{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:04:15Z","timestamp":1778256255325,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1703014, CNS-1717493"],"award-info":[{"award-number":["CNS-1703014, CNS-1717493"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1711265"],"award-info":[{"award-number":["U1711265"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3323679.3326525","type":"proceedings-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:07:11Z","timestamp":1559664431000},"page":"271-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Online Scheduling of Traffic Diversion and Cloud Scrubbing with Uncertainty in Current Inputs"],"prefix":"10.1145","author":[{"given":"Lei","family":"Jiao","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, University of Oregon, Eugene, OR, USA"}]},{"given":"Ruiting","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Xiaojun","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA"}]},{"given":"Xu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Free IP address to ASN database. https:\/\/iptoasn.com\/.  2018. Free IP address to ASN database. https:\/\/iptoasn.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Gurobi Optimization - The State-of-the-Art Mathematical Programming Solver. http:\/\/www.gurobi.com.  2018. Gurobi Optimization - The State-of-the-Art Mathematical Programming Solver. http:\/\/www.gurobi.com."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Incapsula Global Network Map | Instantly Localizing Your Content. https:\/\/www.incapsula.com\/incapsula-global-network-map.html.  2018. Incapsula Global Network Map | Instantly Localizing Your Content. https:\/\/www.incapsula.com\/incapsula-global-network-map.html."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. Level 3\u00ae DDoS Mitigation. http:\/\/www.level3.com\/~\/media\/files\/brochures\/en_secur_br_ddos_mitigation.pdf.  2018. Level 3\u00ae DDoS Mitigation. http:\/\/www.level3.com\/~\/media\/files\/brochures\/en_secur_br_ddos_mitigation.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. The CAIDA AS Relationships (Geo) Dataset. http:\/\/www.caida.org\/data\/as-relationships-geo\/.  2018. The CAIDA AS Relationships (Geo) Dataset. http:\/\/www.caida.org\/data\/as-relationships-geo\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. U.S. Energy Information Administration (EIA). https:\/\/www.eia.gov\/electricity\/wholesale\/.  2018. U.S. Energy Information Administration (EIA). https:\/\/www.eia.gov\/electricity\/wholesale\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. What does a BGP route cost? http:\/\/bill.herrin.us\/network\/bgpcost.html.  2018. What does a BGP route cost? http:\/\/bill.herrin.us\/network\/bgpcost.html."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JOCO.0000038913.96607.c2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Lachlan Andrew Siddharth Barman Katrina Ligett Minghong Lin Adam Meyerson Alan Roytman and Adam Wierman. 2013. A tale of two metrics: Simultaneous bounds on competitiveness and regret. In ACL COLT.  Lachlan Andrew Siddharth Barman Katrina Ligett Minghong Lin Adam Meyerson Alan Roytman and Adam Wierman. 2013. A tale of two metrics: Simultaneous bounds on competitiveness and regret. In ACL COLT.","DOI":"10.1145\/2465529.2465533"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Niv Buchbinder Shahar Chen and Joseph Seffi Naor. 2014. Competitive Analysis via Regularization. In ACM-SIAM SODA.   Niv Buchbinder Shahar Chen and Joseph Seffi Naor. 2014. Competitive Analysis via Regularization. In ACM-SIAM SODA.","DOI":"10.1137\/1.9781611973402.32"},{"key":"e_1_3_2_1_11_1","volume-title":"Joshep Seffi Naor, and Ohad Shamir","author":"Buchbinder Niv","year":"2012","unstructured":"Niv Buchbinder , Shahar Chen , Joshep Seffi Naor, and Ohad Shamir . 2012 . Unified Algorithms for Online Learning and Competitive Analysis. In ACL COLT. Niv Buchbinder, Shahar Chen, Joshep Seffi Naor, and Ohad Shamir. 2012. Unified Algorithms for Online Learning and Competitive Analysis. In ACL COLT."},{"key":"e_1_3_2_1_12_1","unstructured":"Robert D Carr Lisa K Fleischer Vitus J Leung and Cynthia A Phillips. 2000. Strengthening Integrality Gaps for Capacitated Network Design and Covering Problems. In ACM-SIAM SODA.   Robert D Carr Lisa K Fleischer Vitus J Leung and Cynthia A Phillips. 2000. Strengthening Integrality Gaps for Capacitated Network Design and Covering Problems. In ACM-SIAM SODA."},{"key":"e_1_3_2_1_13_1","unstructured":"Niangjun Chen Gautam Goel and Adam Wierman. 2018. Smoothed Online Convex Optimization in High Dimensions via Online Balanced Descent. In ACL COLT.  