IEEE Transactions on Network Science and Engineering最新文献

筛选
英文 中文
Dataset Distillation-Based Hybrid Federated Learning on Non-IID Data 基于数据集蒸馏的非iid数据混合联邦学习
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-31 DOI: 10.1109/TNSE.2026.3679013
Xiufang Shi;Wei Zhang;Yuheng Li;Mincheng Wu;Zhenyu Wen;Shibo He;Tejal Shah;Rajiv Ranjan
{"title":"Dataset Distillation-Based Hybrid Federated Learning on Non-IID Data","authors":"Xiufang Shi;Wei Zhang;Yuheng Li;Mincheng Wu;Zhenyu Wen;Shibo He;Tejal Shah;Rajiv Ranjan","doi":"10.1109/TNSE.2026.3679013","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3679013","url":null,"abstract":"In federated learning, the heterogeneity of client data has a great impact on the performance of model training. Many heterogeneity issues in this process are raised by non-independently and identically distributed (non-IID) data. To address the issue of label distribution skew, we propose a hybrid federated learning framework called HFLDD, which integrates dataset distillation to generate approximately independent and equally distributed (IID) data, thereby improving the performance of model training. In particular, we partition the clients into heterogeneous clusters, where the data labels among different clients within a cluster are unbalanced while the data labels among different clusters are balanced. The cluster heads collect distilled data from the corresponding cluster members, and conduct model training in collaboration with the server. This training process is like traditional federated learning on IID data, and hence effectively alleviates the impact of non-IID data on model training. We perform a comprehensive analysis of the convergence behavior, communication overhead, and computational complexity of the proposed HFLDD. Extensive experimental results based on multiple public datasets demonstrate that when data labels are severely imbalanced, the proposed HFLDD outperforms the baseline methods in terms of both test accuracy and communication cost.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8331-8347"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Computation Offloading and Resource Allocation in Heterogeneous UAV-Assisted Edge Computing: A Game-Theoretical Approach 异构无人机辅助边缘计算中计算卸载和资源分配的联合优化:博弈论方法
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-04-02 DOI: 10.1109/TNSE.2026.3680337
Jiale Wu;Xiaolong Xu;Guangming Cui;Jielin Jiang
{"title":"Joint Optimization of Computation Offloading and Resource Allocation in Heterogeneous UAV-Assisted Edge Computing: A Game-Theoretical Approach","authors":"Jiale Wu;Xiaolong Xu;Guangming Cui;Jielin Jiang","doi":"10.1109/TNSE.2026.3680337","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3680337","url":null,"abstract":"In UAV-assisted edge computing systems, existing research inadequately addresses multi-resource heterogeneity, encompassing computational resource differences and energy consumption coefficient variations among edge servers. This heterogeneity causes critical load imbalance: energy-efficient servers attract excessive users despite limited capacity, while high-capacity servers with higher energy costs remain underutilized, degrading performance for latency-sensitive applications. To address this challenge, this paper formulates the joint offloading and resource allocation as an NP-hard optimization minimizing user costs, reducing resource competition, and maximizing server utility. We propose SOTNRA (Server Offloading Target Node selection and Resource Allocation), a hierarchical framework based on a two-layer game structure combining potential and Stackelberg games. The first stage employs a potential game-based server selection algorithm (PGSSA) considering load balancing constraints with proven convergence. The second stage uses a momentum-based gradient ascent algorithm (MBGA) for optimal pricing and offloading ratios. Extensive experiments demonstrate superior performance in reducing user costs while maintaining load balancing compared to single-dimensional heterogeneity approaches.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8348-8361"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Reinforcement Learning Approach to Virtual Network Embedding Problems in 5G Networks 5G网络虚拟网络嵌入问题的强化学习方法
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-18 DOI: 10.1109/TNSE.2026.3675357
Amir Javadpour;Forough Ja'fari;Tarik Taleb;Chafika Benzaïd;Pedro R. Tomas;Luis Rosa;Jorge Proença;Luis Cordeiro
{"title":"A Reinforcement Learning Approach to Virtual Network Embedding Problems in 5G Networks","authors":"Amir Javadpour;Forough Ja'fari;Tarik Taleb;Chafika Benzaïd;Pedro R. Tomas;Luis Rosa;Jorge Proença;Luis Cordeiro","doi":"10.1109/TNSE.2026.3675357","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3675357","url":null,"abstract":"5G network slicing is the problem of mapping requested virtual networks on the substrate network resources. Due to resource capacity constraints, the performance of network slicing depends on the number of supported requests.This challenge is a type of Virtual Network Embedding (VNE) problem in which a weighted graph is divided into multiple smaller weighted graphs according to the user's custom requirements.These problems are NP-hard, and most existing solutions have suggested using Reinforcement Learning (RL) models to solve them. However, they do not adequately represent the weighted graph to the learning model. Therefore, their learning rate is limited. This paper proposes TRL-VNE, a Two-stage RL-based VNE solution to overcome these challenges. In the first stage of this solution, an RL model is utilized for mapping the central node of each request. Novel graph-based features (G-features) are used in this model to improve its learning rate. The second stage uses a greedy algorithm to map the other components. The simulation results show that TRL-VNE improves the requests acceptance ratio and maximum supported requests by 21% and 36%, respectively, compared to existing solutions. Moreover, we have proposed a network architecture based on TRL-VNE, and emulated it in Mininet to investigate the feasibility of the proposed solution.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8200-8223"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Robust PBFT Consensus: SMP Modeling and Grouping Optimization of Hierarchical Node Architecture 面向鲁棒PBFT一致性:SMP建模与分层节点结构分组优化
