Last update:
Thu Oct 2 13:18:58 MDT 2025
Ralph E. Keirstead and
Donn B. Parker Software testing and certification . . . 3--8
Thomas E. Bell Computer measurement and evaluation:
artistry, or science? . . . . . . . . . 4--10
Jacob Palme Beware of the Gibson mix . . . . . . . . 10--11
Robert R. Johnson Some steps toward an information system
performance theory . . . . . . . . . . . 4--15
B. W. Kernighan and
P. J. Plauger and
D. J. Plauger On comparing apples and oranges, or, my
machine is better than your machine . . 16--20
W. C. Lynch Do disk arms move? . . . . . . . . . . . 3--16
M. H. Halstead Language level, a missing concept in
information theory . . . . . . . . . . . 7--9
M. H. Halstead An experimental determination of the
`purity' of a trivial algorithm . . . . 10--15
Peter J. Denning Review of `Statistical Computer
Performance Evaluation' by Walter
Frieberger; Academic Press (1972) . . . 16--22
Liba Svobodova Communications: Some notes on the
Computer Synectics hardware monitor sum 23--25
Haruhisa Ishida and
Nobumasa Takahashi Job statistics at a 2000-user university
computer center . . . . . . . . . . . . 2--13
Don R. Rice An analytical model for computer system
performance evaluation . . . . . . . . . 14--30
Kenneth W. Kolence The software empiricist . . . . . . . . 31--36
Kenneth W. Kolence and
Philip J. Kiviat Software unit profiles & Kiviat figures 2--12
Peter J. Denning Why our approach to performance
evaluation is SDRAWKCAB . . . . . . . . 13--16
Norman Beck and
Gordon Ashby On cost of static linking and loading of
subprograms . . . . . . . . . . . . . . 17--20
Ken Kolence The software empiricist experimental
disciplines & computer measurements . . . 21--23
James Hughes and
David Cronshaw On using a hardware monitor as an
intelligent peripheral . . . . . . . . . 3--19
Liba Svobodova Measuring computer system utilization
with a hardware and a hybrid monitor . . 20--34
David B. Wortman A note on high resolution timing . . . . 3--9
Rowan Snyder A quantitative study of the addition of
extended core storage . . . . . . . . . 10--33
H. E. Barry Merrill A technique for comparative analysis of
Kiviat graphs . . . . . . . . . . . . . 34--39
Thomas G. Peterson A comparison of software and hardware
monitors . . . . . . . . . . . . . . . . 2--5
Gordon H. Syms Benchmarked comparison of terminal
support systems for IBM 360 computers 6--34
Michael F. Morris Kiviat graphs: conventions and `figures
of merit' . . . . . . . . . . . . . . . 2--8
Paul L. Lujanac A note on Syms' benchmarked comparison 9--10
G. Scott Graham and
Peter J. Denning Multiprogramming and program behavior 1--8
A. Brandwain and
J. Buzen and
E. Gelenbe and
D. Potier A model of performance for virtual
memory systems . . . . . . . . . . . . . 9--9
Greg Henderson and
Juan Rodriguez-Rosell The optimal choice of window sizes for
working set dispatching . . . . . . . . 10--33
Peter J. Denning Comments on a linear paging model . . . 34--48
Richard S. Brice and
J. C. Browne Feedback coupled resource allocation
policies in the
multiprogramming-multiprocessor computer
system . . . . . . . . . . . . . . . . . 49--53
Baruch Halachmi and
W. R. Franta A closed, cyclic, two-stage
multiprogrammed system model and its
diffusion approximation solution . . . . 54--64
H. D. Schwetman Analysis of a time-sharing subsystem (a
preliminary report) . . . . . . . . . . 65--75
M. Reiser and
A. G. Konheim The analysis of storage constraints by a
queueing network model with blocking . . 76--81
M. Schatzoff and
C. C. Tillman Statistical validation of a trace-driven
simulator . . . . . . . . . . . . . . . 82--93
Domenico Ferrari and
Mark Liu A general-purpose software measurement
tool . . . . . . . . . . . . . . . . . . 94--105
James D. Foley and
John W. McInroy An event-driven data collection and
analysis facility for a two-computer
network . . . . . . . . . . . . . . . . 106--120
A. P. Batson and
R. E. Brundage Measurements of the virtual memory
demands of Algol-60 programs (Extended
Abstract) . . . . . . . . . . . . . . . 121--126
Peter R. Sebastian HEMI (Hybrid Events Monitoring
Instrument) . . . . . . . . . . . . . . 127--139
Springer W. Cox Interpretive analysis of computer system
performance . . . . . . . . . . . . . . 140--155
J. D. Noe and
N. W. Runstein Develop your computer performance
pattern . . . . . . . . . . . . . . . . 156--165
D. E. Brotherton The computer capacity curve --- a
prerequisite for computer performance
evaluation and improvement . . . . . . . 166--179
Warren J. Erikson The value of CPU utilization as a
criterion for computer system usage . . 180--187
M. Badel and
E. Gelenbe and
J. Leroudier and
D. Potier and
J. Lenfant Adaptive optimization of the performance
of a virtual memory computer . . . . . . 188--188
Stephen R. Kimbleton Batch computer scheduling: a
heuristically motivated approach . . . . 189--198
Joseph C. Sharp and
James N. Roberts An adaptive policy driven scheduler . . 199--208
H. W. Barry Merrill Further comments on comparative
evaluation of Kiviat graphs . . . . . . 1--10
Barry A. Stevens A note on figure of merit . . . . . . . 11--19
Thomas E. Bell Managing computer performance with
control limits . . . . . . . . . . . . . 21--28
J. C. Browne An analysis of measurement procedures
for computer systems . . . . . . . . . . 29--32
Kornel Terplan Cost-optimal reliability of data
processing systems . . . . . . . . . . . 1--12
Carl E. Landwehr Usage statistics for MTS . . . . . . . . 13--23
Y. V. Reddy Experimental evaluation of a
multiprogrammed computer system . . . . 24--32
Dileep P. Bhandarkar A practical application of memory
interference models . . . . . . . . . . 33--39
Dieter Bahr A note on figures of merit . . . . . . . 1--3
B. W. Boehm and
T. E. Bell Issues in computer performance
evaluation: some consensus, some
divergence . . . . . . . . . . . . . . . 4--39
Eric Ole Barber and
Arne Asphjell and
Arve Dispen Benchmark construction . . . . . . . . . 3--14
J. P. Marrevée Measurements of the Philips P1400
multiprogramming system . . . . . . . . 15--45
Linda S. Wright and
William A. Burnette An approach to evaluating time sharing
systems: MH-TSS a case study . . . . . . 8--28
John M. Calcagni Shape in ranking Kiviat graphs . . . . . 35--37
J. Eisenfeld and
David R. Barker and
David J. Mishelvich Iconic representation of the human face
with computer graphics . . . . . . . . . 38--39
Gary J. Nutt Tutorial: computer system monitors . . . 41--51
Ira W. Cotton Some fundamentals of price theory for
computer services . . . . . . . . . . . 1--12
Thomas Giammo Deficiencies in computer pricing
structure theory . . . . . . . . . . . . 13--21
Stephen R. Kimbleton Considerations in pricing distributed
computing . . . . . . . . . . . . . . . 22--30
Philip J. Kiviat A brief review of the GAO task group's
recommendations on management guidelines
for pricing computer services in the
federal government . . . . . . . . . . . 71--83
Michael F. Morris Problems in implementing and processing
computer charging schemes . . . . . . . 84--88
Gottfried W. R. Luderer Charging problems in mixed
time-sharing/batch systems: cross
subsidization and invariant work units 89--93
David J. Oatey SIGMETRICS technical meeting on pricing
computer services . . . . . . . . . . . 94--102
Richard H. Gutsche User experience . . . . . . . . . . . . 103--107
Anonymous Participant's choice . . . . . . . . . . 108--122
Gottfried W. R. Luderer Defining a computer resource unit . . . 5--10
K. Roehr and
K. Niebel Proposal for instruction time objectives 11--18
John P. Collins Performance improvement of the CP-V
loader through use of the ADAM hardware
monitor . . . . . . . . . . . . . . . . 63--67
A. Brandwajn Simulation of the load of an interactive
system . . . . . . . . . . . . . . . . . 69--92
G. W. J. Coppens and
M. P. F. M. van Dongen and
J. P. C. Kleijnen Quantile estimation in regenerative
simulation: a case study . . . . . . . . 5--15
Robert G. Estell How fast is `real-time'? . . . . . . . . 16--18
Philip M. Mills A simple model for cost considerations
in a batch multiprocessor environment 19--27
Irene Buchanan and
David A. Duce An interactive benchmark for a
multi-user minicomputer system . . . . . 5--17
Robert G. Estell How fast is `real-time'? . . . . . . . . 18--20
Abbas Rafii Study of the performance of RPS . . . . 21--38
Thomas G. Price A comparison of queuing network models
and measurements of a multiprogrammed
computer system . . . . . . . . . . . . 39--62
J. P. Buzen Tuning: tools and techniques . . . . . . 63--81
Mitchell G. Spiegel Workshop summary: `Applications of
queuing models to ADP system performance
prediction' . . . . . . . . . . . . . . 13--33
L. Hellerman A table of work formulae with
derivations and applications . . . . . . 35--54
R. C. Allen and
S. R. Clark A note on an empirical study of paging
on an IBM 370/145 . . . . . . . . . . . 55--62
Robert L. Morrison Abstracts from the 1977 SIGMETRICS/CMG
VIII conference . . . . . . . . . . . . 3--21
Constantine Lazos Functional distribution of the workload
of a linked computer system and its
simulation . . . . . . . . . . . . . . . 5--14
A.-W. Scheer Combination of an optimization model for
hardware selection with data
determination methods . . . . . . . . . 15--26
Terence Berinato An analytical model of a teleprocessing
system . . . . . . . . . . . . . . . . . 27--32
Samuel T. Chanson and
Craig D. Bishop A simulation study of adaptive
scheduling policies in interactive
computer systems . . . . . . . . . . . . 33--39
Kurt Ziegler A data sharing tutorial . . . . . . . . 3--7
Shirley E. Scott Pricing D.P. products: a timesharing
implementation . . . . . . . . . . . . . 8--12
Alain Sarzotti Transactional terminal system on
micro-processor: a method for
identifying & modeling overall
performance . . . . . . . . . . . . . . 13--22
Mieczyslaw Bazewicz and
Adam Peterseil Use of modelling in performance
evaluation of computer systems: a case
of installations in the Technical
University of Wroclaw . . . . . . . . . 22--26
R. A. Orchard A new methodology for computer system
data gathering . . . . . . . . . . . . . 27--41
Mark A. Underwood Human performance evaluation in the use
of federal computer systems:
recommendations . . . . . . . . . . . . 6--14
Aridaman K. Jain A guideline to statistical approaches in
computer performance evaluation studies 18--32
Anonymous Proceedings of the Software Quality and
Assurance Workshop . . . . . . . . . . . 32--32
Howard P. Honig Data path analysis: analyzing large I/O
environments . . . . . . . . . . . . . . 34--37
C. H. Sauer and
E. A. MacNair Simultaneous resource possession in
queueing models of computers . . . . . . 41--52
Pamela R. Pfau Applied quality assurance methodology 1--8
Edward H. Bersoff and
Vilas D. Henderson and
Stan G. Siegel Software Configuration Management . . . 9--17
Robert L. Glass Computing failure: a learning experience 18--19
Donald A. Woodmancy A Software Quality Improvement Program 20--26
Marilyn S. Fujii A comparison of software assurance
methods . . . . . . . . . . . . . . . . 27--32
Alan N. Sukert and
Amrit L. Goel Error modelling applications in software
quality assurance . . . . . . . . . . . 33--38
Joe W. Duran and
John J. Wiorkowski Toward models for probabilistic program
correctness . . . . . . . . . . . . . . 39--44
B. H. Yin and
J. W. Winchester The establishment and use of measures to
evaluate the quality of software designs 45--52
Robert A. Pierce A Requirements Tracing Tool . . . . . . 53--60
Alan M. Davis and
Walter J. Rataj Requirements language processing for the
effective testing of real-time systems 61--66
Lawrence Peters Relating software requirements and
design . . . . . . . . . . . . . . . . . 67--71
Allan M. Stavely Design feedback and its use in software
design aid systems . . . . . . . . . . . 72--78
Cornelia M. Yoder and
Marilyn L. Schrag Nassi--Shneiderman charts an alternative
to flowcharts for design . . . . . . . . 79--86
J. P. Benson and
S. H. Saib A software quality assurance experiment 87--91
Jonathan Bauer and
Susan Faasse and
Alan Finger and
William Goodhue The automatic generation and execution
of function test plans for electronic
switching systems . . . . . . . . . . . 92--100
K. A. Martin Software acceptance testing that goes
beyond the book . . . . . . . . . . . . 101--105
Frederick J. Drasch and
Richard A. Bowen IDBUG: a tool for program development 106--110
M. E. Stickney An application of graph theory to
software test data selection . . . . . . 111--115
Kurt F. Fischer Software quality assurance tools: Recent
experience and future requirements . . . 116--121
Alan L. Glasser The evolution of a Source Code Control
System . . . . . . . . . . . . . . . . . 122--125
William H. Josephs A mini-computer based library control
system . . . . . . . . . . . . . . . . . 126--132
Joseph P. Cavano and
James A. McCall A framework for the measurement of
software quality . . . . . . . . . . . . 133--139
Gary W. Cobb A measurement of structure for
unstructured programming languages . . . 140--147
John B. Bowen Are current approaches sufficient for
measuring software quality? . . . . . . 148--155
Joann Lockett Using performance metrics in system
design . . . . . . . . . . . . . . . . . 156--159
Richard N. Southworth Responding to MIL-S-52779 . . . . . . . 160--164
Michael F. Tighe The value of a proper software quality
assurance methodology . . . . . . . . . 165--172
Peter Chase Belford and
Carlo Broglio A quantitative evaluation of the
effectiveness of quality assurance as
experienced on a large-scale software
development effort . . . . . . . . . . . 173--180
Paul J. Kacik An example of software quality assurance
techniques used in a successful large
scale software development . . . . . . . 181--186
Wolfgang Kreutzer Computer system modelling and simulation 9--35
Rollins Turner An investigation of several mathematical
models of queueing systems . . . . . . . 36--44
Charles H. Sauer Confidence intervals for queueing
simulations of computer systems . . . . 45--55
Jack P. C. Kleijnen A note on computer system data gathering 56--56
M. K. Rajaraman Performance prediction of a virtual
machine . . . . . . . . . . . . . . . . 57--62
Aridaman K. Jain A guideline to statistical approaches in
computer performance evaluation studies 63--77
E. Schwartz Development of credible computer system
simulation models . . . . . . . . . . . 78--95
Jon D. Clark and
Thomas J. Reynolds and
Michael J. Intille Computer performance evaluation: an
empirical approach . . . . . . . . . . . 97--101
Ron Willis Techniques in simulation which enhance
software reliability . . . . . . . . . . 102--115
Russ Blake Tailor: a simple model that works . . . 1--11
William D. Strecker An analysis of central
processor-input-output processor
contention . . . . . . . . . . . . . . . 27--40
Cheryl A. Wiecek and
Simon C. Steely, Jr. Performance simulation as a tool in
central processing unit design . . . . . 41--47
David A. Bennett and
Christopher A. Landauer Simulation of a distributed system for
performance modelling . . . . . . . . . 49--56
Edward D. Lazowska The benchmarking, tuning and analytic
modeling of VAX/VMS . . . . . . . . . . 57--64
William T. Marshall and
C. Thomas Nute Analytic modelling of ``working set
like'' replacement algorithms . . . . . 65--72
Fayé A. Briggs Effects of buffered memory requests in
multiprocessor systems . . . . . . . . . 73--81
Abbas Raffi Effects of channel blocking on the
performance of shared disk pack in a
multi-computer system . . . . . . . . . 83--87
John Zahorjan An exact solution method for the general
class of closed separable queueing
networks . . . . . . . . . . . . . . . . 107--112
Martin G. Kienzle and
K. C. Sevcik Survey of analytic queueing network
models of computer systems . . . . . . . 113--129
Steve P. Landry and
Bruce D. Shriver A simulation environment for performing
dataflow research . . . . . . . . . . . 131--139
David D. Langan and
Bruce D. Shriver Simulated execution of dataflow programs
on processors having finite resources 141--149
Brian W. Unger and
James R. Parker An operating system implementation and
simulation language (OASIS) . . . . . . 151--161
John Sanguinetti A technique for integrating simulation
and system design . . . . . . . . . . . 163--172
Rami R. Razouk and
Mary Vernon and
Gerald Estrin Evaluation methods in SARA --- the graph
model simulator . . . . . . . . . . . . 189--206
Stone H. Yu and
Tadao Murata Modeling and simulating data flow
computations at machine language level 207--213
R. M. Mattheyses and
S. E. Conry Models for specification and analysis of
parallel computing systems . . . . . . . 215--224
Ilya Gertner Performance evaluation of communicating
processes . . . . . . . . . . . . . . . 241--248
Christopher R. Spooner Benchmarking interactive systems:
Producing the software . . . . . . . . . 249--257
Jozo J. Dujmovi\'c Criteria for computer performance
analysis . . . . . . . . . . . . . . . . 259--267
James O. Dyal and
William DeWald, Jr. Small business system performance
analysis . . . . . . . . . . . . . . . . 269--275
Robert W. Huff System characterization of a Retail
Business System . . . . . . . . . . . . 277--284
Gary Stroebel Field performance aids for IBM GSD
systems . . . . . . . . . . . . . . . . 285--291
Jon D. Clark A feature analysis of performance
evaluation texts . . . . . . . . . . . . 9--11
Lawrence W. Dowdy Synopsis of workshop on the theory and
application of analytical models to ADP
system performance prediction . . . . . 13--17
Arthur Petrella and
Harold Farrey Simulating working sets under MVS . . . 24--36
Daniel L. Pierson Performance evaluation of a
minicomputer-based data collection
system . . . . . . . . . . . . . . . . . 37--44
H. Pat Artis Capacity planning for MVS computer
systems . . . . . . . . . . . . . . . . 45--62
M. K. Rajaraman Performance of a virtual memory: some
experimental results . . . . . . . . . . 63--68
Peter J. Denning What's a working set? . . . . . . . . . 6--10
Arthur Petrella and
Harold Farrey Simulating working sets under MVS . . . 11--23
Mitchell G. Spiegel Measuring and evaluating performance . . 33--34
P. J. Dixon Planning MIS investment and expense
levels . . . . . . . . . . . . . . . . . 35--37
Thomas S. Moran Capacity planning: `the volume' . . . . 38--40
Tom DeMarco Breaking the language barrier . . . . . 41--45
Howard L. Giles Communications systems management . . . 46--51
Robert F. Erlandson System evaluation methodologies:
combined multidimensional scaling and
ordering techniques . . . . . . . . . . 52--58
Sammy W. Pearson and
James E. Bailey Measurement of computer user
satisfaction . . . . . . . . . . . . . . 59--68
K. Mani Chandy and
Charles H. Sauer Computational algorithms for product
form queueing networks . . . . . . . . . 1--1
Karen D. Gordon and
Lawrence W. Dowdy The impact of certain parameter
estimation errors in queueing network
models . . . . . . . . . . . . . . . . . 3--9
Russ Blake XRAY: Instrumentation for multiple
computers . . . . . . . . . . . . . . . 11--25
James H. Hughes DIAMOND a digital analyzer and
monitoring device . . . . . . . . . . . 27--34
Douglas L. Bashioum Benchmarking interactive systems:
Calibrating the model . . . . . . . . . 35--41
Axel Lehmann Performance evaluation and prediction of
storage hierarchies . . . . . . . . . . 43--54
Timo O. Alanko and
Ilkka J. Haikala and
Petri H. Kutvonen Methodology and empirical results of
program behaviour measurements . . . . . 55--66
Gopa Kumar and
C. Thomas Nute Program restructuring for block
structured languages . . . . . . . . . . 67--79
Hendrik T. Vantilborgh and
Richard L. Garner and
Edward D. Lazowska Near-complete decomposability of
queueing networks with clusters of
strongly interacting servers . . . . . . 81--92
Alexandre Brandwajn Further results on equivalence and
decomposition in queueing network models 93--104
William J. Stewart and
Gerald A. Zeiszler On the existence of composite flow
equivalent Markovian servers . . . . . . 105--116
Raymond Marie Calculating equilibrium probabilities
for $ \lambda (n) / C_k / 1 / N $ queues 117--125
Robert A. Wagner and
Kishor S. Trivedi Hardware configuration selection through
discretizing a continuous variable
solution . . . . . . . . . . . . . . . . 127--142
Yonathan Bard A model of shared DASD and multipathing 143--143
T. L. Lo Computer capacity planning using
queueing network models . . . . . . . . 145--152
A. Kurinckx and
G. Pujolle Overallocation in a virtual circuit
computer network . . . . . . . . . . . . 153--158
Richard A. Upton and
Satish K. Tripathi Analysis of design alternatives for a
packet switched I/O system . . . . . . . 159--171
Edward E. Balkovich and
Colin Whitby-Strevens On the performance of decentralized
software . . . . . . . . . . . . . . . . 173--180
Dale H. Grit and
Rex L. Page Performance of a multiprocessor for
applicative programs . . . . . . . . . . 181--189
C. Retna Dhas Performance evaluation of a feedback
data flow processor using simulation . . 191--197
Raymond M. Bryant On homogeneity in M/G/1 queueing systems 199--208
E. G. Coffman, Jr. and
Erol Gelenbe and
Roger C. Wood Optimal replication of parallel-read,
sequential-write systems . . . . . . . . 209--216
John E. Shore The lazy repairman and other models:
Performance collapse due to overhead in
simple, single-server queuing systems 217--224
Simon S. Lam and
A. Udaya Shankar Response time distributions for a
multi-class queue with feedback . . . . 225--234
Y. T. Wang Analysis of an intrinsic overload
control for a class of queueing systems 235--243
Connie Smith and
J. C. Browne Aspects of software design analysis:
Concurrency and blocking . . . . . . . . 245--253
D. Potier and
Ph. Leblanc Analysis of locking policies in database
management systems . . . . . . . . . . . 255--255
E. G. Coffman, Jr. and
E. Gelenbe and
B. Plateau Optimization of the number of copies in
a distribution data base . . . . . . . . 257--263
Manfred Ruschitzka The response of job classes with
distinct policy functions (Extended
Abstract) . . . . . . . . . . . . . . . 265--265
K. H. Kim and
Mahmoud Naghibzadeh Prevention of task overruns in real-time
non-preemptive multiprogramming systems 267--276
P. J. B. King and
I. Mitrani Numerical methods for infinite Markov
processes . . . . . . . . . . . . . . . 277--282
G. Fayolle and
P. J. B. King and
I. Mitrani The solution of certain two-dimensional
Markov models . . . . . . . . . . . . . 283--289
Jon D. Clark and
Robert M. Golladay Empirical investigation of the
effectiveness of several computer
performance evaluation tools . . . . . . 31--36
Robert G. Estell Benchmarks and watermarks . . . . . . . 39--44
J. P. C. Kleijnen Scoring methods, multiple criteria, and
utility analysis . . . . . . . . . . . . 45--56
Peter J. Denning A tale of two islands: a fable . . . . . 7--10
Mark J. Yader ADP capacity planning: a case study . . 11--25
J. Marrevée How friendly and fast is FAST DUMP
RESTORE . . . . . . . . . . . . . . . . 28--35
J. C. Bernard T-scan: the use of micro computers for
response time measurements . . . . . . . 39--50
Thomas E. Bell Structured life-cycle assumptions . . . 1--3
Donald T. Coughlin System development methodology or system
research methodology? . . . . . . . . . 5--6
Dennis M. Earle An alchemical approach to brokerage . . 7--8
Mitchell G. Spiegel Prototyping: an approach to information
and communication system design . . . . 9--19
C. Wesley Jenkins Application prototyping: a case study 21--27
Patricia R. Cox Specification of a regression test for a
mini computer operating system . . . . . 29--32
William Bryan and
Stanley Siegel and
Gary Whiteleather An approach to software configuration
control . . . . . . . . . . . . . . . . 33--47
C. R. Fredrick Project implementation of Software
Configuration Management . . . . . . . . 49--56
H. Ronald Berlack Implementing software configuration
control in the structured programming
environment . . . . . . . . . . . . . . 57--77
Peter Gross Producers and consumers views of
software quality (Panel Session) . . . . 79--79
Sallie Henry and
Dennis Kafura and
Kathy Harris On the relationships among three
software metrics . . . . . . . . . . . . 81--88
Paul A. Szulewski and
Mark H. Whitworth and
Philip Buchan and
J. Barton DeWolf The measurement of software science
parameters in software designs . . . . . 89--94
Victor R. Basili and
Tsai-Yun Phillips Evaluating and comparing software
metrics in the software engineering
laboratory . . . . . . . . . . . . . . . 95--106
James Ronback Test metrics for software quality . . . 107--107
J. P. Benson Adaptive search techniques applied to
software testing . . . . . . . . . . . . 109--116
Michael Paige Data space testing . . . . . . . . . . . 117--127
Amrit L. Goel Optimal testing policies for software
systems . . . . . . . . . . . . . . . . 129--130
B. Littlewood A Bayesian differential debugging model
for software reliability . . . . . . . . 129--130
J. D. Musa and
A. Iannino Software reliability modeling accounting
for program size variation due to
integration or design changes . . . . . 129--130
John D. Musa Software reliability measurement session 129--130
Amrit L. Goel and
Kazuhira Okumoto When to stop testing and start using
software? . . . . . . . . . . . . . . . 131--138
B. Littlewood Stochastic reliability growth: a model
with applications to computer software
faults and hardware design faults . . . 139--152
Linda M. Ottenstein Software defects --- a software science
perspective . . . . . . . . . . . . . . 153--155
Linda Ottenstein Predicting numbers of errors using
software science . . . . . . . . . . . . 157--167
Victor Schneider Some experimental estimators for
developmental and delivered errors in
software development projects . . . . . 169--172
H. Sneed SOFTDOC --- A system for automated
software static analysis and
documentation . . . . . . . . . . . . . 173--177
John D. Crowley The application development process:
What's wrong with it? . . . . . . . . . 179--187
C. T. Bailey and
W. L. Dingee A software study using Halstead metrics 189--197
A. Esposito and
A. Mazzeo and
P. Costa Workload characterization for trend
analysis . . . . . . . . . . . . . . . . 5--15
J. D. Musa and
A. Iannino Software reliability modeling:
accounting for program size variation
due to integration or design changes . . 16--25
J. R. Comer and
J. R. Rinewalt and
M. M. Tanik A comparison of two different program
complexity measures . . . . . . . . . . 26--28
Marshall D. Abrams and
Dorothy C. Neiman NBS network measurement methodology
applied to synchronous communications 29--36
R. L. Larsen and
J. R. Agre and
A. K. Agrawala A comparative evaluation of local area
communication technology . . . . . . . . 37--47
Herman D. Hughes A highly parameterized tool for studying
performance of computer systems . . . . 48--65
Mitchell G. Spiegel RTE's: past is prologue . . . . . . . . 66--73
J. C. Browne Designing systems for performance . . . 1--1
David Reiner and
Tad Pinkerton A method for adaptive performance
improvement of operating systems . . . . 2--10
Y. T. Wang On the VAX/VMS time-critical process
scheduling . . . . . . . . . . . . . . . 11--18
Lars Söderlund Evaluation of concurrent physical
database reorganization through
simulation modeling . . . . . . . . . . 19--32
Edward D. Lazowska and
John Zahorjan Analytic modelling of disk I/O
subsystems: a tutorial . . . . . . . . . 33--35
Lawrence W. Dowdy and
Hans J. Breitenlohner A model of Univac 1100/42 swapping . . . 36--47
Rollins Turner and
Henry Levy Segmented FIFO page replacement . . . . 48--51
Domenico Ferrari A generative model of working set
dynamics . . . . . . . . . . . . . . . . 52--57
J. Zahorjan and
K. C. Sevcik and
D. L. Eager and
B. I. Galler Balanced job bound analysis of queueing
networks . . . . . . . . . . . . . . . . 58--58
D. Neuse and
K. Chandy SCAT: a heuristic algorithm for queueing
network models of computing systems . . 59--79
John Zahorjan and
Eugene Wong The solution of separable queueing
network models using mean value analysis 80--85
Alexander Thomasian and
Behzad Nadji Aggregation of stations in queueing
network models of multiprogrammed
computers . . . . . . . . . . . . . . . 86--104
Herb Schwetman Computer system models: an introduction 105--105
Peter J. Denning Performance evaluation: Experimental
computer science at its best . . . . . . 106--109
Abbas Rafii Structure and application of a
measurement tool --- SAMPLER/3000 . . . 110--120
Stephen Tolopka An event trace monitor for the VAX
11/780 . . . . . . . . . . . . . . . . . 121--128
H. Pat Artis A log file design for analyzing
secondary storage occupancy . . . . . . 129--135
John Sanguinetti The effects of solid state paging
devices in a large time-sharing system 136--153
Richard T. Wang and
J. C. Browne Virtual machine-based simulation of
distributed computing and network
computing . . . . . . . . . . . . . . . 154--156
Ragnar Huslende A combined evaluation of performance and
reliability for degradable systems . . . 157--164
Patricia A. Jacobson and
Edward D. Lazowska The method of surrogate delays:
Simultaneous resource possession in
analytic models of computer systems . . 165--174
Patricia Jacobson Approximate analytic models of arbiters 175--180
Fayé A. Briggs and
Michel Dubois Performance of cache-based
multiprocessors . . . . . . . . . . . . 181--190
R. M. Bryant and
J. R. Agre A queueing network approach to the
module allocation problem in distributed
systems . . . . . . . . . . . . . . . . 191--204
Madhav Marathe and
Sujit Kumar Analytical models for an Ethernet-like
local area network link . . . . . . . . 205--215
Michael A. Pechura Page life measurements . . . . . . . . . 10--12
Jon D. Clark An update on economies-of-scale in
computing systems . . . . . . . . . . . 13--14
Edward R. Janusz Getting the most out of a small computer 22--35
Springer Cox Data, definition, deduction: an
empirical view of operational analysis 36--44
Hiroshi Muramatsu and
Masahiro Date and
Takanori Maki Structural validation in queueing
network models of computer systems . . . 41--46
Charles H. Sauer Numerical solution of some multiple
chain queueing networks . . . . . . . . 47--56
Thomas A. Nemeth An approach to interactive performance
analysis in a busy production system
(NOS/BE) . . . . . . . . . . . . . . . . 57--73
Michael E. Knudson A computer performance evaluation
operational methodology . . . . . . . . 74--80
P. V. Afshari and
S. C. Bruell and
R. Y. Kain Modeling a new technique for accessing
shared buses . . . . . . . . . . . . . . 4--13
Aurel A. Lazar Optimal control of a M/M/m queue . . . . 14--20
Jeffrey R. Spirn Network modeling with bursty traffic and
finite buffer space . . . . . . . . . . 21--28
Simon S. Lam and
Y. Luke Lien Optimal routing in networks with
flow-controlled virtual channels . . . . 38--46
Miron Livny and
Myron Melman Load balancing in homogeneous broadcast
distributed systems . . . . . . . . . . 47--55
Stuart Wecker and
Robert Gordon and
James Gray and
James Herman and
Raj Kanodia and
Dan Seligman Performance of globally distributed
networks . . . . . . . . . . . . . . . . 58--58
R. L. Gordon Operational measurements on a high
performance ring . . . . . . . . . . . . 59--59
James P. Gray Performance of SNA's LU-LU session
protocols . . . . . . . . . . . . . . . 60--61
James G. Herman ARPANET performance tuning techniques 62--62
Avner Aleh and
K. Dan Levin The determination of upper bounds for
economically effective compression in
packet switching networks . . . . . . . 64--72
Patrick V. McGregor Concentrator modeling with pipelining
arrivals compensation . . . . . . . . . 73--94
Alan Mink and
Charles B. Silio, Jr. Modular expansion in a class of
homogeneous networks . . . . . . . . . . 95--100
Ashok K. Thareja and
Satish K. Tripathi and
Richard A. Upton On updating buffer allocation . . . . . 101--110
M. Y. Elsanadidi and
Wesley W. Chu An analysis of a time window multiaccess
protocol with collision size feedback
(WCSF) . . . . . . . . . . . . . . . . . 112--118
Kuno M. Roehr and
Horst Sadlowski Performance analysis of local
communication loops . . . . . . . . . . 119--129
R. H. Sherman and
M. G. Gable and
A. W. Chung Distributed virtual hosts and networks:
Measurement and control . . . . . . . . 130--136
Richard Brice and
William Alexander A network performance analyst's
workbench . . . . . . . . . . . . . . . 138--146
Donald F. DuBois A Hierarchical Modeling System for
computer networks . . . . . . . . . . . 147--155
K. Terplan Network performance reporting . . . . . 156--170
Mitchell G. Spiegel Questions for Local Area Network
panelists . . . . . . . . . . . . . . . 172--172
Kuno M. Roehr and
Horst Sadlowski Performance analysis of local
communication loops . . . . . . . . . . 173--173
Barbara R. Sternick Systems aids in determining Local Area
Network performance characteristics . . 174--174
Anonymous Authors Index . . . . . . . . . . . . . 175--175
M. K. Rajaraman Performance evaluation through job
scheduler modeling . . . . . . . . . . . 9--15
Peter S. Mager Toward a parametric approach for
modeling local area network performance 17--28
John E. Gaffney, Jr. Score `82 --- a summary (at IBM Systems
Research Institute, 3/23-3/24/82) . . . 30--32
Linda D. Misek-Falkoff The new field of ``Software
Linguistics'': an early-bird view . . . 35--51
Mitchell G. Spiegel Software counting rules: Will history
repeat itself? . . . . . . . . . . . . . 52--56
Krishna M. Kavi and
U. B. Jackson Effect of declarations on software
metrics: an experiment in software
science . . . . . . . . . . . . . . . . 57--71
John E. Gaffney, Jr. Machine Instruction Count Program . . . 72--79
Linda D. Misek-Falkoff A unification of Halstead's Software
Science counting rules for programs and
English text, and a claim space approach
to extensions . . . . . . . . . . . . . 80--114
George E. Estes Distinguishing the potential operands in
FORTRAN programs . . . . . . . . . . . . 115--117
S. D. Conte and
V. Y. Shen and
K. Dickey On the effect of different counting
rules for control flow operators on
Software Science metrics in Fortran . . 118--126
J. G. Shanthikumar and
P. K. Varshney and
K. Sriram A priority cutoff flow control scheme
for integrated voice-data multiplexers 8--14
Springer Cox Data, definition, deduction: an
empirical view of operational analysis 15--20
H. G. Perros The queue-length distribution of the
M/Ck/1 queue . . . . . . . . . . . . . . 21--24
Gordon E. Anderson Bernoulli methods for predicting
communication processor performance . . 25--29
Timo Laurmaa and
Markku Syrjänen APL and Halstead's theory: a measuring
tool and some experiments . . . . . . . 32--47
Nicholas Beser Foundations and experiments in software
science . . . . . . . . . . . . . . . . 48--72
Karl Ernst Schnurer Product Assurance Program Analyzer
(P.A.P.A.) a tool for program complexity
evaluation . . . . . . . . . . . . . . . 73--74
David R. Gross and
Mary A. King and
Michael R. Murr and
Michael R. Eddy Complexity measurement of Electronic
Switching System (ESS) software . . . . 75--85
Sandra D. Hartman A counting tool for RPG . . . . . . . . 86--100
Farid A. Naib An application of software science to
the quantitative measurement of code
quality . . . . . . . . . . . . . . . . 101--128
Russ Blake Optimal control of thrashing . . . . . . 1--10
Özalp Babao\uglu Hierarchical replacement decisions in
hierarchical stores . . . . . . . . . . 11--19
Robert B. Hagmann and
Robert S. Fabry Program page reference patterns . . . . 20--29
R. B. Bunt and
R. S. Harbus and
S. J. Plumb The effective management of paging
storage hierarchies . . . . . . . . . . 30--38
Larry F. Hodges and
William J. Stewart Workload characterization and
performance evaluation in a research
environment . . . . . . . . . . . . . . 39--50
Günter Haring On state-dependent workload
characterization by software resources 51--57
M. L. Bolzoni and
M. C. Calzarossa and
P. Mapelli and
G. Serazzi A package for the implementation of
static workload models . . . . . . . . . 58--67
Gene McDaniel The Mesa Spy: an interactive tool for
performance debugging . . . . . . . . . 68--76
Uwe Hercksen and
Rainer Klar and
Wolfgang Kleinöder and
Franz Kneißl Measuring simultaneous events in a
multiprocessor system . . . . . . . . . 77--88
Erol Gelenbe Stationary deterministic flows in
discrete systems: I . . . . . . . . . . 89--101
F. Baccelli and
E. G. Coffman A data base replication analysis using
an M/M/m queue with service
interruptions . . . . . . . . . . . . . 102--107
Brigitte Plateau and
Andreas Staphylopatis Modelling of the parallel resolution of
a numerical problem on a locally
distributed computing system . . . . . . 108--117
Yonathan Bard Modeling I/O systems with dynamic path
selection, and general transmission
networks . . . . . . . . . . . . . . . . 118--129
Edward D. Lazowska and
John Zahorjan Multiple class memory constrained
queueing networks . . . . . . . . . . . 130--140
Alexandre Brandwajn Fast approximate solution of
multiprogramming models . . . . . . . . 141--149
Subhash C. Agrawal and
Jeffrey P. Buzen The aggregate server method for
analyzing serialization delays in
computer systems . . . . . . . . . . . . 150--150
Connie U. Smith and
David D. Loendorf Performance analysis of software for an
MIMD computer . . . . . . . . . . . . . 151--162
Jon R. Agre and
Satish K. Tripathi Modeling reentrant and nonreentrant
software . . . . . . . . . . . . . . . . 163--178
L. T. Wu Operational models for the evaluation of
degradable computing systems . . . . . . 179--185
Raymond A. Marie and
Patricia M. Snyder and
William J. Stewart Extensions and computational aspects of
an iterative method . . . . . . . . . . 186--194
Doug Neuse and
K. Mani Chandy HAM: the heuristic aggregation method
for solving general closed queueing
network models of computer systems . . . 195--212
D. L. Eager and
K. C. Sevcik Performance bound hierarchies for
queueing networks . . . . . . . . . . . 213--214
Jeffrey A. Brumfield and
Peter J. Denning Error analysis of homogeneous mean queue
and response time estimators . . . . . . 215--221
Alan Harbitter and
Satish K. Tripathi A model of transport level flow control 222--232
Erol Gelenbe and
Isi Mitrani Control policies in CSMA local area
networks: Ethernet controls . . . . . . 233--240
Satish K. Tripathi and
Alan Harbitter An analysis of two flow control
techniques . . . . . . . . . . . . . . . 241--249
P. J. B. King and
I. Mitrani Modelling the Cambridge Ring . . . . . . 250--258
J. Marrevee The power of the read track and the need
for a write track command for disk
back-up and restore utilities . . . . . 10--14
H. G. Perros A model for predicting the response time
of an on-line system for electronic fund
transfer . . . . . . . . . . . . . . . . 15--21
Reinhard Augustin and
Klaus-Jürgen Büscher Characteristics of the COX-distribution 22--32
H. G. Perros Queueing networks with blocking: a
bibliography . . . . . . . . . . . . . . 8--12
Tom DeMarco An algorithm for sizing software
products . . . . . . . . . . . . . . . . 13--22
Paul A. Fishwick and
Stefan Feyock PROFGEN: a procedure for generating
machine independent high-level language
profilers . . . . . . . . . . . . . . . 27--31
M. K. Rajaraman Performance measures for a local network 34--37
Greg A. Jones Performance evaluation of a job
scheduler . . . . . . . . . . . . . . . 38--43
Jon D. Clark and
Thomas C. Richards A note on the cost-performance ratios of
IBM's 43XX series . . . . . . . . . . . 44--45
E. G. Coffman, Jr. Recent progress in the performance
evaluation of fundamental allocation
algorithms . . . . . . . . . . . . . . . 2--6
Domenico Ferrari On the foundations of artificial
workload design . . . . . . . . . . . . 8--14
Alfredo de J. Perez-Davila and
Lawrence W. Dowdy Parameter interdependencies of file
placement models in a Unix system . . . 15--26
Richard B. Bunt and
Jennifer M. Murphy and
Shikharesh Majumdar A measure of program locality and its
application . . . . . . . . . . . . . . 28--40
A. Krzesinski and
J. Greyling Improved lineariser methods for queueing
networks with queue dependent centres 41--51
John Zahorjan and
Edward D. Lazowska Incorporating load dependent servers in
approximate mean value analysis . . . . 52--62
Subhash C. Agrawal and
Jeffrey P. Buzen and
Annie W. Shum Response Time Preservation: a general
technique for developing approximate
algorithms for queueing networks . . . . 63--77
Ph. Mussi and
Ph. Nain Evaluation of parallel execution of
program tree structures . . . . . . . . 78--87
John Sanguinetti Program optimization for a pipelined
machine a case study . . . . . . . . . . 88--95
Rollins Turner and
Jeffrey Schriesheim and
Indrajit Mitra Performance of a DECnet based disk block
server . . . . . . . . . . . . . . . . . 96--104
Bengt Stavenow Throughput-delay characteristics and
stability considerations of the access
channel in a mobile telephone system . . 105--112
Elizabeth Williams Processor queueing disciplines in
distributed systems . . . . . . . . . . 113--119
Lindsey E. Stephens and
Lawrence W. Dowdy Convolutional bound hierarchies . . . . 120--133
Rajan Suri and
Gregory W. Diehl A new `building block' for performance
evaluation of queueing networks with
finite buffers . . . . . . . . . . . . . 134--142
Stephen S. Lavenberg A simple analysis of exclusive and
shared lock contention in a database
system . . . . . . . . . . . . . . . . . 143--148
S. T. Becker and
K. M. Rege and
B. Sengupta A modeling methodology for sizing a
computer based system in a netted
environment . . . . . . . . . . . . . . 149--157
Darwyn R. Peachey and
Richard B. Bunt and
Carey L. Williamson and
Tim B. Brecht An experimental investigation of
scheduling strategies for UNIX . . . . . 158--166
Daniel A. Menascé and
Leonardo Lellis P. Leite Performance evaluation of isolated and
interconnected token bus local area
networks . . . . . . . . . . . . . . . . 167--175
Subhash C. Agrawal and
Jeffrey P. Buzen and
Ashok K. Thareja A Unified Approach to Scan Time Analysis
of Token Rings and Polling Networks . . 176--185
Alexandre Brandwajn and
William M. McCormack Efficient approximation for models of
multiprogramming with shared domains . . 186--194
André B. Bondi and
Jeffrey P. Buzen The response times of priority classes
under preemptive resume in M/G/m queues 195--201
Alexander Thomasian and
Paul Bay Analysis of Queueing Network Models with
population size constraints and delayed
blocked customers . . . . . . . . . . . 202--216
John E. Gaffney Instruction entropy, a possible measure
of program/architecture compatibility 13--18
Charles H. Sauer Numerical solution of some multiple
chain queueing networks . . . . . . . . 19--28
Alexander Thomasian and
Kameshwar Gargeya Speeding up computer system simulations
using hierarchical modeling . . . . . . 34--39
James L. Elshoff The PEEK measurement program . . . . . . 40--53
Anna Hác A survey of techniques for the modeling
of serialization delays in computer
systems . . . . . . . . . . . . . . . . 54--56
Ali Mosleh and
E. Richard Hilton and
Peter S. Browne Bayesian probabilistic risk analysis . . 5--12
Huisheng Gong and
Monika Schmidt A complexity measure based on selection
and nesting . . . . . . . . . . . . . . 14--19
Michael E. Knudson A performance measurement and system
evaluation project plan proposal . . . . 20--31
Lem O. Ejiogu A simple measure of software complexity 33--47
Derek L. Eager and
Edward D. Lazowska and
John Zahorjan A comparison of receiver-initiated and
sender-initiated adaptive load sharing
(extended abstract) . . . . . . . . . . 1--3
David Gelernter and
Sunil Podar and
Hussein G. Badr An adaptive communications protocol for
network computers (extended abstract) 4--5
Erol Gelenbe and
David Finkel and
Satish K. Tripathi On the availability of a distributed
computer system with failing components 6--13
A. E. Conway and
N. D. Georganas RECAL --- a new efficient algorithm for
the exact analysis of multiple-chain
closed queueing networks (abstract) . . 14--14
G. Balbo and
S. C. Bruell and
S. Ghanta Modeling priority schemes . . . . . . . 15--26
Robbe J. Walstra Nonexponential networks of queues: a
maximum entropy analysis . . . . . . . . 27--37
Maria Calzarossa and
Domenico Ferrari A sensitivity study of the clustering
approach to workload modeling (extended
abstract) . . . . . . . . . . . . . . . 38--39
S. V. Raghavan and
R. Kalyanakrishnan On the classification of interactive
user behaviour indices . . . . . . . . . 40--48
A. Inkeri Verkamo Empirical results on locality in
database referencing . . . . . . . . . . 49--58
Halin M. Khelalfa and
Anneliese K. von Mayrhauser Degradable computer systems with
dependent subsystems . . . . . . . . . . 59--68
Ram Chillarege and
Ravishankar K. Lyer The effect of system workload on error
latency: an experimental study . . . . . 69--77
Timothy A. Gonsalves Performance characteristics of two
Ethernets: an experimental study . . . . 78--86
I. Chlamtac and
M. Eisinger Performance of integrated services
(voice/data) CSMA/CD networks . . . . . 87--93
I. Chlamtac and
M. Eisinger An analytic model of the hyperchannel
network using multiple channel
architecture . . . . . . . . . . . . . . 94--104
Sandra Bleistein and
Shin-Sun Cho and
Robert T. Goettge Analytic performance model of the U.S.
en route air traffic control computer
systems . . . . . . . . . . . . . . . . 105--115
Lawrence W. Dowdy and
Manvinder S. Chopra On the applicability of using
multiprogramming level distributions . . 116--127
A. E. Krzesinski and
P. Teunissen Multiclass queueing networks with
population constrainted subnetworks . . 128--139
Alexandre Branwajn and
Yung-Li Lily Jow A note on service interruptions . . . . 140--148
Brigitte Plateau On the stochastic structure of
parallelism and synchronization models
for distributed algorithms . . . . . . . 147--154
Patricia M. Snyder and
William J. Stewart An approximate numerical solution for
multiclass preemptive priority queues
with general service time distributions 155--165
Alan R. Hevner Evaluation of optical disk systems for
very large database applications . . . . 166--172
Gilbert E. Houtekamer The local disk controller . . . . . . . 173--182
Philip S. Yu and
Daniel M. Dias and
John T. Robinson and
Balakrishna R. Iyer and
Douglas Cornell Modelling of centralized concurrency
control in a multi-system environment 183--191
Alexander Thomasian and
In Kyung Ryu Analysis of some optimistic concurrency
control schemes based on certification 192--203
In Kyung Ryu Review of 'OS 1100-of performance
algorithms: a guide to the resource
allocation algorithms of OS-1100' by
John C. Kelly . . . . . . . . . . . . . 9--9
H. G. Perros and
D. Mirchandani An analytic model of a file server for
bulk file transfers . . . . . . . . . . 14--22
Bernard Domanski Building IMS synthetic workloads . . . . 23--28
Jeffrey P. Buzen Modeling I/O subsystems (tutorial) . . . 1--1
Domenico Ferrari Workload characterization (tutorial):
issues and approaches . . . . . . . . . 1--1
Amrit L. Goel Software reliability modeling (tutorial) 2--2
Kye Hedlund Performance modeling in integrated
curcuit design (tutorial) . . . . . . . 2--2
H. Pat Artis Expert systems for performance analysis
(tutorial) . . . . . . . . . . . . . . . 3--3
Satish K. Tripathi Performance issues in local area
networks (tutorial) . . . . . . . . . . 3--3
Harold S. Stone and
Dominique Thibaut Footprints in the cache . . . . . . . . 4--8
Mary K. Vernon and
Mark A. Holliday Performance analysis of multiprocessor
cache consistency protocols using
generalized timed Petri nets . . . . . . 9--17
P. G. Harrison and
A. J. Field Performance modelling of parallel
computer architectures . . . . . . . . . 18--27
Stuart Madnick and
Y. Richard Wang Modeling multiprocessor computer systems
with unbalanced flows . . . . . . . . . 28--34
Lindsay Kleeman and
Antonio Cantoni The analysis and performance of batching
arbiters . . . . . . . . . . . . . . . . 35--43
John P. Lehoczky and
Lui Sha Performance of real-time bus scheduling
algorithms . . . . . . . . . . . . . . . 44--53
Will Leland and
Teunis J. Ott Load-balancing heuristics and process
behavior . . . . . . . . . . . . . . . . 54--69
Kyoo Jeong Lee and
Don Towsley A comparison of priority-based
decentralized load balancing policies 70--77
Jean-Yves Le Boudec A BCMP extension to multiserver stations
with concurrent classes of customers . . 78--91
A. E. Conway and
N. D. Georganas An efficient algorithm for
semi-homogeneous queueing network models 92--99
Philippe Nain and
Keith Ross Optimal multiplexing of heterogeneous
traffic with hard constraint . . . . . . 100--108
Kenneth Sevcik and
Marjory J. Johnson Cycle time properties of the FDDI token
ring protocol (extended abstract) . . . 109--110
Yves Dallery and
Rajan Suri Approximate disaggregation and
performance bounds for queueing networks
with multiple-server stations . . . . . 111--128
Johann Strelen A generalization of mean value analysis
to higher moments: moment analysis . . . 129--140
William A. Massey A probabilistic analysis of a database
system . . . . . . . . . . . . . . . . . 141--146
Andrew Witkowski Performance evaluation of multiversion
with the Oracle synchronization . . . . 147--158
Mukesh Swinghal and
A. K. Agrawala Performance analysis of an algorithm for
concurrency control in replicated
database systems . . . . . . . . . . . . 159--169
Ilkka Haikala ARMA models of program behaviour . . . . 170--179
Shikharesh Majumdar and
Richard B. Bunt Measurement and analysis of locality
phases in file referencing behaviour . . 180--192
Rami R. Razouk and
Terri Stewart and
Michael Wilson Measuring operating system performance
on modern micro-processors . . . . . . . 193--202
Victor F. Nicola and
V. G. Kulkarni and
Kishor S. Trivedi Queueing analysis of fault-tolerant
computer systems (extended abstract) . . 203--203
E. G. Coffman, Jr. and
E. Gelenbe and
E. N. Gilbert Analysis of a conveyor queue in a
flexible manufacturing system . . . . . 204--223
Demetres D. Kouvatsos A maximum entropy queue length
distribution for the G/G/1 finite
capacity queue . . . . . . . . . . . . . 224--236
Hideaki Takagi and
Masayuki Murata Queueing analysis of nonpreemptive
reservation priority discipline . . . . 237--244
Micha Hofri Queueing systems with a procrastinating
server . . . . . . . . . . . . . . . . . 245--253
O. J. Boxma and
B. Meister Waiting-time approximations for
cyclic-service systems with switch-over
times . . . . . . . . . . . . . . . . . 254--262
Irene Hu Measuring file access patterns in UNIX 15--20
Domenico Ferrari Considerations on the insularity of
performance evaluation . . . . . . . . . 21--32
Satish K. Tripathi and
Steve Kaisler and
Sharat Chandran and
Ashok K. Agrawala Report on the Workshop on Design &
Performance Issues in Parallel
Architectures . . . . . . . . . . . . . 16--32
Jim Gray A view of database system performance
measures . . . . . . . . . . . . . . . . 3--4
Philip Heidelberger and
Seetha Lakshmi A performance comparison of multi-micro
and mainframe database architectures . . 5--6
Daniel A. Reed and
Chong-kwon Kim Packet routing algorithms for integrated
switching networks . . . . . . . . . . . 7--15
Timothy A. Gonsalves and
Fouad A. Tobagi Performance of the Expressnet with
voice/data traffic . . . . . . . . . . . 16--26
Subhash Agrawal and
Ravi Ramaswamy Analysis of the resequencing delay for
M/M/m systems . . . . . . . . . . . . . 27--35
Daniel A. Reed and
Allen D. Malony and
Bradley D. McCredie Parallel discrete event simulation: a
shared memory approach . . . . . . . . . 36--38
Ingrid Y. Bucher and
Margaret L. Simmons A close look at vector performance of
register-to-register vector computers
and a new model . . . . . . . . . . . . 39--45
F. Darema-Rogers and
G. F. Pfister and
K. So Memory access patterns of parallel
scientific programs . . . . . . . . . . 46--58
Robert Geist and
Robert Reynolds and
Eve Pittard Disk scheduling in System V . . . . . . 59--68
Miron Livny and
Setrag Khoshafian and
Haran Boral Multi-disk management algorithms . . . . 69--77
Jeffrey P. Buzen and
Annie W. Shum A unified operational treatment of RPS
reconnect delays . . . . . . . . . . . . 78--92
R. Nelson and
D. Towsley and
A. N. Tantawi Performance analysis of parallel
processing systems . . . . . . . . . . . 93--94
Ziao-Nan Tan and
Kenneth C. Sevcik Reduced distance routing in single-state
shuffle-exchange interconnection
networks . . . . . . . . . . . . . . . . 95--110
Christos Bouras and
John Garofalakis Queueing delays in buffered multistage
interconnection networks . . . . . . . . 111--121
Hector Garcia-Molina and
Lawrence R. Rogers Performance through memory . . . . . . . 122--131
Michael J. Jipping and
Ray Ford Predicting performance of concurrency
control designs . . . . . . . . . . . . 132--142
Anton T. Dahbura and
Krishan K. Sabnani and
William J. Hery Performance analysis of a fault
detection scheme in multiprocessor
systems . . . . . . . . . . . . . . . . 143--154
Michael A. Salsburg A statistical approach to computer
performance modeling . . . . . . . . . . 155--162
Teemu Kerola and
Herb Schwetman Monit: a performance monitoring tool for
parallel and pseudo-parallel programs 163--174
M. Ajmone Marsan and
G. Balbo and
G. Chiola and
G. Conte Modeling the software architecture of a
prototype parallel machine . . . . . . . 175--185
William Alexander and
Tom W. Keller and
Ellen E. Boughter A workload characterization pipeline for
models of parallel systems . . . . . . . 186--194
Ingrid M. Graf Transformation between different levels
of workload characterization for
capacity planning: fundamentals and case
study . . . . . . . . . . . . . . . . . 195--204
Zuwang Ruan and
Walter F. Tichy Performance analysis of file replication
schemes in distributed systems . . . . . 205--215
David R. Cheriton and
Carey L. Williamson Network measurement of the VMTP
request-response protocol in the V
distributed system . . . . . . . . . . . 216--225
Mohamed Salehmohamed and
W. S. Luk and
Joseph G. Peters Performance evaluation of LAN sorting
algorithms . . . . . . . . . . . . . . . 226--233
George C. Polyzos and
Mart L. Molle Delay analysis of a window tree conflict
resolution algorithm in a local area
network environment . . . . . . . . . . 234--244
Scott Shenker Some conjectures on the behavior of
acknowledgement-based transmission
control of random access communication
channels . . . . . . . . . . . . . . . . 245--255
Peter Mathys and
Boi V. Faltings The effect of channel-exit protocols on
the performance of finite population
random-access systems . . . . . . . . . 256--267
Robert Fisher The impact of interactive application
development with CODESTAR . . . . . . . 13--15
Ulf Körner and
Serge Fdida and
Harry Perros and
Gerald Shapiro End to end delays in a catenet
environment . . . . . . . . . . . . . . 20--28
Ravi S. Sharma Three simple algorithms for the N/1/F
Problem . . . . . . . . . . . . . . . . 29--32
R. C. Covington and
S. Madala and
V. Mehta and
J. R. Jump and
J. B. Sinclair The Rice Parallel Processing Testbed . . 4--11
B. D. Lubachevsky Efficient distributed event driven
simulations of multiple-loop networks 12--24
B. J. Lucier Performance evaluation for
multiprocessors programmed using
monitors . . . . . . . . . . . . . . . . 22--29
A. Ganz and
I. Chlamtac Queueing analysis of finite buffer token
networks . . . . . . . . . . . . . . . . 30--36
M. Zafirovic-Vukotic and
I. G. M. M. Niemegeers Performance modelling of a HSLAN slotted
ring protocol . . . . . . . . . . . . . 37--46
D.-M. Chiu and
R. Sudama A case study of DECnet applications and
protocol performance . . . . . . . . . . 47--55
S. Shenker and
A. Weinrib Asymptotic analysis of large
heterogeneous queueing systems . . . . . 56--62
D. L. Eager and
E. D. Lazowska and
J. Zahorjan The limited performance benefits of
migrating active processes for load
sharing . . . . . . . . . . . . . . . . 63--72
J. Hong and
X. Tan and
M. Chen From local to global: an analysis of
nearest neighbor balancing on hypercube 73--82
K. Kant Application level modeling of parallel
machines . . . . . . . . . . . . . . . . 83--93
R. G. Born and
J. R. Kenevan Analytic derivation of processor
potential utilization in straight line,
ring, square mesh, and hypercube
networks . . . . . . . . . . . . . . . . 94--103
S. Majumdar and
D. L. Eager and
R. B. Bunt Scheduling in multiprogrammed parallel
systems . . . . . . . . . . . . . . . . 104--113
N. M. Patel and
P. G. Harrison On hot-spot contention in
interconnection networks . . . . . . . . 114--123
S. C. Kothari and
A. Jhunjhunwala and
A. Mukherjee Performance analysis of multipath
multistage interconnection networks . . 124--132
J. L. Melús and
E. Sanvicente and
J. Magriñá Modelling and performance evaluation of
multiprocessor based packet switches . . 133--140
T. P. Lee A manufacturing capacity planning
experiment through functional workload
decomposition . . . . . . . . . . . . . 141--150
A. E. Irgon and
A. H. Dragoni, Jr. and
T. O. Huleatt FAST: a large scale expert system for
application and system software
performance tuning . . . . . . . . . . . 151--156
W. Alexander and
G. Copeland Comparison of dataflow control
techniques in distributed data-intensive
systems . . . . . . . . . . . . . . . . 157--166
S. T. Leutenegger and
M. K. Vernon A mean-value performance analysis of a
new multiprocessor architecture . . . . 167--176
J. T. Blake and
A. L. Reibman and
K. S. Trivedi Sensitivity analysis of reliability and
performability measures for
multiprocessor systems . . . . . . . . . 177--186
R. Mukkamala and
S. C. Bruell and
R. K. Shultz Design of partially replicated
distributed database systems: an
integrated methodology . . . . . . . . . 187--196
D. Wybranietz and
D. Haban Monitoring and performance measuring
distributed systems during operation . . 197--206
S. W. Melvin and
Y. N. Patt The use of microcode instrumentation for
development, debugging and tuning of
operating system kernels . . . . . . . . 207--214
A. Agawal and
A. Gupta Memory-reference characteristics of
multiprocessor applications under MACH 215--225
J. M. Murphy and
R. B. Bunt Characterising program behaviour with
phases and transitions . . . . . . . . . 226--234
Y. Yoshizawa and
T. Arai Adaptive storage control for page frame
supply in large scale computer systems 235--243
K. R. Pattipati and
M. M. Kostreva On the properties of approximate mean
value analysis algorithms for queueing
networks . . . . . . . . . . . . . . . . 244--252
A. N. Tantawi and
G. Towsley and
J. Wolf Optimal allocation of multiple class
resources in computer systems . . . . . 253--260
C.-H. Hsieh and
S. S. Lam PAM --- a noniterative approximate
solution method for closed multichain
queueing networks . . . . . . . . . . . 261--269
Anna Ha\'c Load balancing in distributed systems: a
summary . . . . . . . . . . . . . . . . 17--19
Anna Ha\'c Knowledge-based distributed system
architecture . . . . . . . . . . . . . . 20--20
Anna Ha\'c Design algorithms for asynchronous
operations in cache memory . . . . . . . 21--21
Victor Schneider Approximations for the Halstead software
science software error rate and project
effort estimators . . . . . . . . . . . 22--29
Bernard Domanski A PROLOG-based expert system for tuning
MVS/XA . . . . . . . . . . . . . . . . . 30--47
David R. Irvin A queueing model for local area network
bridges . . . . . . . . . . . . . . . . 48--57
J. Wolf The placement optimization program: a
practical solution to the disk file
assignment problem . . . . . . . . . . . 1--10
J. P. Kearns and
S. DeFazio Diversity in database reference behavior 11--19
J. Hellerstein A statistical approach to diagnosing
intermittent performance-problems using
monotone relationships . . . . . . . . . 20--28
R. R. Muntz and
E. de Souza e Silva and
A. Goyal Bounding availability of repairable
computer systems . . . . . . . . . . . . 29--38
R. Bubenik and
W. Zwaenepoel Performance of optimistic make . . . . . 39--48
T. E. Anderson and
D. D. Lazowska and
H. M. Levy The performance implications of thread
management alternatives for
shared-memory multiprocessors . . . . . 49--60
J. B. Carter and
W. Zwaenepoel Optimistic implementation of bulk data
transfer protocols . . . . . . . . . . . 61--69
C. B. Stunkel and
W. K. Fuchs TRAPEDS: producing traces for
multicomputers via execution driven
simulation . . . . . . . . . . . . . . . 70--78
K. Gallivan and
D. Gannon and
W. Jalby and
A. Malony and
H. Wijshoff Behavioral characterization of
multiprocessor memory systems: a case
study . . . . . . . . . . . . . . . . . 79--88
A. D. Samples Mache: no-loss trace compaction . . . . 89--97
A. Mukherjee and
L. H. Landweber and
J. C. Strikwerda Evaluation of retransmission strategies
in a local area network environment . . 98--107
P. B. Danzig Finite buffers for fast multicast . . . 108--117
B. Mukherjee Performance of a dual-bus unidirectional
broadcast network operating under
probabilistic scheduling strategy . . . 118--126
A. G. Greenberg and
J. McKenna Solution of closed, product form,
queueing networks via the RECAL and
tree-RECAL methods on a shared memory
multiprocessor . . . . . . . . . . . . . 127--135
M. Paterok and
O. Fischer and
L. Opta Feedback queues with preemption-distance
priorities . . . . . . . . . . . . . . . 136--145
D. B. Wagner and
E. D. Lazowska Parallel simulation of queueing
networks: limitations and potentials . . 146--155
D. Mitra and
I. Mitrani Control and coordination policies for
systems with buffers . . . . . . . . . . 156--164
D. M. Nicol and
J. C. Townsend Accurate modeling of parallel scientific
computations . . . . . . . . . . . . . . 165--170
K. C. Sevcik Characterizations of parallelism in
applications and their use in scheduling 171--180
R. D. Nelson and
T. K. Philips An approximation to the response time
for shortest queue routing . . . . . . . 181--189
K. E. E. Raatikainen Approximating response time
distributions . . . . . . . . . . . . . 190--199
D. Mitra and
A. Weiss A closed network with a discriminatory
processor-sharing server . . . . . . . . 200--208
Andy Glew An empirical investigation of OR
indexing . . . . . . . . . . . . . . . . 41--49
N. J. Gunther Performance pathways . . . . . . . . . . 50--56
Michael G. Gonzales Correction of the Halstead length
estimator skew for small Pascal programs 57--59
Albert G. Greenberg and
Boris D. Lubachevsky and
Isi Mitrani Unboundedly parallel simulations via
recurrence relations . . . . . . . . . . 1--12
Randolph Nelson A performance evaluation of a general
parallel processing model . . . . . . . 13--26
Wen-Hann Wang and
Jean-Loup Baer Efficient trace-driven simulation method
for cache performance analysis . . . . . 27--36
S. J. Eggers and
David R. Keppel and
Eric J. Koldinger and
Henry M. Levy Techniques for efficient inline tracing
on a shared-memory multiprocessor . . . 37--47
Anant Agarwal and
Minor Huffman Blocking: exploiting spatial locality
for trace compaction . . . . . . . . . . 48--57
Tein-Hsiang Lin and
Kang G. Shin A Bayesian approach to fault
classification . . . . . . . . . . . . . 58--66
Louise E. Moser and
Vikas Kapur and
P. M. Melliar-Smith Probabilistic language analysis of
weighted voting algorithms . . . . . . . 67--73
Peter M. Chen and
Garth A. Gibson and
Randy H. Katz and
David A. Patterson An evaluation of redundant arrays of
disks using an Amdahl 5890 . . . . . . . 74--85
Amarnath Mukherjee and
Lawrence H. Landweber and
John C. Strikwerda Simultaneous analysis of flow and error
control strategies with
congestion-dependent errors . . . . . . 86--95
Arthur Y. M. Lin and
John A. Silvester Queueing analysis of an ATM switch with
multichannel transmission groups . . . . 96--105
Theodore Johnson Approximate analysis of reader and
writer access to a shared resource . . . 106--114
Thomas E. Anderson and
Edward D. Lazowska Quartz: a tool for tuning parallel
program performance . . . . . . . . . . 115--125
Krishna R. Pattipati and
Joel Wolf and
Somnath Deb A calculus of variations approach to
file allocation problems in computer
systems . . . . . . . . . . . . . . . . 126--133
John T. Robinson and
Murthy V. Devarakonda Data cache management using
frequency-based replacement . . . . . . 134--142
Asit Dan and
Don Towsley An approximate analysis of the LRU and
FIFO buffer replacement schemes . . . . 143--152
Raphael Alonso and
Andrew W. Appel An advisor for flexible working sets . . 153--162
Joseph Torrellas and
John Hennessy and
Thierry Weil Analysis of critical architectural and
programming parameters in a hierarchical 163--172
Rajeev Jog and
Philip L. Vitale and
James R. Callister Performance evaluation of a commercial
cache-coherent shared memory
multiprocessor . . . . . . . . . . . . . 173--182
Erol Gelenbe Performance analysis of the Connection
Machine . . . . . . . . . . . . . . . . 183--191
Darryl L. Willick and
D. L. Eager An analytic model of multistage
interconnection networks . . . . . . . . 192--202
K. Dussa and
B. Carlson and
L. Dowdy and
K.-H. Park Dynamic partitioning in a transputer
environment . . . . . . . . . . . . . . 203--213
John Zahorjan and
Cathy McCann Processor scheduling in shared memory
multiprocessors . . . . . . . . . . . . 214--225
Scott T. Leutenegger and
Mary K. Vernon The performance of multiprogrammed
multiprocessor scheduling algorithms . . 226--236
W. P. Dawkins and
V. Debbad and
J. R. Jump and
J. B. Sinclair Efficient simulation of multiprogramming 237--238
Scott Shenker Making flow control work in networks: a
control-theoretic analysis of gateway
service disciplines . . . . . . . . . . 239--240
Scott Shenker Making greed work in networks: a
game-theoretic analysis of gateway
service disciplines . . . . . . . . . . 241--242
Shahram Ghandeharizadeh and
David J. DeWitt Factors affecting the performance of
multiuser database management systems 243--244
Susanne Englert and
Jim Gray and
Terrye Kocher and
Praful Shah A benchmark of NonStop SQL release 2
demonstrating near-linear speedup and
scaleup on large databases . . . . . . . 245--246
Arun K. Somani and
James A. Ritcey and
Stephen H. L. Au Phased mission reliability analysis . . 247--248
Lionel C. Mitchell Performance analysis of a fault tolerant
computer system . . . . . . . . . . . . 249--250
David W. Jensen and
Daniel A. Reed Ray tracing on distributed memory
parallel systems . . . . . . . . . . . . 251--252
Dinesh Mirchandani and
Prabuddha Biswas Characterizing and modeling Ethernet
performance of distributed DECwindows
applications . . . . . . . . . . . . . . 253--254
Patrick F. McGehearty Challenges in obtaining peak parallel
performance with a Convex C240, parallel
vector processor . . . . . . . . . . . . 255--256
Steven A. Heimlich Traffic characterization of the NSFNET
national backbone . . . . . . . . . . . 257--258
Jack W. Davidson and
David B. Whalley Ease: an environment for architecture
study and experimentation . . . . . . . 259--260
John G. Waclawsky and
Ashok K. Agrawala Dynamic queue behavior in networks with
window protocols . . . . . . . . . . . . 261--262
John D. Garofalakis and
Paul G. Spirakis The performance of multistage
interconnection networks with finite
buffers . . . . . . . . . . . . . . . . 263--264
Athanasios V. Vasilakos and
Christos A. Moschonas and
Constantinos T. Paximadis Adaptive window flow control and
learning algorithms for adaptive routing
in data networks . . . . . . . . . . . . 265--266
Daniel Nussbaum and
Ingmar Vuong-Adlerberg and
Anant Agarwal Modeling a circuit switched
multiprocessor interconnect . . . . . . 267--269
Blaine D. Gaither Editor's readings . . . . . . . . . . . 25--26
R. E. Vance Article review: `A message-based
approach to discrete event simulation'
by R. L. Bagrodia, K. M. Chandy, and J.
