{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:22Z","timestamp":1767339502186,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":32,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3229543.3229550","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"60-66","source":"Crossref","is-referenced-by-count":64,"title":["Improving TCP Congestion Control with Machine Intelligence"],"prefix":"10.1145","author":[{"given":"Yiming","family":"Kong","sequence":"first","affiliation":[{"name":"School of ECE, Georgia Tech, Atlanta, GA"}]},{"given":"Hui","family":"Zang","sequence":"additional","affiliation":[{"name":"Futurewei Technologies, Inc., Santa Clara, CA"}]},{"given":"Xiaoli","family":"Ma","sequence":"additional","affiliation":[{"name":"School of ECE, Georgia Tech, Atlanta, GA"}]}],"member":"320","reference":[{"key":"key-10.1145\/3229543.3229550-1","doi-asserted-by":"crossref","unstructured":"Guido Appenzeller. 2005. Sizing router buffers. Ph.D. Dissertation. Stanford University, Palo Alto, CA.","DOI":"10.1145\/1015467.1015499"},{"key":"key-10.1145\/3229543.3229550-2","doi-asserted-by":"crossref","unstructured":"Saad Biaz and Nitin H Vaidya. 1998. Distinguishing congestion losses from wireless transmission losses: A negative result. In Proc. 7th International Conference on Computer Communications and Networks. IEEE, Lafayette, LA, 722--731.","DOI":"10.1109\/ICCCN.1998.998834"},{"key":"key-10.1145\/3229543.3229550-3","doi-asserted-by":"crossref","unstructured":"Lawrence S. Brakmo and Larry L. Peterson. 1995. TCP Vegas: End to end congestion avoidance on a global Internet. IEEE Journal on selected Areas in communications 13, 8 (1995), 1465--1480.","DOI":"10.1109\/49.464716"},{"key":"key-10.1145\/3229543.3229550-4","unstructured":"Mo Dong, Qingxi Li, and Doron Zarchy. 2015. PCC: Re-architecting Congestion Control for Consistent High Performance. In Proc. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI'15). ACM, Oakland, CA, 395--408."},{"key":"key-10.1145\/3229543.3229550-5","doi-asserted-by":"crossref","unstructured":"Sally Floyd and Tom Henderson. 1999. The NewReno modification to TCP's fast recovery algorithm. RFC 2582 (1999).","DOI":"10.17487\/rfc2582"},{"key":"key-10.1145\/3229543.3229550-6","doi-asserted-by":"crossref","unstructured":"Sangtae Ha, Injong Rhee, and Lisong Xu. 2008. CUBIC: a new TCP-friendly high-speed TCP variant. ACM SIGOPS Operating Systems Review 42, 5 (2008), 64--74.","DOI":"10.1145\/1400097.1400105"},{"key":"key-10.1145\/3229543.3229550-7","unstructured":"Tin Kam Ho. 1995. Random decision forests. In Proc. the 3rd international conference on Document analysis and recognition. IEEE, Montreal, Que., Canada, 278--282."},{"key":"key-10.1145\/3229543.3229550-8","doi-asserted-by":"crossref","unstructured":"Tin Kam Ho. 1998. The random subspace method for constructing decision forests. IEEE transactions on pattern analysis and machine intelligence 20, 8 (1998), 832--844.","DOI":"10.1109\/34.709601"},{"key":"key-10.1145\/3229543.3229550-9","doi-asserted-by":"crossref","unstructured":"Van Jacobson. 1988. Congestion avoidance and control. In Proc. ACM SIGCOMM. ACM, Stanford, CA, 314--329.","DOI":"10.1145\/52324.52356"},{"key":"key-10.1145\/3229543.3229550-10","unstructured":"Van Jacobson. 1990. Modified TCP congestion avoidance algorithm. note sent to end2end-interest mailing list (1990)."},{"key":"key-10.1145\/3229543.3229550-11","doi-asserted-by":"crossref","unstructured":"Raj Jain. 1989. A delay-based approach for congestion avoidance in interconnected heterogeneous computer networks. ACM SIGCOMM Computer Communication Review 19, 5 (1989), 56--71.","DOI":"10.1145\/74681.74686"},{"key":"key-10.1145\/3229543.3229550-12","unstructured":"Raj Jain, Dah-Ming Chiu, and William R Hawe. 1984. A quantitative measure of fairness and discrimination for resource allocation in shared computer system. Vol. 38. Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA."},{"key":"key-10.1145\/3229543.3229550-13","doi-asserted-by":"crossref","unstructured":"A Jayaraj, T Venkatesh, and C Siva Ram Murthy. 2008. Loss classification in optical burst switching networks using machine learning techniques: Improving the performance of TCP. IEEE Journal on Selected Areas in Communications 26, 6 (2008).","DOI":"10.1109\/JSACOCN.2008.033508"},{"key":"key-10.1145\/3229543.3229550-14","unstructured":"Junchen Jiang, Shijie Sun, Vyas Sekar, and Hui Zhang. 2017. Pytheas: Enabling Data-Driven Quality of Experience Optimization Using Group-Based Exploration-Exploitation. In Proc. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI'17). ACM, BOSTON, MA, 393--406."},{"key":"key-10.1145\/3229543.3229550-15","doi-asserted-by":"crossref","unstructured":"Dina Katabi, Mark Handley, and Charlie Rohrs. 2002. Congestion control for high bandwidth-delay product networks. ACM SIGCOMM computer communication review 32, 4 (2002), 89--102.","DOI":"10.1145\/964725.633035"},{"key":"key-10.1145\/3229543.3229550-16","doi-asserted-by":"crossref","unstructured":"Wei Li, Fan Zhou, Waleed Meleis, and Kaushik Chowdhury. 2016. Learning-based and Data-driven TCP Design for Memory-constrained IoT. In Proc. International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, Washington, DC, 199--205.","DOI":"10.1109\/DCOSS.2016.8"},{"key":"key-10.1145\/3229543.3229550-17","doi-asserted-by":"crossref","unstructured":"Dapeng Liu, Youjian Zhao, Kaixin Sui, Lei Zou, Dan Pei, Qingqian Tao, Xiyang Chen, and Dai Tan. 2016. FOCUS: Shedding light on the high search response time in the wild. In Proc. The 35th Annual IEEE International Conference on Computer Communications (INFOCOM). IEEE, San Francisco, CA, 1--9.","DOI":"10.1109\/INFOCOM.2016.7524413"},{"key":"key-10.1145\/3229543.3229550-18","doi-asserted-by":"crossref","unstructured":"Dapeng Liu, Youjian Zhao, Haowen Xu, Yongqian Sun, Dan Pei, Jiao Luo, Xiaowei Jing, and Mei Feng. 2015. Opprentice: Towards practical and automatic anomaly detection through machine learning. In Proc. the Internet Measurement Conference. ACM, Tokyo, Japan, 211--224.","DOI":"10.1145\/2815675.2815679"},{"key":"key-10.1145\/3229543.3229550-19","doi-asserted-by":"crossref","unstructured":"Hongzi Mao, Mohammad Alizadeh, Ishai Menache, and Srikanth Kandula. 2016. Resource management with deep reinforcement learning. In Proc. the 15th ACM Workshop on Hot Topics in Networks. ACM, Atlanta, GA, 50--56.","DOI":"10.1145\/3005745.3005750"},{"key":"key-10.1145\/3229543.3229550-20","doi-asserted-by":"crossref","unstructured":"Hongzi Mao, Ravi Netravali, and Mohammad Alizadeh. 2017. Neural adaptive video streaming with Pensieve. In Proc. ACM SIGCOMM. ACM, Los Angeles, CA, 197--210.","DOI":"10.1145\/3098822.3098843"},{"key":"key-10.1145\/3229543.3229550-21","doi-asserted-by":"crossref","unstructured":"Mariyam Mirza, Joel Sommers, Paul Barford, and Xiaojin Zhu. 2010. A machine learning approach to TCP throughput prediction. IEEE\/ACM Transactions on Networking 18, 4 (2010), 1026--1039.","DOI":"10.1109\/TNET.2009.2037812"},{"key":"key-10.1145\/3229543.3229550-22","unstructured":"Bruno Astuto Arouche Nunes, Kerry Veenstra, William Ballenthin, Stephanie Lukin, and Katia Obraczka. 2014. A machine learning framework for TCP round-trip time estimation. EURASIP Journal on Wireless Communications and Networking 1 (2014), 47."