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-31 DOI: 10.1109/TNSE.2026.3678924
Junchao Fan;Yueqi Jiang;Bocheng Ju;Xiaolin Chang
{"title":"Toward Robust PBFT Consensus: SMP Modeling and Grouping Optimization of Hierarchical Node Architecture","authors":"Junchao Fan;Yueqi Jiang;Bocheng Ju;Xiaolin Chang","doi":"10.1109/TNSE.2026.3678924","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3678924","url":null,"abstract":"Consensus mechanisms are essential to distributed networked systems, ensuring consistent state agreement under unreliable communication and node failures. Among such mechanisms, Practical Byzantine Fault Tolerance (PBFT) has been widely adopted in practice and extensively extended through numerous variants to address scalability in large-scale and heterogeneous networks. However, they still lack 1) adaptability to dynamic changes in network topology or fault distribution, and/or 2) capability of mitigating the gap between the consensus system behavior quantification and the consensus optimization approaches. These degrade consensus robustness in terms of consensus probability and consensus response time. To address these challenges, we first propose a hierarchical node architecture for PBFT. We then develop a scalable Semi-Markov Process (SMP)-based analytical model that captures the stochastic, time-dependent evolution of consensus states across multiple layers. Numerical and simulation results confirm the model's accuracy and show that the hierarchical structure sustains reliable operation up to 30% faulty nodes while maintaining low latency. Building on this modeling foundation, we propose a reinforcement learning-based optimization approach that formulates hierarchical grouping as a Markov decision process and solves it using proximal policy optimization. Experimental evaluation demonstrates that our approach improves consensus probability and reduces latency compared with static grouping baselines.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8261-8276"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147696654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimessage Paxos With Priorities and Aging for Blockchain Applications b区块链应用程序的具有优先级和老化的多消息Paxos
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-17 DOI: 10.1109/TNSE.2026.3674834
Elham Amini;Jelena Mišić;Vojislav B. Mišić
{"title":"Multimessage Paxos With Priorities and Aging for Blockchain Applications","authors":"Elham Amini;Jelena Mišić;Vojislav B. Mišić","doi":"10.1109/TNSE.2026.3674834","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3674834","url":null,"abstract":"This paper extends the Paxos consensus algorithm by introducing preemptive priority scheduling with support for multiple proposal priorities, alongside an aging-based promotion mechanism to restore fairness and prevent starvation of lower-priority proposals. These enhancements address scenarios where proposals have heterogeneous urgency levels, which are common in blockchain and real-time distributed systems. Introducing priorities allows the protocol to expedite time-sensitive requests, while aging ensures that long-waiting low-priority proposals are eventually processed, thus improving fairness without compromising safety or liveness guarantees. We introduce a novel preemption-based aging mechanism that improves fairness based on actual contention dynamics rather than time. We analytically model the operation of the proposed algorithm using preemptive priority queueing disciplines, particularly the preemptive repeat different model, allowing for flexible and realistic handling of urgent proposals with variable service times. Our results demonstrate that multimessage handling combined with aging significantly improves both fairness and efficiency in consensus operation, especially under high-load conditions.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7718-7736"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147606251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Aware Blockchain Approach for Efficient and Secure E-Health Applications 高效和安全的电子医疗应用的隐私感知区块链方法
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-04-15 DOI: 10.1109/TNSE.2026.3683944
Hussien AbdelRaouf;Mahmoud Abouyoussef;Mostafa Fouda;Zubair Md Fadlullah;Mohamed I. Ibrahem;Rongxing Lu
