Table of contents for issues of ACM SIGMETRICS Performance Evaluation Review

Last update: Mon Jan 8 07:31:10 MST 2024                Valid HTML 3.2!

Volume 1, Number 1, March, 1972
Volume 1, Number 2, June, 1972
Volume 1, Number 3, September, 1972
Volume 1, Number 4, December, 1972
Volume 2, Number 1, March, 1973
Volume 2, Number 2, June, 1973
Volume 2, Number 3, September, 1973
Volume 2, Number 4, December, 1973
Volume 3, Number 1, March, 1974
Volume 3, Number 2, June, 1974
Volume 3, Number 3, October, 1974
Volume 3, Number 4, December, 1974
Volume 4, Number 1, January, 1975
Volume 4, Number 2, April, 1975
Volume 4, Number 3, July, 1975
Volume 4, Number 4, October, 1975
Volume 5, Number 1, January, 1976
Volume 5, Number 1c, March, 1976
Volume 5, Number 2, April, 1976
Volume 5, Number 3, Summer, 1976
Volume 5, Number 4, Fall, 1976
Volume 6, Number 1, Winter, 1977
Volume 6, Number 2, Spring, 1977
Volume 6, Number 3, Summer, 1977
Volume 6, Number 4, Fall, 1977
Volume 7, Number 1--2, Spring-Summer, 1978
Volume 7, Number 3--4, November, 1978
Volume 8, Number 1--2, Spring-Summer, 1979
Volume 8, Number 3, Fall, 1979
Volume 8, Number 4, December, 1979
Volume 9, Number 1, Spring, 1980
Volume 9, Number 2, Summer, 1980
Volume 9, Number 3, Fall, 1980
Volume 9, Number 4, Winter, 1980
Volume 10, Number 1, Spring, 1981
Volume 10, Number 2, Summer, 1981
Volume 10, Number 3, Fall, 1981
Volume 10, Number 4, December, 1981
Volume 11, Number 1, Spring, 1981
Volume 11, Number 2, Summer, 1982
Volume 11, Number 3, Fall, 1982
Volume 11, Number 4, December, 1982
Volume 12, Number 1, December, 1982/1983
Volume 12, Number 2, Spring-Summer, 1984
Volume 12, Number 3, August, 1984
Volume 12, Number 4, 1984/1985
Volume 13, Number 1, June, 1985
Volume 13, Number 2, August, 1985
Volume 13, Number 3--4, November, 1985
Volume 14, Number 1, May, 1986
Volume 14, Number 2, August, 1986
Volume 14, Number 3--4, January, 1987
Volume 15, Number 1, May, 1987
Volume 15, Number 2, August, 1987
Volume 15, Number 3--4, February, 1988
Volume 16, Number 1, May, 1988
Volume 16, Number 2--4, February, 1989
Volume 17, Number 1, May, 1989
Volume 17, Number 2, January, 1990
Volume 18, Number 1, May, 1990
Volume 18, Number 2, August, 1990
Volume 18, Number 3, November, 1990
Volume 18, Number 4, April, 1991
Volume 19, Number 1, May, 1991
Volume 19, Number 2, August, 1991
Volume 19, Number 3, February, 1992
Volume 19, Number 4, May, 1992
Volume 20, Number 1, June, 1992
Volume 20, Number 2, November, 1992
Volume 20, Number 3, March, 1993
Volume 20, Number 4, May, 1993
Volume 21, Number 1, June, 1993
Volume 21, Number 2, December, 1993
Volume 21, Number 3--4, April, 1994
Volume 22, Number 1, May, 1994
Volume 22, Number 2--4, April, 1995
Volume 23, Number 1, May, 1995
Volume 24, Number 1, May, 1996
Volume 25, Number 1, June, 1997
Volume 25, Number 2, September, 1997
Volume 25, Number 3, December, 1997
Volume 25, Number 4, March, 1998
Volume 26, Number 1, June, 1998
Volume 26, Number 2, August, 1998
Volume 26, Number 3, December, 1998
Volume 26, Number 4, March, 1999
Volume 27, Number 1, June, 1999
Volume 27, Number 2, September, 1999
Volume 27, Number 3, December, 1999
Volume 27, Number 4, March, 2000
Volume 28, Number 1, June, 2000
Volume 28, Number 2, September, 2000
Volume 28, Number 3, December, 2000
Volume 28, Number 4, March, 2001
Volume 29, Number 1, June, 2001
Volume 29, Number 2, September, 2001
Volume 29, Number 3, December, 2001
Volume 29, Number 4, March, 2002
Volume 30, Number 1, June, 2002
Volume 30, Number 2, September, 2002
Volume 30, Number 3, December, 2002
Volume 30, Number 4, March, 2003
Volume 31, Number 1, June, 2003
Volume 31, Number 2, September, 2003
Volume 31, Number 3, December, 2003
Volume 31, Number 4, March, 2004
Volume 32, Number 1, June, 2004
Volume 32, Number 2, September, 2004
Volume 32, Number 3, December, 2004
Volume 32, Number 4, March, 2005
Volume 33, Number 1, June, 2005
Volume 33, Number 2, September, 2005
Volume 33, Number 3, December, 2005
Volume 33, Number 4, March, 2006
Volume 34, Number 1, June, 2006
Volume 34, Number 2, September, 2006
Volume 34, Number 3, December, 2006
Volume 34, Number 4, March, 2007
Volume 35, Number 1, June, 2007
Volume 35, Number 2, September, 2007
Volume 35, Number 3, December, 2007
Volume 35, Number 4, March, 2008
Volume 36, Number 1, June, 2008
Volume 36, Number 2, September, 2008
Volume 36, Number 3, December, 2008
Volume 36, Number 4, March, 2009
Volume 37, Number 1, June, 2009
Volume 37, Number 2, September, 2009
Volume 37, Number 3, December, 2009
Volume 37, Number 4, March, 2010
Volume 38, Number 1, June, 2010
Volume 38, Number 2, September, 2010
Volume 38, Number 3, December, 2010
Volume 38, Number 4, March, 2011
Volume 39, Number 1, June, 2011
Volume 39, Number 2, September, 2011
Volume 39, Number 3, December, 2011
Volume 39, Number 4, April, 2012
Volume 40, Number 1, June, 2012
Volume 40, Number 2, September, 2012
Volume 40, Number 3, December, 2012
Volume 40, Number 4, March, 2013
Volume 41, Number 1, June, 2013
Volume 41, Number 2, September, 2013
Volume 41, Number 3, December, 2013
Volume 41, Number 4, March, 2014
Volume 42, Number 1, June, 2014
Volume 42, Number 2, September, 2014
Volume 42, Number 3, December, 2014
Volume 42, Number 4, March, 2015
Volume 43, Number 1, June, 2015
Volume 43, Number 2, September, 2015
Volume 43, Number 3, December, 2015
Volume 43, Number 4, March, 2016
Volume 44, Number 1, June, 2016
Volume 44, Number 2, September, 2016
Volume 44, Number 3, December, 2016
Volume 44, Number 4, March, 2017
Volume 45, Number 1, June, 2017
Volume 45, Number 2, 2017
Volume 45, Number 3, December, 2017
Volume 45, Number 4, March, 2018
Volume 46, Number 1, June, 2018
Volume 46, Number 2, September, 2018
Volume 46, Number 3, December, 2018
Volume 46, Number 4, March, 2019
Volume 47, Number 1, December, 2019
Volume 47, Number 2, September, 2019
Volume 47, Number 3, January, 2020
Volume 47, Number 4, April, 2020
Volume 48, Number 1, July, 2020
Volume 48, Number 2, November, 2020
Volume 48, Number 3, December, 2020
Volume 48, Number 4, May, 2021
Volume 49, Number 1, June, 2021
Volume 49, Number 2, September, 2021
Volume 49, Number 3, December, 2021
Volume 49, Number 4, March, 2022
Volume 50, Number 2, September, 2022
Volume 50, Number 3, December, 2022
Volume 50, Number 4, March, 2023
Volume 51, Number 1, June, 2023
Volume 51, Number 2, September, 2023
Volume 51, Number 3, December, 2023


ACM SIGMETRICS Performance Evaluation Review
Volume 1, Number 1, March, 1972

         Ralph E. Keirstead and   
                 Donn B. Parker   Software testing and certification . . . 3--8

ACM SIGMETRICS Performance Evaluation Review
Volume 1, Number 2, June, 1972

                 Thomas E. Bell   Computer measurement and evaluation:
                                  artistry, or science?  . . . . . . . . . 4--10
                    Jacob Palme   Beware of the Gibson mix . . . . . . . . 10--11

ACM SIGMETRICS Performance Evaluation Review
Volume 1, Number 3, September, 1972

              Robert R. Johnson   Some steps toward an information system
                                  performance theory . . . . . . . . . . . 4--15
            B. W. Kernighan and   
              P. J. Plauger and   
                  D. J. Plauger   On comparing apples and oranges, or, my
                                  machine is better than your machine  . . 16--20

ACM SIGMETRICS Performance Evaluation Review
Volume 1, Number 4, December, 1972

                    W. C. Lynch   Do disk arms move? . . . . . . . . . . . 3--16


ACM SIGMETRICS Performance Evaluation Review
Volume 2, Number 1, March, 1973

                 M. H. Halstead   Language level, a missing concept in
                                  information theory . . . . . . . . . . . 7--9
                 M. H. Halstead   An experimental determination of the
                                  `purity' of a trivial algorithm  . . . . 10--15
               Peter J. Denning   Review of `Statistical Computer
                                  Performance Evaluation' by Walter
                                  Frieberger; Academic Press (1972)  . . . 16--22
                 Liba Svobodova   Communications: Some notes on the
                                  Computer Synectics hardware monitor sum  23--25

