626315"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking55013.2022.9829789"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511249"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422563"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934880"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787480"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162722"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2023.3315512"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163039"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.06.025"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2525767"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784423"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524532"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP55882.2022.9940377"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109178"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485828"},{"key":"ref23","first-page":"64","article-title":"Markov processes over denumerable products of spaces, describing large systems of automata","volume":"5","author":"Vaserstein","year":"1969","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831050"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115408"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230569"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624126"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/458"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3354245"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218408"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2930721"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3344481"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2889251"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3068424"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3187821"},{"key":"ref36","first-page":"565","article-title":"Is advance knowledge of flow sizes a plausible assumption?","volume-title":"Proc. 16th USENIX Symp. Netw. Syst. Des. Implementation","author":"Dukic"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/71\/10795769\/10770555.pdf?arnumber=10770555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:53:29Z","timestamp":1734072809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10770555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":36,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2024.3508275","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"type":"print","value":"1045-9219"},{"type":"electronic","value":"1558-2183"},{"type":"electronic","value":"2161-9883"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}