Misra. IEEE Trans. Softw. Eng. SE-13, 6
(June 1987) . . . . . . . . . . . . . . 27--27
Arnold O. Allen and
Gary Hynes Approximate MVA solutions with fixed
throughput classes . . . . . . . . . . . 31--40
Patrick McGehearty Challenges in obtaining peak parallel
performance with a Convex C240, a
parallel vector processor . . . . . . . 41--47
Blaine Gaither Scientific visualization of performance
data: evaluation of DV-Draw . . . . . . 48--53
H. Reza Taheri An analysis of the Neal Nelson Business
Benchmark . . . . . . . . . . . . . . . 13--18
Tom Keller SPEC benchmarks and competitive results 19--20
David Finkel Book review: `Computer Systems
Performance Management and Capacity
Planning' by J. Cady and B. Howarth
(Prentice-Hall, 1990) . . . . . . . . . 21--21
David Finkel Book review: `The Art of Computer
Systems Performance Analysis' by R. Jain
(Wiley-Interscience, 1991) . . . . . . . 21--22
David Finkel Book review: `Computer and Communication
Systems Performance Modelling' by Peter
J. B. King (Prentice Hall 1990) . . . . 22--22
David Finkel Book review: `Quantitative Analysis of
Computer Systems' by C. H. C. Leung
(Wiley, 1988) . . . . . . . . . . . . . 22--23
David Finkel Book review: `Fundamentals of
Performance Modeling' by M. K. Molloy
(Macmillan, 1989) . . . . . . . . . . . 23--23
Rafael Saavedra-Barrera and
Alan J. Smith and
Eugene Miya Machine Characterization Based on an
Abstract High-level Language Machine . . 24--24
Shivendra S. Panwar and
Don Towsley and
Jack K. Wolf Optimal scheduling policies for a class
of queues with customer deadlines to the
beginning of service . . . . . . . . . . 25--25
Hideyuki Tokuda and
Makato Kotera and
Clifford E. Mercer A Real-Time Monitor for a Distributed
Real-Time Operating System . . . . . . . 26--26
Dominique Thiebaut On the Fractal Dimension of Computer
Programs and its Application to the
Prediction of the Cache Miss Ratio . . . 41--41
Carl Ponder Performance variation across benchmark
suites . . . . . . . . . . . . . . . . . 42--48
David Finkel Book review: `Multiprocessor
Performance' by Erol Gelenbe (John Wiley
& Sons, 1989) . . . . . . . . . . . . . . 9--9
David Finkel Book review: `Performance Analysis of
Transaction Processing Systems' by
Wilbur H. Highleyman (Prentice Hall,
1989) . . . . . . . . . . . . . . . . . 10--10
David Finkel Book review: `Performance Measurement of
Computer Systems' by Phillip McKerrow
(Addison-Wesley 1988) . . . . . . . . . 10--11
David Finkel Book review: `Multiple Access Protocols:
Performance and Analysis' by Raphael Rom
and Moshe Sidi (Springer-Verlag, 1990) 11--11
David Finkel Book review: `Performance Engineering of
Software Systems' by Connie U. Smith
(Addison-Wesley, 1990) . . . . . . . . . 11--12
Shyam Johari Performance objectives --- how to define
them . . . . . . . . . . . . . . . . . . 18--19
Carl G. Ponder Benchmark semantics . . . . . . . . . . 20--24
Luis-Felipe Cabrera Technical summary of the Second IEEE
Workshop on Workstation Operating
Systems . . . . . . . . . . . . . . . . 25--32
P. M. Melliar-Smith and
Louise E. Moser Performance analysis of a broadcast
communications protocol . . . . . . . . 1--10
Peter B. Danzig An analytical model of operating system
protocol processing including effects of
multiprogramming . . . . . . . . . . . . 11--20
Venkatesh Harinarayan and
Leonard Kleinrock Load sharing in limited access
distributed systems . . . . . . . . . . 21--30
Tein-Hsiang Lin and
Wernhuar Tarng Scheduling periodic and aperiodic tasks
in hard real-time computing systems . . 31--38
Robert Berry and
Joseph Hellerstein An approach to detecting changes in the
factors affecting the performance of
computer systems . . . . . . . . . . . . 39--49
Robert Bodnarchuk and
Richard Bunt A synthetic workload model for a
distributed system file server . . . . . 50--59
Arif Merchant A Markov chain approximation for the
analysis of Banyan networks . . . . . . 60--67
T. Lin and
L. Kleinrock Performance analysis of finite-buffered
multistage interconnection networks with
a general traffic pattern . . . . . . . 68--78
David A. Wood and
Mark D. Hill and
R. E. Kessler A model for estimating trace-sample miss
ratios . . . . . . . . . . . . . . . . . 79--89
Mee-Chow Chiang and
Gurindar S. Sohi Experience with mean value analysis
model for evaluating shared bus,
throughput-oriented multiprocessors . . 90--100
Anurag Gupta and
Ian Akyildiz and
Richard M. Fujimoto Performance analysis of Time Warp with
homogeneous processors and exponential
task times . . . . . . . . . . . . . . . 101--110
Jong Kim and
Chita R. Das On subcube dependability in a hypercube 111--119
Anoop Gupta and
Andrew Tucker and
Shigeru Urushibara The impact of operating system
scheduling policies and synchronization
methods of performance of parallel
applications . . . . . . . . . . . . . . 120--132
Songnian Zhou and
Timothy Brecht Processor-pool-based scheduling for
large-scale NUMA multiprocessors . . . . 133--142
Mark S. Squillante and
Randolph D. Nelson Analysis of task migration in
shared-memory multiprocessor scheduling 143--155
Asit Dan and
Daniel M. Dias and
Philip S. Yu Analytical modelling of a hierarchical
buffer for a data sharing environment 156--167
Martin Reiman and
Paul E. Wright Performance analysis of concurrent-read
exclusive-write . . . . . . . . . . . . 168--177
James C. French and
Terrence W. Pratt and
Mriganka Das Performance measurement of a parallel
input/output system for the Intel iPSC/2
Hypercube . . . . . . . . . . . . . . . 178--187
Ann L. Chervenak and
Randy H. Katz Performance of a disk array prototype 188--197
Shenze Chen and
Don Towsley Performance of a mirrored disk in a
real-time transaction system . . . . . . 198--207
R. R. Glenn and
D. V. Pryor Instrumentation for a massively parallel
MIMD application . . . . . . . . . . . . 208--209
Aaron Goldberg and
John Hennessy MTOOL: a method for detecting memory
bottlenecks . . . . . . . . . . . . . . 210--211
Yul H. Kim and
Mark D. Hill and
David A. Wood Implementing stack simulation for
highly-associative memories . . . . . . 212--213
Robb Newman Performance analysis case study
(abstract): application of experimental
design & statistical data analysis
techniques . . . . . . . . . . . . . . . 214--215
Arvin Park and
Jeffrey C. Becker Measurements of the paging behavior of
UNIX . . . . . . . . . . . . . . . . . . 216--217
Joseph Pasquale and
Barbara Bittel and
Daniel Kraiman A static and dynamic workload
characterization study of the San Diego
Supercomputer Center Cray X-MP . . . . . 218--219
Calton Pu and
Frederick Korz and
Robert C. Lehman An experiment on measuring application
performance over the Internet . . . . . 220--221
Myung K. Yang and
Chita R. Das A parallel branch-and-bound algorithm
for MIN-based multiprocessors . . . . . 222--223
Dick H. J. Epema Book Review: `Computer and Communication
Systems Performance Modelling' by Peter
J. B. King (Prentice Hall, 1990) . . . . 4--5
Robert Y. Al-Jaar Book review: `The Art of Computer
Systems Performance Analysis: Techniques
for Experimental Design, Measurement,
Simulation, and Modeling' by Raj Jain
(John Wiley & Sons 1991) . . . . . . . . 5--11
David Finkel Brief review: `Probability, Statistics
and Queueing Theory with Computer
Science Applications,' Second Edition by
Arnold O. Allen (Academic Press 1990) 11--12
David Finkel Brief review: `Computer Networks &
Systems: Queueing Theory and Performance
Evaluation' by Thomas Robertazzi
(Springer-Verlag, 1990) . . . . . . . . 12--12
David Finkel Brief review: ``Queueing Networks ---
Exact Computational Algorithms: A
Unified Theory Based on Decomposition
and Aggregation'' by Adrian E. Conway
and Nicholas D. Georganas (MIT Press
1989) . . . . . . . . . . . . . . . . . 12--12
David Finkel Brief review: `Performance
Instrumentation & Visualization' by
Margaret Simmons and Rebecca Koskela
(Addison-Wesley & ACM Press, 1989) . . . 12--13
David Finkel Brief review: `Stochastic Analysis of
Computer and Communication Systems', Ed.
by H. Takagi (Elsevier Science
Publishers B.V. 1990) . . . . . . . . . 13--13
David Frankel Brief review: `Queueing Analysis: A
Foundation of Performance Evaluation.
Volume 1: Vacation and Priority Systems,
Part 1' by H. Takagi (North-Holland,
1991) . . . . . . . . . . . . . . . . . 13--13
D. Ames and
D. Gibson and
B. Troy Composite theoretical performance . . . 24--29
Bruce Christianson Amdahl's Law and end of system design 30--32
David Finkel and
Robert E. Kinicki and
Jonas A. Lehmann An overview of the WPI Benchmark Suite 33--35
Jeffrey C. Becker and
Arvin Park Analysis of the paging behavior of UNIX 36--43
A. E. Fateyev and
S. M. Porotskiy and
V. I. Drujinin Comparative evaluation of approximate
methods for modelling of network systems 44--48
Ashvini Nangia Book Review: `Performance Analysis of
Transaction Processing Systems' by
Wilbur H. Highleyman (Prentice Hall,
1989) . . . . . . . . . . . . . . . . . 9--11
Xiannong Meng Book Review: `Computer Networks and
Systems: Queueing Theory and Performance
Evaluation' by Thomas G. Robertazzi
(Springer-Verlag, 1990) . . . . . . . . 11--12
?. Finkel Brief review: `Stochastic Modeling and
the Theory of Queues' by Ronald W. Wolfe
(Prentice-Hall, 1989) . . . . . . . . . 12--12
?. Finkel Brief review: `Markovian Queues' by O.
P. Sharma (Ellis Horwood Publishers
1990) . . . . . . . . . . . . . . . . . 12--13
?. Finkel Brief review: `The Benchmark Handbook:
Database and Transaction Processing
Systems,' Ed. by Jim Gray (Morgan
Kaufmann Publishers, Inc., 1991) . . . . 13--13
?. Finkel Brief review: ``Modeling and Analysis of
Local Area Networks'' by Paul J. Fortier
and George Desrochers (CRC Press, 1990) 13--13
Michael W. Berry Scientific workload characterization by
loop-based analyses . . . . . . . . . . 17--29
Corporate Transaction Processing Performance Council Complete TPC results (as of 9/30/91) . . 32--35
Hartmut Deike-Glindemann SIQUEUE-PET: an environment for queueing
network modelling . . . . . . . . . . . 36--44
Jozo J. Dujmovi\'c The use of multiple-subscripted arrays
in benchmark programs . . . . . . . . . 45--48
Rob Pooley Book Reviews: `Computer and
Communication Systems Performance
Modelling' by Peter J. B. King (Prentice
Hall 1990) . . . . . . . . . . . . . . . 13--14
Anna Hac Modeling distributed file systems . . . 22--27
Michael K. Molloy Anatomy of the NHFSSTONES benchmarks . . 28--39
William F. Keown, Jr. and
Philip Koopman, Jr. and
Aaron Collins Real-time performance of the HARRIS RTX
2000 stack architecture versus the Sun 4
SPARC and the Sun 3 M68020 architectures
with a proposed real-time performance
benchmark . . . . . . . . . . . . . . . 40--48
Margaret Martonosi and
Anoop Gupta and
Thomas Anderson MemSpy: analyzing memory system
bottlenecks in programs . . . . . . . . 1--12
David B. Whalley Fast instruction cache performance
evaluation using compile-time analysis 13--22
Richard P. LaRowe, Jr. and
Mark A. Holliday and
Carla Schlatter Ellis An analysis of dynamic page placement on
a NUMA multiprocessor . . . . . . . . . 23--34
Victor F. Nicola and
Asit Dan and
Daniel M. Dias Analysis of the generalized clock buffer
replacement scheme for database
transaction processing . . . . . . . . . 35--46
S. C. Borst and
O. J. Boxma and
M. B. Combé Collection of customers: a correlated
M/G/1 queue . . . . . . . . . . . . . . 47--59
Philippe Jacquet Subexponential tail distribution in
LaPalice queues . . . . . . . . . . . . 60--69
Duan-Shin Lee and
Bhaskar Sengupta A reservation based cyclic server queue
with limited service . . . . . . . . . . 70--77
K. K. Ramakrishnan and
Prabuddha Biswas and
Ramakrishna Karedla Analysis of file I/O traces in
commercial computing environments . . . 78--90
Harjinder S. Sandhu and
Songnian Zhou Cluster-based file replication in
large-scale distributed systems . . . . 91--102
Arif Merchant and
Kun-Lung Wu and
Philip S. Yu and
Ming-Syan Chen Performance analysis of dynamic finite
versioning for concurrent transaction
and query processing . . . . . . . . . . 103--114
Alexander Thomasian Performance analysis of locking policies
with limited wait depth . . . . . . . . 115--127
Jim Kurose On computing per-session performance
bounds in high-speed multi-hop computer
networks . . . . . . . . . . . . . . . . 128--139
John C. S. Lui and
Richard R. Muntz Algorithmic approach to bounding the
mean response time of a minimum expected
delay routing system . . . . . . . . . . 140--151
Edmundo de Souza e Silva and
Pedro Mejiá Ochoa State space exploration in Markov models 152--166
Susan S. Owicki and
Anna R. Karlin Factors in the performance of the AN1
computer network . . . . . . . . . . . . 167--180
A. Udaya Shankar and
Cengiz Alaettino\uglu and
Ibrahim Matta and
Klaudia Dussa-Zieger Performance comparison of routing
protocols using MaRS: distance-vector
versus link-state . . . . . . . . . . . 181--192
Eitan Altman and
Philippe Nain Closed-loop control with delayed
information . . . . . . . . . . . . . . 193--204
Arif Merchant Analytical models of combining Banyan
networks . . . . . . . . . . . . . . . . 205--212
Ian F. Akyildiz and
Liang Chen and
Samir R. Das and
Richard M. Fujimoto and
Richard F. Serfozo Performance analysis of ``Time Warp''
with limited memory . . . . . . . . . . 213--224
John Turek and
Joel L. Wolf and
Krishna R. Pattipati and
Philip S. Yu Scheduling parallelizable tasks: putting
it all on the shelf . . . . . . . . . . 225--236
P. Brémaud and
W.-B. Gong Stationary likelihood ratios and
smoothed perturbation analysis gradient
estimates for the routing problem . . . 237--238
Rosemary Candlin and
Peter Fisk and
Joe Phillips and
Neil Skilling Studying the performance properties of
concurrent programs by simulation
experiments on synthetic programs . . . 239--240
Robert F. Berry and
Joseph L. Hellerstein Characterizing and interpreting periodic
behavior in computer systems . . . . . . 241--242
Erhard Rahm and
Donald Ferguson High performance cache management for
sequential data access . . . . . . . . . 243--244
Ram Chakka and
Isi Mitrani Multiprocessor systems with general
breakdowns and repairs (extended
abstract) . . . . . . . . . . . . . . . 245--246
Eric A. Brewer and
Chrysanthos N. Dellarocas and
Adrian Colbrook and
William E. Weihl PROTEUS: a high-performance
parallel-architecture simulator . . . . 247--248
Dikran S. Meliksetian and
C. Y. Roger Chen Performance analysis of communications
in static interconnection networks . . . 249--250
Asit Dan and
Philip S. Yu and
Jen-Yao Chung Characterization of database access skew
in a transaction processing environment 251--252
Aloke Gupta and
Wen-Mei W. Hwu Xprof: profiling the execution of X
Window programs . . . . . . . . . . . . 253--254
Ruth Shoham and
Uri Yechiali Elevator-type polling systems (abstract) 255--257
François Baccelli and
Miguel Canales Parallel simulation of stochastic Petri
nets using recurrence equations . . . . 257--258
Manfred R. Jobmann and
Johann Schumann Performance analysis of a parallel
theorem prover . . . . . . . . . . . . . 259--260
Kim Shanley and
Amie Belongia TPC releases new benchmark: TPC-C . . . 8--22
Rob Pooley Book review: `Performance Engineering of
Software Systems' by Connie U. Smith
(Addison Wesley 1990) . . . . . . . . . 23--24
Stephen Taylor Book review: ``Queuing Networks ---
Exact Computational Algorithms: A
Unified Theory Based on Decomposition
and Aggregation'' by Adrian E. Conway
and Nicolas D. Georganas (MIT Press
1989) . . . . . . . . . . . . . . . . . 24--26
Makoto Kobayashi A cache multitasking model . . . . . . . 27--37
S. M. Porotskiy and
A. E. Fateev Development trends in methods for
efficiency evaluation of ES-based
computer systems . . . . . . . . . . . . 38--42
S. M. Porotskiy and
A. E. Fateev System and real performance evaluation
of computer . . . . . . . . . . . . . . 43--46
Apple van de Liefvoort Book review: ``Multiple Access
Protocols: Performance and Analysis'' by
Raphael Rom and Moshe Sidi
(Springer-Verlag, 1990) . . . . . . . . 5--6
Corporate TPC Summary of TPC results (as of December
22, 1992) . . . . . . . . . . . . . . . 7--21
Silvano Maffeis File access patterns in public FTP
archives and an index for locality of
reference . . . . . . . . . . . . . . . 22--35
Özgür Ulusoy An approximate analysis of a real-time
database concurrency control protocol
via Markov modeling . . . . . . . . . . 36--48
Corporate IBM Systems Analysis Department Selected publications: 1992 . . . . . . 3--9
Corporate TPC Summary of TPC results (as of March 15,
1993) . . . . . . . . . . . . . . . . . 10--23
Kimmo E. E. Raatikainen Cluster analysis and workload
classification . . . . . . . . . . . . . 24--30
Robert B. Smith and
James K. Archibald and
Brent E. Nelson Evaluating performance of prefetching
second level caches . . . . . . . . . . 31--42
Peter M. Chen and
David A. Patterson A new approach to I/O performance
evaluation: self-scaling I/O benchmarks,
predicted I/O performance . . . . . . . 1--12
Prabuddha Biswas and
K. K. Ramakrishnan and
Don Towsley Trace driven analysis of write caching
policies for disks . . . . . . . . . . . 13--23
Rabin A. Sugumar and
Santosh G. Abraham Efficient simulation of caches under
optimal replacement with applications to
miss characterization . . . . . . . . . 24--35
Jacqueline Chame and
Michel Dubois Cache inclusion and processor sampling
in multiprocessor simulations . . . . . 36--47
Steven K. Reinhardt and
Mark D. Hill and
James R. Larus and
Alvin R. Lebeck and
James C. Lewis and
David A. Wood The Wisconsin Wind Tunnel: virtual
prototyping of parallel computers . . . 48--60
Vikram S. Adve and
Mary K. Vernon The influence of random delays on
parallel execution times . . . . . . . . 61--73
E. Rosti and
E. Smirni and
T. D. Wagner and
A. W. Apon and
L. W. Dowdy The KSR1: experimentation and modeling
of poststore . . . . . . . . . . . . . . 74--85
Gregory R. Ganger and
Yale N. Patt The process-flow model: examining I/O
performance from the system's point of
view . . . . . . . . . . . . . . . . . . 86--97
Edward K. Lee and
Randy H. Katz An analytic performance model of disk
arrays . . . . . . . . . . . . . . . . . 98--109
Dong Tang and
Ravishankar K. Iyer MEASURE+: a measurement-based
dependability analysis package . . . . . 110--121
A. V. Ramesh and
Kishor Trivedi On the sensitivity of transient
solutions of Markov models . . . . . . . 122--134
David M. Nicol and
Philip Heidelberger Parallel simulation of Markovian
queueing networks using adaptive
uniformization . . . . . . . . . . . . . 135--145
Stephen R. Goldschmidt and
John L. Hennessy The accuracy of trace-driven simulations
of multiprocessors . . . . . . . . . . . 146--157
Sanjeev K. Setia and
Mark S. Squillante and
Satish K. Tripathi Processor scheduling on multiprogrammed,
distributed memory parallel computers 158--170
Kun-Lung Wu and
Philip S. Yu and
James Z. Teng Performance comparison of thrashing
control policies for concurrent
Mergesorts with parallel prefetching . . 171--182
Dikran S. Meliksetian and
C. Y. Roger Chen A Markov-modulated Bernoulli process
approximation for the analysis of Banyan
networks . . . . . . . . . . . . . . . . 183--194
Hiroshi Arakawa and
Daniel I. Katcher and
Jay K. Strosnider and
Hideyuki Tokuda Modeling and validation of the real-time
Mach scheduler . . . . . . . . . . . . . 195--206
Sanjoy Baruah and
Jayant R. Haritsa ROBUST: a hardware solution to real-time
overload . . . . . . . . . . . . . . . . 207--216
Jayanta K. Dey and
James F. Kurose and
Don Towsley and
C. M. Krishna and
Mahesh Girkar Efficient on-line processor scheduling
for a class of IRIS (Increasing Reward
with Increasing Service) real-time tasks 217--228
Robert J. T. Morris Analysis of superposition of streams
into a cache buffer . . . . . . . . . . 229--235
Jory Tsai and
Anant Agarwal Analyzing multiprocessor cache behavior
through data reference modeling . . . . 236--247
Margaret Martonosi and
Anoop Gupta and
Thomas Anderson Effectiveness of trace sampling for
performance debugging tools . . . . . . 248--259
Jong-Suk Ahn and
Peter B. Danzig and
Deborah Estrin and
Brenda Timmerman Hybrid technique for simulating high
bandwidth delay computer networks . . . 260--261
Jeffrey C. Becker and
Arvin Park An analysis of the information content
of address and data reference streams 262--263
Shahram Ghandeharizadeh and
Luis Ramos An evaluation of alternative virtual
replication strategies for continuous
retrieval of multimedia data . . . . . . 264--265
Jonathan Kay and
Joseph Pasquale A summary of TCP/IP networking software
performance for the DECstation 5000 . . 266--267
Gary Lewandowski and
Anne Condon and
Eric Bach Asynchronous analysis of parallel
dynamic programming . . . . . . . . . . 268--269
Kang G. Shin and
Chao-Ju Hou Evaluation of load sharing in HARTS
while considering message routing and
broadcasting . . . . . . . . . . . . . . 270--271
Josep Torrellas and
Andrew Tucker and
Anoop Gupta Benefits of cache-affinity scheduling in
shared-memory multiprocessors: a summary 272--274
Vidar Vetland and
Peter Hughes and
Arne Sòlvberg A composite modelling approach to
software performance measurement . . . . 275--276
David B. Wagner Approximate mean value analysis of
interconnection networks with deflection
routing . . . . . . . . . . . . . . . . 277--278
Carey L. Williamson Optimizing file transfer response time
using the loss-load curve congestion
control mechanism . . . . . . . . . . . 279--280
Lester Lipsky Book review: ``Introduction to Computer
System Performance Evaluation'' by
Krishna Kant (McGraw-Hill, 1992) . . . . 7--9
Robert E. Kinicki Book review: ``Telecommunications and
Networking'' by Udo W. Pooch, Denis
Machuel and John McCahn (CRC Press,
1991) . . . . . . . . . . . . . . . . . 9--10
Xiren Cao Some common misconceptions about
performance modeling and validation . . 11--15
Silvano Maffeis Cache management algorithms for flexible
filesystems . . . . . . . . . . . . . . 16--25
UNIX International Performance management activities within
UNIX International . . . . . . . . . . . 42--42
Jozo J. Dujmovi\'c Book review: ``The Benchmarking Handbook
for Database and Transaction Processing
Systems'' Edited by Jim Gray (Morgan
Kaufmann Publishers, Inc., 1991) . . . . 4--5
David Finkel Book review: ``Encyclopedia of Computer
Science'', Third Edition, edited by
Anthony Ralston and Edwin I. Reilly (Van
Nostrand Reinhold, 1993) . . . . . . . . 6--6
Colleen D. Schieber and
Eric E. Johnson RATCHET: real-time address trace
compression hardware for extended traces 22--32
Surendra M. Gupta and
Fikri Karaesmen Solution to complex queueing systems: a
spreadsheet approach . . . . . . . . . . 33--46
Peter J. Denning The fifteenth level (keynote address) 1--4
Vinod G. J. Peris and
Mark S. Squillante and
Vijay K. Naik Analysis of the impact of memory in
distributed parallel processing systems 5--18
Cathy McCann and
John Zahorjan Processor allocation policies for
message-passing parallel computers . . . 19--32
Su-Hui Chiang and
Rajesh K. Mansharamani and
Mary K. Vernon Use of application characteristics and
limited preemption for run-to-completion
parallel processor scheduling policies 33--44
Joel L. Wolf and
John Turek and
Ming-Syan Chen and
Philip S. Yu Scheduling multiple queries on a
parallel machine . . . . . . . . . . . . 45--55
Jignesh M. Patel and
Michael J. Carey and
Mary K. Vernon Accurate modeling of the hybrid hash
join algorithm . . . . . . . . . . . . . 56--66
Avi Bittan and
Yaakov Kogan and
Philip S. Yu Asymptotic performance of a buffer model
in a data sharing environment . . . . . 67--76
Dorina C. Petriu Approximate mean value analysis of
client-server systems with multi-class
requests . . . . . . . . . . . . . . . . 77--86
G. Balbo and
S. C. Bruell and
M. Sereno Arrival theorems for product-form
stochastic Petri nets . . . . . . . . . 87--97
Arun K. Somani and
Kishor S. Trivedi Phased-mission system analysis using
Boolean algebraic methods . . . . . . . 98--107
Maria R. Ebling and
M. Satyanarayanan SynRGen: an extensible file reference
generator . . . . . . . . . . . . . . . 108--117
S. V. Raghavan and
D. Vasukiammaiyar and
Gunter Haring Generative networkload models for a
single server environment . . . . . . . 118--127
Bob Cmelik and
David Keppel Shade: a fast instruction-set simulator
for execution profiling . . . . . . . . 128--137
Brian D. Noble and
M. Satyanarayanan An empirical study of a highly available
file system . . . . . . . . . . . . . . 138--149
Michael D. Dahlin and
Clifford J. Mather and
Randolph Y. Wang and
Thomas E. Anderson and
David A. Patterson A quantitative analysis of cache
policies for scalable network file
systems . . . . . . . . . . . . . . . . 150--160
David Kotz and
Preston Crow The expected lifetime of
``single-address-space'' operating
systems . . . . . . . . . . . . . . . . 161--170
Anand Sivasubramaniam and
Aman Singla and
Umakishore Ramachandran and
H. Venkateswaran An approach to scalability study of
shared memory parallel systems . . . . . 171--180
Pankaj Mehra and
Catherine H. Schulbach and
Jerry C. Yan A comparison of two model-based
performance-prediction techniques for
message-passing parallel programs . . . 181--190
Graham Horton and
Scott T. Leutenegger A multi-level solution algorithm for
steady-state Markov chains . . . . . . . 191--200
Samir R. Das and
Richard M. Fujimoto An adaptive memory management protocol
for Time Warp parallel simulation . . . 201--210
Hui Zhang and
Edward W. Knightly Providing end-to-end statistical
performance guarantees with bounding
interval dependent stochastic models . . 211--220
Sridhar Pingali and
Don Towsley and
James F. Kurose A comparison of sender-initiated and
receiver-initiated reliable multicast
protocols . . . . . . . . . . . . . . . 221--230
Ioanis Nikolaidis and
Richard Fujimoto and
C. Anthony Cooper Time-parallel simulation of cascaded
statistical multiplexers . . . . . . . . 231--240
Bruce L. Worthington and
Gregory R. Ganger and
Yale N. Patt Scheduling algorithms for modern disk
drives . . . . . . . . . . . . . . . . . 241--251
David M. Nicol and
Shahid H. Bokhari Optimal multiphase complete exchange on
circuit-switched hypercube architectures 252--260
O. Temam and
C. Fricker and
W. Jalby Cache interference phenomena . . . . . . 261--271
John Danskin and
Pat Hanrahan Profiling the X protocol (extended
abstract) . . . . . . . . . . . . . . . 272--273
Ann L. Drapeau and
David A. Patterson and
Randy H. Katz Toward workload characterization of
video server and digital library
applications (extended abstract) . . . . 274--275
Deepinder S. Gill and
Songnian Zhou and
Harjinder S. Sandhu A case study of file system workload in
a large-scale distributed environment 276--277
Joseph L. Hellerstein A comparison of techniques for
diagnosing performance problems in
information systems (extended abstract) 278--279
J. William Lee Efficient user-level communication on
multicomputers with an optimistic
flow-control protocol (extended
abstract) . . . . . . . . . . . . . . . 280--281
J. A. Rolia and
M. Starkey and
G. Boersma Modeling RPC performance . . . . . . . . 282--283
Athar B. Tayyab and
Jon G. Kuhl Stochastic performance models of
parallel task systems (extended
abstract) . . . . . . . . . . . . . . . 284--285
Richard Uhlig and
David Nagle and
Trevor Mudge and
Stuart Sechrest Kernel-based memory simulation (extended
abstract) . . . . . . . . . . . . . . . 286--287
Harald Wabnig and
Günter Haring Performance prediction of parallel
systems with scalable specifications ---
methodology and case study . . . . . . . 288--289
S. S. Lavenberg Selected publications of the Systems
Analysis and Systems Applications
department of the IBM T. J. Watson
Research Center . . . . . . . . . . . . 6--17
Kim Shanley and
Tracy Derossett TPC-D measures how quickly real-world
business questions can be answered . . . 18--45
H. Wabnig and
G. Haring Performance prediction of parallel
systems with scalable specifications ---
methodology and case study . . . . . . . 46--62
Surendra M. Gupta Queueing model with state dependent
balking and reneging: its complementary
and equivalence . . . . . . . . . . . . 63--72
D. G. Keehn Visualizing performance in the frequency
plane . . . . . . . . . . . . . . . . . 73--81
John Chapin and
A. Herrod and
Mendel Rosenblum and
Anoop Gupta Memory system performance of UNIX on
CC-NUMA multiprocessors . . . . . . . . 1--13
Robert C. Bedichek Talisman: fast and accurate
multicomputer simulation . . . . . . . . 14--24
Leana Golubchik and
John C. S. Lui and
Richard Muntz Reducing I/O demand in video-on-demand
storage servers . . . . . . . . . . . . 25--36
Shahram Ghandeharizadeh and
Seon Ho Kim and
Cyrus Shahabi On configuring a single disk continuous
media server . . . . . . . . . . . . . . 37--46
Marwan Krunz and
Herman Hughes A traffic for MPEG-coded VBR streams . . 47--55
Carey L. Williamson Network traffic measurement and modeling 56--57
Erol Gelenbe G-networks: new queueing models with
additional control capabilities . . . . 58--59
Srini Tridandapani and
Anton T. Dahbura and
Charles U. Martel and
John Matthews and
Arun K. Somani Free performance and fault tolerance
(extended abstract): using system idle
capacity efficiently . . . . . . . . . . 60--61
Allen D. Malony Data interpretation and experiment
planning in performance tools . . . . . 62--63
Nitin H. Vaidya A case for two-level distributed
recovery schemes . . . . . . . . . . . . 64--73
D. H. J. Epema An analysis of decay-usage scheduling in
multiprocessors . . . . . . . . . . . . 74--85
Anwar Elwalid and
Daniel Heyman and
T. V. Lakshman and
Debasis Mitra and
Alan Weiss Fundamental results on the performance
of ATM multiplexers with applications to
video teleconferencing . . . . . . . . . 86--97
Edward W. Knightly and
Dallas E. Wrege and
Jörg Liebeherr and
Hui Zhang Fundamental limits and tradeoffs of
providing deterministic guarantees to
VBR video traffic . . . . . . . . . . . 98--107
Youjian Fang and
Michael Devetsikiotis and
Ioannis Lambadaris and
A. Roger Kaye Exponential bounds for the waiting time
distribution in Markovian queues, with
applications to TES/GI/1 systems . . . . 108--115
S. C. Borst Optimal probabilistic allocation of
customer types to servers . . . . . . . 116--125
Ibrahim Matta and
A. Udaya Shankar Z-iteration: a simple method for
throughput estimation in time-dependent
multi-class systems . . . . . . . . . . 126--135
Peter M. Chen and
Edward K. Lee Striping in a RAID level 5 disk array 136--145
Bruce L. Worthington and
Gregory R. Ganger and
Yale N. Patt and
John Wilkes On-line extraction of SCSI disk drive
parameters . . . . . . . . . . . . . . . 146--156
Joel L. Wolf and
Philip S. Yu and
Hadas Shachnai DASD dancing: a disk load balancing
optimization scheme for video-on-demand
computer systems . . . . . . . . . . . . 157--166
Harjinder S. Sandhu and
Kenneth C. Sevcik An analytic study of dynamic hardware
and software cache coherence strategies 167--177
Mats Brorsson SM-prof: a tool to visualise and find
cache coherence performance bottlenecks
in multiprocessor programs . . . . . . . 178--187
Pei Cao and
Edward W. Felten and
Anna R. Karlin and
Kai Li A study of integrated prefetching and
caching strategies . . . . . . . . . . . 188--197
Anand Sivasubramaniam and
Aman Singla and
Umakishore Ramachandran and
H. Venkateswaran On characterizing bandwidth requirements
of parallel applications . . . . . . . . 198--207
Cathy McCann and
John Zahorjan Scheduling memory constrained jobs on
distributed memory parallel computers 208--219
Alvin R. Lebeck and
David A. Wood Active memory: a new abstraction for
memory-system simulation . . . . . . . . 220--230
Edmundo de Souza e Silva and
H. Richard Gail and
Reinaldo Vallejos Campos Calculating transient distributions of
cumulative reward . . . . . . . . . . . 231--240
Juan A. Carrasco and
Angel Calderón Regenerative randomization: theory and
application examples . . . . . . . . . . 241--252
Albert G. Greenberg and
R. Srikant Computational techniques for accurate
performance evaluation of multirate,
multihop communication networks . . . . 253--260
Teun Ott The Internet in evolution, and TCP over
ATM (panel session) . . . . . . . . . . 261--262
Kishor S. Trivedi and
A. Bobbio and
G. Ciardo and
R. German and
A. Puliafito and
M. Telek Non-Markovian Petri nets . . . . . . . . 263--264
Ashok Erramilli Performance impacts of self-similarity
in traffic . . . . . . . . . . . . . . . 265--266
Remzi H. Arpaci and
Andrea C. Dusseau and
Amin M. Vahdat and
Lok T. Liu and
Thomas E. Anderson and
David A. Patterson The interaction of parallel and
sequential workloads on a network of
workstations . . . . . . . . . . . . . . 267--278
Jussi Myllymaki and
Miron Livny Disk-tape joins: synchronizing disk and
tape access . . . . . . . . . . . . . . 279--290
Vidyadhar Phalke and
Bhaskarpillai Gopinath An inter-reference gap model for
temporal locality in program behavior 291--300
Jan Braams Batch class process scheduler for Unix
SVR4 . . . . . . . . . . . . . . . . . . 301--302
S. Donatelli and
G. Franceschinis State space reductions using stochastic
well-formed net simplifications: an
application to random polling systems 303--304
S. Balsamo and
I. Mura Approximate response time distribution
in Fork and Join systems . . . . . . . . 305--306
Xiaodong Zhang and
Zhichen Xu A semi-empirical approach to scalability
study . . . . . . . . . . . . . . . . . 307--308
Eric Hughes and
Marianne Winslett PEDCAD: a framework for performance
evaluation of object database
applications . . . . . . . . . . . . . . 309--310
James D. Salehi and
James F. Kurose and
Don Towsley Scheduling for cache affinity in
parallelized communication protocols . . 311--312
Amit K. Chatterjee and
Vijay K. Konangi Modeling and analysis of multi channel
asymmetric packet switch modules in a
bursty and nonuniform traffic
environment . . . . . . . . . . . . . . 313--314
Gautam Shah and
Umakishore Ramachandran and
Richard Fujimoto Timepatch: a novel technique for the
parallel simulation of multiprocessor
caches . . . . . . . . . . . . . . . . . 315--316
C. R. M. Sundaram and
Derek L. Eager Future applicability of bus-based shared
memory multiprocessors . . . . . . . . . 317--318
Gianfranco Ciardo and
Ludmila Cherkasova and
Vadim Kotov and
Tomas Rokicki Modeling a Fibre Channel switch with
stochastic Petri nets . . . . . . . . . 319--320
Meenakshi Arunachalam and
Alok Choudhary A prefetching prototype for the parallel
file systems on the Paragon . . . . . . 321--322
R. Gopalakrishnan and
Gurudatta M. Parulkar Bringing real-time scheduling theory and
practice closer for multimedia computing 1--12
Mor Harchol-Balter and
Allen B. Downey Exploiting process lifetime
distributions for dynamic load balancing 13--24
Andrea C. Dusseau and
Remzi H. Arpaci and
David E. Culler Effective distributed scheduling of
parallel workloads . . . . . . . . . . . 25--36
Beng-Hong Lim and
Ricardo Bianchini Limits on the performance benefits of
multithreading and prefetching . . . . . 37--46
Peter A. Dinda and
David R. O'Hallaron Fast message assembly using compact
address relations . . . . . . . . . . . 47--56
Eric W. Parsons and
Kenneth C. Sevcik Coordinated allocation of memory and
processors in multiprocessors . . . . . 57--67
Emmett Witchel and
Mendel Rosenblum Embra: fast and flexible machine
simulation . . . . . . . . . . . . . . . 68--79
Lawrence S. Brakmo and
Larry L. Peterson Experiences with network simulation . . 80--90
Albert G. Greenberg and
S. Shenker and
Alexander L. Stolyar Asynchronous updates in large parallel
systems . . . . . . . . . . . . . . . . 91--103
Dimitrios Stiliadis and
Anujan Varma Design and analysis of frame-based fair
queueing: a new traffic scheduling
algorithm for packet-switched networks 104--115
David J. Yates and
Erich M. Nahum and
James F. Kurose and
Don Towsley Networking support for large scale
multiprocessor servers . . . . . . . . . 116--125
Martin F. Arlitt and
Carey L. Williamson Web server workload characterization:
the search for invariants . . . . . . . 126--137
Margaret Martonosi and
David Ofelt and
Mark Heinrich Integrating performance monitoring and
communication in parallel computers . . 138--147
Umesh Krishnaswamy and
Isaac D. Scherson Micro-architecture evaluation using
performance vectors . . . . . . . . . . 148--159
Mark E. Crovella and
Azer Bestavros Self-similarity in World Wide Web
traffic: evidence and possible causes 160--169
Bruce K. Hillyer and
Avi Silberschatz On the modeling and performance
characteristics of a serpentine tape
drive . . . . . . . . . . . . . . . . . 170--179
Daniel A. Menascé and
Odysseas I. Pentakalos and
Yelena Yesha An analytic model of hierarchical mass
storage systems with network-attached
storage devices . . . . . . . . . . . . 180--189
Ken Chen and
Laurent Decreusefond An approximate analysis of waiting time
in multi-class M/G/1/./EDF queues . . . 190--199
Charu Aggarwal and
Joel Wolf and
Philip S. Yu On optimal piggyback merging policies
for video-on-demand systems . . . . . . 200--209
Richard Gerber and
Ladan Gharai Experiments with digital video playback 210--221
James D. Salehi and
Zhi-Li Zhang and
James F. Kurose and
Don Towsley Supporting stored video: reducing rate
variability and end-to-end resource
requirements through optimal smoothing 222--231
Elizabeth Varki and
Lawrence W. Dowdy Analysis of balanced fork-join queueing
networks . . . . . . . . . . . . . . . . 232--241
Juan A. Carrasco and
Javier Escribá and
Angel Calderón Efficient exploration of availability
models guided by failure distances . . . 242--251
Sachin Garg and
Yennun Huang and
Chandra Kintala and
Kishor S. Trivedi Minimizing completion time of a program
by checkpointing and rejuvenation . . . 252--261
Tracy Kimbrel and
Pei Cao and
Edward W. Felten and
Anna R. Karlin and
Kai Li Integrated parallel prefetching and
caching . . . . . . . . . . . . . . . . 262--263
Scott T. Leutenegger and
Mario A. Lopez A buffer model for evaluating R-tree
performance . . . . . . . . . . . . . . 264--265
Joseph L. Hellerstein An approach to selecting metrics for
detecting performance problems in
information systems . . . . . . . . . . 266--267
William V. Courtright II and
Garth Gibson and
Mark Holland and
Jim Zelenka RAIDframe: rapid prototyping for disk
arrays . . . . . . . . . . . . . . . . . 268--269
Swaminathan Ramany and
Derek Eager Quantifying achievable routing
performance in multiprocessor
interconnection networks . . . . . . . . 270--271
Steven Hotovy and
David Schneider and
Timothy O'Donnell Analysis of the early workload on the
Cornell Theory Center IBM SP2 . . . . . 272--273
Hans-Werner Braun Architecture and performance of large
internets, based on terrestrial and
satellite infrastructure . . . . . . . . 1--1
Hari Balakrishnan and
Mark Stemm and
Srinivasan Seshan and
Randy H. Katz Analyzing stability in wide-area network
performance . . . . . . . . . . . . . . 2--12
Carlos Maltzahn and
Kathy J. Richardson and
Dirk Grunwald Performance issues of enterprise level
Web proxies . . . . . . . . . . . . . . 13--23
D. P. Heyman and
T. V. Lakshman and
Arnold L. Neidhardt A new method for analysing
feedback-based protocols with
applications to engineering Web traffic
over the Internet . . . . . . . . . . . 24--38
Qingming Ma and
K. K. Ramakrishnan Queue management for explicit rate based
congestion control . . . . . . . . . . . 39--51
Teunis J. Ott and
Neil Aggarwal TCP over ATM: ABR or UBR? . . . . . . . 52--63
Sneha K. Kasera and
Jim Kurose and
Don Towsley Scalable reliable multicast using
multiple multicast groups . . . . . . . 64--74
Ramakrishnan Rajamony and
Alan L. Cox Performance debugging shared memory
parallel programs using run-time
dependence analysis . . . . . . . . . . 75--87
Martin C. Herbordt and
Owais Kidwai and
Charles C. Weems Preprototyping SIMD coprocessors using
virtual machine emulation and trace
compilation . . . . . . . . . . . . . . 88--99
Andrew Tomkins and
R. Hugo Patterson and
Garth Gibson Informed multi-process prefetching and
caching . . . . . . . . . . . . . . . . 100--114
Gideon Glass and
Pei Cao Adaptive page replacement based on
memory reference behavior . . . . . . . 115--126
Geoffrey M. Voelker and
Hervé A. Jamrozik and
Mary K. Vernon and
Henry M. Levy and
Edward D. Lazowska Managing server load in global memory
systems . . . . . . . . . . . . . . . . 127--138
Michael E. Woodward Size-limited batch movement in
product-form closed discrete-time
queueing networks . . . . . . . . . . . 139--146
Leana Golubchik and
John C. S. Lui Bounding of performance measures for a
threshold-based queueing system with
hysteresis . . . . . . . . . . . . . . . 147--157
John P. Lehoczky Using real-time queueing theory to
control lateness in real-time systems 158--168
Erich Nahum and
David Yates and
Jim Kurose and
Don Towsley Cache behavior of network protocols . . 169--180
Edward W. Knightly Second moment resource allocation in
multi-service networks . . . . . . . . . 181--191
Marwan Krunz and
Satish K. Tripathi On the characterization of VBR MPEG
streams . . . . . . . . . . . . . . . . 192--202
Keith A. Smith and
Margo I. Seltzer File system aging --- increasing the
relevance of file system benchmarks . . 203--213
Aaron B. Brown and
Margo I. Seltzer Operating system benchmarking in the
wake of lmbench: a case study of the
performance of NetBSD on the Intel x86
architecture . . . . . . . . . . . . . . 214--224
Anurag Acharya and
Guy Edjlali and
Joel Saltz The utility of exploiting idle
workstations for parallel computation 225--234
Xiaohan Qin and
Jean-Loup Baer A performance evaluation of cluster
architectures . . . . . . . . . . . . . 237--247
Tzi-cker Chiueh and
Srinidhi Varadarajan Design and evaluation of a DRAM-based
shared memory ATM switch . . . . . . . . 248--259
Junehwa Song and
Asit Dan and
Dinkar Sitaram Efficient retrieval of composite
multimedia objects in the JINSIL
distributed system . . . . . . . . . . . 260--271
Garth A. Gibson and
David F. Nagle and
Khalil Amiri and
Fay W. Chang and
Eugene M. Feinberg and
Howard Gobioff and
Chen Lee and
Berend Ozceri and
Erik Riedel and
David Rochberg and
Jim Zelenka File server scaling with
network-attached secure disks . . . . . 272--284
Athanassios K. Tsiolis and
Mary K. Vernon Group-guaranteed channel capacity in
multimedia storage servers . . . . . . . 285--297
Richard Muntz Special Issue on Multimedia Storage
Systems . . . . . . . . . . . . . . . . 2--2
Banu Özden and
Rajeev Rastogi and
Avi Silberschatz Architecture issues in multimedia
storage systems . . . . . . . . . . . . 3--12
Weifeng Shi and
Shahram Ghandeharizadeh Buffer sharing in video-on-demand
servers . . . . . . . . . . . . . . . . 13--20
Leana Golubchik On issues and tradeoffs in design of
fault tolerant VOD servers . . . . . . . 21--28
Richard Muntz and
Jose Renato Santos and
Steve Berson RIO: a real-time multimedia object
server . . . . . . . . . . . . . . . . . 29--35
Michele Colajanni and
Philip S. Yu Adaptive TTL schemes for load balancing
of distributed Web servers . . . . . . . 36--42
David Kotz Special Issue on Parallel I/O Systems 2--2
Thomas H. Cormen and
David M. Nicol Out-of-core FFTs with parallel disks . . 3--12
Maria Papadopouli and
Leana Golubchik Support of VBR video streams under disk
bandwidth limitations . . . . . . . . . 13--20
Rajesh Bordawekar and
Steven Landherr and
Don Capps and
Mark Davis Experimental evaluation of the
Hewlett--Packard Exemplar file system 21--28
David Rochberg and
Garth Gibson Prefetching over a network: early
experience with CTIP . . . . . . . . . . 29--36
Jai Menon and
Kent Treiber Daisy: virtual-disk hierarchical storage
manager . . . . . . . . . . . . . . . . 37--44
David M. Nicol Special Issue on the Telecommunications
Description Language . . . . . . . . . . 3--3
Kalyan Perumalla and
Richard Fujimoto and
Andrew Ogielski TED --- a language for modeling
telecommunication networks . . . . . . . 4--11
Kalyan Perumalla and
Matthew Andrews and
Sandeep Bhatt TED models for ATM internetworks . . . . 12--21
Dan Rubenstein and
Jim Kurose and
Don Towsley Optimistic parallel simulation of
reliable multicast protocols . . . . . . 22--29
Jignesh Panchal and
Owen Kelly and
Jie Lai and
Narayan Mandayam and
Andarew T. Ogielski and
Roy Yates Parallel simulations of wireless
networks with TED: radio propagation,
mobility and protocols . . . . . . . . . 30--39
Brian J. Premore and
David M. Nicol Transformation of ns TCP models to TED 40--48
V. Srinivasan and
George Varghese Faster IP lookups using controlled
prefix expansion . . . . . . . . . . . . 1--10
Vern Paxson On calibrating measurements of packet
transit times . . . . . . . . . . . . . 11--21
Randolph Y. Wang and
Arvind Krishnamurthy and
Richard P. Martin and
Thomas E. Anderson and
David E. Culler Modeling communication pipeline latency 22--32
Geoffrey M. Voelker and
Eric J. Anderson and
Tracy Kimbrel and
Michael J. Feeley and
Jeffrey S. Chase and
Anna R. Karlin and
Henry M. Levy Implementing cooperative prefetching and
caching in a globally-managed memory
system . . . . . . . . . . . . . . . . . 33--43
Prashant J. Shenoy and
Harrick M. Vin Cello: a disk scheduling framework for
next generation operating systems . . . 44--55
Emilia Rosti and
Giuseppe Serazzi and
Evgenia Smirni and
Mark S. Squillante The impact of I/O on program behavior
and parallel scheduling . . . . . . . . 56--65
Sandeep Bajaj and
Lee Breslau and
Scott Shenker Is service priority useful in networks? 66--77
Lampros Kalampoukas and
Anujan Varma and
K. K. Ramakrishnan Improving TCP throughput over two-way
asymmetric links: analysis and solutions 78--89
Suchitra Raman and
Steven McCanne and
Scott Shenker Asymptotic behavior of global recovery
in SRM . . . . . . . . . . . . . . . . . 90--99
O. J. Boxma and
V. Dumas The busy period in the fluid queue . . . 100--110
Guang-Liang Li and
Jun-Hong Cui and
Bo Li and
Fang-Ming Li Transient loss performance of a class of
finite buffer queueing systems . . . . . 111--120
Martin W. McKinnon and
George N. Rouskas and
Harry G. Perros Queueing-based analysis of broadcast
optical networks . . . . . . . . . . . . 121--130
Andy C. Bavier and
A. Brady Montz and
Larry L. Peterson Predicting MPEG execution times . . . . 131--140
Steven D. Gribble and
Gurmeet Singh Manku and
Drew Roselli and
Eric A. Brewer and
Timothy J. Gibson and
Ethan L. Miller Self-similarity in file systems . . . . 141--150
Paul Barford and
Mark Crovella Generating representative Web workloads
for network and server performance
evaluation . . . . . . . . . . . . . . . 151--160
Minwen Ji and
Edward W. Felten and
Kai Li Performance measurements for
multithreaded programs . . . . . . . . . 161--170
Dongming Jiang and
Jaswinder Pal Singh A methodology and an evaluation of the
SGI Origin 2000 . . . . . . . . . . . . 171--181
Elizabeth Shriver and
Arif Merchant and
John Wilkes An analytic behavior model for disk
drives with readahead caches and request
reordering . . . . . . . . . . . . . . . 182--191
Basilio B. Fraguela and
Ramón Doallo and
Emilio L. Zapata Modeling set associative caches behavior
for irregular computations . . . . . . . 192--201
Tianji Jiang and
Mostafa H. Ammar and
Ellen W. Zegura Inter-receiver fairness: a novel
performance measure for multicast ABR
sessions . . . . . . . . . . . . . . . . 202--211
Costas Courcoubetis and
Vasilios A. Siris and
George D. Stamoulis Application and evaluation of large
deviation techniques for traffic
engineering in broadband networks . . . 212--221
Arnold L. Neidhardt and
Jonathan L. Wang The concept of relevant time scales and
its application to queuing analysis of
self-similar traffic (or is Hurst
naughty or nice?) . . . . . . . . . . . 222--232
Andrea C. Arpaci-Dusseau and
David E. Culler and
Alan M. Mainwaring Scheduling with implicit information in
distributed systems . . . . . . . . . . 233--243
Thu D. Nguyen and
John Zahorjan Scheduling policies to support
distributed $3$D multimedia applications 244--253
Csaba Andras Moritz and
Matthew I. Frank LoGPC: modeling network contention in
message-passing programs . . . . . . . . 254--263
Rakesh Barve and
Elizabeth Shriver and
Phillip B. Gibbons and
Bruce K. Hillyer and
Yossi Matias and
Jeffrey Scott Vitter Modeling and optimizing I/O throughput
of multiple disks on a bus (summary) . . 264--265
Robert D. Blumofe and
Dionisios Papadopoulos The performance of work stealing in
multiprogrammed environments (extended
abstract) . . . . . . . . . . . . . . . 266--267
Mark E. Crovella and
Mor Harchol-Balter and
Cristina D. Murta Task assignment in a distributed system
(extended abstract): improving
performance by unbalancing load . . . . 268--269
Stephen Manley and
Margo Seltzer and
Michael Courage A self-scaling and self-configuring
benchmark for Web servers (extended
abstract) . . . . . . . . . . . . . . . 270--271
Alex Rousskov and
Valery Soloviev On performance of caching proxies
(extended abstract) . . . . . . . . . . 272--273
J. Waldby and
U. Madhow and
T. V. Lakshman Total acknowledgements (extended
abstract): a robust feedback mechanism
for end-to-end congestion control . . . 274--275
Thomas E. Willis and
George B. Adams III Portable, continuous recording of
complete computer behavior with low
overhead (extended abstract) . . . . . . 276--277
Anurag Acharya and
Sanjeev Setia Using idle memory for data-intensive
computations (extended abstract) . . . . 278--279
Mohamed Aboutabl and
Ashok Agrawala and
Jean-Dominique Decotignie Temporally determinate disk access
(extended abstract): an experimental
approach . . . . . . . . . . . . . . . . 280--281
M. Ajmone Marsan and
G. Balbo and
G. Conte and
S. Donatelli and
G. Franceschinis Modelling with Generalized Stochastic
Petri Nets . . . . . . . . . . . . . . . 2--2
Falko Bause and
Pieter S. Kritzinger Stochastic Petri Nets: An Introduction
to the Theory . . . . . . . . . . . . . 2--3
Christoph Lindemann Performance Modelling with Deterministic
and Stochastic Petri Nets . . . . . . . 3--3
Christoph Lindemann Special issue on stochastic Petri nets 4--4
Peter Buchholz and
Peter Kemper On generating a hierarchy for GSPN
analysis . . . . . . . . . . . . . . . . 5--14
Ricardo M. Fricks and
Antonio Puliafito and
Miklós Telek and
Kishor S. Trivedi Applications of non-Markovian stochastic
Petri nets . . . . . . . . . . . . . . . 15--27
Marco Ajmone Marsan and
Rossano Gaeta Modeling ATM systems with GSPNs and SWNs 28--37
Alexander Ost and
Boudewijn R. Haverkort Analysis of windowing mechanisms with
infinite-state stochastic Petri nets . . 38--46
Jozo J. Dujmovi\'c and
Ivo Dujmovi\'c Evolution and evaluation of SPEC
benchmarks . . . . . . . . . . . . . . . 2--9
Pei Cao and
Sekhar Sarukkai Guest Editors' Introduction . . . . . . 10--10
Ramón Cáceres and
Fred Douglis and
Anja Feldmann and
Gideon Glass and
Michael Rabinovich Web proxy caching: the devil is in the
details . . . . . . . . . . . . . . . . 11--15
Diwakar Krishnamurthy and
Jerome Rolia Predicting the QoS of an electronic
commerce server: those mean percentiles 16--22
Gaurav Bangs and
Peter Druschel and
Jeffrey C. Mogul Better operating system features for
faster network servers . . . . . . . . . 23--30
David Mosberger and
Tai Jin httperf --- a tool for measuring Web
server performance . . . . . . . . . . . 31--37
Amy Ward and
Peter Glynn and
Kathy Richardson Internet service performance failure
detection . . . . . . . . . . . . . . . 38--43
Mehmet Sayal and
Yuri Breitbart and
Peter Scheuermann and
Radek Vingralek Selection algorithms for replicated Web
servers . . . . . . . . . . . . . . . . 44--50
Jeffrey K. Hillingsworth and
Barton P. Miller Summary of the SIGMETRICS Symposium on
Parallel and Distributed Processing . . 2--12
Kenneth C. Sevcik Special Issue on Scheduling in
Multiprogrammed Parallel Systems . . . . 13--13
Allen B. Downey and
Dror G. Feitelson The elusive goal of workload
characterization . . . . . . . . . . . . 14--29
Sanjeev Setia and
Mark S. Squillante and
Vijay K. Naik The impact of job memory requirements on
gang-scheduling performance . . . . . . 30--39
Yuet-Ning Chan and
Sivarama P. Dandamudi and
Shikharesh Majumdar Experiences with parallel job scheduling
on a transputer system . . . . . . . . . 40--51
Mark S. Squillante and
David D. Yao and
Li Zhang The impact of job arrival patterns on
parallel scheduling . . . . . . . . . . 52--59
L. W. Dowdy and
E. Rosti and
G. Serazzi and
E. Smirni Scheduling issues in high-performance
computing . . . . . . . . . . . . . . . 60--69
Vinay J. Ribeiro and
Rudolf H. Riedi and
Matthew S. Crouse and
Richard G. Baraniuk Simulation of nonGaussian
long-range-dependent traffic using
wavelets . . . . . . . . . . . . . . . . 1--12
Wei Zhao and
Satish K. Tripathi Bandwidth-efficient continuous media
streaming through optimal multiplexing 13--22
Sanjeev Kumar and
Dongming Jiang and
Rohit Chandra and
Jaswinder Pal Singh Evaluating synchronization on shared
address space multiprocessors:
methodology and performance . . . . . . 23--34
Anurag Acharya and
Sanjeev Setia Availability and utility of idle memory
in workstation clusters . . . . . . . . 35--46
Scott F. Kaplan and
Yannis Smaragdakis and
Paul R. Wilson Trace reduction for virtual memory
simulations . . . . . . . . . . . . . . 47--58
John R. Douceur and
William J. Bolosky A large-scale study of file-system
contents . . . . . . . . . . . . . . . . 59--70
Richard P. Martin and
David E. Culler NFS sensitivity to high performance
networks . . . . . . . . . . . . . . . . 71--82
Rakesh Barve and
Elizabeth Shriver and
Phillip B. Gibbons and
Bruce K. Hillyer and
Yossi Matias and
Jeffrey Scott Vitter Modeling and optimizing I/O throughput
of multiple disks on a bus . . . . . . . 83--92
Jay Sethuraman and
Mark S. Squillante Optimal stochastic scheduling in
multiclass parallel queues . . . . . . . 93--102
Elizabeth Varki Mean value technique for closed
fork-join networks . . . . . . . . . . . 103--112
Peter A. Franaszek and
Philip Heidelberger and
Michael Wazlowski On management of free space in
compressed memory systems . . . . . . . 113--121
Yannis Smaragdakis and
Scott Kaplan and
Paul Wilson EELRU: simple and effective adaptive
page replacement . . . . . . . . . . . . 122--133
Donghee Lee and
Jongmoo Choi and
Jong-Hun Kim and
Sam H. Noh and
Sang Lyul Min and
Yookun Cho and
Chong Sang Kim On the existence of a spectrum of
policies that subsumes the least
recently used (LRU) and least frequently
used (LFU) policies . . . . . . . . . . 134--143
Reiner Ludwig and
Bela Rathonyi and
Almudena Konrad and
Kimberly Oden and
Anthony Joseph Multi-layer tracing of TCP over a
reliable wireless link . . . . . . . . . 144--154
Farooq Anjum and
Leandros Tassiulas On the behavior of different TCP
algorithms over a wireless channel with
correlated packet losses . . . . . . . . 155--165
Kunwadee Sripanidkulchai and
Andy Myers and
Hui Zhang A third-party value-added network
service approach to reliable multicast 166--177
Li Fan and
Pei Cao and
Wei Lin and
Quinn Jacobson Web prefetching between low-bandwidth
clients and proxies: potential and
performance . . . . . . . . . . . . . . 178--187
Paul Barford and
Mark Crovella A performance evaluation of hyper text
transfer protocols . . . . . . . . . . . 188--197
Huican Zhu and
Ben Smith and
Tao Yang Hierarchical resource management for Web
server clusters with dynamic content . . 198--199
Cheng Liao and
Margaret Martonosi and
Douglas W. Clark An adaptive globally-synchronizing clock
algorithm and its implementation on a
Myrinet-based PC cluster . . . . . . . . 200--201
ChengFu Chou and
Leana Golubchik and
John C. S. Lui A performance study of dynamic
replication techniques in continuous
media servers . . . . . . . . . . . . . 202--203
Constantinos Dovrolis and
Dimitrios Stiliadis Relative differentiated services in the
Internet: issues and mechanisms . . . . 204--205
Gretta Bartels and
Anna Karlin and
Darrell Anderson and
Jeffrey Chase and
Henry Levy and
Geoffrey Voelker Potentials and limitations of
fault-based Markov prefetching for
virtual memory pages . . . . . . . . . . 206--207
Patrick Crowley and
Jean-Loup Baer On the use of trace sampling for
architectural studies of desktop
applications . . . . . . . . . . . . . . 208--209
Sumeer Bhola and
Mustaque Ahamad Workload modeling for highly interactive
applications . . . . . . . . . . . . . . 210--211
Narayanan Venkitaraman and
Tae-eun Kim and
Kang-Won Lee Design and evaluation of congestion
control algorithms in the future
Internet . . . . . . . . . . . . . . . . 212--213
E. N. Elnozahy Address trace compression through loop
detection and reduction . . . . . . . . 214--215
Erich Nahum and
Tsipora Barzilai and
Dilip Kandlur Performance issues in WWW servers . . . 216--217
T. S. Eugene Ng and
Donpaul C. Stephens and
Ion Stoica and
Hui Zhang Supporting best-effort traffic with fair
service curve . . . . . . . . . . . . . 218--219
Jitendra Padhye and
Jim Kurose and
Don Towsley and
Rajeev Koodli A TCP-friendly rate adjustment protocol
for continuous media flows over best
effort networks . . . . . . . . . . . . 220--221
Allen B. Downey Using pathchar to estimate Internet link
characteristics . . . . . . . . . . . . 222--223
Yuval Hershko and
Daniel Segal and
Hadas Shachnai Self-tuning synchronization mechanisms
in network operating systems . . . . . . 224--225
Pradip Bose Performance evaluation and validation of
microprocessors . . . . . . . . . . . . 226--227
Shikharesh Majumdar and
Dale Streibel and
Bruce Beninger and
Brian Carroll and
Neveenta Verma and
Minru Liu Controlling memory contention on a
scalable multiprocessor-based telephone
switch . . . . . . . . . . . . . . . . . 228--229
Eugenio Cervetto Model-based performance analysis of an
EDP/ERP-oriented wide area network . . . 230--231
Srinivas Ramanathan and
Edward H. Perry The value of a systematic approach to
measurement and analysis: an ISP case
study . . . . . . . . . . . . . . . . . 232--233
Janet Siebert Improving performance of data analysis
in data warehouses: a methodology and
case study . . . . . . . . . . . . . . . 234--235
Carey Williamson Special Issue on Network Traffic
Measurements and Workload
Characterization . . . . . . . . . . . . 2--2
Judith L. Jerkins and
John Monroe and
Jonathan L. Wang A measurement analysis of Internet
traffic over frame relay . . . . . . . . 3--14
Raja Epsilon and
Jun Ke and
Carey Williamson Analysis of ISP IP/ATM network traffic
measurements . . . . . . . . . . . . . . 15--24
Martin Arlitt and
Rich Friedrich and
Tai Jin Workload characterization of a Web proxy
in a cable modem environment . . . . . . 25--36
Paul Barford and
Mark Crovella Measuring Web performance in the wide
area . . . . . . . . . . . . . . . . . . 37--48
Mark S. Squillante Special issue on the Workshop on
MAthematical performance Modeling and
Analysis (MAMA `99) . . . . . . . . . . 2--2
E. G. Coffman, Jr. and
Ph. Robert and
A. L. Stolyar The interval packing process of linear
networks . . . . . . . . . . . . . . . . 3--4
R. Cáceres and
N. G. Duffield and
J. Horowitz and
F. Lo Presti and
D. Towsley Statistical inference of internal
network loss and topology . . . . . . . 5--6
D. H. J. Epema and
J. F. C. M. de Jongh Proportional-share scheduling in
single-server and multiple-server
computing systems . . . . . . . . . . . 7--10
Dimitris Bertsimas and
David Gamarnik and
John N. Tsitsiklis Performance analysis of multiclass
queueing networks . . . . . . . . . . . 11--14
Ulrich Herzog Process algebras are getting mature for
performance evaluation?! . . . . . . . . 15--18
Laszlo Gyorfi and
Andras Racz and
Ken Duffy and
John T. Lewis and
Raymond Russell and
Fergal Toomey Distribution-free confidence intervals
for measurement of effective bandwidths 19--19
Sandeep Juneja and
Perwez Shahabuddin Simulating heavy tailed processes using
delayed hazard rate twisting (extended
abstract) . . . . . . . . . . . . . . . 20--22
Zhen Liu and
Don Towsley Stochastic bounds for queueing systems
with multiple Markov modulated sources 23--23
Mark S. Squillante and
David D. Yao and
Li Zhang Web traffic modeling and Web server
performance analysis . . . . . . . . . . 24--27
Jeffrey P. Bradford and
Russell Quong An empirical study on how program layout
affects cache miss rates . . . . . . . . 28--42
Andrew Moore and
Simon Crosby An experimental configuration for the
evaluation of CAC algorithms . . . . . . 43--54
Martin Arlitt and
Ludmila Cherkasova and
John Dilley and
Rich Friedrich and
Tai Jin Evaluating content management techniques
for Web proxy caches . . . . . . . . . . 3--11
Marco Conti and
Enrico Gregori and
Fabio Panzieri Load distribution among replicated Web
servers: QoS-based approach . . . . . . 12--19
Carsten Griwodz and
Michael Liepert and
Michael Zink and
Ralf Steinmetz Tune to Lambda patching . . . . . . . . 20--26
Daniel A. Menaséc and
Rodrigo Fonseca and
Virgilio A. F. Almeida and
Marco A. Mendes Resource management policies for
e-commerce servers . . . . . . . . . . . 27--35
Greg Minshall and
Yasushi Saito and
Jeffrey C. Mogul and
Ben Verghese Application performance pitfalls and
TCP's Nagle algorithm . . . . . . . . . 36--44
Chris Roadknight and
Ian Marshall and
Debbie Vearer File popularity characterisation . . . . 45--50
Gary Tomlinson and
Drew Major and
Ron Lee High-capacity Internet middleware:
Internet caching system architectural
overview . . . . . . . . . . . . . . . . 51--56
R. D. van der Mei and
W. K. Ehrlich and
P. K. Reeser and
J. P. Francisco A decision support system for tuning Web
servers in distributed object oriented
network architectures . . . . . . . . . 57--62
Yang-hua Chu and
Sanjay G. Rao and
Hui Zhang A case for end system multicast (keynote
address) . . . . . . . . . . . . . . . . 1--12
A. Legout and
E. W. Biersack PLM: fast convergence for cumulative
layered multicast transmission schemes 13--22
Sambit Sahu and
Philippe Nain and
Christophe Diot and
Victor Firoiu and
Don Towsley and
Don Iowsley On achievable service differentiation
with token bucket marking for TCP . . . 23--33
William J. Bolosky and
John R. Douceur and
David Ely and
Marvin Theimer Feasibility of a serverless distributed
file system deployed on an existing set
of desktop PCs . . . . . . . . . . . . . 34--43
Jose Renato Santos and
Richard R. Muntz and
Berthier Ribeiro-Neto Comparing random data allocation and
data striping in multimedia servers . . 44--55
John Linwood Griffin and
Steven W. Schlosser and
Gregory R. Ganger and
David F. Nagle Modeling and performance of MEMS-based
storage devices . . . . . . . . . . . . 56--65
Mohammad S. Raunak and
Prashant Shenoy and
Pawan Goyal and
Krithi Ramamritham Implications of proxy caching for
provisioning networks and servers . . . 66--77
Jiong Yang and
Wei Wang and
Richard Muntz Collaborative Web caching based on proxy
affinities . . . . . . . . . . . . . . . 78--89
Mohit Aron and
Peter Druschel and
Willy Zwaenepoel Cluster reserves: a mechanism for
resource management in cluster-based
network servers . . . . . . . . . . . . 90--101
Chadi Barakat and
Eitan Altman Analysis of the phenomenon of several
slow start phases in TCP (poster
session) . . . . . . . . . . . . . . . . 102--103
Wai-Man R. Wong and
Richard R. Muntz Providing guaranteed quality of service
for interactive visualization
applications (poster session) . . . . . 104--105
