{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:09Z","timestamp":1750219989570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3542929.3563491","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T20:19:18Z","timestamp":1667852358000},"page":"429-444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Proactive look-ahead control of transaction flows for high-throughput payment channel network"],"prefix":"10.1145","author":[{"given":"Wuhui","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Xiaoyu","family":"Qiu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Zicong","family":"Hong","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong, China"}]},{"given":"Jianting","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue university"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd.  2022. Lightning Network Daemon. https:\/\/github.com\/lightningnetwork\/lnd."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Raiden Network. https:\/\/raiden.network\/.  2022. Raiden Network. https:\/\/raiden.network\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Ripple. https:\/\/ripple.com\/.  2022. Ripple. https:\/\/ripple.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167098"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3073036"},{"key":"e_1_3_2_1_8_1","volume-title":"Cosma Rohilla Shalizi, and Mark EJ Newman","author":"Clauset Aaron","year":"2009","unstructured":"Aaron Clauset , Cosma Rohilla Shalizi, and Mark EJ Newman . 2009 . Power-law distributions in empirical data. SIAM review 51,4 (2009), 661--703. Aaron Clauset, Cosma Rohilla Shalizi, and Mark EJ Newman. 2009. Power-law distributions in empirical data. SIAM review 51,4 (2009), 661--703."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3048613"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1015"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ICML 2017","author":"Gilmer Justin","year":"2017","unstructured":"Justin Gilmer , Samuel S. Schoenholz , Patrick F. Riley , Oriol Vinyals , and George E. Dahl . 2017. Neural Message Passing for Quantum Chemistry . In Proceedings of the 34th International Conference on Machine Learning, ICML 2017 , Sydney, NSW, Australia, 6- -11 August 2017 (Proceedings of Machine Learning Research, Vol. 70), Doina Precup and Yee Whye Teh (Eds.). PMLR, 1263--1272. http:\/\/proceedings.mlr.press\/v70\/gilmer17a.html Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. 2017. Neural Message Passing for Quantum Chemistry. In Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6--11 August 2017 (Proceedings of Machine Learning Research, Vol. 70), Doina Precup and Yee Whye Teh (Eds.). PMLR, 1263--1272. http:\/\/proceedings.mlr.press\/v70\/gilmer17a.html"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00024"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421283"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441692"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421272"},{"key":"e_1_3_2_1_17_1","volume-title":"SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Malavolta Giulio","year":"2017","unstructured":"Giulio Malavolta , Pedro Moreno-Sanchez , Aniket Kate , and Matteo Maffei . 2017 . SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017 , San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2017. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society."},{"key":"e_1_3_2_1_18_1","volume-title":"Boosting the Convergence of Reinforcement Learning-based Auto-pruning Using Historical Data. CoRR abs\/2107.08815","author":"Mu Jiandong","year":"2021","unstructured":"Jiandong Mu , Mengdi Wang , Feiwen Zhu , Jun Yang , Wei Lin , and Wei Zhang . 2021. Boosting the Convergence of Reinforcement Learning-based Auto-pruning Using Historical Data. CoRR abs\/2107.08815 ( 2021 ). arXiv:2107.08815 https:\/\/arxiv.org\/abs\/2107.08815 Jiandong Mu, Mengdi Wang, Feiwen Zhu, Jun Yang, Wei Lin, and Wei Zhang. 2021. Boosting the Convergence of Reinforcement Learning-based Auto-pruning Using Historical Data. CoRR abs\/2107.08815 (2021). arXiv:2107.08815 https:\/\/arxiv.org\/abs\/2107.08815"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2980175"},{"key":"e_1_3_2_1_20_1","volume-title":"Flare: An approach to routing in lightning network. White Paper","author":"Prihodko Pavel","year":"2016","unstructured":"Pavel Prihodko , Slava Zhigulin , Mykola Sahno , Aleksei Ostrovskiy , and Olaoluwa Osuntokun . 2016 . Flare: An approach to routing in lightning network. White Paper (2016). Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An approach to routing in lightning network. White Paper (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524553"},{"key":"e_1_3_2_1_25_1","volume-title":"Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Roos Stefanie","year":"2018","unstructured":"Stefanie Roos , Pedro Moreno-Sanchez , Aniket Kate , and Ian Goldberg . 2018 . Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA, February 18--21 , 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_09-3_Roos_paper.pdf Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2018. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2018\/02\/ndss2018_09-3_Roos_paper.pdf"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37110-4_1"},{"key":"e_1_3_2_1_28_1","volume-title":"High Throughput Cryptocurrency Routing in Payment Channel Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Sivaraman Vibhaalakshmi","year":"2020","unstructured":"Vibhaalakshmi Sivaraman , Shaileshh Bojja Venkatakrishnan , Kathleen Ruan , Parimarjan Negi , Lei Yang , Radhika Mittal , Giulia C. Fanti , and Mohammad Alizadeh . 2020 . High Throughput Cryptocurrency Routing in Payment Channel Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) , Ranjita Bhagwan and George Porter (Eds.). 777--796. Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia C. Fanti, and Mohammad Alizadeh. 2020. High Throughput Cryptocurrency Routing in Payment Channel Networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), Ranjita Bhagwan and George Porter (Eds.). 777--796."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392147"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3486975"},{"key":"e_1_3_2_1_31_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N. Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017 . Attention is All you Need . In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017 , December 4 --9 , 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 5998--6008. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4--9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 5998--6008. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365411"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3053771"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487351"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404460"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3069725"}],"event":{"name":"SoCC '22: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"San Francisco California","acronym":"SoCC '22"},"container-title":["Proceedings of the 13th Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542929.3563491","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3542929.3563491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:31Z","timestamp":1750182571000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3542929.3563491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":37,"alternative-id":["10.1145\/3542929.3563491","10.1145\/3542929"],"URL":"https:\/\/doi.org\/10.1145\/3542929.3563491","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}