},{"key":"key-10.1145\/3229543.3229550-23","doi-asserted-by":"crossref","unstructured":"Lopamudra Roychoudhuri and Ehab S Al-Shaer. 2005. Real-time packet loss prediction based on end-to-end delay variation. IEEE transactions on Network and Service Management 2, 1 (2005), 29--38.","DOI":"10.1109\/TNSM.2005.4798299"},{"key":"key-10.1145\/3229543.3229550-24","doi-asserted-by":"crossref","unstructured":"Anirudh Sivaraman, Keith Winstein, Pratiksha Thaker, and Hari Balakrishnan. 2014. An experimental study of the learnability of congestion control. In Proc. ACM SIGCOMM. ACM, Chicago, IL, 479--490.","DOI":"10.1145\/2619239.2626324"},{"key":"key-10.1145\/3229543.3229550-25","doi-asserted-by":"crossref","unstructured":"Yi Sun, Xiaoqi Yin, Junchen Jiang, Vyas Sekar, Fuyuan Lin, Nanshu Wang, Tao Liu, and Bruno Sinopoli. 2016. CS2P: Improving video bitrate selection and adaptation with data-driven throughput prediction. In Proc. ACM SIGCOMM. ACM, Florian&#243;polis, Brazil, 272--285.","DOI":"10.1145\/2934872.2934898"},{"key":"key-10.1145\/3229543.3229550-26","unstructured":"Richard S Sutton and Andrew G Barto. 1998. Reinforcement learning: An introduction. Vol. 1. Cambridge: MIT press."},{"key":"key-10.1145\/3229543.3229550-27","doi-asserted-by":"crossref","unstructured":"C-H Tai, Jiang Zhu, and Nandita Dukkipati. 2008. Making large scale deployment of RCP practical for real networks. In Proc. The 27th Conference on Computer Communications. IEEE, Phoenix, AZ, 2180--2188.","DOI":"10.1109\/INFOCOM.2008.285"},{"key":"key-10.1145\/3229543.3229550-28","doi-asserted-by":"crossref","unstructured":"Kun Tan, Jingmin Song, Qian Zhang, and Murad Sridharan. 2006. A compound TCP approach for high-speed and long distance networks. In Proc. IEEE INFOCOM. IEEE, Barcelona, Spain, 1--12.","DOI":"10.1109\/INFOCOM.2006.188"},{"key":"key-10.1145\/3229543.3229550-29","doi-asserted-by":"crossref","unstructured":"Zheng Wang and Jon Crowcroft. 1991. A new congestion control scheme: Slow start and search (Tri-S). ACM SIGCOMM Computer Communication Review 21, 1 (1991), 32--43.","DOI":"10.1145\/116030.116033"},{"key":"key-10.1145\/3229543.3229550-30","unstructured":"Christopher John Cornish Hellaby Watkins. 1989. Learning from delayed rewards. Ph.D. Dissertation. King's College, Cambridge, Cambridge, UK."},{"key":"key-10.1145\/3229543.3229550-31","doi-asserted-by":"crossref","unstructured":"Keith Winstein and Hari Balakrishnan. 2013. TCP ex machina: Computer-generated congestion control. In Proc. ACM SIGCOMM. ACM, Hong Kong, China, 123--134.","DOI":"10.1145\/2486001.2486020"},{"key":"key-10.1145\/3229543.3229550-32","doi-asserted-by":"crossref","unstructured":"Yasir Zaki, Thomas P&#246;tsch, Jay Chen, Lakshminarayanan Subramanian, and Carmelita G&#246;rg. 2015. Adaptive congestion control for unpredictable cellular networks. In Proc. ACM SIGCOMM. ACM, London, United Kingdom, 509--522.","DOI":"10.1145\/2785956.2787498"}],"event":{"name":"the 2018 Workshop","start":{"date-parts":[[2018,8,24]]},"sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication"],"location":"Budapest, Hungary","end":{"date-parts":[[2018,8,24]]},"acronym":"NetAI'18"},"container-title":["Proceedings of the 2018 Workshop on Network Meets AI &amp; ML - NetAI'18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229543.3229550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3229550&ftid=1992145&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:43Z","timestamp":1750210783000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3229543.3229550"}},"subtitle":[],"proceedings-subject":"Network Meets AI & ML","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1145\/3229543.3229550","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}