Xin Wang and
C. Yu and
Henning Schulzrinne and
Paul Stirpe and
Wei Wu IP multicast fault recovery in PIM over
OSPF (poster session) . . . . . . . . . 106--107
Emmanuel Léty and
Thierry Turletti and
François Baccelli Cell-based multicast grouping in
large-scale virtual environments (poster
session) (extended abstract) . . . . . . 108--109
Shudong Jin and
Azer Bestavros Temporal locality in Web request streams
(poster session) (extended abstract):
sources, characteristics, and caching
implications . . . . . . . . . . . . . . 110--111
Jiri Schindler and
Gregory R. Ganger Automated disk drive characterization
(poster session) . . . . . . . . . . . . 112--113
Zhen Fang and
Lixin Zhang and
John Carter and
Sally McKee and
Wilson Hsieh Online superpage promotion revisited
(poster session) . . . . . . . . . . . . 114--115
Ioanis Nikolaidis and
Fulu Li and
Ailan Hu An inherently loss-less and
bandwidth-efficient periodic broadcast
scheme for VBR video (poster session) 116--117
Can Emre Koksal and
Hisham Kassab and
Hari Balakrishnan An analysis of short-term fairness in
wireless media access protocols (poster
session) . . . . . . . . . . . . . . . . 118--119
Srinath R. Joshi and
Injong Rhee RESCU: dynamic hybrid packet-loss
recovery for video transmission over the
Internet (poster session) . . . . . . . 120--121
Venkata N. Padmanabhan and
Lili Qiu The content and access dynamics of a
busy Web server (poster session) . . . . 122--123
Eitan Altman and
Konstantin Avrachenkov and
Chadi Barakat TCP in presence of bursty losses . . . . 124--133
Jim Martin and
Arne Nilsson and
Injong Rhee The incremental deployability of
RTT-based congestion avoidance for high
speed TCP Internet connections . . . . . 134--144
Dan Rubenstein and
Jim Kurose and
Don Towsley Detecting shared congestion of flows via
end-to-end measurement . . . . . . . . . 145--155
Xin Wang and
Henning Schulzrinne and
Dilip Kandlur and
Dinesh Verma Measurement and analysis of LDAP
performance . . . . . . . . . . . . . . 156--165
William S. Cleveland and
Dong Lin and
Don X. Sun IP packet generation: statistical models
for TCP start times based on
connection-rate superposition . . . . . 166--177
Nidhi Hegde and
Khosrow Sohraby On the impact of soft hand-off in
cellular systems . . . . . . . . . . . . 178--187
Sanjay Shakkottai and
R. Srikant Delay asymptotics for a priority
queueing system . . . . . . . . . . . . 188--195
Leana Golubchik and
John C. S. Lui A fast and accurate iterative solution
of a multi-class threshold-based
queueing system with hysteresis . . . . 196--206
Andrew S. Miner and
Gianfranco Ciardo and
Susanna Donatelli Using the exact state space of a Markov
model to compute approximate stationary
measures . . . . . . . . . . . . . . . . 207--216
Derek L. Eager and
Daniel J. Sorin and
Mary K. Vernon AMVA techniques for high service time
variability . . . . . . . . . . . . . . 217--228
David Ofelt and
John L. Hennessy Efficient performance prediction for
modern microprocessors . . . . . . . . . 229--239
Yasuhiro Endo and
Margo Seltzer Improving interactive performance using
TIPME . . . . . . . . . . . . . . . . . 240--251
Keith I. Farkas and
Jason Flinn and
Godmar Back and
Dirk Grunwald and
Jennifer M. Anderson Quantifying the energy consumption of a
pocket computer and a Java Virtual
Machine . . . . . . . . . . . . . . . . 252--263
Jin-Soo Kim and
Yarsun Hsu Memory system behavior of Java programs:
methodology and analysis . . . . . . . . 264--274
Magnus Karlsson and
Per Stenström An analytical model of the working-set
sizes in decision-support systems . . . 275--285
Jongmoo Choi and
Sam H. Noh and
Sang Lyul Min and
Yookun Cho Towards application/file-level
characterization of block references: a
case for fine-grained buffer management 286--295
Murali S. Kodialam and
T. V. Lakshman and
Sudipta Sengupta Online multicast routing with bandwidth
guarantees: a new approach using
multicast network flow . . . . . . . . . 296--306
Lixin Gao and
Jennifer Rexford Stable Internet routing without global
coordination . . . . . . . . . . . . . . 307--317
Turgay Korkmaz and
Marwan Krunz and
Spyros Tragoudas An efficient algorithm for finding a
path subject to two additive constraints 318--327
Krishna Kant Workshop on Performance and Architecture
of Web Servers (PAWS-2000) . . . . . . . 3--4
Krishna Kant and
Prasant Mohapatra Scalable Internet servers: issues and
challenges . . . . . . . . . . . . . . . 5--8
Onn Brandman and
Junghoo Cho and
Hector Garcia-Molina and
Narayanan Shivakumar Crawler-friendly Web servers . . . . . . 9--14
Randal C. Burns and
Darrell D. E. Long and
Robert M. Rees Consistency and locking for distributing
updates to Web servers using a file
system . . . . . . . . . . . . . . . . . 15--21
Nikolaos Vasiliou and
Hanan Lutfiyya Providing a differentiated quality of
service in a World Wide Web server . . . 22--28
Samrat Bhattacharjee and
William C. Cheng and
Cheng-Fu Chou and
Leana Golubchik and
Samir Khuller Bistro: a framework for building
scalable wide-area \em Upload
applications . . . . . . . . . . . . . . 29--35
E. Kraemer and
G. Paixão and
D. Guedes and
W. Meira, Jr. and
V. Almeida Minimizing the impact of orphan requests
in e-commerce services . . . . . . . . . 36--42
Brian D. Davison and
Vincenzo Liberatore Pushing politely: improving Web
responsiveness one packet at a time . . 43--43
Martin Arlitt Characterizing Web user sessions . . . . 50--63
R. Hadharan and
W. K. Ehrlich and
D. Cura and
P. K. Reeser End to End Performance Modeling of Web
Server Architectures . . . . . . . . . . 57--63
Weiping Zhu An approximate analysis of the shortest
queue policy on soft real-time
scheduling . . . . . . . . . . . . . . . 3--10
Bo Li and
Kazem Sohraby Special Issue on Performance Issues in
Mobile Computing . . . . . . . . . . . . 11--11
Ming Feng Chang and
Yi-Bing Lin Performance of a weakly consistent
wireless Web access mechanism . . . . . 12--20
C.-K. Toh and
Richard Chen and
Minar Delwar and
Donald Allen Experimenting with an Ad Hoc wireless
network on campus: insights and
experiences . . . . . . . . . . . . . . 21--29
Tanja Lang and
Daniel Floreani Performance evaluation of different TCP
error detection and congestion control
strategies over a wireless link . . . . 30--38
Vikrant A. Chitre and
John N. Daigle IP-based services over GPRS . . . . . . 39--47
Mark S. Squillante Special issue on the Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2000) . . . . . . . . . . 2--2
Mor Harchol-Balter Job placement with unknown duration and
no preemption . . . . . . . . . . . . . 3--5
Leana Golubchik and
John C. S. Lui Open problems for threshold-based
systems . . . . . . . . . . . . . . . . 6--8
E. G. Coffman, Jr. and
Predrag Jelenkovi\'c Threshold policies for single-resource
reservation systems . . . . . . . . . . 9--10
Joel L. Wolf and
Philip S. Yu Load balancing for clustered Web farms 11--13
Edmundo de Souza e Silva and
Rosa M. M. Leão and
Morganna C. Diniz Transient analysis applied to traffic
modeling . . . . . . . . . . . . . . . . 14--16
T. Bu and
D. Towsley A fixed point approximation of TCP
behavior in a network . . . . . . . . . 17--18
Cheng-Shang Chang and
Yuh-ming Chiu and
Wheyming Tina Song Large deviation analysis for
multiplexing independent regulated
inputs . . . . . . . . . . . . . . . . . 19--21
Lei Kuang and
Armand M. Makowski Convex stability and asymptotic convex
ordering for non-stationary arrival
processes . . . . . . . . . . . . . . . 22--23
Eitan Bachmat Recent results in mathematical modeling
and performance evaluation of disks and
disk array . . . . . . . . . . . . . . . 24--26
Karin Hogstedt and
Doug Kimelman and
V. T. Rajan and
Tova Roth and
Mark Wegman Graph cutting algorithms for distributed
applications partitioning . . . . . . . 27--29
Paulo Fernandes and
Brigitte Plateau Triangular solution of linear systems in
tensor product format . . . . . . . . . 30--32
L. Capra and
C. Dutheillet and
G. Franceschinis and
J. M. Ilié On the use of partial symmetries for
lumping Markov chains . . . . . . . . . 33--35
Peter J. Haas Estimation of delays in non-regenerative
discrete-event stochastic systems . . . 36--38
David Gamarnik On deciding stability of constrained
random walks and queueing systems . . . 39--40
Mark S. Squillante and
Baffelly Woo and
Li Zhang Analysis of queues under correlated
arrivals with applications to Web server
performance . . . . . . . . . . . . . . 41--43
Girija Narlikar and
Francis Zane Performance modeling for fast IP lookups 1--12
Xiaohu Qie and
Andy Bavier and
Larry Peterson and
Scott Karlin Scheduling computations on a
software-based router . . . . . . . . . 13--24
Xun Su and
Gustavo de Veciana Dynamic multi-path routing: asymptotic
approximation and simulations . . . . . 25--36
Michael B. Jones and
Stefan Saroiu Predictability requirements of a soft
modem . . . . . . . . . . . . . . . . . 37--49
Jacob R. Lorch and
Alan Jay Smith Improving dynamic voltage scaling
algorithms with PACE . . . . . . . . . . 50--61
Kalyanaraman Vaidyanathan and
Richard E. Harper and
Steven W. Hunter and
Kishor S. Trivedi Analysis and implementation of software
rejuvenation in cluster systems . . . . 62--71
Gabriel Loh A time-stamping algorithm for efficient
performance estimation of superscalar
processors . . . . . . . . . . . . . . . 72--81
Thomas Bonald and
Laurent Massoulié Impact of fairness on Internet
performance . . . . . . . . . . . . . . 82--91
Kavé Salamatian and
Sandrine Vaton Hidden Markov modeling for network
communication channels . . . . . . . . . 92--101
Jin Cao and
William S. Cleveland and
Dong Lin and
Don X. Sun On the nonstationarity of Internet
traffic . . . . . . . . . . . . . . . . 102--112
Hung-Yun Hsieh and
Raghupathy Sivakumar Performance comparison of cellular and
multi-hop wireless networks: a
quantitative study . . . . . . . . . . . 113--122
Nidhi Hegde and
Khosrow Sohraby Blocking in large mobile cellular
networks with bursty traffic . . . . . . 123--132
Apurva Kumar and
Rajeev Gupta Capacity evaluation of frequency hopping
based ad-hoc systems . . . . . . . . . . 133--142
Dongyu Qiu and
Ness B. Shroff A new predictive flow control scheme for
efficient network utilization and QoS 143--153
Ioannis Ch. Paschalidis and
Spyridon Vassilaras Model-based estimation of buffer
overflow probabilities from measurements 154--163
Rudra Dutta and
George N. Rouskas On optimal traffic grooming in WDM rings 164--174
Jean-Yves Le Boudec Some properties of variable length
packet shapers . . . . . . . . . . . . . 175--183
Cheng-Shang Chang and
Yuh-ming Chiu and
Wheyming Tina Song On the performance of multiplexing
independent regulated inputs . . . . . . 184--193
Yefim Shuf and
Mauricio J. Serrano and
Manish Gupta and
Jaswinder Pal Singh Characterizing the memory behavior of
Java workloads: a structured view and
opportunities for optimizations . . . . 194--205
Sohum Sohoni and
Rui Min and
Zhiyong Xu and
Yiming Hu A study of memory system performance of
multimedia applications . . . . . . . . 206--215
Tian Bu and
Don Towsley Fixed point approximations for TCP
behavior in an AQM network . . . . . . . 216--225
Steven H. Low and
Larry Peterson and
Limin Wang Understanding TCP Vegas: a duality model 226--235
J. Talim and
Z. Liu and
Ph. Nain and
E. G. Coffman, Jr. Controlling the robots of Web search
engines . . . . . . . . . . . . . . . . 236--244
F. Donelson Smith and
Félix Hernández Campos and
Kevin Jeffay and
David Ott What TCP/IP protocol headers can tell us
about the Web . . . . . . . . . . . . . 245--256
Erich M. Nahum and
Marcel-Catalin Rosu and
Srinivasan Seshan and
Jussara Almeida The effects of wide-area conditions on
WWW server performance . . . . . . . . . 257--267
Philippe Nain and
Redusindo Núñez-Queija A M/M/1 queue in a semi-Markovian
environment . . . . . . . . . . . . . . 268--278
Nikhil Bansal and
Mor Harchol-Balter Analysis of SRPT scheduling:
investigating unfairness . . . . . . . . 279--290
Johannes Lüthi and
Catalina M. Lladó Interval parameters for capturing
uncertainties in an EJB performance
model . . . . . . . . . . . . . . . . . 291--300
Hesham El-Sayed and
Don Cameron and
Murray Woodside Automation support for software
performance engineering . . . . . . . . 301--311
Michael K. Bradshaw and
Bing Wang and
Subhabrata Sen and
Lixin Gao and
Jim Kurose and
Prashant Shenoy and
Don Towsley Periodic broadcast and patching
services: implementation, measurement,
and analysis in an Internet streaming
video testbed . . . . . . . . . . . . . 312--313
Yang Richard Yang and
Xiaozhou Li and
Simon S. Lam and
Xincheng Zhang Towards scalable and reliable group key
management . . . . . . . . . . . . . . . 314--315
Anat Bremler-Barr and
Yehuda Afek and
Haim Kaplan and
Edith Cohen and
Michael Merritt Restoration path concatenation: fast
recovery of MPLS paths . . . . . . . . . 316--317
Andreas Savvides and
Sung Park and
Mani B. Srivastava On modeling networks of wireless
microsensors . . . . . . . . . . . . . . 318--319
Philippas Tsigas and
Yi Zhang Evaluating the performance of
non-blocking synchronization on
shared-memory multiprocessors . . . . . 320--321
Wee Teck Ng and
Bruce K. Hillyer Obtaining high performance for storage
outsourcing . . . . . . . . . . . . . . 322--323
Venkata N. Padamanabban and
Lealkshminarayanan Subramanian Determining the geographic location of
Internet hosts . . . . . . . . . . . . . 324--325
Michel Mandjes and
Iraj Saniee and
Alexander Stolyar Load characterization and anomaly
detection for voice over IP traffic . . 326--327
Allen B. Downey The structural cause of file size
distributions . . . . . . . . . . . . . 328--329
Rishi Bhargava and
Ashish Goel and
Adam Meyerson Using approximate majorization to
characterize protocol fairness . . . . . 330--331
John Mellor-Crummey and
Robert Fowler and
David Whalley On providing useful information for
analyzing and tuning applications . . . 332--333
Cyrus Shahabi and
Mohammad R. Kolahdouzan and
Greg Barish and
Roger Zimmermann and
Didi Yao and
Kun Fu and
Lingling Zhang Alternative techniques for the efficient
acquisition of haptic data . . . . . . . 334--335
Peter A. Dinda Online prediction of the running time of
tasks . . . . . . . . . . . . . . . . . 336--337
Virgilío Almeida and
Daniel Menascé and
Rudolf Riedi and
Flávia Peligrinelli and
Rodrigo Fonseca and
Wagner Meira, Jr. Analyzing robot behavior in e-business
sites . . . . . . . . . . . . . . . . . 338--339
Jussara M. Almeida and
Jeffrey Krueger and
Mary K. Vernon Characterization of user access to
streaming media files . . . . . . . . . 340--341
Thomas Bonald and
James Roberts Performance modeling of elastic traffic
in overload . . . . . . . . . . . . . . 342--343
Lili Qiu and
George Varghese and
Subhash Suri Fast firewall implementations for
software-based and hardware-based
routers . . . . . . . . . . . . . . . . 344--345
K. Kant and
Prasant Mohapatra Current research trends in Internet
servers . . . . . . . . . . . . . . . . 5--7
Amy Csizmar Dalal and
Scott Jordan An optimal service ordering for a World
Wide Web server . . . . . . . . . . . . 8--13
Valeria Cardellini and
Emiliano Casalicchio and
Michele Colajanni and
Marco Mambelli Web switch support for differentiated
services . . . . . . . . . . . . . . . . 14--19
Thiemo Voigt and
Per Gunningberg Kernel-based control of persistent Web
server connections . . . . . . . . . . . 20--25
Jun Wang and
Rui Min and
Zhuying Wu and
Yiming Hu Boosting I/O performance of Internet
servers with user-level custom file
systems . . . . . . . . . . . . . . . . 26--31
Xin Chen and
Xiaodong Zhang Coordinated data prefetching by
utilizing reference information at both
proxy and Web servers . . . . . . . . . 32--38
Oscar Ardaiz and
Felix Freitag and
Leandro Navarro Improving the service time of Web
clients using server redirection . . . . 39--44
Shudong Jin and
Azer Bestavros GISMO: a Generator of Internet Streaming
Media Objects and workloads . . . . . . 2--10
Mark S. Squillante Special issue on the Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2001) . . . . . . . . . . 11--11
Nikhil Bansal and
Mor Harchol-Balter Analysis of M/G/1/SRPT under transient
overload . . . . . . . . . . . . . . . . 12--14
E. Bachmat Average case analysis for batched disk
scheduling and increasing subsequences 15--16
Anton Riabov and
Jay Sethuraman Scheduling periodic task graphs with
communication delays . . . . . . . . . . 17--18
Jean-Michel Fourneau and
Erol Gelenbe G-networks with resets . . . . . . . . . 19--20
Michael Shalmon Queueing analysis for polling and
prioritized service of aggregated
regenerative variable rate ON-OFF
traffic sources . . . . . . . . . . . . 20--20
Alan Bain and
Peter Key Modelling the performance of distributed
admission control for adaptive
applications . . . . . . . . . . . . . . 21--22
Cheng-Shang Chang and
Duan-Shin Lee and
Ching-Ming Lien Load balanced Birkhoff--von Neumann
switches with resequencing . . . . . . . 23--24
Yaakov Kogan Asymptotic expansions for probability
distributions in large loss and closed
queueing networks . . . . . . . . . . . 25--27
Yuliy Baryshnikov and
E. G. Coffman, Jr. and
Predrag Jelenkovi\'c Kelly's LAN model revisited . . . . . . 28--29
David Gamarnik Stochastic online binpacking problem:
exact conditions for bounded expected
queue lengths under the best fit packing
heuristic . . . . . . . . . . . . . . . 30--31
S. Lam and
Rocky K. C. Chang Stability comparison in
single-server-multiple-queue systems . . 32--34
Árpád Szlávik GI/G/1 type processes: a non-inversive
matrix analytical solution . . . . . . . 35--37
Nam Kyoo Boots and
Perwez Shahabuddin Simulating tail probabilities in GI/GI/1
queues and insurance risk processes with
subexponential distributions (extended
abstract) . . . . . . . . . . . . . . . 38--39
Sem Borst and
Michel Mandjes and
Miranda van Uitert Generalized processor sharing with
heterogeneous traffic classes . . . . . 40--42
Zhen Liu and
Mark S. Squillante and
Joel L. Wolf On maximizing service-level-agreement
profits . . . . . . . . . . . . . . . . 43--44
Yingdong Lu and
Jing-Sheng Song and
Weian Zheng Performance analysis of
assemble-to-order systems through strong
approximations . . . . . . . . . . . . . 45--46
Mark S. Squillante and
Cathy H. Xia and
Li Zhang Optimal scheduling in queueing network
models of high-volume commercial Web
sites . . . . . . . . . . . . . . . . . 47--48
Kenneth C. Sevcik and
Hai Wang Solution properties and convergence of
an approximate mean value analysis
algorithm . . . . . . . . . . . . . . . 3--10
Carey Williamson and
Qian Wu A case for context-aware TCP/IP . . . . 11--23
Daniel A. Menascé Simple analytic modeling of software
contention . . . . . . . . . . . . . . . 24--30
William C. Cheng and
Cheng-Fu Chou and
Leana Golubchik and
Samir Khuller A performance study of Bistro, a
scalable upload architecture . . . . . . 31--39
Barry G. Lawson and
Evgenia Smirni Multiple-queue backfilling scheduling
with priorities and reservations for
parallel systems . . . . . . . . . . . . 40--47
Attila Pásztor and
Darryl Veitch PC based precision timing without GPS 1--10
Mark Coates and
Rui Castro and
Robert Nowak and
Manik Gadhiok and
Ryan King and
Yolanda Tsang Maximum likelihood network topology
identification from edge-based unicast
measurements . . . . . . . . . . . . . . 11--20
Tian Bu and
Nick Duffield and
Francesco Lo Presti and
Don Towsley Network tomography on general topologies 21--30
Song Jiang and
Xiaodong Zhang LIRS: an efficient low inter-reference
recency set replacement policy to
improve buffer cache performance . . . . 31--42
Mark S. Squillante and
Yanyong Zhang and
Anand Sivasubramaniam and
Natarajan Gautam and
Hubertus Franke and
Jose Moreira Modeling and analysis of dynamic
coscheduling in parallel and distributed
environments . . . . . . . . . . . . . . 43--54
Eitan Bachmat and
Jiri Schindler Analysis of methods for scheduling low
priority disk drive tasks . . . . . . . 55--65
Allan Snavely and
Dean M. Tullsen and
Geoff Voelker Symbiotic jobscheduling with priorities
for a simultaneous multithreading
processor . . . . . . . . . . . . . . . 66--76
Peter G. Harrison and
William J. Knottenbelt Passage time distributions in large
Markov chains . . . . . . . . . . . . . 77--85
Alma Riska and
Evgenia Smirni Exact aggregate solutions for M/G/1-type
Markov processes . . . . . . . . . . . . 86--96
Shudong Jin and
Azer Bestavros Scalability of multicast delivery for
non-sequential streaming access . . . . 97--107
Carl J. Mauer and
Mark D. Hill and
David A. Wood Full-system timing-first simulation . . 108--116
Ruoming Jin and
Gagan Agrawal Performance prediction for random write
reductions: a case study in modeling
shared memory programs . . . . . . . . . 117--128
Gokul B. Kandiraju and
Anand Sivasubramaniam Characterizing the $d$-TLB behavior of
SPEC CPU2000 benchmarks . . . . . . . . 129--139
Matthew Hertz and
Stephen M. Blackburn and
J. Eliot B. Moss and
Kathryn S. McKinley and
Darko Stefanovi\'c Error-free garbage collection traces:
how to cheat and not get caught . . . . 140--151
Craig W. Cameron and
Steven H. Low and
David X. Wei High-density model for server allocation
and placement . . . . . . . . . . . . . 152--159
David P. Olshefski and
Jason Nieh and
Dakshi Agrawal Inferring client response time at the
Web server . . . . . . . . . . . . . . . 160--171
Sam C. M. Lee and
John C. S. Lui and
David K. Y. Yau Admission control and dynamic adaptation
for a proportional-delay
diffserv-enabled Web server . . . . . . 172--182
Haonan Tan and
Derek L. Eager and
Mary K. Vernon and
Hongfei Guo Quality of service evaluations of
multicast streaming protocols . . . . . 183--194
Anand Balachandran and
Geoffrey M. Voelker and
Paramvir Bahl and
P. Venkat Rangan Characterizing user behavior and network
performance in a public wireless LAN . . 195--205
Harkirat Singh and
Suresh Singh Energy consumption of TCP Reno, Newreno,
and SACK in multi-hop wireless networks 206--216
Taliver Heath and
Richard P. Martin and
Thu D. Nguyen Improving cluster availability using
workstation validation . . . . . . . . . 217--227
Albert Lai and
Jason Nieh Limits of wide-area thin-client
computing . . . . . . . . . . . . . . . 228--239
Jeffrey Vetter Dynamic statistical profiling of
communication activity in distributed
applications . . . . . . . . . . . . . . 240--250
Jeanine Cook and
Richard L. Oliver and
Eric E. Johnson Toward reducing processor simulation
time via dynamic reduction of
microarchitecture complexity . . . . . . 252--253
Jimmy S. Shih and
Randy H. Katz Evaluating tradeoffs of congestion
pricing for voice calls . . . . . . . . 254--255
Miriam Sivan-Zimet and
Tara M. Madhyastha Workload based optimization of
probe-based storage . . . . . . . . . . 256--257
Qin Lv and
Pei Cao and
Edith Cohen and
Kai Li and
Scott Shenker Search and replication in unstructured
peer-to-peer networks . . . . . . . . . 258--259
Y. Chandramouli and
Arnold Neidhardt Application level traffic measurements
for capacity engineering . . . . . . . . 260--261
Carey Williamson and
Qian Wu Context-aware TCP/IP . . . . . . . . . . 262--263
Chadi Barakat and
Patrick Thiran and
Gianluca Iannaccone and
Christophe Diot On Internet backbone traffic modeling 264--265
Alexander Thomasian and
Chang Liu Some new disk scheduling policies and
their performance . . . . . . . . . . . 266--267
Kang-Won Lee and
Khalil Amiri and
Sambit Sahu and
Chitra Venkatramani On the sensitivity of cooperative
caching performance to workload and
network characteristics . . . . . . . . 268--269
Vaidyanathan Anantharaman and
Raghupathy Sivakumar A microscopic analysis of TCP
performance over wireless ad-hoc
networks . . . . . . . . . . . . . . . . 270--271
Baek-Young Choi and
Jaesung Park and
Zhi-Li Zhang Adaptive random sampling for load change
detection . . . . . . . . . . . . . . . 272--273
Zhili Zhao and
Jayesh Ametha and
Swaroop Darbha and
A. L. Narasimha Reddy A method for estimating non-responsive
traffic at a router . . . . . . . . . . 274--275
Liang Guo and
Ibrahim Matta Scheduling flows with unknown sizes:
approximate analysis . . . . . . . . . . 276--277
Sara Alouf and
Fabrice Huet and
Philippe Nain Forwarders vs. centralized server: an
evaluation of two approaches for
locating mobile agents . . . . . . . . . 278--279
Hyunseok Chang and
Ramesh Govindan and
Sugih Jamin and
Scott J. Shenker and
Walter Willinger Towards capturing representative
AS-level Internet topologies . . . . . . 280--281
Nevil Brownlee and
kc claffy Internet stream size distributions . . . 282--283
Yingwu Zhu and
Yiming Hu Can large disk built-in caches really
improve system performance? . . . . . . 284--285
Rob Simmonds and
Carey Williamson and
Russell Bradford and
Martin Arlitt and
Brian Unger Web server benchmarking using parallel
WAN emulation . . . . . . . . . . . . . 286--287
Virgilio Almeida and
Martin Arlitt and
Jerry Rolia Analyzing a Web-based system's
performance measures at multiple time
scales . . . . . . . . . . . . . . . . . 3--9
Mauro Andreolini and
Michele Colajanni and
Ruggero Morselli Performance study of dispatching
algorithms in multi-tier Web
architectures . . . . . . . . . . . . . 10--20
Yan Chen and
Khian Hao Lim and
Randy H. Katz and
Chris Overton On the stability of network distance
estimation . . . . . . . . . . . . . . . 21--30
Alexander Thomasian and
Chang Liu Disk scheduling policies with lookahead 31--40
Alexandre Brandwajn A note on SCSI bus waits . . . . . . . . 41--47
Daniel A. Menascé and
Lavanya Kanchanapalli Probabilistic scalable P2P resource
location services . . . . . . . . . . . 48--58
Mark S. Squillante Special issue on the Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2002) . . . . . . . . . . 2--2
Shengke Yu and
Marianne Winslett and
Jonghyun Lee and
Xiaosong Ma Automatic and portable performance
modeling for parallel I/O: a
machine-learning approach . . . . . . . 3--5
Alma Riska and
Vesselin Diev and
Evgenia Smirni Efficient fitting of long-tailed data
sets into phase-type distributions . . . 6--8
Mor Harchol-Balter and
Karl Sigman and
Adam Wierman Understanding the slowdown of large jobs
in an M/GI/1 system . . . . . . . . . . 9--11
Leana Golubchik and
John C. S. Lui Multi-path streaming: is it worth the
trouble? . . . . . . . . . . . . . . . . 12--14
Y. Baryshnikov and
E. Coffman and
P. Jelenkovi\'c and
P. Mom\vcilovi\'c and
D. Rubenstein Flood search under the California split
strategy . . . . . . . . . . . . . . . . 15--16
Vladimir Marbukh Robust traffic engineering: game
theoretic perspective . . . . . . . . . 17--19
H. Benaboud and
A. Berqia and
N. Mikou An analytical study of CANIT algorithm
in TCP protocol . . . . . . . . . . . . 20--22
Ahmed E. Kamal Modeling TCP Reno with RED-based routers 23--25
Charalampos (Babis) Samios and
Mary K. Vernon Modeling throughput in TCP Vegas . . . . 26--28
Y. Chandramouli and
Arnold L. Neidhardt Mathematical analysis of the use of
application-level traffic measurements
for capacity engineering . . . . . . . . 29--31
Cathy H. Xia and
Zhen Liu and
Mark S. Squillante and
Li Zhang and
Naceur Malouch Traffic modeling and performance
analysis of commercial Web sites . . . . 32--34
Peter J. Haas and
Peter W. Glynn On the validity of long-run estimation
methods for discrete-event systems . . . 35--37
David Gamarnik Computing stationary probability
distributions and large deviation rates
for constrained random walks: the
undecidability results . . . . . . . . . 38--40
Peter G. Harrison Product-forms from a CAT and DOG . . . . 41--43
Mark Allman An evaluation of XML-RPC . . . . . . . . 2--11
Jon Weissman Guest editorial: special issue on grid
computing . . . . . . . . . . . . . . . 12--12
Valerie Taylor and
Xingfu Wu and
Rick Stevens Prophesy: an infrastructure for
performance analysis and modeling of
parallel and Grid applications . . . . . 13--18
Bruce B. Lowekamp Combining active and passive network
measurements to build scalable
monitoring systems on the Grid . . . . . 19--26
Allan Snavely and
Greg Chun and
Henri Casanova and
Rob F. Van der Wijngaart and
Michael A. Frumkin Benchmarks for Grid computing: a review
of ongoing efforts and future directions 27--32
Dong Lu and
Peter A. Dinda GridG: generating realistic
computational grids . . . . . . . . . . 33--40
Rich Wolski Experiences with predicting resource
performance on-line in computational
grid settings . . . . . . . . . . . . . 41--49
Sylvain Girbal and
Gilles Mouchard and
Albert Cohen and
Olivier Temam DiST: a simple, reliable and scalable
method to significantly reduce processor
architecture simulation time . . . . . . 1--12
Tor M. Aamodt and
Pedro Marcuello and
Paul Chow and
Antonio González and
Per Hammarlund and
Hong Wang and
John P. Shen A framework for modeling and
optimization of prescient instruction
prefetch . . . . . . . . . . . . . . . . 13--24
Cathy H. Xia and
Zhen Liu Queueing systems with long-range
dependent input process and
subexponential service times . . . . . . 25--36
Sebasti\`a Galmés and
Ramon Puigjaner An algorithm for computing the mean
response time of a single server queue
with generalized on/off traffic arrivals 37--46
Michele Garetto and
Don Towsley Modeling, simulation and measurements of
queuing delay under long-tail Internet
traffic . . . . . . . . . . . . . . . . 47--57
Stephan Bohacek and
João P. Hespanha and
Junsoo Lee and
Katia Obraczka A hybrid systems modeling framework for
fast and accurate simulation of data
communication networks . . . . . . . . . 58--69
Charalampos (Babis) Samios and
Mary K. Vernon Modeling the throughput of TCP Vegas . . 71--81
Jiantao Wang and
Ao Tang and
Steven H. Low Maximum and asymptotic UDP throughput
under CHOKe . . . . . . . . . . . . . . 82--90
Yong Liu and
Francesco Lo Presti and
Vishal Misra and
Don Towsley and
Yu Gu Fluid models and solutions for
large-scale IP networks . . . . . . . . 91--101
P. G. Harrison G-networks with propagating resets via
RCAT . . . . . . . . . . . . . . . . . . 3--5
Adam Wierman and
Takayuki Osogami and
Jörgen Olsén Modeling TCP-Vegas under on/off traffic 6--8
David Gamarnik and
John Hasenbein Weak instability in stochastic and fluid
queueing networks . . . . . . . . . . . 9--10
Flávio P. Duarte and
Edmundo de Souza e Silva and
Don Towsley An adaptive FEC algorithm using hidden
Markov chains . . . . . . . . . . . . . 11--13
Lachlan L. H. Andrew and
Yuliy Baryshnikov and
E. G. Coffman and
Stephen V. Hanly and
Jolyon White An asymptotically optimal greedy
algorithm for large optical burst
switching systems . . . . . . . . . . . 14--16
Vladimir Marbukh Towards mean field theory of wireless
networks . . . . . . . . . . . . . . . . 17--19
Sum Lam and
Rocky K. C. Chang Per-queue stability analysis of a
dynamic quota sharing scheme for
wireless networks . . . . . . . . . . . 20--22
Richard T. B. Ma and
C. M. Lee and
John C. S. Lui and
David K. Y. Yau Incentive P2P networks: a protocol to
encourage information sharing and
contribution . . . . . . . . . . . . . . 23--25
Eitan Bachmat On the performance of D-redundant
storage systems . . . . . . . . . . . . 26--27
Alma Riska and
Evgenia Smirni and
Gianfranco Ciardo An aggregation-based method for the
exact analysis of a class of GI/G/1-type
processes . . . . . . . . . . . . . . . 28--30
Wuqin Lin and
Zhen Liu and
Harry Stavropoulos and
Cathy H. Xia Hard deadline queueing system with
application to unified messaging service 31--33
Nikhil Bansal On the average sojourn time under
M/M/1/SRPT . . . . . . . . . . . . . . . 34--35
Hanhua Feng and
Vishal Misra Mixed scheduling disciplines for network
flows . . . . . . . . . . . . . . . . . 36--39
Soumyadip Ghosh and
Mark S. Squillante Revisiting correlations and scheduling
in Web servers . . . . . . . . . . . . . 40--42
Lance Titchkosky and
Martin Arlitt and
Carey Williamson A performance comparison of dynamic Web
technologies . . . . . . . . . . . . . . 2--11
Mark Allman and
Wesley M. Eddy and
Shawn Ostermann Estimating loss rates with TCP . . . . . 12--24
John R. Douceur Is remote host availability governed by
a universal law? . . . . . . . . . . . . 25--29
Paul Brebner and
Jeffrey Gosper J2EE infrastructure scalability and
throughput estimation . . . . . . . . . 30--36
Jike Cui and
Mansur. H. Samadzadeh A new hybrid approach to exploit
localities: LRFU with adaptive
prefetching . . . . . . . . . . . . . . 37--43
Doug Burger and
Anand Sivasubramaniam Tools for computer architecture research 2--3
Doug Burger and
Todd M. Austin and
Stephen W. Keckler Recent extensions to the SimpleScalar
Tool suite . . . . . . . . . . . . . . . 4--7
Patrick Bohrer and
James Peterson and
Mootaz Elnozahy and
Ram Rajamony and
Ahmed Gheith and
Ron Rockhold and
Charles Lefurgy and
Hazim Shafi and
Tarun Nakra and
Rick Simpson and
Evan Speight and
Kartik Sudeep and
Eric Van Hensbergen and
Lixin Zhang Mambo: a full system simulator for the
PowerPC architecture . . . . . . . . . . 8--12
David Brooks and
Pradip Bose and
Margaret Martonosi Power-performance simulation: design and
validation strategies . . . . . . . . . 13--18
Manish Vachharajani and
Neil Vachharajani and
David A. Penry and
Jason A. Blome and
David I. August The Liberty Simulation Environment,
version 1.0 . . . . . . . . . . . . . . 19--24
Greg Hamerly and
Erez Perelman and
Brad Calder How to use SimPoint to pick simulation
points . . . . . . . . . . . . . . . . . 25--30
Nikolaos Hardavellas and
Stephen Somogyi and
Thomas F. Wenisch and
Roland E. Wunderlich and
Shelley Chen and
Jangwoo Kim and
Babak Falsafi and
James C. Hoe and
Andreas G. Nowatzyk SimFlex: a fast, accurate, flexible
full-system simulation framework for
performance evaluation of server
architecture . . . . . . . . . . . . . . 31--34
Debasis Mitra Stochastic traffic engineering for
demand uncertainty and risk-aware
network revenue management . . . . . . . 1--1
Gabriel Marin and
John Mellor-Crummey Cross-architecture performance
predictions for scientific applications
using parameterized models . . . . . . . 2--13
Lan Huang and
Gang Peng and
Tzi-cker Chiueh Multi-dimensional storage virtualization 14--24
Stephen M. Blackburn and
Perry Cheng and
Kathryn S. McKinley Myths and realities: the performance
impact of garbage collection . . . . . . 25--36
Wei Jin and
Jeffrey S. Chase and
Jasleen Kaur Interposed proportional sharing for a
storage service utility . . . . . . . . 37--48
Augustin Soule and
Kavé Salamatia and
Nina Taft and
Richard Emilion and
Konstantina Papagiannaki Flow classification by histograms: or
how to go on safari in the Internet . . 49--60
Anukool Lakhina and
Konstantina Papagiannaki and
Mark Crovella and
Christophe Diot and
Eric D. Kolaczyk and
Nina Taft Structural analysis of network traffic
flows . . . . . . . . . . . . . . . . . 61--72
Augustin Soule and
Antonio Nucci and
Rene Cruz and
Emilio Leonardi and
Nina Taft How to identify and estimate the largest
traffic matrix elements in a dynamic
environment . . . . . . . . . . . . . . 73--84
Nick Duffield and
Carsten Lund and
Mikkel Thorup Flow sampling under hard resource
constraints . . . . . . . . . . . . . . 85--96
Samuli Aalto and
Urtzi Ayesta and
Eeva Nyberg-Oksanen Two-level processor-sharing scheduling
disciplines: mean delay analysis . . . . 97--105
Idris A. Rai and
Guillaume Urvoy-Keller and
Mary K. Vernon and
Ernst W. Biersack Performance analysis of LAS-based
scheduling disciplines in a packet
switched network . . . . . . . . . . . . 106--117
Peter Key and
Laurent Massoulié and
Bing Wang Emulating low-priority transport at the
application layer: a background transfer
service . . . . . . . . . . . . . . . . 118--129
David Raz and
Hanoch Levy and
Benjamin Avi-Itzhak A resource-allocation queueing fairness
measure . . . . . . . . . . . . . . . . 130--141
Vern Paxson Measuring adversaries . . . . . . . . . 142--142
Hwangnam Kim and
Jennifer C. Hou A fast simulation framework for IEEE
802.11-operated wireless LANs . . . . . 143--154
Fang Hao and
Murali Kodialam and
T. V. Lakshman ACCEL-RATE: a faster mechanism for
memory efficient per-flow traffic
estimation . . . . . . . . . . . . . . . 155--166
Martin Burtscher VPC3: a fast and effective
trace-compression algorithm . . . . . . 167--176
Abhishek Kumar and
Minho Sung and
Jun (Jim) Xu and
Jia Wang Data streaming algorithms for efficient
and accurate estimation of flow size
distribution . . . . . . . . . . . . . . 177--188
Richard T. B. Ma and
Sam C. M. Lee and
John C. S. Lui and
David K. Y. Yau A game theoretic approach to provide
incentive and service differentiation in
P2P networks . . . . . . . . . . . . . . 189--198
Simon S. Lam and
Huaiyu Liu Failure recovery for structured P2P
networks: protocol design and
performance evaluation . . . . . . . . . 199--210
Xiaoming Wang and
Yueping Zhang and
Xiafeng Li and
Dmitri Loguinov On zone-balancing of peer-to-peer
networks: analysis of random node join 211--222
Aman Kansal and
Dunny Potter and
Mani B. Srivastava Performance aware tasking for
environmentally powered sensor networks 223--234
Thomas Bonald and
Alexandre Prouti\`ere On performance bounds for the
integration of elastic and adaptive
streaming flows . . . . . . . . . . . . 235--245
Supratim Deb and
R. Srikant Rate-based versus queue-based models of
congestion control . . . . . . . . . . . 246--257
Kartikeya Chandrayana and
Shivkumar Kalyanaraman Uncooperative congestion control . . . . 258--269
David Applegate and
Lee Breslau and
Edith Cohen Coping with network failures: routing
strategies for optimal demand oblivious
restoration . . . . . . . . . . . . . . 270--281
Kenneth C. Sevcik Some systems, applications and models I
have known . . . . . . . . . . . . . . . 282--282
Peerapol Tinnakornsrisuphap and
Richard J. La Characterization of queue fluctuations
in probabilistic AQM mechanisms . . . . 283--294
Sarut Vanichpun and
Armand M. Makowski The output of a cache under the
independent reference model: where did
the locality of reference go? . . . . . 295--306
Renata Teixeira and
Aman Shaikh and
Tim Griffin and
Jennifer Rexford Dynamics of hot-potato routing in IP
networks . . . . . . . . . . . . . . . . 307--319
Sharad Agarwal and
Chen-Nee Chuah and
Supratik Bhattacharyya and
Christophe Diot The impact of BGP dynamics on
intra-domain traffic . . . . . . . . . . 319--330
Nick Feamster and
Jared Winick and
Jennifer Rexford A model of BGP routing for network
engineering . . . . . . . . . . . . . . 331--342
François Baccelli and
Augustin Chaintreau and
Danny De Vleeschauwer and
David McDonald A mean-field analysis of short lived
interacting TCP flows . . . . . . . . . 343--354
N. Hohn and
D. Veitch and
K. Papagiannaki and
C. Diot Bridging router performance and queuing
theory . . . . . . . . . . . . . . . . . 355--366
T. Bonald and
M. Jonckheere and
A. Proutiére Insensitive load balancing . . . . . . . 367--377
T. Bonald and
S. Borst and
N. Hegde and
A. Proutiére Wireless data performance in multi-cell
scenarios . . . . . . . . . . . . . . . 378--380
Rohit Kapoor and
Ling-Jyh Chen and
Alok Nandan and
Mario Gerla and
M. Y. Sanadidi CapProbe: a simple and accurate capacity
estimation technique for wired and
wireless environments . . . . . . . . . 390--391
Joel Sommers and
Hyungsuk Kim and
Paul Barford Harpoon: a flow-level traffic generator
for router and network tests . . . . . . 392--392
Vinay J. Ribeiro and
Rudolf H. Riedi and
Richard G. Baraniuk Spatio-temporal available bandwidth
estimation with STAB . . . . . . . . . . 394--395
Raj Kumar Rajendran and
Dan Rubenstein Optimizing the quality of scalable video
streams on P2P networks . . . . . . . . 396--397
Helen J. Wang and
John Platt and
Yu Chen and
Ruyun Zhang and
Yi-Min Wang PeerPressure for automatic
troubleshooting . . . . . . . . . . . . 398--399
Jörg Hähner and
Dominique Dudkowski and
Pedro José Marrón and
Kurt Rothermel A quantitative analysis of partitioning
in mobile ad hoc networks . . . . . . . 400--401
Dalu Zhang and
Weili Huang and
Chen Lin Locating the tightest link of a network
path . . . . . . . . . . . . . . . . . . 402--403
David G. Sullivan and
Margo I. Seltzer and
Avi Pfeffer Using probabilistic reasoning to
automate software tuning . . . . . . . . 404--405
Bing Wang and
Jim Kurose and
Prashant Shenoy and
Don Towsley Multimedia streaming via TCP: an
analytic performance study . . . . . . . 406--407
Laura Wynter and
Cathy H. Xia and
Fan Zhang Parameter inference of queueing models
for IT systems using end-to-end
measurements . . . . . . . . . . . . . . 408--409
Ben Pfaff Performance analysis of BSTs in system
software . . . . . . . . . . . . . . . . 410--411
Mengzhi Wang and
Kinman Au and
Anastassia Ailamaki and
Anthony Brockwell and
Christos Faloutsos and
Gregory R. Ganger Storage device performance prediction
with CART models . . . . . . . . . . . . 412--413
Abhinav Kamra and
Vishal Misra and
Erich Nahum Controlling the performance of 3-tiered
Web sites: modeling, design and
implementation . . . . . . . . . . . . . 414--415
Matthew Roughan and
Tim Griffin and
Morley Mao and
Albert Greenberg and
Brian Freeman Combining routing and traffic data for
detection of IP forwarding anomalies . . 416--417
Shu Tao and
Kuai Xu and
Ying Xu and
Teng Fei and
Lixin Gao and
Roch Guerin and
Jim Kurose and
Don Towsley and
Zhi-Li Zhang Exploring the performance benefits of
end-to-end path switching . . . . . . . 418--419
Scott F. Kaplan Complete or fast reference trace
collection for simulating
multiprogrammed workloads: choose one 420--421
Satish Raghunath and
Shivkumar Kalyanaraman and
K. K. Ramakrishnan Quantifying trade-offs in resource
allocation for VPNs . . . . . . . . . . 422--423
Yaoping Ruan and
Vivek S. Pai The origins of network server latency &
the myth of connection scheduling . . . 424--425
K. G. Anagnostakis and
M. B. Greenwald A hybrid direct-indirect estimator of
network internal delays . . . . . . . . 426--427
Niklas Carlsson and
Derek L. Eager and
Mary K. Vernon Multicast protocols for scalable
on-demand download . . . . . . . . . . . 428--429
Vijay S. Pai and
Scott Rixner and
Hyong-youb Kim Isolating the performance impacts of
network interface cards through
microbenchmarks . . . . . . . . . . . . 430--431
Jacky Chu and
Kevin Labonte and
Brian Neil Levine An evaluation of Chord using traces of
peer-to-peer file sharing . . . . . . . 432--433
Mark S. Squillante Guest Editor's foreword . . . . . . . . 2--2
Takayuki Osogami and
Adam Wierman and
Mor Harchol-Balter and
Alan Scheller-Wolf A recursive analysis technique for
multi-dimensionally infinite Markov
chains . . . . . . . . . . . . . . . . . 3--5
Ana Paula Couto da Silva and
Rosa M. M. Leäo and
Edmundo de Souza e Silva An efficient approximate technique for
solving fluid models . . . . . . . . . . 6--8
Yaakov Kogan and
Gagan Choudhury Two problems in Internet reliability:
new questions for old models . . . . . . 9--11
Adam Wierman and
Mor Harchol-Balter Formalizing SMART scheduling . . . . . . 12--13
David Raz and
Benjamin Avi-Itzhak and
Hanoch Levy How fair is queue prioritization? . . . 14--16
Hanhua Feng and
Vishal Misra On the relationship between coefficient
of variation and the performance of
M/G/1-FB queues . . . . . . . . . . . . 17--19
Junxia Chang and
Hayriye Ayhan and
Jim Dai Dynamic scheduling of multiclass open
queueing networks in a slowly changing
environment . . . . . . . . . . . . . . 20--21
Vladimir Marbukh A knowledge plane as a pricing mechanism
for aggregate, user-centric utility
maximization . . . . . . . . . . . . . . 22--24
Wuqin Lin and
Zhen Liu and
Cathy H. Xia and
Li Zhang Cost minimization of multi-tiered
e-business infrastructure with
end-to-end delay guarantees . . . . . . 25--27
Micah Adler and
Rakesh Kumar and
Keith Ross and
Dan Rubenstein and
David Turner and
David D. Yao Two optimal peer selection problems . . 28--30
E. G. Coffman and
Andreas Constantinides and
Dan Rubenstein and
Bruce Shepherd and
Angelos Stavrou Content distribution for seamless
transmission . . . . . . . . . . . . . . 31--32
David Gamarnik and
Petar Mom\vcilovi\'c An asymptotic optimality of the
transposition rule for linear lists . . 33--34
Yuliy Baryshnikov and
Ed Coffman and
Petar Mom\vcilovi\'c Self assembly times in DNA-based
computation . . . . . . . . . . . . . . 35--37
Iraj Saniee and
Indra Widjaja and
John Morrison Performance of a distributed scheduling
protocol for TWIN . . . . . . . . . . . 38--40
René Bekker and
Sem Borst and
Rudesindo Néñez-Queija Integration of TCP-friendly streaming
sessions and heavy-tailed elastic flows 41--43
Gijs van Kessel and
Rudesindo Núñez-Queija and
Sem Borst Asymptotic regimes and approximations
for discriminatory processor sharing . . 44--46
Yi Cui and
Yuan Xue and
Klara Nahrstedt Optimal distributed multicast routing
using network coding: theory and
applications . . . . . . . . . . . . . . 47--49
Xuan Li and
David D. Yao Control and pricing in stochastic
networks with concurrent resource
occupancy . . . . . . . . . . . . . . . 50--52
Xin Guo and
Yingdong Lu and
Mark S. Squillante Optimal probabilistic routing in
distributed parallel queues . . . . . . 53--54
Humberto T. Marques Neto and
Jussara M. Almeida and
Leonardo C. D. Rocha and
Wagner Meira and
Pedro H. C. Guerra and
Virgilio A. F. Almeida A characterization of broadband user
behavior and their e-business activities 3--13
Mauro Andreolini and
Michele Colajanni and
Riccardo Lancellotti and
Francesca Mazzoni Fine grain performance evaluation of
e-commerce sites . . . . . . . . . . . . 14--23
Monchai Sopitkamol Ranking configuration parameters in
multi-tiered e-commerce sites . . . . . 24--33
S. D'Antonio and
M. Esposito and
S. P. Romano and
G. Ventre Assessing the scalability of
component-based frameworks: the CADENUS
case study . . . . . . . . . . . . . . . 34--43
Tao Ye and
Shivkumar Kalyanaraman A recursive random search algorithm for
network parameter optimization . . . . . 44--53
Boudewijn R. Haverkort and
Joost-Pieter Katoen Performance and verification . . . . . . 3--3
Gianfranco Ciardo and
Andrew S. Miner Implicit data structures for logic and
stochastic systems analysis . . . . . . 4--9
Christel Baier and
Boudewijn R. Haverkort and
Holger Hermanns and
Joost-Pieter Katoen Model checking meets performance
evaluation . . . . . . . . . . . . . . . 10--15
Marta Kwiatkowska and
Gethin Norman and
David Parker Probabilistic model checking in
practice: case studies with PRISM . . . 16--21
Christel Baier and
Frank Ciesinski and
Marcus Größer ProbMela and verification of Markov
decision processes . . . . . . . . . . . 22--27
David N. Jansen and
Holger Hermanns QoS modelling and analysis with UML
statecharts: the StoCharts approach . . 28--33
Gerd Behrmann and
Kim G. Larsen and
Jacob I. Rasmussen Optimal scheduling using priced timed
automata . . . . . . . . . . . . . . . . 34--40
Annabelle McIver and
Carroll Morgan Abstraction and refinement in
probabilistic systems . . . . . . . . . 41--47
Urs Hoelzle Google: or how I learned to love
terabytes . . . . . . . . . . . . . . . 1--1
Laurent Massoulié and
Milan Vojnovi\'C Coupon replication systems . . . . . . . 2--13
Chunqiang Tang and
Melissa J. Buco and
Rong N. Chang and
Sandhya Dwarkadas and
Laura Z. Luan and
Edward So and
Christopher Ward Low traffic overlay networks with large
routing tables . . . . . . . . . . . . . 14--25
Derek Leonard and
Vivek Rai and
Dmitri Loguinov On lifetime-based node failure and
stochastic resilience of decentralized
peer-to-peer networks . . . . . . . . . 26--37
D. Dumitriu and
E. Knightly and
A. Kuzmanovic and
I. Stoica and
W. Zwaenepoel Denial-of-service resilience in
peer-to-peer file sharing systems . . . 38--49
Andrew W. Moore and
Denis Zuev Internet traffic classification using
Bayesian analysis techniques . . . . . . 50--60
Abhishek Kumar and
Minho Sung and
Jun (Jim) Xu and
Ellen W. Zegura A data streaming algorithm for
estimating subpopulation flow size
distribution . . . . . . . . . . . . . . 61--72
Edith Cohen and
Carsten Lund Packet classification in large ISPs:
design and evaluation of decision tree
classifiers . . . . . . . . . . . . . . 73--84
Ken Keys and
David Moore and
Cristian Estan A robust system for accurate real-time
summaries of Internet traffic . . . . . 85--96
Sunwoong Choi and
Kihong Park and
Chong-kwon Kim On the performance characteristics of
WLANs: revisited . . . . . . . . . . . . 97--108
Venkatesh Ramaiyan and
Anurag Kumar and
Eitan Altman Fixed point analysis of single cell IEEE
802.11e WLANs: uniqueness,
multistability and throughput
differentiation . . . . . . . . . . . . 109--120
Christoph Lindemann and
Oliver P. Waldhorst Modeling epidemic information
dissemination on mobile devices with
finite buffers . . . . . . . . . . . . . 121--132
V. S. Anil Kumar and
Madhav V. Marathe and
Srinivasan Parthasarathy and
Aravind Srinivasan Algorithmic aspects of capacity in
wireless networks . . . . . . . . . . . 133--144
Zhifeng Chen and
Yan Zhang and
Yuanyuan Zhou and
Heidi Scott and
Berni Schiefer Empirical evaluation of multi-level
buffer cache collaboration for storage
systems . . . . . . . . . . . . . . . . 145--156
Ali R. Butt and
Chris Gniady and
Y. Charlie Hu The performance impact of kernel
prefetching on buffer cache replacement
algorithms . . . . . . . . . . . . . . . 157--168
Erik Berg and
Erik Hagersten Fast data-locality profiling of native
execution . . . . . . . . . . . . . . . 169--180
Kamen Yotov and
Keshav Pingali and
Paul Stodghill Automatic measurement of memory
hierarchy parameters . . . . . . . . . . 181--192
M. Jonckheere and
J. Virtamo Optimal insensitive routing and
bandwidth sharing in simple data
networks . . . . . . . . . . . . . . . . 193--204
Adam Wierman and
Mor Harchol-Balter and
Takayuki Osogami Nearly insensitive bounds on SMART
scheduling . . . . . . . . . . . . . . . 205--216
A. Kortebi and
L. Muscariello and
S. Oueslati and
J. Roberts Evaluating the number of active flows in
a scheduler realizing fair statistical
bandwidth sharing . . . . . . . . . . . 217--228
Adam Wierman and
Mor Harchol-Balter Classifying scheduling policies with
respect to higher moments of conditional
response time . . . . . . . . . . . . . 229--240
Hao Jiang and
Constantinos Dovrolis Why is the Internet traffic bursty in
short time scales? . . . . . . . . . . . 241--252
Matthew Roughan Fundamental bounds on the accuracy of
network performance measurements . . . . 253--264
Manish Jain and
Constantinos Dovrolis End-to-end estimation of the available
bandwidth variation range . . . . . . . 265--276
Mung Chiang and
J. W. Lee and
R. Calderbank and
D. Palomar and
M. Fazel Network utility maximization with
nonconcave, coupled, and
reliability-based utilities . . . . . . 277--277
Mung Chiang and
Steven Low Optimization and Control of
Communication Networks . . . . . . . . . 277--277
Steven Low and
J. Doyle and
L. Li and
A. Tang and
J. Wang Optimization model of Internet protocols 277--277
Debasis Mitra Joint pricing-network design and
stochastic traffic engineering to manage
demand uncertainty . . . . . . . . . . . 278--278
John Musacchio and
Jean Walrand Achieving fair rates with ingress
policing . . . . . . . . . . . . . . . . 278--278
Ness Shroff and
Xiaojun Lin An optimization based approach for
cross-layer design in wireless
communication networks . . . . . . . . . 278--278
Florin Ciucu and
Almut Burchard and
Jörg Liebeherr A network service curve approach for the
stochastic analysis of networks . . . . 279--290
Bhuvan Urgaonkar and
Giovanni Pacifici and
Prashant Shenoy and
Mike Spreitzer and
Asser Tantawi An analytical model for multi-tier
Internet services and its applications 291--302
Yiyu Chen and
Amitayu Das and
Wubi Qin and
Anand Sivasubramaniam and
Qian Wang and
Natarajan Gautam Managing server energy and operational
costs in hosting centers . . . . . . . . 303--314
Yaoping Ruan and
Vivek S. Pai and
Erich Nahum and
John M. Tracey Evaluating the impact of simultaneous
multithreading on network servers using
real hardware . . . . . . . . . . . . . 315--326
Benoit Donnet and
Philippe Raoult and
Timur Friedman and
Mark Crovella Efficient algorithms for large-scale
topology discovery . . . . . . . . . . . 327--338
Z. Morley Mao and
Lili Qiu and
Jia Wang and
Yin Zhang On AS-level path inference . . . . . . . 339--349
Qi (George) Zhao and
Abhishek Kumar and
Jia Wang and
Jun (Jim) Xu Data streaming algorithms for accurate
and efficient measurement of traffic and
flow matrices . . . . . . . . . . . . . 350--361
Augustin Soule and
Anukool Lakhina and
Nina Taft and
Konstantina Papagiannaki and
Kave Salamatian and
Antonio Nucci and
Mark Crovella and
Christophe Diot Traffic matrices: balancing
measurements, inference and modeling . . 362--373
Saurabh Ganeriwal and
Deepak Ganesanl and
Mark Hansen and
Mani B. Srivastava and
Deborah Estrin Rate-adaptive time synchronization for
long-lived sensor networks . . . . . . . 374--375
An-I A. Wang and
Peter Reiher and
Geoff Kuenning Introducing permuted states for
analyzing conflict rates in optimistic
replication . . . . . . . . . . . . . . 376--377
James W. Mickens and
Brian D. Noble Predicting node availability in
peer-to-peer networks . . . . . . . . . 378--379
Lili Qiu and
Paramvir Bahl and
Ananth Rao and
Lidong Zhou Troubleshooting multihop wireless
networks . . . . . . . . . . . . . . . . 380--381
David Raz and
Benjamin Avi-Itzhak and
Hanoch Levy Fair operation of multi-server and
multi-queue systems . . . . . . . . . . 382--383
Eric Anderson and
Dirk Beyer and
Kamalika Chaudhuri and
Terence Kelly and
Norman Salazar and
Cipriano Santos and
Ram Swaminathan and
Robert Tarjan and
Janet Wiener and
Yunhong Zhou Deadline scheduling for animation
rendering . . . . . . . . . . . . . . . 384--385
Simin He and
Shutao Sun and
Wei Zhao and
Yanfeng Zheng and
Wen Gao Smooth switching problem in buffered
crossbar switches . . . . . . . . . . . 386--387
Qi He and
Constantinos Dovrolis and
Mostafa Ammar Prediction of TCP throughput:
formula-based and history-based methods 388--389
David Chua and
Eric D. Kolaczyk and
Mark Crovella A statistical framework for efficient
monitoring of end-to-end network
properties . . . . . . . . . . . . . . . 390--391
Ningning Zhu and
Jiawu Chen and
Tzi-cker Chiueh and
Daniel Ellard TBBT: scalable and accurate trace replay
for file server evaluation . . . . . . . 392--393
Sandeep Sarat and
Vasileios Pappas and
Andreas Terzis On the use of anycast in DNS . . . . . . 394--395
Jayaram Mudigonda and
Harrick M. Vin and
Raj Yavatkar Managing memory access latency in packet
processing . . . . . . . . . . . . . . . 396--397
Ashwin R. Bharambe and
Cormac Herley and
Venkata N. Padmanabhan Some observations on BitTorrent
performance . . . . . . . . . . . . . . 398--399
Sridhar Machiraju and
Darryl Veitch and
François Baccelli and
Antonio Nucci and
Jean C. Bolot Theory and practice of cross-traffic
estimation . . . . . . . . . . . . . . . 400--401
Daniel Stutzbach and
Reza Rejaie Characterizing the two-tier Gnutella
topology . . . . . . . . . . . . . . . . 402--403
Saurabh Tewari and
Leonard Kleinrock Analysis of search and replication in
unstructured peer-to-peer networks . . . 404--405
Jianyong Zhang and
Anand Sivasubramaniam and
Alma Riska and
Qian Wang and
Erik Riedel An interposed 2-Level I/O scheduling
framework for performance virtualization 406--407
Thomas F. Wenisch and
Roland E. Wunderlich and
Babak Falsafi and
James C. Hoe TurboSMARTS: accurate microarchitecture
simulation sampling in minutes . . . . . 408--409
Chunyu Hu and
Jennifer C. Hou A reactive channel model for expediting
wireless network simulation . . . . . . 410--411
Robin Groenevelt and
Philippe Nain and
Ger Koole Message delay in MANET . . . . . . . . . 412--413
Mark S. Squillante Special issue on the workshop on
MAthematical performance Modeling And
Analysis (MAMA 2005): Guest Editor's
foreword . . . . . . . . . . . . . . . . 2--2
Giovanna Carofiglio and
Rossano Gaeta and
Michele Garetto and
Paolo Giaccone and
Emilio Leonardi and
Matteo Sereno A statistical physics approach for
modelling P2P systems . . . . . . . . . 3--5
Ananth I. Sundararaj and
Manan Sanghi and
John R. Lange and
Peter A. Dinda An optimization problem in adaptive
virtual environments . . . . . . . . . . 6--8
David M. Nicol Optimized pre-copy calibration of hard
drives . . . . . . . . . . . . . . . . . 9--11
J. Kumaran and
K. Mitchell and
A. van de Liefvoort A spectral approach to compute
performance measures in a correlated
single server queue . . . . . . . . . . 12--14
Pierre M. Fiorini and
Robert Sheahan and
Lester Lipsky On unreliable computing systems when
heavy-tails appear as a result of the
recovery procedure . . . . . . . . . . . 15--17
Qi Zhang and
Armin Heindl and
Evgenia Smirni Models of the departure process of a
BMAP/MAP/1 queue . . . . . . . . . . . . 18--20
Krishna K. Ramachandran and
Biplab Sikdar A population based approach to model
network lifetime in wireless sensor
networks . . . . . . . . . . . . . . . . 21--23
Abhinav Kamra and
Jon Feldman and
Vishal Misra and
Dan Rubenstein Data persistence in sensor networks:
towards optimal encoding for data
recovery in partial network failures . . 24--26
Wenjie Jiang and
John C. S. Lui and
Dah-Ming Chiu Interaction of overlay networks:
properties and implications . . . . . . 27--29
Richard T. B. Ma and
Vishal Misra and
Dan Rubenstein Cooperative and non-cooperative models
for slotted-Aloha type MAC protocols . . 30--32
Michele Covell and
Sumit Roy and
Beomjoo Seo Predictive modeling of streaming servers 33--35
Mor Harchol-Balter and
Takayuki Osogami and
Alan Scheller-Wolf Robustness of threshold policies in
beneficiary-donor model . . . . . . . . 36--38
David Raz and
Benjamin Avi-Itzhak and
Hanoch Levy Locality of reference and the use of
sojourn time variance for measuring
queue unfairness: extended abstract . . 39--41
Yingdong Lu and
Mark S. Squillante Dynamic scheduling to optimize utility
functions of sojourn time moments in
queueing systems . . . . . . . . . . . . 42--44
Konstantina Papagiannaki and
Yin Zhang Guest Editor's foreword . . . . . . . . 2--2
Y. Chandramouli and
Arnold Neidhardt Analysis of network congestion inference
techniques . . . . . . . . . . . . . . . 3--9
Hal Burch and
Chris Chase Monitoring link delays with one
measurement host . . . . . . . . . . . . 10--17
Baek-Young Choi and
Supratik Bhattacharyya Observations on Cisco sampled NetFlow 18--23
Augustin Soule and
Kavé Salamatian and
Antonio Nucci and
Nina Taft Traffic matrix tracking using Kalman
filters . . . . . . . . . . . . . . . . 24--31
Ryan Lance and
Ian Frommer Round-trip time inference via passive
monitoring . . . . . . . . . . . . . . . 32--38
Earl Lawrence and
George Michailidis and
Vijay N. Nair Local area network analysis using
end-to-end delay tomography . . . . . . 39--45
Wenhong Tian The transient analysis of loss networks 46--50
Daniel Fiedler and
Kristen Walcott and
Thomas Richardson and
Gregory M. Kapfhammer and
Ahmed Amer and
Panos K. Chrysanthis Towards the measurement of tuple space
performance . . . . . . . . . . . . . . 51--62
Alma Riska and
Erik Riedel Guest Editor's foreword: bigger and
faster and smaller . . . . . . . . . . . 2--3
Kimberly Keeton and
Arif Merchant Challenges in managing dependable data
systems . . . . . . . . . . . . . . . . 4--10
Jianyong Zhang and
Prasenjit Sarkar and
Anand Sivasubramaniam Achieving completion time guarantees in
an opportunistic data migration scheme 11--16
Alexander Thomasian Multi-level RAID for very large disk
arrays . . . . . . . . . . . . . . . . . 17--22
Michael Mesnier and
Matthew Wachs and
Brandon Salmon and
Gregory R. Ganger Relative fitness models for storage . . 23--28
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau and
Lakshmi N. Bairavasundaram and
Timothy E. Denehy and
Florentina I. Popovici and
Vijayan Prabhakaran and
Muthian Sivathanu Semantically-smart disk systems: past,
present, and future . . . . . . . . . . 29--35
Eitan Bachmat and
Vladimir Braverman Batched disk scheduling with delays . . 36--41
Saman Zarandioon and
Alexander Thomasian Optimization of online disk scheduling
algorithms . . . . . . . . . . . . . . . 42--46
Daniel A. Reed Performance and reliability: the
ubiquitous challenge . . . . . . . . . . 1--2
Eno Thereska and
Brandon Salmon and
John Strunk and
Matthew Wachs and
Michael Abd-El-Malek and
Julio Lopez and
Gregory R. Ganger Stardust: tracking activity in a
distributed storage system . . . . . . . 3--14
Eduardo Pinheiro and
Ricardo Bianchini and
Cezary Dubnicki Exploiting redundancy to conserve energy
in storage systems . . . . . . . . . . . 15--26
Eytan Modiano and
Devavrat Shah and
Gil Zussman Maximizing throughput in wireless
networks via gossiping . . . . . . . . . 27--38
Yan Gao and
Dah-Ming Chiu and
John C. S. Lui Determining the end-to-end throughput
capacity in multi-hop networks:
methodology and applications . . . . . . 39--50
Can Emre Koksal and
Kyle Jamieson and
Emre Telatar and
Patrick Thiran Impacts of channel variability on
link-level throughput in wireless
networks . . . . . . . . . . . . . . . . 51--62
Arunesh Mishra and
Vivek Shrivastava and
Suman Banerjee and
William Arbaugh Partially overlapped channels not
considered harmful . . . . . . . . . . . 63--74
P. Lieshout and
M. Mandjes and
S. Borst GPS scheduling: selection of optimal
weights and comparison with strict
priorities . . . . . . . . . . . . . . . 75--86
H. Christian Gromoll and
Philippe Robert and
Bert Zwart and
Richard Bakker The impact of reneging in processor
sharing queues . . . . . . . . . . . . . 87--96
Chang-Woo Yang and
Adam Wierman and
Sanjay Shakkottai and
Mor Harchol-Balter Tail asymptotics for policies favoring
short jobs in a many-flows regime . . . 97--108
Thomas Bonald and
Aleksi Penttinen and
Jorma Virtamo On light and heavy traffic
approximations of balanced fairness . . 109--120
Han Hee Song and
Lili Qiu and
Yin Zhang NetQuest: a flexible framework for
large-scale network measurement . . . . 121--132
Qi Zhao and
Zihui Ge and
Jia Wang and
Jun Xu Robust traffic matrix estimation with
imperfect information: making use of
multiple data sources . . . . . . . . . 133--144
Ashwin Lall and
Vyas Sekar and
Mitsunori Ogihara and
Jun Xu and
Hui Zhang Data streaming algorithms for estimating
entropy of network traffic . . . . . . . 145--156
Sanghwan Lee and
Zhi-Li Zhang and
Sambit Sahu and
Debanjan Saha On suitability of Euclidean embedding of
Internet hosts . . . . . . . . . . . . . 157--168
Giuliano Casale An efficient algorithm for the exact
analysis of multiclass queueing networks
with large population sizes . . . . . . 169--180
J. Van Velthoven and
B. Van Houdt and
C. Blondia Transient analysis of tree-like
processes and its application to random
access systems . . . . . . . . . . . . . 181--190
Peter Buchholz Bounding stationary results of Tandem
networks with MAP input and PH service
time distributions . . . . . . . . . . . 191--202
Varun Gupta and
Mor Harchol-Balter and
Alan Scheller Wolf and
Uri Yechiali Fundamental characteristics of queues
with fluctuating load . . . . . . . . . 203--215
Satish Narayanasamy and
Cristiano Pereira and
Harish Patil and
Robert Cohn and
Brad Calder Automatic logging of operating system
effects to guide application-level
architecture simulation . . . . . . . . 216--227
Fei Guo and
Yan Solihin An analytical model for cache
