Shuai-Bing Lu1,2, Student Member, IEEE, Jie Wu2,*, Fellow, IEEE, Huan-Yang Zheng2, and Zhi-Yi Fang1
|  Bari M F, Boutaba R, Esteves R et al. Data center network virtualization:A survey. IEEE Communications Surveys and Tutorials, 2013, 15(2):909-928.
 Mann Z A. Allocation of virtual machines in cloud data centers-A survey of problem models and optimization algorithms. ACM Computing Surveys, 2015, 48(1):Article No. 11.
 Li K K, Wu J, Adam B. Elasticity-aware virtual machine placement for cloud datacenters. In Proc. the 2nd International Conference on Cloud Networking, November 2013, pp.99-107.
 Duffield N G, Goyal P, Greenberg A et al. A flexible model for resource management in virtual private networks. In Proc. the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 1999, pp.95-108.
 Lee Y T, Sidford A, Wong S C W. A faster cutting plane method and its implications for combinatorial and convex optimization. In Proc. the 56th Annual Symposium on Foundations of Computer Science, October 2015, pp.1049-1065.
 Leiserson C E. Fat-trees:Universal networks for hardware efficient supercomputing. IEEE transactions on Computers, 1985, C-34(10):892-901.
 Al-Fares M, Loukissas A, Vahdat A. A scalable, commodity data center network architecture. In Proc. the ACM SIGCOMM 2008 Conference on Data communication, August 2008, pp.63-74.
 Davie B S, Rekhter Y. MPLS:Technology and Applications (1st edition). Morgan Kaufmann, 2000.
 Liu Y, Muppala J K, Veeraraghavan M et al. Data Center Networks:Topologies, Architectures and Fault-Tolerance Characteristics. Springer International Publishing, 2013.
 Wang R X, Wickboldt J A, Esteves R P et al. Using empirical estimates of effective bandwidth in network-aware placement of virtual machines in data centers. IEEE Transactions on Network and Service Management, 2016, 13(2):267-280.
 Kusic D, Kephart J O, Hanson J E et al. Power and performance management of virtualized computing environments via look a head control. Cluster Computing, 2009, 12(1):1-15.
 Xu F, Liu F, Liu L et al. iAware:Making live migration of virtual machines interference-aware in the cloud. IEEE Transactions on Computers, 2014, 63(12):3012-3025.
 Yang S, Wieder P, Yahyapour R et al. Reliable virtual machine placement and routing in clouds. IEEE Transactions on Parallel and Distributed Systems, 2017, 28(10):2965-2978.
 Guo C X, Lu G H, Wang H J et al. SecondNet:A data center network virtualization architecture with bandwidth guarantees. In Proc. the 6th International Conference, November 2010, Article No. 15.
 Deng W, Liu F, Jin H et al. Reliability-aware server consolidation for balancing energy-lifetime tradeoff in virtualized cloud datacenters. International Journal of Communication Systems, 2014, 27(4):623-642.
 Liu F M, Guo J, Huang X et al. eBA:Efficient bandwidth guarantee under traffic variability in datacenters. IEEE/ACM Transactions on Networking, 2017, 25(1):506-519.
 Li X, Wu J, Tang S et al. Let's stay together:Towards traffic aware virtual machine placement in data centers. In Proc. the 33rd IEEE International Conference on Computer Communications, April 2014, pp.1842-1850.
 Meng X Q, Pappas V, Zhang L. Improving the scalability of data center networks with traffic-aware virtual machine placement. In Proc. the 29th IEEE International Conference on Computer Communications, March 2010, pp.1154-1162.
 Xu F, Liu F M, Jin H et al. Managing performance overhead of virtual machines in cloud computing:A survey, state of the art, and future directions. Proceedings of the IEEE, 2014, 102(1):11-31.
 Kumar A, Rastogi R, Silberschatz A et al. Algorithms for provisioning virtual private networks in the hose model. IEEE/ACM Transactions on Networking, 2002, 10(4):565-578.
 Ballani H, Costa P, Karagiannis T et al. Towards predictable datacenter networks. In Proc. the 2011 ACM Conference on SIGCOMM, August 2011, pp.242-253.
 Lee J, Turner Y, Lee M et al. Application-driven bandwidth guarantees in datacenters. In Proc. the 2014 ACM Conference on SIGCOMM, August 2014, pp.467-478.
 Erlebach T, Ruegg M. Optimal bandwidth reservation in hose-model VPNs with multi-path routing. In Proc. IEEE INFOCOM 2004, March 2004, pp.2275-2282.
 Zhu J, Li D, Wu J P et al. Towards bandwidth guarantee in multi-tenancy cloud computing networks. In Proc. the 20th IEEE International Conference on Network Protocols, October 2012.
 Dutta D, Kapralov M, Post I et al. Optimal bandwidth aware VM allocation for Infrastructure-as-a-Service. arXiv:1202.3683, 2012. https://arxiv.org/abs/1202.3683, Feb. 2018.
 Plummer D C, Smith D M, Bittman T J et al. Five refining attributes of public and private cloud computing. Technical Report, Gartner, 2009. http://www.gartner.com/DisplayDocument, May 2018.