ACM SIGMETRICS Performance Evaluation Review
Volume 2, Number 2, June, 1973

            Haruhisa Ishida and   
             Nobumasa Takahashi   Job statistics at a 2000-user university
                                  computer center  . . . . . . . . . . . . 2--13
                    Don R. Rice   An analytical model for computer system
                                  performance evaluation . . . . . . . . . 14--30
             Kenneth W. Kolence   The software empiricist  . . . . . . . . 31--36

ACM SIGMETRICS Performance Evaluation Review
Volume 2, Number 3, September, 1973

         Kenneth W. Kolence and   
               Philip J. Kiviat   Software unit profiles & Kiviat figures   2--12
               Peter J. Denning   Why our approach to performance
                                  evaluation is SDRAWKCAB  . . . . . . . . 13--16
                Norman Beck and   
                   Gordon Ashby   On cost of static linking and loading of
                                  subprograms  . . . . . . . . . . . . . . 17--20
                    Ken Kolence   The software empiricist experimental
                                  disciplines & computer measurements . . . 21--23

ACM SIGMETRICS Performance Evaluation Review
Volume 2, Number 4, December, 1973

               James Hughes and   
                 David Cronshaw   On using a hardware monitor as an
                                  intelligent peripheral . . . . . . . . . 3--19
                 Liba Svobodova   Measuring computer system utilization
                                  with a hardware and a hybrid monitor . . 20--34


ACM SIGMETRICS Performance Evaluation Review
Volume 3, Number 1, March, 1974

               David B. Wortman   A note on high resolution timing . . . . 3--9
                   Rowan Snyder   A quantitative study of the addition of
                                  extended core storage  . . . . . . . . . 10--33
            H. E. Barry Merrill   A technique for comparative analysis of
                                  Kiviat graphs  . . . . . . . . . . . . . 34--39

ACM SIGMETRICS Performance Evaluation Review
Volume 3, Number 2, June, 1974

             Thomas G. Peterson   A comparison of software and hardware
                                  monitors . . . . . . . . . . . . . . . . 2--5
                 Gordon H. Syms   Benchmarked comparison of terminal
                                  support systems for IBM 360 computers    6--34

ACM SIGMETRICS Performance Evaluation Review
Volume 3, Number 3, October, 1974

              Michael F. Morris   Kiviat graphs: conventions and `figures
                                  of merit'  . . . . . . . . . . . . . . . 2--8
                Paul L. Lujanac   A note on Syms' benchmarked comparison   9--10

ACM SIGMETRICS Performance Evaluation Review
Volume 3, Number 4, December, 1974

            G. Scott Graham and   
               Peter J. Denning   Multiprogramming and program behavior    1--8
               A. Brandwain and   
                   J. Buzen and   
                 E. Gelenbe and   
                      D. Potier   A model of performance for virtual
                                  memory systems . . . . . . . . . . . . . 9--9
             Greg Henderson and   
          Juan Rodriguez-Rosell   The optimal choice of window sizes for
                                  working set dispatching  . . . . . . . . 10--33
               Peter J. Denning   Comments on a linear paging model  . . . 34--48
           Richard S. Brice and   
                   J. C. Browne   Feedback coupled resource allocation
                                  policies in the
                                  multiprogramming-multiprocessor computer
                                  system . . . . . . . . . . . . . . . . . 49--53
            Baruch Halachmi and   
                   W. R. Franta   A closed, cyclic, two-stage
                                  multiprogrammed system model and its
                                  diffusion approximation solution . . . . 54--64
                H. D. Schwetman   Analysis of a time-sharing subsystem (a
                                  preliminary report)  . . . . . . . . . . 65--75
                  M. Reiser and   
                  A. G. Konheim   The analysis of storage constraints by a
                                  queueing network model with blocking . . 76--81
               M. Schatzoff and   
                  C. C. Tillman   Statistical validation of a trace-driven
                                  simulator  . . . . . . . . . . . . . . . 82--93
           Domenico Ferrari and   
                       Mark Liu   A general-purpose software measurement
                                  tool . . . . . . . . . . . . . . . . . . 94--105
             James D. Foley and   
                John W. McInroy   An event-driven data collection and
                                  analysis facility for a two-computer
                                  network  . . . . . . . . . . . . . . . . 106--120
               A. P. Batson and   
                 R. E. Brundage   Measurements of the virtual memory
                                  demands of Algol-60 programs (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 121--126
             Peter R. Sebastian   HEMI (Hybrid Events Monitoring
                                  Instrument)  . . . . . . . . . . . . . . 127--139
                Springer W. Cox   Interpretive analysis of computer system
                                  performance  . . . . . . . . . . . . . . 140--155
                  J. D. Noe and   
                 N. W. Runstein   Develop your computer performance
                                  pattern  . . . . . . . . . . . . . . . . 156--165
               D. E. Brotherton   The computer capacity curve --- a
                                  prerequisite for computer performance
                                  evaluation and improvement . . . . . . . 166--179
              Warren J. Erikson   The value of CPU utilization as a
                                  criterion for computer system usage  . . 180--187
                   M. Badel and   
                 E. Gelenbe and   
               J. Leroudier and   
                  D. Potier and   
                     J. Lenfant   Adaptive optimization of the performance
                                  of a virtual memory computer . . . . . . 188--188
           Stephen R. Kimbleton   Batch computer scheduling: a
                                  heuristically motivated approach . . . . 189--198
            Joseph C. Sharp and   
               James N. Roberts   An adaptive policy driven scheduler  . . 199--208


ACM SIGMETRICS Performance Evaluation Review
Volume 4, Number 1, January, 1975

            H. W. Barry Merrill   Further comments on comparative
                                  evaluation of Kiviat graphs  . . . . . . 1--10
               Barry A. Stevens   A note on figure of merit  . . . . . . . 11--19
                 Thomas E. Bell   Managing computer performance with
                                  control limits . . . . . . . . . . . . . 21--28
                   J. C. Browne   An analysis of measurement procedures
                                  for computer systems . . . . . . . . . . 29--32

ACM SIGMETRICS Performance Evaluation Review
Volume 4, Number 2, April, 1975

                 Kornel Terplan   Cost-optimal reliability of data
                                  processing systems . . . . . . . . . . . 1--12
               Carl E. Landwehr   Usage statistics for MTS . . . . . . . . 13--23
                    Y. V. Reddy   Experimental evaluation of a
                                  multiprogrammed computer system  . . . . 24--32
           Dileep P. Bhandarkar   A practical application of memory
                                  interference models  . . . . . . . . . . 33--39

ACM SIGMETRICS Performance Evaluation Review
Volume 4, Number 3, July, 1975

                    Dieter Bahr   A note on figures of merit . . . . . . . 1--3
                B. W. Boehm and   
                     T. E. Bell   Issues in computer performance
                                  evaluation: some consensus, some
                                  divergence . . . . . . . . . . . . . . . 4--39

ACM SIGMETRICS Performance Evaluation Review
Volume 4, Number 4, October, 1975

            Eric Ole Barber and   
              Arne Asphjell and   
                    Arve Dispen   Benchmark construction . . . . . . . . . 3--14
          J. P. Marrevée   Measurements of the Philips P1400
                                  multiprogramming system  . . . . . . . . 15--45


ACM SIGMETRICS Performance Evaluation Review
Volume 5, Number 1, January, 1976

            Linda S. Wright and   
            William A. Burnette   An approach to evaluating time sharing
                                  systems: MH-TSS a case study . . . . . . 8--28
               John M. Calcagni   Shape in ranking Kiviat graphs . . . . . 35--37
               J. Eisenfeld and   
            David R. Barker and   
            David J. Mishelvich   Iconic representation of the human face
                                  with computer graphics . . . . . . . . . 38--39
                   Gary J. Nutt   Tutorial: computer system monitors . . . 41--51

ACM SIGMETRICS Performance Evaluation Review
Volume 5, Number 1c, March, 1976

                  Ira W. Cotton   Some fundamentals of price theory for
                                  computer services  . . . . . . . . . . . 1--12
                  Thomas Giammo   Deficiencies in computer pricing
                                  structure theory . . . . . . . . . . . . 13--21
           Stephen R. Kimbleton   Considerations in pricing distributed
                                  computing  . . . . . . . . . . . . . . . 22--30
               Philip J. Kiviat   A brief review of the GAO task group's
                                  recommendations on management guidelines
                                  for pricing computer services in the
                                  federal government . . . . . . . . . . . 71--83
              Michael F. Morris   Problems in implementing and processing
                                  computer charging schemes  . . . . . . . 84--88
        Gottfried W. R. Luderer   Charging problems in mixed
                                  time-sharing/batch systems: cross
                                  subsidization and invariant work units   89--93
                 David J. Oatey   SIGMETRICS technical meeting on pricing
                                  computer services  . . . . . . . . . . . 94--102
             Richard H. Gutsche   User experience  . . . . . . . . . . . . 103--107
                      Anonymous   Participant's choice . . . . . . . . . . 108--122