replacement policy performance . . . . . 228--239
David Olshefski and
Jason Nieh Understanding the management of client
perceived response time . . . . . . . . 240--251
Mikkel Thorup Confidence intervals for priority
sampling . . . . . . . . . . . . . . . . 252--263
Takayuki Osogami and
Toshinari Itoko Finding probably better system
configurations quickly . . . . . . . . . 264--275
Thomas Bonald The Erlang model with non-Poisson call
arrivals . . . . . . . . . . . . . . . . 276--286
Markus Fidler and
Jens B. Schmitt On the way to a distributed systems
calculus: an end-to-end network calculus
with data scaling . . . . . . . . . . . 287--298
Enoch Peserico and
Larry Rudolph Robust network connectivity: when it's
the big picture that matters . . . . . . 299--310
Qunfeng Dong and
Suman Banerjee and
Jia Wang and
Dheeraj Agrawal and
Ashutosh Shukla Packet classifiers in ternary CAMs can
be smaller . . . . . . . . . . . . . . . 311--322
Qi Zhao and
Jun Xu and
Zhen Liu Design of a novel statistics counter
architecture with optimal space and time
efficiency . . . . . . . . . . . . . . . 323--334
Rakesh Kumar and
David D. Yao and
Amitabha Bagchi and
Keith W. Ross and
Dan Rubenstein Fluid modeling of pollution
proliferation in P2P networks . . . . . 335--346
Kang Li and
Zhenyu Zhong Fast statistical spam filter by
approximate classifications . . . . . . 347--358
George Kola and
Mary K. Vernon QuickProbe: available bandwidth
estimation in two roundtrips . . . . . . 359--360
Neena R. Kaushik and
Silvia M. Figueira and
Stephen A. Chiappari Flexible time-windows for advance
reservation in LambdaGrids . . . . . . . 361--362
Chad Verbowski and
Emre Kiciman and
Brad Daniels and
Yi-Min Wang and
Roussi Roussev and
Shan Lu and
Juhan Lee Analyzing persistent state interactions
to improve state management . . . . . . 363--364
Maaike Verloop and
Rudesindo Núñez-Queija and
Sem Borst Delay-optimal scheduling in
bandwidth-sharing networks . . . . . . . 365--366
Michael Menth and
Robert Henjes and
Christian Zepfel and
Sebastian Gehrsitz Throughput performance of popular JMS
servers . . . . . . . . . . . . . . . . 367--368
Rahul Garg and
Yogish Sabharwal Optimizing the HPCC randomaccess
benchmark on Blue Gene/L supercomputer 369--370
Tadeusz Piotrowski and
Suman Banerjee and
Sudeept Bhatnagar and
Samrat Ganguly and
Rauf Izmailov Peer-to-peer streaming of stored media:
the indirect approach . . . . . . . . . 371--372
Ajay Dholakia and
Evangelos Eleftheriou and
Xiao-Yu Hu and
Ilias Iliadis and
Jai Menon and
KK Rao Analysis of a new intra-disk redundancy
scheme for high-reliability RAID storage
systems in the presence of unrecoverable
errors . . . . . . . . . . . . . . . . . 373--374
Fred A. Bower and
Derek Hower and
Mahmut Yilmaz and
Daniel J. Sorin and
Sule Ozev Applying architectural vulnerability
Analysis to hard faults in the
microprocessor . . . . . . . . . . . . . 375--376
James A. Broberg and
Zhen Liu and
Cathy H. Xia and
Li Zhang A multicommodity flow model for
distributed stream processing . . . . . 377--378
T. Bonald Guest Editor's foreword . . . . . . . . 2--2
Sophie Hautphenne and
Kenji Leibnitz and
Marie-Ange Remiche Extinction probability in peer-to-peer
file diffusion . . . . . . . . . . . . . 3--4
J. Mundinger and
R. R. Weber and
G. Weiss Analysis of peer-to-peer file
dissemination amongst users of different
upload capacities . . . . . . . . . . . 5--6
Emmanuel Besson and
Aline Gouget and
Hervé Sibert The GAIA sensor: an early DDoS detection
tool . . . . . . . . . . . . . . . . . . 7--8
G. Hardy and
C. Lucet and
N. Limnios Probability of connection in regular
stochastic networks . . . . . . . . . . 9--10
Ana Bu\vsi\'c and
Jean-Michel Fourneau Bounding transient and steady-state
dependability measures through
algorithmic stochastic comparison . . . 11--12
Craig Bossie and
Pierre M. Fiorini On checkpointing and heavy-tails in
unreliable computing environments . . . 13--15
James W. Mickens and
Brian D. Noble Improving distributed system performance
using machine availability prediction 16--18
Andrzej Chydzinski Buffer overflow calculations in a batch
arrival queue . . . . . . . . . . . . . 19--21
Daniel A. Menascé and
Vasudeva Akula Evaluating caching policies for online
auctions . . . . . . . . . . . . . . . . 22--23
Jean-Marc Vincent and
Jérôme Vienne Perfect simulation of index based
routing queueing networks . . . . . . . 24--25
Cheng-Shang Chang and
Yi-Ting Chen and
Jay Cheng and
Po-Kai Huang and
Duan-Shin Lee From switching theory to `queueing'
theory . . . . . . . . . . . . . . . . . 26--28
Anastasios Giannoulis and
Konstantinos P. Tsoukatos and
Leandros Tassiulas Cross-layer power control in wireless
networks . . . . . . . . . . . . . . . . 29--31
Mark S. Squillante Foreword . . . . . . . . . . . . . . . . 2--2
Anastase Nakassis and
Vladimir Marbukh Towards power and QoS aware wireless
networks . . . . . . . . . . . . . . . . 3--5
Emine \cSule Yazici and
Selda Küçükçifçi and
Öznur Özkasap and
Mine Ça\uglar Exact probability distributions for
peer-to-peer epidemic information
diffusion . . . . . . . . . . . . . . . 6--8
Hao Luan and
Danny H. K. Tsang and
Kin Wah Kwong Media overlay construction via a Markov
chain Monte Carlo method . . . . . . . . 9--11
Jochen Mundinger and
Richard Weber and
Gideon Weiss Analysis of peer-to-peer file
dissemination . . . . . . . . . . . . . 12--14
David Raz and
Hanoch Levy and
Benjamin Avi-Itzhak On the twin measure and system
predictability and fairness . . . . . . 15--17
Patrick Brown Comparing FB and PS scheduling policies 18--20
Adam Wierman On the effect of inexact size
information in size based policies . . . 21--23
Robert Sheahan and
Lester Lipsky and
Pierre M. Fiorini and
Sòren Asmussen On the completion time distribution for
tasks that must restart from the
beginning if a failure occurs . . . . . 24--26
Fernando Silveira and
Edmundo de Souza e Silva Modeling the short-term dynamics of
packet losses . . . . . . . . . . . . . 27--29
Teunis J. Ott and
Jason Swanson Stationarity of some processes in
transport protocols . . . . . . . . . . 30--32
Yuliy Baryshnikov and
Ed Coffman and
Jing Feng and
Vishal Misra Free-Drop TCP . . . . . . . . . . . . . 33--35
G. Carofiglio and
C. Chiasserini and
M. Garetto and
E. Leonardi Analysis of route stability under the
random direction mobility model . . . . 36--38
Takayuki Osogami Finding probably best system
configurations quickly . . . . . . . . . 39--41
David D. Yao and
Heng-Qing Ye Asymptotic optimality of threshold
control in a stochastic network based on
a fixed-point approximation . . . . . . 42--44
Mohsen Bayati and
Mayank Sharma and
Mark S. Squillante Optimal scheduling in a multiserver
stochastic network . . . . . . . . . . . 45--47
Mahmoud Elhaddad and
Rami Melhem and
Taieb Znati Analysis of a transmission scheduling
algorithm for supporting bandwidth
guarantees in bufferless networks . . . 48--63
Mor Harchol-Balter Foreword . . . . . . . . . . . . . . . . 2--3
Adam Wierman Fairness and classifications . . . . . . 4--12
Onno Boxma and
Bert Zwart Tails in scheduling . . . . . . . . . . 13--20
Ernst W. Biersack and
Bianca Schroeder and
Guillaume Urvoy-Keller Scheduling in practice . . . . . . . . . 21--28
Thomas Bonald and
James Roberts Scheduling network traffic . . . . . . . 29--35
Samuli Aalto and
Urtzi Ayesta and
Sem Borst and
Vishal Misra and
Rudesindo Núñez-Queija Beyond processor sharing . . . . . . . . 36--43
Mark S. Squillante Stochastic analysis of multiserver
systems . . . . . . . . . . . . . . . . 44--51
Kirk Pruhs Competitive online scheduling for server
systems . . . . . . . . . . . . . . . . 52--58
Hui Li and
Michael Muskulus Analysis and modeling of job arrivals in
a production grid . . . . . . . . . . . 59--70
Ismail Kadayif and
Mahmut Kandemir Modeling and improving data cache
reliability: 1 . . . . . . . . . . . . . 12--12
Ajay Gulati and
Arif Merchant and
Peter J. Varman pClock: an arrival curve based approach
for QoS guarantees in shared storage
systems . . . . . . . . . . . . . . . . 13--24
Ravi Iyer and
Li Zhao and
Fei Guo and
Ramesh Illikkal and
Srihari Makineni and
Don Newell and
Yan Solihin and
Lisa Hsu and
Steve Reinhardt QoS policies and architecture for
cache/memory in CMP platforms . . . . . 25--36
Michael P. Mesnier and
Matthew Wachs and
Raja R. Sambasivan and
Alice X. Zheng and
Gregory R. Ganger Modeling the relative fitness of storage 37--48
Zhihua Wen and
Sipat Triukose and
Michael Rabinovich Facilitating focused Internet
measurements . . . . . . . . . . . . . . 49--60
Yiyi Huang and
Nick Feamster and
Anukool Lakhina and
Jim (Jun) Xu Diagnosing network disruptions with
network-wide analysis . . . . . . . . . 61--72
Himabindu Pucha and
Ying Zhang and
Z. Morley Mao and
Y. Charlie Hu Understanding network delay changes
caused by routing events . . . . . . . . 73--84
Abhishek Kashyap and
Sudipta Sengupta and
Randeep Bhatia and
M. Kodialam Two-phase routing, scheduling and power
control for wireless mesh networks with
variable traffic . . . . . . . . . . . . 85--96
Mariyam Mirza and
Joel Sommers and
Paul Barford and
Xiaojin Zhu A machine learning approach to TCP
throughput prediction . . . . . . . . . 97--108
Haakon Ringberg and
Augustin Soule and
Jennifer Rexford and
Christophe Diot Sensitivity of PCA for traffic anomaly
detection . . . . . . . . . . . . . . . 109--120
Seungjoon Lee and
Dave Levin and
Vijay Gopalakrishnan and
Bobby Bhattacharjee Backbone construction in selfish
wireless networks . . . . . . . . . . . 121--132
Cathy H. Xia and
Zhen Liu and
Don Towsley and
Marc Lelarge Scalability of fork/join queueing
networks with blocking . . . . . . . . . 133--144
Takayuki Osogami and
Sei Kato Optimizing system configurations quickly
by guessing at the performance . . . . . 145--156
Zhe Wang and
Wei Dong and
William Josephson and
Qin Lv and
Moses Charikar and
Kai Li Sizing sketches: a rank-based analysis
for similarity search . . . . . . . . . 157--168
Soyeon Park and
Weihang Jiang and
Yuanyuan Zhou and
Sarita Adve Managing energy-performance tradeoffs
for multithreaded applications on
multiprocessor architectures . . . . . . 169--180
Andrej Cvetkovski An algorithm for approximate counting
using limited memory resources . . . . . 181--190
Eric S. Lee and
Thom Whalen Synthetic designs: a new form of true
experimental design for use in
information systems development . . . . 191--202
Hanhua Feng and
Vishal Misra and
Dan Rubenstein PBS: a unified priority-based scheduler 203--214
Predrag R. Jelenkovic and
Xiaozhu Kang and
Jian Tan Adaptive and scalable comparison
scheduling . . . . . . . . . . . . . . . 215--226
Sandeep Bhadra and
Yingdong Lu and
Mark S. Squillante Optimal capacity planning in stochastic
loss networks with time-varying
workloads . . . . . . . . . . . . . . . 227--238
Jiaping Liu and
Alexandre Prouti\`ere and
Yung Yi and
Mung Chiang and
H. Vincent Poor Flow-level stability of data networks
with non-convex and time-varying rate
regions . . . . . . . . . . . . . . . . 239--250
Evgenia Smirni and
Frederica Darema and
Albert Greenberg and
Adolfy Hoisie and
Don Towsley Future directions in performance
evaluation research . . . . . . . . . . 251--252
Qunfeng Dong and
Suman Banerjee and
Jia Wang and
Dheeraj Agrawal Wire speed packet classification without
TCAMs: a few more registers (and a bit
of logic) are enough . . . . . . . . . . 253--264
Martin Hirzel Data layouts for object-oriented
programs . . . . . . . . . . . . . . . . 265--276
Fang Hao and
Murali Kodialam and
T. V. Lakshman Building high accuracy Bloom filters
using partitioned hashing . . . . . . . 277--288
Lakshmi N. Bairavasundaram and
Garth R. Goodson and
Shankar Pasupathy and
Jiri Schindler An analysis of latent sector errors in
disk drives . . . . . . . . . . . . . . 289--300
Arnaud Legout and
Nikitas Liogkas and
Eddie Kohler and
Lixia Zhang Clustering and sharing incentives in
BitTorrent systems . . . . . . . . . . . 301--312
Sujay Sanghavi and
Loc Bui and
R. Srikant Distributed link scheduling with
constant overhead . . . . . . . . . . . 313--324
Raj Kumar Rajendran and
Vishal Misra and
Dan Rubenstein Theoretical bounds on control-plane
self-monitoring in routing protocols . . 325--336
Xin Yuan and
Wickus Nienaber and
Zhenhai Duan and
Rami Melhem Oblivious routing for fat-tree based
system area networks with uncertain
traffic demands . . . . . . . . . . . . 337--348
Erich M. Nahum and
John Tracey and
Charles P. Wright Evaluating SIP server performance . . . 349--350
Thomas R. Puzak and
Allan Hartstein and
Viji Srinivasan and
Philip Emma and
Arthur Nadas Pipeline spectroscopy . . . . . . . . . 351--352
Edith Cohen and
Haim Kaplan Bottom-$k$ sketches: better and more
efficient estimation of aggregates . . . 353--354
Yu Gu and
Lee Breslau and
Nick G. Duffield and
Subhabrata Sen GRE encapsulated multicast probing: a
scalable technique for measuring one-way
loss . . . . . . . . . . . . . . . . . . 355--356
Jelena Mirkovic and
Alefiya Hussain and
Brett Willson and
Sonia Fahmy and
Wei-Min Yao and
Peter Reiher and
Stephen Schwab and
Roshan Thomas When is service really denied?: a
user-centric DoS metric . . . . . . . . 357--358
Lei Guo and
Enhua Tan and
Songqing Chen and
Zhen Xiao and
Xiaodong Zhang Does Internet media traffic really
follow Zipf-like distribution? . . . . . 359--360
Gerolf F. Hoflehner and
Darshan Desai and
Daniel M. Lavery and
Alexandru Nicolau and
Alexander V. Veidenbaum Comparative characterization of SPEC
CPU2000 and CPU2006 on Itanium\reg
architecture . . . . . . . . . . . . . . 361--362
Bin Lin and
Arindam Mallik and
Peter A. Dinda and
Gokhan Memik and
Robert P. Dick Power reduction through measurement and
modeling of users and CPUs: summary . . 363--364
Chong Wang and
John W. Byers Generating representative ISP topologies
from first-principles . . . . . . . . . 365--366
George Dean Bissias and
Brian Neil Levine and
Arnold Rosenberg Bounding damage from link destruction,
with application to the Internet . . . . 367--368
Jeffrey Erman and
Anirban Mahanti and
Martin Arlitt and
Ira Cohen and
Carey Williamson Semi-supervised network traffic
classification . . . . . . . . . . . . . 369--370
Ningfang Mi and
Alma Riska and
Qi Zhang and
Evgenia Smirni and
Erik Riedel Efficient management of idleness in
systems . . . . . . . . . . . . . . . . 371--372
Douglas V. de Jager and
Jeremy T. Bradley Asynchronous iterative solution for
state-based performance metrics . . . . 373--374
Kenneth Hoste and
Lieven Eeckhout and
Hendrik Blockeel Analyzing commercial processor
performance numbers for predicting
performance of applications of interest 375--376
Jiayue He and
Augustin Chaintreau BRADO: scalable streaming through
reconfigurable trees . . . . . . . . . . 377--378
Daniel Charles Nurmi and
John Brevik and
Rich Wolski QBETS: queue bounds estimation from time
series . . . . . . . . . . . . . . . . . 379--380
Leiwen Deng and
Aleksandar Kuzmanovic Pong: diagnosing spatio-temporal
Internet congestion properties . . . . . 381--382
Samuli Aalto and
Urtzi Ayesta Mean delay optimization for the M/G/1
queue with Pareto type service times . . 383--384
Mark S. Squillante Foreword . . . . . . . . . . . . . . . . 2--2
Gabriele Gianini and
Ernesto Damiani Poisson-noise removal in self-similarity
studies based on packet-counting:
factorial-moment/strip-integral approach 3--5
Vladimir Marbukh Fair bandwidth sharing under flow
arrivals/departures: effect of
retransmissions on stability and
performance . . . . . . . . . . . . . . 6--8
Takayuki Osogami Accuracy of measured throughputs and
mean response times . . . . . . . . . . 9--11
Varun Gupta and
Jim Dai and
Mor Harchol-Balter and
Bert Zwart The effect of higher moments of job size
distribution on the performance of an
M/G/s queueing system . . . . . . . . . 12--14
Tobias Hoßfeld and
Kenji Leibnitz and
Marie-Ange Remiche Modeling of an online TV recording
service . . . . . . . . . . . . . . . . 15--17
Peng Wang and
Stephan Bohacek An overview of tractable computation of
optimal scheduling and routing in mesh
networks . . . . . . . . . . . . . . . . 18--20
Florin Ciucu Exponential supermartingales for
evaluating end-to-end backlog bounds . . 21--23
Varun Gupta and
Karl Sigman and
Mor Harchol-Balter and
Ward Whitt Insensitivity for PS server farms with
JSQ routing . . . . . . . . . . . . . . 24--26
Giuliano Casale and
Eddy Z. Zhang and
Evgenia Smirni Characterization of moments and
autocorrelation in MAPs . . . . . . . . 27--29
Tony Field and
Peter Harrison Approximate analysis of a network of
fluid queues . . . . . . . . . . . . . . 30--32
Joshua Reich and
Vishal Misra and
Dan Rubenstein The time-correlated update problem . . . 33--35
W. N. Kang and
F. P. Kelly and
N. H. Lee and
R. J. Williams Product form stationary distributions
for diffusion approximations to a
flow-level model operating under a
proportional fair sharing policy . . . . 36--38
Yingdong Lu and
Ana Radovanovi\'c and
Mark S. Squillante Optimal capacity planning in stochastic
loss networks . . . . . . . . . . . . . 39--41
Ludmila Cherkasova and
Diwaker Gupta and
Amin Vahdat Comparison of the three CPU schedulers
in Xen . . . . . . . . . . . . . . . . . 42--51
Marco Ajmone Marsan and
Prashant Shenoy Foreword . . . . . . . . . . . . . . . . 2--3
M. Cesana and
L. Campelli and
F. Borgonovo Efficiency of physical carrier sensing
in wireless access networks . . . . . . 4--6
Juan-Carlos Cano and
José-Manuel Cano and
Eva González and
Carlos Calafate and
Pietro Manzoni How does energy consumption impact
performance in Bluetooth? . . . . . . . 7--9
Georg Lukas and
André Herms and
Daniel Mahrenholz Interval based off-line clock
synchronization for wireless mesh
networks . . . . . . . . . . . . . . . . 10--12
Andrzej Chydzinski Solving finite-buffer queues with
Markovian arrivals . . . . . . . . . . . 13--15
Gianfranco Ciardo and
Andrew S. Miner and
Min Wan and
Andy Jinqing Yu Approximating stationary measures of
structured continuous-time Markov models
using matrix diagrams . . . . . . . . . 16--18
Fernando Silveira and
Edmundo de Souza e Silva Predicting packet loss statistics with
hidden Markov models . . . . . . . . . . 19--21
Michael Menth and
Andreas Binzenhöfer and
Stefan Mühleck A note on source models for speech
traffic . . . . . . . . . . . . . . . . 22--24
Lorenzo Bracciale and
Francesca Lo Piccolo and
Dario Luzzi and
Stefano Salsano OPSS: an overlay peer-to-peer streaming
simulator for large-scale networks . . . 25--27
Kai Engels and
Ralf Heidger and
Reinhold Kroeger and
Morris Milekovic and
Jan Schaefer and
Markus Schmid and
Marcus Thoss eMIVA: tool support for the
instrumentation of critical distributed
applications . . . . . . . . . . . . . . 28--30
Parijat Dube and
Corinne Touati and
Laura Wynter Capacity planning, quality of service
and price wars . . . . . . . . . . . . . 31--33
Thomas Begin and
Alexandre Brandwajn and
Bruno Baynat and
Bernd E. Wolfinger and
Serge Fdida High-level approach to modeling of
observed system behavior . . . . . . . . 34--36
Vishal Misra Foreword . . . . . . . . . . . . . . . . 37--37
Wenbin Zhu and
Patrick G. Bridges and
Arthur B. Maccabe Light-weight application monitoring and
tuning with embedded gossip . . . . . . 38--39
Riadh M. Kortebi and
Yvon Gourhant and
Nazim Agoulmine Interference-aware SINR-based routing:
algorithms and evaluation . . . . . . . 40--42
Loc Bui and
R. Srikant and
Alexander Stolyar Optimal resource allocation for
multicast flows in multihop wireless
networks . . . . . . . . . . . . . . . . 43--43
Ningfang Mi Performance impacts of autocorrelated
flows in multi-tiered systems . . . . . 44--45
Neena Kaushik and
Silvia Figueira and
Stephen A. Chiappari Resource co-allocation using advance
reservations with flexible time-windows 46--48
Maaike Verloop and
Rudesindo Núñez-Queija Efficient resource allocation in
bandwidth-sharing networks . . . . . . . 49--50
D. I. Miretskiy and
W. R. W. Scheinhardt and
M. R. H. Mandjes Tandem queue with server slow-down . . . 51--52
Y. Volkovich and
D. Donato and
N. Litvak Stochastic models for Web ranking . . . 53--53
Anthony Hylick and
Andrew Rice and
Brian Jones and
Ripduman Sohan Hard drive power consumption uncovered 54--55
Ajay Gulati and
Peter Varman and
Arif Merchant and
Mustafa Uysal Towards fairness and efficiency in
storage systems . . . . . . . . . . . . 56--58
Simon Heimlicher and
Pavan Nuggehalli and
Martin May End-to-end vs. hop-by-hop transport . . 59--60
Sandoche Balakrichenan and
Thomas Bugnazet and
Monique Becker A simulation platform: for testing and
optimization of ENUM architecture . . . 61--63
Kathryn Mohror and
Karen L. Karavanic Scalable event-based performance
measurement in high-end environments . . 64--65
Claudio Vicari and
Chiara Petrioli and
Francesco Lo Presti Dynamic replica placement and traffic
redirection in content delivery networks 66--68
Fragkiskos Papadopoulos and
Konstantinos Psounis Predicting the performance of
Internet-like networks using scaled-down
replicas . . . . . . . . . . . . . . . . 69--71
Jawwad Shamsi and
Monica Brockmeyer PSON: predictable service overlay
networks . . . . . . . . . . . . . . . . 72--74
Stephen Gilmore and
Jane Hillston Foreword . . . . . . . . . . . . . . . . 2--2
Stephen Gilmore and
Jane Hillston Performance evaluation comes to life:
quantitative methods applied to
biological systems . . . . . . . . . . . 3--13
Marta Kwiatkowska and
Gethin Norman and
David Parker Using probabilistic model checking in
systems biology . . . . . . . . . . . . 14--21
Matthias Jeschke and
Roland Ewald and
Alfred Park and
Richard Fujimoto and
Adelinde M. Uhrmacher A parallel and distributed discrete
event approach for spatial
cell-biological simulations . . . . . . 22--31
Lorenzo Dematté and
Corrado Priami and
Alessandro Romanel Modelling and simulation of biological
processes in BlenX . . . . . . . . . . . 32--39
Joel Sommers and
Paul Barford and
Albert Greenberg and
Walter Willinger An SLA perspective on the router buffer
sizing problem . . . . . . . . . . . . . 40--51
Dmitry Korzun and
Andrei Gurtov A Diophantine model of routes in
structured P2P overlays . . . . . . . . 52--61
Fadi N. Sibai Evaluating the performance of single and
multiple core processors with
PCMARK\reg05 and benchmark analysis . . 62--71
Charles Bordenave and
David McDonald and
Alexandre Proutiere Performance of random medium access
control, an asymptotic approach . . . . 1--12
Giuliano Casale and
Ningfang Mi and
Evgenia Smirni Bound analysis of closed queueing
networks with workload burstiness . . . 13--24
Adam Wierman and
Misja Nuyens Scheduling despite inexact job-size
information . . . . . . . . . . . . . . 25--36
Marc Lelarge and
Jean Bolot Network externalities and the deployment
of security features and protocols in
the Internet . . . . . . . . . . . . . . 37--48
Eli Brosh and
Salman Abdul Baset and
Dan Rubenstein and
Henning Schulzrinne The delay-friendliness of TCP . . . . . 49--60
Changhoon Kim and
Alexandre Gerber and
Carsten Lund and
Dan Pei and
Subhabrata Sen Scalable VPN routing via relaying . . . 61--72
Dominique Tschopp and
Suhas Diggavi and
Matthias Grossglauser Hierarchical routing over dynamic
wireless networks . . . . . . . . . . . 73--84
Shravan Rayanchu and
Sayandeep Sen and
Jianming Wu and
Suman Banerjee and
Sudipta Sengupta Loss-aware network coding for unicast
wireless sessions: design,
implementation, and performance
evaluation . . . . . . . . . . . . . . . 85--96
Thomas Schmid and
Zainul Charbiwala and
Jonathan Friedman and
Young H. Cho and
Mani B. Srivastava Exploiting manufacturing variations for
compensating environment-induced clock
drift in time synchronization . . . . . 97--108
Edith Cohen and
Nick Duffield and
Carsten Lund and
Mikkel Thorup Confident estimation for multistage
measurement sampling and aggregation . . 109--120
Yi Lu and
Andrea Montanari and
Balaji Prabhakar and
Sarang Dharmapurikar and
Abdul Kabbani Counter braids: a novel counter
architecture for per-flow measurement 121--132
Animashree Anandkumar and
Chatschik Bisdikian and
Dakshi Agrawal Tracking in a spaghetti bowl: monitoring
transactions using footprints . . . . . 133--144
Harsh Singhal and
George Michailidis Optimal sampling in state space models
with applications to network monitoring 145--156
Stratis Ioannidis and
Peter Marbach On the design of hybrid peer-to-peer
systems . . . . . . . . . . . . . . . . 157--168
Minghua Chen and
Miroslav Ponec and
Sudipta Sengupta and
Jin Li and
Philip A. Chou Utility maximization in peer-to-peer
systems . . . . . . . . . . . . . . . . 169--180
Florian Simatos and
Philippe Robert and
Fabrice Guillemin A queueing system for modeling a file
sharing principle . . . . . . . . . . . 181--192
Sharon Goldberg and
David Xiao and
Eran Tromer and
Boaz Barak and
Jennifer Rexford Path-quality monitoring in the presence
of adversaries . . . . . . . . . . . . . 193--204
Pedram Pedarsani and
Daniel R. Figueiredo and
Matthias Grossglauser Densification arising from sampling
fixed graphs . . . . . . . . . . . . . . 205--216
Ricardo V. Oliveira and
Dan Pei and
Walter Willinger and
Beichuan Zhang and
Lixia Zhang In search of the elusive ground truth:
the Internet's as-level connectivity
structure . . . . . . . . . . . . . . . 217--228
Yungang Bao and
Mingyu Chen and
Yuan Ruan and
Li Liu and
Jianping Fan and
Qingbo Yuan and
Bo Song and
Jianwei Xu HMTT: a platform independent full-system
memory trace monitoring system . . . . . 229--240
Ilias Iliadis and
Robert Haas and
Xiao-Yu Hu and
Evangelos Eleftheriou Disk scrubbing versus intra-disk
redundancy for high-reliability raid
storage systems . . . . . . . . . . . . 241--252
Eno Thereska and
Gregory R. Ganger Ironmodel: robust performance models in
the wild . . . . . . . . . . . . . . . . 253--264
Alex X. Liu and
Fei Chen and
JeeHyun Hwang and
Tao Xie Xengine: a fast and scalable XACML
policy evaluation engine . . . . . . . . 265--276
Avishay Traeger and
Ivan Deras and
Erez Zadok DARC: dynamic analysis of root causes of
latency distributions . . . . . . . . . 277--288
Shiva Chaitanya and
Bhuvan Urgaonkar and
Anand Sivasubramaniam QDSL: a queuing model for systems with
differential service levels . . . . . . 289--300
Nadim Parvez and
Carey Williamson and
Anirban Mahanti and
Niklas Carlsson Analysis of BitTorrent-like protocols
for on-demand stored media streaming . . 301--312
Shao Liu and
Rui Zhang-Shen and
Wenjie Jiang and
Jennifer Rexford and
Mung Chiang Performance bounds for peer-assisted
live streaming . . . . . . . . . . . . . 313--324
Thomas Bonald and
Laurent Massoulié and
Fabien Mathieu and
Diego Perino and
Andrew Twigg Epidemic live streaming: optimal
performance trade-offs . . . . . . . . . 325--336
Jiang Lin and
Hongzhong Zheng and
Zhichun Zhu and
Eugene Gorbatov and
Howard David and
Zhao Zhang Software thermal management of DRAM
memory for multicore systems . . . . . . 337--348
Ishai Menache and
Nahum Shimkin Noncooperative power control and
transmission scheduling in wireless
collision channels . . . . . . . . . . . 349--358
Mahmut Kandemir and
Ozcan Ozturk Software-directed combined CPU/link
voltage scaling for NoC-based CMPs . . . 359--370
Igor Crk and
Mingsong Bi and
Chris Gniady Interaction-aware energy management for
wireless network cards . . . . . . . . . 371--382
Rade Stanojevi and
Robert Shorten Fully decentralized emulation of
best-effort and processor sharing queues 383--394
Srikanth Jagabathula and
Devavrat Shah Optimal delay scheduling in networks
with arbitrary constraints . . . . . . . 395--406
Kyomin Jung and
Yingdong Lu and
Devavrat Shah and
Mayank Sharma and
Mark S. Squillante Revisiting stochastic loss networks:
structures and algorithms . . . . . . . 407--418
Thomas Bonald and
Ali Ibrahim and
James Roberts Traffic capacity of multi-cell WLANS . . 419--430
Jan Reineke and
Daniel Grund Relative competitiveness of cache
replacement policies . . . . . . . . . . 431--432
Zhihua Wen and
Michael Rabinovich Network distance estimation with dynamic
landmark triangles . . . . . . . . . . . 433--434
Murat Yuksel and
Kadangode K. Ramakrishnan and
Shivkumar Kalyanaraman and
Joseph D. Houle and
Rita Sadhvani Class-of-service in IP backbones:
informing the network neutrality debate 435--436
Holger Dreger and
Anja Feldmann and
Vern Paxson and
Robin Sommer Predicting the resource consumption of
network intrusion detection systems . . 437--438
Bin Li and
Lu Peng and
Balachandran Ramadass Efficient MART-aided modeling for
microarchitecture design space
exploration and performance prediction 439--440
Simon Balon and
Guy Leduc Combined intra- and inter-domain traffic
engineering using hot-potato aware link
weights optimization . . . . . . . . . . 441--442
Eric W. Anderson and
Caleb T. Phillips and
Kevin S. Bauer and
Dirk C. Grunwald and
Douglas C. Sicker Modeling directionality in wireless
networks: extended abstract . . . . . . 443--444
Anat Bremler-Barr and
David Hay and
Danny Hendler and
Boris Farber Layered interval codes for TCAM-based
classification . . . . . . . . . . . . . 445--446
Sriram Ramabhadran and
Joseph Pasquale Durability of replicated distributed
storage systems . . . . . . . . . . . . 447--448
Feihui Li and
Mahmut Kandemir and
Mary J. Irwin Implementation and evaluation of a
migration-based NUCA design for chip
multiprocessors . . . . . . . . . . . . 449--450
Sara Alouf and
Eitan Altman and
Amar Prakash Azad M/G/1 queue with repeated inhomogeneous
vacations applied to IEEE 802.16e power
saving . . . . . . . . . . . . . . . . . 451--452
Srinivasan Seetharaman and
Mostafa H. Ammar Managing inter-domain traffic in the
presence of BitTorrent file-sharing . . 453--454
Edmar Mota-Garcia and
Rogelio Hasimoto-Beltran Clock offset estimation using
collaborative one-way transit time . . . 455--456
Gagan R. Gupta and
Ness B. Shroff Scheduling with queue length guarantees
for shared resource systems . . . . . . 457--458
Aiyou Chen and
Li Li and
Jin Cao Estimating cardinality distributions in
network traffic: extended abstract . . . 459--460
Laura E. Grit and
Jeffrey S. Chase Weighted fair sharing for dynamic
virtual clusters . . . . . . . . . . . . 461--462
Vasumathi Sundaram and
Abhishek Chandra and
Jon Weissman Exploring the throughput-fairness
tradeoff of deadline scheduling in
heterogeneous computing environments . . 463--464
Gabor Papp and
Chris GauthierDickey Characterizing multiparty voice
communication for multiplayer games . . 465--466
Chad R. Meiners and
Alex X. Liu and
Eric Torng Algorithmic approaches to redesigning
TCAM-based systems . . . . . . . . . . . 467--468
John R. Douceur Performance analysis in the real world 469--470
Tingxi Tan and
Rob Simmonds and
Bradley Arlt and
Martin Arlitt and
Bruce Walker Image management in a virtualized data
center . . . . . . . . . . . . . . . . . 4--9
Abhishek Chandra and
Rohini Prinja and
Sourabh Jain and
ZhiLi Zhang Co-designing the failure analysis and
monitoring of large-scale systems . . . 10--15
Abhishek B. Sharma and
Ranjita Bhagwan and
Monojit Choudhury and
Leana Golubchik and
Ramesh Govindan and
Geoffrey M. Voelker Automatic request categorization in
Internet services . . . . . . . . . . . 16--25
Aman Kansal and
Feng Zhao Fine-grained energy profiling for
power-aware application design . . . . . 26--31
Nahur Fonseca and
Mark Crovella and
Kavé Salamatian Long range mutual information . . . . . 32--37
Giuliano Casale and
Ningfang Mi and
Ludmila Cherkasova and
Evgenia Smirni How to parameterize models with bursty
workloads . . . . . . . . . . . . . . . 38--44
Bill Lin and
Jun (Jim) Xu DRAM is plenty fast for wirespeed
statistics counting . . . . . . . . . . 45--51
Nitin Agrawal and
Andrea C. Arpaci-Dusseau and
Remzi H. Arpaci-Dusseau Towards realistic file-system benchmarks
with CodeMRI . . . . . . . . . . . . . . 52--57
Elias Weingärtner and
Florian Schmidt and
Tobias Heer and
Klaus Wehrle Synchronized network emulation: matching
prototypes with complex simulations . . 58--63
Balachander Krishnamurthy and
Walter Willinger What are our standards for validation of
measurement-based networking research? 64--69
Roger Curry and
Cameron Kiddle and
Nayden Markatchev and
Rob Simmonds and
Tingxi Tan and
Martin Arlitt and
Bruce Walker Running applications efficiently in
online social networks . . . . . . . . . 71--74
Eddy Zheng Zhang and
Giuliano Casale and
Evgenia Smirni KPC-Toolbox: best recipes toward
automatization of workload fitting . . . 75--78
Daniel De Vera and
Pablo Rodríguez-Bocca and
Gerardo Rubino Automatic quality of experience
measuring on video delivering networks 79--82
Dario Rossi and
Silvio Valenti and
Paolo Veglia and
Dario Bonfiglio and
Marco Mellia and
Michela Meo Pictures from the Skype . . . . . . . . 83--86
Justin Ormont and
Jordan Walker and
Suman Banerjee Continuous monitoring of wide-area
wireless networks: data collection and
visualization . . . . . . . . . . . . . 87--89
Hicham Anouar and
Christian Bonnet and
Daniel Câmara and
Fethi Filali and
Raymond Knopp An overview of OpenAirInterface wireless
network emulation methodology . . . . . 90--94
Xiaoyue Jiang New perspectives on network calculus . . 95--97
Chaitanya Garikiparthi and
Appie van de Liefvoort and
Ken Mitchell Busy period analysis of finite QBD
processes . . . . . . . . . . . . . . . 98--100
Predrag R. Jelenkovi\'c and
Xiaozhu Kang Is fair resource sharing responsible for
spreading long delays? . . . . . . . . . 101--103
Varun Gupta Finding the optimal quantum size:
Sensitivity analysis of the \em M/G/1
round-robin queue . . . . . . . . . . . 104--106
Eitan Bachmat and
Hagit Sarfati Analysis of size interval task
assignment policies . . . . . . . . . . 107--109
Ho-Lin Chen and
Jason R. Marden and
Adam Wierman The effect of local scheduling in load
balancing designs . . . . . . . . . . . 110--112
Yuan Wu and
Danny H. K. Tsang Joint rate-and-power allocation for
multi-channel spectrum sharing networks 113--115
Pei Li and
John C. S. Lui and
Yinlong Xu A stochastic model for BitTorrent-like
systems . . . . . . . . . . . . . . . . 116--118
Predrag R. Jelenkovi\'c and
Xiaozhu Kang Characterizing the miss sequence of the
LRU cache . . . . . . . . . . . . . . . 119--121
Florian Simatos and
Danielle Tibi Study of a stochastic model for mobile
networks . . . . . . . . . . . . . . . . 122--124
Petar Mom\vcilovi\'c and
Mark S. Squillante On throughput in stochastic linear loss
networks . . . . . . . . . . . . . . . . 125--127
Varun Gupta and
Peter G. Harrison Fluid level in a reservoir with an
on-off source . . . . . . . . . . . . . 128--130
K. J. Kwak and
Y. M. Baryshnikov and
E. G. Coffman Self-assembling sweep-and-sleep sensor
systems . . . . . . . . . . . . . . . . 131--133
Giuliano Casale CoMoM: class-oriented evaluation of
multiclass models . . . . . . . . . . . 134--136
A. B. Dieker and
S. Ghosh and
M. S. Squillante Capacity optimization in feedforward
Brownian networks . . . . . . . . . . . 137--139
Boudewijn R. Haverkort and
Markus Siegle and
Maarten van Steen Quantitative analysis of gossiping
protocols . . . . . . . . . . . . . . . 2--2
Joost-Pieter Katoen How to model and analyze gossiping
protocols? . . . . . . . . . . . . . . . 3--6
Pepijn Crouzen and
Jaco van de Pol and
Arend Rensink Applying formal methods to gossiping
networks with mCRL and groove . . . . . 7--16
Marta Kwiatkowska and
Gethin Norman and
David Parker Analysis of a gossip protocol in PRISM 17--22
Thomas Krieger and
Martin Riedl and
Johann Schuster and
Markus Siegle A view-probability-matrix approach to
the modelling of gossiping protocols . . 23--30
Rena Bakhshi and
Lucia Cloth and
Wan Fokkink and
Boudewijn R. Haverkort MeanField analysis for the evaluation of
gossip protocols . . . . . . . . . . . . 31--39
Trilce Estrada and
Olac Fuentes and
Michela Taufer A distributed evolutionary method to
design scheduling policies for volunteer
computing . . . . . . . . . . . . . . . 40--49
Wesley M. Eddy Basic properties of the IPv6 AS-level
topology . . . . . . . . . . . . . . . . 50--57
Giuliano Casale and
Richard R. Muntz and
Giuseppe Serazzi Special issue on tools for computer
performance modeling and reliability
analysis . . . . . . . . . . . . . . . . 2--3
Soheib Baarir and
Marco Beccuti and
Davide Cerotti and
Massimiliano De Pierro and
Susanna Donatelli and
Giuliana Franceschinis The GreatSPN tool: recent enhancements 4--9
Marco Bertoli and
Giuliano Casale and
Giuseppe Serazzi JMT: performance engineering tools for
system modeling . . . . . . . . . . . . 10--15
Shravan Gaonkar and
Ken Keefe and
Ruth Lamprecht and
Eric Rozier and
Peter Kemper and
William H. Sanders Performance and dependability modeling
with Möbius . . . . . . . . . . . . . . . 16--21
Markus Arns and
Peter Buchholz and
Dennis Müller OPEDo: a tool for the optimization of
performance and dependability models . . 22--27
Mirco Tribastone and
Adam Duguid and
Stephen Gilmore The PEPA Eclipse plugin . . . . . . . . 28--33
Nicholas J. Dingle and
William J. Knottenbelt and
Tamas Suto PIPE2: a tool for the performance
evaluation of generalised stochastic
Petri Nets . . . . . . . . . . . . . . . 34--39
Marta Kwiatkowska and
Gethin Norman and
David Parker PRISM: probabilistic model checking for
performance and reliability analysis . . 40--45
Samuel Kounev and
Christofer Dutz QPME: a performance modeling tool based
on queueing Petri Nets . . . . . . . . . 46--51
Kisho S. Trivedi and
Robin Sahner SHARPE at the age of twenty two . . . . 52--57
Gianfranco Ciardo and
Andrew S. Miner and
Min Wan Advanced features in SMART: the
stochastic model checking analyzer for
reliability and timing . . . . . . . . . 58--63
Edmundo de Souza e Silva and
Daniel R. Figueiredo and
Rosa M. M. Leão The TANGRAMII integrated modeling
environment for computer systems and
networks . . . . . . . . . . . . . . . . 64--69
Marc Lelarge Efficient control of epidemics over
random networks . . . . . . . . . . . . 1--12
Abhinav Pathak and
Feng Qian and
Y. Charlie Hu and
Z. Morley Mao and
Supranamaya Ranjan Botnet spam campaigns can be long
lasting: evidence, implications, and
analysis . . . . . . . . . . . . . . . . 13--24
Ruben D. Torres and
Mohammad Y. Hajjat and
Sanjay G. Rao and
Marco Mellia and
Maurizio M. Munafo Inferring undesirable behavior from P2P
traffic analysis . . . . . . . . . . . . 25--36
Ashok Anand and
Chitra Muthukrishnan and
Aditya Akella and
Ramachandran Ramjee Redundancy in network traffic: findings
and implications . . . . . . . . . . . . 37--48
Yu Jin and
Esam Sharafuddin and
Zhi-Li Zhang Unveiling core network-wide
communication patterns through
application traffic activity graph
decomposition . . . . . . . . . . . . . 49--60
Venugopalan Ramasubramanian and
Dahlia Malkhi and
Fabian Kuhn and
Mahesh Balakrishnan and
Archit Gupta and
Aditya Akella On the treeness of Internet latency and
bandwidth . . . . . . . . . . . . . . . 61--72
Chad R. Meiners and
Alex X. Liu and
Eric Torng Topological transformation approaches to
optimizing TCAM-based packet
classification systems . . . . . . . . . 73--84
Kai Shen and
Christopher Stewart and
Chuanpeng Li and
Xin Li Reference-driven performance anomaly
identification . . . . . . . . . . . . . 85--96
Gagan R. Gupta and
Sujay Sanghavi and
Ness B. Shroff Node weighted scheduling . . . . . . . . 97--108
Augustin Chaintreau and
Jean-Yves Le Boudec and
Nikodin Ristanovic The age of gossip: spatial mean field
regime . . . . . . . . . . . . . . . . . 109--120
Shreeshankar Bodas and
Sanjay Shakkottai and
Lei Ying and
R. Srikant Scheduling in multi-channel wireless
networks: rate function optimality in
the small-buffer regime . . . . . . . . 121--132
Shreevatsa Rajagopalan and
Devavrat Shah and
Jinwoo Shin Network adiabatic theorem: an efficient
randomized protocol for contention
resolution . . . . . . . . . . . . . . . 133--144
Abhishek B. Sharma and
Leana Golubchik and
Ramesh Govindan and
Michael J. Neely Dynamic data compression in multi-hop
wireless networks . . . . . . . . . . . 145--156
Anshul Gandhi and
Mor Harchol-Balter and
Rajarshi Das and
Charles Lefurgy Optimal power allocation in server farms 157--168
Ayse K. Coskun and
Richard Strong and
Dean M. Tullsen and
Tajana Simunic Rosing Evaluating the impact of job scheduling
and power management on processor
lifetime for chip multiprocessors . . . 169--180
Feng Chen and
David A. Koufaty and
Xiaodong Zhang Understanding intrinsic characteristics
and system implications of flash memory
based solid state drives . . . . . . . . 181--192
Bianca Schroeder and
Eduardo Pinheiro and
Wolf-Dietrich Weber DRAM errors in the wild: a large-scale
field study . . . . . . . . . . . . . . 193--204
Ningfang Mi and
Alma Riska and
Xin Li and
Evgenia Smirni and
Erik Riedel Restrained utilization of idleness for
transparent scheduling of background
tasks . . . . . . . . . . . . . . . . . 205--216
Yi Wang and
Michael Schapira and
Jennifer Rexford Neighbor-specific BGP: more flexible
routing policies while improving global
stability . . . . . . . . . . . . . . . 217--228
Nikolaos Laoutaris and
Georgios Smaragdakis and
Pablo Rodriguez and
Ravi Sundaram Delay tolerant bulk data transfers on
the Internet . . . . . . . . . . . . . . 229--238
Wenjie Jiang and
Rui Zhang-Shen and
Jennifer Rexford and
Mung Chiang Cooperative content distribution and
traffic engineering in an ISP network 239--250
Edith Cohen and
Haim Kaplan Leveraging discarded samples for tighter
estimation of multiple-set aggregates 251--262
Patrick Loiseau and
Paulo Gonçalves and
Stéphane Girard and
Florence Forbes and
Pascale Vicat-Blanc Primet Maximum likelihood estimation of the
flow size distribution tail index from
sampled packet data . . . . . . . . . . 263--274
Tongqing Qiu and
Zihui Ge and
Seungjoon Lee and
Jia Wang and
Qi Zhao and
Jun Xu Modeling channel popularity dynamics in
a large IPTV system . . . . . . . . . . 275--286
Mor Harchol-Balter and
Alan Scheller-Wolf and
Andrew R. Young Surprising results on task assignment in
server farms with high-variability
workloads . . . . . . . . . . . . . . . 287--298
Thomas Sandholm and
Kevin Lai MapReduce optimization using regulated
dynamic prioritization . . . . . . . . . 299--310
Varun Gupta and
Mor Harchol-Balter Self-adaptive admission control policies
for resource-sharing systems . . . . . . 311--322
Björn Scheuermann and
Wolfgang Kiess Who said that?: the send-receive
correlation problem in network log
analysis . . . . . . . . . . . . . . . . 3--5
Animashree Anandkumar and
Chatschik Bisdikian and
Ting He and
Dakshi Agrawal Selectively retrofitting monitoring in
distributed systems . . . . . . . . . . 6--8
Abhishek Dubey and
Rajat Mehrotra and
Sherif Abdelwahed and
Asser Tantawi Performance modeling of distributed
multi-tier enterprise systems . . . . . 9--11
Chao Wang and
Xiaoli Ma Deriving Cramér--Rao bounds and maximum
likelihood estimators for traffic matrix
inference . . . . . . . . . . . . . . . 12--14
Dmitri Krioukov and
Fragkiskos Papadopoulos and
Marián Boguñá and
Amin Vahdat Greedy forwarding in scale-free networks
embedded in hyperbolic metric spaces . . 15--17
Jeong-woo Cho and
Yuming Jiang Basic theorems on the backoff process in
802.11 . . . . . . . . . . . . . . . . . 18--20
Jayakrishnan Nair and
Steven H. Low Optimal job fragmentation . . . . . . . 21--23
Erlin Yao and
Yungang Bao and
Guangming Tan and
Mingyu Chen Extending Amdahl's Law in the multicore
era . . . . . . . . . . . . . . . . . . 24--26
Dmitry Korzun and
Andrei Gurtov A local equilibrium model for P2P
resource ranking . . . . . . . . . . . . 27--29
Daniel Sadoc Menasché and
Antonio A. Aragão Rocha and
Edmundo de Souza e Silva and
Rosa M. Meri Leão and
Don Towsley and
Arun Venkataramani Modeling chunk availability in P2P
swarming systems . . . . . . . . . . . . 30--32
Oliver Hohlfeld and
Florin Ciucu Viewing impaired video transmissions
from a modeling perspective . . . . . . 33--35
Gagan R. Gupta and
Sujay Sanghavi and
Ness B. Shroff Workload optimality in switches without
arrivals . . . . . . . . . . . . . . . . 36--38
Lachlan L. H. Andrew and
Adam Wierman and
Ao Tang Optimal speed scaling under arbitrary
power functions . . . . . . . . . . . . 39--41
I. M. Verloop and
U. Ayesta and
R. Núñez-Queija Heavy-traffic analysis of the M/PH/1
discriminatory processor sharing queue
with phase-dependent weights . . . . . . 42--44
J. Anselmi and
Y. Lu and
M. Sharma and
M. S. Squillante Improved Approximations for Stochastic
Loss Networks . . . . . . . . . . . . . 45--47
Elias Weingärtner and
Florian Schmidt and
Tobias Heer and
Klaus Wehrle Time accurate integration of software
prototypes with event-based network
simulations . . . . . . . . . . . . . . 49--50
Haifeng Chen and
Wenxuan Zhang and
Guofei Jiang Experience transfer for the
configuration tuning in large scale
computing systems . . . . . . . . . . . 51--52
Bill Lin and
Jun (Jim) Xu and
Nan Hua and
Hao Wang and
Haiquan (Chuck) Zhao A randomized interleaved DRAM
architecture for the maintenance of
exact statistics counters . . . . . . . 53--54
Bridge Zhao and
y. K. Li and
John C. S. Lui and
Dah-Ming Chiu On modeling product advertisement in
social networks . . . . . . . . . . . . 55--56
Thomas Zahn and
Greg O'Shea and
Antony Rowstron An empirical study of flooding in mesh
networks . . . . . . . . . . . . . . . . 57--58
Sipat Triukose and
Zhihua Wen and
Michael Rabinovich Content delivery networks: how big is
big enough? . . . . . . . . . . . . . . 59--60
Zhibin Yu and
Hai Jin Simple and fast micro-architecture
simulation: a trisection Cantor fractal
approach . . . . . . . . . . . . . . . . 61--62
Peter Key and
Alexandre Proutiere Routing games with elastic traffic . . . 63--64
John R. Lange and
J. Scott Miller and
Peter A. Dinda EmNet: satisfying the individual user
through empathic home networks: summary 65--66
Alma Riska and
Erik Riedel Evaluation of disk-level workloads at
different time scales . . . . . . . . . 67--68
Vinith Reddy and
Younghoon Kim and
Srinivas Shakkottai and
A. L. Narasimha Reddy MultiTrack: a delay and cost aware P2P
overlay architecture . . . . . . . . . . 69--70
Sem Borst and
Varun Gupta and
Anwar Walid Self-organizing algorithms for cache
cooperation in content distribution
networks . . . . . . . . . . . . . . . . 71--72
Benjamin I. P. Rubinstein and
Blaine Nelson and
Ling Huang and
Anthony D. Joseph and
Shing-hon Lau and
Satish Rao and
Nina Taft and
J. D. Tygar Stealthy poisoning attacks on PCA-based
anomaly detectors . . . . . . . . . . . 73--74
Douglas G. Down and
H. Christian Gromoll and
Amber L. Puha State-dependent response times via fluid
limits in shortest remaining processing
time queues . . . . . . . . . . . . . . 75--76
Jianwei Chen and
Murali Annavaram and
Michel Dubois SlackSim: a platform for parallel
simulations of CMPs on CMPs . . . . . . 77--78
Ajay Gulati and
Arif Merchant and
Mustafa Uysal and
Pradeep Padala and
Peter Varman Efficient and adaptive proportional
share I/O scheduling . . . . . . . . . . 79--80
Yang Liu and
Linfeng Zhang and
Yong Guan A distributed data streaming algorithm
for network-wide traffic anomaly
detection . . . . . . . . . . . . . . . 81--82
François Baccelli and
Bruno Kauffmann and
Darryl Veitch Towards multihop available bandwidth
estimation . . . . . . . . . . . . . . . 83--84
Animesh Nandi and
Bobby Bhattacharjee and
Peter Druschel What a mesh: understanding the design
tradeoffs for streaming multicast . . . 85--86
Daniel Sadoc Menasche and
Antonio A. Aragao Rocha and
Bin Li and
Don Towsley and
Arun Venkataramani Modeling content availability in
peer-to-peer swarming systems . . . . . 87--88
Ravi Iyer and
Ramesh Illikkal and
Li Zhao and
Don Newell and
Jaideep Moses Virtual platform architectures for
resource metering in datacenters . . . . 89--90
Krishna Kant Challenges in distributed energy
adaptive computing . . . . . . . . . . . 3--7
Xinghao Pan and
Jiaqi Tan and
Soila Kavulya and
Rajeev Gandhi and
Priya Narasimhan Ganesha: black-box diagnosis of
MapReduce systems . . . . . . . . . . . 8--13
Ashok Anand and
Aditya Akella NetReplay: a new network primitive . . . 14--19
Daniele Crocey and
Marco Melliay and
Emilio Leonardiy The quest for bandwidth estimation
techniques for large-scale distributed
systems . . . . . . . . . . . . . . . . 20--25
Kimberly Keeton and
Pankaj Mehra and
John Wilkes Do you know your IQ?: a research agenda
for information quality in systems . . . 26--31
Giuliano Casale and
Amir Kalbasi and
Diwakar Krishnamurthy and
Jerry Rolia Automatically generating bursty
benchmarks for multitier systems . . . . 32--37
Joseph L. Hellerstein and
Vance Morrison and
Eric Eilebrecht Applying control theory in the real
world: experience with building a
controller for the .NET thread pool . . 38--42
Alma Riska and
Ningfang Mi and
Evgenia Smirni and
Giuliano Casale Feasibility regions: exploiting
tradeoffs between power and performance
in disk drives . . . . . . . . . . . . . 43--48
Walter Willinger and
Reza Rejaie and
Mojtaba Torkjazi and
Masoud Valafar and
Mauro Maggioni Research on online social networks: time
to face the real challenges . . . . . . 49--54
Omesh Tickoo and
Ravi Iyer and
Ramesh Illikkal and
Don Newell Modeling virtual machine performance:
challenges and approaches . . . . . . . 55--60
Ajay Gulati and
Chethan Kumar and
Irfan Ahmad Modeling workloads and devices for IO
load balancing in virtualized
environments . . . . . . . . . . . . . . 61--66
Damien Fay and
Hamed Haddadi and
Andrew W. Moore and
Richard Mortier and
Steve Uhlig and
Almerima Jamakovic A weighted spectrum metric for
comparison of Internet topologies . . . 67--72
Ramesh Illikkal and
Vineet Chadha and
Andrew Herdrich and
Ravi Iyer and
Donald Newell PIRATE: QoS and performance management
in CMP architectures . . . . . . . . . . 3--10
Parijat Dube and
Li Zhang and
David Daly and
Alan Bivens Performance of large low-associativity
caches . . . . . . . . . . . . . . . . . 11--18
Yaping Zhu and
Jennifer Rexford and
Subhabrata Sen and
Aman Shaikh Route Oracle: where have all the packets
gone? . . . . . . . . . . . . . . . . . 19--25
Bjoern Doebel and
Peter Nobel and
Eno Thereska and
Alice Zheng Towards versatile performance models for
complex, popular applications . . . . . 26--33
Asit K. Mishra and
Joseph L. Hellerstein and
Walfredo Cirne and
Chita R. Das Towards characterizing cloud backend
workloads: insights from Google compute
clusters . . . . . . . . . . . . . . . . 34--41
Martin Arlitt and
Keith Farkas and
Subu Iyer and
Preethi Kumaresan and
Sandro Rafaeli Systematically improving the quality of
IT utilization data . . . . . . . . . . 42--49
Jianying Hu and
Yingdong Lu and
Aleksandra Mojsilovi\'c and
Mayank Sharma and
Mark S. Squillante Performance management of IT services
delivery . . . . . . . . . . . . . . . . 50--57
Shuyi Chen and
Kaustubh R. Joshi and
Matti A. Hiltunen and
Richard D. Schlichting and
William H. Sanders Blackbox prediction of the impact of
DVFS on end-to-end performance of
multitier systems . . . . . . . . . . . 59--63
Manish Marwah and
Paulo Maciel and
Amip Shah and
Ratnesh Sharma and
Tom Christian and
Virgilio Almeida and
Carlos Araújo and
Erica Souza and
Gustavo Callou and
Bruno Silva and
Sérgio Galdino and
Jose Pires Quantifying the sustainability impact of
data center availability . . . . . . . . 64--68
Marco Ajmone Marsan and
Michela Meo Energy efficient management of two
cellular access networks . . . . . . . . 69--73
Paschalis Tsiaflakis and
Yung Yi and
Mung Chiang and
Marc Moonen Fair greening for DSL broadband access 74--78
Jason Ord and
Ellen Chappell and
Scott Canonico and
Tim Strecker Product environmental metrics for
printers . . . . . . . . . . . . . . . . 79--83
Steve Cayzer and
Chris Preist The sustainability hub: an information
management tool for analysis and
decision making . . . . . . . . . . . . 84--88
Eno Thereska and
Bjoern Doebel and
Alice X. Zheng and
Peter Nobel Practical performance models for
complex, popular applications . . . . . 1--12
Nicolas Gast and
Gaujal Bruno A mean field model of work stealing in
large-scale systems . . . . . . . . . . 13--24
Simonetta Balsamo and
Peter G. Harrison and
Andrea Marin A unifying approach to product-forms in
networks with finite capacity
constraints . . . . . . . . . . . . . . 25--36
Lachlan L. H. Andrew and
Minghong Lin and
Adam Wierman Optimality, fairness, and robustness in
speed scaling designs . . . . . . . . . 37--48
Wei Dong and
Yunhao Liu and
Xiaofan Wu and
Lin Gu and
Chun Chen Elon: enabling efficient and long-term
reprogramming for wireless sensor
networks . . . . . . . . . . . . . . . . 49--60
Amin Karbasi and
Sewoong Oh Distributed sensor network localization
from local connectivity: performance
analysis for the HOP-TERRAIN algorithm 61--70
Kuang Xu and
Olivier Dousse and
Patrick Thiran Self-synchronizing properties of CSMA
wireless multi-hop networks . . . . . . 71--82
Ciamac Moallemi and
Devavrat Shah On the flow-level dynamics of a
packet-switched network . . . . . . . . 83--94
P. Brighten Godfrey and
Michael Schapira and
Aviv Zohar and
Scott Shenker Incentive compatibility and dynamics of
congestion control . . . . . . . . . . . 95--106
Devavrat Shah and
Jinwoo Shin Dynamics in congestion games . . . . . . 107--118
Liping Xiang and
Yinlong Xu and
John C. S. Lui and
Qian Chang Optimal recovery of single disk failure
in RDP code storage systems . . . . . . 119--130
Saeed Ghanbari and
Gokul Soundararajan and
Cristiana Amza A query language and runtime tool for
evaluating behavior of multi-tier
servers . . . . . . . . . . . . . . . . 131--142
Ashish Goel and
Pankaj Gupta Small subset queries and bloom filters
using ternary associative memories, with
applications . . . . . . . . . . . . . . 143--154
Oren Laadan and
Nicolas Viennot and
Jason Nieh Transparent, lightweight application
execution replay on commodity
multiprocessor operating systems . . . . 155--166
Jian Ni and
R. Srikant and
Xinzhou Wu Coloring spatial point processes with
applications to peer discovery in large
wireless networks . . . . . . . . . . . 167--178
Peter M. van de Ven and
Augustus J. E. M. Janssen and
Johan S. H. van Leeuwaarden Optimal tradeoff between exposed and
hidden nodes in large wireless networks 179--190
Shihuan Liu and
Lei Ying and
R. Srikant Scheduling in multichannel wireless
networks with flow-level dynamics . . . 191--202
Devavrat Shah and
Tauhid Zaman Detecting sources of computer viruses in
networks: theory and experiment . . . . 203--214
Vishal Misra and
Stratis Ioannidis and
Augustin Chaintreau and
Laurent Massoulié Incentivizing peer-assisted services: a
fluid Shapley value approach . . . . . . 215--226
Yadi Ma and
Suman Banerjee and
Shan Lu and
Cristian Estan Leveraging parallelism for
multi-dimensional packet classification
on software routers . . . . . . . . . . 227--238
Devavrat Shah and
John N. Tsitsiklis and
Yuan Zhong Qualitative properties of $ \alpha
$-weighted scheduling policies . . . . . 239--250
Giuliano Casale and
Ningfang Mi and
Evgenia Smirni CWS: a model-driven scheduling policy
for correlated workloads . . . . . . . . 251--262
Haoqiang Zheng and
Jason Nieh RSIO: automatic user interaction
detection and scheduling . . . . . . . . 263--274
Maury Bramson and
Yi Lu and
Balaji Prabhakar Randomized load balancing with general
service time distributions . . . . . . . 275--286
Ayalvadi Ganesh and
Sarah Lilienthal and
D. Manjunath and
Alexandre Proutiere and
Florian Simatos Load balancing via random local search
in closed and open systems . . . . . . . 287--298
Haiquan (Chuck) Zhao and
Cathy H. Xia and
Zhen Liu and
Don Towsley A unified modeling framework for
distributed resource allocation of
general fork and join processing
networks . . . . . . . . . . . . . . . . 299--310
Stratis Ioannidis and
Laurent Massoulie and
Augustin Chaintreau Distributed caching over heterogeneous
mobile networks . . . . . . . . . . . . 311--322
Nelson Antunes and
Gonçalo Jacinto and
António Pacheco An analytical framework to infer
multihop path reliability in MANETs . . 323--332
Ed Coffman and
Philippe Robert and
Florian Simatos and
Shuzo Tarumi and
Gil Zussman Channel fragmentation in dynamic
spectrum access systems: a theoretical
study . . . . . . . . . . . . . . . . . 333--344
Jean-Claude Bermond and
Dorian Mazauric and
Vishal Misra and
Philippe Nain A distributed scheduling algorithm for
wireless networks with constant overhead
and arbitrary binary interference . . . 345--346
Guillaume Sagnol and
Mustapha Bouhtou and
Stéphane Gaubert Successive $c$-optimal designs: a
scalable technique to optimize the
measurements on large networks . . . . . 347--348
Rubén Cuevas and
Nikolaos Laoutaris and
Xiaoyuan Yang and
Georgos Siganos and
Pablo Rodriguez Deep diving into BitTorrent locality . . 349--350
Yu Jin and
Nick Duffield and
Patrick Haffner and
Subhabrata Sen and
Zhi-Li Zhang Inferring applications at the network
layer using collective traffic
statistics . . . . . . . . . . . . . . . 351--352
Jonatha Anselmi and
Bruno Gaujal The price of anarchy in parallel queues
revisited . . . . . . . . . . . . . . . 353--354
M. H. R. Khouzani and
Saswati Sarkar and
Eitan Altman Optimal propagation of security patches
in mobile wireless networks: extended
abstract . . . . . . . . . . . . . . . . 355--356
Kien Le and
Ozlem Bilgir and
Ricardo Bianchini and
Margaret Martonosi and
Thu D. Nguyen Managing the cost, energy consumption,
and carbon footprint of Internet
services . . . . . . . . . . . . . . . . 357--358
Asit K. Mishra and
Shekhar Srikantaiah and
Mahmut Kandemir and
Chita R. Das Coordinated power management of voltage
islands in CMPs . . . . . . . . . . . . 359--360
Hung X. Nguyen and
Matthew Roughan Rigorous statistical analysis of
Internet loss measurements . . . . . . . 361--362
Takayuki Osogami and
Rudy Raymond Semidefinite optimization for transient
analysis of queues . . . . . . . . . . . 363--364
Dongchul Park and
Biplob Debnath and
David Du CFTL: a convertible flash translation
layer adaptive to data access patterns 365--366
Feng Qian and
Abhinav Pathak and
Yu Charlie Hu and
Zhuoqing Morley Mao and
Yinglian Xie A case for unsupervised-learning-based
spam filtering . . . . . . . . . . . . . 367--368
Shreevatsa Rajagopalan and
Devavrat Shah Distributed averaging in dynamic
networks . . . . . . . . . . . . . . . . 369--370
Ruhi Sarikaya and
Canturk Isci and
Alper Buyuktosunoglu Program behavior prediction using a
statistical metric model . . . . . . . . 371--372
Devavrat Shah and
Jinwoo Shin Delay optimal queue-based CSMA . . . . . 373--374
Alex Shye and
Benjamin Scholbrock and
Gokhan Memik and
Peter A. Dinda Characterizing and modeling user
activity on smartphones: summary . . . . 375--376
Fernando Silveira and
Christophe Diot and
Nina Taft and
Ramesh Govindan Detecting traffic anomalies using an
equilibrium property . . . . . . . . . . 377--378
Niranjan Soundararajan and
Anand Sivasubramaniam and
Vijay Narayanan Characterizing the soft error
vulnerability of multicores running
multithreaded applications . . . . . . . 379--380
Jian Tan and
Wei Wei and
Bo Jiang and
Ness Shroff and
Don Towsley Can multipath mitigate power law
delays?: effects of parallelism on tail
performance . . . . . . . . . . . . . . 381--382
Dan-Cristian Tomozei and
Laurent Massoulié Distributed user profiling via spectral
methods . . . . . . . . . . . . . . . . 383--384
David K. George and
Cathy H. Xia Asymptotic analysis of closed queueing
networks and its implications to
achievable service levels . . . . . . . 3--5
Ana Buaic and
Varun Gupta and
Jean Mairesse Stability of the bipartite matching
model . . . . . . . . . . . . . . . . . 6--8
Ali Tizghadam and
Alberto Leon-Garcia On random walks in direction-aware
network problems . . . . . . . . . . . . 9--11
Minghong Lin and
Adam Wierman and
Bert Zwart The average response time in a
heavy-traffic SRPT queue . . . . . . . . 12--14
Karl Sigman and
Ward Whitt Heavy-traffic limits for nearly
deterministic queues . . . . . . . . . . 15--17
Heng-Qing Ye and
David D. Yao Diffusion limit of a two-class network:
stationary distributions and interchange
of limits . . . . . . . . . . . . . . . 18--20
José Niño-Mora Index policies for admission and routing
of soft real-time traffic to parallel
queues . . . . . . . . . . . . . . . . . 21--23
Philippe Robert and
Jim Roberts A mean field approximation for the
capacity of server-limited, gate-limited
multi-server polling systems . . . . . . 24--26
Yunan Liu and
Ward Whitt A fluid approximation for large-scale
service systems . . . . . . . . . . . . 27--29
Nicolas Gast and
Bruno Gaujal Mean field limit of non-smooth systems
and differential inclusions . . . . . . 30--32
Ana Radovanovi\'c and
Assaf Zeevi Revenue maximization through ``smart''
inventory management in
reservation-based online advertising . . 33--35
Jeong-woo Cho and
Jean-Yves Le Boudec and
Yuming Jiang On the validity of the fixed point
equation and decoupling assumption for
analyzing the 802.11 MAC protocol . . . 36--38
P. M. van de Ven and
S. C. Borst and
D. Denteneer and
A. J. E. M. Janssen and
J. S. H. van Leeuwaarden Equalizing throughputs in random-access
networks . . . . . . . . . . . . . . . . 39--41
Michel Marot and
Vincent Gauthier Reducing collision probability on a
shared medium using a variational method 42--44
Yingdong Lu and
Mark S. Squillante On approximations for multiple
multidimensional stochastic knapsacks 45--47
Anshul Gandhi and
Mor Harchol-Balter and
Ivo Adan Decomposition results for an M/M/k with
staggered setup . . . . . . . . . . . . 48--50
Ranjan Pal and
Leana Golubchik On the economics of information
security: the problem of designing
optimal cyber-insurance contracts . . . 51--53
Parijat Dube and
Li Zhang Resiliency of distributed clock
synchronization networks . . . . . . . . 54--56
Xiaozhou Li and
Mark Lillibridge and
Mustafa Uysal Reliability analysis of deduplicated and
erasure-coded storage . . . . . . . . . 4--9
Milind Kulkarni and
Vijay Pai and
Derek Schuff Towards architecture independent metrics
for multicore performance analysis . . . 10--14
Clayton Shepard and
Ahmad Rahmati and
Chad Tossell and
Lin Zhong and
Phillip Kortum LiveLab: measuring wireless networks and
smartphone users in the field . . . . . 15--20
Dongwoon Hahn and
Ginnah Lee and
Brenton Walker and
Matt Beecher and
Padma Mundur Using virtualization and live migration
in a scalable mobile wireless testbed 21--25
Srinivas Shakkottai and
Lei Ying and
Sankalp Sah Targeted coupon distribution using
social networks . . . . . . . . . . . . 26--30
Ragavendran Gopalakrishnan and
Jason R. Marden and
Adam Wierman An architectural view of game theoretic
control . . . . . . . . . . . . . . . . 31--36
Zhongmei Yao and
Daren B. H. Cline and
Dmitri Loguinov In-degree dynamics of large-scale P2P
systems . . . . . . . . . . . . . . . . 37--42
Diana Joumblatt and
Renata Teixeira and
Jaideep Chandrashekar and
Nina Taft HostView: annotating end-host
performance measurements with user
feedback . . . . . . . . . . . . . . . . 43--48
Vijay Kumar Adhikari and
Sourabh Jain and
Zhi-Li Zhang From traffic matrix to routing matrix:
PoP level traffic characteristics for a
Tier-1 ISP . . . . . . . . . . . . . . . 49--54
Martin Arlitt and
Niklas Carlsson and
Jerry Rolia Special issue on the 2010 GreenMetrics
workshop . . . . . . . . . . . . . . . . ??