{"title":"Privacy-Aware Blockchain Approach for Efficient and Secure E-Health Applications","authors":"Hussien AbdelRaouf;Mahmoud Abouyoussef;Mostafa Fouda;Zubair Md Fadlullah;Mohamed I. Ibrahem;Rongxing Lu","doi":"10.1109/TNSE.2026.3683944","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3683944","url":null,"abstract":"The integration of the Internet of Things (IoT) in E-healthcare has enabled heart attack detection (HAD) leveraging artificial intelligence (AI). However, existing approaches face computational complexity, limited accuracy, and a lack of secure bidirectional communication between patients and healthcare providers (<inline-formula><tex-math>$mathcal {HP}$</tex-math></inline-formula>s) while preserving patients' privacy. While homomorphic encryption and secure multi-party computation can protect privacy, they incur substantial overhead. To overcome these limitations, {we propose a lightweight HAD methodology that ensures the preservation of security and privacy while maintaining performance reliability.} {First, we introduce a customized consortium blockchain harnessing group signatures to ensure patient anonymity and data unlinkability, enabling patients to securely communicate with <inline-formula><tex-math>$mathcal {HP}$</tex-math></inline-formula>s through unique and untraceable identifiers.} Next, we develop a lightweight HAD model via knowledge distillation (KD) from a complex high-performing model that captures spatialtemporal patterns and emphasizes key features in health data. Then, we devised a functional encryption (FE)-based cryptosystem to protect patients' data during model execution. Lastly, we advance explainable AI to highlight influential health features and enhance clinical trust. Evaluated on a real-world heart dataset and deployed on a testbed, our HAD model achieves 99.22% accuracy and a 99.23% F1-score, outperforming state-of-the-art techniques while reducing memory footprint, parameter count, and inference time by {98.19%}, {98.58%}, and {60.18%}, respectively, and fostering interpretability and trust in clinical decision-making. {Furthermore, the proposed blockchain with the FE approach enables secure model execution, protects patient data, and scales to 500,000 patients in under 2.5 minutes, while minimizing communication and computational overhead, achieving {95.43%} and {89.06%} reductions, respectively.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8628-8645"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147796062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Orchestration of AI Services and Microservices in Multi-Edge Collaboration Based on Lagrangian Relaxation Deep Reinforcement Learning 基于拉格朗日松弛深度强化学习的多边缘协作中人工智能服务与微服务混合编排
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-04-07 DOI: 10.1109/TNSE.2026.3681584
Jiaxiang Xu;Zhaoyi Wang;Di Han;Yi Hu;Fuming Fan;Menglan Hu;Kai Peng
{"title":"Hybrid Orchestration of AI Services and Microservices in Multi-Edge Collaboration Based on Lagrangian Relaxation Deep Reinforcement Learning","authors":"Jiaxiang Xu;Zhaoyi Wang;Di Han;Yi Hu;Fuming Fan;Menglan Hu;Kai Peng","doi":"10.1109/TNSE.2026.3681584","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3681584","url":null,"abstract":"The rapid development of artificial intelligence has promoted the application of AI services in various fields. The combination of the microservice architecture and the “AI as a Service” (AaaS) to form an intelligent microservice system can realize the orchestration of intelligent applications. In intelligent applications, AI services often require the key functions of accompanying microservices, such as service discovery, data collection, gateway routing, etc., to ensure the stability and efficiency. Otherwise, it will lead to the incompleteness of applications, severely affecting the overall performance of the system. Therefore, fine-grained hybrid orchestration of AI services and microservices is crucial. Nevertheless, it faces major challenges in the resource-constrained edge environment: complex dependencies, frequent data communication, and heterogeneous resource competition between microservices and AI services. Moreover, the tight coupling between deployment and routing leads to complex joint optimization problems. Considering either deployment or routing separately will lead to poor system performance. However, most of the existing studies ignore the above problems. To this end, this paper investigates the hybrid orchestration problem. First, we model intelligent applications as hybrid service invocation chains. Then, based on Jackson queuing networks and multi-instance models, we deeply study the complex dependencies among hybrid services and the heterogeneous resource allocation problem, and conduct an accurate analysis of the request delay and system energy consumption. Furthermore, we innovatively propose Lagrangian Relaxed Deep Deterministic Policy Gradient (LR_DDPG), which introduces a cost mechanism and transforms the constrained hybrid orchestration process into an unconstrained optimization problem by Lagrange relaxation to find the optimal deployment and routing strategy under complex constraints. Finally, the experimental results show that our algorithm achieves significant advantages in terms of latency, energy consumption, and request success rate.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"8820-8837"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147828827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Rank Tensors and 3DTV Minimization Based Spectrum Cartography 基于低秩张量和3DTV最小化的频谱制图
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-03 DOI: 10.1109/TNSE.2026.3669372
Xin Wang;Bin Shen;Xiaoge Huang;Qianbin Chen