ACM SIGMETRICS Performance Evaluation Review
Volume 5, Number 2, April, 1976

        Gottfried W. R. Luderer   Defining a computer resource unit  . . . 5--10
                   K. Roehr and   
                      K. Niebel   Proposal for instruction time objectives 11--18
                John P. Collins   Performance improvement of the CP-V
                                  loader through use of the ADAM hardware
                                  monitor  . . . . . . . . . . . . . . . . 63--67
                   A. Brandwajn   Simulation of the load of an interactive
                                  system . . . . . . . . . . . . . . . . . 69--92

ACM SIGMETRICS Performance Evaluation Review
Volume 5, Number 3, Summer, 1976

           G. W. J. Coppens and   
     M. P. F. M. van Dongen and   
              J. P. C. Kleijnen   Quantile estimation in regenerative
                                  simulation: a case study . . . . . . . . 5--15
               Robert G. Estell   How fast is `real-time'? . . . . . . . . 16--18
                Philip M. Mills   A simple model for cost considerations
                                  in a batch multiprocessor environment    19--27

ACM SIGMETRICS Performance Evaluation Review
Volume 5, Number 4, Fall, 1976

             Irene Buchanan and   
                  David A. Duce   An interactive benchmark for a
                                  multi-user minicomputer system . . . . . 5--17
               Robert G. Estell   How fast is `real-time'? . . . . . . . . 18--20
                    Abbas Rafii   Study of the performance of RPS  . . . . 21--38
                Thomas G. Price   A comparison of queuing network models
                                  and measurements of a multiprogrammed
                                  computer system  . . . . . . . . . . . . 39--62
                    J. P. Buzen   Tuning: tools and techniques . . . . . . 63--81


ACM SIGMETRICS Performance Evaluation Review
Volume 6, Number 1, Winter, 1977

            Mitchell G. Spiegel   Workshop summary: `Applications of
                                  queuing models to ADP system performance
                                  prediction'  . . . . . . . . . . . . . . 13--33
                   L. Hellerman   A table of work formulae with
                                  derivations and applications . . . . . . 35--54
                R. C. Allen and   
                    S. R. Clark   A note on an empirical study of paging
                                  on an IBM 370/145  . . . . . . . . . . . 55--62

ACM SIGMETRICS Performance Evaluation Review
Volume 6, Number 2, Spring, 1977

             Robert L. Morrison   Abstracts from the 1977 SIGMETRICS/CMG
                                  VIII conference  . . . . . . . . . . . . 3--21

ACM SIGMETRICS Performance Evaluation Review
Volume 6, Number 3, Summer, 1977

              Constantine Lazos   Functional distribution of the workload
                                  of a linked computer system and its
                                  simulation . . . . . . . . . . . . . . . 5--14
                   A.-W. Scheer   Combination of an optimization model for
                                  hardware selection with data
                                  determination methods  . . . . . . . . . 15--26
               Terence Berinato   An analytical model of a teleprocessing
                                  system . . . . . . . . . . . . . . . . . 27--32
          Samuel T. Chanson and   
                Craig D. Bishop   A simulation study of adaptive
                                  scheduling policies in interactive
                                  computer systems . . . . . . . . . . . . 33--39

ACM SIGMETRICS Performance Evaluation Review
Volume 6, Number 4, Fall, 1977

                   Kurt Ziegler   A data sharing tutorial  . . . . . . . . 3--7
               Shirley E. Scott   Pricing D.P. products: a timesharing
                                  implementation . . . . . . . . . . . . . 8--12
                 Alain Sarzotti   Transactional terminal system on
                                  micro-processor: a method for
                                  identifying & modeling overall
                                  performance  . . . . . . . . . . . . . . 13--22
        Mieczyslaw Bazewicz and   
                 Adam Peterseil   Use of modelling in performance
                                  evaluation of computer systems: a case
                                  of installations in the Technical
                                  University of Wroclaw  . . . . . . . . . 22--26
                  R. A. Orchard   A new methodology for computer system
                                  data gathering . . . . . . . . . . . . . 27--41


ACM SIGMETRICS Performance Evaluation Review
Volume 7, Number 1--2, Spring-Summer, 1978

              Mark A. Underwood   Human performance evaluation in the use
                                  of federal computer systems:
                                  recommendations  . . . . . . . . . . . . 6--14
               Aridaman K. Jain   A guideline to statistical approaches in
                                  computer performance evaluation studies  18--32
                      Anonymous   Proceedings of the Software Quality and
                                  Assurance Workshop . . . . . . . . . . . 32--32
                Howard P. Honig   Data path analysis: analyzing large I/O
                                  environments . . . . . . . . . . . . . . 34--37
                C. H. Sauer and   
                  E. A. MacNair   Simultaneous resource possession in
                                  queueing models of computers . . . . . . 41--52

ACM SIGMETRICS Performance Evaluation Review
Volume 7, Number 3--4, November, 1978

                 Pamela R. Pfau   Applied quality assurance methodology    1--8
          Edward H. Bersoff and   
         Vilas D. Henderson and   
                 Stan G. Siegel   Software Configuration Management  . . . 9--17
                Robert L. Glass   Computing failure: a learning experience 18--19
            Donald A. Woodmancy   A Software Quality Improvement Program   20--26
               Marilyn S. Fujii   A comparison of software assurance
                                  methods  . . . . . . . . . . . . . . . . 27--32
             Alan N. Sukert and   
                  Amrit L. Goel   Error modelling applications in software
                                  quality assurance  . . . . . . . . . . . 33--38
               Joe W. Duran and   
             John J. Wiorkowski   Toward models for probabilistic program
                                  correctness  . . . . . . . . . . . . . . 39--44
                  B. H. Yin and   
               J. W. Winchester   The establishment and use of measures to
                                  evaluate the quality of software designs 45--52
               Robert A. Pierce   A Requirements Tracing Tool  . . . . . . 53--60
              Alan M. Davis and   
                Walter J. Rataj   Requirements language processing for the
                                  effective testing of real-time systems   61--66
                Lawrence Peters   Relating software requirements and
                                  design . . . . . . . . . . . . . . . . . 67--71
               Allan M. Stavely   Design feedback and its use in software
                                  design aid systems . . . . . . . . . . . 72--78
          Cornelia M. Yoder and   
              Marilyn L. Schrag   Nassi--Shneiderman charts an alternative
                                  to flowcharts for design . . . . . . . . 79--86
               J. P. Benson and   
                     S. H. Saib   A software quality assurance experiment  87--91
             Jonathan Bauer and   
               Susan Faasse and   
                Alan Finger and   
                William Goodhue   The automatic generation and execution
                                  of function test plans for electronic
                                  switching systems  . . . . . . . . . . . 92--100
                   K. A. Martin   Software acceptance testing that goes
                                  beyond the book  . . . . . . . . . . . . 101--105
        Frederick J. Drasch and   
               Richard A. Bowen   IDBUG: a tool for program development    106--110
                 M. E. Stickney   An application of graph theory to
                                  software test data selection . . . . . . 111--115
                Kurt F. Fischer   Software quality assurance tools: Recent
                                  experience and future requirements . . . 116--121
                Alan L. Glasser   The evolution of a Source Code Control
                                  System . . . . . . . . . . . . . . . . . 122--125
             William H. Josephs   A mini-computer based library control
                                  system . . . . . . . . . . . . . . . . . 126--132
           Joseph P. Cavano and   
                James A. McCall   A framework for the measurement of
                                  software quality . . . . . . . . . . . . 133--139
                   Gary W. Cobb   A measurement of structure for
                                  unstructured programming languages . . . 140--147
                  John B. Bowen   Are current approaches sufficient for
                                  measuring software quality?  . . . . . . 148--155
                  Joann Lockett   Using performance metrics in system
                                  design . . . . . . . . . . . . . . . . . 156--159
          Richard N. Southworth   Responding to MIL-S-52779  . . . . . . . 160--164
               Michael F. Tighe   The value of a proper software quality
                                  assurance methodology  . . . . . . . . . 165--172
        Peter Chase Belford and   
                  Carlo Broglio   A quantitative evaluation of the
                                  effectiveness of quality assurance as
                                  experienced on a large-scale software
                                  development effort . . . . . . . . . . . 173--180
                  Paul J. Kacik   An example of software quality assurance
                                  techniques used in a successful large
                                  scale software development . . . . . . . 181--186


ACM SIGMETRICS Performance Evaluation Review
Volume 8, Number 1--2, Spring-Summer, 1979

              Wolfgang Kreutzer   Computer system modelling and simulation 9--35
                 Rollins Turner   An investigation of several mathematical
                                  models of queueing systems . . . . . . . 36--44
               Charles H. Sauer   Confidence intervals for queueing
                                  simulations of computer systems  . . . . 45--55
            Jack P. C. Kleijnen   A note on computer system data gathering 56--56
                M. K. Rajaraman   Performance prediction of a virtual
                                  machine  . . . . . . . . . . . . . . . . 57--62
               Aridaman K. Jain   A guideline to statistical approaches in
                                  computer performance evaluation studies  63--77
                    E. Schwartz   Development of credible computer system
                                  simulation models  . . . . . . . . . . . 78--95
               Jon D. Clark and   
         Thomas J. Reynolds and   
             Michael J. Intille   Computer performance evaluation: an
                                  empirical approach . . . . . . . . . . . 97--101
                     Ron Willis   Techniques in simulation which enhance
                                  software reliability . . . . . . . . . . 102--115