Bhavani Krishnan and
Hrishikesh Amur and
Ada Gavrilovska and
Karsten Schwan VM power metering: feasibility and
challenges . . . . . . . . . . . . . . . 56--60
Steven Phillips and
Sheryl L. Woodward and
Mark D. Feuer and
Peter D. Magill A regression approach to infer
electricity consumption of legacy
telecom equipment . . . . . . . . . . . 61--65
Biplab Sikdar Environmental impact of IEEE 802.11
access points: a case study . . . . . . 66--70
Prabhakar T.V. and
Akshay Uttama Nambi S.N. and
Jamadagni H.S. and
Krishna Swaroop and
R. Venkatesha Prasad and
I. G. M. M. Niemegeers A novel DTN based energy neutral
transfer scheme for energy harvested WSN
Gateways . . . . . . . . . . . . . . . . 71--75
Alfio Lombardo and
Carla Panarello and
Giovanni Schembra Achieving energy savings and QoS in
Internet access routers . . . . . . . . 76--80
Aruna Prem Bianzino and
Anand Kishore Raju and
Dario Rossi Apples-to-apples: a framework analysis
for energy-efficiency in networks . . . 81--85
Curtis L. Janssen and
Helgi Adalsteinsson and
Joseph P. Kenny Using simulation to design extremescale
applications and architectures:
programming model exploration . . . . . 4--8
M. B. Giles and
G. R. Mudalige and
Z. Sharif and
G. Markall and
P. H. J. Kelly Performance analysis of the OP2
framework on many-core architectures . . 9--15
J. A. Herdman and
W. P. Gaudin and
D. Turland and
S. D. Hammond Benchmarking and modelling of POWER7,
Westmere, BG/P, and GPUs: an industry
case study . . . . . . . . . . . . . . . 16--22
S. J. Pennycook and
S. D. Hammond and
S. A. Jarvis and
G. R. Mudalige Performance analysis of a hybrid
MPI/CUDA implementation of the NASLU
benchmark . . . . . . . . . . . . . . . 23--29
Sandeep Budanur and
Frank Mueller and
Todd Gamblin Memory Trace Compression and Replay for
SPMD Systems using Extended PRSDs? . . . 30--36
A. F. Rodrigues and
K. S. Hemmert and
B. W. Barrett and
C. Kersey and
R. Oldfield and
M. Weston and
R. Risen and
J. Cook and
P. Rosenfeld and
E. CooperBalls and
B. Jacob The Structural Simulation Toolkit . . . 37--42
Ian Karlin and
Elizabeth Jessup and
Geoffrey Belter and
Jeremy G. Siek Parallel memory prediction for fused
linear algebra kernels . . . . . . . . . 43--49
Naohito Nakasato A fast GEMM implementation on the
Cypress GPU . . . . . . . . . . . . . . 50--55
Xingfu Wu and
Valerie Taylor Performance characteristics of hybrid
MPI/OpenMP implementations of NAS
parallel benchmarks SP and BT on
large-scale multicore supercomputers . . 56--62
Ming-yu Hsieh and
Arun Rodrigues and
Rolf Riesen and
Kevin Thompson and
William Song A framework for architecture-level
power, area, and thermal simulation and
its application to network-on-chip
design exploration . . . . . . . . . . . 63--68
O. Perks and
S. D. Hammond and
S. J. Pennycook and
S. A. Jarvis Should we worry about memory loss? . . . 69--74
Jeanine Cook and
Jonathan Cook and
Waleed Alkohlani A statistical performance model of the
Opteron processor . . . . . . . . . . . 75--80
Alexandre Tabbal and
Matthew Anderson and
Maciej Brodowicz and
Hartmut Kaiser and
Thomas Sterling Preliminary design examination of the
ParalleX system from a software and
hardware perspective . . . . . . . . . . 81--87
Simon McIntosh-Smith and
Terry Wilson and
Jon Crisp and
Amaurys Ávila Ibarra and
Richard B. Sessions Energy-aware metrics for benchmarking
heterogeneous systems . . . . . . . . . 88--94
Jian Chen and
Lizy Kurian John and
Dimitris Kaseridis Modeling program resource demand using
inherent program characteristics . . . . 1--12
Akbar Sharifi and
Shekhar Srikantaiah and
Asit K. Mishra and
Mahmut Kandemir and
Chita R. Das METE: meeting end-to-end QoS in
multicores through system-wide resource
management . . . . . . . . . . . . . . . 13--24
Yuanrui Zhang and
Mahmut Kandemir and
Taylan Yemliha Studying inter-core data reuse in
multicores . . . . . . . . . . . . . . . 25--36
Fang Liu and
Yan Solihin Studying the impact of hardware
prefetching and bandwidth partitioning
in chip-multiprocessors . . . . . . . . 37--48
Mohammad Alizadeh and
Abdul Kabbani and
Berk Atikoglu and
Balaji Prabhakar Stability analysis of QCN: the averaging
principle . . . . . . . . . . . . . . . 49--60
Vinay Joseph and
Gustavo de Veciana Stochastic networks with multipath flow
control: impact of resource pools on
flow-level performance and network
congestion . . . . . . . . . . . . . . . 61--72
Mohammad Alizadeh and
Adel Javanmard and
Balaji Prabhakar Analysis of DCTCP: stability,
convergence, and fairness . . . . . . . 73--84
Jinho Suh and
Mehrtash Manoochehri and
Murali Annavaram and
Michel Dubois Soft error benchmarking of L2 caches
with PARMA . . . . . . . . . . . . . . . 85--96
Martin Suchara and
Dahai Xu and
Robert Doverspike and
David Johnson and
Jennifer Rexford Network architecture for joint failure
recovery and traffic engineering . . . . 97--108
Dinesh Subhraveti and
Jason Nieh Record and transplay: partial
checkpointing for replay debugging
across heterogeneous systems . . . . . . 109--120
John N. Tsitsiklis and
Kuang Xu On the power of (even a little)
centralization in distributed processing 121--132
Thanh Nguyen and
Milan Vojnovic Weighted proportional allocation . . . . 133--144
Samuli Aalto and
Aleksi Penttinen and
Pasi Lassila and
Prajwal Osti On the optimal trade-off between SRPT
and opportunistic scheduling . . . . . . 145--155
Edith Cohen and
Graham Cormode and
Nick Duffield Structure-aware sampling on data streams 157--168
Satish Babu Korada and
Andrea Montanari and
Sewoong Oh Gossip PCA . . . . . . . . . . . . . . . 169--180
Rahul Urgaonkar and
Bhuvan Urgaonkar and
Michael J. Neely and
Anand Sivasubramaniam Optimal power cost management using
stored energy in data centers . . . . . 181--192
Zhenhua Liu and
Minghong Lin and
Adam Wierman and
Steven H. Low and
Lachlan L. H. Andrew Greening geographical load balancing . . 193--204
Giang T. K. Nguyen and
Rachit Agarwal and
Junda Liu and
Matthew Caesar and
P. Brighten Godfrey and
Scott Shenker Slick packets . . . . . . . . . . . . . 205--216
Simon S. Lam and
Chen Qian Geographic routing in $d$-dimensional
spaces with guaranteed delivery and low
stretch . . . . . . . . . . . . . . . . 217--228
Eric Rozner and
Mi Kyung Han and
Lili Qiu and
Yin Zhang Model-driven optimization of
opportunistic routing . . . . . . . . . 229--240
Maciej Kurant and
Minas Gjoka and
Carter T. Butts and
Athina Markopoulou Walking on a graph with a magnifying
glass: stratified sampling via weighted
random walks . . . . . . . . . . . . . . 241--252
Animashree Anandkumar and
Avinatan Hassidim and
Jonathan Kelner Topology discovery of sparse random
graphs with few participants . . . . . . 253--264
M. Zubair Shafiq and
Lusheng Ji and
Alex X. Liu and
Jia Wang Characterizing and modeling Internet
traffic dynamics of cellular devices . . 265--276
Qiang Xu and
Junxian Huang and
Zhaoguang Wang and
Feng Qian and
Alexandre Gerber and
Zhuoqing Morley Mao Cellular data network infrastructure
characterization and implication on
mobile content placement . . . . . . . . 277--288
Myungjin Lee and
Sharon Goldberg and
Ramana Rao Kompella and
George Varghese Fine-grained latency and loss
measurements in the presence of
reordering . . . . . . . . . . . . . . . 289--300
Xia Zhou and
Stratis Ioannidis and
Laurent Massoulie On the stability and optimality of
universal swarms . . . . . . . . . . . . 301--312
Patrick J. Eibl and
Albert Meixner and
Daniel J. Sorin An FPGA-based experimental evaluation of
microprocessor core error detection with
Argus-2 . . . . . . . . . . . . . . . . 313--314
Lele Zhang and
Darryl Veitch and
Kotagiri Ramamohanarao The role of KL divergence in anomaly
detection . . . . . . . . . . . . . . . 315--316
Elie Krevat and
Tomer Shiran and
Eric Anderson and
Joseph Tucek and
Jay J. Wylie and
Gregory R. Ganger Applying idealized lower-bound runtime
models to understand inefficiencies in
data-intensive computing . . . . . . . . 317--318
Jinyoung Han and
Taejoong Chung and
Seungbae Kim and
Ted Taekyoung Kwon and
Hyun-chul Kim and
Yanghee Choi How prevalent is content bundling in
BitTorrent? . . . . . . . . . . . . . . 319--320
Jia Rao and
Xiangping Bu and
Kun Wang and
Cheng-Zhong Xu Self-adaptive provisioning of
virtualized resources in cloud computing 321--322
Chao Li and
Amer Qouneh and
Tao Li Characterizing and analyzing renewable
energy driven data centers . . . . . . . 323--324
Varun Gupta and
Takayuki Osogami Tight moments-based bounds for queueing
systems . . . . . . . . . . . . . . . . 325--326
Suk-Bok Lee and
Dan Pei and
MohammadTaghi Hajiaghayi and
Ioannis Pefkianakis and
Songwu Lu and
He Yan and
Zihui Ge and
Jennifer Yates and
Mario Kosseifi Scalable monitoring via threshold
compression in a large operational $3$G
network . . . . . . . . . . . . . . . . 327--328
Vijay Kumar Adhikari and
Sourabh Jain and
Yingying Chen and
Zhi-Li Zhang How do you 'Tube'? . . . . . . . . . . . 329--330
Krishna Kant A control scheme for batching DRAM
requests to improve power efficiency . . 331--332
Hao Zhang and
Ziyu Shao and
Minghua Chen and
Kannan Ramchandran Optimal neighbor selection in
BitTorrent-like peer-to-peer networks 333--334
Sunghwan Ihm and
Vivek S. Pai Towards understanding modern Web traffic 335--336
Aditya Akella and
Shuchi Chawla and
Holly Esquivel and
Chitra Muthukrishnan De-ossifying Internet routing through
intrinsic support for end-network and
ISP selfishness . . . . . . . . . . . . 337--338
Yu-Ju Hong and
Jiachen Xue and
Mithuna Thottethodi Dynamic server provisioning to minimize
cost in an IaaS cloud . . . . . . . . . 339--340
Sadagopan Srinivasan and
Ravishankar Iyer and
Li Zhao and
Ramesh Illikkal HeteroScouts: hardware assist for OS
scheduling in heterogeneous CMPs . . . . 341--342
Bruno Ribeiro and
Daniel Figueiredo and
Edmundo de Souza e Silva and
Don Towsley Characterizing continuous-time random
walks on dynamic networks . . . . . . . 343--344
Jian Chen and
Lizy Kurian John Autocorrelation analysis: a new and
improved method for measuring branch
predictability . . . . . . . . . . . . . 345--346
Satinder Pal Singh and
Randolph Baden and
Choon Lee and
Bobby Bhattacharjee and
Richard La and
Mark Shayman IP geolocation in metropolitan areas . . 347--348
Jay Chen and
Janardhan Iyengar and
Lakshminarayanan Subramanian and
Bryan Ford TCP behavior in sub packet regimes . . . 349--350
Rhys Alistair Bowden and
Matthew Roughan and
Nigel Bean Network link tomography and compressive
sensing . . . . . . . . . . . . . . . . 351--352
Ajay Gulati and
Irfan Ahmad Storage technologies, management and
troubleshooting in virtualized
datacenters . . . . . . . . . . . . . . 353--354
Sudipta Sengupta Cloud data center networks:
technologies, trends, and challenges . . 355--356
Giuliano Casale Building accurate workload models using
Markovian arrival processes . . . . . . 357--358
Florin Ciucu Non-asymptotic capacity and delay
analysis of mobile wireless networks . . 359--360
Ahmed Elmokashfi and
Amund Kvalbein and
Constantine Dovrolis SIMROT: a scalable inter-domain routing
toolbox . . . . . . . . . . . . . . . . 4--13
Aritra Sen and
Ankit Garg and
Akshat Verma and
Tapan Nayak CloudBridge: on integrated
hardware-software consolidation . . . . 14--25
Jayakrishnan Nair and
Adam Wierman and
Bert Zwart Exploiting network effects in the
provisioning of large scale systems . . 26--28
James Nightingale and
Qi Wang and
Christos Grecos Performance evaluation of scalable video
streaming in multihomed mobile networks 29--31
N. Bouman and
S. C. Borst and
J. S. H. van Leeuwaarden Delay performance of backlog based
random access . . . . . . . . . . . . . 32--34
Seva Shneer and
Peter M. van de Ven Comparing slotted and continuous CSMA:
throughputs and fairness . . . . . . . . 35--37
Evgeny Shvets and
Andrey Lyakhov and
Alexander Safonov and
Evgeny Khorov Analytical model of IEEE 802.11s
MCCAbased streaming in the presence of
noise . . . . . . . . . . . . . . . . . 38--40
U. Ayesta and
A. Izagirre and
I. M. Verloop Heavy traffic analysis of the
discriminatory random-order-of-service
discipline . . . . . . . . . . . . . . . 41--43
M. A. A. Boon and
R. D. van der Mei and
E. M. M. Winands Queueing networks with a single shared
server: light and heavy traffic . . . . 44--46
Maria Frolkova and
Josh Reed and
Bert Zwart Fixed-point approximations of bandwidth
sharing networks with rate constraints 47--49
Maria Dolores Cano Improving path failure detection in SCTP
using adaptive heartbeat time intervals 50--52
Nuutti Varis and
Jukka Manner In the network: Sandy Bridge versus
Nehalem . . . . . . . . . . . . . . . . 53--55
Jonatha Anselmi Anselmi and
Bruno Gaujal On the efficiency of perfect simulation
in monotone queueing networks . . . . . 56--58
Y. M. Baryshnikov and
E. G. Coffman and
K. J. Kwak CAUCHY localization: a distributed
computation of WSNs . . . . . . . . . . 59--61
Oana Goga and
Patrick Loiseau and
Paulo Gonçalves On the impact of the flow size
distribution's tail index on network
performance with TCP connections . . . . 62--64
B. Van Houdt Load balancing and the power of
preventive probing . . . . . . . . . . . 65--67
Eitan Altman and
Rachid El Azouzi and
Daniel S. Menasché and
Yuedong Xu Poster: Aging control for smartphones in
hybrid networks . . . . . . . . . . . . 68--68
Hossein Kaffash Bokharaei and
Yashar Ganjali and
Ram Keralapura and
Antonio Nucci Poster: Telephony network
characterization for spammer
identification . . . . . . . . . . . . . 69--69
Joost Bosman and
Rob van der Mei and
Gerard Hoekstra Poster: Optimal dispatching policies for
parallel processor sharing nodes with
partial information . . . . . . . . . . 70--70
Ke Dong and
Diptanil DebBarma and
R. Venkatesha and
Prasad Cheng Guo Poster: Performance study of clustering
of Zigbee devices in OPNET . . . . . . . 71--71
Ralf Lübben and
Markus Fidler Poster: On the capacity delay error
tradeoff of source coding . . . . . . . 72--72
Vladimir Marbukh Poster: Tcp effective bandwidth and
Internet performance . . . . . . . . . . 73--73
William A. Massey and
Jamol Pender Poster: Skewness variance approximation
for dynamic rate MultiServer queues with
abandonment . . . . . . . . . . . . . . 74--74
Ashikur Rahman and
Carey Williamson Poster: $ \Delta $-Graphs: flexible
topology control in wireless ad hoc
networks . . . . . . . . . . . . . . . . 75--75
Ashikur Rahman and
Hanan Shpungin and
Carey Williamson Poster: On capacity maximization in
wireless relay networks . . . . . . . . 76--76
Paolo Romano and
Matteo Leonetti Poster: Selftuning batching in total
order broadcast via analytical modelling
and reinforcement learning . . . . . . . 77--77
Zhichao Yan and
Dan Feng and
Yujuan Tan Poster: Dissection the version
management schemes in hardware
transactional memory systems . . . . . . 78--78
Ricardo M. Czekster and
Paulo Fernandes and
Thais Webber Efficient vector-descriptor product
exploiting time-memory trade-offs! . . . 2--9
David J. Lilja and
Raffaela Mirandola and
Kai Sachs Paper abstracts of the second
international conference on performance
engineering (ICPE 2011) . . . . . . . . 2--9
Mark S. Squillante Instrumentation-based tool for latency
measurements (abstracts only) . . . . . 20--20
Dimitri Papadimitriou and
Florin Coras and
Albert Cabellos Path-vector routing stability analysis 22--24
Haotian Zhao and
Yinlong Xu A deterministic algorithm of single
failed node recovery in MSR-based
distributed storage systems . . . . . . 25--27
Siddharth Garg and
Shreyas Sundaram and
Hiren D. Patel Robust heterogeneous data center design:
a principled approach . . . . . . . . . 28--30
Ali Tizghadam and
Alberto Leon-Garcia and
Hassan Naser On robust wireless network optimization
using network criticality . . . . . . . 31--33
Marc Lelarge Diffusion and cascading behavior in
random networks . . . . . . . . . . . . 34--36
Omer H. Abdelrahman and
Erol Gelenbe Search in non-homogeneous random
environments? . . . . . . . . . . . . . 37--39
Hanhua Feng and
Parijat Dube and
Li Zhang On estimation problems for the $ G / G /
\infty $ Queue . . . . . . . . . . . . . 40--42
Sherwin Doroudi and
Ragavendran Gopalakrishnan and
Adam Wierman Dispatching to incentivize fast service
in multi-server queues . . . . . . . . . 43--45
Osman T. Akgun and
Rhonda Righter and
Ronald Wolff The power of partial power of two
choices . . . . . . . . . . . . . . . . 46--48
Ranjan Pal and
Sokol Kosta and
Pan Hui Settling for less: a QoS compromise
mechanism for opportunistic mobile
networks . . . . . . . . . . . . . . . . 49--51
Zichao Yang and
John C. S. Lui Investigating the effect of node
heterogeneity and network externality on
security adoption . . . . . . . . . . . 52--54
Daniel Sadoc Menasché and
Antonio A. de A. Rocha and
Edmundo A. de Souza e Silva and
Don Towsley and
Rosa M. Meri Leäo Implications of peer selection
strategies by publishers on the
performance of P2P swarming systems . . 55--57
Samuli Aalto and
Pasi Lassila and
Petri Savolainen and
Sasu Tarkoma How impatience affects the performance
and scalability of P2P video-on-demand
systems . . . . . . . . . . . . . . . . 58--60
Martin Arlitt and
Niklas Carlsson and
Jerry Rolia Proceedings of the 2011 GreenMetrics
workshop . . . . . . . . . . . . . . . . 58--60
Zhenhua Liu and
Minghong Lin and
Adam Wierman and
Steven H. Low and
Lachlan L. H. Andrew Geographical load balancing with
renewables . . . . . . . . . . . . . . . 62--66
Eitan Altman and
Manjesh K. Hanawal and
Rachid ElAzouzi and
Sholomo Shamai Tradeoffs in green cellular networks . . 67--71
Andrew Sucevic and
Lachlan L. H. Andrew and
Thuy T. T. Nguyen Powering down for energy efficient
peer-to-peer file distribution . . . . . 72--76
Michael Brown and
Jose Renau ReRack: power simulation for data
centers with renewable energy generation 77--81
Feng Yan and
Xenia Mountrouidou and
Alma Riska and
Evgenia Smirni Copy rate synchronization with
performance guarantees for work
consolidation in storage clusters . . . 82--86
Vishal Gupta and
Ripal Nathuji and
Karsten Schwan An analysis of power reduction in
datacenters using heterogeneous chip
multiprocessors . . . . . . . . . . . . 87--91
Giuliano Casale and
Ioan Raicu HPDC/SIGMETRICS student research posters 92--96
Doron Chen and
Ealan Henis and
Ronen I. Kat and
Dmitry Sotnikov and
Cinzia Cappiello and
Alexandre Mello Ferreira and
Barbara Pernici and
Monica Vitali and
Tao Jiang and
Jia Liu and
Alexander Kipp Usage centric green performance
indicators . . . . . . . . . . . . . . . 92--96
Yuanrui Zhang and
Jun Liu and
Sai Prashanth Muralidhara and
Mahmut Kandemir BrickX: building hybrid systems for
recursive computations . . . . . . . . . 98--100
Jeremy Blackburn and
Ramanuja Simha and
Clayton Long and
Xiang Zuo and
Nicolas Kourtellis and
John Skvoretz and
Adriana Iamnitchi Cheaters in a gaming social network . . 101--103
Anton Stefanek and
Richard A. Hayden and
Jeremy T. Bradley Fluid computation of the performance:
energy tradeoff in large scale Markov
models . . . . . . . . . . . . . . . . . 104--106
Shingyu Kim and
Junghee Won and
Hyuck Han and
Hyeonsang Eom and
Heon Y. Yeom Improving Hadoop performance in
intercloud environments . . . . . . . . 107--109
Yong Oh Lee Improving performance and energy savings
through alternative forwarding . . . . . 110--112
Seungmi Choi and
Shingyu Kim and
Hyuck Han and
Heon Y. Yeom Improving performance of MapReduce
framework on InterCloud by avoiding
transmission of unnecessary data . . . . 113--115
Hrishikesh Gadre and
Ivan Rodero and
Manish Parashar Investigating MapReduce framework
extensions for efficient processing of
geographically scattered datasets . . . 116--118
Richard A. Hayden Mean-field approximations for
performance models with generally-timed
transitions . . . . . . . . . . . . . . 119--121
Rohan Gandhi and
Dimitrios Koutsonikolas and
Y. Charlie Hu Multicasting MDC videos to receivers
with different screen resolution . . . . 122--124
Lina Sawalha and
Monte P. Tull and
Ronald D. Barnes Thread scheduling for heterogeneous
multicore processors using phase
identification . . . . . . . . . . . . . 125--127
Tonglin Li and
Raman Verma and
Xi Duan and
Hui Jin and
Ioan Raicu Exploring distributed hash tables in
HighEnd computing . . . . . . . . . . . 128--130
Philip F. Burdette and
William F. Jones and
Brian C. Blose and
Gregory M. Kapfhammer An empirical comparison of Java remote
communication primitives for intra-node
data transmission . . . . . . . . . . . 2--11
Sathish Gopalakrishnan Sharp utilization thresholds for some
realtime scheduling problems . . . . . . 12--22
Edward G. Coffman Synthesis of local-rule processes:
successes and challenges (abstract only) 24--24
Steven S. G. Kou First passage times and option pricing
under a mixed-exponential jump diffusion
model (abstract only) . . . . . . . . . 24--24
Marcel F. Neuts The algorithmization of mathematics: the
story of stochastic models (abstract
only) . . . . . . . . . . . . . . . . . 24--24
Devavrat Shah Product-form distributions and network
algorithms (abstract only) . . . . . . . 24--24
Jung Woo Baek and
Ho Woo Lee and
Se Won Lee and
Soohan Ahn Factorization properties for a
MAP-modulated fluid flow model under
server vacation policies (abstract only) 25--25
Mogens Bladt and
Luz Judith R. Esparza and
Bo Friis Nielsen Bilateral matrix-exponential
distributions (abstract only) . . . . . 25--25
Mogens Bladt and
Bo Friis Nielsen Moment distributions of phase-type
(abstract only) . . . . . . . . . . . . 25--26
Steve Drekic and
David Stanford and
Douglas Woolford A self-promoting priority model for
transplant queues (abstract only) . . . 26--26
Mark Fackrell Characterizing matrix-exponential
distributions of order $4$ (abstract
only) . . . . . . . . . . . . . . . . . 26--26
Sophie Hautphenne An EM algorithm for the model fitting of
Markovian binary trees (abstract only) 26--27
Sophie Hautphenne and
Guy Latouche and
Giang T. Nguyen Markovian trees subject to catastrophes:
would they survive forever? (abstract
only) . . . . . . . . . . . . . . . . . 27--27
Qi-Ming He and
Jiandong Ren On a discrete multi-variate phase-type
distribution and its applications
(abstract only) . . . . . . . . . . . . 27--27
Qi-Ming He and
Hanqin Zhang and
Juan Vera Majorization and Extremal
PH-Distributions (abstract only) . . . . 27--27
Gábor Horváth and
Miklós Telek Acceptance-rejection methods for
generating random variates from matrix
exponential distributions and rational
arrival processes (abstract only) . . . 27--27
Masahiro Kobayashi and
Yutaka Sakuma and
Masakiyo Miyazawa Tail asymptotics of the stationary
distribution for M/M-JSQ with $k$
parallel queues (abstract only) . . . . 28--28
A. Krishnamoorthy and
Viswanath C. Narayanan Stochastic decomposition in production
inventory with service time (abstract
only) . . . . . . . . . . . . . . . . . 28--28
Guy Latouche and
Giang T. Nguyen and
Zbigniew Palmowski Two-dimensional fluid queues with
temporary assistance (abstract only) . . 28--28
V. Ramaswami A fluid introduction to Brownian motion &
stochastic integration (abstract only) 29--29
Nikki Sonenberg and
Peter G. Taylor A network of fluid models and its
application in MANETs (abstract only) 29--29
David Stanford and
Peter G. Taylor and
Ilze Ziedins A new paradigm for priority patient
selection (abstract only) . . . . . . . 29--29
Hiroshi Toyoizumi and
Jeremy Field Analysis of the dynamics of social
queues by quasi-birth-and-death
processes (abstract only) . . . . . . . 29--30
B. Van Houdt and
J. F. Pérez The impact of dampening demand
variability in a production/inventory
system with multiple retailers (abstract
only) . . . . . . . . . . . . . . . . . 30--30
Nigel G. Bean and
Bo Friis Nielsen Analysis of queues with rational arrival
process components: a general approach 31--31
Nigel G. Bean and
Ma\lgorzata M. O'Reilly A stochastic fluid model driven by an
uncountable-state process, which is a
stochastic fluid model itself: the
stochastic fluid-fluid model . . . . . . 32--32
Dario A. Bini and
Paola Favati and
Beatrice Meini A compressed cyclic reduction for QBDs
with low rank upper and lower
transitions . . . . . . . . . . . . . . 33--33
Mogens Bladt and
Bo Friis Nielsen An overview of multivariate gamma
distributions as seen from a
(multivariate) matrix exponential
perspective . . . . . . . . . . . . . . 34--34
Jose Blanchet and
Jing Dong Rare-event simulation for multi-server
queues in the Halfin--Whitt regime . . . 35--35
Giuliano Casale and
Peter G. Harrison and
Maria Grazia Vigliotti Product-form approximation of queueing
networks with phase-type service . . . . 36--36
J. G. Dai and
Shuangchi He Numerical analysis for diffusion models
of GI/Ph/n $+$ GI queues . . . . . . . . 37--37
Eric V. Denardo and
Eugene A. Feinberg and
Uriel G. Rothblum Splitting in a finite Markov decision
problem . . . . . . . . . . . . . . . . 38--38
Eric V. Denardo and
Eugene A. Feinberg and
Uriel G. Rothblum The multi-armed bandit, with constraints 39--39
S. Dendievel and
G. Latouche and
M-A. Remiche Stationary distribution of a perturbed
QBD process . . . . . . . . . . . . . . 40--40
Maria Govorun and
Guy Latouche and
Marie-Ange Remiche Profits and risks of pension plans . . . 41--41
Masahiro Kobayashi and
Masakiyo Miyazawa Revisit to the tail asymptotics of the
double QBD process by the analytic
function method . . . . . . . . . . . . 42--42
Yunan Liu and
Ward Whitt A fluid model for many-server queues
with time-varying arrivals and
phase-type service distribution . . . . 43--43
Barbara Margolius Numerical study of Markovian arrival
processes (MAP) with time-varying
periodic arrival rates . . . . . . . . . 44--44
Ma\lgorzata M. O'Reilly and
Nigel G. Bean Stochastic 2-dimensional fluid model . . 45--45
D. Bini and
B. Meini and
S. Steffé and
J. F. Pérez and
B. Van Houdt SMCSolver and Q-MAM: tools for
matrix-analytic methods . . . . . . . . 46--46
Giuliano Casale and
Evgenia Smirni KPC-toolbox: fitting Markovian arrival
processes and phase-type distributions
with MATLAB . . . . . . . . . . . . . . 47--47
Marco Cote and
German Riano and
Raha Akhavan-Tabatabaei and
Juan Fernando Perez and
Andres Sarmiento and
Julio Goez jMarkov package: a stochastic modeling
tool . . . . . . . . . . . . . . . . . . 48--48
Sara Casolari and
Michele Colajanni and
Stefania Tosi Selective resource characterization for
evaluation of system dynamics . . . . . 51--60
Giuseppe Aceto and
Antonio Pescap\`e On the recent use of email through
traffic and network analysis: the impact
of OSNs, new trends, and other
communication platforms . . . . . . . . 61--70
Salvatore Distefano and
Antonio Puliafito and
Kishor S. Trivedi Dynamic aspects and behaviors of complex
systems in performance and reliability
assessment . . . . . . . . . . . . . . . 71--78
Nidhal Mahmud and
Martin Walker and
Yiannis Papadopoulos Compositional synthesis of temporal
fault trees from state machines . . . . 79--88
Marco Abundo and
Valeria Cardellini and
Francesco Lo Presti Admission control policies for a
multi-class QoS-aware service oriented
architecture . . . . . . . . . . . . . . 89--98
Vittoria de Nitto Person\`a Heuristics for QoS maintenance: adaptive
policies in differentiated services
wireless networks . . . . . . . . . . . 99--107
Emmanuelle Anceaume and
Romaric Ludinard and
Bruno Sericola Performance evaluation of large-scale
dynamic systems . . . . . . . . . . . . 108--117
Naresh M. Patel Performance implications of flash and
storage class memories . . . . . . . . . 1--2
Zhen Liu High-performance computing in mobile
services . . . . . . . . . . . . . . . . 3--4
Jian Tan and
Xiaoqiao Meng and
Li Zhang Delay tails in MapReduce scheduling . . 5--16
Devavrat Shah and
Neil Walton and
Yuan Zhong Optimal queue-size scaling in switched
networks . . . . . . . . . . . . . . . . 17--28
Esa Hyytiä and
Samuli Aalto and
Aleksi Penttinen Minimizing slowdown in heterogeneous
size-aware dispatching systems . . . . . 29--40
Mathieu Leconte and
Marc Lelarge and
Laurent Massoulié Bipartite graph structures for efficient
balancing of heterogeneous loads . . . . 41--52
Berk Atikoglu and
Yuehai Xu and
Eitan Frachtenberg and
Song Jiang and
Mike Paleczny Workload analysis of a large-scale
key-value store . . . . . . . . . . . . 53--64
Muhammad Zubair Shafiq and
Lusheng Ji and
Alex X. Liu and
Jeffrey Pang and
Jia Wang A first look at cellular
machine-to-machine traffic: large scale
measurement and characterization . . . . 65--76
Jinyoung Han and
Seungbae Kim and
Taejoong Chung and
Ted Taekyoung Kwon and
Hyun-chul Kim and
Yanghee Choi Bundling practice in BitTorrent: what,
how, and why . . . . . . . . . . . . . . 77--88
Lingwen Gan and
Anwar Walid and
Steven Low Energy-efficient congestion control . . 89--100
Predrag R. Jelenkovic and
Evangelia D. Skiani Uniform approximation of the
distribution for the number of
retransmissions of bounded documents . . 101--112
Benny Van Houdt and
Luca Bortolussi Fluid limit of an asynchronous optical
packet switch with shared per link full
range wavelength conversion . . . . . . 113--124
Nan Hua and
Ashwin Lall and
Baochun Li and
Jun Xu Towards optimal error-estimating codes
through the lens of Fisher information
analysis . . . . . . . . . . . . . . . . 125--136
Ashish Vulimiri and
Gul A. Agha and
Philip Brighten Godfrey and
Karthik Lakshminarayanan How well can congestion pricing
neutralize denial of service attacks? 137--150
Di Niu and
Chen Feng and
Baochun Li Pricing cloud bandwidth reservations
under demand uncertainty . . . . . . . . 151--162
Nosayba El-Sayed and
Ioan A. Stefanovici and
George Amvrosiadis and
Andy A. Hwang and
Bianca Schroeder Temperature management in data centers:
why some (might) like it hot . . . . . . 163--174
Zhenhua Liu and
Yuan Chen and
Cullen Bash and
Adam Wierman and
Daniel Gmach and
Zhikui Wang and
Manish Marwah and
Chris Hyser Renewable and cooling aware workload
management for sustainable data centers 175--186
Di Wang and
Chuangang Ren and
Anand Sivasubramaniam and
Bhuvan Urgaonkar and
Hosam Fathy Energy storage in datacenters: what,
where, and how much? . . . . . . . . . . 187--198
Devavrat Shah and
Tauhid Zaman Rumor centrality: a universal source
detector . . . . . . . . . . . . . . . . 199--210
Praneeth Netrapalli and
Sujay Sanghavi Learning the graph of epidemic cascades 211--222
Chris Milling and
Constantine Caramanis and
Shie Mannor and
Sanjay Shakkottai Network forensics: random infection vs
spreading epidemic . . . . . . . . . . . 223--234
Hyojun Kim and
Moonkyung Ryu and
Umakishore Ramachandran What is a good buffer cache replacement
scheme for mobile flash storage? . . . . 235--246
Mohammad Alizadeh and
Adel Javanmard and
Shang-Tse Chuang and
Sundar Iyer and
Yi Lu Versatile refresh: low complexity
refresh scheduling for high-throughput
multi-banked eDRAM . . . . . . . . . . . 247--258
Suparna Bhattacharya and
Karthick Rajamani and
K. Gopinath and
Manish Gupta Does lean imply green?: a study of the
power performance implications of Java
runtime bloat . . . . . . . . . . . . . 259--270
Seung-Hwan Lim and
Jae-Seok Huh and
Youngjae Kim and
Galen M. Shipman and
Chita R. Das D-factor: a quantitative model of
application slow-down in multi-resource
shared systems . . . . . . . . . . . . . 271--282
Wucherl Yoo and
Kevin Larson and
Lee Baugh and
Sangkyum Kim and
Roy H. Campbell ADP: automated diagnosis of performance
pathologies using hardware events . . . 283--294
Di Xu and
Chenggang Wu and
Pen-Chung Yew and
Jianjun Li and
Zhenjiang Wang Providing fairness on shared-memory
multiprocessors via process scheduling 295--306
Daniel Figueiredo and
Philippe Nain and
Bruno Ribeiro and
Edmundo de Souza e Silva and
Don Towsley Characterizing continuous time random
walks on time varying graphs . . . . . . 307--318
Chul-Ho Lee and
Xin Xu and
Do Young Eun Beyond random walk and
Metropolis--Hastings samplers: why you
should not backtrack for unbiased graph
sampling . . . . . . . . . . . . . . . . 319--330
Han Hee Song and
Berkant Savas and
Tae Won Cho and
Vacha Dave and
Zhengdong Lu and
Inderjit S. Dhillon and
Yin Zhang and
Lili Qiu Clustered embedding of massive social
networks . . . . . . . . . . . . . . . . 331--342
Edith Cohen and
Graham Cormode and
Nick Duffield Don't let the negatives bring you down:
sampling from streams of signed updates 343--354
Ammar Ammar and
Devavrat Shah Efficient rank aggregation using partial
data . . . . . . . . . . . . . . . . . . 355--366
Nick Duffield Fair sampling across network flow
measurements . . . . . . . . . . . . . . 367--378
Kunyang Peng and
Qunfeng Dong TCAM-based NFA implementation . . . . . 379--380
Elliot Anshelevich and
Ameya Hate and
Koushik Kar and
Michael Usher Stable and efficient pricing for
inter-domain traffic forwarding . . . . 381--382
Lucas DiCioccio and
Renata Teixeira and
Catherine Rosenberg Measuring and characterizing home
networks . . . . . . . . . . . . . . . . 383--384
Joel Sommers and
Paul Barford Comparing metro-area cellular and WiFi
performance: extended abstract . . . . . 385--386
Gábor Németh and
Gábor Rétvári Towards a statistical characterization
of the competitiveness of oblivious
routing . . . . . . . . . . . . . . . . 387--388
Sajjad Zarifzadeh and
Madhwaraj G. K. and
Constantine Dovrolis Range tomography . . . . . . . . . . . . 389--390
Myungjin Lee and
Nick Duffield and
Ramana Rao Kompella A scalable architecture for maintaining
packet latency measurements . . . . . . 391--392
Markus Laner and
Philipp Svoboda and
Markus Rupp Modeling randomness in network traffic 393--394
Massimo Gallo and
Bruno Kauffmann and
Luca Muscariello and
Alain Simonian and
Christian Tanguy Performance evaluation of the random
replacement policy for networks of
caches . . . . . . . . . . . . . . . . . 395--396
Koyel Mukherjee and
Samir Khuller and
Amol Deshpande Saving on cooling: the thermal
scheduling problem . . . . . . . . . . . 397--398
Shreeshankar Bodas and
Devavrat Shah and
Damon Wischik Congestion control meets medium access:
throughput, delay, and complexity . . . 399--400
Asser N. Tantawi Optimized cloud placement of virtual
clusters using biased importance
sampling . . . . . . . . . . . . . . . . 401--402
Kai Shen and
Arrvindh Shriraman and
Sandhya Dwarkadas and
Xiao Zhang Power and energy containers for
multicore servers . . . . . . . . . . . 403--404
Kai Wang and
Minghong Lin and
Florin Ciucu and
Adam Wierman and
Chuang Lin Characterizing the impact of the
workload on the value of dynamic
resizing in data centers . . . . . . . . 405--406
Yue Tan and
Yingdong Lu and
Cathy H. Xia Provisioning for large scale cloud
computing services . . . . . . . . . . . 407--408
Srinivas Narayana and
Joe Wenjie Jiang and
Jennifer Rexford and
Mung Chiang Distributed wide-area traffic management
for cloud services . . . . . . . . . . . 409--410
Advait Abhay Dixit and
Pawan Prakash and
Ramana Rao Kompella and
Charlie Hu On the efficacy of fine-grained traffic
splitting protocols in data center
networks . . . . . . . . . . . . . . . . 411--412
Benjamin Frank and
Ingmar Poese and
Georgios Smaragdakis and
Steve Uhlig and
Anja Feldmann Content-aware traffic engineering . . . 413--414
Jian Hu and
Hong Jiang and
Prakash Manden Understanding performance anomalies of
SSDs and their impact in enterprise
application environment . . . . . . . . 415--416
Eduard Glatz and
Xenofontas Dimitropoulos Classifying Internet one-way traffic . . 417--418
Manish Arora and
Feng Wang and
Bob Rychlik and
Dean Tullsen Fast cost efficient designs by building
upon the Plackett and Burman method . . 419--420
Matthias Keller and
Jan Beutel and
Lothar Thiele Multi-hop network tomography: path
reconstruction and per-hop arrival time
estimation from partial information . . 421--422
Ioannis Papapanagiotou and
Erich M. Nahum and
Vasileios Pappas Smartphones vs. laptops: comparing Web
browsing behavior and the implications
for caching . . . . . . . . . . . . . . 423--424
Philipp Reinecke and
Miklós Telek and
Katinka Wolter Micro and macro views of discrete-state
Markov models and their application to
efficient simulation with phase-type
distributions . . . . . . . . . . . . . 425--426
Ramon Bertran and
Marc Gonz\`alez and
Xavier Martorell and
Nacho Navarro and
Eduard Ayguadé POTRA: a framework for building power
models for next generation multicore
architectures . . . . . . . . . . . . . 427--428
Richard A. Hayden Basic theory and some applications of
martingales . . . . . . . . . . . . . . 429--430
Edmundo de Souza e Silva and
Daniel Sadoc Menasche Applications of machine learning to
performance evaluation . . . . . . . . . 431--432
Jay Aikat and
Kevin Jeffay Introduction to network experiments
using the GENI cyberinfrastructure . . . 433--434
Brian Eriksson and
Paul Barford and
Bruce Maggs and
Robert Nowak Posit: a lightweight approach for IP
geolocation . . . . . . . . . . . . . . 2--11
Pierre Coucheney and
Patrick Maillé and
Bruno Tuffin Comparison of search engines non-neutral
and neutral behaviors . . . . . . . . . 14--17
Manjesh K. Hanawal and
Eitan Altman and
Rajesh Sundaresan Game theoretic analysis of collusions in
nonneutral networks . . . . . . . . . . 18--21
Seung Min Yu and
Seong-Lyun Kim Guaranteeing user welfare in network
service: comparison of two subsidy
schemes . . . . . . . . . . . . . . . . 22--25
R. Berry and
M. Honig and
T. Nguyen and
V. Subramanian and
H. Zhou and
R. Vohra Newsvendor model of capacity sharing . . 26--29
Richard T. B. Ma and
Dah Ming Chiu and
John C. S. Lui and
Vishal Misra and
Dan Rubenstein Price differentiation in the Kelly
mechanism . . . . . . . . . . . . . . . 30--33
Zied Ben Houidi and
Helia Pouyllau The price of tussles: bankrupt in
cyberspace? . . . . . . . . . . . . . . 34--37
Aemen Lodhi and
Amogh Dhamdhere and
Constantine Dovrolis Peering strategy adoption by transit
providers in the Internet: a game
theoretic approach? . . . . . . . . . . 38--41
Loretta Mastroeni and
Maurizio Naldi Pricing of insurance policies against
cloud storage price rises . . . . . . . 42--45
Dongmyung Lee and
Jeonghoon Mo and
Jinwoo Park ISP vs. ISP $+$ CDN: can ISPs in duopoly
profit by introducing CDN services? . . 46--48
András Gulyás and
Attila Korösi and
Dávid Szabó and
Gergely Biczók On greedy network formation . . . . . . 49--52
Lavanya Ramakrishnan and
R. Shane Canon and
Krishna Muriki and
Iwona Sakrejda and
Nicholas J. Wright Evaluating Interconnect and
Virtualization Performance for High
Performance Computing . . . . . . . . . 55--60
G. R. Mudalige and
M. B. Giles and
C. Bertolli and
P. H. J. Kelly Predictive modeling and analysis of OP2
on distributed memory GPU clusters . . . 61--67
Gabriel Mateescu and
Gregory H. Bauer and
Robert A. Fiedler Optimizing matrix transposes using a
POWER7 cache model and explicit
prefetching . . . . . . . . . . . . . . 68--73
Anthony Danalis and
Piotr Luszczek and
Gabriel Marin and
Jeffrey S. Vetter and
Jack Dongarra BlackjackBench: portable hardware
characterization . . . . . . . . . . . . 74--79
Adrian Tineo and
Sadaf R. Alam and
Thomas C. Schulthess Towards autotuning by alternating
communication methods . . . . . . . . . 80--85
Roman Iakymchuk and
Paolo Bientinesi Modeling performance through
memory-stalls . . . . . . . . . . . . . 86--91
Hongzhang Shan and
Nicholas J. Wright and
John Shalf and
Katherine Yelick and
Marcus Wagner and
Nathan Wichmann A preliminary evaluation of the hardware
acceleration of the Cray Gemini
interconnect for PGAS languages and
comparison with MPI . . . . . . . . . . 92--98
Vivek Deshpande and
Xing Wu and
Frank Mueller Auto-generation of communication
benchmark traces . . . . . . . . . . . . 99--105
ChunYi Su and
Dong Li and
Dimitrios S. Nikolopoulos and
Matthew Grove and
Kirk Cameron and
Bronis R. de Supinski Critical path-based thread placement for
NUMA systems . . . . . . . . . . . . . . 106--112
DongJin Lee and
Michael O'Sullivan and
Cameron Walker Benchmarking and modeling disk-based
storage tiers for practical storage
design . . . . . . . . . . . . . . . . . 113--118
Lingyuan Wang and
Miaoqing Huang and
Tarek El-Ghazawi Towards efficient GPU sharing on
multicore processors . . . . . . . . . . 119--124
Xian-He Sun and
Dawei Wang APC: a performance metric of memory
systems . . . . . . . . . . . . . . . . 125--130
Roberto Vitali and
Alessandro Pellegrini and
Francesco Quaglia Load sharing for optimistic parallel
simulations on multi core machines . . . 2--11
Marcus Hähnel and
Björn Döbel and
Marcus Völp and
Hermann Härtig Measuring energy consumption for short
code paths using RAPL . . . . . . . . . 13--17
Michele Mazzucco and
Isi Mitrani Empirical evaluation of power saving
policies for data centers . . . . . . . 18--22
Pooja Ghumre and
Junwei Li and
Mukil Kesavan and
Ada Gavrilovska and
Karsten Schwan Evaluating the need for complexity in
energy-aware management for cloud
platforms . . . . . . . . . . . . . . . 23--27
Nicolas Gast and
Dan-Cristian Tomozei and
Jean-Yves Le Boudec Optimal storage policies with wind
forecast uncertainties . . . . . . . . . 28--32
Andrey Bernstein and
Daniel Bienstock and
David Hay and
Meric Uzuno\uglu and
Gil Zussman Sensitivity analysis of the power grid
vulnerability to large-scale cascading
failures . . . . . . . . . . . . . . . . 33--37
O. Ardakanian and
C. Rosenberg and
S. Keshav RealTime distributed congestion control
for electrical vehicle charging . . . . 38--42
Omid Ardakanian and
Catherine Rosenberg and
S. Keshav On the impact of storage in residential
power distribution systems . . . . . . . 43--47
David Chiu and
Christopher Stewart and
Bart McManus Electric grid balancing through low-cost
workload migration . . . . . . . . . . . 48--52
Daniel S. Menasché and
Rosa Maria Meri Leäo and
Edmundo de Souza e Silva and
Alberto Avritzer and
Sindhu Suresh and
Kishor Trivedi and
Raymond A. Marie and
Lucia Happe and
Anne Koziolek Survivability analysis of power
distribution in smart grids with active
and reactive power modeling . . . . . . 53--57
E. G. Coffman, Jr. and
Y. Kogan and
W. Lai and
V. Ramaswami Uptime and downtime analysis for
hierarchical redundant systems in
telecommunications . . . . . . . . . . . 59--61
K. Avrachenkov and
U. Ayesta and
J. Doncel and
P. Jacko Optimal congestion control of TCP flows
for Internet routers . . . . . . . . . . 62--64
Angela Schörgendorfer and
Peter M. van de Ven and
Bo Zhang Temporal load balancing for distributed
backup scheduling . . . . . . . . . . . 65--67
Yuval Rochman and
Hanoch Levy and
Eli Brosh Efficient replication in multi-regional
peer-supported VoD systems . . . . . . . 68--70
Christian Borgs and
Jennifer T. Chayes and
Sherwin Doroudi and
Mor Harchol-Balter and
Kuang Xu Pricing and queueing . . . . . . . . . . 71--73
Antonie S. Godtschalk and
Florin Ciucu Stochastic bounds for randomized load
balancing . . . . . . . . . . . . . . . 74--76
Daniel S. Myers and
Mary K. Vernon Estimating queue length distributions
for queues with random arrivals . . . . 77--79
Paolo Cremonesi and
Andrea Sansottera Modeling response times in the Google
ROADEF/EURO challenge . . . . . . . . . 80--82
Yue Tan and
Yingdong Lu and
Cathy H. Xia Provisioning for large scale loss
network systems with applications in
cloud computing . . . . . . . . . . . . 83--85
Ranjan Pal and
Pan Hui CyberInsurance for cybersecurity a
topological take on modulating insurance
premiums . . . . . . . . . . . . . . . . 86--88
Maryam Elahi and
Carey Williamson and
Philipp Woelfel Meeting the fairness deadline in speed
scaling systems: is turbocharging
enough? . . . . . . . . . . . . . . . . 89--91
Eitan Bachmat and
Assaf Natanzon Analysis of SITA queues with many
servers and spacetime geometry . . . . . 92--94
Thomas Bonald and
Davide Cuda RateOptimal scheduling schemes for
asynchronous InputQueued packet switches 95--97
Minghong Lin and
Adam Wierman and
Alan Roytman and
Adam Meyerson and
Lachlan L. H. Andrew Online optimization with switching cost 98--100
B. Blaszczyszyn and
K. Gaurav Farout vertices in weighted repeated
configuration model . . . . . . . . . . 100--103
Fragkiskos Papadopoulos and
Constantinos Psomas and
Dmitri Krioukov Replaying the geometric growth of
complex networks and application to the
AS Internet . . . . . . . . . . . . . . 104--106
Ali Tizghadam and
Weiwei Li and
Alberto Leon-Garcia Network criticality in vehicular
networks . . . . . . . . . . . . . . . . 107--109
John C. S. Lui and
Li Zhang A study of pricing for cloud resources 3--12
Zhizhong Zhang and
Chuan Wu and
David W. L. Cheung A survey on cloud interoperability:
taxonomies, standards, and practice . . 13--22
Lei Yang and
Jiannong Cao and
Yin Yuan and
Tao Li and
Andy Han and
Alvin Chan A framework for partitioning and
execution of data stream applications in
mobile cloud computing . . . . . . . . . 23--32
Weina Wang and
Kai Zhu and
Lei Ying and
Jian Tan and
Li Zhang A throughput optimal algorithm for map
task scheduling in MapReduce with data
locality . . . . . . . . . . . . . . . . 33--42
Qun Huang and
Patrick P. C. Lee An experimental study of cascading
performance interference in a
virtualized environment . . . . . . . . 43--52
Rahul Singh and
Prashant Shenoy and
Maitreya Natu and
Vaishali Sadaphal and
Harrick Vin Analytical modeling for what-if analysis
in complex cloud computing applications 53--62
Jia Liu and
Cathy H. Xia and
Ness B. Shroff and
Xiaodong Zhang On distributed computation rate
optimization for deploying cloud
computing programming frameworks . . . . 63--72
Giuliano Casale and
Mirco Tribastone Modelling exogenous variability in cloud
deployments . . . . . . . . . . . . . . 73--82
Shah Mahmood and
Yvo Desmedt Two new economic models for privacy . . 84--89
Luke Hutton and
Tristan Henderson An architecture for ethical and
privacy-sensitive social network
experiments . . . . . . . . . . . . . . 90--95
Minaxi Gupta and
Yuqing (Melanie) Wu and
Swapnil S. Joshi and
Aparna Tiwari and
Ashish Nair and
Ezhilan Ilangovan On the linkability of complementary
information from free versions of people
databases . . . . . . . . . . . . . . . 96--100
Florian Tschorsch and
Björn Scheuermann How (not) to build a transport layer for
anonymity overlays . . . . . . . . . . . 101--106
Balaji Prabhakar Designing large-scale nudge engines . . 1--2
David A. Maltz Challenges in cloud scale data centers 3--4
Xia Zhou and
Zengbin Zhang and
Gang Wang and
Xiaoxiao Yu and
Ben Y. Zhao and
Haitao Zheng Practical conflict graphs for dynamic
spectrum distribution . . . . . . . . . 5--16
Muhammad Zubair Shafiq and
Lusheng Ji and
Alex X. Liu and
Jeffrey Pang and
Shobha Venkataraman and
Jia Wang A first look at cellular network
performance during crowded events . . . 17--28
Ning Ding and
Daniel Wagner and
Xiaomeng Chen and
Abhinav Pathak and
Y. Charlie Hu and
Andrew Rice Characterizing and modeling the impact
of wireless signal strength on
smartphone battery drain . . . . . . . . 29--40
Alexander L. Stolyar and
Yuan Zhong A large-scale service system with
packing constraints: minimizing the
number of occupied servers . . . . . . . 41--52
Lian Lu and
Jinlong Tu and
Chi-Kin Chau and
Minghua Chen and
Xiaojun Lin Online energy generation scheduling for
microgrids with intermittent energy
sources and co-generation . . . . . . . 53--66
Ganesha Shanmuganathan and
Ajay Gulati and
Peter Varman Defragmenting the cloud using
demand-based resource allocation . . . . 67--80
David R. Karger and
Sewoong Oh and
Devavrat Shah Efficient crowdsourcing for multi-class
labeling . . . . . . . . . . . . . . . . 81--92
Myunghwan Kim and
Roshan Sumbaly and
Sam Shah Root cause detection in a
service-oriented architecture . . . . . 93--104
Aaron D. Jaggard and
Swara Kopparty and
Vijay Ramachandran and
Rebecca N. Wright The design space of probing algorithms
for network-performance measurement . . 105--116
Niek Bouman and
Sem Borst and
Johan van Leeuwaarden Delays and mixing times in random-access
networks . . . . . . . . . . . . . . . . 117--128
Fabio Cecchi and
Peter Jacko Scheduling of users with Markovian
time-varying transmission rates . . . . 129--140
Florian Simatos and
Niek Bouman and
Sem Borst Lingering issues in distributed
scheduling . . . . . . . . . . . . . . . 141--152
Anshul Gandhi and
Sherwin Doroudi and
Mor Harchol-Balter and
Alan Scheller-Wolf Exact analysis of the M/M/k/setup class
of Markov chains via recursive renewal
reward . . . . . . . . . . . . . . . . . 153--166
John N. Tsitsiklis and
Kuang Xu Queueing system topologies with limited
flexibility . . . . . . . . . . . . . . 167--178
Yongkun Li and
Patrick P. C. Lee and
John C. S. Lui Stochastic modeling of large-scale
solid-state storage systems: analysis,
design tradeoffs and optimization . . . 179--190
Benny Van Houdt A mean field model for a class of
garbage collection algorithms in
flash-based solid state drives . . . . . 191--202
Myoungsoo Jung and
Mahmut Kandemir Revisiting widely held SSD expectations
and rethinking system-level implications 203--216
Marcelo Cintra and
Niklas Linkewitsch Characterizing the impact of process
variation on write endurance enhancing
techniques for non-volatile memory
systems . . . . . . . . . . . . . . . . 217--228
Abhigyan Sharma and
Arun Venkataramani and
Ramesh K. Sitaraman Distributing content simplifies ISP
traffic engineering . . . . . . . . . . 229--242
Vytautas Valancius and
Bharath Ravi and
Nick Feamster and
Alex C. Snoeren Quantifying the benefits of joint
content and network routing . . . . . . 243--254
Dilip Nijagal Simha and
Tzi-cker Chiueh and
Ganesh Karuppur Rajagopalan and
Pallav Bose High-throughput low-latency fine-grained
disk logging . . . . . . . . . . . . . . 255--266
Bogdan Marius Tudor and
Yong Meng Teo On understanding the energy consumption
of ARM-based multicore servers . . . . . 267--278
Rathijit Sen and
David A. Wood Reuse-based online models for caches . . 279--292
Muhammad Shahzad and
Alex X. Liu Probabilistic optimal tree hopping for
RFID identification . . . . . . . . . . 293--304
Qiuyu Peng and
Anwar Walid and
Steven H. Low Multipath TCP algorithms: theory and
design . . . . . . . . . . . . . . . . . 305--316
Guang Tan and
Zhimeng Yin and
Hongbo Jiang Trap array: a unified model for
scalability evaluation of geometric
routing . . . . . . . . . . . . . . . . 317--328
Lachlan Andrew and
Siddharth Barman and
Katrina Ligett and
Minghong Lin and
Adam Meyerson and
Alan Roytman and
Adam Wierman A tale of two metrics: simultaneous
bounds on competitiveness and regret . . 329--330
Zhibin Yu and
Lieven Eeckhout and
Nilanjan Goswami and
Tao Li and
Lizy John and
Hai Jin and
Chengzhong Xu Accelerating GPGPU architecture
simulation . . . . . . . . . . . . . . . 331--332
Di Wang and
Chuangang Ren and
Sriram Govindan and
Anand Sivasubramaniam and
Bhuvan Urgaonkar and
Aman Kansal and
Kushagra Vaid ACE: abstracting, characterizing and
exploiting peaks and valleys in
datacenter power consumption . . . . . . 333--334
Rahul Potharaju and
Navendu Jain An empirical analysis of intra- and
inter-datacenter network failures for
geo-distributed services . . . . . . . . 335--336
Dorian Mazauric and
Saleh Soltan and
Gil Zussman Computational analysis of cascading
failures in power networks . . . . . . . 337--338
John C. Nelson and
Jonathan Connell and
Canturk Isci and
Jonathan Lenchner Data center asset tracking using a
mobile robot . . . . . . . . . . . . . . 339--340
Zhenhua Liu and
Adam Wierman and
Yuan Chen and
Benjamin Razon and
Niangjun Chen Data center demand response: avoiding
the coincident peak via workload
shifting and local generation . . . . . 341--342
Juan Carlos Sáez and
Fernando Castro and
Daniel Chaver and
Manuel Prieto Delivering fairness and priority
enforcement on asymmetric multicore
systems via OS scheduling . . . . . . . 343--344
Ake Arvidsson and
Ying Zhang Detecting user dissatisfaction and
understanding the underlying reasons . . 345--346
Deguang Kong and
Guanhua Yan Discriminant malware distance learning
on structural information for automated
malware classification . . . . . . . . . 347--348
Enoch Peserico Elastic paging . . . . . . . . . . . . . 349--350
Lingwen Gan and
Na Li and
Steven Low and
Ufuk Topcu Exact convex relaxation for optimal
power flow in distribution networks . . 351--352
Jaewook Kwak and
Chul-Ho Lee and
Do Young Eun Exploiting the past to reduce delay in
CSMA scheduling: a high-order Markov
chain approach . . . . . . . . . . . . . 353--354
Ignasi Paredes-Oliva and
Pere Barlet-Ros and
Xenofontas Dimitropoulos FaRNet: fast recognition of high
multi-dimensional network traffic
patterns . . . . . . . . . . . . . . . . 355--356
Yashar Ghiassi-Farrokhfal and
Srinivasan Keshav and
Catherine Rosenberg and
Florin Ciucu Firming solar power . . . . . . . . . . 357--358
Yi Wang and
Dongzhe Tai and
Ting Zhang and
Jianyuan Lu and
Boyang Xu and
Huichen Dai and
Bin Liu Greedy name lookup for named data
networking . . . . . . . . . . . . . . . 359--360
Mian Dong and
Tian Lan and
Lin Zhong How does energy accounting matter for
energy management? . . . . . . . . . . . 361--362
Sharayu Moharir and
Sujay Sanghavi and
Sanjay Shakkottai Online load balancing under graph
constraints . . . . . . . . . . . . . . 363--364
Melanie Kambadur and
Kui Tang and
Joshua Lopez and
Martha A. Kim Parallel scaling properties from a basic
block view . . . . . . . . . . . . . . . 365--366
Florin Ciucu and
Felix Poloczek and
Jens Schmitt Sharp bounds in stochastic network
calculus . . . . . . . . . . . . . . . . 367--368
Ji Zhu and
Stratis Ioannidis and
Nidhi Hegde and
Laurent Massoulie Stable and scalable universal swarms . . 369--370
Georgios S. Paschos and
Leandros Tassiulas Sustainability of service provisioning
systems under attack . . . . . . . . . . 371--372
Hong Xu and
Chen Feng and
Baochun Li Temperature aware workload management in
geo-distributed datacenters . . . . . . 373--374
Ming Li and
Andrey Lukyanenko and
Sasu Tarkoma and
Yong Cui and
Antti Ylä-Jääski Tolerating path heterogeneity in
multipath TCP with bounded receive
buffers . . . . . . . . . . . . . . . . 375--376
Chen Dai and
Chao Lv and
Jiaxin Li and
Weihua Zhang and
Binyu Zang Understanding architectural
characteristics of multimedia retrieval
workloads . . . . . . . . . . . . . . . 377--378
Athula Balachandran and
Vyas Sekar and
Aditya Akella and
Srinivasan Seshan Understanding Internet video viewing
behavior in the wild . . . . . . . . . . 379--380
Nan Jiang and
Yu Jin and
Ann Skudlark and
Zhi-Li Zhang Understanding SMS spam in a large
cellular network . . . . . . . . . . . . 381--382
Srikanth Sundaresan and
Nazanin Magharei and
Nick Feamster and
Renata Teixeira and
Sam Crawford Web performance bottlenecks in broadband
access networks . . . . . . . . . . . . 383--384
Marcos K. Aguilera Tutorial on geo-replication in data
center applications . . . . . . . . . . 385--386
Jayakrishnan Nair and
Adam Wierman and
Bert Zwart The fundamentals of heavy-tails:
properties, emergence, and
identification . . . . . . . . . . . . . 387--388
Jiri Schindler Profiling and analyzing the I/O
performance of NoSQL DBs . . . . . . . . 389--390
X. Gao and
y. Lu and
M. Sharma and
M. S. Squillante and
J. W. Bosman Stochastic optimal control for a general
class of dynamic resource allocation
problems . . . . . . . . . . . . . . . . 3--14
Predrag R. Jelenkovi\'c and
Evangelia D. Skiani Retransmissions over correlated channels 15--25
A. Hasan Mahmud and
Shaolei Ren Online capacity provisioning for
carbon-neutral data center with
demand-responsive electricity prices . . 26--37
Naser M. Asghari and
Michel Mandjes and
Anwar Walid Optimizing energy management in
multi-core servers . . . . . . . . . . . 38--40
R. Bekker and
J. L. Dorsman and
R. D. van der Mei and
P. Vis and
E. M. M. Winands Scheduling in polling systems in heavy
traffic . . . . . . . . . . . . . . . . 41--43
Pedro Casas and
Michael Seufert and
Raimund Schatz YOUQMON: a system for on-line monitoring
of YouTube QoE in operational 3G
networks . . . . . . . . . . . . . . . . 44--46
Jan-Pieter Dorsman and
Maria Vlasiou and
Bert Zwart Parallel queueing networks with
Markov-modulated service speeds in heavy
traffic . . . . . . . . . . . . . . . . 47--49
Dieter Fiems and
Koen De Turck Spreading rumours in Euclidean space . . 50--52
Eleni Vatamidou and
Ivo Adan and
Maria Vlasiou and
Bert Zwart Corrected phase-type approximations for
the workload of the MAP/G/1 queue with
heavy-tailed service times . . . . . . . 53--55
Heiko Koziolek and
Steffen Becker and
Jens Happe and
Petr Tuma and
Thijmen de Gooijer Towards software performance engineering
for multicore and manycore systems . . . 2--11
Eitan Bachmat and
Ilan Elhanan Analysis of the GSTF disk scheduling
algorithm . . . . . . . . . . . . . . . 13--15
Minghong Lin and
Li Zhang and
Adam Wierman and
Jian Tan Joint optimization of overlapping phases
in MapReduce . . . . . . . . . . . . . . 16--18
Javad Ghaderi and
Sem Borst and
Phil Whiting Random access in wireless networks: how
much aggressiveness can cause
instability? . . . . . . . . . . . . . . 19--21
Ivo Adan and
Marko Boon and
Ana Busi\'c and
Jean Mairesse and
Gideon Weiss Queues with skill based parallel servers
and a FCFS infinite matching model . . . 22--24
Eugene A. Feinber and
Fenghsu Yang Dynamic price optimization for an
M/M/k/N queue with several customer
types . . . . . . . . . . . . . . . . . 25--27
Bhuvan Urgaonkar and
George Kesidis and
