{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:25:14Z","timestamp":1775579114118,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1618921"],"award-info":[{"award-number":["CNS-1618921"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3230543.3230558","type":"proceedings-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:13:06Z","timestamp":1533755586000},"page":"44-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":287,"title":["Oboe"],"prefix":"10.1145","author":[{"given":"Zahaib","family":"Akhtar","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"given":"Yun Seong","family":"Nam","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Ramesh","family":"Govindan","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Sanjay","family":"Rao","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Jessica","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Windsor"}]},{"given":"Ethan","family":"Katz-Bassett","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Bruno","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Jibin","family":"Zhan","sequence":"additional","affiliation":[{"name":"Conviva"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Conviva"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Microsoft Smooth Streaming. http:\/\/www.iis.net\/downloads\/microsoft\/smooth-streaming. Microsoft Smooth Streaming. http:\/\/www.iis.net\/downloads\/microsoft\/smooth-streaming."},{"key":"e_1_3_2_1_2_1","unstructured":"Toward A Practical Perceptual Video Quality Metric. https:\/\/medium.com\/netflix-techblog\/toward-a-practical-perceptual-video-quality-metric-653f208b9652. Toward A Practical Perceptual Video Quality Metric. https:\/\/medium.com\/netflix-techblog\/toward-a-practical-perceptual-video-quality-metric-653f208b9652."},{"key":"e_1_3_2_1_3_1","unstructured":"Adobe OSMF player. http:\/\/www.osmf.org. Adobe OSMF player. http:\/\/www.osmf.org."},{"key":"e_1_3_2_1_4_1","unstructured":"Oracle: 5 Reasons to Consider SaaS for Your Business Applications. http:\/\/www.oracle.com\/us\/solutions\/cloud\/saas-business-applications-1945540.pdf. Oracle: 5 Reasons to Consider SaaS for Your Business Applications. http:\/\/www.oracle.com\/us\/solutions\/cloud\/saas-business-applications-1945540.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"Chrome Remote Interface. https:\/\/github.com\/cyrus-and\/chrome-remote-interface. Chrome Remote Interface. https:\/\/github.com\/cyrus-and\/chrome-remote-interface."},{"key":"e_1_3_2_1_6_1","unstructured":"Cisco: It Came to Me in a Stream. https:\/\/www.cisco.com\/web\/about\/ac79\/docs\/sp\/Online-Video-Consumption_Consumers.pdf. Cisco: It Came to Me in a Stream. https:\/\/www.cisco.com\/web\/about\/ac79\/docs\/sp\/Online-Video-Consumption_Consumers.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"DASH Industry Forum. https:\/\/github.com\/Dash-Industry-Forum\/dash.js. DASH Industry Forum. https:\/\/github.com\/Dash-Industry-Forum\/dash.js."},{"key":"e_1_3_2_1_8_1","unstructured":"Federal Communications Commission. Raw Data - Measuring Broadband America. www.fcc.gov\/reports-research\/reports\/measuring-broadband-america\/raw-data-measuring-broadband-america-2016. Federal Communications Commission. Raw Data - Measuring Broadband America. www.fcc.gov\/reports-research\/reports\/measuring-broadband-america\/raw-data-measuring-broadband-america-2016."},{"key":"e_1_3_2_1_9_1","unstructured":"Google-Chrome: Chrome DevTools Protocol. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Network\/. Google-Chrome: Chrome DevTools Protocol. https:\/\/chromedevtools.github.io\/devtools-protocol\/tot\/Network\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Bayesian Changepoint Detection. https:\/\/github.com\/hildensia\/bayesian_changepoint_detection. Bayesian Changepoint Detection. https:\/\/github.com\/hildensia\/bayesian_changepoint_detection."},{"key":"e_1_3_2_1_11_1","unstructured":"Pensieve. https:\/\/github.com\/hongzimao\/pensieve. Pensieve. https:\/\/github.com\/hongzimao\/pensieve."},{"key":"e_1_3_2_1_12_1","unstructured":"DASH Industry Forum. https:\/\/dash.akamaized.net\/envivio\/EnvivioDash3. DASH Industry Forum. https:\/\/dash.akamaized.net\/envivio\/EnvivioDash3."},{"key":"e_1_3_2_1_13_1","unstructured":"Sandvine: Global Internet phenomena report . https:\/\/www.sandvine.com\/downloads\/general\/global-internet-phenomena\/2014\/2h-2014-global-internet-phenomena-report.pdf. Sandvine: Global Internet phenomena report . https:\/\/www.sandvine.com\/downloads\/general\/global-internet-phenomena\/2014\/2h-2014-global-internet-phenomena-report.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"Bayesian Online Changepoint Detection. In arXiv:0710.3742v1","author":"Adams Ryan Prescott","year":"2007","unstructured":"Ryan Prescott Adams and David JC MacKay . Bayesian Online Changepoint Detection. In arXiv:0710.3742v1 , 2007 . Ryan Prescott Adams and David JC MacKay. Bayesian Online Changepoint Detection. In arXiv:0710.3742v1, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2229087.2229092"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486025"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/258623.258631"},{"issue":"421","key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1080\/01621459.1993.10594323","article-title":"A Bayesian Analysis for Change Point Problems","volume":"88","author":"Barry Daniel","year":"1993","unstructured":"Daniel Barry and John A Hartigan . A Bayesian Analysis for Change Point Problems . Journal of the American Statistical Society , 88 ( 421 ): 309 -- 319 , 1993 . Daniel Barry and John A Hartigan. A Bayesian Analysis for Change Point Problems. Journal of the American Statistical Society, 88(421):309--319, 1993.","journal-title":"Journal of the American Statistical Society"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2910017.2910603"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2014.885273"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.851098"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018478"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-006-8450-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934873"},{"key":"e_1_3_2_1_26_1","volume-title":"Introduction to Statistical Time Series","author":"Fuller Wayne A","year":"1976","unstructured":"Wayne A Fuller . Introduction to Statistical Time Series . John Wiley and Sons , 1976 . Wayne A Fuller. Introduction to Statistical Time Series. John Wiley and Sons, 1976."