1 |
Z. Zhou, H. Yu, L. Xu, Y. Zhang, S. Mumtaz and J. Rodriguez, "Dependable content distribution in D2D-based cooperative vehicular networks: A big data-integrated coalition game approach," IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 3, pp. 953-964, 2018.
DOI
|
2 |
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geeis, R. Gummadi, S. Rhea, H. Weatherspoon and W. Weimer, "Oceanstore: An architecture for global-scale persistent storage," ACM SIGPLAN Notices, vol. 28, no. 5, pp. 190-201, 2000.
|
3 |
M.B. Shareh, H. Navidi H, H.H.S. Javadi and M. Hosseinzadeh, "Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model," Information Sciences, vol. 470, pp. 94-108, 2019.
DOI
|
4 |
A. Rowstron and P. Druschel, "Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems," in Proc. of IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing, pp. 329-350, 2001.
|
5 |
S. Vaton, O. Brun, M. Mouchet, P. Belzarena, I. Amigo, B.J. Prabhu and T. Chonavel, "Joint minimization of monitoring cost and delay in overlay networks: optimal policies with a Markovian approach," Journal of Network and Systems Management, vol. 27, no. 1, pp. 188-232, 2019.
DOI
|
6 |
M. Hua, Y. Wang, Z. Zhang, C. Li. Y. Huang and L. Yang, "Power-efficient communication in UAV-aided wireless sensor networks," IEEE Communications Letters, vol. 22, no. 6, pp. 1264-1267, 2018.
DOI
|
7 |
J. Simonjan and B. Rinner, "Decentralized and resource-efficient self-calibration of visual sensor networks," Ad Hoc Networks, vol. 88, pp. 112-128, 2019.
DOI
|
8 |
Q. He, X. Wang, Z. Lei, M. Huang, Y. Cai and L. Ma, "TIFIM: A two-stage iterative framework for influence maximization in social networks," Applied Mathematics and Computation, vol. 354, pp. 338-352, 2019.
DOI
|
9 |
C. Fan, B. Raichel and G.V. Buskirk, "Metric violation distance: hardness and approximation," in Proc. of Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 196-209, 2018.
|
10 |
S. Lee, Z. Zhang, S. Sahu and D. Saha, "On suitability of Euclidean embedding of internet hosts," in Proc. of Joint International Conference on Measurement & Modeling of Computer Systems, pp. 157-168, 2006.
|
11 |
Y. Chi, Y. Lu and Y. Chen, "Nonconvex optimization meets low-rank matrix factorization: An overview," IEEE Transactions on Signal Processing, vol. 67, no. 20, pp. 5239-5269, 2019.
DOI
|
12 |
Y. Liao, W. Du, P. Geurts and G. Leduc, "DMFSGD: a decentralized matrix factorization algorithm for network distance prediction," IEEE/ACM Transactions on Networking, vol. 21, no. 5, pp. 1511-1524, 2013.
DOI
|
13 |
B. Recht, "A simpler approach to matrix completion," Journal of Machine Learning Research, vol. 12, no. 4, pp. 3413-3430, 2009.
|
14 |
K. Xie, L. Wang, G. Wang, G. Xie, G. Zhang, D. Xie and J. Wen, "Sequential and adaptive sampling for matrix completion in network monitoring systems," in Proc. of IEEE INFOCOM, pp. 2443-2451, 2015.
|
15 |
R. Zhu, B. Liu, D. Niu, Z. Li and H.V. Zhao, "Network latency estimation for personal devices: a matrix completion approach," IEEE/ACM Transactions on Networking, vol. PP, no. 99, pp. 1-14, 2016.
|
16 |
E.J. Candes and B. Recht, "Exact matrix completion via convex optimization," Foundations of Computational Mathematics, vol. 9, no. 6, pp. 717-719, 2009.
DOI
|
17 |
E.J. Candes and T. Tao, "The power of convex relaxation: near-optimal matrix completion," IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2053-2080, 2010.
DOI
|
18 |
J. Beauquier, J. Burman, S. Kutten, T. Nowak and C. Xu, "Data collection in population protocols with non-uniformly random scheduler," in Proc. of International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics, pp. 13-25, 2017.
|
19 |
E. Pauwels, F. Bach and J.P. Vert, "Relating leverage scores and density using regularized christoffel functions," in Proc. of Advances in Neural Information Processing Systems, pp. 1663-1672, 2018.
|
20 |
Y. Chen, S. Bhojanapalli, S. Sanghavi and R. Ward, "Coherent matrix completion," in Proc. of International Conference on International Conference on Machine Learning, pp. 674-682, 2019.
|
21 |
P. Drineas, M. Magdon-Ismail, M.W. Mahoney and D. Woodruff, "Fast approximation of matrix coherence and statistical leverage," Journal of Machine Learning Research, vol. 13, no. 1, pp. 3475-3506, 2011.
|
22 |
J. Cai, E.J. Candes and Z. Shen, "A singular value thresholding algorithm for matrix completion," Siam Journal on Optimization, vol. 20, no. 4, pp. 1956-1982, 2008.
DOI
|
23 |
J. Prateek, N. Praneeth and S. Sujay, "Low-rank matrix completion using alternating minimization," in Proc. of ACM Symposium on Theory of Computing, pp. 1-7, 2012.
|
24 |
K. Mohan and M. Fazel, "Iterative reweighted least squares for matrix rank minimization," in Proc. of Annual Allerton Conference on Communication, Control, and Computing, pp. 1-6, 2010.
|
25 |
Y. Chen, S. Bhojanapalli, S. Sanghavi and R. Ward, "Completing any low-rank matrix, provably," Journal of Machine Learning Research, vol. 16, no. 1, pp. 2999-3034, 2013.
|
26 |
A. Eftekhari, M.B. Wakin and R.A. Ward, "MC2: a two-phase algorithm for leveraged matrix completion," Information and Inference: A Journal of the IMA, vol. 7, no. 3, pp. 581-604, 2018.
DOI
|
27 |
Z. Liu and L. Vandenberghe, "Interior-point method for nuclear norm approximation with application to system identification," Siam Journal on Matrix Analysis & Applications, vol. 31, no. 3, pp.1235-1256, 2009.
DOI
|
28 |
K. Salehin, R. Rojas-Cessa and K.W. Kwon, "COMPRESS: a self-sufficient scheme for measuring queueing delay on the Internet routers," in Proc. of International Conference on Computing, Networking and Communications, pp. 624-629, 2019.
|
29 |
Y. Ren, Y. Liu, N. Zhang, A. Liu, N. Xiong and Z. Cai, "Minimum-cost mobile crowdsourcing with QoS guarantee using matrix completion technique," Pervasive and Mobile Computing, vol. 49, pp. 23-44, 2018.
DOI
|
30 |
F. Xiao, L. Chen, H. Zhu and R. Hong, "Anomaly-tolerant network traffic estimation via noise-immune temporal matrix completion model," IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1192-1204, 2019.
DOI
|
31 |
Abilene/Internet2. [Accessed: January. 23, 2020]. [Online]. Available: http://www.cs.utexas.edu/-yzhang/research/AbileneTM/.
|
32 |
L. Tang and M. Crovella, "Virtual landmarks for the internet," in Proc. of ACM SIGCOMM conference on Internet measurement, pp. 143-152, 2003.
|
33 |
J. Ledlie, P. Gardner and M.I. Seltzer, "Network coordinates in the wild," in Proc. of USENIX Conference on Networked Systems Design & Implementation, pp. 299-312, 2007.
|