 Lu S B, Fang Z Y, Wu J et al. Elastic scaling of virtual clusters in cloud data center networks. In Proc. the 36th International Performance Computing and Communications Conference, December 2017, pp.1-8.
 Herbst N R, Kounev S, Reussner R. Elasticity in cloud computing:What it is, and what it is not. In Proc. the 10th International Conference on Autonomic Computing, June 2013, pp.23-27.
 Shawky D M, Ali A. Defining a measure of cloud computing elasticity. In Proc. the 1st International Conference on Systems and Computer Science, August 2012, pp.1-5.
 Li K K, Wu J, Blaisse A. Elasticity-aware virtual machine placement in k-ary cloud data centers. Parallel and Cloud Computing, 2014, 3(2):22-31.
|||Que-Ping Kong, Zi-Yan Wang, Yuan Huang, Xiang-Ping Chen, Xiao-Cong Zhou, Zi-Bin Zheng, and Gang Huang. Characterizing and Detecting Gas-Inefficient Patterns in Smart Contracts [J]. Journal of Computer Science and Technology, 2022, 37(1): 67-82.|
|||Rui-Xiang Ma, Fei Wu, Bu-Rong Dong, Meng Zhang, Wei-Jun Li, Chang-Sheng Xie. Write-Optimized B+ Tree Index Technology for Persistent Memory [J]. Journal of Computer Science and Technology, 2021, 36(5): 1037-1050.|
|||Yu-Wei Wu, Qing-Gang Wang, Long Zheng, Xiao-Fei Liao, Hai Jin, Wen-Bin Jiang, Ran Zheng, Kan Hu. FDGLib: A Communication Library for Efficient Large-Scale Graph Processing in FPGA-Accelerated Data Centers [J]. Journal of Computer Science and Technology, 2021, 36(5): 1051-1070.|
|||Xiao-Jing Zha, Yin-Shui Xia, Shang-Luan Xie, Zhu-Fei Chu. Defect-Tolerant Mapping of CMOL Circuit Targeting Delay Optimization [J]. Journal of Computer Science and Technology, 2021, 36(5): 1118-1132.|
|||Yue-Wen Wu, Yuan-Jia Xu, Heng Wu, Lin-Gang Su, Wen-Bo Zhang, Hua Zhong. Apollo: Rapidly Picking the Optimal Cloud Configurations for Big Data Analytics Using a Data-Driven Approach [J]. Journal of Computer Science and Technology, 2021, 36(5): 1184-1199.|
|||Hui-Ming Tian, Zhu-Fei Chu. Inversion Optimization Strategy Based on Primitives with Complement Attributes [J]. Journal of Computer Science and Technology, 2021, 36(5): 1145-1154.|
|||Yu-Jie Yuan, Yukun Lai, Tong Wu, Lin Gao, Li-Gang Liu. A Revisit of Shape Editing Techniques: From the Geometric to the Neural Viewpoint [J]. Journal of Computer Science and Technology, 2021, 36(3): 520-554.|
|||Jun Gao, Paul Liu, Guang-Di Liu, Le Zhang. Robust Needle Localization and Enhancement Algorithm for Ultrasound by Deep Learning and Beam Steering Methods [J]. Journal of Computer Science and Technology, 2021, 36(2): 334-346.|
|||Zeynep Banu Ozger, Nurgul Yuzbasioglu Uslu. An Effective Discrete Artificial Bee Colony Based SPARQL Query Path Optimization by Reordering Triples [J]. Journal of Computer Science and Technology, 2021, 36(2): 445-462.|
|||Jason Liu, Pedro Espina, Xian-He Sun. A Study on Modeling and Optimization of Memory Systems [J]. Journal of Computer Science and Technology, 2021, 36(1): 71-89.|
|||Mohammad Y. Mhawish, Manjari Gupta. Predicting Code Smells and Analysis of Predictions: Using Machine Learning Techniques and Software Metrics [J]. Journal of Computer Science and Technology, 2020, 35(6): 1428-1445.|
|||Bo-Han Li, Yi Liu, An-Man Zhang, Wen-Huan Wang, Shuo Wan. A Survey on Blocking Technology of Entity Resolution [J]. Journal of Computer Science and Technology, 2020, 35(4): 769-793.|
|||Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation [J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874.|
|||Lan Huang, Da-Lin Li, Kang-Ping Wang, Teng Gao, Adriano Tavares. A Survey on Performance Optimization of High-Level Synthesis Tools [J]. Journal of Computer Science and Technology, 2020, 35(3): 697-720.|
|||Yun-Cong Zhang, Xiao-Yang Wang, Cong Wang, Yao Xu, Jian-Wei Zhang, Xiao-Dong Lin, Guang-Yu Sun, Gong-Lin Zheng, Shan-Hui Yin, Xian-Jin Ye, Li Li, Zhan Song, Dong-Dong Miao. Bigflow: A General Optimization Layer for Distributed Computing Frameworks [J]. Journal of Computer Science and Technology, 2020, 35(2): 453-467.|