Niangjun Chen Gautam Goel and Adam Wierman. 2018. Smoothed Online Convex Optimization in High Dimensions via Online Balanced Descent. In ACL COLT."},{"key":"e_1_3_2_1_14_1","volume-title":"Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security.","author":"Fayaz Seyed Kaveh","year":"2015","unstructured":"Seyed Kaveh Fayaz , Yoshiaki Tobioka , Vyas Sekar , and Michael Bailey . 2015 . Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security. Seyed Kaveh Fayaz, Yoshiaki Tobioka, Vyas Sekar, and Michael Bailey. 2015. Bohatei: Flexible and Elastic DDoS Defense. In USENIX Security."},{"key":"e_1_3_2_1_15_1","volume-title":"Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction","author":"Fei Xincai","unstructured":"Xincai Fei , Fangming Liu , Hong Xu , and Hai Jin . 2018. Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction . In IEEE INFOCOM. Xincai Fei, Fangming Liu, Hong Xu, and Hai Jin. 2018. Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction. In IEEE INFOCOM."},{"key":"e_1_3_2_1_16_1","volume-title":"Shining a Light on Small Data Centers in the U.S. Lawrence Berkeley National Laboratory Report","author":"Ganeshalingam Mohan","year":"2017","unstructured":"Mohan Ganeshalingam , Arman Shehabi , and Louis-Benoit Desroches . 2017. Shining a Light on Small Data Centers in the U.S. Lawrence Berkeley National Laboratory Report ( 2017 ). Mohan Ganeshalingam, Arman Shehabi, and Louis-Benoit Desroches. 2017. Shining a Light on Small Data Centers in the U.S. Lawrence Berkeley National Laboratory Report (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131379"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098856"},{"key":"e_1_3_2_1_19_1","volume-title":"Multiple Granularity Online Control of Cloudlet Networks for Edge Computing","author":"Jiao Lei","unstructured":"Lei Jiao , Lingjun Pu , Lin Wang , Xiaojun Lin , and Jun Li. 2018. Multiple Granularity Online Control of Cloudlet Networks for Edge Computing . In IEEE SECON. Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, and Jun Li. 2018. Multiple Granularity Online Control of Cloudlet Networks for Edge Computing. In IEEE SECON."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2707142"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987487"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2226216"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978306"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844624"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"J.J. Santanna R. van Rijswijk-Deij R. Hofstede A. Sperotto M. Wierbosch L. Zambenedetti Granville and A. Pras. 2015. Booters - An Analysis of DDoS-as-a-service Attacks. In IFIP\/IEEE IM.  J.J. Santanna R. van Rijswijk-Deij R. Hofstede A. Sperotto M. Wierbosch L. Zambenedetti Granville and A. Pras. 2015. Booters - An Analysis of DDoS-as-a-service Attacks. In IFIP\/IEEE IM.","DOI":"10.1109\/INM.2015.7140298"},{"key":"e_1_3_2_1_26_1","volume-title":"Competitive Online Convex Optimization with Switching Costs and Ramp Constraints","author":"Shi Ming","unstructured":"Ming Shi , Xiaojun Lin , Sonia Fahmy , and Dong-Hoon Shin . 2018. Competitive Online Convex Optimization with Switching Costs and Ramp Constraints . In IEEE INFOCOM. Ming Shi, Xiaojun Lin, Sonia Fahmy, and Dong-Hoon Shin. 2018. Competitive Online Convex Optimization with Switching Costs and Ramp Constraints. In IEEE INFOCOM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2763160"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"e_1_3_2_1_29_1","volume-title":"Proactive VNF Provisioning with Multi-timescale Cloud Resources: Fusing Online Learning and Online Optimization","author":"Zhang Xiaoxi","unstructured":"Xiaoxi Zhang , Chuan Wu , Zongpeng Li , and Francis CM Lau . 2017. Proactive VNF Provisioning with Multi-timescale Cloud Resources: Fusing Online Learning and Online Optimization . In IEEE INFOCOM. Xiaoxi Zhang, Chuan Wu, Zongpeng Li, and Francis CM Lau. 2017. Proactive VNF Provisioning with Multi-timescale Cloud Resources: Fusing Online Learning and Online Optimization. In IEEE INFOCOM."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2494039"}],"event":{"name":"Mobihoc '19: The Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Catania Italy","acronym":"Mobihoc '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326525","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:40Z","timestamp":1750206340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":30,"alternative-id":["10.1145\/3323679.3326525","10.1145\/3323679"],"URL":"https:\/\/doi.org\/10.1145\/3323679.3326525","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}