Uday V. Shanbhag and
Cheng Wang Pricing of service in clouds: optimal
response and strategic interactions . . 28--30
Sungsu Lim and
Kyomin Jung and
John C. S. Lui Phase transition of multi-state
diffusion process in networks . . . . . 31--33
Nelson Antunes and
Gonçalo Jacinto and
António Pacheco Probing a M/G/1 queue with general input
and service times . . . . . . . . . . . 34--36
Peter Harrison Sojourn time distributions in tandem
batch-networks . . . . . . . . . . . . . 37--39
Joel Spencer and
Madhu Sudan and
Kuang Xu Queueing with future information . . . . 40--42
Felix Poloczek and
Florin Ciucu A martingale-envelope and applications 43--45
Weining Kang and
Hongyuan Lu and
Guodong Pang Fluid approximations of many-server
queues with delayed feedback and
heterogeneous service and patience times 46--48
A. B. Dieker and
T. Suk Diffusion approximations for large-scale
buffered systems . . . . . . . . . . . . 49--51
Yingdong Lu and
Mark S. Squillante and
David D. Yao Asymptotics of a class of resource
planning problems . . . . . . . . . . . 52--54
Heng-Qing Ye and
David D. Yao Interchange of limits in heavy traffic
analysis under a moment condition . . . 55--57
Edward G. Coffman and
Petar Momcilovi\'c A particle process underlying SSD
storage structures . . . . . . . . . . . 58--60
X. Gao and
Y. Lu and
M. Sharma and
M. S. Squillante and
J. W. Bosman Rewards, costs and flexibility in
dynamic resource allocation: a
stochastic optimal control approach . . 61--63
William G. Temple and
Richard T. B. Ma Monotonic marginal pricing: demand
response with price certainty . . . . . 65--70
Sahil Singla and
Yashar Ghiassi-Farrokhfal and
Srinivasan Keshav Battery provisioning and scheduling for
a hybrid battery-diesel generator system 71--76
Lingwen Gan and
Adam Wierman and
Ufuk Topcu and
Niangjun Chen and
Steven H. Low Real-time deferrable load control:
handling the uncertainties of renewable
generation . . . . . . . . . . . . . . . 77--79
Kai Yang and
Anwar Walid Outage-capacity tradeoff for smart grid
with renewables . . . . . . . . . . . . 80--82
Christine S. Chan and
Boxiang Pan and
Kenny Gross and
Kalyan Vaidyanathan and
Tajana Simuni\'c Rosing Correcting vibration-induced performance
degradation in enterprise servers . . . 83--88
Hao Wang and
Jianwei Huang and
Xiaojun Lin and
Hamed Mohsenian-Rad Exploring smart grid and data center
interactions for electric power load
balancing . . . . . . . . . . . . . . . 89--94
Mikko Pervilä and
Lassi Remes and
Jussi Kangasharju Harvesting heat in an urban greenhouse 95--97
Indra Widjaja and
Anwar Walid and
Yanbin Luo and
Yang Xu and
H. Jonathan Chao Switch sizing for energy-efficient
datacenter networks . . . . . . . . . . 98--100
Chenying Hou and
Fa Zhang and
Antonio Fernández Anta and
Lin Wang and
Zhiyong Liu A hop-by-hop energy efficient
distributed routing scheme . . . . . . . 101--106
Lin Wang and
Fa Zhang and
Athanasios V. Vasilakos and
Chenying Hou and
Zhiyong Liu Joint virtual machine assignment and
traffic engineering for green data
center networks . . . . . . . . . . . . 107--112
Patrick Loiseau and
David C. Parkes and
Jean Walrand MultiDefender security games on networks 4--7
Aron Laszka and
Assane Gueye Quantifying all-to-one network topology
robustness under budget constraints . . 8--11
Lemonia Dritsoula and
John Musacchio A game of clicks: economic incentives to
fight click fraud in ad networks . . . . 12--15
Emir Kavurmacio\uglu and
Murat Alanyali and
David Starobinski Demand-insensitive price relationships
in competitive private commons . . . . . 16--19
Costas Courcoubetis and
Kostas Sdrolias and
Richard Weber Revenue Models, Price Differentiation
and Network Neutrality Implications in
the Internet . . . . . . . . . . . . . . 20--23
Jiwon Park and
Jeonghoon Mo ISP and CP revenue sharing and content
piracy . . . . . . . . . . . . . . . . . 24--27
Bar Ifrach and
Costis Maglaras and
Marco Scarsini Bayesian social learning with consumer
reviews . . . . . . . . . . . . . . . . 28--28
Munther Dahleh and
Alireza TahbazSalehi and
John N. Tsitsiklis and
Spyros I. Zoumpoulis Coordination with local information . . 29--29
Zeinab Abbassi and
Nidhi Hegde and
Laurent Massoulié Distributed content curation on the Web 30--33
Jie Xu and
Mihaela van der Schaar Incentive design for heterogeneous
user-generated content networks . . . . 34--37
Chong Jiang and
Carolyn L. Beck and
R. Srikant Bidding with limited statistical
knowledge in online auctions . . . . . . 38--41
Swati Rallapalli and
Qiang Ma and
Han Hee Song and
Mario Baldi and
S. Muthukrishnan and
Lili Qiu Modeling the value of information
granularity in targeted advertising . . 42--45
Mung Chiang SDP: Smart Data Pricing, from theorems
to trials . . . . . . . . . . . . . . . 46--46
Jonatha Anselmi and
Danilo Ardagna and
John C. S. Lui and
Adam Wierman and
Yunjian Xu and
Zichao Yang The economics of the cloud: price
competition and congestion . . . . . . . 47--49
Gerardo Berbeglia and
Peter Sloan and
Adrian Vetta Pricing mechanisms for a durable good
monopolist . . . . . . . . . . . . . . . 50--50
Bar Ifrach and
Rameh Johari Pricing a bestseller: sales and
visibility in the marketplace for mobile
apps . . . . . . . . . . . . . . . . . . 51--51
Daniel T. Wagner and
Andrew Rice and
Alastair R. Beresford Device analyzer: largescale mobile data
collection . . . . . . . . . . . . . . . 53--56
Eugene Feinberg and
Xiaoxuan Zhang Optimizing cloud utilization via
switching decisions . . . . . . . . . . 57--60
Onur Yilmaz and
Mustafa U. Torun and
Ali N. Akansu A fast derivation of Karhunen--Loeve
transform kernel for first-order
autoregressive discrete process . . . . 61--64
Bharat B. Madan and
Manoj Banik Attack tolerant architecture for big
data file systems . . . . . . . . . . . 65--69
Shan Suthaharan Big data classification: problems and
challenges in network intrusion
prediction with machine learning . . . . 70--73
Abhishek B. Sharma and
Franjo Ivanci\'c and
Alexandru Niculescu-Mizil and
Haifeng Chen and
Guofei Jiang Modeling and analytics for
cyber-physical systems in the age of big
data . . . . . . . . . . . . . . . . . . 74--77
Jie Hu and
Kun Meng and
Xiaomin Chen and
Chuang Lin and
Jiwei Huang Analysis of influence maximization in
large-scale social networks . . . . . . 78--81
Jeff Whitworth and
Shan Suthaharan Security problems and challenges in a
machine learning-based hybrid big data
processing network systems . . . . . . . 82--85
Onur Savas and
Yalin Sagduyu and
Julia Deng and
Jason Li Tactical big data analytics: challenges,
use cases, and solutions . . . . . . . . 86--89
Yu Zhang and
Daby Sow and
Deepak Turaga and
Mihaela van der Schaar A fast online learning algorithm for
distributed mining of BigData . . . . . 90--93
Benjamin Heintz and
Abhishek Chandra Beyond graphs: toward scalable
hypergraph analysis systems . . . . . . 94--97
Jameela Al-Jaroodi and
Nader Mohamed and
Abdulla Eid Dual direction big data download and
analysis . . . . . . . . . . . . . . . . 98--101
Jacob Brock and
Hao Luo and
Chen Ding Locality analysis: a nonillion time
window problem . . . . . . . . . . . . . 102--105
Zhaoxu Wang and
Wenxiang Dong and
Wenyi Zhang and
Chee Wei Tan Rumor source detection with multiple
observations: fundamental limits and
algorithms . . . . . . . . . . . . . . . 1--13
Jinyoung Han and
Daejin Choi and
Byung-Gon Chun and
Ted Kwon and
Hyun-chul Kim and
Yanghee Choi Collecting, organizing, and sharing pins
in pinterest: interest-driven or
social-driven? . . . . . . . . . . . . . 15--27
Jiaming Xu and
Rui Wu and
Kai Zhu and
Bruce Hajek and
R. Srikant and
Lei Ying Jointly clustering rows and columns of
binary matrices: algorithms and
trade-offs . . . . . . . . . . . . . . . 29--41
Avner May and
Augustin Chaintreau and
Nitish Korula and
Silvio Lattanzi Filter & follow: how social media foster
content curation . . . . . . . . . . . . 43--55
Stratis Ioannidis and
Andrea Montanari and
Udi Weinsberg and
Smriti Bhagat and
Nadia Fawaz and
Nina Taft Privacy tradeoffs in predictive
analytics . . . . . . . . . . . . . . . 57--69
Weijie Shi and
Linquan Zhang and
Chuan Wu and
Zongpeng Li and
Francis C. M. Lau An online auction framework for dynamic
resource provisioning in cloud computing 71--83
Jayakrishnan Nair and
Sachin Adlakha and
Adam Wierman Energy procurement strategies in the
presence of intermittent sources . . . . 85--97
Linquan Zhang and
Zongpeng Li and
Chuan Wu Randomized auction design for
electricity markets between grids and
microgrids . . . . . . . . . . . . . . . 99--110
Zhenhua Liu and
Iris Liu and
Steven Low and
Adam Wierman Pricing data center demand response . . 111--123
Maialen Larrañaga and
Urtzi Ayesta and
Ina Maria Verloop Index policies for a multi-class queue
with convex holding cost and
abandonments . . . . . . . . . . . . . . 125--137
Neil Stuart Walton Concave switching in single and multihop
networks . . . . . . . . . . . . . . . . 139--151
Longbo Huang and
Xin Liu and
Xiaohong Hao The power of online learning in
stochastic network optimization . . . . 153--165
Predrag R. Jelenkovic and
Evangelia D. Skiani Is sharing with retransmissions causing
instabilities? . . . . . . . . . . . . . 167--179
Jian Tan and
Yandong Wang and
Weikuan Yu and
Li Zhang Non-work-conserving effects in
MapReduce: diffusion limit and
criticality . . . . . . . . . . . . . . 181--192
Ion Stoica Conquering big data with spark and BDAS 193--193
Zain Shamsi and
Ankur Nandwani and
Derek Leonard and
Dmitri Loguinov Hershel: single-packet OS fingerprinting 195--206
Muhammad Shahzad and
Alex X. Liu Noise can help: accurate and efficient
per-flow latency measurement without
packet probing and time stamping . . . . 207--219
Nicolas Viennot and
Edward Garcia and
Jason Nieh A measurement study of Google Play . . . 221--233
Chung Hwan Kim and
Junghwan Rhee and
Hui Zhang and
Nipun Arora and
Guofei Jiang and
Xiangyu Zhang and
Dongyan Xu IntroPerf: transparent context-sensitive
multi-layer performance inference using
system stack traces . . . . . . . . . . 235--247
Sahil Suneja and
Canturk Isci and
Vasanth Bala and
Eyal de Lara and
Todd Mummert Non-intrusive, out-of-band and
out-of-the-box systems monitoring in the
cloud . . . . . . . . . . . . . . . . . 249--261
Subhashini Krishnasamy and
Siddhartha Banerjee and
Sanjay Shakkottai The behavior of epidemics under bounded
susceptibility . . . . . . . . . . . . . 263--275
Maksym Gabielkov and
Ashwin Rao and
Arnaud Legout Studying social networks at scale:
macroscopic anatomy of the Twitter
social graph . . . . . . . . . . . . . . 277--288
Swapna Buccapatnam and
Atilla Eryilmaz and
Ness B. Shroff Stochastic bandits with side
observations on networks . . . . . . . . 289--300
Jungseul Ok and
Youngmi Jin and
Jinwoo Shin and
Yung Yi On maximizing diffusion speed in social
networks: impact of random seeding and
clustering . . . . . . . . . . . . . . . 301--313
Jose Yallouz and
Ori Rottenstreich and
Ariel Orda Tunable survivable spanning trees . . . 315--327
Bogdan Ghit and
Nezih Yigitbasi and
Alexandru Iosup and
Dick Epema Balanced resource allocations across
multiple dynamic MapReduce clusters . . 329--341
Daniel S. Berger and
Martin Karsten and
Jens Schmitt On the relevance of adversarial queueing
theory in practice . . . . . . . . . . . 343--354
Nachiappan Chidambaram Nachiappan and
Praveen Yedlapalli and
Niranjan Soundararajan and
Mahmut Taylan Kandemir and
Anand Sivasubramaniam and
Chita R. Das GemDroid: a framework to evaluate mobile
platforms . . . . . . . . . . . . . . . 355--366
Muhammad Zubair Shafiq and
Jeffrey Erman and
Lusheng Ji and
Alex X. Liu and
Jeffrey Pang and
Jia Wang Understanding the impact of network
dynamics on mobile video user engagement 367--379
Jiwei Huang and
Sen Yang and
Ashwin Lall and
Justin Romberg and
Jun Xu and
Chuang Lin Error estimating codes for insertion and
deletion channels . . . . . . . . . . . 381--393
Thomas M. M. Meyfroyt and
Sem C. Borst and
Onno J. Boxma and
Dee Denteneer Data dissemination performance in
large-scale sensor networks . . . . . . 395--406
Maria Gorlatova and
John Sarik and
Guy Grebla and
Mina Cong and
Ioannis Kymissis and
Gil Zussman Movers and shakers: kinetic energy
harvesting for the Internet of Things 407--419
Chengdi Lai and
Steven H. Low and
Ka-Cheong Leung and
Victor O. K. Li Pricing link by time . . . . . . . . . . 421--433
Sharayu Moharir and
Javad Ghaderi and
Sujay Sanghavi and
Sanjay Shakkottai Serving content with unknown demand: the
high-dimensional regime . . . . . . . . 435--447
Paul Tune and
Matthew Roughan Network-design sensitivity analysis . . 449--461
Lingqing Ai and
Xian Wu and
Lingxiao Huang and
Longbo Huang and
Pingzhong Tang and
Jian Li The multi-shop ski rental problem . . . 463--475
Wei Ding and
Mahmut Kandemir CApRI: CAche-conscious data reordering
for irregular codes . . . . . . . . . . 477--489
Yu Cai and
Gulay Yalcin and
Onur Mutlu and
Erich F. Haratsch and
Osman Unsal and
Adrian Cristal and
Ken Mai Neighbor-cell assisted error correction
for MLC NAND flash memories . . . . . . 491--504
Nagendra Gulur and
Mahesh Mehendale and
Raman Manikantan and
Ramaswamy Govindarajan ANATOMY: an analytical model of memory
system performance . . . . . . . . . . . 505--517
Samira Khan and
Donghyuk Lee and
Yoongu Kim and
Alaa R. Alameldeen and
Chris Wilkerson and
Onur Mutlu The efficacy of error mitigation
techniques for DRAM retention failures:
a comparative experimental study . . . . 519--532
Kaibo Wang and
Xiaoning Ding and
Rubao Lee and
Shinpei Kato and
Xiaodong Zhang GDM: device memory management for GPGPU
computing . . . . . . . . . . . . . . . 533--545
Nuno Diegues and
Paolo Romano and
Luís Rodrigues On the energy and performance of
commodity hardware transactional memory 547--548
Qi Wang and
Liang Liu and
Jinbei Zhang and
Xinyu Wang and
Xinbing Wang and
Songwu Lu Impact of correlated mobility and
cluster scalability on connectivity of
wireless networks . . . . . . . . . . . 549--550
Arash Tavakkol and
Mohammad Arjomand and
Hamid Sarbazi-Azad Unleashing the potentials of dynamism
for page allocation strategies in SSDs 551--552
Chinmoy V. Mandayam and
Balaji Prabhakar Traffic congestion: models, costs and
optimal transport . . . . . . . . . . . 553--554
Arpan Mukhopadhyay and
Ravi R. Mazumdar Randomized routing schemes for large
processor sharing systems with multiple
service rates . . . . . . . . . . . . . 555--556
Alexander Tarvo and
Steven P. Reiss Automated analysis of multithreaded
programs for performance modeling . . . 557--558
Manish Arora and
Srilatha Manne and
Yasuko Eckert and
Indrani Paul and
Nuwan Jayasena and
Dean Tullsen A comparison of core power gating
strategies implemented in modern
hardware . . . . . . . . . . . . . . . . 559--560
Avik Ray and
Sujay Sanghavi and
Sanjay Shakkottai Topic modeling from network spread . . . 561--562
A. Hasan Mahmud and
Yuxiong He and
Shaolei Ren BATS: budget-constrained autoscaling for
cloud performance optimization . . . . . 563--564
Ammar Ammar and
Sewoong Oh and
Devavrat Shah and
Luis Filipe Voloch What's your choice?: learning the mixed
multi-nomial . . . . . . . . . . . . . . 565--566
Muhammad Zubair Shafiq and
Alex X. Liu and
Amir R. Khakpour Revisiting caching in content delivery
networks . . . . . . . . . . . . . . . . 567--568
Qiang Xu and
Thomas Andrews and
Yong Liao and
Stanislav Miskovic and
Z. Morley Mao and
Mario Baldi and
Antonio Nucci FLOWR: a self-learning system for
classifying mobile-application traffic 569--570
Wei Dong and
Xuefeng Zhang and
Jiliang Wang and
Yi Gao and
Chun Chen and
Jiajun Bu Accurate and robust time reconstruction
for deployed sensor networks . . . . . . 571--572
Shaoquan Zhang and
Longbo Huang and
Minghua Chen and
Xin Liu Effect of proactive serving on user
delay reduction in service systems . . . 573--574
Fanxin Kong and
Xue Liu and
Lei Rao Optimal energy source selection and
capacity planning for green datacenters 575--576
Jinwoo Shin and
Tonghoon Suk Scheduling using interactive oracles:
connection between iterative
optimization and low-complexity
scheduling . . . . . . . . . . . . . . . 577--578
Swati Rallapalli and
Wei Dong and
Lili Qiu and
Yin Zhang Unified localization framework using
trajectory signatures . . . . . . . . . 579--580
Dong Hyun Kang and
Changwoo Min and
Young Ik Eom TS-CLOCK: temporal and spatial locality
aware buffer replacement algorithm for
NAND flash storages . . . . . . . . . . 581--582
Juhoon Kim and
Yung-Chih Chen and
Ramin Khalili and
Don Towsley and
Anja Feldmann Multi-source multipath HTTP (mHTTP): a
proposal . . . . . . . . . . . . . . . . 583--584
Christina Vlachou and
Albert Banchs and
Julien Herzen and
Patrick Thiran Performance analysis of MAC for
power-line communications . . . . . . . 585--586
Long Vu and
Deepak Turaga and
Srinivasan Parthasarathy Impact of DHCP churn on network
characterization . . . . . . . . . . . . 587--588
Yang Guo and
Alexander L. Stolyar and
Anwar Walid Online algorithms for joint
application-VM-physical-machine
auto-scaling in a cloud . . . . . . . . 589--590
Jia Liu and
Cathy H. Xia and
Ness B. Shroff and
Hanif D. Sherali Distributed optimal load shedding for
disaster recovery in smart electric
power grids: a second-order approach . . 591--592
Richard G. Clegg and
Raul Landa and
João Taveira Araújo and
Eleni Mykoniati and
David Griffin and
Miguel Rio TARDIS: stably shifting traffic in space
and time . . . . . . . . . . . . . . . . 593--594
Daniel S. Berger and
Philipp Gland and
Sahil Singla and
Florin Ciucu Exact analysis of TTL cache networks:
the case of caching policies driven by
stopping times . . . . . . . . . . . . . 595--596
Sangeetha Abdu Jyothi and
Ankit Singla and
P. Brighten Godfrey and
Alexandra Kolla Measuring throughput of data center
network topologies . . . . . . . . . . . 597--598
Da Wang and
Gauri Joshi and
Gregory Wornell Efficient task replication for fast
response times in parallel computation 599--600
Peter Buchholz and
Benny Van Houdt Joint latency and cost optimization for
erasure-coded data center storage . . . 3--14
Bo Zhang and
Guodong Pang and
Bert Zwart Refining piecewise stationary
approximation for a Markov-regulated
fluid queue . . . . . . . . . . . . . . 15--17
A. Izagirre and
A. M. Makowski Light traffic performance under the
power of two load balancing strategy:
the case of server heterogeneity . . . . 18--20
Shigeo Shioda Random walk based biased sampling for
data collection on communication
networks . . . . . . . . . . . . . . . . 21--23
Majed Haddad and
Oussama Habachi and
Piotr Wiecek and
Yezekael Hayel Spectral efficiency of energy efficient
multicarrier systems . . . . . . . . . . 24--26
Tao Zhang and
Guangshuo Chen and
Wei Shu and
Min-You Wu Microarchitectural characterization of
irregular applications on GPGPUs . . . . 27--29
Jayakrishnan Nair and
Vijay G. Subramanian and
Adam Wierman On competitive provisioning of cloud
services . . . . . . . . . . . . . . . . 30--32
Joost Bosman and
Jayakrishnan Nair and
Bert Zwart On the probability of current and
temperature overloading in power grids:
a large deviations approach . . . . . . 33--35
Erol Gelenbe A sensor node with energy harvesting . . 37--39
Thomas M. M. Meyfroyt A cooperative sequential adsorption
model for wireless gossiping . . . . . . 40--42
Paul Tune and
Matthew Roughan Maximum entropy traffic matrix synthesis 43--45
Milan Bradonji\'c and
Iraj Saniee and
Indra Widjaja Scaling of capacity and reliability in
data center networks . . . . . . . . . . 46--48
Yuval Rochman and
Hanoch Levy and
Eli Brosh Efficient resource placement in cloud
computing and network applications . . . 49--51
Hong Xie and
John C. S. Lui Modeling crowdsourcing systems: design
and analysis of incentive mechanism and
rating system . . . . . . . . . . . . . 52--54
Arash Asadi and
Peter Jacko and
Vincenzo Mancuso Modeling D2D communications with LTE and
WiFi . . . . . . . . . . . . . . . . . . 55--57
Liang Zheng and
Chee Wei Tan Egalitarian fairness framework for joint
rate and power optimization in wireless
networks . . . . . . . . . . . . . . . . 58--60
D. A. Goldberg and
D. A. Katz and
Y. Lu and
M. Sharma and
M. S. Squillante Asymptotic optimality of constant
capacity allocation policies for dynamic
resource planning . . . . . . . . . . . 61--63
Javad Ghaderi and
Yuan Zhong and
R. Srikant Asymptotic optimality of BestFit for
stochastic bin packing . . . . . . . . . 64--66
Ali Tizghadam and
Alberto Leon-Garcia On the impact of subgraph insertion or
removal on Moore--Penrose Laplacian and
resistance distance . . . . . . . . . . 67--69
Masakiyo Miyazawa Tail asymptotics of the stationary
distribution for a two-node generalized
Jackson network . . . . . . . . . . . . 70--72
Mark S. Squillante and
Don Towsley and
Sean Barker Improving the scalability of search in
networks through multiple random walks 73--75
John Chuang and
Patrick Loiseau The Joint Workshop on Pricing and
Incentives in Networks and Systems
(WPIN+NetEcon 2014) . . . . . . . . . . 2--3
Vijay Kamble and
Jean Walrand Strategy-proof Mechanisms for Purchasing
a Shared Resource . . . . . . . . . . . 4--7
Saravana Manickam and
Mahesh K. Marina and
Sofia Pediaditaki and
Maziar Nekovee An Iterative and Truthful Multi-Unit
Auction Scheme for Coordinated Sharing
of Spectrum White Spaces . . . . . . . . 8--11
Abhinav Sinha and
Achilleas Anastasopoulos A General Mechanism Design Methodology
for Social Utility Maximization with
Linear Constraints . . . . . . . . . . . 12--15
Steven Weber and
Roch Guérin Facilitating Adoption of Services with
Positive Externalities via Subsidies . . 16--19
Amir Ajorlou and
Ali Jadbabaie and
Ali Kakhbod Strategic Information Diffusion: Spread
vs. Exploit . . . . . . . . . . . . . . 20--23
Daron Acemoglu and
Giacomo Como and
Fabio Fagnani and
Asuman Ozdaglar Harmonic Influence in Largescale
Networks . . . . . . . . . . . . . . . . 24--24
Vamseedhar Reddyvari Raja and
Srinivas Shakkottai and
Amogh Dhamdhere and
kc claffy Fair, Flexible and Feasible ISP Billing 25--28
Laszlo Gyarmati and
Nikolaos Laoutaris and
Kostas Sdrolias and
Pablo Rodriguez and
Costas Courcoubetis From advertising profits to bandwidth
prices: a quantitative methodology for
negotiating premium peering . . . . . . 29--32
Eran Simhon and
David Starobinski Advance Reservation Games and the Price
of Conservatism . . . . . . . . . . . . 33--33
Iddo Bentov and
Charles Lee and
Alex Mizrahi and
Meni Rosenfeld Proof of Activity: Extending Bitcoin's
Proof of Work via Proof of Stake
[Extended Abstract]y . . . . . . . . . . 34--37
Daron Acemoglu and
Azarakhsh Malekian and
Asu Ozdaglar Network Security and Contagion . . . . . 38--38
Aaron Roth Differential Privacy as a Tool for
Mechanism Design in Large Systems . . . 39--39
Leonidas Georgiadis and
George Iosifidis and
Leandros Tassiulas Dynamic Exchange of Communication
Services . . . . . . . . . . . . . . . . 40--40
Eiichiro Kazumori Generalizing Deferred Acceptance
Auctions to Allow Multiple
Relinquishment Options . . . . . . . . . 41--41
Ashraf Al Daoud and
George Kesidis and
Jörg Liebeherr A Game of Uncoordinated Sharing of
Private Spectrum Commons . . . . . . . . 42--42
Konstantinos Poularakis and
Ioannis Pefkianakis and
Jaideep Chandrashekar and
Leandros Tassiulas Quid Pro Quo: Reducing Peak Traffic
Costs with (Subscriber) Price Incentives 43--43
Mohammad Hassan Lotfi and
George Kesidis and
Saswati Sarkar Network NonNeutrality on the Internet:
Content Provision Under a Subscription
Revenue Model . . . . . . . . . . . . . 44--44
Siny Joseph and
Vinod Namboodiri and
Vishnu C. Dev A Market-Driven Framework Towards
Environmentally Sustainable Mobile
Computing . . . . . . . . . . . . . . . 46--48
Fatemeh Jalali and
Rob Ayre and
Arun Vishwanath and
Kerry Hinton and
Tansu Alpcan and
Rod Tucker Energy Consumption of Content
Distribution from Nano Data Centers
versus Centralized Data Centers . . . . 49--54
Shinobu Miwa and
Charles R. Lefurgy Evaluation of Core Hopping on POWER7 . . 55--60
Fikru Getachew Debele and
Nanfang Li and
Michela Meo and
Marco Ricca and
Yi Zhang Experimenting Resource-on-Demand
Strategies for Green WLANs . . . . . . . 61--66
Qing Yi and
Suresh Singh Minimizing Energy Consumption of FatTree
Data Center Networks . . . . . . . . . . 67--72
Shaolei Ren and
Mohammad A. Islam A First Look at Colocation Demand
Response . . . . . . . . . . . . . . . . 73--75
Derya Çavdar and
Andrea Ros\`a and
Lydia Y. Chen and
Walter Binder and
Fatih Alagöz Quantifying the Brown Side of Priority
Schedulers: Lessons from Big Clusters 76--81
Danilo Ardagna and
Mark S. Squillante Special Issue on Performance and
Resource Management in Big Data
Applications . . . . . . . . . . . . . . 2--2
Yue Tan and
Cathy H. Xia An Adaptive Learning Approach for
Efficient Resource Provisioning in Cloud
Services . . . . . . . . . . . . . . . . 3--11
Andrea Ros\`a and
Lydia Y. Chen and
Robert Birke and
Walter Binder Demystifying Casualties of Evictions in
Big Data Priority Scheduling . . . . . . 12--21
Yijun Ying and
Robert Birke and
Cheng Wang and
Lydia Y. Chen and
Gautam Natarajan On Energyaware Allocation and Execution
for Batch and Interactive MapReduce . . 22--30
Jian Tan and
Li Zhang and
Min Li and
Yandong Wang Multi-resource Fair Sharing for
Multiclass Workflows . . . . . . . . . . 31--37
Zhuoyao Zhang and
Ludmila Cherkasova and
Boon Thau Loo Exploiting Cloud Heterogeneity to
Optimize Performance and Cost of
MapReduce Processing . . . . . . . . . . 38--50
Marzieh Malekimajd and
Danilo Ardagna and
Michele Ciavotta and
Alessandro Maria Rizzi and
Mauro Passacantando Optimal Map Reduce Job Capacity
Allocation in Cloud Systems . . . . . . 51--61
Wei Zhang and
Sundaresan Rajasekaran and
Shaohua Duan and
Timothy Wood and
Mingfa Zhuy Minimizing Interference and Maximizing
Progress for Hadoop Virtual Machines . . 62--71
Bruce Hajek Bounds Implied by Drift with
Applications . . . . . . . . . . . . . . 1--1
Xiaoxi Zhang and
Zhiyi Huang and
Chuan Wu and
Zongpeng Li and
Francis C. M. Lau Online Auctions in IaaS Clouds: Welfare
and Profit Maximization with Server
Costs . . . . . . . . . . . . . . . . . 3--15
Se-Young Yun and
Alexandre Proutiere Distributed Proportional Fair Load
Balancing in Heterogeneous Systems . . . 17--30
Thomas Bonald and
James Roberts Multi-Resource Fairness: Objectives,
Algorithms and Performance . . . . . . . 31--42
Leonidas Georgiadis and
George Iosifidis and
Leandros Tassiulas Exchange of Services in Networks:
Competition, Cooperation, and Fairness 43--56
Samuli Aalto and
Pasi Lassila and
Prajwal Osti Whittle Index Approach to Size-aware
Scheduling with Time-varying Channels 57--69
Sanjib Sur and
Vignesh Venkateswaran and
Xinyu Zhang and
Parmesh Ramanathan 60 GHz Indoor Networking through
Flexible Beams: a Link-Level Profiling 71--84
Liang Zhang and
Weijie Wu and
Dan Wang Sponsored Data Plan: a Two-Class Service
Model in Wireless Data Networks . . . . 85--96
Bin Li and
Rayadurgam Srikant Queue-Proportional Rate Allocation with
Per-Link Information in Multihop
Networks . . . . . . . . . . . . . . . . 97--108
Jelena Marasevic and
Jin Zhou and
Harish Krishnaswamy and
Yuan Zhong and
Gil Zussman Resource Allocation and Rate Gains in
Practical Full-Duplex Systems . . . . . 109--122
Nicolas Gast and
Benny Van Houdt Transient and Steady-state Regime of a
Family of List-based Cache Replacement
Algorithms . . . . . . . . . . . . . . . 123--136
Mahmut Kandemir and
Hui Zhao and
Xulong Tang and
Mustafa Karakoy Memory Row Reuse Distance and its Role
in Optimizing Application Performance 137--149
Xiaomeng Chen and
Ning Ding and
Abhilash Jindal and
Y. Charlie Hu and
Maruti Gupta and
Rath Vannithamby Smartphone Energy Drain in the Wild:
Analysis and Implications . . . . . . . 151--164
Ming Chen and
Dean Hildebrand and
Geoff Kuenning and
Soujanya Shankaranarayana and
Bharat Singh and
Erez Zadok Newer Is Sometimes Better: an Evaluation
of NFSv4.1 . . . . . . . . . . . . . . . 165--176
Justin Meza and
Qiang Wu and
Sanjev Kumar and
Onur Mutlu A Large-Scale Study of Flash Memory
Failures in the Field . . . . . . . . . 177--190
Niangjun Chen and
Anish Agarwal and
Adam Wierman and
Siddharth Barman and
Lachlan L. H. Andrew Online Convex Optimization Using
Predictions . . . . . . . . . . . . . . 191--204
Donghyeon Lee and
Joonyoung Kim and
Hyunmin Lee and
Kyomin Jung Reliable Multiple-choice Iterative
Algorithm for Crowdsourcing Systems . . 205--216
Yang Liu and
Mingyan Liu An Online Learning Approach to Improving
the Quality of Crowd-Sourcing . . . . . 217--230
Richard Combes and
Stefan Magureanu and
Alexandre Proutiere and
Cyrille Laroche Learning to Rank: Regret Lower Bounds
and Efficient Algorithms . . . . . . . . 231--244
Richard Combes and
Chong Jiang and
Rayadurgam Srikant Bandits with Budgets: Regret Lower
Bounds and Optimal Algorithms . . . . . 245--257
Parinya Chalermsook and
Atish Das Sarma and
Ashwin Lall and
Danupon Nanongkai Social Network Monetization via
Sponsored Viral Marketing . . . . . . . 259--270
Giulia Fanti and
Peter Kairouz and
Sewoong Oh and
Pramod Viswanath Spy vs. Spy: Rumor Source Obfuscation 271--284
Laurent Massoulié and
Mesrob I. Ohannessian and
Alexandre Prouti\`ere Greedy-Bayes for Targeted News
Dissemination . . . . . . . . . . . . . 285--296
Mojtaba Tarihi and
Hossein Asadi and
Hamid Sarbazi-Azad DiskAccel: Accelerating Disk-Based
Experiments by Representative Sampling 297--308
Ye Jin and
Xiaosong Ma and
Mingliang Liu and
Qing Liu and
Jeremy Logan and
Norbert Podhorszki and
Jong Youl Choi and
Scott Klasky Combining Phase Identification and
Statistic Modeling for Automated
Parallel Benchmark Generation . . . . . 309--320
Qiaomin Xie and
Xiaobo Dong and
Yi Lu and
Rayadurgam Srikant Power of $d$ Choices for Large-Scale Bin
Packing: a Loss Model . . . . . . . . . 321--334
Amr Rizk and
Felix Poloczek and
Florin Ciucu Computable Bounds in Fork-Join Queueing
Systems . . . . . . . . . . . . . . . . 335--346
Kristen Gardner and
Samuel Zbarsky and
Sherwin Doroudi and
Mor Harchol-Balter and
Esa Hyytia Reducing Latency via Redundant Requests:
Exact Analysis . . . . . . . . . . . . . 347--360
Saleh Soltan and
Mihalis Yannakakis and
Gil Zussman Joint Cyber and Physical Attacks on
Power Grids: Graph Theoretical
Approaches for Information Recovery . . 361--374
Virag Shah and
Gustavo de Veciana Impact of Fairness and Heterogeneity on
Delays in Large-scale Content Delivery
Networks . . . . . . . . . . . . . . . . 375--387
Ting He and
Chang Liu and
Ananthram Swami and
Don Towsley and
Theodoros Salonidis and
Andrei Iu. Bejan and
Paul Yu Fisher Information-based Experiment
Design for Network Tomography . . . . . 389--402
Robert Birke and
Mathias Björkqvist and
Cyriel Minkenberg and
Martin Schmatz and
Lydia Y. Chen When Virtual Meets Physical at the Edge:
a Field Study on Datacenters' Virtual
Traffic . . . . . . . . . . . . . . . . 403--415
Qingjun Xiao and
Shigang Chen and
Min Chen and
Yibei Ling Hyper-Compact Virtual Estimators for Big
Network Data Based on Register Sharing 417--428
Vasileios Kotronis and
Rowan Klöti and
Matthias Rost and
Panagiotis Georgopoulos and
Bernhard Ager and
Stefan Schmid and
Xenofontas Dimitropoulos Investigating the Potential of the
Inter-IXP Multigraph for the
Provisioning of Guaranteed End-to-End
Services . . . . . . . . . . . . . . . . 429--430
Rahul Singh and
Alexander Stolyar MaxWeight Scheduling: Asymptotic
Behavior of Unscaled Queue-Differentials
in Heavy Traffic . . . . . . . . . . . . 431--432
Carlo Fuerst and
Stefan Schmid and
Lalith Suresh and
Paolo Costa Kraken: Towards Elastic Performance
Guarantees in Multi-tenant Data Centers 433--434
Keqiang He and
Junaid Khalid and
Sourav Das and
Aaron Gember-Jacobson and
Chaithan Prakash and
Aditya Akella and
Li Erran Li and
Marina Thottan Latency in Software Defined Networks:
Measurements and Mitigation Techniques 435--436
Yongquan Fu and
Ernst Biersack Tree-structured Bloom Filters for Joint
Optimization of False Positive
Probability and Transmission Bandwidth 437--438
Javad Ghaderi and
Sanjay Shakkottai and
Rayadurgam Srikant Scheduling Storms and Streams in the
Cloud . . . . . . . . . . . . . . . . . 439--440
Eli A. Meirom and
Chris Milling and
Constantine Caramanis and
Shie Mannor and
Sanjay Shakkottai and
Ariel Orda Localized Epidemic Detection in Networks
with Overwhelming Noise . . . . . . . . 441--442
Zhi Zhou and
Fangming Liu and
Zongpeng Li Pricing Bilateral Electricity Trade
between Smart Grids and Hybrid Green
Datacenters . . . . . . . . . . . . . . 443--444
Subhashini Krishnasamy and
Rajat Sen and
Sewoong Oh and
Sanjay Shakkottai Detecting Sponsored Recommendations . . 445--446
Yong Zhao and
Jia Rao and
Xiaobo Zhou and
Qing Yi Understanding Parallel Performance Under
Interferences in Multi-tenant Clouds . . 447--448
Rui Wu and
Jiaming Xu and
Rayadurgam Srikant and
Laurent Massoulie and
Marc Lelarge and
Bruce Hajek Clustering and Inference From Pairwise
Comparisons . . . . . . . . . . . . . . 449--450
Shaileshh Bojja Venkatakrishnan and
Pramod Viswanath Deterministic Near-Optimal P2P Streaming 451--452
Azalia Mirhoseini and
Ebrahim M. Songhori and
Bita Darvish Rouhani and
Farinaz Koushanfar Flexible Transformations For Learning
Big Data . . . . . . . . . . . . . . . . 453--454
Jian Li and
Bainan Xia and
Xinbo Geng and
Hao Ming and
Srinivas Shakkottai and
Vijay Subramanian and
Le Xie Energy Coupon: a Mean Field Game
Perspective on Demand Response in Smart
Grids . . . . . . . . . . . . . . . . . 455--456
Ibrahim Umar and
Otto Johan Anshus and
Phuong Hoai Ha DeltaTree: a Locality-aware Concurrent
Search Tree . . . . . . . . . . . . . . 457--458
Faraz Ahmed and
Jeffrey Erman and
Zihui Ge and
Alex X. Liu and
Jia Wang and
He Yan Detecting and Localizing End-to-End
Performance Degradation for Cellular
Data Services . . . . . . . . . . . . . 459--460
Rémi Varloot and
Ana Busíü'c and
Anne Bouillard Speeding up Glauber Dynamics for Random
Generation of Independent Sets . . . . . 461--462
Linquan Zhang and
Zongpeng Li and
Chuan Wu and
Shaolei Ren Online Electricity Cost Saving
Algorithms for Co-Location Data Centers 463--464
Guillaume Ducoffe and
Mathias Lécuyer and
Augustin Chaintreau and
Roxana Geambasu Web Transparency for Complex Targeting:
Algorithms, Limits, and Tradeoffs . . . 465--466
Varun Gupta and
Ana Radovanovic Lagrangian-based Online Stochastic Bin
Packing . . . . . . . . . . . . . . . . 467--468
Vani Gupta and
Stephen Lee and
Prashant Shenoy and
Ramesh Sitaraman and
Rahul Urgaonkar Towards Cooling Internet-Scale
Distributed Networks on the Cheap . . . 469--470
Russell Clapp and
Martin Dimitrov and
Karthik Kumar and
Vish Viswanathan and
Thomas Willhalm A Simple Model to Quantify the Impact of
Memory Latency and Bandwidth on
Performance . . . . . . . . . . . . . . 471--472
Qiumin Xu and
Huzefa Siyamwala and
Mrinmoy Ghosh and
Manu Awasthi and
Tameesh Suri and
Zvika Guz and
Anahita Shayesteh and
Vijay Balakrishnan Performance Characterization of
Hyperscale Applicationson on NVMe SSDs 473--474
Leana Golubchik and
Bert Zwart Spatial Loss Systems: Exact Simulation
and Rare Event Behavior . . . . . . . . 3--6
Martijn Onderwater and
Sandjai Bhulai and
Rob van der Mei Learning Optimal Policies in Markov
Decision Processes with Value Function
Discovery? . . . . . . . . . . . . . . . 7--9
Johan S. H. van Leeuwaarden and
Britt W. J. Mathijsen and
Fiona Sloothaak Delayed workload shifting in many-server
systems . . . . . . . . . . . . . . . . 10--12
F. Cecchi and
S. C. Borst and
J. S. H. van Leeuwaardena Mean-Field Analysis of Ultra-Dense CSMA
Networks . . . . . . . . . . . . . . . . 13--15
Brendan Patch and
Thomas Taimre and
Yoni Nazarathy Performance of Faulty Loss Systems with
Persistent Connections . . . . . . . . . 16--18
Seva Shneer and
Peter M. van de Ven Stability and instability of individual
nodes in multi-hop wireless CSMA/CA
networks . . . . . . . . . . . . . . . . 19--21
O. Brun and
H. Ben Cheikh and
B. J. Prabhu A Fluid model based Heuristic for
Optimal Speed-scaling of Multi-class
Single Server Queues . . . . . . . . . . 22--23
Matthieu Jonckheere and
Seva Shneer Gradient bandwidth allocations . . . . . 24--25
Jan Willem Kleinrouweler and
Sergio Cabrero and
Rob van der Mei and
Pablo Cesar Modeling the Effect of Sharing Policies
for Network-assisted HTTP Adaptive Video
Streaming . . . . . . . . . . . . . . . 26--27
Naresh M. Patel Half-Latency Rule for Finding the Knee
of the Latency Curve . . . . . . . . . . 28--29
Mikael Touati and
Rachid Elazouzi and
Marceau Coupechoux and
Eitan Altman and
Jean-Marc Kelif About Joint Stable User Association and
Resource Allocation in Multi-Rate IEEE
802.11 WLANs . . . . . . . . . . . . . . 30--31
Huaming Wu and
Yi Sun and
Katinka Wolter Analysis of the Energy-Response Time
Tradeoff for Delayed Mobile Cloud
Offloading . . . . . . . . . . . . . . . 33--35
Niangjun Chen and
Xiaoqi Ren and
Shaolei Ren and
Adam Wierman Greening Multi-Tenant Data Center Demand
Response . . . . . . . . . . . . . . . . 36--38
Shaoquan Zhang and
Longbo Huang and
Minghua Chen and
Xin Liu Proactive Serving Decreases User Delay
Exponentially . . . . . . . . . . . . . 39--41
Xiaoqi Ren and
Ganesh Ananthanarayanan and
Adam Wierman and
Minlan Yu Speculation-aware Cluster Scheduling . . 42--44
Weikun Wang and
Giuliano Casale Maximum Likelihood Estimation of Closed
Queueing Network Demands from Queue
Length Data . . . . . . . . . . . . . . 45--47
G. Kesidis and
Y. Shan and
B. Urgaonkar and
J. Liebeherr Network calculus for parallel processing 48--50
Pierre M. Fiorini and
Lester Lipsky Exact Analysis of Some Split-Merge
Queues . . . . . . . . . . . . . . . . . 51--53
Gauri Joshi and
Emina Soljanin and
Gregory Wornell Queues with Redundancy: Latency-Cost
Analysis . . . . . . . . . . . . . . . . 54--56
Daniel S. Berger and
Sebastian Henningsen and
Florin Ciucu and
Jens B. Schmitt Maximizing Cache Hit Ratios by Variance
Reduction . . . . . . . . . . . . . . . 57--59
Jian Tan and
Li Zhang and
Yandong Wang Miss behavior for caching with lease . . 60--62
Yudong Yang and
Vishal Misra and
Dan Rubenstein On the Optimality of Greedy Garbage
Collection for SSDs . . . . . . . . . . 63--65
Sam Spencer and
R. Srikant On the Impossibility of Localizing
Multiple Rumor Sources in a Line Graph 66--68
Nicolas Gast The Power of Two Choices on Graphs: the
Pair-Approximation is Accurate? . . . . 69--71
Siva Theja Maguluri and
R. Srikant Heavy-Traffic Behavior of the MaxWeight
Algorithm in a Switch with Uniform
Traffic . . . . . . . . . . . . . . . . 72--74
Ana Bu\vsi\'c and
Sean Meyn Approximate optimality with bounded
regret in dynamic matching models . . . 75--77
Yingdong Lu and
Mark S. Squillante and
Chai Wah Wu and
Bo Zhang On the Control of Epidemic-Like
Stochastic Processes with Time-Varying
Behavior? . . . . . . . . . . . . . . . 78--80
Marco Canini and
James Kempf and
Stefan Schmid How many planet-wide leaders should
there be? . . . . . . . . . . . . . . . 3--6
Da Wang and
Gauri Joshi and
Gregory Wornell Using Straggler Replication to Reduce
Latency in Large-scale Parallel
Computing . . . . . . . . . . . . . . . 7--11
Anshul Gandhi and
Justin Chan Analyzing the Network for AWS
Distributed Cloud Computing . . . . . . 12--15
Rui Jia and
Sherif Abdelwahed and
Abdelkarim Erradi A Predictive Control Approach for Fault
Management of Computing Systems . . . . 16--20
Hylson Vescovi Netto and
Lau Cheuk Lung and
Tulio Alberton Ribeiro and
Miguel Correia and
Aldelir Fernando Luiz Anticipating Requests to Improve
Performance and Reduce Costs in Cloud
Storage . . . . . . . . . . . . . . . . 21--24
Nadav Lavi and
Hanoch Levy Admit or Reject? Preserve or Drop?:
Operational Dilemmas upon Server
Failures on the Cloud . . . . . . . . . 25--29
Tianrong Zhang and
Yufeng Xin Towards Designing a Truthful Online
Auction Framework for Deadline-aware
Cloud Resource Allocation . . . . . . . 30--33
Nguyen H. Tran and
Cuong T. Do and
Choong Seon Hong and
Shaolei Ren and
Zhu Han Coordinated Colocation Datacenters for
Economic Demand Responce . . . . . . . . 34--37
Arne Ludwig and
Stefan Schmid Distributed Cloud Market: Who Benefits
from Specification Flexibilities? . . . 38--41
Bo Mao and
Suzhen Wu Deduplication-Assisted Data Reduction
and Distribution in Cloud-of-Clouds . . 42--42
Anshul Gandhi and
Naman Mittal and
Xi Zhang Optimal Load-Balancing for Heterogeneous
Clusters . . . . . . . . . . . . . . . . 43--43
Tan N. Le and
Bong Jun Choi and
Pradipta De Energy Cost Aware Scheduling of
MapReduce Jobs across Geographically
Distributed Nodes . . . . . . . . . . . 44--44
Sushil Bhojwani and
Matt Hemmings and
Dan Ingalls and
Jens Lincke and
Robert Krahn and
David Lary and
Rick McGeer and
Glenn Ricart and
Marko Roder and
Yvonne Coady and
Ulrike Stege The Ignite Distributed Collaborative
Visualization System . . . . . . . . . . 45--46
Patrick Maillé and
Bruno Tuffin Impact of Content Delivery Networks on
Service and Content Innovation . . . . . 49--52
Kartik Ahuja and
Simpson Zhang and
Mihaela van der Schaar The Population Dynamics of Websites:
[Extended Abstract] . . . . . . . . . . 53--56
Yuan Luo and
Nihar B. Shah and
Jianwei Huang and
Jean Walrand Parametric Prediction from Parametric
Agents? . . . . . . . . . . . . . . . . 57--57
Daron Acemoglu and
Ali Makhdoumi and
Azarakhsh Malekian and
Asu Ozdaglar Privacy-Constrained Network Formation 58--58
Arthi Ramachandran and
Augustin Chaintreau The Network Effect of Privacy Choices 59--62
M. H. Afrasiabi and
R. Guérin Choice-based Pricing for User-Provided
Connectivity? . . . . . . . . . . . . . 63--66
Reshef Meir and
David Parkes Playing the Wrong Game: Smoothness
Bounds for Congestion Games with
Behavioral Biases . . . . . . . . . . . 67--70
Michal Feldman and
Ophir Friedler Convergence to Strong Equilibrium in
Network Design Games . . . . . . . . . . 71--71
Mikael Touati and
Rachid El-Azouzi and
Marceau Coupechoux and
Eitan Altman and
Jean-Marc Kelif Core Stable Algorithms for Coalition
Games with Complementarities and Peer
Effects . . . . . . . . . . . . . . . . 72--75
Cinar Kilcioglu and
Costis Maglaras Revenue Maximization for Cloud Computing
Services . . . . . . . . . . . . . . . . 76--76
Janardhan Kulkarni and
Vahab Mirrokni Dynamic Coordination Mechanisms:
[Extended Abstract] . . . . . . . . . . 77--77
Hamidreza Tavafoghi and
Demosthenis Teneketzis Sequential Contracts for Uncertain
Electricity Resources . . . . . . . . . 78--81
Eran Simhon and
David Starobinski On the Impact of Sharing Information in
Advance Reservation Systems . . . . . . 82--82
Sofia Ceppi and
Ian Kash Personalized Payments for
Storage-as-a-Service . . . . . . . . . . 83--86
Saif Benjaafar and
Guangwen Kong and
Xiang Li Modeling and Analysis of Collaborative
Consumption in Peer-to-Peer Car Sharing 87--90
Diwakar Krishnamurthy and
Anne Koziolek Performance Challenges, Current Bad
Practices, and Hints in PaaS Cloud
Application Design . . . . . . . . . . . 3--12
Robert Heinrich Architectural Run-time Models for
Performance and Privacy Analysis in
Dynamic Cloud Applications? . . . . . . 13--22
Zheng Li and
Liam O'Brien and
Maria Kihl DoKnowMe: Towards a Domain
Knowledge-driven Methodology for
Performance Evaluation . . . . . . . . . 23--32
Michael Grottke and
Alberto Avritzer and
Daniel S. Menasché and
Leandro P. de Aguiar and
Eitan Altman On the Efficiency of Sampling and
Countermeasures to
Critical-Infrastructure-Targeted Malware
Campaigns . . . . . . . . . . . . . . . 33--42
Kim-Thomas Rehmann and
Changyun Seo and
Dongwon Hwang and
Binh Than Truong and
Alexander Boehm and
Dong Hun Lee Performance Monitoring in SAP HANA's
Continuous Integration Process . . . . . 43--52
Manoj Nambiar and
Ajay Kattepur and
Gopal Bhaskaran and
Rekha Singhal and
Subhasri Duttagupta Model Driven Software Performance
Engineering: Current Challenges and Way
Ahead . . . . . . . . . . . . . . . . . 53--62
David Gamarnik and
John N. Tsitsiklis and
Martin Zubeldia Delay, Memory, and Messaging Tradeoffs
in Distributed Service Systems . . . . . 1--12
Siva Theja Maguluri and
Sai Kiran Burle and
R. Srikant Optimal Heavy-Traffic Queue Length
Scaling in an Incompletely Saturated
Switch . . . . . . . . . . . . . . . . . 13--24
Yun Zeng and
Augustin Chaintreau and
Don Towsley and
Cathy H. Xia A Necessary and Sufficient Condition for
Throughput Scalability of Fork and Join
Networks with Blocking . . . . . . . . . 25--36
Michele Garetto and
Emilio Leonardi and
Giovanni Luca Torrisi Generalized Threshold-Based Epidemics in
Random Graphs: The Power of Extreme
Values . . . . . . . . . . . . . . . . . 37--50
Eliav Buchnik and
Edith Cohen Reverse Ranking by Graph Structure:
Model and Scalable Algorithms . . . . . 51--62
Daniel Cullina and
Negar Kiyavash Improved Achievability and Converse
Bounds for Erd\Hos--Rényi Graph Matching 63--72
Mor Harchol-Balter A Better Model for Task Assignment in
Server Farms: How Replication can Help 73--73
Shaileshh Bojja Venkatakrishnan and
Mohammad Alizadeh and
Pramod Viswanath Costly Circuits, Submodular Schedules
and Approximate Carathéodory Theorems . . 75--88
Shankaranarayanan Puzhavakath Narayanan and
Yun Seong Nam and
Ashiwan Sivakumar and
Balakrishnan Chandrasekaran and
Bruce Maggs and
Sanjay Rao Reducing Latency Through Page-aware
Management of Web Objects by Content
Delivery Networks . . . . . . . . . . . 89--100
Andrés Ferragut and
Ismael Rodriguez and
Fernando Paganini Optimizing TTL Caches under Heavy-Tailed
Demands . . . . . . . . . . . . . . . . 101--112
Stratis Ioannidis and
Edmund Yeh Adaptive Caching Networks with
Optimality Guarantees . . . . . . . . . 113--124
Philippe Jacquet Breathing Mankind Thoughts . . . . . . . 125--125
Zain Shamsi and
Dmitri Loguinov Unsupervised Clustering Under Temporal
Feature Volatility in Network Stack
Fingerprinting . . . . . . . . . . . . . 127--138
Haipeng Dai and
Yuankun Zhong and
Alex X. Liu and
Wei Wang and
Meng Li Noisy Bloom Filters for Multi-Set
Membership Testing . . . . . . . . . . . 139--151
Giulia Fanti and
Peter Kairouz and
Sewoong Oh and
Kannan Ramchandran and
Pramod Viswanath Rumor Source Obfuscation on Irregular
Trees . . . . . . . . . . . . . . . . . 153--164
Konstantin Avrachenkov and
Bruno Ribeiro and
Jithin K. Sreedharan Inference in OSNs via Lightweight
Partial Crawls . . . . . . . . . . . . . 165--177
Maksym Gabielkov and
Arthi Ramachandran and
Augustin Chaintreau and
Arnaud Legout Social Clicks: What and Who Gets Read on
Twitter? . . . . . . . . . . . . . . . . 179--192
Niangjun Chen and
Joshua Comden and
Zhenhua Liu and
Anshul Gandhi and
Adam Wierman Using Predictions in Online
Optimization: Looking Forward with an
Eye on the Past . . . . . . . . . . . . 193--206
Guy Bresler and
Devavrat Shah and
Luis Filipe Voloch Collaborative Filtering with Low Regret 207--220
Jia Liu Achieving Low-Delay and Fast-Convergence
in Stochastic Network Optimization: a
Nesterovian Approach . . . . . . . . . . 221--234
Liang Zheng and
Carlee Joe-Wong and
Christopher G. Brinton and
Chee Wei Tan and
Sangtae Ha and
Mung Chiang On the Viability of a Cloud Virtual
Service Provider . . . . . . . . . . . . 235--248
Weina Wang and
Lei Ying and
Junshan Zhang The Value of Privacy: Strategic Data
Subjects, Incentive Mechanisms and
Fundamental Limits . . . . . . . . . . . 249--260
Yuanjie Li and
Haotian Deng and
Jiayao Li and
Chunyi Peng and
Songwu Lu Instability in Distributed Mobility
Management: Revisiting Configuration
Management in 3G/4G Mobile Networks . . 261--272
Arne Ludwig and
Szymon Dudyzc and
Matthias Rost and
Stefan Schmid Transiently Secure Network Updates . . . 273--284
Lei Ying On the Approximation Error of Mean-Field
Models . . . . . . . . . . . . . . . . . 285--297
Bo Jiang and
Daniel R. Figueiredo and
Bruno Ribeiro and
Don Towsley On the Duration and Intensity of
Competitions in Nonlinear Pólya Urn
Processes with Fitness . . . . . . . . . 299--310
Matthieu Jonckheere and
Balakrishna J. Prabhu Asymptotics of Insensitive Load
Balancing and Blocking Phases . . . . . 311--322
Kevin K. Chang and
Abhijith Kashyap and
Hasan Hassan and
Saugata Ghose and
Kevin Hsieh and
Donghyuk Lee and
Tianshi Li and
Gennady Pekhimenko and
Samira Khan and
Onur Mutlu Understanding Latency Variation in
Modern DRAM Chips: Experimental
Characterization, Analysis, and
Optimization . . . . . . . . . . . . . . 323--336
Idan Yaniv and
Dan Tsafrir Hash, Don't Cache (the Page Table) . . . 337--350
Adwait Jog and
Onur Kayiran and
Ashutosh Pattnaik and
Mahmut T. Kandemir and
Onur Mutlu and
Ravishankar Iyer and
Chita R. Das Exploiting Core Criticality for Enhanced
GPU Performance . . . . . . . . . . . . 351--363
Lam M. Nguyen and
Alexander L. Stolyar A Service System with Randomly Behaving
On-demand Agents . . . . . . . . . . . . 365--366
Stanko Novakovic and
Alexandros Daglis and
Edouard Bugnion and
Babak Falsafi and
Boris Grot An Analysis of Load Imbalance in
Scale-out Data Serving . . . . . . . . . 367--368
Yi Cao and
Javad Nejati and
Pavan Maguluri and
Aruna Balasubramanian and
Anshul Gandhi Analyzing the Power Consumption of the
Mobile Page Load . . . . . . . . . . . . 369--370
Mubashir Adnan Qureshi and
Ajay Mahimkar and
Lili Qiu and
Zihui Ge and
Sarat Puthenpura and
Nabeel Mir and
Sanjeev Ahuja Automated Test Location Selection For
Cellular Network Upgrades . . . . . . . 371--372
Wenjie Liu and
Ping Huang and
Kun Tang and
Ke Zhou and
Xubin He CAR: a Compression-Aware Refresh
Approach to Improve Memory Performance
and Energy Efficiency . . . . . . . . . 373--374
Felix Poloczek and
Florin Ciucu Contrasting Effects of Replication in
Parallel Systems: From Overload to
Underload and Back . . . . . . . . . . . 375--376
Benny Van Houdt Explicit Back-off Rates for Achieving
Target Throughputs in CSMA/CA Networks 377--379
Liang Liu and
Yating Wang and
Lance Fortnow and
Jin Li and
Jun Xu Freestyle Dancing: Randomized Algorithms
for Dynamic Storage Load-Balancing . . . 381--382
Xiaoqi Ren and
Palma London and
Juba Ziani and
Adam Wierman Joint Data Purchasing and Data Placement
in a Geo-Distributed Data Market . . . . 383--384
Arpan Mukhopadhyay and
Ravi R. Mazumdar and
Rahul Roy Majority Rule Based Opinion Dynamics
with Biased and Stubborn Agents . . . . 385--386
Vamseedhar Reddyvari Raja and
Vinod Ramaswamy and
Srinivas Shakkottai and
Vijay Subramanian Mean Field Equilibria of Pricing Games
in Internet Marketplaces . . . . . . . . 387--388
Mansour Shafaei and
Mohammad Hossein Hajkazemi and
Peter Desnoyers and
Abutalib Aghayev Modeling SMR Drive Performance . . . . . 389--390
Richard Combes and
Habib Sidi and
Salah Elayoubi Multipath Streaming: Fundamental Limits
and Efficient Algorithms . . . . . . . . 391--392
Alireza Shekaramiz and
Jorg Liebeherr and
Almut Burchard Network Calculus Analysis of a Feedback
System with Random Service . . . . . . . 393--394
Adnan Ahmed and
Zubair Shafiq and
Amir Khakpour QoE Analysis of a Large-Scale Live Video
Streaming Event . . . . . . . . . . . . 395--396
Sen Yang and
Bill Lin and
Jun Xu Safe Randomized Load-Balanced Switching
by Diffusing Extra Loads . . . . . . . . 397--398
Avik Ray and
Sujay Sanghavi and
Sanjay Shakkottai Searching For A Single Community in a
Graph . . . . . . . . . . . . . . . . . 399--400
Daiping Liu and
Xing Gao and
Mingwei Zhang and
Haining Wang Shoot for the Moon and You Will Never
Miss: Characterizing and Detecting
Aimbots in Online Games . . . . . . . . 401--402
Anastasios Giovanidis and
Apostolos Avranas Spatial Multi-LRU Caching for Wireless
Networks with Coverage Overlaps . . . . 403--405
Iyswarya Narayanan and
Di Wang and
Myeongjae Jeon and
Bikash Sharma and
Laura Caulfield and
Anand Sivasubramaniam and
Ben Cutler and
Jie Liu and
Badriddine Khessib and
Kushagra Vaid SSD Failures in Datacenters: What, When
and Why? . . . . . . . . . . . . . . . . 407--408
Kristen Gardner and
Samuel Zbarsky and
Mor Harchol-Balter and
Alan Scheller-Wolf The Power of $d$ Choices for Redundancy 409--410
Hui Wang and
Peter Varman Time-Based Bandwidth Allocation for
Heterogeneous Storage . . . . . . . . . 411--413
Wei Wang and
Baochun Li and
Ben Liang and
Jun Li Towards Multi-Resource Fair Allocation
with Placement Constraints . . . . . . . 415--416
Hong Xie and
Richard T. B. Ma and
John C. S. Lui Trading Discount for Reputation?: On the
Design and Analysis of E-Commerce
Discount Mechanisms . . . . . . . . . . 417--418
Mark S. Squillante Estimation of the traffic intensity in a
piecewise-stationary Mt/Gt/1 queue with
probing . . . . . . . . . . . . . . . . 3--5
Nicolas Gast Construction of Lyapunov Functions via
Relative Entropy with Application to
Caching . . . . . . . . . . . . . . . . 6--8
Guilherme Domingues and
Edmundo de Souza e Silva and
Rosa Leão and
Daniel Menasché and
Don Towsley Search and Placement in Tiered Cache
Networks . . . . . . . . . . . . . . . . 9--11
Kechao Cai and
Hong Xie and
John C. S. Lui Generalization of Information Spreading
Forensics via Sequential Dependent
Snapshots . . . . . . . . . . . . . . . 12--14
Erol Gelenbe Agreement in Spins and Social Networks 15--17
Josu Doncel and
Nicolas Gast and
Bruno Gaujal Are Mean-field Games the Limits of
Finite Stochastic Games? . . . . . . . . 18--20
Eugene A. Feinberg and
Yan Liang Structure of Optimal Solutions to
Periodic-Review Total-Cost Stochastic
Inventory Control Problems . . . . . . . 21--23
Christine Fricker and
Fabrice Guillemin and
Philippe Robert Analysis of Downgrading for Resource
Allocation . . . . . . . . . . . . . . . 24--26
Yingdong Lu and
Siva Theja Maguluri and
Mark S. Squillante and
Chai Wah Wu Risk-Based Dynamic Allocation of
Computing Resources . . . . . . . . . . 27--29
Pavlos Sermpezis and
Xenofontas Dimitropoulos Inter-domain SDN: Analysing the Effects
of Routing Centralization on BGP
Convergence Time . . . . . . . . . . . . 30--32
Kristen Gardner and
Samuel Zbarsky and
Mark Velednitsky and
Mor Harchol-Balter and
Alan Scheller-Wolf Understanding Response Time in the
Redundancy-$d$ System . . . . . . . . . 33--35
Debankur Mukherjee and
Sem Borst and
Johan van Leeuwaarden and
Phil Whiting Universality of Power-of-$d$ Load
Balancing Schemes . . . . . . . . . . . 36--38
S. Juneja and
D. Manjunath To Lounge or to Queue Up . . . . . . . . 39--41
Alexander L. Stolyar Large-scale Service Systems with Packing
Constraints and Heterogeneous Servers 42--44
Y. Lu and
S. T. Maguluri and
M. S. Squillante and
T. Suk Delay-Optimal Scheduling for Some
Input-Queued Switches . . . . . . . . . 45--47
Navid Azizan Ruhi and
Niangjun Chen and
Krishnamurthy Dvijotham and
Adam Wierman Opportunities for Price Manipulation by
Aggregators in Electricity Markets . . . 49--51
Joshua Comden and
Zhenhua Liu and
Yue Zhao Optimizing the Level of Commitment in
Demand Response . . . . . . . . . . . . 52--67
Ruiting Zhou and
Zongpeng Li and
Chuan Wu An Emergency Demand Response Mechanism
for Cloud Computing . . . . . . . . . . 58--63
Giovanni Neglia and
Matteo Sereno and
Giuseppe Bianchi Geographical Load Balancing across Green
Datacenters: a Mean Field Analysis . . . 64--69
Alessandro Facchini and
Cristina Rottondi and
Giacomo Verticale Emergence of Shared Behaviour in
Distributed Scheduling Systems for
Domestic Appliances . . . . . . . . . . 70--75
Claudio Rossi and
Manuel Gaetani and
Antonio Defina AURORA: an Energy Efficient Public
Lighting IoT System for Smart Cities . . 76--81
Mattia Dalmasso and
Michela Meo and
Daniela Renga Radio Resource Management for Improving
Energy Self-sufficiency of Green Mobile
Networks . . . . . . . . . . . . . . . . 82--87
Xiaoyi Fan and
Feng Wang and
Jiangchuan Liu Boosting Service Availability for Base
Stations of Cellular Networks by
Event-driven Battery Profiling . . . . . 88--93
Jianyuan Lu and
Liang Liu and
Jun ``Jim'' Xu and
Bin Liu Toward Power-Efficient Backbone Routers 94--99
Rahul Vaze and
Marceau Coupechoux Online Budgeted Truthful Matching . . . 3--6
Yongwhan Lim and
Asuman Ozdaglar and
Alexander Teytelboym Competitive Rumor Spread in Social
Networks . . . . . . . . . . . . . . . . 7--14
Arpit Goel and
Vijay Kamble and
Siddhartha Banerjee and
Ashish Goel Network Formation of Coalition Loyalty
Programs . . . . . . . . . . . . . . . . 15--20
Reed Harder and
Vikrant Vaze Two-Stage Game Theoretic Modelling of
Airline Frequency and Fare Competition 21--21
Ashish R. Hota and
Harsha Honnappa and
Shreyas Sundaram The Superposition-Traffic Game . . . . . 22--25
Alexandre Reiffers-Masson and
Eduardo Hargreaves and
Eitan Altman and
Wouter Caarls and
Daniel S. Menasché Timelines are Publisher-Driven Caches:
Analyzing and Shaping Timeline Networks 26--29
Y. Shan and
C. Lo Prete and
G. Kesidis and
D. J. Miller A simulation framework for uneconomic
virtual bidding in day-ahead electricity
markets: Short talk . . . . . . . . . . 30--30
Pierre L'Ecuyer and
Patrick Maillé and
Nicolás Stier-Moses and
Bruno Tuffin Search (Non-)Neutrality and Impact on
Innovation: Short talk . . . . . . . . . 31--31
Qian Ma and
Jianwei Huang and
Tamer Basar and
Ji Liu and
Xudong Chen Pricing for Sharing Economy with
Reputation . . . . . . . . . . . . . . . 32--32
J.-Ch. Grégoire and
Ang\`ele M. Hamel and
D. Marc Kilgour Pricing for a Hybrid Delivery Model of
Video Streaming . . . . . . . . . . . . 33--36
Angelos Antonopoulos and
Chiara Perillo and
Christos Verikoukis Internet Service Providers vs.
Over-the-Top Companies: Friends or Foes?