ACM SIGMETRICS Performance Evaluation Review
Volume 8, Number 3, Fall, 1979

                     Russ Blake   Tailor: a simple model that works  . . . 1--11
            William D. Strecker   An analysis of central
                                  processor-input-output processor
                                  contention . . . . . . . . . . . . . . . 27--40
           Cheryl A. Wiecek and   
           Simon C. Steely, Jr.   Performance simulation as a tool in
                                  central processing unit design . . . . . 41--47
           David A. Bennett and   
        Christopher A. Landauer   Simulation of a distributed system for
                                  performance modelling  . . . . . . . . . 49--56
             Edward D. Lazowska   The benchmarking, tuning and analytic
                                  modeling of VAX/VMS  . . . . . . . . . . 57--64
        William T. Marshall and   
                 C. Thomas Nute   Analytic modelling of ``working set
                                  like'' replacement algorithms  . . . . . 65--72
          Fayé A. Briggs   Effects of buffered memory requests in
                                  multiprocessor systems . . . . . . . . . 73--81
                    Abbas Raffi   Effects of channel blocking on the
                                  performance of shared disk pack in a
                                  multi-computer system  . . . . . . . . . 83--87
                  John Zahorjan   An exact solution method for the general
                                  class of closed separable queueing
                                  networks . . . . . . . . . . . . . . . . 107--112
          Martin G. Kienzle and   
                   K. C. Sevcik   Survey of analytic queueing network
                                  models of computer systems . . . . . . . 113--129
            Steve P. Landry and   
               Bruce D. Shriver   A simulation environment for performing
                                  dataflow research  . . . . . . . . . . . 131--139
            David D. Langan and   
               Bruce D. Shriver   Simulated execution of dataflow programs
                                  on processors having finite resources    141--149
             Brian W. Unger and   
                James R. Parker   An operating system implementation and
                                  simulation language (OASIS)  . . . . . . 151--161
               John Sanguinetti   A technique for integrating simulation
                                  and system design  . . . . . . . . . . . 163--172
             Rami R. Razouk and   
                Mary Vernon and   
                  Gerald Estrin   Evaluation methods in SARA --- the graph
                                  model simulator  . . . . . . . . . . . . 189--206
                Stone H. Yu and   
                   Tadao Murata   Modeling and simulating data flow
                                  computations at machine language level   207--213
           R. M. Mattheyses and   
                    S. E. Conry   Models for specification and analysis of
                                  parallel computing systems . . . . . . . 215--224
                   Ilya Gertner   Performance evaluation of communicating
                                  processes  . . . . . . . . . . . . . . . 241--248
         Christopher R. Spooner   Benchmarking interactive systems:
                                  Producing the software . . . . . . . . . 249--257
             Jozo J. Dujmovi\'c   Criteria for computer performance
                                  analysis . . . . . . . . . . . . . . . . 259--267
              James O. Dyal and   
            William DeWald, Jr.   Small business system performance
                                  analysis . . . . . . . . . . . . . . . . 269--275
                 Robert W. Huff   System characterization of a Retail
                                  Business System  . . . . . . . . . . . . 277--284
                  Gary Stroebel   Field performance aids for IBM GSD
                                  systems  . . . . . . . . . . . . . . . . 285--291

ACM SIGMETRICS Performance Evaluation Review
Volume 8, Number 4, December, 1979

                   Jon D. Clark   A feature analysis of performance
                                  evaluation texts . . . . . . . . . . . . 9--11
              Lawrence W. Dowdy   Synopsis of workshop on the theory and
                                  application of analytical models to ADP
                                  system performance prediction  . . . . . 13--17
            Arthur Petrella and   
                  Harold Farrey   Simulating working sets under MVS  . . . 24--36
              Daniel L. Pierson   Performance evaluation of a
                                  minicomputer-based data collection
                                  system . . . . . . . . . . . . . . . . . 37--44
                   H. Pat Artis   Capacity planning for MVS computer
                                  systems  . . . . . . . . . . . . . . . . 45--62
                M. K. Rajaraman   Performance of a virtual memory: some
                                  experimental results . . . . . . . . . . 63--68


ACM SIGMETRICS Performance Evaluation Review
Volume 9, Number 1, Spring, 1980

               Peter J. Denning   What's a working set?  . . . . . . . . . 6--10
            Arthur Petrella and   
                  Harold Farrey   Simulating working sets under MVS  . . . 11--23
            Mitchell G. Spiegel   Measuring and evaluating performance . . 33--34
                    P. J. Dixon   Planning MIS investment and expense
                                  levels . . . . . . . . . . . . . . . . . 35--37
                Thomas S. Moran   Capacity planning: `the volume'  . . . . 38--40
                    Tom DeMarco   Breaking the language barrier  . . . . . 41--45
                Howard L. Giles   Communications systems management  . . . 46--51
            Robert F. Erlandson   System evaluation methodologies:
                                  combined multidimensional scaling and
                                  ordering techniques  . . . . . . . . . . 52--58
           Sammy W. Pearson and   
                James E. Bailey   Measurement of computer user
                                  satisfaction . . . . . . . . . . . . . . 59--68

ACM SIGMETRICS Performance Evaluation Review
Volume 9, Number 2, Summer, 1980

             K. Mani Chandy and   
               Charles H. Sauer   Computational algorithms for product
                                  form queueing networks . . . . . . . . . 1--1
            Karen D. Gordon and   
              Lawrence W. Dowdy   The impact of certain parameter
                                  estimation errors in queueing network
                                  models . . . . . . . . . . . . . . . . . 3--9
                     Russ Blake   XRAY: Instrumentation for multiple
                                  computers  . . . . . . . . . . . . . . . 11--25
                James H. Hughes   DIAMOND a digital analyzer and
                                  monitoring device  . . . . . . . . . . . 27--34
            Douglas L. Bashioum   Benchmarking interactive systems:
                                  Calibrating the model  . . . . . . . . . 35--41
                   Axel Lehmann   Performance evaluation and prediction of
                                  storage hierarchies  . . . . . . . . . . 43--54
             Timo O. Alanko and   
           Ilkka J. Haikala and   
              Petri H. Kutvonen   Methodology and empirical results of
                                  program behaviour measurements . . . . . 55--66
                 Gopa Kumar and   
                 C. Thomas Nute   Program restructuring for block
                                  structured languages . . . . . . . . . . 67--79
     Hendrik T. Vantilborgh and   
          Richard L. Garner and   
             Edward D. Lazowska   Near-complete decomposability of
                                  queueing networks with clusters of
                                  strongly interacting servers . . . . . . 81--92
            Alexandre Brandwajn   Further results on equivalence and
                                  decomposition in queueing network models 93--104
         William J. Stewart and   
             Gerald A. Zeiszler   On the existence of composite flow
                                  equivalent Markovian servers . . . . . . 105--116
                  Raymond Marie   Calculating equilibrium probabilities
                                  for $ \lambda (n) / C_k / 1 / N $ queues 117--125
           Robert A. Wagner and   
              Kishor S. Trivedi   Hardware configuration selection through
                                  discretizing a continuous variable
                                  solution . . . . . . . . . . . . . . . . 127--142
                  Yonathan Bard   A model of shared DASD and multipathing  143--143
                       T. L. Lo   Computer capacity planning using
                                  queueing network models  . . . . . . . . 145--152
                A. Kurinckx and   
                     G. Pujolle   Overallocation in a virtual circuit
                                  computer network . . . . . . . . . . . . 153--158
           Richard A. Upton and   
             Satish K. Tripathi   Analysis of design alternatives for a
                                  packet switched I/O system . . . . . . . 159--171
        Edward E. Balkovich and   
          Colin Whitby-Strevens   On the performance of decentralized
                                  software . . . . . . . . . . . . . . . . 173--180
               Dale H. Grit and   
                    Rex L. Page   Performance of a multiprocessor for
                                  applicative programs . . . . . . . . . . 181--189
                  C. Retna Dhas   Performance evaluation of a feedback
                                  data flow processor using simulation . . 191--197
              Raymond M. Bryant   On homogeneity in M/G/1 queueing systems 199--208
         E. G. Coffman, Jr. and   
               Erol Gelenbe and   
                  Roger C. Wood   Optimal replication of parallel-read,
                                  sequential-write systems . . . . . . . . 209--216
                  John E. Shore   The lazy repairman and other models:
                                  Performance collapse due to overhead in
                                  simple, single-server queuing systems    217--224
               Simon S. Lam and   
               A. Udaya Shankar   Response time distributions for a
                                  multi-class queue with feedback  . . . . 225--234
                     Y. T. Wang   Analysis of an intrinsic overload
                                  control for a class of queueing systems  235--243
               Connie Smith and   
                   J. C. Browne   Aspects of software design analysis:
                                  Concurrency and blocking . . . . . . . . 245--253
                  D. Potier and   
                    Ph. Leblanc   Analysis of locking policies in database
                                  management systems . . . . . . . . . . . 255--255
         E. G. Coffman, Jr. and   
                 E. Gelenbe and   
                     B. Plateau   Optimization of the number of copies in
                                  a distribution data base . . . . . . . . 257--263
             Manfred Ruschitzka   The response of job classes with
                                  distinct policy functions (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 265--265
                  K. H. Kim and   
            Mahmoud Naghibzadeh   Prevention of task overruns in real-time
                                  non-preemptive multiprogramming systems  267--276
              P. J. B. King and   
                     I. Mitrani   Numerical methods for infinite Markov
                                  processes  . . . . . . . . . . . . . . . 277--282
                 G. Fayolle and   
              P. J. B. King and   
                     I. Mitrani   The solution of certain two-dimensional
                                  Markov models  . . . . . . . . . . . . . 283--289