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987481"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098043"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Association for Advancement of Artificial Intelligence, AAAI","author":"Henderson Peter","year":"2018","unstructured":"Peter Henderson , Riashat Islam , Philip Bachman , Joelle Pineau , Doina Precup , and David Meger . Deep Reinforcement Learning that Matters . In Proceedings of the Association for Advancement of Artificial Intelligence, AAAI , 2018 . Peter Henderson, Riashat Islam, Philip Bachman, Joelle Pineau, Doina Precup, and David Meger. Deep Reinforcement Learning that Matters. In Proceedings of the Association for Advancement of Artificial Intelligence, AAAI, 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155555.2155557"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398800"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626296"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2009.05.029"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413189"},{"key":"e_1_3_2_1_35_1","volume-title":"Srikanth V Krishnamurthy. Understanding the Effects of Hotspots in Wireless Cellular Networks. In Proceedings of the Conference of the IEEE Computer and Communications Societies, INFOCOM","author":"Jobin James","year":"2004","unstructured":"James Jobin , Michalis Faloutsos , Satish K Tripathi , and Srikanth V Krishnamurthy. Understanding the Effects of Hotspots in Wireless Cellular Networks. In Proceedings of the Conference of the IEEE Computer and Communications Societies, INFOCOM , 2004 . James Jobin, Michalis Faloutsos, Satish K Tripathi, and Srikanth V Krishnamurthy. Understanding the Effects of Hotspots in Wireless Cellular Networks. In Proceedings of the Conference of the IEEE Computer and Communications Societies, INFOCOM, 2004."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/645496.657889"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398799"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.17"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098843"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2016.7838090"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"e_1_3_2_1_42_1","volume-title":"Koray Kavukcuoglu. Asynchronous Methods for Deep Reinforcement Learning. In Proceedings of the International Conference on Machine Learning, ICML","author":"Mnih Volodymyr","year":"2016","unstructured":"Volodymyr Mnih , Adria Puigdomenech Badia , Mehdi Mirza , Alex Graves , Timothy Lillicrap , Tim Harley , David Silver , and Koray Kavukcuoglu. Asynchronous Methods for Deep Reinforcement Learning. In Proceedings of the International Conference on Machine Learning, ICML , 2016 . Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. Asynchronous Methods for Deep Reinforcement Learning. In Proceedings of the International Conference on Machine Learning, ICML, 2016."},{"key":"e_1_3_2_1_43_1","volume-title":"Statistics and Random Processes. Kappa Research","author":"Pishro-Nik Hossein","year":"2014","unstructured":"Hossein Pishro-Nik . Introduction to Probability , Statistics and Random Processes. Kappa Research , 2014 . Hossein Pishro-Nik. Introduction to Probability, Statistics and Random Processes. Kappa Research, 2014."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.146"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483977.2483991"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285292"},{"key":"e_1_3_2_1_48_1","volume-title":"Ramesh K Sitaraman. BOLA: Near-optimal Bitrate Adaptation for Online Videos. In Proceedings of the IEEE International Conference on Computer Communications, INFOCOM","author":"Spiteri Kevin","year":"2016","unstructured":"Kevin Spiteri , Rahul Urgaonkar , and Ramesh K Sitaraman. BOLA: Near-optimal Bitrate Adaptation for Online Videos. In Proceedings of the IEEE International Conference on Computer Communications, INFOCOM , 2016 . Kevin Spiteri, Rahul Urgaonkar, and Ramesh K Sitaraman. BOLA: Near-optimal Bitrate Adaptation for Online Videos. In Proceedings of the IEEE International Conference on Computer Communications, INFOCOM, 2016."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934898"},{"key":"e_1_3_2_1_50_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","year":"1998","unstructured":"Richard S Sutton and Andrew G Barto . Reinforcement learning: An introduction . MIT press Cambridge , 1998 . Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction. MIT press Cambridge, 1998."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413190"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_3"},{"key":"e_1_3_2_1_53_1","volume-title":"Filip De Turck. A Learning-based Algorithm for Improved Bandwidth-awareness of Adaptive Streaming Clients. In Symposium on Integrated Network Management, IM","author":"van der Hooft Jeroen","year":"2015","unstructured":"Jeroen van der Hooft , Stefano Petrangeli , Maxim Claeys , Jeroen Famaey , and Filip De Turck. A Learning-based Algorithm for Improved Bandwidth-awareness of Adaptive Streaming Clients. In Symposium on Integrated Network Management, IM , 2015 . Jeroen van der Hooft, Stefano Petrangeli, Maxim Claeys, Jeroen Famaey, and Filip De Turck. A Learning-based Algorithm for Improved Bandwidth-awareness of Adaptive Streaming Clients. In Symposium on Integrated Network Management, IM, 2015."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150498"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540099108946587"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273629"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775148"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787486"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505228"}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","location":"Budapest Hungary","acronym":"SIGCOMM '18","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230558","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230543.3230558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:46Z","timestamp":1750210786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230543.3230558"}},"subtitle":["auto-tuning video ABR algorithms to network conditions"],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":60,"alternative-id":["10.1145\/3230543.3230558","10.1145\/3230543"],"URL":"https:\/\/doi.org\/10.1145\/3230543.3230558","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}