{"title":"Low-Rank Tensors and 3DTV Minimization Based Spectrum Cartography","authors":"Xin Wang;Bin Shen;Xiaoge Huang;Qianbin Chen","doi":"10.1109/TNSE.2026.3669372","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3669372","url":null,"abstract":"Tensor completion-based spectrum cartography (SC) in wireless networks has been extensively studied in recent years. Nevertheless, most existing algorithms are confined to two-dimensional (2D) geographical regions and entirely overlook the inherent local spatial smoothness (LSS) of the spectrum tensors. As the demand for three-dimensional (3D) SC continues to burgeon, direct adaptation of 2D region-based tensor completion algorithms to 3D scenarios either leads to inherent accuracy degradation or poses significant technical hurdles in precisely processing 3D-structured spatial data. To address these formidable challenges, a novel 3D spatial SC method is proposed in this paper. Firstly, the spectrum data is modeled as a fourth-order spectrum tensor, comprehensively capturing spatial information across the 3D space and multiple frequency bands. Subsequently, by leveraging the low-rank property of spectrum tensors and incorporating the 3DTV regularization as an essential component in the optimization problem, the proposed method effectively overcomes the critical limitation of conventional SC algorithms, which fail to account for LSS in tensor completion. Finally, two algorithms are proposed to solve the resulting optimization problem: 3DTV-based parallel matrix factorization (3DTV-PMF), and its variant with Cholesky-based inversion, named as 3DTV-PMFC. Simulation results demonstrate that the proposed algorithms achieve a minimum performance improvement of 16.15<inline-formula><tex-math>$%$</tex-math></inline-formula> compared to the conventional PMF algorithm.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7465-7479"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147557701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensing With Unknown Signals: ISAC Enabled Distributed Passive Sensing for Multi-Target Detection and Localization 未知信号传感:ISAC支持的多目标检测和定位分布式被动传感
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-06 DOI: 10.1109/TNSE.2026.3670825
Ruiqi Liu;Leyi Zhang;Yuanshuo Gang;Tianqi Mao;Qingqing Wu;Abbas Jamalipour
{"title":"Sensing With Unknown Signals: ISAC Enabled Distributed Passive Sensing for Multi-Target Detection and Localization","authors":"Ruiqi Liu;Leyi Zhang;Yuanshuo Gang;Tianqi Mao;Qingqing Wu;Abbas Jamalipour","doi":"10.1109/TNSE.2026.3670825","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3670825","url":null,"abstract":"Integrated sensing and communication (ISAC) has been recognized as a critical usage scenario for the 6th generation (6G) networks, covering a vast variety of use cases. As wireless systems are densely deployed, signals transmitted by network nodes are pervasive in the environment, making it possible to opportunistically receive these signals and exploit them for passive sensing. This motivates distributed passive sensing systems that consist only of receivers and rely on signals emitted by noncooperative transmitters. In this paper, a distributed passive sensing system that operates with completely unknown signals is proposed and studied. As a first step, a blind channel identification based method is proposed for target detection, where the presence of targets is inferred from peaks in the estimated equivalent channel response. Then, the system functionality is extended to support multitarget localization. The resulting measurements across distributed receivers lead to a data association problem, for which we formulate a suitable model and propose a coping strategy to correctly associate observations. Numerical results demonstrate the feasibility and accuracy of the proposed method enabling target detection and localization using unknown signals and singleantenna, lowcost receivers.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7599-7613"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147557998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constraint-Driven Evolution of Multimodal Video Intelligence: A Network and System Perspective 多模态视频智能的约束驱动进化:网络和系统视角
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-01-01 Epub Date: 2026-03-02 DOI: 10.1109/TNSE.2026.3668404
Xuzhao Li;Xuchen Li;Shiyu Hu;Zhaorui Zhang;Kang Hao Cheong
{"title":"Constraint-Driven Evolution of Multimodal Video Intelligence: A Network and System Perspective","authors":"Xuzhao Li;Xuchen Li;Shiyu Hu;Zhaorui Zhang;Kang Hao Cheong","doi":"10.1109/TNSE.2026.3668404","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3668404","url":null,"abstract":"Multimodal video intelligence is increasingly shaped not only by algorithmic progress but also by the constraints of networked deployment, such as limited compute and communication resources, real-time latency, energy, and cost. This survey examines the field from a network and system perspective and organizes recent advances into a three-stage, constraint-driven trajectory that links algorithmic capabilities with deployment architectures and network behaviors. The first stage, Perception Enhancement, focuses on real-time closed-loop processing through lightweight models and edge-side control. The second stage, Semantic Understanding, addresses long-sequence and multimodal analysis by leveraging edge–cloud collaboration and distributed scheduling. The third stage, Cognitive Reasoning, supports causal and interactive intelligence via retrieval augmentation, long-term memory, and multi-agent coordination. Across these stages, algorithm–system co-design is reflected in network behaviors such as caching, compression, representation sharing, and cross-modal alignment. Overall, this survey highlights a shift from algorithm-centric design toward network-aware intelligence, from static perception to open-world generalization, and from isolated inference to networked interactive systems, providing insights for bridging AI research with real-world networked applications.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7667-7683"},"PeriodicalIF":7.9,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147606208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书