ACM SIGMETRICS Performance Evaluation Review
Volume 9, Number 3, Fall, 1980

               Jon D. Clark and   
             Robert M. Golladay   Empirical investigation of the
                                  effectiveness of several computer
                                  performance evaluation tools . . . . . . 31--36
               Robert G. Estell   Benchmarks and watermarks  . . . . . . . 39--44
              J. P. C. Kleijnen   Scoring methods, multiple criteria, and
                                  utility analysis . . . . . . . . . . . . 45--56

ACM SIGMETRICS Performance Evaluation Review
Volume 9, Number 4, Winter, 1980

               Peter J. Denning   A tale of two islands: a fable . . . . . 7--10
                  Mark J. Yader   ADP capacity planning: a case study  . . 11--25
             J. Marrevée   How friendly and fast is FAST DUMP
                                  RESTORE  . . . . . . . . . . . . . . . . 28--35
                  J. C. Bernard   T-scan: the use of micro computers for
                                  response time measurements . . . . . . . 39--50


ACM SIGMETRICS Performance Evaluation Review
Volume 10, Number 1, Spring, 1981

                 Thomas E. Bell   Structured life-cycle assumptions  . . . 1--3
             Donald T. Coughlin   System development methodology or system
                                  research methodology?  . . . . . . . . . 5--6
                Dennis M. Earle   An alchemical approach to brokerage  . . 7--8
            Mitchell G. Spiegel   Prototyping: an approach to information
                                  and communication system design  . . . . 9--19
              C. Wesley Jenkins   Application prototyping: a case study    21--27
                Patricia R. Cox   Specification of a regression test for a
                                  mini computer operating system . . . . . 29--32
              William Bryan and   
             Stanley Siegel and   
              Gary Whiteleather   An approach to software configuration
                                  control  . . . . . . . . . . . . . . . . 33--47
                 C. R. Fredrick   Project implementation of Software
                                  Configuration Management . . . . . . . . 49--56
              H. Ronald Berlack   Implementing software configuration
                                  control in the structured programming
                                  environment  . . . . . . . . . . . . . . 57--77
                    Peter Gross   Producers and consumers views of
                                  software quality (Panel Session) . . . . 79--79
               Sallie Henry and   
              Dennis Kafura and   
                   Kathy Harris   On the relationships among three
                                  software metrics . . . . . . . . . . . . 81--88
          Paul A. Szulewski and   
          Mark H. Whitworth and   
              Philip Buchan and   
               J. Barton DeWolf   The measurement of software science
                                  parameters in software designs . . . . . 89--94
           Victor R. Basili and   
              Tsai-Yun Phillips   Evaluating and comparing software
                                  metrics in the software engineering
                                  laboratory . . . . . . . . . . . . . . . 95--106
                  James Ronback   Test metrics for software quality  . . . 107--107
                   J. P. Benson   Adaptive search techniques applied to
                                  software testing . . . . . . . . . . . . 109--116
                  Michael Paige   Data space testing . . . . . . . . . . . 117--127
                  Amrit L. Goel   Optimal testing policies for software
                                  systems  . . . . . . . . . . . . . . . . 129--130
                  B. Littlewood   A Bayesian differential debugging model
                                  for software reliability . . . . . . . . 129--130
                 J. D. Musa and   
                     A. Iannino   Software reliability modeling accounting
                                  for program size variation due to
                                  integration or design changes  . . . . . 129--130
                   John D. Musa   Software reliability measurement session 129--130
              Amrit L. Goel and   
               Kazuhira Okumoto   When to stop testing and start using
                                  software?  . . . . . . . . . . . . . . . 131--138
                  B. Littlewood   Stochastic reliability growth: a model
                                  with applications to computer software
                                  faults and hardware design faults  . . . 139--152
            Linda M. Ottenstein   Software defects --- a software science
                                  perspective  . . . . . . . . . . . . . . 153--155
               Linda Ottenstein   Predicting numbers of errors using
                                  software science . . . . . . . . . . . . 157--167
               Victor Schneider   Some experimental estimators for
                                  developmental and delivered errors in
                                  software development projects  . . . . . 169--172
                       H. Sneed   SOFTDOC --- A system for automated
                                  software static analysis and
                                  documentation  . . . . . . . . . . . . . 173--177
                John D. Crowley   The application development process:
                                  What's wrong with it?  . . . . . . . . . 179--187
               C. T. Bailey and   
                   W. L. Dingee   A software study using Halstead metrics  189--197

ACM SIGMETRICS Performance Evaluation Review
Volume 10, Number 2, Summer, 1981

                A. Esposito and   
                  A. Mazzeo and   
                       P. Costa   Workload characterization for trend
                                  analysis . . . . . . . . . . . . . . . . 5--15
                 J. D. Musa and   
                     A. Iannino   Software reliability modeling:
                                  accounting for program size variation
                                  due to integration or design changes . . 16--25
                J. R. Comer and   
             J. R. Rinewalt and   
                    M. M. Tanik   A comparison of two different program
                                  complexity measures  . . . . . . . . . . 26--28
         Marshall D. Abrams and   
              Dorothy C. Neiman   NBS network measurement methodology
                                  applied to synchronous communications    29--36
               R. L. Larsen and   
                 J. R. Agre and   
                 A. K. Agrawala   A comparative evaluation of local area
                                  communication technology . . . . . . . . 37--47
               Herman D. Hughes   A highly parameterized tool for studying
                                  performance of computer systems  . . . . 48--65
            Mitchell G. Spiegel   RTE's: past is prologue  . . . . . . . . 66--73

ACM SIGMETRICS Performance Evaluation Review
Volume 10, Number 3, Fall, 1981

                   J. C. Browne   Designing systems for performance  . . . 1--1
               David Reiner and   
                  Tad Pinkerton   A method for adaptive performance
                                  improvement of operating systems . . . . 2--10
                     Y. T. Wang   On the VAX/VMS time-critical process
                                  scheduling . . . . . . . . . . . . . . . 11--18
            Lars Söderlund   Evaluation of concurrent physical
                                  database reorganization through
                                  simulation modeling  . . . . . . . . . . 19--32
         Edward D. Lazowska and   
                  John Zahorjan   Analytic modelling of disk I/O
                                  subsystems: a tutorial . . . . . . . . . 33--35
          Lawrence W. Dowdy and   
          Hans J. Breitenlohner   A model of Univac 1100/42 swapping . . . 36--47
             Rollins Turner and   
                     Henry Levy   Segmented FIFO page replacement  . . . . 48--51
               Domenico Ferrari   A generative model of working set
                                  dynamics . . . . . . . . . . . . . . . . 52--57
                J. Zahorjan and   
               K. C. Sevcik and   
                D. L. Eager and   
                   B. I. Galler   Balanced job bound analysis of queueing
                                  networks . . . . . . . . . . . . . . . . 58--58
                   D. Neuse and   
                      K. Chandy   SCAT: a heuristic algorithm for queueing
                                  network models of computing systems  . . 59--79
              John Zahorjan and   
                    Eugene Wong   The solution of separable queueing
                                  network models using mean value analysis 80--85
        Alexander Thomasian and   
                   Behzad Nadji   Aggregation of stations in queueing
                                  network models of multiprogrammed
                                  computers  . . . . . . . . . . . . . . . 86--104
                 Herb Schwetman   Computer system models: an introduction  105--105
               Peter J. Denning   Performance evaluation: Experimental
                                  computer science at its best . . . . . . 106--109
                    Abbas Rafii   Structure and application of a
                                  measurement tool --- SAMPLER/3000  . . . 110--120
                Stephen Tolopka   An event trace monitor for the VAX
                                  11/780 . . . . . . . . . . . . . . . . . 121--128
                   H. Pat Artis   A log file design for analyzing
                                  secondary storage occupancy  . . . . . . 129--135
               John Sanguinetti   The effects of solid state paging
                                  devices in a large time-sharing system   136--153
            Richard T. Wang and   
                   J. C. Browne   Virtual machine-based simulation of
                                  distributed computing and network
                                  computing  . . . . . . . . . . . . . . . 154--156
                Ragnar Huslende   A combined evaluation of performance and
                                  reliability for degradable systems . . . 157--164
       Patricia A. Jacobson and   
             Edward D. Lazowska   The method of surrogate delays:
                                  Simultaneous resource possession in
                                  analytic models of computer systems  . . 165--174
              Patricia Jacobson   Approximate analytic models of arbiters  175--180
      Fayé A. Briggs and   
                  Michel Dubois   Performance of cache-based
                                  multiprocessors  . . . . . . . . . . . . 181--190
               R. M. Bryant and   
                     J. R. Agre   A queueing network approach to the
                                  module allocation problem in distributed
                                  systems  . . . . . . . . . . . . . . . . 191--204
             Madhav Marathe and   
                    Sujit Kumar   Analytical models for an Ethernet-like
                                  local area network link  . . . . . . . . 205--215

ACM SIGMETRICS Performance Evaluation Review
Volume 10, Number 4, December, 1981

             Michael A. Pechura   Page life measurements . . . . . . . . . 10--12
                   Jon D. Clark   An update on economies-of-scale in
                                  computing systems  . . . . . . . . . . . 13--14
               Edward R. Janusz   Getting the most out of a small computer 22--35
                   Springer Cox   Data, definition, deduction: an
                                  empirical view of operational analysis   36--44
          Hiroshi Muramatsu and   
              Masahiro Date and   
                  Takanori Maki   Structural validation in queueing
                                  network models of computer systems . . . 41--46
               Charles H. Sauer   Numerical solution of some multiple
                                  chain queueing networks  . . . . . . . . 47--56
               Thomas A. Nemeth   An approach to interactive performance
                                  analysis in a busy production system
                                  (NOS/BE) . . . . . . . . . . . . . . . . 57--73
             Michael E. Knudson   A computer performance evaluation
                                  operational methodology  . . . . . . . . 74--80