--- Short talk . . . . . . . . . . . . . 37--37
Chaolun Xia and
Saikat Guha and
S. Muthukrishnan How Much is Your Attention Worth?:
Analysis of Prices in LinkedIn
Advertising Network --- Short talk . . . 38--38
Thi Thu Han Nguyen and
Olivier Brun and
Balakrishna J. Prabhu Performance of a fixed reward incentive
scheme for two-hop DTNs with competing
relays: Short talk . . . . . . . . . . . 39--39
Martijn Onderwater and
Gerard Hoekstra and
Rob van der Mei Throughput Modeling of the IEEE MAC for
Sensor Networks . . . . . . . . . . . . 2--9
Valeria Cardellini and
Vincenzo Grassi and
Francesco Lo Presti and
Matteo Nardelli Optimal Operator Replication and
Placement for Distributed Stream
Processing Systems . . . . . . . . . . . 11--22
Eugenio Gianniti and
Alessandro Maria Rizzi and
Enrico Barbierato and
Marco Gribaudo and
Danilo Ardagna Fluid Petri Nets for the Performance
Evaluation of MapReduce and Spark
Applications . . . . . . . . . . . . . . 23--36
Francesco Longo and
Rahul Ghosh and
Vijay K. Naik and
Andrew J. Rindos and
Kishor S. Trivedi An Approach for Resiliency
Quantification of Large Scale Systems 37--48
Claudia Canali and
Riccardo Lancellotti Identifying Communication Patterns
between Virtual Machines in
Software-Defined Data Centers . . . . . 49--56
Francesco Bianchi and
Francesco Lo Presti A Markov Reward based Resource-Latency
Aware Heuristic for the Virtual Network
Embedding Problem . . . . . . . . . . . 57--68
Lorenzo Donatiello and
Gustavo Marfia Analyzing and shaping the lifetime and
the performance of barrier coverage
sensor networks . . . . . . . . . . . . 69--79
Riccardo Pinciroli and
Salvatore Distefano Characterization and Evaluation of
Mobile Crowdsensing Performance and
Energy Indicators . . . . . . . . . . . 80--90
Niccoló Totis and
Laura Follia and
Chiara Riganti and
Francesco Novelli and
Francesca Cordero and
Marco Beccuti Overcoming the lack of kinetic
information in biochemical reactions
networks . . . . . . . . . . . . . . . . 91--102
Leana Golubchik Delay Scalings and Mean-Field Limits in
Networked Systems . . . . . . . . . . . 1--1
Konstantin Avrachenkov and
Jasper Goseling and
Berksan Serbetci A Low-Complexity Approach to Distributed
Cooperative Caching with Geographic
Constraints . . . . . . . . . . . . . . 2--2
Debankur Mukherjee and
Souvik Dhara and
Sem C. Borst and
Johan S. H. van Leeuwaarden Optimal Service Elasticity in
Large-Scale Distributed Systems . . . . 3--3
Long Gong and
Paul Tune and
Liang Liu and
Sen Yang and
Jun (Jim) Xu Queue-Proportional Sampling: a Better
Approach to Crossbar Scheduling for
Input-Queued Switches . . . . . . . . . 4--4
Xiaoen Ju and
Hani Jamjoom and
Kang G. Shin Hieroglyph: Locally-Sufficient Graph
Processing via Compute-Sync-Merge . . . 5--5
Lingda Li and
Robel Geda and
Ari B. Hayes and
Yanhao Chen and
Pranav Chaudhari and
Eddy Z. Zhang and
Mario Szegedy A Simple Yet Effective Balanced Edge
Partition Model for Parallel Computing 6--6
Maxime C. Cohen and
Philipp Keller and
Vahab Mirrokni and
Morteza Zadimoghadddam Overcommitment in Cloud Services Bin
packing with Chance Constraints . . . . 7--7
Alan Quach and
Zhongjie Wang and
Zhiyun Qian Investigation of the 2016 Linux TCP
Stack Vulnerability at Scale . . . . . . 8--8
Brandon Wang and
Xiaoye Li and
Leandro P. de Aguiar and
Daniel S. Menasche and
Zubair Shafiq Characterizing and Modeling Patching
Practices of Industrial Control Systems 9--9
Sinong Wang and
Ness Shroff Security Game with Non-additive
Utilities and Multiple Attacker
Resources . . . . . . . . . . . . . . . 10--10
Anton Braverman and
J. G. Dai and
Xin Liu and
Lei Ying Fluid-Model-Based Car Routing for Modern
Ridesharing Systems . . . . . . . . . . 11--12
Alan Kuhnle and
Tianyi Pan and
Victoria G. Crawford and
Md Abdul Alim and
My T. Thai Pseudo-Separation for Assessment of
Structural Vulnerability of a Network 13--14
Han Deng and
I-Hong Hou On the Capacity Requirement for
Arbitrary End-to-End Deadline and
Reliability Guarantees in Multi-hop
Networks . . . . . . . . . . . . . . . . 15--16
Maotong Xu and
Sultan Alamro and
Tian Lan and
Suresh Subramaniam Optimizing Speculative Execution of
Deadline-Sensitive Jobs in Cloud . . . . 17--18
Mohammad A. Islam and
Xiaoqi Ren and
Shaolei Ren and
Adam Wierman A Spot Capacity Market to Increase Power
Infrastructure Utilization in
Multi-Tenant Data Centers . . . . . . . 19--20
Lin Yang and
Mohammad H. Hajiesmaili and
Hanling Yi and
Minghua Chen Hour-Ahead Offering Strategies in
Electricity Market for Power Producers
with Storage and Intermittent Supply . . 21--22
Xing Gao and
Zhang Xu and
Haining Wang and
Li Li and
Xiaorui Wang Why ``Some'' Like It Hot Too: Thermal
Attack on Data Centers . . . . . . . . . 23--24
Joshua Comden and
Zhenhua Liu and
Yue Zhao Incentivizing Reliable Demand Response
with Customers' Uncertainties and
Capacity Planning . . . . . . . . . . . 25--26
Amin Jadidi and
Mohammad Arjomand and
Mahmut Kandemir and
Chita Das A Study on Performance and Power
Efficiency of Dense Non-Volatile Caches
in Multi-Core Systems . . . . . . . . . 27--28
Mehrnoosh Shafiee and
Javad Ghaderi Scheduling Coflows in Datacenter
Networks: Improved Bound for Total
Weighted Completion Time . . . . . . . . 29--30
Qin Xiong and
Fei Wu and
Zhonghai Lu and
Yue Zhu and
You Zhou and
Yibing Chu and
Changsheng Xie and
Ping Huang Characterizing $3$D Floating Gate NAND
Flash . . . . . . . . . . . . . . . . . 31--32
Yeon-sup Lim and
Erich M. Nahum and
Don Towsley and
Richard J. Gibbens ECF: an MPTCP Path Scheduler to Manage
Heterogeneous Paths . . . . . . . . . . 33--34
Mehmet Fatih Aktas and
Elie Najm and
Emina Soljanin Simplex Queues for Hot-Data Download . . 35--36
Siddharth Singh and
Vedant Nanda and
Rijurekha Sen and
Sohaib Ahmad and
Satadal Sengupta and
Amreesh Phokeer and
Zaid Ahmed Farooq and
Taslim Arefin Khan and
Ponnurangam Kumaragaguru and
Ihsan Ayyub Qazi and
David Choffnes and
Krishna P. Gummadi An Empirical Analysis of Facebook's Free
Basics . . . . . . . . . . . . . . . . . 37--38
Jorge Mena and
Peter Bankole and
Mario Gerla Multipath TCP on a VANET: a Performance
Study . . . . . . . . . . . . . . . . . 39--40
Ye Yu and
Djamal Belazzougui and
Chen Qian and
Qin Zhang A Fast, Small, and Dynamic Forwarding
Information Base . . . . . . . . . . . . 41--42
Ning Wu and
Yingjie Bi and
Nithin Michael and
Ao Tang and
John Doyle and
Nikolai Matni HFTraC: High-Frequency Traffic Control 43--44
Soumya Basu and
Aditya Sundarrajan and
Javad Ghaderi and
Sanjay Shakkottai and
Ramesh Sitaraman Adaptive TTL-Based Caching for Content
Delivery . . . . . . . . . . . . . . . . 45--46
Vahab Mirrokni Online Optimization for Markets and the
Cloud: Theory and Practice . . . . . . . 47--48
Lei Ying Stein's Method for Mean-Field
Approximations in Light and Heavy
Traffic Regimes . . . . . . . . . . . . 49--49
Nicolas Gast Expected Values Estimated via Mean-Field
Approximation are $ 1 / N $-Accurate:
Extended Abstract . . . . . . . . . . . 50--50
Wen Sun and
Véronique Simon and
Sébastien Monnet and
Philippe Robert and
Pierre Sens Analysis of a Stochastic Model of
Replication in Large Distributed Storage
Systems: a Mean-Field Approach . . . . . 51--51
Kevin K. Chang and
Abdullah Giray Yaglikçi and
Saugata Ghose and
Aditya Agrawal and
Niladrish Chatterjee and
Abhijith Kashyap and
Donghyuk Lee and
Mike O'Connor and
Hasan Hassan and
Onur Mutlu Understanding Reduced-Voltage Operation
in Modern DRAM Devices: Experimental
Characterization, Analysis, and
Mechanisms . . . . . . . . . . . . . . . 52--52
Wonil Choi and
Mohammad Arjomand and
Myoungsoo Jung and
Mahmut T. Kandemir Exploiting Data Longevity for Enhancing
the Lifetime of Flash-based Storage
Class Memory . . . . . . . . . . . . . . 53--53
Donghyuk Lee and
Samira Khan and
Lavanya Subramanian and
Saugata Ghose and
Rachata Ausavarungnirun and
Gennady Pekhimenko and
Vivek Seshadri and
Onur Mutlu Design-Induced Latency Variation in
Modern DRAM Chips: Characterization,
Analysis, and Latency Reduction
Mechanisms . . . . . . . . . . . . . . . 54--54
Mathias Gibbens and
Chris Gniady and
Lei Ye and
Beichuan Zhang Hadoop on Named Data Networking:
Experience and Results . . . . . . . . . 55--55
Cheng Wang and
Bhuvan Urgaonkar and
Neda Nasiriani and
George Kesidis Using Burstable Instances in the Public
Cloud: Why, When and How? . . . . . . . 56--56
Shaileshh Bojja Venkatakrishnan and
Giulia Fanti and
Pramod Viswanath Dandelion: Redesigning the Bitcoin
Network for Anonymity . . . . . . . . . 57--57
Michael Jordan On Gradient-Based Optimization:
Accelerated, Distributed, Asynchronous
and Stochastic . . . . . . . . . . . . . 58--58
Prateek Sharma and
David Irwin and
Prashant Shenoy Portfolio-driven Resource Management for
Transient Cloud Servers . . . . . . . . 59--59
Zijun Zhang and
Zongpeng Li and
Chuan Wu Optimal Posted Prices for Online Cloud
Resource Allocation . . . . . . . . . . 60--60
Xin Wang and
Richard T. B. Ma and
Yinlong Xu On Optimal Two-Sided Pricing of
Congested Networks . . . . . . . . . . . 61--61
Sewoong Oh Matrix Factorization at the Frontier of
Non-convex Optimizations: Abstract for
SIGMETRICS 2017 Rising Star Award Talk 62--62
Hung T. Nguyen and
Tri P. Nguyen and
Tam N. Vu and
Thang N. Dinh Outward Influence and Cascade Size
Estimation in Billion-scale Networks . . 63--63
Giuliano Casale Accelerating Performance Inference over
Closed Systems by Asymptotic Methods . . 64--64
Steffen Bondorf and
Paul Nikolaus and
Jens B. Schmitt Quality and Cost of Deterministic
Network Calculus: Design and Evaluation
of an Accurate and Fast Analysis . . . . 65--65
David Formby and
Anwar Walid and
Raheem Beyah A Case Study in Power Substation Network
Dynamics . . . . . . . . . . . . . . . . 66--66
You Zhou and
Yian Zhou and
Min Chen and
Shigang Chen Persistent Spread Measurement for Big
Network Data Based on Register
Intersection . . . . . . . . . . . . . . 67--67
Yi Cao and
Javad Nejati and
Muhammad Wajahat and
Aruna Balasubramanian and
Anshul Gandhi Deconstructing the Energy Consumption of
the Mobile Page Load . . . . . . . . . . 68--68
Richard T. B. Ma and
Vishal Misra Routing Money, Not Packets: a Tutorial
on Internet Economics . . . . . . . . . 69--70
Mark S. Squillante On the Optimality of Reflection Control,
with Production-Inventory Applications 3--5
Eugene A. Feinberg and
Jefferson Huang Strongly Polynomial Algorithms for
Transient and Average-Cost MDPs . . . . 6--8
Gauri Joshi Boosting Service Capacity via Adaptive
Task Replication . . . . . . . . . . . . 9--11
Mehmet Fatih Aktas and
Pei Peng and
Emina Soljanin Effective Straggler Mitigation: Which
Clones Should Attack and When? . . . . . 12--14
Weixuan Lin and
John Z. F. Pang and
Eilyan Bitar and
Adam Wierman Networked Cournot Competition in
Platform Markets: Access Control and
Efficiency Loss . . . . . . . . . . . . 15--17
Tyler Maxey and
Hakjin Chung and
Hyun-Soo Ahn and
Rhonda Righter When is Anarchy Beneficial? . . . . . . 18--20
Nitish K. Panigrahy and
Jian Li and
Don Towsley Hit Rate vs. Hit Probability Based Cache
Utility Maximization . . . . . . . . . . 21--23
Bo Jiang and
Philippe Nain and
Don Towsley LRU Cache under Stationary Requests . . 24--26
Gautam Goel and
Niangjun Chen and
Adam Wierman Thinking Fast and Slow: Optimization
Decomposition Across Timescales . . . . 27--29
Palma London and
Niangjun Chen and
Shai Vardi and
Adam Wierman Distributed Optimization via Local
Computation Algorithms . . . . . . . . . 30--32
Angelos Aveklouris and
Yorie Nakahira and
Maria Vlasiou and
Bert Zwart Electric vehicle charging: a queueing
approach . . . . . . . . . . . . . . . . 33--35
Ziv Scully and
Guy Blelloch and
Mor Harchol-Balter and
Alan Scheller-Wolf Optimally Scheduling Jobs with Multiple
Tasks . . . . . . . . . . . . . . . . . 36--38
Yuliy Baryshnikov and
Abram Magner Large Deviations for Increasing
Subsequences of Permutations and a
Concurrency Application . . . . . . . . 39--41
Arnab Ganguly and
Kavita Ramanan and
Philippe Robert and
Wen Sun A Large-Scale Network with Moving
Servers . . . . . . . . . . . . . . . . 42--44
Sergey Foss and
Alexander L. Stolyar Join-Idle-Queue system with general
service times: Large-scale limit of
stationary distributions . . . . . . . . 45--47
Yingdong Lu and
Mark S. Squillante and
Chai Wah Wu Nearly Completely Decomposable
Epidemic-Like Stochastic Processes with
Time-Varying Behavior . . . . . . . . . 48--50
Joshua Comden and
Zhenhua Liu and
Yue Zhao Distributed Algorithm Design for
Probabilistic Demand Response . . . . . 52--54
Mohammad H. Hajiesmaili and
Minghua Chen and
Enrique Mallada and
Chi-Kin Chau Summary of Recent Results: Crowd-Sourced
Storage-Assisted Demand Response in
Microgrids . . . . . . . . . . . . . . . 55--57
Tan N. Le and
Jie Liang and
Zhenhua Liu and
Ramesh K. Sitaraman and
Jayakrishnan Nair and
Bong Jun Choi Optimal Energy Procurement for
Geo-distributed Data Centers in
Multi-timescale Electricity Markets . . 58--63
Wei Wang and
Nanpeng Yu Phase Balancing in Power Distribution
Network with Data Center . . . . . . . . 64--69
Hitoshi Oi A Case Study of Energy Efficiency on a
Heterogeneous Multi-Processor . . . . . 70--72
Qiang Wang and
Xiaowen Chu GPGPU Power Estimation with Core and
Memory Frequency Scaling . . . . . . . . 73--78
Dong Chen and
David Irwin Black-box Solar Performance Modeling:
Comparing Physical, Machine Learning,
and Hybrid Approaches . . . . . . . . . 79--84
Pengcheng You and
Youxian Sun and
John Pang and
Steven Low and
Minghua Chen Battery Swapping Assignment for Electric
Vehicles: a Bipartite Matching Approach 85--87
Thinh T. Doan and
Subhonmesh Bose and
Carolyn L. Beck Distributed Lagrangian Method for
Tie-Line Scheduling in Power Grids under
Uncertainty . . . . . . . . . . . . . . 88--90
Mohammad A. Islam and
Shaolei Ren and
Adam Wierman A First Look at Power Attacks in
Multi-Tenant Data Centers . . . . . . . 91--93
John Z. F. Pang and
Linqi Guo and
Steven H. Low Load-side Frequency Regulation with
Limited Control Coverage . . . . . . . . 94--96
Andjelka Kelic Interdependencies in Critical
Infrastructure Modeling . . . . . . . . 99--102
Linqi Guo and
Chen Liang and
Steven H. Low Monotonicity Properties and Spectral
Characterization of Power Redistribution
in Cascading Failures . . . . . . . . . 103--106
Jorik Oostenbrink and
Fernando Kuipers Computing the Impact of Disasters on
Networks . . . . . . . . . . . . . . . . 107--110
Saleh Soltan and
Gil Zussman Algorithms for Power Grid State
Estimation after Cyber-Physical Attacks 111--114
Daniel Bienstock and
Mauro Escobar Computing undetectable attacks on power
grids . . . . . . . . . . . . . . . . . 115--118
George Stergiopoulos and
Evangelos Valvis and
Foivos Anagnou-Misyris and
Nick Bozovic and
Dimitris Gritzalis Interdependency analysis of junctions
for congestion mitigation in
Transportation Infrastructures . . . . . 119--124
Juntao Chen and
Corinne Touati and
Quanyan Zhu A Dynamic Game Analysis and Design of
Infrastructure Network Protection and
Recovery: 125 . . . . . . . . . . . . . 128
Jianguo Ding and
Yacine Atif and
Sten F. Andler and
Birgitta Lindström and
Manfred Jeusfeld CPS-based Threat Modeling for Critical
Infrastructure Protection . . . . . . . 129--132
Xunyu Zhou Who Are I: Intrapersonal Conflicts in
Performance Measure and Control . . . . 1--1
Ali Yekkehkhany and
Avesta Hojjati and
Mohammad H. Hajiesmaili GB-PANDAS: Throughput and heavy-traffic
optimality analysis for affinity
scheduling . . . . . . . . . . . . . . . 2--14
Diego Goldsztajn and
Andres Ferragut and
Fernando Paganini and
Matthieu Jonckheere Controlling the number of active
instances in a cloud environment . . . . 15--20
Gauri Joshi Synergy via Redundancy: Boosting Service
Capacity with Adaptive Replication . . . 21--28
Ting He Distributed Link Anomaly Detection via
Partial Network Tomography . . . . . . . 29--42
Diman Zad Tootaghaj and
Ting He and
Thomas La Porta Parsimonious Tomography: Optimizing
Cost-Identifiability Trade-off for
Probing-based Network Monitoring . . . . 43--55
Bart Jansen and
Timothy Goodwin and
Varun Gupta and
Fernando Kuipers and
Gil Zussman Performance Evaluation of WebRTC-based
Video Conferencing . . . . . . . . . . . 56--68
S. B. Moka and
S. Juneja and
M. R. H. Mandjes Analysis of Perfect Sampling Methods for
Hard-sphere Models . . . . . . . . . . . 69--75
Alexandre Hollocou and
Thomas Bonald and
Marc Lelarge Multiple Local Community Detection . . . 76--83
Yuli Baryshnikov and
Abram Magner Large Deviations for Increasing
Subsequences of Permutations and a
Concurrency Application . . . . . . . . 84--89
Sujay Bhatt and
Vikram Krishnamurthy Incentivized Information Fusion with
Social Sensors . . . . . . . . . . . . . 90--95
Emmanuel Abbe Learning from graphical data . . . . . . 96--96
Fengyou Sun and
Yuming Jiang A Statistical Property of Wireless
Channel Capacity: Theory and Application 97--108
F. Cecchi and
P. M. Van de Ven and
S. Shneer Mean-field limits for multi-hop
random-access networks . . . . . . . . . 109--122
F. Cecchi and
S. C. Borst and
J. S. H. van Leeuwaarden and
P. A. Whiting Spatial Mean-Field Limits for
Ultra-Dense Random-Access Networks . . . 123--136
S. Juneja and
N. Shimkin On the Computation of Dynamic User
Equilibrium in the Multiclass Transient
Fluid Queue . . . . . . . . . . . . . . 137--142
Miklos Telek and
Benny Van Houdt Response Time Distribution of a Class of
Limited Processor Sharing Queues . . . . 143--155
Y. C. Tay A technique to estimate a system's
asymptotic delay and throughput . . . . 156--159
Yingdong Lu and
Mark S. Squillante and
Chai Wah Wu Epidemic-Like Stochastic Processes with
Time-Varying Behavior: Structural
Properties and Asymptotic Limits . . . . 160--166
Zaid Allybokus and
Konstantin Avrachenkov and
Jérémie Leguay and
Lorenzo Maggi Lower Bounds for the Fair Resource
Allocation Problem . . . . . . . . . . . 167--173
Ruidi Chen and
Ioannis Paschalidis Outlier Detection Using Robust
Optimization with Uncertainty Sets
Constructed from Risk Measures . . . . . 174--179
Jiankui Yang and
David D. Yao and
Heng-Qing Ye On the Optimality of Reflection Control,
with Production-Inventory Applications 180--183
Albert Greenberg Azure Networking . . . . . . . . . . . . 184--184
Tan N. Le and
Jie Liang and
Zhenhua Liu and
Ramesh K. Sitaraman and
Jayakrishnan Nair and
Bong Jun Choi Optimal Energy Procurement for
Geo-distributed Data Centers in
Multi-timescale Electricity Markets . . 185--197
Hale Cetinay and
Saleh Soltan and
Fernando A. Kuipers and
Gil Zussman and
Piet Van Mieghem Analyzing Cascading Failures in Power
Grids under the AC and DC Power Flow
Models . . . . . . . . . . . . . . . . . 198--203
Eleonora Deiana and
Guy Latouche and
Marie-Ange Remiche Fluid flow model for energy-aware server
performance evaluation . . . . . . . . . 204--209
Debasis Mitra and
Qiong Wang Management Strategies for Industrial
Laboratories with Knowledge Memory . . . 210--216
Y. Lu and
S. T. Maguluri and
M. S. Squillante and
T. Suk and
X. Wu Optimal Energy Procurement for
Geo-distributed Data Centers in
Multi-timescale Electricity Markets . . 217--223
Mehmet Fatih Aktas and
Pei Peng and
Emina Soljanin Straggler Mitigation by Delayed Relaunch
of Tasks . . . . . . . . . . . . . . . . 224--231
Weina Wang and
Siva Theja Maguluri and
R. Srikant and
Lei Ying Heavy-Traffic Delay Insensitivity in
Connection-Level Models of Data Transfer
with Proportionally Fair Bandwidth
Sharing . . . . . . . . . . . . . . . . 232--245
Giuliano Casale and
Giuseppe Serazzi and
Lulai Zhu Performance Evaluation with Java
Modelling Tools: a Hands-on Introduction 246--247
Giacomo Nannicini Straggler Mitigation by Delayed Relaunch
of Tasks . . . . . . . . . . . . . . . . 248--248
Siva Theja Maguluri and
R. Srikant and
Weina Wang The Drift Method for Heavy Traffic
Limits, with Applications in Data
Centers and Networks . . . . . . . . . . 249--249
Anton Braverman and
Jim Dai Stein's Method for Steady-State
Approximations: Error Bounds and
Engineering Solutions . . . . . . . . . 250--250
Konstantin Avrachenkov and
Tejas Bodas On the equivalence between multiclass
processor sharing and random order
scheduling policies . . . . . . . . . . 2--6
Ranjan Pal and
Leana Golubchik and
Konstantinos Psounis and
Pan Hui Improving Cyber-Security via Profitable
Insurance Markets . . . . . . . . . . . 7--15
Vishal Misra Session details: Performance Evaluation
Review . . . . . . . . . . . . . . . . .
Jim Dai Steady-state Approximations: Achievement
Lecture . . . . . . . . . . . . . . . . 1--1
Siddhartha Banerjee and
Yash Kanoria and
Pengyu Qian State Dependent Control of Closed
Queueing Networks . . . . . . . . . . . 2--4
Giulia Fanti and
Shaileshh Bojja Venkatakrishnan and
Surya Bakshi and
Bradley Denby and
Shruti Bhargava and
Andrew Miller and
Pramod Viswanath Dandelion++: Lightweight Cryptocurrency
Networking with Formal Anonymity
Guarantees . . . . . . . . . . . . . . . 5--7
Eliav Buchnik and
Edith Cohen Bootstrapped Graph Diffusions: Exposing
the Power of Nonlinearity . . . . . . . 8--10
Jessica Hoffmann and
Constantine Caramanis The Cost of Uncertainty in Curing
Epidemics . . . . . . . . . . . . . . . 11--13
Thibault Séjourné and
Samitha Samaranayake and
Siddhartha Banerjee The Price of Fragmentation in
Mobility-on-Demand Services . . . . . . 14--16
Muhammad J. Amjad and
Devavrat Shah Censored Demand Estimation in Retail . . 17--19
Margaret Martonosi New Metrics and Models for a Post-ISA
Era: Managing Complexity and Scaling
Performance in Heterogeneous Parallelism
and Internet-of-Things . . . . . . . . . 20--20
Sem Borst and
Martin Zubeldia Delay Scaling in Many-Sources Wireless
Networks without Queue State Information 21--23
Daniel S. Berger and
Nathan Beckmann and
Mor Harchol-Balter Practical Bounds on Optimal Caching with
Variable Object Sizes . . . . . . . . . 24--26
Jian Tan and
Guocong Quan and
Kaiyi Ji and
Ness Shroff On Resource Pooling and Separation for
LRU Caching . . . . . . . . . . . . . . 27--27
Lin Yang and
Wing Shing Wong and
Mohammad H. Hajiesmaili An Optimal Randomized Online Algorithm
for QoS Buffer Management . . . . . . . 28--30
Qingkai Liang and
Eytan Modiano Minimizing Queue Length Regret Under
Adversarial Network Models . . . . . . . 31--32
Rupert Freeman and
Seyed Majid Zahedi and
Vincent Conitzer and
Benjamin C. Lee Dynamic Proportional Sharing: a
Game-Theoretic Approach . . . . . . . . 33--35
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf SOAP: One Clean Analysis of All
Age-Based Scheduling Policies . . . . . 36--38
Arjun Anand and
Gustavo de Veciana A Whittle's Index Based Approach for QoE
Optimization in Wireless Networks . . . 39--39
Jon Kleinberg Inherent Trade-Offs in Algorithmic
Fairness . . . . . . . . . . . . . . . . 40--40
Lin Yang and
Lei Deng and
Mohammad H. Hajiesmaili and
Cheng Tan and
Wing Shing Wong An Optimal Algorithm for Online
Non-Convex Learning . . . . . . . . . . 41--43
Santiago Duran and
Ina Maria Verloop Asymptotic Optimal Control of
Markov-Modulated Restless Bandits . . . 44--46
Stefan Magureanu and
Alexandre Proutiere and
Marcus Isaksson and
Boxun Zhang Online Learning of Optimally Diverse
Rankings . . . . . . . . . . . . . . . . 47--49
Mohammad Sadegh Talebi and
Alexandre Proutiere Learning Proportionally Fair Allocations
with Low Regret . . . . . . . . . . . . 50--52
Donggyu Yun and
Sumyeong Ahn and
Alexandre Proutiere and
Jinwoo Shin and
Yung Yi Multi-armed Bandit with Additional
Observations . . . . . . . . . . . . . . 53--55
Xiaohan Wei and
Hao Yu and
Michael J. Neely Online Learning in Weakly Coupled Markov
Decision Processes: a Convergence Time
Study . . . . . . . . . . . . . . . . . 56--58
Pengfei Zheng and
Benjamin C. Lee Hound: Causal Learning for
Datacenter-scale Straggler Diagnosis . . 59--61
Vlad Nitu and
Aram Kocharyan and
Hannas Yaya and
Alain Tchana and
Daniel Hagimont and
Hrachya Astsatryan Working Set Size Estimation Techniques
in Virtualized Environments: One Size
Does not Fit All . . . . . . . . . . . . 62--63
Shenglin Zhang and
Ying Liu and
Weibin Meng and
Zhiling Luo and
Jiahao Bu and
Sen Yang and
Peixian Liang and
Dan Pei and
Jun Xu and
Yuzhi Zhang and
Yu Chen and
Hui Dong and
Xianping Qu and
Lei Song PreFix: Switch Failure Prediction in
Datacenter Networks . . . . . . . . . . 64--66
Konstantinos Psychas and
Javad Ghaderi On Non-Preemptive VM Scheduling in the
Cloud . . . . . . . . . . . . . . . . . 67--69
Mohammad A. Islam and
Luting Yang and
Kiran Ranganath and
Shaolei Ren Why Some Like It Loud: Timing Power
Attacks in Multi-tenant Data Centers
Using an Acoustic Side Channel . . . . . 70--72
Saba Ahmadian and
Onur Mutlu and
Hossein Asadi ECI-Cache: a High-Endurance and
Cost-Efficient I/O Caching Scheme for
Virtualized Platforms . . . . . . . . . 73--73
Zhaowei Tan and
Yuanjie Li and
Qianru Li and
Zhehui Zhang and
Zhehan Li and
Songwu Lu Supporting Mobile VR in LTE Networks:
How Close Are We? . . . . . . . . . . . 74--74
Yvonne-Anne Pignolet and
Stefan Schmid and
Gilles Tredan Tomographic Node Placement Strategies
and the Impact of the Routing Model . . 75--77
Christina Vlachou and
Ioannis Pefkianakis and
Kyu-Han Kim LTERadar: Towards LTE-Aware Wi-Fi Access
Points . . . . . . . . . . . . . . . . . 78--80
Alan Kuhnle and
Victoria G. Crawford and
My T. Thai Network Resilience and the
Length-Bounded Multicut Problem:
Reaching the Dynamic Billion-Scale with
Guarantees . . . . . . . . . . . . . . . 81--83
Sen Yang and
He Yan and
Zihui Ge and
Dongmei Wang and
Jun Xu Predictive Impact Analysis for Designing
a Resilient Cellular Backhaul Network 84--86
Kausik Subramanian and
Loris D'Antoni and
Aditya Akella Synthesis of Fault-Tolerant Distributed
Router Configurations . . . . . . . . . 87--89
Kuang Xu and
Se-Young Yun Reinforcement with Fading Memories . . . 90--92
Thinh T. Doan and
Carolyn L. Beck and
R. Srikant On the Convergence Rate of Distributed
Gradient Methods for Finite-Sum
Optimization under Communication Delays 93--95
Yudong Chen and
Lili Su and
Jiaming Xu Distributed Statistical Machine Learning
in Adversarial Settings: Byzantine
Gradient Descent . . . . . . . . . . . . 96--96
Mowei Wang and
Yong Cui and
Shihan Xiao and
Xin Wang and
Dan Yang and
Kai Chen and
Jun Zhu Neural Network Meets DCN: Traffic-driven
Topology Adaptation with Deep Learning 97--99
Tao B. Schardl and
Tyler Denniston and
Damon Doucet and
Bradley C. Kuszmaul and
I-Ting Angelina Lee and
Charles E. Leiserson The CSI Framework for Compiler-Inserted
Program Instrumentation . . . . . . . . 100--102
Akshay Jain and
Mahmoud Khairy and
Timothy G. Rogers A Quantitative Evaluation of
Contemporary GPU Simulation Methodology 103--105
Yixin Luo and
Saugata Ghose and
Yu Cai and
Erich F. Haratsch and
Onur Mutlu Improving $3$D NAND Flash Memory
Lifetime by Tolerating Early Retention
Loss and Process Variation . . . . . . . 106--106
Xiaomeng Chen and
Jiayi Meng and
Y. Charlie Hu and
Maruti Gupta and
Ralph Hasholzner and
Venkatesan Nallampatti Ekambaram and
Ashish Singh and
Srikathyayani Srikanteswara A Fine-grained Event-based Modem Power
Model for Enabling In-depth Modem Energy
Drain Analysis . . . . . . . . . . . . . 107--109
Saugata Ghose and
Abdullah Giray Yaglikçi and
Raghav Gupta and
Donghyuk Lee and
Kais Kudrolli and
William X. Liu and
Hasan Hassan and
Kevin K. Chang and
Niladrish Chatterjee and
Aditya Agrawal and
Mike O'Connor and
Onur Mutlu What Your DRAM Power Models Are Not
Telling You: Lessons from a Detailed
Experimental Study . . . . . . . . . . . 110--110
Oleksii Oleksenko and
Dmitrii Kuvaiskii and
Pramod Bhatotia and
Pascal Felber and
Christof Fetzer Intel MPX Explained: a Cross-layer
Analysis of the Intel MPX System Stack 111--112
Nicolas Gast and
Benny Van Houdt A Refined Mean Field Approximation . . . 113--113
Tim Hellemans and
Benny Van Houdt On the Power-of-d-choices with Least
Loaded Server Selection . . . . . . . . 114--114
Xingyu Zhou and
Fei Wu and
Jian Tan and
Kannan Srinivasan and
Ness Shroff Degree of Queue Imbalance: Overcoming
the Limitation of Heavy-traffic Delay
Optimality in Load Balancing Systems . . 115--115
Benjamin Berg and
Jan-Pieter Dorsman and
Mor Harchol-Balter Towards Optimality in Parallel Job
Scheduling . . . . . . . . . . . . . . . 116--118
Bo Jiang and
Philippe Nain and
Don Towsley and
Saikat Guha On a Class of Stochastic Multilayer
Networks . . . . . . . . . . . . . . . . 119--121
Yun Zeng and
Jian Tan and
Cathy Honghui Xia Fork and Join Queueing Networks with
Heavy Tails: Scaling Dimension and
Throughput Limit . . . . . . . . . . . . 122--124
Thomas Bonald and
Céline Comte and
Fabien Mathieu Performance of Balanced Fairness in
Resource Pools: a Recursive Approach . . 125--127
Xingyu Zhou and
Fei Wu and
Jian Tan and
Yin Sun and
Ness Shroff Designing Low-Complexity Heavy-Traffic
Delay-Optimal Load Balancing Schemes:
Theory to Algorithms . . . . . . . . . . 128--128
Sinong Wang and
Ness Shroff Towards Fast-Convergence, Low-Delay and
Low-Complexity Network Optimization . . 129--131
Reza Aghajani and
Xingjie Li and
Kavita Ramanan The PDE Method for the Analysis of
Randomized Load Balancing Networks . . . 132--134
Sen Yang and
Bill Lin and
Jun Xu Safe Randomized Load-Balanced Switching
by Diffusing Extra Loads . . . . . . . . 135--137
Debankur Mukherjee and
Sem Borst and
Johan S. H. van Leeuwaarden Asymptotically Optimal Load Balancing
Topologies . . . . . . . . . . . . . . . 138--138
Nidhi Hegde ACM Sigmetrics Performance Evaluation
Review: a New Series on Diversity . . . 139--139
Leana Golubchik and
Mallory Redel Diversity in Faculty Recruiting: a WiSE
Approach . . . . . . . . . . . . . . . . 140--142
Giulia Fanti Session details: Load Balancing . . . .
Nicolas Gast Session details: Resource Management II
Leana Golubchik Session details: Learning I . . . . . .
Mor Harchol-Balter Session details: Scheduling I . . . . .
Benny Van Houdt Session details: Networking . . . . . .
Siva Theja Maguluri Session details: Emerging Areas . . . .
Vishal Misra Session details: Resource Management I
Shaolei Ren Session details: Systems . . . . . . . .
Devavrat Shah Session details: Learning II . . . . . .
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2018) . . . . . . . . . . 2--2
Hong Xie and
John C. S Lui A Markov Decision Process Approach to
Analyze Discount & Reputation Trade-offs
in E-commerce Systems . . . . . . . . . 3--5
Yudong Yang and
Vishal Misra and
Dan Rubenstein A Modeling Approach to Classifying
Malicious Cloud Users via Shuffling . . 6--8
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter SRPT for Multiserver Systems . . . . . . 9--11
Yorie Nakahira and
Andres Ferragut and
Adam Wierman Minimal-variance distributed scheduling
under strict demands and deadlines . . . 12--14
Xin Liu and
Lei Ying A Simple Steady-State Analysis of Load
Balancing Algorithms in the
Sub-Halfin--Whitt Regime . . . . . . . . 15--17
Debankur Mukherjee and
Alexander Stolyar Join-Idle-Queue with Service Elasticity 18--20
Xiao Sun and
Tan N. Le and
Mosharaf Chowdhury and
Zhenhua Liu Fair Allocation of Heterogeneous and
Interchangeable Resources . . . . . . . 21--23
Urtzi Ayesta On redundancy-$d$ with cancel-on-start
a.k.a Join-shortest-work ($d$) . . . . . 24--26
Nitish K. Panigrahy and
Prithwish Basu and
Don Towsley and
Ananthram Swami and
Kevin S. Chan and
Kin K. Leung A queueing-theoretic model for resource
allocation in one-dimensional
distributed analytics network? . . . . . 27--29
Nicolas Gast and
Diego Latella and
Mieke Massink A Refined Mean Field Approximation for
Synchronous Population Processes . . . . 30--32
Seva Shneer and
Alexander Stolyar Stability of a standard decentralised
medium access . . . . . . . . . . . . . 33--35
Anirudh Anirudh Sabnis and
Ramesh K. Sitaraman and
Donald Towsley OCCAM: an Optimization Based Approach to
Network Inference . . . . . . . . . . . 36--38
Junjie Qin and
Ram Rajagopal and
Shai Vardi and
Adam Wierman Convex Prophet Inequalities . . . . . . 39--41
Gautam Goel Smoothed Online Convex Optimization via
Online Balanced Descent . . . . . . . . 42--44
Soumyadip Ghosh and
Mark S. Squillante and
Ebisa D. Wollega On Min-Max Optimization Over Large Data
Sets . . . . . . . . . . . . . . . . . . 45--47
My T. Thai and
Arun Sen and
Arun Das ACM SIGMETRICS International Workshop on
Critical Infrastructure Network Security 48--49
Saleh Soltan and
Mihalis Yannakakis and
Gil Zussman REACT to Cyber-Physical Attacks on Power
grids (Extended Abstract) . . . . . . . 50--51
Linan Huang and
Quanyan Zhu Adaptive Strategic Cyber Defense for
Advanced Persistent Threats in Critical
Infrastructure Networks . . . . . . . . 52--56
Linqi Guo and
Chen Liang and
Alessandro Zocca and
Steven H. Low and
Adam Wierman Failure Localization in Power Systems
via Tree Partitions . . . . . . . . . . 57--61
Jorik Oostenbrink and
Fernando A. Kuipers and
Poul E. Heegaard and
Bjarne E. Helvik Evaluating Local Disaster Recovery
Strategies . . . . . . . . . . . . . . . 62--66
Hana Khamfroush and
Samuel Lofumbwa Iloo and
Mahshid Rahnamay-Naeini Vulnerability of Interdependent
Infrastructures Under Random Attacks . . 67--71
Andjelka Kelic Cyber Risk in Critical Infrastructure 72--75
Zhenhua Liu and
Ganesh Ananthanarayanan Special Issue on the Work-in-Progress
(WIP) session at the ACM SIGMETRICS 2018
Conference . . . . . . . . . . . . . . . 76--76
Tan N. Le and
Xiao Sun and
Mosharaf Chowdhury and
Zhenhua Liu BoPF: Mitigating the Burstiness-Fairness
Tradeoff in Multi-Resource Clusters . . 77--78
Linqi Guo and
Chen Liang and
Alessandro Zocca and
Steven H. Low and
Adam Wierman Failure Localization in Power Systems
via Tree Partitions . . . . . . . . . . 79--80
Daniela Hurtado-Lange and
Siva Theja Maguluri A Novel View of the Drift: Method for
Heavy Traffic Limits of Queueing Systems 81--82
Yichen Ruan and
Carlee Joe-Wong On the Economic Value of Vehicular
Caching . . . . . . . . . . . . . . . . 83--84
Junjie Qin and
Ram Rajagopal and
Shai Vardi and
Adam Wierman Convex Prophet Inequalities . . . . . . 85--86
Tan N. Le and
Xiao Sun and
Mosharaf Chowdhury and
Zhenhua Liu AlloX: Allocation across Computing
Resources for Hybrid CPU/GPU clusters 87--88
Jinhang Zuo and
Xiaoxi Zhang and
Carlee Joe-Wong Observe Before Play: Multi-armed Bandit
with Pre-Observations . . . . . . . . . 89--90
Justin Wang and
Benjamin Berg and
Daniel S. Berger and
Siddhartha Sen Maximizing Page-Level Cache Hit Ratios
in LargeWeb Services . . . . . . . . . . 91--92
Zhihui Shao and
Mohammad A. Islam and
Shaolei Ren A First Look at Thermal Attacks in
Multi-Tenant Data Centers . . . . . . . 93--94
Shan-Hsiang Shen An Efficient Network Monitor for SDN
Networks . . . . . . . . . . . . . . . . 95--96
Leandros Tassiulas Optimizing the network edge for flexible
service provisioning . . . . . . . . . . 1--1
Weina Wang and
Mor Harchol-Balter and
Haotian Jiang and
Alan Scheller-Wolf and
R. Srikant Delay Asymptotics and Bounds for
Multi-Task Parallel Jobs . . . . . . . . 2--7
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter SRPT for Multiserver Systems . . . . . . 8--9
Xingyu Zhou and
Jian Tan and
Ness Shroff Flexible Load Balancing with
Multi-dimensional State-space Collapse:
Throughput and Heavy-traffic Delay
Optimality . . . . . . . . . . . . . . . 10--11
L. E. Chatzieleftheriou and
G. Darzanos and
M. Karaliopoulos and
I. Koutsopoulos Joint User Association, Content Caching
and Recommendations in Wireless Edge
Networks . . . . . . . . . . . . . . . . 12--17
Yung Fei Wong and
Lachlan L. H. Andrew and
Y. Ahmet Sekercioglu Hidden semi-Markov models for
electricity load disaggregation . . . . 18--23
Arash Molavi Kakhki and
Vijay Erramilli and
Phillipa Gill and
Augustin Chaintreau and
Balachander Krishnamurthy Information Market for Web Browsing:
Design, Usability and Incremental
Adoption . . . . . . . . . . . . . . . . 24--24
Nicolas Gast and
Luca Bortolussi and
Mirco Tribastone Size Expansions of Mean Field
Approximation: Transient and
Steady-State Analysis . . . . . . . . . 25--26
Paola Bermolen and
Matthieu Jonckheere and
Federico Larroca and
Manuel Saenz Degree-Greedy Algorithms on Large Random
Graphs . . . . . . . . . . . . . . . . . 27--32
M. Yajima and
T. Phung-Duc A central limit theorem for a
Markov-modulated infinite-server queue
with batch Poisson arrivals and binomial
catastrophes . . . . . . . . . . . . . . 33--34
Lianjie Shi and
Xin Wang and
Richard T. B. Ma and
Y. C. Tay Weighted Fair Caching: Occupancy-Centric
Allocation for Space-Shared Resources 35--36
Niklas Carlsson and
Derek Eager Worst-case Bounds and Optimized Cache on
$M$-th Request Cache Insertion Policies
under Elastic Conditions . . . . . . . . 37--38
Fan Ni and
Xingbo Wu and
Weijun Li and
Lei Wang and
Song Jiang WOJ: Enabling Write-Once Full-data
Journaling in SSDs by Using
Weak-Hashing-based Deduplication . . . . 39--40
Stephane Durand and
Federica Garin and
Bruno Gaujal Efficiency of Best Response Dynamics
with High Playing Rates in Potential
Games . . . . . . . . . . . . . . . . . 41--42
Ayman Chouayakh and
Aurelien Bechler and
Isabel Amigo and
Loutfi Nuaymi and
Patrick Maillé Auction mechanisms for Licensed Shared
Access: reserve prices and
revenue-fairness trade offs . . . . . . 43--48
Mao Zou and
Richard T. B. Ma and
Yinlong Xu Towards An Efficient Market Mediator for
Divisible Resources . . . . . . . . . . 49--50
Patrick Thiran Locating the Source of Diffusion in
Large-scale and Random Networks. . . . . 51--51
Alessandro Zocca Temporal starvation in multi-channel
CSMA networks: an analytical framework 52--53
Thirupathaiah Vasantam and
Arpan Mukhopadhyay and
Ravi R. Mazumdar The Mean-field Behavior of Processor
Sharing Systems with General Job Lengths
Under the SQ(d) Policy . . . . . . . . . 54--55
Yorie Nakahira and
Andres Ferragut and
Adam Wierman Minimal-Variance Distributed Deadline
Scheduling in a Stationary Environment 56--61
Martin Zeballos and
Andres Ferragut and
Fernando Paganini Achieving fairness for EV charging in
overload: a fluid approach . . . . . . . 62--67
Eduardo Hargreaves and
Claudio Agosti and
Daniel Menasche and
Giovanni Neglia and
Alexandre Reiffers-Masson and
Eitan Altman Fairness in Online Social Network
Timelines: Measurements, Models and
Mechanism Design . . . . . . . . . . . . 68--69
Julien Floquet and
Richard Combes and
Zwi Altman Hierarchical Beamforming: Resource
Allocation, Fairness and Flow Level
Performance . . . . . . . . . . . . . . 70--71
Y. Raaijmakers and
S. C. Borst and
O. J. Boxma Delta probing policies for redundancy 72--73
T. Hellemans and
B. Vanhoudt Analysis of Redundancy(d) with Identical
Replicas . . . . . . . . . . . . . . . . 74--79
Urtzi Ayesta and
Tejas Bodas and
Ina Maria Verloop On a unifying product form framework for
redundancy models . . . . . . . . . . . 80--81
Catherine Rosenberg Highlight Talk on Battery Modeling:
Trade-offs between Accuracy and
Complexity . . . . . . . . . . . . . . . 82--83
Omid Ardakanian Leveraging Sparsity in Distribution
Grids: System Identification and
Harmonic State Estimation . . . . . . . 84--85
Dominik Danner and
Hermann de Meer State Estimation in the Power
Distribution System . . . . . . . . . . 86--88
Benoit Vinot and
Florent Cadoux and
Nicolas Gast Congestion Avoidance in Low-Voltage
Networks by using the Advanced Metering
Infrastructure . . . . . . . . . . . . . 89--91
Yujie Tang and
Emiliano Dall'Anese and
Andrey Bernstein and
S. H. Low A Primal-Dual Gradient Method for
Time-Varying Optimization with
Application to Power Systems . . . . . . 92--92
Nader Alagha Satellite Air Interface Evolutions in
the $5$G and IoT Era . . . . . . . . . . 93--95
Maria Rita Palattella and
Ridha Soua and
André Stemper and
Thomas Engel Aggregation of MQTT Topics over
Integrated Satellite-Terrestrial
Networks . . . . . . . . . . . . . . . . 96--97
Doanh Kim Luong and
Muhammad Ali and
Fouad Benamrane and
Ibrahim Ammar and
Yim-Fun Hu Seamless handover for video streaming
over an SDN-based Aeronautical
Communications Network . . . . . . . . . 98--99
J. Bas and
M. Caus and
A. Perez and
R. Soleymani and
N. A. K. Beigi Interference Management Schemes for High
Spectral Efficiency Satellite
Communications . . . . . . . . . . . . . 100--103
Julio A. Medina-Caballero and
M. Angeles Vazquez-Castro Link Quality Optimization for Hybrid
LEO--GSO Systems . . . . . . . . . . . . 104--107
P. Asuquo and
H. Cruickshank and
C. P. A. Ogah Securing Emergency Communications for
the Next-Generation Networks:
Performance Analysis of Distributed
Trust Computing for Future Emergency
Communications . . . . . . . . . . . . . 108--111
Nicolas Kuhn Research trends in SATCOM . . . . . . . 112--112
Aad van Moorsel Benchmarks and Models for Blockchain:
Consensus Algorithms . . . . . . . . . . 113--113
Tim Hellemans and
Benny Van Houdt and
Daniel S. Menasche and
Mandar Datar and
Swapnil Dhamal and
Corinne Touati Mining competition in a
multi-cryptocurrency ecosystem at the
network edge: a congestion game approach 114--117
Manuel Zander and
Tom Waite and
Dominik Harz DAGsim: Simulation of DAG-based
distributed ledger protocols . . . . . . 118--121
Saulo Ricci and
Eduardo Ferreira and
Daniel Sadoc Menasche and
Artur Ziviani and
Jose Eduardo Souza and
Alex Borges Vieira Learning Blockchain Delays: a Queueing
Theory Approach . . . . . . . . . . . . 122--125
C. Grunspan and
R. Perez-Marco On profitability of block withholding
strategies . . . . . . . . . . . . . . . 126--126
Francesco Bruschi and
Vincenzo Rana and
Lorenzo Gentile and
Donatella Sciuto Mine with it or sell it: the
superhashing power dilemma . . . . . . . 127--130
Nico Smuts What Drives Cryptocurrency Prices?: an
Investigation of Google Trends and
Telegram Sentiment . . . . . . . . . . . 131--134
Maher Alharby and
Aad van Moorsel BlockSim: a Simulation Framework for
Blockchain Systems . . . . . . . . . . . 135--138
Vladyslav Fedchenko and
Giovanni Neglia and
Bruno Ribeiro Feedforward Neural Networks for Caching:
Enough or Too Much? . . . . . . . . . . 139--142
Martino Trevisan and
Idilio Drago Robust URL Classification With
Generative Adversarial Networks . . . . 143--146
Gonzalo Marín and
Pedro Casas and
Germán Capdehourat DeepSec meets RawPower --- Deep Learning
for Detection of Network Attacks Using
Raw Representations . . . . . . . . . . 147--150
Michal Piskozub and
Riccardo Spolaor and
Ivan Martinovic MalAlert: Detecting Malware in
Large-Scale Network Traffic Using
Statistical Features . . . . . . . . . . 151--154
Sarah Wassermann and
Nikolas Wehner and
Pedro Casas Machine Learning Models for YouTube QoE
and User Engagement Prediction in
Smartphones . . . . . . . . . . . . . . 155--158
Gaetano Manzo and
Juan Sebastian Otalora and
Marco Ajmone Marsan and
Gianluca Rizzo A Deep Learning Strategy for Vehicular
Floating Content Management . . . . . . 159--162
Rui Li and
Chaoyun Zhang and
Paul Patras and
Razvan Stanica and
Fabrice Valois Learning Driven Mobility Control of
Airborne Base Stations in Emergency
Networks . . . . . . . . . . . . . . . . 163--166
Johan Garcia and
Topi Korhonen On Runtime and Classification
Performance of the Discretize--Optimize
(DISCO) Classification Approach . . . . 167--170
Manjesh K. Hanawal and
Sumit J. Darak Distributed Learning in Ad-Hoc Networks
with Unknown Number of Players . . . . . 171--174
Ranjan Pal and
Aditya Ahuja and
Sung-Han Lin and
Abhishek Kumar and
Leana Golubchik and
Nachikethas A. Jagadeesan On the Economic Sustainability of Cloud
Sharing Systems Are Dynamic Single
Resource Sharing Markets Stable? . . . . 2--10
Lili Su and
Martin Zubeldia and
Nancy Lynch Collaboratively Learning the Best Option
on Graphs, Using Bounded Local Memory 1--2
Jessica Hoffmann and
Constantine Caramanis Learning Graphs from Noisy Epidemic
Cascades . . . . . . . . . . . . . . . . 3--4
Xingyu Zhou and
Jian Tan and
Ness Shroff Heavy-traffic Delay Optimality in
Pull-based Load Balancing Systems:
Necessary and Sufficient Conditions . . 5--6
Tim Hellemans and
Tejas Bodas and
Benny Van Houdt Performance Analysis of Workload
Dependent Load Balancing Policies . . . 7--8
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter Load Balancing Guardrails: Keeping Your
Heavy Traffic on the Road to Low
Response Times . . . . . . . . . . . . . 9--10
Dengwang Tang and
Vijay G. Subramanian Random Walk Based Sampling for Load
Balancing in Multi-Server Systems . . . 11--12
Lan N. Nguyen and
My T. Thai Network Resilience Assessment via QoS
Degradation Metrics: an Algorithmic
Approach . . . . . . . . . . . . . . . . 13--14
Dhruv Kumar and
Jian Li and
Ramesh Sitaraman and
Abhishek Chandra A TTL-based Approach for Data
Aggregation in Geo-distributed Streaming
Analytics . . . . . . . . . . . . . . . 15--16
Pavlos Nikolopoulos and
Christos Pappas and
Katerina Argyraki and
Adrian Perrig Retroactive Packet Sampling for Traffic
Receipts . . . . . . . . . . . . . . . . 17--18
Pavlos Sermpezis and
Vasileios Kotronis Inferring Catchment in Internet Routing 19--20
Shoaib Akram and
Jennifer B. Sartor and
Kathryn S. McKinley and
Lieven Eeckhout Crystal Gazer: Profile-Driven
Write-Rationing Garbage Collection for
Hybrid Memories . . . . . . . . . . . . 21--22
Mustafa Karakoy and
Orhan Kislal and
Xulong Tang and
Mahmut Taylan Kandemir and
Meenakshi Arunachalam Architecture-Aware Approximate Computing 23--24
Xulong Tang and
Ashutosh Pattnaik and
Onur Kayiran and
Adwait Jog and
Mahmut Taylan Kandemir and
Chita Das Quantifying Data Locality in Dynamic
Parallelism in GPUs . . . . . . . . . . 25--26
Xulong Tang and
Mahmut Taylan Kandemir and
Hui Zhao and
Myoungsoo Jung and
Mustafa Karakoy Computing with Near Data . . . . . . . . 27--28
Santiago R. Balseiro and
David B. Brown and
Chen Chen Dynamic Pricing of Relocating Resources
in Large Networks . . . . . . . . . . . 29--30
Reza Alijani and
Siddhartha Banerjee and
Sreenivas Gollapudi and
Kostas Kollias and
Kamesh Munagala The Segmentation-Thickness Tradeoff in
Online Marketplaces . . . . . . . . . . 31--32
Ming Shi and
Xiaojun Lin and
Lei Jiao On the Value of Look-Ahead in
Competitive Online Convex Optimization 33--34
Qiulin Lin and
Hanling Yi and
John Pang and
Minghua Chen and
Adam Wierman and
Michael Honig and
Yuanzhang Xiao Competitive Online Optimization under
Inventory Constraints . . . . . . . . . 35--36
Haoran Yu and
Ermin Wei and
Randall A. Berry Analyzing Location-Based Advertising for
Vehicle Service Providers Using
Effective Resistances . . . . . . . . . 37--38
Daniel Vial and
Vijay Subramanian A Structural Result for Personalized
PageRank and its Algorithmic
Consequences . . . . . . . . . . . . . . 39--40
Semih Cayci and
Atilla Eryilmaz and
R. Srikant Learning to Control Renewal Processes
with Bandit Feedback . . . . . . . . . . 41--42
Monika Henzinger and
Stefan Neumann and
Stefan Schmid Efficient Distributed Workload
(Re-)Embedding . . . . . . . . . . . . . 43--44
Pradeep Ambati and
David Irwin Optimizing the Cost of Executing Mixed
Interactive and Batch Workloads on
Transient VMs . . . . . . . . . . . . . 45--46
Joshua Comden and
Sijie Yao and
Niangjun Chen and
Haipeng Xing and
Zhenhua Liu Online Optimization in Cloud Resource
Provisioning: Predictions, Regrets, and
Algorithms . . . . . . . . . . . . . . . 47--48
Guocong Quan and
Jian Tan and
Atilla Eryilmaz and
Ness Shroff A New Flexible Multi-flow LRU Cache
Management Paradigm for Minimizing
Misses . . . . . . . . . . . . . . . . . 49--50
Doron Zarchy and
Radhika Mittal and
Michael Schapira and
Scott Shenker Axiomatizing Congestion Control . . . . 51--52
Kuang Xu and
Yuan Zhong Information, Memory and Capacity in
Dynamic Resource Allocation . . . . . . 53--54
Muhammad Jehangir Amjad and
Vishal Misra and
Devavrat Shah and
Dennis Shen mRSC: Multi-dimensional Robust Synthetic
Control . . . . . . . . . . . . . . . . 55--56
Lavanya Jose and
Stephen Ibanez and
Mohammad Alizadeh and
Nick McKeown A Distributed Algorithm to Calculate
Max-Min Fair Rates Without Per-Flow
State . . . . . . . . . . . . . . . . . 57--58
Benny Van Houdt Global Attraction of ODE-based Mean
Field Models with Hyperexponential Job
Sizes . . . . . . . . . . . . . . . . . 59--60
Mark van der Boor and
Sem Borst and
Johan van Leeuwaarden Hyper-Scalable JSQ with Sparse Feedback 61--62
Florin Ciucu and
Felix Poloczek Two Extensions of Kingman's GI/G/1 Bound 63--64
Florin Ciucu and
Felix Poloczek and
Amr Rizk Queue and Loss Distributions in
Finite-Buffer Queues . . . . . . . . . . 65--66
Jiaming Xu and
Yuan Zhong Improved Queue-Size Scaling for
Input-Queued Switches via Graph
Factorization . . . . . . . . . . . . . 67--68
Youil Han and
Bryan S. Kim and
Jeseong Yeon and
Sungjin Lee and
Eunji Lee TeksDB: Weaving Data Structures for a
High-Performance Key--Value Store . . . 69--70
Milan Radulovic and
Rommel Sánchez Verdejo and
Paul Carpenter and
Petar Radojkovi\'c and
Bruce Jacob and
Eduard Ayguadé PROFET: Modeling System Performance and
Energy Without Simulating the CPU . . . 71--72
Song Wei and
Kun Zhang and
Bibo Tu HyperBench: a Benchmark Suite for
Virtualization Capabilities . . . . . . 73--74
Lei Zhang and
Zhemin Yang and
Yuyu He and
Mingqi Li and
Sen Yang and
Min Yang and
Yuan Zhang and
Zhiyun Qian App in the Middle: Demystify Application
Virtualization in Android and its
Security Threats . . . . . . . . . . . . 75--76
Tu Dinh Ngoc and
Bao Bui and
Stella Bitchebe and
Alain Tchana and
Valerio Schiavoni and
Pascal Felber and
Daniel Hagimont Everything You Should Know About Intel
SGX Performance on Virtualized Systems 77--78
Honghao Wei and
Xiaohan Kang and
Weina Wang and
Lei Ying QuickStop: a Markov Optimal Stopping
Approach for Quickest Misinformation
Detection . . . . . . . . . . . . . . . 79--80
Alberto Vera and
Siddhartha Banerjee The Bayesian Prophet: a Low-Regret
Framework for Online Decision Making . . 81--82
Lili Su and
Jiaming Xu Securing Distributed Gradient Descent in
High Dimensional Statistical Learning 83--84
Anish Agarwal and
Muhammad Jehangir Amjad and
Devavrat Shah and
Dennis Shen Model Agnostic Time Series Analysis via
Matrix Estimation . . . . . . . . . . . 85--86
Behnam Pourghassemi and
Ardalan Amiri Sani and
Aparna Chandramowlishwaran What-If Analysis of Page Load Time in
Web Browsers Using Causal Profiling . . 87--88
Ran Liu and
Edmund Yeh and
Atilla Eryilmaz Proactive Caching for Low Access-Delay
Services under Uncertain Predictions . . 89--90
Xiao Zhu and
Yihua Ethan Guo and
Ashkan Nikravesh and
Feng Qian and
Z. Morley Mao Understanding the Networking Performance
of Wear OS . . . . . . . . . . . . . . . 91--92
Saugata Ghose and
Tianshi Li and
Nastaran Hajinazar and
Damla Senol Cali and
Onur Mutlu Demystifying Complex Workload-DRAM
Interactions: an Experimental Study . . 93--93
Chul-Ho Lee and
Min Kang and
Do Young Eun Non-Markovian Monte Carlo on Directed
Graphs . . . . . . . . . . . . . . . . . 94--95
Osman Emre Dai and
Daniel Cullina and
Negar Kiyavash and
Matthias Grossglauser Analysis of a Canonical Labeling
Algorithm for the Alignment of
Correlated Erd\Hos--Rényi Graphs . . . . 96--97
Richard Combes and
Mikael Touati Computationally Efficient Estimation of
the Spectral Gap of a Markov Chain . . . 98--100
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2019) . . . . . . . . . . 2--2
Abuthahir and
Gaurav Raina and
Thomas Voice Do we need two forms of feedback in the
Rate Control Protocol (RCP)? . . . . . . 3--5
Gautam Goel and
Adam Wierman An Online Algorithm for Smoothed Online
Convex Optimization . . . . . . . . . . 6--8
Xiaoqi Tan and
Alberto Leon-Garcia and
Danny H. K. Tsang Optimal Posted Prices for Online
Resource Allocation with Supply Costs 9--11
Kristen Gardner and
Cole Stephens Smart Dispatching in Heterogeneous
Systems . . . . . . . . . . . . . . . . 12--14
Elene Anton and
Urtzi Ayesta and
Matthieu Jonckheere and
Ina Maria Verloop Redundancy with Processor Sharing
servers . . . . . . . . . . . . . . . . 15--17
Benjamin Berg and
Rein Vesilo and
Mor Harchol-Balter heSRPT: Optimal Scheduling of Parallel
Jobs with Known Sizes . . . . . . . . . 18--20
Yu Su and
Xiaoqi Ren and
Shai Vardi and
Adam Wierman and
Yuxiong He Communication-Aware Scheduling of
Precedence-Constrained Tasks . . . . . . 21--23
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf Simple Near-Optimal Scheduling for the
M/G/1 . . . . . . . . . . . . . . . . . 24--26
Gayane Vardoyan and
Saikat Guha and
Philippe Nain and
Don Towsley On the Stochastic Analysis of a Quantum
Entanglement Switch . . . . . . . . . . 27--29
Giuliano Casale and
Peter G. Harrison and
Ong Wai Hong Novel Solutions for Closed Queueing
Networks with Load-Dependent Stations 30--32
Gagan Somashekar and
Mohammad Delasay and
Anshul Gandhi Tighter Lyapunov Truncation for
Multi-Dimensional Continuous Time Markov
Chains with Known Moments . . . . . . . 33--35
Daniela Hurtado Lange and
Siva Theja Maguluri Heavy-traffic Analysis of the
Generalized Switch under
Multidimensional State Space Collapse 36--38
Navid Azizan Optimization Algorithms for Large-Scale
Systems: From Deep Learning to Energy
Markets . . . . . . . . . . . . . . . . 2--5
Joshua Comden Algorithms for Online and Distributed
Optimization and their Applications . . 6--9
Salvatore Dipietro Performance Modelling and Optimisation
of NoSQL Database Systems . . . . . . . 10--13
Seyyed Ahmad Javadi Analytical Approaches for Dynamic
Scheduling in Cloud Environments . . . . 14--16
Qian Li Vision-based Sensor Coverage in
Uncertain Geometric Domains . . . . . . 17--19
Behnam Pourghassemi Scalable Dynamic Analysis of Browsers
for Privacy and Performance . . . . . . 20--23
Lili Su Defending Distributed Systems Against
Adversarial Attacks: Consensus,
Consensus-based Learning, and
Statistical Learning . . . . . . . . . . 24--27
Muhammad Wajahat Cost-Efficient Dynamic Management of
Cloud Resources through Supervised
Learning . . . . . . . . . . . . . . . . 28--30
Pei-Duo YU Network Centralities as Statistical
Inference for Large Networks:
Combinatorics, Probability and Efficient
Graph Algorithms . . . . . . . . . . . . 31--33
Xingyu Zhou Asymptotically Optimal Load Balancing:
Theory and Algorithms . . . . . . . . . 34--37
Kartik Palani and
David M. Nicol Optimal Monitoring Strategies for
Critical Infrastructure Networks . . . . 4--7
Malhar Padhee and
Reetam Sen Biswas and
Anamitra Pal and
Kaustav Basu and
Arunabha Sen Identifying Unique Power System
Signatures for Determining Vulnerability
of Critical Power System Assets . . . . 8--11
Jorik Oostenbrink and
Fernando A. Kuipers A Moment of Weakness: Protecting Against
Targeted Attacks Following a Natural
Disaster . . . . . . . . . . . . . . . . 12--15
Evangelos Pournaras and
Riccardo Taormina and
Manish Thapa and
Stefano Galelli and
Venkata Palleti and
Robert Kooij Cascading Failures in Interconnected
Power-to-Water Networks . . . . . . . . 16--20
Yushi Tan and
Arindam K. Das and
Mareldi Ahumada-Paras and
Payman Arabshahi and
Daniel S. Kirschen Scheduling Post-disaster Repairs in
Electricity Distribution Networks with
Uncertain Repair Times . . . . . . . . . 21--24
Krishna Kant Advanced Persistent Threats in
Autonomous Driving . . . . . . . . . . . 25--28
Siddhartha Banerjee and
Daniel Freund Uniform Loss Algorithms for Online
Stochastic Decision-Making With
Applications to Bin Packing . . . . . . 1--2
Xiaohan Wei and
Hao Yu and
Michael J. Neely Online Primal-Dual Mirror Descent under
Stochastic Constraints . . . . . . . . . 3--4
Sungjin Im and
Benjamin Moseley and
Kamesh Munagala and
Kirk Pruhs Dynamic Weighted Fairness with Minimal
Disruptions . . . . . . . . . . . . . . 5--6
Lin Yang and
Mohammad H. Hajiesmaili and
Ramesh Sitaraman and
Adam Wierman and
Enrique Mallada and
Wing S. Wong Online Linear Optimization with
Inventory Management Constraints . . . . 7--8
Yiheng Lin and
Gautam Goel and
Adam Wierman Online Optimization with Predictions and
Non-convex Losses . . . . . . . . . . . 9--10
Xiaoqi Tan and
Bo Sun and
Alberto Leon-Garcia and
Yuan Wu and
Danny H. K. Tsang Mechanism Design for Online Resource
Allocation: a Unified Approach . . . . . 11--12
Reza Alijani and
Siddhartha Banerjee and
Sreenivas Gollapudi and
Kamesh Munagala and
Kangning Wang Predict and Match: Prophet Inequalities
with Uncertain Supply . . . . . . . . . 13--14
Rajarshi Bhattacharjee and
Subhankar Banerjee and
Abhishek Sinha Fundamental Limits on the Regret of
Online Network-Caching . . . . . . . . . 15--16
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2020) . . . . . . . . . . 2--2
Ping-En Lu and
Cheng-Shang Chang Using Graph Convolutional Networks to
Compute Approximations of Dominant
Eigenvectors . . . . . . . . . . . . . . 3--5
Rajarshi Bhattacharjee and
Abhishek Sinha Competitive Algorithms for Minimizing
the Maximum Age-of-Information . . . . . 6--8
Hanoch Levy and
Jhonatan Tavori Worst Case Attacks on Distributed
Resources Systems . . . . . . . . . . . 9--11
Eitan Bachmat and
Sveinung Erland Performance analysis, Optimization and
Optics . . . . . . . . . . . . . . . . . 12--14
Mandar Datar and
Eitan Altman and
Ghilas Ferrat Routing into parallel collision channels 15--17
Christine Fricker and
Hanene Mohamed and
Cedric Bourdais A mean field analysis of a stochastic
model for reservation in car-sharing
systems . . . . . . . . . . . . . . . . 18--20
Boudewijn R. Haverkort and
Felix Finkbeiner and
Pieter-Tjerk de Boer Machine Learning Data Center Workloads
Using Generative Adversarial Networks 21--23
Daniel S. Menasché and
Mark Shifrin and
Eduardo Hargreaves Caches and Timelines Operate Under Heavy
Traffic . . . . . . . . . . . . . . . . 24--26
George Kesidis and
Takis Konstantopoulos TB/GI/1 queues with arrival traffic
envelopes . . . . . . . . . . . . . . . 27--29
Jazeem Abdul Jaleel and
Alexander Wickeham and
Sherwin Doroudi and
Kristen Gardner A General ``Power-of-$d$'' Dispatching
Framework for Heterogeneous Systems . . 30--32
Ziv Scully and
Isaac Grosof and
Mor Harchol-Balter Optimal Multiserver Scheduling with
Unknown Job Sizes in Heavy Traffic . . . 33--35
Yingdong Lu and
Mark S. Squillante and
Tonghoon Suk Optimal Delay-Cost Scheduling Control in
Fluid Models of General $ n \times n $
Input-Queued Switches . . . . . . . . . 36--38
Andrea Araldo and
Ivona Brandic and
Stefan Schmid ACM SIGMETRICS International Workshop on
Distributed Cloud Computing (DCC) . . . 39--40
Daniel Balouek-Thomert and
Ivan Rodero and
Manish Parashar Harnessing the Computing Continuum for
Urgent Science . . . . . . . . . . . . . 41--46
Lianjie Shi and
Xin Wang and
Richard T. B. Ma On Multi-Resource Procurement in
Internet Access Markets: Optimal
Strategies and Market Equilibrium . . . 4--5
Mohammad A. Hoque and
Ashwin Rao and
Sasu Tarkoma Network and Application Performance
Measurement Challenges on Android
Devices . . . . . . . . . . . . . . . . 6--11
Simon Scherrer and
Markus Legner and
Adrian Perrig and
Stefan Schmid Incentivizing Stable Path Selection in
Future Internet Architectures . . . . . 12--13
Niels Christensen and
Mark Glavind and
Stefan Schmid and
Jir' Srba Latte: Improving the Latency of
Transiently Consistent Network Update
Schedules . . . . . . . . . . . . . . . 14--26
Francesco Bronzino and
Paul Schmitt and
Sara Ayoubi and
Guilherme Martins and
Renata Teixeira and
Nick Feamster Inferring Streaming Video Quality from
Encrypted Traffic: Practical Models and
Deployment Experience . . . . . . . . . 27--32
Daniela Hurtado-Lange and
Siva Theja Maguluri Heavy-traffic Analysis of the
Generalized Switch under
Multidimensional State Space Collapse 33--34
Benjamin Berg and
Rein Vesilo and
Mor Harchol-Balter heSRPT: Parallel Scheduling to Minimize
Mean Slowdown . . . . . . . . . . . . . 35--36
Kristen Gardner and
Jazeem Abdul Jaleel and
Alexander Wickeham and
Sherwin Doroudi Scalable Load Balancing in the Presence
of Heterogeneous Servers . . . . . . . . 37--38
Wenkai Dai and
Klaus-Tycho Foerster and
David Fuchssteiner and
Stefan Schmid Load-Optimization in Reconfigurable
Networks: Algorithms and Complexity of
Flow Routing . . . . . . . . . . . . . . 39--44
Gayane Vardoyan and
Saikat Guha and
Philippe Nain and
Don Towsley On the Capacity Region of Bipartite and
Tripartite Entanglement Switching . . . 45--50
Nitish K. Panigrahy and
Prithwish Basu and
Don Towsley and
Ananthram Swami and
Kin K. Leung On the Analysis of Spatially Constrained
Power of Two Choice Policies . . . . . . 51--56
Xingyu Zhou and
Ness Shroff and
Adam Wierman Asymptotically Optimal Load Balancing in
Large-scale Heterogeneous Systems with
Multiple Dispatchers . . . . . . . . . . 57--58
Jianyu Niu and
Ziyu Wang and
Fangyu Gai and
Chen Feng Incentive Analysis of Bitcoin-NG,
Revisited . . . . . . . . . . . . . . . 59--60
Rahul Vaze and
Jayakrishnan Nair Network Speed Scaling . . . . . . . . . 61--62