ACM SIGMETRICS Performance Evaluation Review
Volume 11, Number 1, Spring, 1981

              P. V. Afshari and   
               S. C. Bruell and   
                     R. Y. Kain   Modeling a new technique for accessing
                                  shared buses . . . . . . . . . . . . . . 4--13
                 Aurel A. Lazar   Optimal control of a M/M/m queue . . . . 14--20
               Jeffrey R. Spirn   Network modeling with bursty traffic and
                                  finite buffer space  . . . . . . . . . . 21--28
               Simon S. Lam and   
                   Y. Luke Lien   Optimal routing in networks with
                                  flow-controlled virtual channels . . . . 38--46
                Miron Livny and   
                   Myron Melman   Load balancing in homogeneous broadcast
                                  distributed systems  . . . . . . . . . . 47--55
              Stuart Wecker and   
              Robert Gordon and   
                 James Gray and   
               James Herman and   
                Raj Kanodia and   
                   Dan Seligman   Performance of globally distributed
                                  networks . . . . . . . . . . . . . . . . 58--58
                   R. L. Gordon   Operational measurements on a high
                                  performance ring . . . . . . . . . . . . 59--59
                  James P. Gray   Performance of SNA's LU-LU session
                                  protocols  . . . . . . . . . . . . . . . 60--61
                James G. Herman   ARPANET performance tuning techniques    62--62
                 Avner Aleh and   
                   K. Dan Levin   The determination of upper bounds for
                                  economically effective compression in
                                  packet switching networks  . . . . . . . 64--72
            Patrick V. McGregor   Concentrator modeling with pipelining
                                  arrivals compensation  . . . . . . . . . 73--94
                  Alan Mink and   
          Charles B. Silio, Jr.   Modular expansion in a class of
                                  homogeneous networks . . . . . . . . . . 95--100
           Ashok K. Thareja and   
         Satish K. Tripathi and   
               Richard A. Upton   On updating buffer allocation  . . . . . 101--110
           M. Y. Elsanadidi and   
                  Wesley W. Chu   An analysis of a time window multiaccess
                                  protocol with collision size feedback
                                  (WCSF) . . . . . . . . . . . . . . . . . 112--118
              Kuno M. Roehr and   
                Horst Sadlowski   Performance analysis of local
                                  communication loops  . . . . . . . . . . 119--129
              R. H. Sherman and   
                M. G. Gable and   
                    A. W. Chung   Distributed virtual hosts and networks:
                                  Measurement and control  . . . . . . . . 130--136
              Richard Brice and   
              William Alexander   A network performance analyst's
                                  workbench  . . . . . . . . . . . . . . . 138--146
               Donald F. DuBois   A Hierarchical Modeling System for
                                  computer networks  . . . . . . . . . . . 147--155
                     K. Terplan   Network performance reporting  . . . . . 156--170
            Mitchell G. Spiegel   Questions for Local Area Network
                                  panelists  . . . . . . . . . . . . . . . 172--172
              Kuno M. Roehr and   
                Horst Sadlowski   Performance analysis of local
                                  communication loops  . . . . . . . . . . 173--173
            Barbara R. Sternick   Systems aids in determining Local Area
                                  Network performance characteristics  . . 174--174
                      Anonymous   Authors Index  . . . . . . . . . . . . . 175--175

ACM SIGMETRICS Performance Evaluation Review
Volume 11, Number 2, Summer, 1982

                M. K. Rajaraman   Performance evaluation through job
                                  scheduler modeling . . . . . . . . . . . 9--15
                 Peter S. Mager   Toward a parametric approach for
                                  modeling local area network performance  17--28
           John E. Gaffney, Jr.   Score `82 --- a summary (at IBM Systems
                                  Research Institute, 3/23-3/24/82)  . . . 30--32
         Linda D. Misek-Falkoff   The new field of ``Software
                                  Linguistics'': an early-bird view  . . . 35--51
            Mitchell G. Spiegel   Software counting rules: Will history
                                  repeat itself? . . . . . . . . . . . . . 52--56
            Krishna M. Kavi and   
                  U. B. Jackson   Effect of declarations on software
                                  metrics: an experiment in software
                                  science  . . . . . . . . . . . . . . . . 57--71
           John E. Gaffney, Jr.   Machine Instruction Count Program  . . . 72--79
         Linda D. Misek-Falkoff   A unification of Halstead's Software
                                  Science counting rules for programs and
                                  English text, and a claim space approach
                                  to extensions  . . . . . . . . . . . . . 80--114
                George E. Estes   Distinguishing the potential operands in
                                  FORTRAN programs . . . . . . . . . . . . 115--117
                S. D. Conte and   
                 V. Y. Shen and   
                      K. Dickey   On the effect of different counting
                                  rules for control flow operators on
                                  Software Science metrics in Fortran  . . 118--126

ACM SIGMETRICS Performance Evaluation Review
Volume 11, Number 3, Fall, 1982

         J. G. Shanthikumar and   
             P. K. Varshney and   
                      K. Sriram   A priority cutoff flow control scheme
                                  for integrated voice-data multiplexers   8--14
                   Springer Cox   Data, definition, deduction: an
                                  empirical view of operational analysis   15--20
                   H. G. Perros   The queue-length distribution of the
                                  M/Ck/1 queue . . . . . . . . . . . . . . 21--24
             Gordon E. Anderson   Bernoulli methods for predicting
                                  communication processor performance  . . 25--29
               Timo Laurmaa and   
           Markku Syrjänen   APL and Halstead's theory: a measuring
                                  tool and some experiments  . . . . . . . 32--47
                 Nicholas Beser   Foundations and experiments in software
                                  science  . . . . . . . . . . . . . . . . 48--72
            Karl Ernst Schnurer   Product Assurance Program Analyzer
                                  (P.A.P.A.) a tool for program complexity
                                  evaluation . . . . . . . . . . . . . . . 73--74
             David R. Gross and   
               Mary A. King and   
            Michael R. Murr and   
                Michael R. Eddy   Complexity measurement of Electronic
                                  Switching System (ESS) software  . . . . 75--85
              Sandra D. Hartman   A counting tool for RPG  . . . . . . . . 86--100
                  Farid A. Naib   An application of software science to
                                  the quantitative measurement of code
                                  quality  . . . . . . . . . . . . . . . . 101--128

ACM SIGMETRICS Performance Evaluation Review
Volume 11, Number 4, December, 1982

                     Russ Blake   Optimal control of thrashing . . . . . . 1--10
          Özalp Babao\uglu   Hierarchical replacement decisions in
                                  hierarchical stores  . . . . . . . . . . 11--19
          Robert B. Hagmann and   
                Robert S. Fabry   Program page reference patterns  . . . . 20--29
                 R. B. Bunt and   
               R. S. Harbus and   
                    S. J. Plumb   The effective management of paging
                                  storage hierarchies  . . . . . . . . . . 30--38
            Larry F. Hodges and   
             William J. Stewart   Workload characterization and
                                  performance evaluation in a research
                                  environment  . . . . . . . . . . . . . . 39--50
             Günter Haring   On state-dependent workload
                                  characterization by software resources   51--57
              M. L. Bolzoni and   
           M. C. Calzarossa and   
                 P. Mapelli and   
                     G. Serazzi   A package for the implementation of
                                  static workload models . . . . . . . . . 58--67
                  Gene McDaniel   The Mesa Spy: an interactive tool for
                                  performance debugging  . . . . . . . . . 68--76
               Uwe Hercksen and   
                Rainer Klar and   
    Wolfgang Kleinöder and   
             Franz Kneißl   Measuring simultaneous events in a
                                  multiprocessor system  . . . . . . . . . 77--88
                   Erol Gelenbe   Stationary deterministic flows in
                                  discrete systems: I  . . . . . . . . . . 89--101
                F. Baccelli and   
                  E. G. Coffman   A data base replication analysis using
                                  an M/M/m queue with service
                                  interruptions  . . . . . . . . . . . . . 102--107
           Brigitte Plateau and   
          Andreas Staphylopatis   Modelling of the parallel resolution of
                                  a numerical problem on a locally
                                  distributed computing system . . . . . . 108--117
                  Yonathan Bard   Modeling I/O systems with dynamic path
                                  selection, and general transmission
                                  networks . . . . . . . . . . . . . . . . 118--129
         Edward D. Lazowska and   
                  John Zahorjan   Multiple class memory constrained
                                  queueing networks  . . . . . . . . . . . 130--140
            Alexandre Brandwajn   Fast approximate solution of
                                  multiprogramming models  . . . . . . . . 141--149
         Subhash C. Agrawal and   
               Jeffrey P. Buzen   The aggregate server method for
                                  analyzing serialization delays in
                                  computer systems . . . . . . . . . . . . 150--150
            Connie U. Smith and   
              David D. Loendorf   Performance analysis of software for an
                                  MIMD computer  . . . . . . . . . . . . . 151--162
                Jon R. Agre and   
             Satish K. Tripathi   Modeling reentrant and nonreentrant
                                  software . . . . . . . . . . . . . . . . 163--178
                       L. T. Wu   Operational models for the evaluation of
                                  degradable computing systems . . . . . . 179--185
           Raymond A. Marie and   
         Patricia M. Snyder and   
             William J. Stewart   Extensions and computational aspects of
                                  an iterative method  . . . . . . . . . . 186--194
                 Doug Neuse and   
                 K. Mani Chandy   HAM: the heuristic aggregation method
                                  for solving general closed queueing
                                  network models of computer systems . . . 195--212
                D. L. Eager and   
                   K. C. Sevcik   Performance bound hierarchies for
                                  queueing networks  . . . . . . . . . . . 213--214
       Jeffrey A. Brumfield and   
               Peter J. Denning   Error analysis of homogeneous mean queue
                                  and response time estimators . . . . . . 215--221
             Alan Harbitter and   
             Satish K. Tripathi   A model of transport level flow control  222--232
               Erol Gelenbe and   
                    Isi Mitrani   Control policies in CSMA local area
                                  networks: Ethernet controls  . . . . . . 233--240
         Satish K. Tripathi and   
                 Alan Harbitter   An analysis of two flow control
                                  techniques . . . . . . . . . . . . . . . 241--249
              P. J. B. King and   
                     I. Mitrani   Modelling the Cambridge Ring . . . . . . 250--258


ACM SIGMETRICS Performance Evaluation Review
Volume 12, Number 1, December, 1982/1983

                    J. Marrevee   The power of the read track and the need
                                  for a write track command for disk
                                  back-up and restore utilities  . . . . . 10--14
                   H. G. Perros   A model for predicting the response time
                                  of an on-line system for electronic fund
                                  transfer . . . . . . . . . . . . . . . . 15--21
          Reinhard Augustin and   
 Klaus-Jürgen Büscher   Characteristics of the COX-distribution  22--32

ACM SIGMETRICS Performance Evaluation Review
Volume 12, Number 2, Spring-Summer, 1984

                   H. G. Perros   Queueing networks with blocking: a
                                  bibliography . . . . . . . . . . . . . . 8--12
                    Tom DeMarco   An algorithm for sizing software
                                  products . . . . . . . . . . . . . . . . 13--22
           Paul A. Fishwick and   
                  Stefan Feyock   PROFGEN: a procedure for generating
                                  machine independent high-level language
                                  profilers  . . . . . . . . . . . . . . . 27--31
                M. K. Rajaraman   Performance measures for a local network 34--37
                  Greg A. Jones   Performance evaluation of a job
                                  scheduler  . . . . . . . . . . . . . . . 38--43
               Jon D. Clark and   
             Thomas C. Richards   A note on the cost-performance ratios of
                                  IBM's 43XX series  . . . . . . . . . . . 44--45

ACM SIGMETRICS Performance Evaluation Review
Volume 12, Number 3, August, 1984

             E. G. Coffman, Jr.   Recent progress in the performance
                                  evaluation of fundamental allocation
                                  algorithms . . . . . . . . . . . . . . . 2--6
               Domenico Ferrari   On the foundations of artificial
                                  workload design  . . . . . . . . . . . . 8--14
 Alfredo de J. Perez-Davila and   
              Lawrence W. Dowdy   Parameter interdependencies of file
                                  placement models in a Unix system  . . . 15--26
            Richard B. Bunt and   
         Jennifer M. Murphy and   
            Shikharesh Majumdar   A measure of program locality and its
                                  application  . . . . . . . . . . . . . . 28--40
              A. Krzesinski and   
                    J. Greyling   Improved lineariser methods for queueing
                                  networks with queue dependent centres    41--51
              John Zahorjan and   
             Edward D. Lazowska   Incorporating load dependent servers in
                                  approximate mean value analysis  . . . . 52--62
         Subhash C. Agrawal and   
           Jeffrey P. Buzen and   
                  Annie W. Shum   Response Time Preservation: a general
                                  technique for developing approximate
                                  algorithms for queueing networks . . . . 63--77
                  Ph. Mussi and   
                       Ph. Nain   Evaluation of parallel execution of
                                  program tree structures  . . . . . . . . 78--87
               John Sanguinetti   Program optimization for a pipelined
                                  machine a case study . . . . . . . . . . 88--95
             Rollins Turner and   
        Jeffrey Schriesheim and   
                 Indrajit Mitra   Performance of a DECnet based disk block
                                  server . . . . . . . . . . . . . . . . . 96--104
                 Bengt Stavenow   Throughput-delay characteristics and
                                  stability considerations of the access
                                  channel in a mobile telephone system . . 105--112
             Elizabeth Williams   Processor queueing disciplines in
                                  distributed systems  . . . . . . . . . . 113--119
        Lindsey E. Stephens and   
              Lawrence W. Dowdy   Convolutional bound hierarchies  . . . . 120--133
                 Rajan Suri and   
               Gregory W. Diehl   A new `building block' for performance
                                  evaluation of queueing networks with
                                  finite buffers . . . . . . . . . . . . . 134--142
           Stephen S. Lavenberg   A simple analysis of exclusive and
                                  shared lock contention in a database
                                  system . . . . . . . . . . . . . . . . . 143--148
               S. T. Becker and   
                 K. M. Rege and   
                    B. Sengupta   A modeling methodology for sizing a
                                  computer based system in a netted
                                  environment  . . . . . . . . . . . . . . 149--157
          Darwyn R. Peachey and   
            Richard B. Bunt and   
        Carey L. Williamson and   
                  Tim B. Brecht   An experimental investigation of
                                  scheduling strategies for UNIX . . . . . 158--166
   Daniel A. Menascé and   
       Leonardo Lellis P. Leite   Performance evaluation of isolated and
                                  interconnected token bus local area
                                  networks . . . . . . . . . . . . . . . . 167--175
         Subhash C. Agrawal and   
           Jeffrey P. Buzen and   
               Ashok K. Thareja   A Unified Approach to Scan Time Analysis
                                  of Token Rings and Polling Networks  . . 176--185
        Alexandre Brandwajn and   
           William M. McCormack   Efficient approximation for models of
                                  multiprogramming with shared domains . . 186--194
      André B. Bondi and   
               Jeffrey P. Buzen   The response times of priority classes
                                  under preemptive resume in M/G/m queues  195--201
        Alexander Thomasian and   
                       Paul Bay   Analysis of Queueing Network Models with
                                  population size constraints and delayed
                                  blocked customers  . . . . . . . . . . . 202--216

ACM SIGMETRICS Performance Evaluation Review
Volume 12, Number 4, 1984/1985

                John E. Gaffney   Instruction entropy, a possible measure
                                  of program/architecture compatibility    13--18
               Charles H. Sauer   Numerical solution of some multiple
                                  chain queueing networks  . . . . . . . . 19--28
        Alexander Thomasian and   
              Kameshwar Gargeya   Speeding up computer system simulations
                                  using hierarchical modeling  . . . . . . 34--39
               James L. Elshoff   The PEEK measurement program . . . . . . 40--53
                Anna Hác   A survey of techniques for the modeling
                                  of serialization delays in computer
                                  systems  . . . . . . . . . . . . . . . . 54--56


ACM SIGMETRICS Performance Evaluation Review
Volume 13, Number 1, June, 1985

                 Ali Mosleh and   
          E. Richard Hilton and   
                Peter S. Browne   Bayesian probabilistic risk analysis . . 5--12
              Huisheng Gong and   
                 Monika Schmidt   A complexity measure based on selection
                                  and nesting  . . . . . . . . . . . . . . 14--19
             Michael E. Knudson   A performance measurement and system
                                  evaluation project plan proposal . . . . 20--31
                  Lem O. Ejiogu   A simple measure of software complexity  33--47