Shiva Raj Pokhrel and
Carey Williamson A Rent-Seeking Framework for Multipath
TCP . . . . . . . . . . . . . . . . . . 63--70
Jingfan Meng and
Long Gong and
Jun (Jim) Xu Sliding-Window QPS (SW-QPS): a Perfect
Parallel Iterative Switching Algorithm
for Input-Queued Switches . . . . . . . 71--76
Guocong Quan and
Atilla Eryilmaz and
Jian Tan and
Ness Shroff Prefetching and Caching for Minimizing
Service Costs: Optimal and Approximation
Strategies . . . . . . . . . . . . . . . 77--78
Gayane Vardoyan and
Saikat Guha and
Philippe Nain and
Don Towsley On the Exact Analysis of an Idealized
Quantum Switch . . . . . . . . . . . . . 79--80
Guin Gilman and
Samuel S. Ogden and
Tian Guo and
Robert J. Walls Demystifying the Placement Policies of
the NVIDIA GPU Thread Block Scheduler
for Concurrent Kernels . . . . . . . . . 81--88
Yuezhou Liu and
Yuanyuan Li and
Qian Ma and
Stratis Ioannidis and
Edmund Yeh Fair Caching Networks . . . . . . . . . 89--90
Shigeo Shioda Distribution of Consensus in a
Broadcasting-based Consensus-forming
Algorithm . . . . . . . . . . . . . . . 91--96
Maryam Elahi and
Andrea Marin and
Sabina Rossi and
Carey Williamson Frequency scaling in multilevel queues 97--98
Marcin Bienkowski and
David Fuchssteiner and
Jan Marcinkowski and
Stefan Schmid Online Dynamic B-Matching: With
Applications to Reconfigurable
Datacenter Networks . . . . . . . . . . 99--108
Yu Huang and
Longbo Huang Heavy Traffic Analysis of Approximate
Max-Weight Matching Algorithms for
Input-Queued Switches . . . . . . . . . 109--110
Fehmina Malik and
Manjesh K. Hanawal and
Yezekael Hayel and
Jayakrishnan Nair Revenue sharing on the Internet: a Case
for Going Soft on Neutrality Regulations 111--112
Behnam Pourghassemi and
Ardalan Amiri Sani and
Aparna Chandramowlishwaran Only Relative Speed Matters: Virtual
Causal Profiling . . . . . . . . . . . . 113--119
Myungsuk Kim and
Myoungjun Chun and
Duwon Hong and
Yoona Kim and
Geonhee Cho and
Dusol Lee and
Jihong Kim RealWear: Improving Performance and
Lifetime of SSDs Using a NAND Aging
Marker . . . . . . . . . . . . . . . . . 120--121
Yingdong Lu and
Mark S. Squillante and
Tonghoon Suk Optimal Control in Fluid Models of $ n
\times n $ Input-Queued Switches under
Linear Fluid-Flow Costs . . . . . . . . 122--127
Sounak Kar and
Robin Rehrmann and
Arpan Mukhopadhyay and
Bastian Alt and
Florin Ciucu and
Heinz Koeppl and
Carsten Binnig and
Amr Rizk On the Throughput Optimization in
Large-Scale Batch-Processing Systems . . 128--129
Niloofar Bayat and
Richard Ma and
Vishal Misra and
Dan Rubenstein Zero-Rating and Net Neutrality: Who
Wins, Who Loses? . . . . . . . . . . . . 130--135
William Knottenbelt and
Katinka Wolter Message from the Chairs . . . . . . . . 2--2
Ingo Weber Keynote: Analysing Data from Blockchains 3--3
Felipe Ribas Coutinho and
Victor Pires and
Claudio Miceli and
Daniel S. Menasche Crypto-Hotwire: Illegal Blockchain
Mining at Zero Cost Using Public
Infrastructures . . . . . . . . . . . . 4--7
Jefferson E. Simoes and
Eduardo Ferreira and
Daniel S. Menasché and
Carlos A. V. Campos Blockchain Privacy Through Merge
Avoidance and Mixing Services: a
Hardness and an Impossibility Result . . 8--11
Vinicius C. Oliveira and
Julia Almeida Valadares and
Jose Eduardo A. Sousa and
Alex Borges Vieira and
Heder Soares Bernardino and
Saulo Moraes Villela and
Glauber Dias Goncalves Analyzing Transaction Confirmation in
Ethereum Using Machine Learning
Techniques . . . . . . . . . . . . . . . 12--15
Rowel Gundlach and
Martijn Gijsbers and
David Koops and
Jacques Resing Predicting confirmation times of Bitcoin
transactions . . . . . . . . . . . . . . 16--19
Ivo Stoepker and
Rowel Gundlach and
Stella Kapodistria Robustness analysis of Bitcoin
confirmation times . . . . . . . . . . . 20--23
Jose Eduardo A. Sousa and
Vinicius C. Oliveira and
Julia Almeida Valadares and
Alex Borges Vieira and
Heder S. Bernardino and
Saulo Moraes Villela and
Glauber Dias Goncalves Fighting Under-price DoS Attack in
Ethereum with Machine Learning
Techniques . . . . . . . . . . . . . . . 24--27
Luca Vassio and
Zhi-Li Zhang and
Danilo Giordano and
Abhishek Chandra Message from the organizers of WAIN . . 28--28
Md Rajib Hossen and
Mohammad A. Islam Mobile Task Offloading Under Unreliable
Edge Performance . . . . . . . . . . . . 29--32
Özge Celenk and
Thomas Bauschert and
Marcus Eckert Machine Learning based KPI Monitoring of
Video Streaming Traffic for QoE
Estimation . . . . . . . . . . . . . . . 33--36
Nikolas Wehner and
Michael Seufert and
Joshua Schuler and
Sarah Wassermann and
Pedro Casas and
Tobias Hossfeld Improving Web QoE Monitoring for
Encrypted Network Traffic through Time
Series Modeling . . . . . . . . . . . . 37--40
Dena Markudova and
Martino Trevisan and
Paolo Garza and
Michela Meo and
Maurizio M. Munafo and
Giovanna Carofiglio What's my App?: ML-based classification
of RTC applications . . . . . . . . . . 41--44
Shunsuke Higuchi and
Junji Takemasa and
Yuki Koizumi and
Atsushi Tagami and
Toru Hasegawa Feasibility of Longest Prefix Matching
using Learned Index Structures . . . . . 45--48
Gastón García González and
Pedro Casas and
Alicia Fernández and
Gabriel Gómez On the Usage of Generative Models for
Network Anomaly Detection in
Multivariate Time-Series . . . . . . . . 49--52
Andrea Marin and
Carey Williamson Cheating at Craps: a Quantitative
Analysis . . . . . . . . . . . . . . . . 53--61
Giulio Masetti and
Silvano Chiaradonna and
Felicita Di Giandomenico and
William H. Sanders and
Brett Feddersen Extending the Möbius Modeling Environment
with the Advanced Replication Operator 62--67
Sanjeev Arora Opening the Black Box of Deep Learning:
Some Lessons and Take-aways . . . . . . 1--1
Zhaowei Zhu and
Jingxuan Zhu and
Ji Liu and
Yang Liu Federated Bandit: a Gossiping Approach 3--4
Thibaut Cuvelier and
Richard Combes and
Eric Gourdin Statistically Efficient, Polynomial-Time
Algorithms for Combinatorial
Semi-Bandits . . . . . . . . . . . . . . 5--6
Tongxin Li and
Yue Chen and
Bo Sun and
Adam Wierman and
Steven Low Information Aggregation for Constrained
Online Control . . . . . . . . . . . . . 7--8
Niv Buchbinder and
Yaron Fairstein and
Konstantina Mellou and
Ishai Menache and
Joseph (Seffi) Naor Online Virtual Machine Allocation with
Lifetime and Load Predictions . . . . . 9--10
Isaac Grosof and
Kunhe Yang and
Ziv Scully and
Mor Harchol-Balter Nudge: Stochastically Improving upon
FCFS . . . . . . . . . . . . . . . . . . 11--12
Weina Wang and
Qiaomin Xie and
Mor Harchol-Balter Zero Queueing for Multi-Server Jobs . . 13--14
Ziv Scully and
Isaac Grosof and
Mor Harchol-Balter The Gittins Policy is Nearly Optimal in
the M/G/$k$ under Extremely General
Conditions . . . . . . . . . . . . . . . 15--16
Ashish Bijlani and
Umakishore Ramachandran and
Roy Campbell Where did my 256 GB go? A Measurement
Analysis of Storage Consumption on Smart
Mobile Devices . . . . . . . . . . . . . 17--18
Yue Zhang and
Bayan Turkistani and
Allen Yuqing Yang and
Chaoshun Zuo and
Zhiqiang Lin A Measurement Study of Wechat Mini-Apps 19--20
Rachee Singh and
David Tench and
Phillipa Gill and
Andrew McGregor PredictRoute: a Network Path Prediction
Toolkit . . . . . . . . . . . . . . . . 21--22
Iman Akbari and
Mohammad A. Salahuddin and
Leni Ven and
Noura Limam and
Raouf Boutaba and
Bertrand Mathieu and
Stephanie Moteau and
Stephane Tuffin A Look Behind the Curtain: Traffic
Classification in an Increasingly
Encrypted Web . . . . . . . . . . . . . 23--24
Wentao Weng and
Weina Wang Achieving Zero Asymptotic Queueing Delay
for Parallel Jobs . . . . . . . . . . . 25--26
Youri Raaijmakers and
Sem Borst Achievable Stability in Redundancy
Systems . . . . . . . . . . . . . . . . 27--28
Grzegorz Kielanski and
Benny Van Houdt On the Asymptotic Insensitivity of the
Supermarket Model in Processor Sharing
Systems . . . . . . . . . . . . . . . . 29--30
Francesca Randone and
Luca Bortolussi and
Mirco Tribastone Refining Mean-field Approximations by
Dynamic State Truncation . . . . . . . . 31--32
Bingyu Gao and
Haoyu Wang and
Pengcheng Xia and
Siwei Wu and
Yajin Zhou and
Xiapu Luo and
Gareth Tyson Tracking Counterfeit Cryptocurrency
End-to-end . . . . . . . . . . . . . . . 33--34
Weimin Chen and
Xinran Li and
Yuting Sui and
Ningyu He and
Haoyu Wang and
Lei Wu and
Xiapu Luo SADPonzi: Detecting and Characterizing
Ponzi Schemes in Ethereum Smart
Contracts . . . . . . . . . . . . . . . 35--36
Behnam Pourghassemi and
Jordan Bonecutter and
Zhou Li and
Aparna Chandramowlishwaran adPerf: Characterizing the Performance
of Third-party Ads . . . . . . . . . . . 37--38
Hsiao-Wuen Hon AI for System --- Infusing AI into Cloud
Computing Systems . . . . . . . . . . . 39--40
Qingzhao Zhang and
David Ke Hong and
Ze Zhang and
Qi Alfred Chen and
Scott Mahlke and
Z. Morley Mao A Systematic Framework to Identify
Violations of Scenario-dependent Driving
Rules in Autonomous Vehicle Software . . 43--44
Lishan Yang and
Bin Nie and
Adwait Jog and
Evgenia Smirni SUGAR: Speeding Up GPGPU Application
Resilience Estimation with Input Sizing 45--46
Xulong Tang and
Mahmut Taylan Kandemir and
Mustafa Karakoy Mix and Match: Reorganizing Tasks for
Enhancing Data Locality . . . . . . . . 47--48
Wentao Weng and
Xingyu Zhou and
R. Srikant Optimal Load Balancing with Locality
Constraints . . . . . . . . . . . . . . 49--50
Daan Rutten and
Debankur Mukherjee Load Balancing Under Strict
Compatibility Constraints . . . . . . . 51--52
Tim Hellemans and
Benny Van Houdt Mean Waiting Time in Large-Scale and
Critically Loaded Power of d Load
Balancing Systems . . . . . . . . . . . 53--54
Elene Anton and
Urtzi Ayesta and
Matthieu Jonckheere and
Ina Maria Verloop Improving the Performance of
Heterogeneous Data Centers through
Redundancy . . . . . . . . . . . . . . . 55--56
Xin Wang and
Richard T. B. Ma On Private Peering Agreements between
Content and Access Providers: a
Contractual Equilibrium Analysis . . . . 57--58
Michael Fleder and
Devavrat Shah I Know What You Bought At Chipotle for
\$9.81 by Solving a Linear Inverse
Problem . . . . . . . . . . . . . . . . 59--60
Sushil Mahavir Varma and
Francisco Castro and
Siva Theja Maguluri Dynamic Pricing and Matching for
Two-Sided Markets with Strategic Servers 61--62
Jing Tang and
Xueyan Tang and
Andrew Lim and
Kai Han and
Chongshou Li and
Junsong Yuan Revisiting Modified Greedy Algorithm for
Monotone Submodular Maximization with a
Knapsack Constraint . . . . . . . . . . 63--64
Kai Han and
Shuang Cui and
Tianshuai Zhu and
Enpei Zhang and
Benwei Wu and
Zhizhuo Yin and
Tong Xu and
Shaojie Tang and
He Huang Approximation Algorithms for Submodular
Data Summarization with a Knapsack
Constraint . . . . . . . . . . . . . . . 65--66
Bo Sun and
Ali Zeynali and
Tongxin Li and
Mohammad Hajiesmaili and
Adam Wierman and
Danny H. K. Tsang Competitive Algorithms for the Online
Multiple Knapsack Problem with
Application to Electric Vehicle Charging 67--68
Leandros Tassiulas Enabling Intelligent Services at the
Network Edge . . . . . . . . . . . . . . 69--70
Klaus-Tycho Foerster and
Janne H. Korhonen and
Ami Paz and
Joel Rybicki and
Stefan Schmid Input-Dynamic Distributed Algorithms for
Communication Networks . . . . . . . . . 71--72
Noémie Périvier and
Chamsi Hssaine and
Samitha Samaranayake and
Siddhartha Banerjee Real-time Approximate Routing for Smart
Transit Systems . . . . . . . . . . . . 73--74
Kamiar Asgari and
Michael J. Neely Bregman-style Online Convex Optimization
with Energy Harvesting Constraints . . . 75--76
Liren Yu and
Jiaming Xu and
Xiaojun Lin The Power of D-hops in Matching
Power-Law Graphs . . . . . . . . . . . . 77--78
Yiguang Zhang and
Jessy Xinyi Han and
Ilica Mahajan and
Priyanjana Bengani and
Augustin Chaintreau Chasm in Hegemony: Explaining and
Reproducing Disparities in Homophilous
Networks . . . . . . . . . . . . . . . . 79--80
Ahmad Hazimeh and
Adrian Herrera and
Mathias Payer Magma: a Ground-Truth Fuzzing Benchmark 81--82
Luis F. Abanto-Leon and
Andreas Bäuml and
Gek Hong (Allyson) Sim and
Matthias Hollick and
Arash Asadi Stay Connected, Leave no Trace:
Enhancing Security and Privacy in WiFi
via Obfuscating Radiometric Fingerprints 83--84
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2021) . . . . . . . . . . 2--2
Yu Su and
Jannie Yu and
Vivek Anand and
Adam Wierman Learning-Augmented Energy-Aware
Scheduling of Precedence-Constrained
Tasks . . . . . . . . . . . . . . . . . 3--5
Guocheng Liao and
Yu Su and
Juba Ziani and
Adam Wierman and
Jianwei Huang The Privacy Paradox and Optimal
Bias-Variance Trade-offs in Data
Acquisition . . . . . . . . . . . . . . 6--8
Jhonatan Tavori and
Hanoch Levy Continual Versus Occasional Spreading In
Networks: Modeling Spreading Thresholds
In Epidemic Processes . . . . . . . . . 9--11
Julien Ancel and
Christine Fricker and
Hanene Mohamed Mean field analysis for bike and e-bike
sharing systems . . . . . . . . . . . . 12--14
Fernando Miguélez and
Josu Doncel and
Urtzi Ayesta A Resource Sharing Game for the
Freshness of Status Updates . . . . . . 15--17
Ziv Scully and
Lucas van Kreveld When Does the Gittins Policy Have
Asymptotically Optimal Response Time
Tail? . . . . . . . . . . . . . . . . . 18--20
Yingdong Lu Performance Analysis of A Queueing
System with Server Arrival and Departure 21--23
Daan Rutten and
Debankur Mukherjee Capacity Scaling Augmented With
Unreliable Machine Learning Predictions 24--26
Andres Ferragut and
Lucas Narbondo and
Fernando Paganini EDF vehicle charging under deadline
uncertainty . . . . . . . . . . . . . . 27--29
Niloofar Bayat and
Cody Morrin and
Yuheng Wang and
Vishal Misra Rank estimation for (approximately)
low-rank matrices . . . . . . . . . . . 30--32
Amir Reza Ramtin and
Don Towsley and
Philippe Nain and
Edmundo de Souza e Silva and
Daniel S. Menasche Are Covert DDoS Attacks Facing
Multi-Feature Detectors Feasible? . . . 33--35
Ziv Scully Bounding Mean Slowdown in Multiserver
Systems . . . . . . . . . . . . . . . . 36--38
Soumyadip Ghosh and
Mark S. Squillante Unbiased Gradient Estimation for Robust
Optimization . . . . . . . . . . . . . . 39--41
Nicolas Gast and
Neil Walton Special Issue on the Workshop about
Reinforcement Learning in Networks and
Queues (RLNQ 2021) . . . . . . . . . . . 42--42
Chen Tessler and
Yuval Shpigelman and
Gal Dalal and
Amit Mandelbaum and
Doron Haritan Kazakov and
Benjamin Fuhrer and
Gal Chechik and
Shie Mannor Reinforcement Learning for Datacenter
Congestion Control . . . . . . . . . . . 43--46
Francisco Robledo and
Vivek Borkar and
Urtzi Ayesta and
Konstantin Avrachenkov QWI: Q-learning with Whittle Index . . . 47--50
Conor Newton and
Ayalvadi Ganesh and
Henry Reeve Asymptotic Optimality for Decentralised
Bandits . . . . . . . . . . . . . . . . 51--53
Xin Liu and
Bin Li and
Pengyi Shi and
Lei Ying A Constrained Bandit Approach for Online
Dispatching . . . . . . . . . . . . . . 54--56
Christopher Archer and
Siddhartha Banerjee and
Mayleen Cortez and
Carrie Rucker and
Sean R. Sinclair and
Max Solberg and
Qiaomin Xie and
Christina Lee Yu ORSuite: Benchmarking Suite for
Sequential Operations Models . . . . . . 57--61
Giulia Fanti ACM SIGMETRICS 2021 Student Research
Competition . . . . . . . . . . . . . . 62--62
Shreshth Tuli SplitPlace: Intelligent Placement of
Split Neural Nets in Mobile Edge
Environments . . . . . . . . . . . . . . 63--65
Yige Hong Sharp Zero-Queueing Bounds for
Multi-Server Jobs . . . . . . . . . . . 66--68
Mahshid Ghasemi Auto-SDA: Automated Video-based Social
Distancing Analyzer . . . . . . . . . . 69--71
Edwin Peng Exact Response Time Analysis of
Preemptive Priority Scheduling with
Switching Overhead . . . . . . . . . . . 72--74
Qingsong Liu and
Wenfei Wu and
Longbo Huang and
Zhixuan Fang Simultaneously Achieving Sublinear
Regret and Constraint Violations for
Online Convex Optimization with
Time-varying Constraints . . . . . . . . 4--5
Russell Lee and
Yutao Zhou and
Lin Yang and
Mohammad Hajiesmaili and
Ramesh Sitaraman Competitive Bidding Strategies for
Online Linear Optimization with
Inventory Management Constraints . . . . 6--7
Jianhan Song and
Gustavo de Veciana and
Sanjay Shakkottai Online Learning for Hierarchical
Scheduling to Support Network Slicing in
Cellular Networks . . . . . . . . . . . 8--9
Andres Ferragut and
Lucas Narbondo and
Fernando Paganini Scheduling EV charging with uncertain
departure times . . . . . . . . . . . . 10--15
Simon Scherrer and
Markus Legner and
Adrian Perrig and
Stefan Schmid An Axiomatic Perspective on the
Performance Effects of End-Host Path
Selection . . . . . . . . . . . . . . . 16--17
Bai Liu and
Eytan Modiano Optimal Control for Networks with
Unobservable Malicious Nodes . . . . . . 18--19
Amir Reza Ramtin and
Philippe Nain and
Daniel S. Menasche and
Don Towsley and
Edmundo de Souza e Silva Fundamental Scaling Laws of Covert DDoS
Attacks . . . . . . . . . . . . . . . . 20--21
Anya Chaturvedi and
Chandra Chekuri and
Andréa W. Richa and
Matthias Rost and
Stefan Schmid and
Jamison Weber Improved Throughput for All-or-Nothing
Multicommodity Flows with Arbitrary
Demands . . . . . . . . . . . . . . . . 22--27
Xiandong Huang and
Qinglin Wang and
Shuyu Lu and
Ruochen Hao and
Songzhu Mei and
Jie Liu Evaluating FFT-based Algorithms for
Strided Convolutions on ARMv8
Architectures? . . . . . . . . . . . . . 28--29
Gayane Vardoyan and
Matthew Skrzypczyk and
Stephanie Wehner On the Quantum Performance Evaluation of
Two Distributed Quantum Architectures 30--31
Guin Gilman and
Robert J. Walls Characterizing Concurrency Mechanisms
for NVIDIA GPUs under Deep Learning
Workloads (Extended Abstract) . . . . . 32--34
Maciej Pacut and
Wenkai Dai and
Alexandre Labbe and
Klaus-Tycho Foerster and
Stefan Schmid Improved Scalability of Demand-Aware
Datacenter Topologies With Minimal Route
Lengths and Congestion . . . . . . . . . 35--36
Arnaud Cadas and
Josu Doncel and
Jean-Michel Fourneau and
Ana Busic Flexibility can Hurt Dynamic Matching
System Performance . . . . . . . . . . . 37--42
Sushil Mahavir Varma and
Siva Theja Maguluri A Heavy Traffic Theory of Two-Sided
Queues . . . . . . . . . . . . . . . . . 43--44
Rahul Vaze and
Jayakrishnan Nair Speed Scaling with Multiple Servers
under a Sum--Power Constraint . . . . . 45--50
Giuliano Casale and
Peter G. Harrison and
Wai Hong Ong Facilitating Load-Dependent Queueing
Analysis Through Factorization (Extended
Abstract) . . . . . . . . . . . . . . . 51--52
Martin Zubeldia and
Michel Mandjes Learning traffic correlations in
multi-class queueing systems by sampling
queue lengths, with routing applications 53--54
Bruce Spang Updating the Theory of Buffer Sizing . . 55--56
Shiksha Singhal and
Veeraruna Kavitha Coalition Formation Resource Sharing
Games in Networks . . . . . . . . . . . 57--58
Vibhaalakshmi Sivaraman and
Weizhao Tang and
Shaileshh Bojja Venkatakrishnan and
Giulia Fanti and
Mohammad Alizadeh The Effect of Network Topology on Credit
Network Throughput . . . . . . . . . . . 59--60
Xusheng Chen and
Shixiong Zhao and
Ji Qi and
Jianyu Jiang and
Haoze Song and
Cheng Wang and
Tsz On Li and
T-H. Hubert Chan and
Fengwei Zhang and
Xiapu Luo and
Sen Wang and
Gong Zhang and
Heming Cuih Efficient and DoS-resistant Consensus
for Permissioned Blockchains . . . . . . 61--62
Shubham Anand Jain and
Shreyas Goenka and
Divyam Bapna and
Nikhil Karamchandani and
Jayakrishnan Nair Sequential community mode estimation . . 63--64
Benjamin Berg and
Justin Whitehouse and
Benjamin Moseley and
Weina Wang and
Mor Harchol-Balter The Case for Phase-Aware Scheduling of
Parallelizable Jobs . . . . . . . . . . 65--66
Xinzhe Fu and
Eytan Modiano Elastic Job Scheduling with Unknown
Utility Functions . . . . . . . . . . . 67--68
Johan Ruuskanen and
Tommi Berner and
Karl-Erik Arzen and
Anton Cervin Improving the Mean-Field Fluid Model of
Processor Sharing Queueing Networks for
Dynamic Performance Models in Cloud
Computing . . . . . . . . . . . . . . . 69--70
Jonatha Anselmi and
Bruno Gaujal and
Louis-Sébastien Rebuffi Optimal Speed Profile of a DVFS
Processor under Soft Deadlines . . . . . 71--72
Peter Buchholz On the Representation of Correlated
Exponential Distributions by Phase Type
Distributions . . . . . . . . . . . . . 73--78
Gayane Vardoyan and
Saikat Guha and
Philippe Nain and
Don Towsley On the Capacity Region of Bipartite and
Tripartite Entanglement Switching:
Erratum . . . . . . . . . . . . . . . . 79--80
Mor Harchol-Balter and
Ziv Scully The most common queueing theory
questions asked by computer systems
practitioners . . . . . . . . . . . . . 3--7
Chee Wei Tan The Value of Cooperation: From AIMD to
Flipped Classroom Teaching . . . . . . . 8--13
Cathy H. Xia and
Nanshan Chen and
Priya Natarajan Teaching Performance Modeling via
Software and Instructional Technology 14--19
Jean-Yves Le Boudec Performance Evaluation: a Preparation
for Statistics and Data Science? . . . . 20--23
Giuseppe Serazzi Updating the Content of Performance
Analysis Textbooks . . . . . . . . . . . 24--27
Susanna Donatelli and
Giuliana Franceschinis Special issue on the Workshop on TOols
for Stochastic Modeling and Evaluation
(TOSME 2021) . . . . . . . . . . . . . . 28--28
Salah Al-Deen Almousa and
G\textasciiacuteabor Horv\textasciiacuteath and
Ill \textasciiacutees Horv\textasciiacuteath and
Andr\textasciiacuteas M\textasciiacuteesz\textasciiacutearos and
Mikl \textasciiacuteos Telek The CME method: Efficient numerical
inverse Laplace transformation with
Concentrated Matrix Exponential
distribution . . . . . . . . . . . . . . 29--34
Sebastian Allmeier and
Nicolas Gast rmf tool --- A library to Compute
(Refined) Mean Field Approximation(s) 35--40
Giulio Masetti and
Leonardo Robol and
Silvano Chiaradonna and
Felicita Di Giandomenico TAPAS: a Tool for Stochastic Evaluation
of Large Interdependent Composed Models
with Absorbing States . . . . . . . . . 41--46
Moreno Marzolla Queueing Networks and Markov Chains
Analysis with the Octave queueing
package . . . . . . . . . . . . . . . . 47--52
Vittorio Cortellessa and
Daniele Di Pompeo and
Vincenzo Stoico and
Michele Tucci Software Model Refactoring Driven by
Performance Antipattern Detection . . . 53--58
Carlos E. Budde FIG: the Finite Improbability Generator
v1.3 . . . . . . . . . . . . . . . . . . 59--64
Paolo Ballarini and
Beno\^\it Barbot Cosmos: Evolution of a Statistical Model
Checking Platform . . . . . . . . . . . 65--69
Matthew Sheldon and
Giuliano Casale TauSSA: Simulating Markovian Queueing
Networks with Tau Leaping . . . . . . . 70--75
Catalina M. Llado PIPE 2.7 overview: a Petri net tool for
performance modeling and evaluation . . 76--80
Laura Carnevali and
Marco Paolieri and
Enrico Vicario The ORIS tool: app, library, and toolkit
for quantitative evaluation of
non-Markovian systems . . . . . . . . . 81--86
Elvio G. Amparore Stochastic modelling and evaluation
using GreatSPN . . . . . . . . . . . . . 87--91
Luca Vassio and
Danilo Giordano and
Jinoh Kim and
Jon Crowcroft Message from the organizers of WAIN . . 92--92
Shimin Tao and
Weibin Meng and
Yimeng Cheng and
Yichen Zhu and
Ying Liu and
Chunning Du and
Tao Han and
Yongpeng Zhao and
Xiangguang Wang and
Hao Yang LogStamp: Automatic Online Log Parsing
Based on Sequence Labelling . . . . . . 93--98
Wenwen Hao and
Ben Niu and
Yin Luo and
Kangkang Liu and
Na Liu Improving accuracy and adaptability of
SSD failure prediction in hyper-scale
data centers . . . . . . . . . . . . . . 99--104
Shiva Ketabi and
Matthew Buckley and
Parsa Pazhooheshy and
Faraz Farahvash and
Yashar Ganjali Correlation-Aware Flow Consolidation for
Load Balancing and Beyond . . . . . . . 105--110
David Pujol-Perich and
Jose Suarez-Varela and
Albert Cabellos-Aparicio and
Pere Barlet-Ros Unveiling the potential of Graph Neural
Networks for robust Intrusion Detection 111--117
Gustavo de Carvalho Bertoli and
Lourenço Alves Pereira Júnior and
Osamu Saotome Improving detection of scanning attacks
on heterogeneous networks with Federated
Learning . . . . . . . . . . . . . . . . 118--123
Matheus F. C. Barros and
Carlos H. G. Ferreira and
Lourenco A. P. Junior and
Marco Mellia and
Jussara M. Almeida and
Bruno Pereira dos Santos Understanding mobility in networks: a
node embedding approach . . . . . . . . 124--130
James Roberts and
Dario Rossi Size-based scheduling vs fairness for
datacenter flows: a queuing perspective 2--10
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2022) . . . . . . . . . . 11--11
Shigeo Shioda and
Kenta Takehara Ergodicity of Time Reversal Process of
Stochastic Consensus Formation and Its
Application . . . . . . . . . . . . . . 12--14
Jhonatan Tavori and
Hanoch Levy Queueing-Network Based Applications
Under Worst-case Attacks . . . . . . . . 15--17
Anand Kalvit and
Assaf Zeevi Dynamic Learning in Large Matching
Markets . . . . . . . . . . . . . . . . 18--20
Harry Jiang and
Xiaoxi Zhang and
Carlee Joe-Wong DOLL: Distributed OnLine Learning Using
Preemptible Cloud Instances . . . . . . 21--23
Yuan Yao and
Marco Paolieri and
Leana Golubchik Sojourn Time Minimization of Successful
Jobs . . . . . . . . . . . . . . . . . . 24--26
Heng-Qing Ye Optimal Round-Robin Routing to Parallel
Servers in Heavy Traffic . . . . . . . . 27--29
E. Anton and
R. Righter and
I. M. Verloop Scheduling under redundancy . . . . . . 30--32
Xiaoqi Tan and
Siyuan Yu and
Raouf Boutaba Online Selection with Convex Costs . . . 33--35
Illes Horvath and
Andras Meszaros and
Miklos Telek Optimized numerical inverse Laplace
transformation . . . . . . . . . . . . . 36--38
Rui Ding and
Eugene Feinberg CVaR Optimization for MDPs: Existence
and Computation of Optimal Policies . . 39--41
Vasileios Kalantzis and
Mark S. Squillante and
Shashanka Ubaru and
Lior Horesh On Quantum Algorithms for Random Walks
in the Nonnegative Quarter Plane . . . . 42--44
Pravein Govindan Kannan and
Priyanka Naik and
Praveen Tammana and
Mythili Vutukuru Special Issue on The Workshop on
Performance of host-based Network
Applications (PerfNA 2022) . . . . . . . 45--45
Ziyan Wu and
Tianming Cui and
Arvind Narayanan and
Yang Zhang and
Kangjie Lu and
Antonia Zhai and
Zhi-Li Zhang GranularNF: Granular Decomposition of
Stateful NFV at 100 Gbps Line Speed and
Beyond . . . . . . . . . . . . . . . . . 46--51
Ziv Scully A New Toolbox for Scheduling Theory . . 3--6
Anish Agarwal Causal Inference for Social and
Engineering Systems . . . . . . . . . . 7--11
Zaiwei Chen A Unified Lyapunov Framework for
Finite-Sample Analysis of Reinforcement
Learning Algorithms . . . . . . . . . . 12--15
Shreshth Tuli AI and Co-Simulation Driven Resource
Management in Fog Computing Environments 16--19
Tareq Si Salem Online Learning for Network Resource
Allocation . . . . . . . . . . . . . . . 20--23
Jessica Maghakian Online Resource Allocation with Noisy
Predictions . . . . . . . . . . . . . . 24--27
Alim Ul Gias Model-based Resource Management for
Fine-grained Services . . . . . . . . . 28--31
Xiao Sun Resource Allocation and Scheduling in
Modern Cloud Computing . . . . . . . . . 32--35
Xiaojun Shang Enabling Data-intensive Workflows in
Heterogeneous Edge-cloud Networks . . . 36--38
Andrea Marin and
Sabina Rossi and
Diletta Olliaro A product-form network for systems with
job stealing policies . . . . . . . . . 2--4
Nitesh Kumar and
Gaurav S. Kasbekar and
D. Manjunath Application of Data Collected by
Endpoint Detection and Response Systems
for Implementation of a Network Security
System based on Zero Trust Principles
and the EigenTrust Algorithm . . . . . . 5--7
Rooji Jinan and
Gaurav Gautam and
Parimal Parag and
Vaneet Aggarwal Asymptotic Analysis of Probabilistic
Scheduling for Erasure-Coded
Heterogeneous Systems . . . . . . . . . 8--10
Wonjun Hwang and
Yoora Kim and
Kyunghan Lee Augmenting Epidemic Models with Graph
Neural Networks . . . . . . . . . . . . 11--13
Sudeshna Biswas and
Himanshu and
Sushmita Ghosh and
Payali Das and
Kaushik Saha and
Swades De Efficient Data Transfer Mechanism for
DLMS/COSEM Enabled Smart Energy Metering
Platform . . . . . . . . . . . . . . . . 14--16
Abhishek K. Umrawal and
Vaneet Aggarwal Leveraging the Community Structure of a
Social Network for Maximizing the Spread
of Influence . . . . . . . . . . . . . . 17--19
Samarth Gupta and
Jinhang Zuo and
Carlee Joe-Wong and
Gauri Joshi and
Osman Yagan Correlated Combinatorial Bandits for
Online Resource Allocation . . . . . . . 20--22
Zahidur Talukder and
Mohammad A. Islam Efficient Federated Learning with
Self-Regulating Clients . . . . . . . . 23--25
Prakirt Raj Jhunjhunwala and
Siva Theja Maguluri Heavy Traffic Queue Length Distribution
without Resource Pooling in an
Input-Queued Switch . . . . . . . . . . 26--28
Shreshth Tuli and
Giuliano Casale and
Nicholas R. Jennings Learning to Dynamically Select Cost
Optimal Schedulers in Cloud Computing
Environments . . . . . . . . . . . . . . 29--31
Kumar Saurav and
Rahul Vaze Minimizing Age of Information under
Arbitrary Arrival Model with Arbitrary
Packet Size . . . . . . . . . . . . . . 32--34
R Sri Prakash and
Nikhil Karamchandani and
Sharayu Moharir On the Regret of Online Edge Service
Hosting . . . . . . . . . . . . . . . . 35--37
Alexandre Reiffers-Masson and
Isabel Amigo Online Multi-Agent Decentralized
Byzantine-robust Gradient Estimation . . 38--40
Tyler Sam and
Yudong Chen and
Christina Lee Yu Overcoming the Long Horizon Barrier for
Sample-Efficient Reinforcement Learning
with Latent Low-Rank Structure . . . . . 41--43
Qi Li and
Dong Chen Peer to Peer Distributed Solar Energy
Trading . . . . . . . . . . . . . . . . 44--46
Wenxin Li Performance Analysis of Modified SRPT in
Multiple-Processor Multitask Scheduling 47--49
Md Rajib Hossen and
Mohammad A. Islam Practical Efficient Microservice
Autoscaling . . . . . . . . . . . . . . 50--52
Yinan Zhu and
Chunhui Duan and
Xuan Ding RoSense . . . . . . . . . . . . . . . . 53--55
Daksh Mittal and
Sandeep Juneja and
Shubhada Agrawal Shift, scale and restart smaller models
to estimate larger ones: Agent based
simulators in epidemiology . . . . . . . 56--58
Tuhinangshu Choudhury and
Weina Wang and
Gauri Joshi Tackling Heterogeneous Traffic in
Multi-access Systems via Erasure Coded
Servers . . . . . . . . . . . . . . . . 59--61
Hem Regmi and
Sanjib Sur Towards Deep Learning Augmented Robust
D-Band Millimeter-Wave Picocell
Deployment . . . . . . . . . . . . . . . 62--64
Hasan Al Maruf and
Yuhong Zhong and
Hongyi Wang and
Mosharaf Chowdhury and
Asaf Cidon and
Carl Waldspurger Memtrade: Marketplace for Disaggregated
Memory Clouds . . . . . . . . . . . . . 1--2
Vamsi Addanki and
Chen Avin and
Stefan Schmid Mars: Near-Optimal Throughput with
Shallow Buffers in Reconfigurable
Datacenter Networks . . . . . . . . . . 3--4
Christina Giannoula and
Kailong Huang and
Jonathan Tang and
Nectarios Koziris and
Georgios Goumas and
Zeshan Chishti and
Nandita Vijaykumar Architectural Support for Efficient Data
Movement in Fully Disaggregated Systems 5--6
Johannes Zerwas and
Csaba Györgyi and
Andreas Blenk and
Stefan Schmid and
Chen Avin Duo: a High-Throughput Reconfigurable
Datacenter Network Using Local Routing
and Control . . . . . . . . . . . . . . 7--8
Jiaxin Lin and
Tao Ji and
Xiangpeng Hao and
Hokeun Cha and
Yanfang Le and
Xiangyao Yu and
Aditya Akella Towards Accelerating Data Intensive
Application's Shuffle Process Using
SmartNICs . . . . . . . . . . . . . . . 9--10
Wenzhe Zhu and
Yongkun Li and
Erci Xu and
Fei Li and
Yinlong Xu and
John C. S. Lui DiffForward: On Balancing Forwarding
Traffic for Modern Cloud Block Services
via Differentiated Forwarding . . . . . 11--12
Adithya Kumar and
Anand Sivasubramaniam and
Timothy Zhu SplitRPC: a Control + Data Path
Splitting RPC Stack for ML Inference
Serving . . . . . . . . . . . . . . . . 13--14
Itamar Gozlan and
Chen Avin and
Gil Einziger and
Gabriel Scalosub Go-to-Controller is Better: Efficient
and Optimal LPM Caching with Splicing 15--16
Daniele De Sensi and
Tiziano De Matteis and
Konstantin Taranov and
Salvatore Di Girolamo and
Tobias Rahn and
Torsten Hoefler Noise in the Clouds: Influence of
Network Performance Variability on
Application Scalability . . . . . . . . 17--18
Yi Liu and
Shouqian Shi and
Minghao Xie and
Heiner Litz and
Chen Qian Smash: Flexible, Fast, and
Resource-efficient Placement and Lookup
of Distributed Storage . . . . . . . . . 19--20
Wangkai Jin and
Xiangjun Peng SLITS: Sparsity-Lightened Intelligent
Thread Scheduling . . . . . . . . . . . 21--22
Hongyuan Liu and
Sreepathi Pai and
Adwait Jog Asynchronous Automata Processing on GPUs 23--24
Canhui Chen and
Zhixuan Fang Gacha Game Analysis and Design . . . . . 25--26
Daan Rutten and
Debankur Mukherjee Mean-field Analysis for Load Balancing
on Spatial Graphs . . . . . . . . . . . 27--28
Sebastian Allmeier and
Nicolas Gast Bias and Refinement of Multiscale Mean
Field Models . . . . . . . . . . . . . . 29--30
Tareq Si Salem and
Georgios Iosifidis and
Giovanni Neglia Enabling Long-term Fairness in Dynamic
Resource Allocation . . . . . . . . . . 31--32
Serkut Ayvasik and
Fidan Mehmeti and
Edwin Babaians and
Wolfgang Kellerer PEACH: Proactive and Environment Aware
Channel State Information Prediction
with Depth Images . . . . . . . . . . . 33--34
Yunzhuo Liu and
Bo Jiang and
Tian Guo and
Zimeng Huang and
Wenhao Ma and
Xinbing Wang and
Chenghu Zhou FuncPipe: a Pipelined Serverless
Framework for Fast and Cost-efficient
Training of Deep Learning Models . . . . 35--36
Prashanthi S. K and
Sai Anuroop Kesanapalli and
Yogesh Simmhan Characterizing the Performance of
Accelerated Jetson Edge Devices for
Training Deep Learning Models . . . . . 37--38
Ali Hossein Abbasi Abyaneh and
Maizi Liao and
Seyed Majid Zahedi Malcolm: Multi-agent Learning for
Cooperative Load Management at Rack
Scale . . . . . . . . . . . . . . . . . 39--40
Kyle MacMillan and
Tarun Mangla and
James Saxon and
Nicole P. Marwell and
Nick Feamster A Comparative Analysis of Ookla
Speedtest and Measurement Labs Network
Diagnostic Test (NDT7) . . . . . . . . . 41--42
Rashna Kumar and
Sana Asif and
Elise Lee and
Fabián E. Bustamante Each at its Own Pace: Third-Party
Dependency and Centralization Around the
World . . . . . . . . . . . . . . . . . 43--44
Haoran Lu and
Qingchuan Zhao and
Yongliang Chen and
Xiaojing Liao and
Zhiqiang Lin Detecting and Measuring Aggressive
Location Harvesting in Mobile Apps via
Data-flow Path Embedding . . . . . . . . 45--46
Amanda Hsu and
Frank Li and
Paul Pearce Fiat Lux: Illuminating IPv6
Apportionment with Different Datasets 47--48
Marco Chiesa and
Fábio L. Verdi Network Monitoring on Multi-Pipe
Switches . . . . . . . . . . . . . . . . 49--50
Haibo Wang and
Dimitrios Melissourgos and
Chaoyi Ma and
Shigang Chen Real-time Spread Burst Detection in Data
Streaming . . . . . . . . . . . . . . . 51--52
Usama Naseer and
Theophilus A. Benson JS Capsules: a Framework for Capturing
Fine-grained JavaScript Memory
Measurements for the Mobile Web. . . . . 53--54
Siddhartha Banerjee and
Chamsi Hssaine and
Sean R. Sinclair Online Fair Allocation of Perishable
Resources . . . . . . . . . . . . . . . 55--56
Mozhengfu Liu and
Xueyan Tang Dynamic Bin Packing with Predictions . . 57--58
Bo Sun and
Lin Yang and
Mohammad Hajiesmaili and
Adam Wierman and
John C. S. Lui and
Don Towsley and
Danny H. K. Tsang The Online Knapsack Problem with
Departures . . . . . . . . . . . . . . . 59--60
Fengjiao Li and
Xingyu Zhou and
Bo Ji (Private) Kernelized Bandits with
Distributed Biased Feedback . . . . . . 61--62
Santiago Balseiro and
Christian Kroer and
Rachitesh Kumar Online Resource Allocation under Horizon
Uncertainty . . . . . . . . . . . . . . 63--64
Shuang Cui and
Kai Han and
Jing Tang and
He Huang and
Xueying Li and
Zhiyu Li Streaming Algorithms for Constrained
Submodular Maximization . . . . . . . . 65--66
Daniel Vial and
Sanjay Shakkottai and
R. Srikant Robust Multi-Agent Bandits Over
Undirected Graphs . . . . . . . . . . . 67--68
Naram Mhaisen and
Abhishek Sinha and
Georgios Paschos and
George Iosifidis Optimistic No-regret Algorithms for
Discrete Caching . . . . . . . . . . . . 69--70
Daan Rutten and
Nicolas Christianson and
Debankur Mukherjee and
Adam Wierman Smoothed Online Optimization with
Unreliable Predictions . . . . . . . . . 71--72
Jing Yu and
Dimitar Ho and
Adam Wierman Online Adversarial Stabilization of
Unknown Networked Systems . . . . . . . 73--74
Jalani K. Williams and
Mor Harchol-Balter and
Weina Wang The M/M/$k$ with Deterministic Setup
Times . . . . . . . . . . . . . . . . . 75--76
Xinzhe Fu and
Eytan Modiano Joint Learning and Control in Stochastic
Queueing Networks with Unknown Utilities 77--78
Yehua Wei and
Jiaming Xu and
Sophie H. Yu Constant Regret Primal-Dual Policy for
Multi-way Dynamic Matching . . . . . . . 79--80
Dongyan (Lucy) Huo and
Yudong Chen and
Qiaomin Xie Bias and Extrapolation in Markovian
Linear Stochastic Approximation with
Constant Stepsizes . . . . . . . . . . . 81--82
Yizhou Zhang and
Guannan Qu and
Pan Xu and
Yiheng Lin and
Zaiwei Chen and
Adam Wierman Global Convergence of Localized Policy
Iteration in Networked Multi-Agent
Reinforcement Learning . . . . . . . . . 83--84
Tyler Sam and
Yudong Chen and
Christina Lee Yu Overcoming the Long Horizon Barrier for
Sample-Efficient Reinforcement Learning
with Latent Low-Rank Structure . . . . . 85--86
Mingming Zhang and
Xiang Li and
Baojun Liu and
JianYu Lu and
Yiming Zhang and
Jianjun Chen and
Haixin Duan and
Shuang Hao and
Xiaofeng Zheng Detecting and Measuring Security Risks
of Hosting-Based Dangling Domains . . . 87--88
Alexander Goldberg and
Giulia Fanti and
Nihar B. Shah Batching of Tasks by Users of
Pseudonymous Forums: Anonymity
Compromise and Protection . . . . . . . 89--90
Kailong Wang and
Yuxi Ling and
Yanjun Zhang and
Zhou Yu and
Haoyu Wang and
Guangdong Bai and
Beng Chin Ooi and
Jin Song Dong Characterizing Cryptocurrency-themed
Malicious Browser Extensions . . . . . . 91--92
Weizhao Tang and
Lucianna Kiffer and
Giulia Fanti and
Ari Juels Strategic Latency Reduction in
Blockchain Peer-to-Peer Networks . . . . 93--94
Sushil Mahavir Varma and
Francisco Castro and
Siva Theja Maguluri Power-of-d Choices Load Balancing in the
Sub-Halfin Whitt Regime . . . . . . . . 95--96
Benny Van Houdt On the Stochastic and Asymptotic
Improvement of First-Come First-Served
and Nudge Scheduling . . . . . . . . . . 97--98
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf Optimal Scheduling in the
Multiserver-job Model under Heavy
Traffic . . . . . . . . . . . . . . . . 99--100
Igor Kadota and
Dror Jacoby and
Hagit Messer and
Gil Zussman and
Jonatan Ostrometzky Switching in the Rain: Predictive
Wireless x-haul Network Reconfiguration 101--102
Ruofeng Liu and
Nakjung Choi A First Look at Wi-Fi 6 in Action:
Throughput, Latency, Energy Efficiency,
and Security . . . . . . . . . . . . . . 103--104
Ding Zhang and
Panneer Selvam Santhalingam and
Parth Pathak and
Zizhan Zheng CoBF: Coordinated Beamforming in Dense
mmWave Networks . . . . . . . . . . . . 105--106
Yilin Liu and
Shijia Zhang and
Mahanth Gowda and
Srihari Nelakuditi Leveraging the Properties of mmWave
Signals for $3$D Finger Motion Tracking
for Interactive IoT Applications . . . . 107--108
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2023) . . . . . . . . . . 2
Weici Pan and
Zhenhua Liu Switching Constrained Online Convex
Optimization with Predictions and
Feedback Delays . . . . . . . . . . . . 3--5
Isaac Grosof and
Mor Harchol-Balter and
Alan Scheller-Wolf New Stability Results for
Multiserver-job Models via Product-form
Saturated Systems . . . . . . . . . . . 6--8
E. Anton and
K. Gardner The stationary distribution of the
redundancy-$d$ model with random order
of service . . . . . . . . . . . . . . . 9--11
Runhan Xie and
Kristen Gardner and
Rhonda Righter Insensitivity for Loss Systems with
Compatibilities . . . . . . . . . . . . 12--14
Julianna Bor and
Giuliano Casale and
William Knottenbelt and
Evgenia Smirni and
Andreas Stathopoulos Fitting with matrix exponential mixtures
generated by discrete probabilistic
scaling . . . . . . . . . . . . . . . . 15--17
Zhisheng Zhao and
Debankur Mukherjee Optimal Rate-Matrix Pruning For
Heterogeneous Systems . . . . . . . . . 18--20
Daan Rutten and
Martin Zubeldia and
Debankur Mukherjee Distributed Rate Scaling in Large-Scale
Service Systems . . . . . . . . . . . . 21--23
Prakirt Jhunjhunwala and
Daniela Hurtado-Lange and
Siva Theja Maguluri Exponential Tail Bounds on Queues . . . 24--26
Florin Ciucu and
Sima Mehri and
Amr Rizk On Ultra-Sharp Queueing Bounds . . . . . 27--29
Nicolas Gast and
Bruno Gaujal and
Kimang Khun What is an Optimal Policy in
Time-Average MDP? . . . . . . . . . . . 30--32
Yige Hong and
Ziv Scully Performance of the Gittins Policy in the
G/G/1 and G/G/$k$, With and Without
Setup Times . . . . . . . . . . . . . . 33--35
Runhan Xie and
Ziv Scully Reducing Heavy-Traffic Response Time
with Asymmetric Dispatching . . . . . . 36--38
Yingdong Lu and
Mark S. Squillante and
Chai Wah Wu Markov Decision Process Framework for
Control-Based Reinforcement Learning . . 39--41
Sara Alouf ACM SIGMETRICS 2023 Student Research
Competition . . . . . . . . . . . . . . 2--2
Amanda Camacho Novaes de Oliveira Learning the Optimal Representation
Dimension for Restricted Boltzmann
Machines . . . . . . . . . . . . . . . . 3--5
Zifeng Niu Graph Learning based Performance
Analysis for Queueing Networks . . . . . 6--7
Isaac Grosof The RESET Technique for Multiserver-Job
Analysis . . . . . . . . . . . . . . . . 8--9
Md Rajib Hossen PEMA+: a Comprehensive Resource Manager
for Microservices . . . . . . . . . . . 10--12
Yuanyuan Li Distributed Experimental Design Networks 13--15
Xiangan He Zephyr: a Cost-Effective, Zero-Knowledge
Light Client for Enhanced Blockchain
Interoperability . . . . . . . . . . . . 16--18
Beatriz Pereira de Souza and
Marcio Nunes de Miranda and
Luiz Maltar Castello Branco An Energy-efficient Wireless Sensor
Network Applied to Greenhouse
Cultivation . . . . . . . . . . . . . . 19--21
Nishat Ahmed and
Amaan Rahman and
Lucia Rhode Best Practices for Exoskeleton
Evaluation Using DeepLabCut . . . . . . 22--24
Tianhao Huang and
Xiaozhi Zhu and
Mo Niu An End-to-End Benchmarking Tool for
Analyzing the Hardware-Software
Implications of Multi-modal DNNs . . . . 25--27
Urtzi Ayesta Foreword from Chair of 2023 ACM
SIGMETRICS Doctoral Dissertation Award
Committee . . . . . . . . . . . . . . . 28--28
Isaac Grosof Optimal Scheduling in Multiserver Queues 29--32
Prakirt Raj Jhunjhunwala Design and Analysis of Stochastic
Processing and Matching Networks . . . . 33--37
Sean R. Sinclair Adaptivity, Structure, and Objectives in
Sequential Decision-Making . . . . . . . 38--41
Matthew Corbett Enhancing Security and Privacy in
Head-Mounted Augmented Reality Systems
Using Eye Gaze . . . . . . . . . . . . . 42--45
Zhongdong Liu Data Freshness in Information-update
Systems: Modeling, Scheduling, and
Tradeoffs . . . . . . . . . . . . . . . 46--49
Tasmeen Zaman Ornee Theory of Timely Remote Estimation and
Application to Situational Awareness . . 50--53
Abhin Shah Data-Rich Causal Inference . . . . . . . 54--57
Md Kamran Chowdhury Shisher Timely Inference over Networks . . . . . 58--61
Vishrant Tripathi Information Freshness for Monitoring and
Control over Wireless Networks . . . . . 62--65
Jinhang Zuo Learning-enabled Networked Systems . . . 66--69
Anton Braverman and
Varun Gupta Foreword from the general chairs . . . . 2
Paul Barford and
Maria Vlasiou and
Lei Ying Message from the Technical Program
Committee Chairs . . . . . . . . . . . . 3
Simon Scherrer and
Seyedali Tabaeiaghdaei and
Adrian Perrig Quality Competition Among Internet
Service Providers . . . . . . . . . . . 4--5
Isaac Grosof and
Yige Hong and
Mor Harchol-Balter and
Alan Scheller-Wolf The RESET and MARC Techniques, with
Application to Multiserver-Job Analysis 6--7
Meera Pai and
Nikhil Karamchandani and
Jayakrishnan Nair Fixed confidence community mode
estimation . . . . . . . . . . . . . . . 8--9
Kumar Saurav and
Rahul Vaze Minimizing Age of Information under
Arbitrary Arrival Model with Arbitrary
Packet Size . . . . . . . . . . . . . . 10--11
Yige Hong and
Ziv Scully Performance of the Gittins Policy in the
G/G/1 and G/G/$k$, With and Without
Setup Times . . . . . . . . . . . . . . 12--13
Yaron Yeger and
Onno Boxma and
Jacques Resing and
Maria Vlasiou ASIP tandem queues with consumption . . 14--15
Prakirt Raj Jhunjhunwala and
Siva Theja Maguluri Heavy Traffic Joint Queue Length
Distribution without Resource Pooling 16--17
Prakirt Raj Jhunjhunwala and
Daniela Hurtado-Lange and
Siva Theja Maguluri Exponential Tail Bounds on Queues: a
Confluence of Non- Asymptotic Heavy
Traffic and Large Deviations . . . . . . 18--19
Hengquan Guo and
Hongchen Cao and
Jingzhu He and
Xin Liu and
Yuanming Shi POBO: Safe and Optimal Resource
Management for Cloud Microservices . . . 20--21
Spandan Senapati and
Rahul Vaze Online Convex Optimization with
Switching Cost and Delayed Gradients . . 22--23
Xiaoding Guan and
Noman Bashir and
David Irwin and
Prashant Shenoy WattScope: Non-intrusive
Application-level Power Disaggregation
in Datacenters . . . . . . . . . . . . . 24--25
Zhisheng Zhao and
Debankur Mukherjee Optimal Rate-Matrix Pruning For
Heterogeneous Systems . . . . . . . . . 26--27
Diletta Olliaro and
Marco Ajmone Marsan and
Simonetta Balsamo and
Andrea Marin The Saturated Multiserver Job Queuing
Model with Two Classes of Jobs: Exact
and Approximate Results . . . . . . . . 28--29
Khushboo Agarwal and
Veeraruna Kavitha Robust fake-post detection against
real-coloring adversaries . . . . . . . 30--31
Boyang Zhou and
Isaac Howenstine and
Liang Cheng and
Steffen Bondorf Breaking Cyclic Dependencies for Network
Calculus using Service Partitioning . . 32--42
Andres Ferragut and
Fernando Paganini Queueing analysis of imbalance between
multiple server pools with an
application to 3-phase EV charging . . . 43--53
Hai Duc Nguyen and
Andrew A. Chien A Foundation for Real-time Applications
on Function-as-a-Service . . . . . . . . 54--65
Ying Cao and
Siyuan Yu and
Xiaoqi Tan and
Danny H. K. Tsang Competitive Online Path-Aware Path
Selection . . . . . . . . . . . . . . . 66--72
Nicolas Gast and
Benny Van Houdt Approximations to Study the Impact of
the Service Discipline in Systems with
Redundancy . . . . . . . . . . . . . . . 1--2
Ellen Cardinaels and
Sem Borst and
Johan S. H. van Leeuwaarden Multi-dimensional State Space Collapse
in Non-complete Resource Pooling
Scenarios . . . . . . . . . . . . . . . 3--4
George Yu and
Ziv Scully Strongly Tail-Optimal Scheduling in the
Light-Tailed M/G/1 . . . . . . . . . . . 5--6
Runhan Xie and
Isaac Grosof and
Ziv Scully Heavy-Traffic Optimal Size- and
State-Aware Dispatching . . . . . . . . 7--8
Giovane C. M. Moura and
Marco Davids and
Caspar Schutijser and
Cristian Hesselman and
John Heidemann and
Georgios Smaragdakis Deep Dive into NTP Pool's Popularity and
Mapping . . . . . . . . . . . . . . . . 9--10
Minzhao Lyu and
Rahul Dev Tripathi and
Vijay Sivaraman MetaVRadar: Measuring Metaverse Virtual
Reality Network Activity . . . . . . . . 11--12
Neil Ortiz and
Alvaro A. Cardenas and
Avishai Wool SCADA World: an Exploration of the
Diversity in Power Grid Networks . . . . 13--14
Liz Izhikevich and
Manda Tran and
Katherine Izhikevich and
Gautam Akiwate and
Zakir Durumeric Democratizing LEO Satellite Network
Measurement . . . . . . . . . . . . . . 15--16
Kahlil Dozier and
Loqman Salamatian and
Dan Rubenstein Analysis of False Negative Rates for
Recycling Bloom Filters (Yes, They
Happen!) . . . . . . . . . . . . . . . . 17--18
Avi Mizrahi and
Daniella Bar-Lev and
Eitan Yaakobi and
Ori Rottenstreich Invertible Bloom Lookup Tables with
Listing Guarantees . . . . . . . . . . . 19--20
Andrea Monterubbiano and
Jonatan Langlet and
Stefan Walzer and
Gianni Antichi and
Pedro Reviriego and
Salvatore Pontarelli Lightweight Acquisition and Ranging of
Flows in the Data Plane . . . . . . . . 21--22
Santosh Pandey and
Amir Yazdanbakhsh and
Hang Liu TAO: Re-Thinking DL-based
Microarchitecture Simulation . . . . . . 23--24
Mohammad Bakhshalipour and
Phillip B. Gibbons Agents of Autonomy: a Systematic Study
of Robotics on Modern Hardware . . . . . 25--26
Venkatraman Iyer and
Sungho Lee and
Semun Lee and
Juitem Joonwoo Kim and
Hyunjun Kim and
Youngjae Shin Automated Backend Allocation for
Multi-Model, On-Device AI Inference . . 27--28
Qingsong Liu and
Zhixuan Fang Learning the Optimal Control for
Evolving Systems with Converging
Dynamics . . . . . . . . . . . . . . . . 29--30
Jiayu Pan and
Yin Sun and
Ness B. Shroff Sampling for Remote Estimation of the
Wiener Process over an Unreliable
Channel . . . . . . . . . . . . . . . . 31--32
Christos Tsanikidis and
Javad Ghaderi Near-Optimal Packet Scheduling in
Multihop Networks with End-to-End
Deadline Constraints . . . . . . . . . . 33--34
Yixuan Zhang and
Dongyan (Lucy) Huo and
Yudong Chen and
Qiaomin Xie Prelimit Coupling and Steady-State
Convergence of Constant-stepsize
Nonsmooth Contractive SA . . . . . . . . 35--36
Huaifeng Zhang and
Mohannad Alhanahnah and
Fahmi Abdulqadir Ahmed and
Dyako Fatih and
Philipp Leitner and
Ahmed Ali-Eldin Machine Learning Systems are Bloated and
Vulnerable . . . . . . . . . . . . . . . 37--38
Scott Cheng and
Jun-Liang Lin and
Murali Emani and
Siddhisanket Raskar and
Sam Foreman and
Zhen Xie and
Venkatram Vishwanath and
Mahmut T. Kandemir Thorough Characterization and Analysis
of Large Transformer Model Training
At-Scale . . . . . . . . . . . . . . . . 39--40
Yicheng Pan and
Yang Zhang and
Tingzhu Bi and
Linlin Han and
Yu Zhang and
Meng Ma and
Xiangzhuang Shen and
Xinrui Jiang and
Feng Wang and
Xian Liu and
Ping Wang HEAL: Performance Troubleshooting Deep
inside Data Center Hosts . . . . . . . . 41--42
Peter Cai and
Martin Karsten Kernel vs. User-Level Networking: Don't
Throw Out the Stack with the Interrupts 43--44
Adam Lechowicz and
Nicolas Christianson and
Bo Sun and
Noman Bashir and
Mohammad Hajiesmaili and
Adam Wierman and
Prashant Shenoy Online Conversion with Switching Costs:
Robust and Learning-Augmented Algorithms 45--46
Adam Lechowicz and
Nicolas Christianson and
Jinhang Zuo and
Noman Bashir and
Mohammad Hajiesmaili and
Adam Wierman and
Prashant Shenoy The Online Pause and Resume Problem:
Optimal Algorithms and An Application to
Carbon-Aware Load Shifting . . . . . . . 47--48
Walid A. Hanafy and
Qianlin Liang and
Noman Bashir and
David Irwin and
Prashant Shenoy CarbonScaler: Leveraging Cloud Workload
Elasticity for Optimizing
Carbon-Efficiency . . . . . . . . . . . 49--50
Yudi Huang and
Yilei Lin and
Ting He Optimized Cross-Path Attacks via
Adversarial Reconnaissance . . . . . . . 51--52
Radu Anghel and
Yury Zhauniarovich and
Carlos Gañán Who's Got My Back? Measuring the
Adoption of an Internet-wide BGP RTBH
Service . . . . . . . . . . . . . . . . 53--54
Euijin Choo and
Mohamed Nabeel and
Doowon Kim and
Ravindu De Silva and
Ting Yu and
Issa Khalil A Large Scale Study and Classification
of VirusTotal Reports on Phishing and
Malware URLs . . . . . . . . . . . . . . 55--56
Jianyi Yang and
Pengfei Li and
Mohammad J. Islam and
Shaolei Ren Online Allocation with Replenishable
Budgets: Worst Case and Beyond . . . . . 57--58
Fatih Aslan and
George Iosifidis and
Jose A. Ayala-Romero and
Andres Garcia-Saavedra and
Xavier Costa-Perez Fair Resource Allocation in Virtualized
O-RAN Platforms . . . . . . . . . . . . 59--60
Lingdong Wang and
Simran Singh and
Jacob Chakareski and
Mohammad Hajiesmaili and
Ramesh K. Sitaraman BONES: Near-Optimal Neural-Enhanced
Video Streaming . . . . . . . . . . . . 61--62
Gilbert Jonatan and
Haeyoon Cho and
Hyojun Son and
Xiangyu Wu and
Neal Livesay and
Evelio Mora and
Kaustubh Shivdikar and
José L. Abellán and
Ajay Joshi and
David Kaeli and
John Kim Scalability Limitations of
Processing-in-Memory using Real System
Evaluations . . . . . . . . . . . . . . 63--64
Stella Bitchebe and
Yves Kone and
Pierre Olivier and
Jalil Boukhobza and
Yérom-David Bromberg and
Daniel Hagimont and
Alain Tchana GuaNary: Efficient Buffer Overflow
Detection In Virtualized Clouds Using
Intel EPT-based Sub-Page Write
Protection Support . . . . . . . . . . . 65--66
Negar Akbarzadeh and
Sina Darabi and
Atiyeh Gheibi-Fetrat and
Amir Mirzaei and
Mohammad Sadrosadati and
Hamid Sarbazi-Azad A High-bandwidth High-capacity Hybrid
$3$D Memory for GPUs . . . . . . . . . . 67--68
Keegan Harris and
Anish Agarwal and
Chara Podimata and
Zhiwei Steven Wu Strategyproof Decision-Making in Panel
Data Settings and Beyond . . . . . . . . 69--70
Ludwig Dierks and
Makoto Yokoo When Should Prices Stay Fixed? On the
Chances and Limitations of Spot Pricing
in Larger Markets . . . . . . . . . . . 71--72
Jin Cheng and
Ningning Ding and
John C. S. Lui and
Jianwei Huang Continuous Query-based Data Trading . . 73--74
Lo, Chi-Jen (Roger) and
Mahesh K. Marina and
Nishanth Sastry and
Kai Xu and
Saeed Fadaei and
Yong Li Shrinking VOD Traffic via Rényi--Entropic
Optimal Transport . . . . . . . . . . . 75--76
Ruizhe Shi and
Ruizhi Cheng and
Bo Han and
Yue Cheng and
Songqing Chen A Closer Look into IPFS: Accessibility,
Content, and Performance . . . . . . . . 77--78
Rohan Basu Roy and
Devesh Tiwari StarShip: Mitigating I/O Bottlenecks in
Serverless Computing for Scientific
Workflows . . . . . . . . . . . . . . . 79--80
Yiguang Zhang and
Reetahan Mukhopadhyay and
Augustin Chaintreau Network Fairness Ambivalence: When Does
Social Network Capital Mitigate or
Amplify Unfairness? . . . . . . . . . . 81--82
Simon Lindståhl and
Alexandre Proutiere and
Andreas Johnsson Change Point Detection with Adaptive
Measurement Schedules for Network
Performance Verification . . . . . . . . 83--84
Xi Jiang and
Shinan Liu and
Aaron Gember-Jacobson and
Arjun Nitin Bhagoji and
Paul Schmitt and
Francesco Bronzino and
Nick Feamster NetDiffusion: Network Data Augmentation
Through Protocol-Constrained Traffic
Generation . . . . . . . . . . . . . . . 85--86
Jintao Huang and
Ningyu He and
Kai Ma and
Jiang Xiao and
Haoyu Wang Miracle or Mirage? A Measurement Study
of NFT Rug Pulls . . . . . . . . . . . . 87--88
Kai Li and
Shixuan Guan and
Darren Lee Towards Understanding and Characterizing
the Arbitrage Bot Scam In the Wild . . . 89--90
Tianyue Chu and
Nikolaos Laoutaris FedQV: Leveraging Quadratic Voting in
Federated Learning . . . . . . . . . . . 91--92
Yige Hong and
Qiaomin Xie and
Weina Wang Near-Optimal Stochastic Bin-Packing in
Large Service Systems with Time-Varying
Item Sizes . . . . . . . . . . . . . . . 93--94
Daan Rutten and
Martin Zubeldia and
Debankur Mukherjee Distributed Speed Scaling in Large-Scale
Service Systems . . . . . . . . . . . . 95--96
Diego Goldsztajn and
Sem C. Borst and
Johan S. H. van Leeuwaarden Server Saturation in Skewed Networks . . 97--98
Alagappan Ramanathan and
Rishika Sankaran and
Sangeetha Abdu Jyothi Xaminer: an Internet Cross-Layer
Resilience Analysis Tool . . . . . . . . 99--100
Alagappan Ramanathan and
Sangeetha Abdu Jyothi Nautilus: a Framework for Cross-Layer
Cartography of Submarine Cables and IP
Links . . . . . . . . . . . . . . . . . 101--102
Esteban Carisimo and
Caleb J. Wang and
Mia Weaver and
Fabián Bustamante and
Paul Barford A Hop Away from Everywhere: a View of
the Intercontinental Long-haul
Infrastructure . . . . . . . . . . . . . 103--104
Mark S. Squillante Special Issue on The Workshop on
MAthematical performance Modeling and
Analysis (MAMA 2024) . . . . . . . . . . 2--2
Hossein Nekouyan Jazi and
Faraz Zargari Online Conversion with Group Fairness
Constraints . . . . . . . . . . . . . . 3--5
Nicolas Christianson and
Bo Sun and
Steven Low and
Adam Wierman Risk-Sensitive Online Algorithms . . . . 6--8
Andres Ferragut and
Matias Carrasco and
Fernando Paganini Timer-based pre-fetching for increasing
hazard rates . . . . . . . . . . . . . . 9--11
Zhouzi Li and
Mor Harchol-Balter and
Alan Scheller-Wolf Hybrid Priority Queue and its
Applications . . . . . . . . . . . . . . 12--14
Amit Harlev and
George Yu and
Ziv Scully A Gittins Policy for Optimizing Tail
Latency . . . . . . . . . . . . . . . . 15--17
Shefali Ramakrishna and
Ziv Scully Transform Analysis of Preemption
Overhead in the M/G/1 . . . . . . . . . 18--20
Nils Charlet and
Benny Van Houdt Tail Optimality of the Nudge-$M$
Scheduling Algorithm . . . . . . . . . . 21--23
Isaac Grosof and
Ziyuan Wang Bounds on M/G/$k$ Scheduling Under
Moderate Load Improving on SRPT-$k$ and
Tightening Lower Bounds . . . . . . . . 24--26
Zhongrui Chen and
Isaac Grosof and
Benjamin Berg Simple Policies for Multiresource Job
Scheduling . . . . . . . . . . . . . . . 27--29
Larkin Liu and
Shiqi Liu and
Matej Jusup Optimizing Stochastic Control through
State Transition Separability and
Resource-Utility Exchange . . . . . . . 30--32
Weici Pan and
Zhenhua Liu Non-stationary Bandits with Heavy Tail 33--35
Suryanarayana Sankagiri and
Bruce Hajek Pricing for Routing and Flow-Control in
Payment Channel Networks . . . . . . . . 36--38
J. G. Dai and
Jin Guang and
Yaosheng Xu Steady-State Convergence of the
Continuous-Time JSQ System with General
Distributions in Heavy Traffic . . . . . 39--41
Vasileios Kalantzis and
Mark S. Squillante and
Shashanka Ubaru On Quantum Algorithms for Efficient
Solutions of General Classes of
Structured Markov Processes . . . . . . 42--44
Vittoria de Nitto Persone and
Y. C. Tay Report on the Third International
Workshop on Teaching Performance
Analysis of Computer Systems 2024 . . . 45--48
Dieter Fiems Teaching performance analysis: essential
skills andlearning outcomes . . . . . . 49--52
Michela Meo Why Should I Teach Performance
Evaluation to Students in Networking? 53--57
Cristina L. Abad How can we Teach Workload Modeling in CS
Systems Classes? . . . . . . . . . . . . 58--62
Urtzi Ayesta Foreword from Chair of 2024 ACM
SIGMETRICS Doctoral Dissertation Award
Committee . . . . . . . . . . . . . . . 2
Sushil Mahavir Varma Stochastic Matching Networks: Theory and
Applications to Matching Platforms . . . 3--6
Diego Goldsztajn Fluid Limits and Optimal Task Assignment
Policies for Locally Pooled Service
Systems . . . . . . . . . . . . . . . . 7--10
Ayush Mishra Understanding the Modern Internet's
Heterogeneous Congestion Control
Landscape . . . . . . . . . . . . . . . 11--14
Aristide Tanyi-Jong Akem User-Plane Algorithms for Stateless and
Stateful Inference in Programmable
Networks . . . . . . . . . . . . . . . . 15--18
Diletta Olliaro Models for Throughput Maximisation in
Distributed Systems . . . . . . . . . . 19--22
I-Cheng Lin Learning and Optimization over Robust
Networked Systems . . . . . . . . . . . 23--26
Ivan Malakhov Analysis of the Transaction Confirmation
Process and Fairness in Proof-of-Work
Blockchains . . . . . . . . . . . . . . 27--30
Jingdi Chen Exploration, Collaboration, and
Applications in Multi-Agent
Reinforcement Learning . . . . . . . . . 31--34
Jonathan Chamberlain Game Theoretic Frameworks for Spectrum
Coexistence in Advanced Wireless
Networks . . . . . . . . . . . . . . . . 35--38
Xutong Liu Scalable and Robust Online Learning for
AI-powered Networked Systems . . . . . . 39--42
Nicolas Gast and
Lishan Yang ACM SIGMETRICS 2024 Student Research
Competition . . . . . . . . . . . . . . 2
Osayamen J. Aimuyo Aristos: Pipelining One-sided
Communication in Distributed Mixture of
Experts . . . . . . . . . . . . . . . . 3--5
Ciro Guida Toward Privacy-Preserving Training of
Generative AI Models for Network Traffic
Classification . . . . . . . . . . . . . 6--8
Daichi Kuroda Differentiating between Hierarchical and
Flat Communities . . . . . . . . . . . . 9--10
Angelo Rodio The Many Facets of Variance Reduction in
Federated Learning . . . . . . . . . . . 11--12
Shefali Ramakrishna Transform Analysis of Preemption
Overhead in the M/G/1 . . . . . . . . . 13--14
Ming Xiang Taming Client Availability in Federated
Learning in the Presence of Arbitrary
and Unknown Dynamics . . . . . . . . . . 15--16
Yiyang Wang Time-Continuous Modeling of Zipfian
Workload Locality . . . . . . . . . . . 17--18
Louis HAUSEUX How can we theoretically measure the
performance of density-based clustering
algorithms? . . . . . . . . . . . . . . 19--20
Ibtihal El Mimouni Whittle Index-Based $Q$-Learning for
Contextual Restless Bandits: a Case
Study in Email Marketing . . . . . . . . 21--22
Jason Han and
Tirthak Patel Turning Quantum Noise on its Head: Using
the Noise for Diffusion Models to
Generate Images . . . . . . . . . . . . 23--24
Yuncheng Yao MLFD: The Implementation and Performance
Evaluation of an LSTM-based,
SmartNIC-Offloadable Failure Detector 25--27
Jonatha Anselmi and
Josu Doncel Dispatching and scheduling multi-server
jobs for throughput optimality . . . . . 28--32