ACM SIGMETRICS Performance Evaluation Review
Volume 13, Number 2, August, 1985

             Derek L. Eager and   
         Edward D. Lazowska and   
                  John Zahorjan   A comparison of receiver-initiated and
                                  sender-initiated adaptive load sharing
                                  (extended abstract)  . . . . . . . . . . 1--3
            David Gelernter and   
                Sunil Podar and   
                Hussein G. Badr   An adaptive communications protocol for
                                  network computers (extended abstract)    4--5
               Erol Gelenbe and   
               David Finkel and   
             Satish K. Tripathi   On the availability of a distributed
                                  computer system with failing components  6--13
               A. E. Conway and   
                N. D. Georganas   RECAL --- a new efficient algorithm for
                                  the exact analysis of multiple-chain
                                  closed queueing networks (abstract)  . . 14--14
                   G. Balbo and   
               S. C. Bruell and   
                      S. Ghanta   Modeling priority schemes  . . . . . . . 15--26
               Robbe J. Walstra   Nonexponential networks of queues: a
                                  maximum entropy analysis . . . . . . . . 27--37
           Maria Calzarossa and   
               Domenico Ferrari   A sensitivity study of the clustering
                                  approach to workload modeling (extended
                                  abstract)  . . . . . . . . . . . . . . . 38--39
             S. V. Raghavan and   
             R. Kalyanakrishnan   On the classification of interactive
                                  user behaviour indices . . . . . . . . . 40--48
              A. Inkeri Verkamo   Empirical results on locality in
                                  database referencing . . . . . . . . . . 49--58
          Halin M. Khelalfa and   
    Anneliese K. von Mayrhauser   Degradable computer systems with
                                  dependent subsystems . . . . . . . . . . 59--68
             Ram Chillarege and   
            Ravishankar K. Lyer   The effect of system workload on error
                                  latency: an experimental study . . . . . 69--77
           Timothy A. Gonsalves   Performance characteristics of two
                                  Ethernets: an experimental study . . . . 78--86
                I. Chlamtac and   
                    M. Eisinger   Performance of integrated services
                                  (voice/data) CSMA/CD networks  . . . . . 87--93
                I. Chlamtac and   
                    M. Eisinger   An analytic model of the hyperchannel
                                  network using multiple channel
                                  architecture . . . . . . . . . . . . . . 94--104
           Sandra Bleistein and   
               Shin-Sun Cho and   
              Robert T. Goettge   Analytic performance model of the U.S.
                                  en route air traffic control computer
                                  systems  . . . . . . . . . . . . . . . . 105--115
          Lawrence W. Dowdy and   
            Manvinder S. Chopra   On the applicability of using
                                  multiprogramming level distributions . . 116--127
           A. E. Krzesinski and   
                   P. Teunissen   Multiclass queueing networks with
                                  population constrainted subnetworks  . . 128--139
         Alexandre Branwajn and   
               Yung-Li Lily Jow   A note on service interruptions  . . . . 140--148
               Brigitte Plateau   On the stochastic structure of
                                  parallelism and synchronization models
                                  for distributed algorithms . . . . . . . 147--154
         Patricia M. Snyder and   
             William J. Stewart   An approximate numerical solution for
                                  multiclass preemptive priority queues
                                  with general service time distributions  155--165
                 Alan R. Hevner   Evaluation of optical disk systems for
                                  very large database applications . . . . 166--172
          Gilbert E. Houtekamer   The local disk controller  . . . . . . . 173--182
               Philip S. Yu and   
             Daniel M. Dias and   
           John T. Robinson and   
        Balakrishna R. Iyer and   
                Douglas Cornell   Modelling of centralized concurrency
                                  control in a multi-system environment    183--191
        Alexander Thomasian and   
                   In Kyung Ryu   Analysis of some optimistic concurrency
                                  control schemes based on certification   192--203

ACM SIGMETRICS Performance Evaluation Review
Volume 13, Number 3--4, November, 1985

                   In Kyung Ryu   Review of 'OS 1100-of performance
                                  algorithms: a guide to the resource
                                  allocation algorithms of OS-1100' by
                                  John C. Kelly  . . . . . . . . . . . . . 9--9
               H. G. Perros and   
                 D. Mirchandani   An analytic model of a file server for
                                  bulk file transfers  . . . . . . . . . . 14--22
               Bernard Domanski   Building IMS synthetic workloads . . . . 23--28


ACM SIGMETRICS Performance Evaluation Review
Volume 14, Number 1, May, 1986

               Jeffrey P. Buzen   Modeling I/O subsystems (tutorial) . . . 1--1
               Domenico Ferrari   Workload characterization (tutorial):
                                  issues and approaches  . . . . . . . . . 1--1
                  Amrit L. Goel   Software reliability modeling (tutorial) 2--2
                    Kye Hedlund   Performance modeling in integrated
                                  curcuit design (tutorial)  . . . . . . . 2--2
                   H. Pat Artis   Expert systems for performance analysis
                                  (tutorial) . . . . . . . . . . . . . . . 3--3
             Satish K. Tripathi   Performance issues in local area
                                  networks (tutorial)  . . . . . . . . . . 3--3
            Harold S. Stone and   
              Dominique Thibaut   Footprints in the cache  . . . . . . . . 4--8
             Mary K. Vernon and   
               Mark A. Holliday   Performance analysis of multiprocessor
                                  cache consistency protocols using
                                  generalized timed Petri nets . . . . . . 9--17
             P. G. Harrison and   
                    A. J. Field   Performance modelling of parallel
                                  computer architectures . . . . . . . . . 18--27
             Stuart Madnick and   
                Y. Richard Wang   Modeling multiprocessor computer systems
                                  with unbalanced flows  . . . . . . . . . 28--34
            Lindsay Kleeman and   
                Antonio Cantoni   The analysis and performance of batching
                                  arbiters . . . . . . . . . . . . . . . . 35--43
           John P. Lehoczky and   
                        Lui Sha   Performance of real-time bus scheduling
                                  algorithms . . . . . . . . . . . . . . . 44--53
                Will Leland and   
                  Teunis J. Ott   Load-balancing heuristics and process
                                  behavior . . . . . . . . . . . . . . . . 54--69
             Kyoo Jeong Lee and   
                    Don Towsley   A comparison of priority-based
                                  decentralized load balancing policies    70--77
            Jean-Yves Le Boudec   A BCMP extension to multiserver stations
                                  with concurrent classes of customers . . 78--91
               A. E. Conway and   
                N. D. Georganas   An efficient algorithm for
                                  semi-homogeneous queueing network models 92--99
              Philippe Nain and   
                     Keith Ross   Optimal multiplexing of heterogeneous
                                  traffic with hard constraint . . . . . . 100--108
             Kenneth Sevcik and   
             Marjory J. Johnson   Cycle time properties of the FDDI token
                                  ring protocol (extended abstract)  . . . 109--110
               Yves Dallery and   
                     Rajan Suri   Approximate disaggregation and
                                  performance bounds for queueing networks
                                  with multiple-server stations  . . . . . 111--128
                 Johann Strelen   A generalization of mean value analysis
                                  to higher moments: moment analysis . . . 129--140
              William A. Massey   A probabilistic analysis of a database
                                  system . . . . . . . . . . . . . . . . . 141--146
               Andrew Witkowski   Performance evaluation of multiversion
                                  with the Oracle synchronization  . . . . 147--158
            Mukesh Swinghal and   
                 A. K. Agrawala   Performance analysis of an algorithm for
                                  concurrency control in replicated
                                  database systems . . . . . . . . . . . . 159--169
                  Ilkka Haikala   ARMA models of program behaviour . . . . 170--179
        Shikharesh Majumdar and   
                Richard B. Bunt   Measurement and analysis of locality
                                  phases in file referencing behaviour . . 180--192
             Rami R. Razouk and   
              Terri Stewart and   
                 Michael Wilson   Measuring operating system performance
                                  on modern micro-processors . . . . . . . 193--202
           Victor F. Nicola and   
             V. G. Kulkarni and   
              Kishor S. Trivedi   Queueing analysis of fault-tolerant
                                  computer systems (extended abstract) . . 203--203
         E. G. Coffman, Jr. and   
                 E. Gelenbe and   
                  E. N. Gilbert   Analysis of a conveyor queue in a
                                  flexible manufacturing system  . . . . . 204--223
          Demetres D. Kouvatsos   A maximum entropy queue length
                                  distribution for the G/G/1 finite
                                  capacity queue . . . . . . . . . . . . . 224--236
             Hideaki Takagi and   
                Masayuki Murata   Queueing analysis of nonpreemptive
                                  reservation priority discipline  . . . . 237--244
                    Micha Hofri   Queueing systems with a procrastinating
                                  server . . . . . . . . . . . . . . . . . 245--253
                O. J. Boxma and   
                     B. Meister   Waiting-time approximations for
                                  cyclic-service systems with switch-over
                                  times  . . . . . . . . . . . . . . . . . 254--262

ACM SIGMETRICS Performance Evaluation Review
Volume 14, Number 2, August, 1986

                       Irene Hu   Measuring file access patterns in UNIX   15--20
               Domenico Ferrari   Considerations on the insularity of
                                  performance evaluation . . . . . . . . . 21--32

ACM SIGMETRICS Performance Evaluation Review
Volume 14, Number 3--4, January, 1987

         Satish K. Tripathi and   
              Steve Kaisler and   
            Sharat Chandran and   
              Ashok K. Agrawala   Report on the Workshop on Design &
                                  Performance Issues in Parallel
                                  Architectures  . . . . . . . . . . . . . 16--32


ACM SIGMETRICS Performance Evaluation Review
Volume 15, Number 1, May, 1987

                       Jim Gray   A view of database system performance
                                  measures . . . . . . . . . . . . . . . . 3--4
        Philip Heidelberger and   
                 Seetha Lakshmi   A performance comparison of multi-micro
                                  and mainframe database architectures . . 5--6
             Daniel A. Reed and   
                 Chong-kwon Kim   Packet routing algorithms for integrated
                                  switching networks . . . . . . . . . . . 7--15
       Timothy A. Gonsalves and   
                Fouad A. Tobagi   Performance of the Expressnet with
                                  voice/data traffic . . . . . . . . . . . 16--26
            Subhash Agrawal and   
                 Ravi Ramaswamy   Analysis of the resequencing delay for
                                  M/M/m systems  . . . . . . . . . . . . . 27--35
             Daniel A. Reed and   
            Allen D. Malony and   
            Bradley D. McCredie   Parallel discrete event simulation: a
                                  shared memory approach . . . . . . . . . 36--38
           Ingrid Y. Bucher and   
            Margaret L. Simmons   A close look at vector performance of
                                  register-to-register vector computers
                                  and a new model  . . . . . . . . . . . . 39--45
           F. Darema-Rogers and   
              G. F. Pfister and   
                          K. So   Memory access patterns of parallel
                                  scientific programs  . . . . . . . . . . 46--58
               Robert Geist and   
            Robert Reynolds and   
                    Eve Pittard   Disk scheduling in System V  . . . . . . 59--68
                Miron Livny and   
          Setrag Khoshafian and   
                    Haran Boral   Multi-disk management algorithms . . . . 69--77
           Jeffrey P. Buzen and   
                  Annie W. Shum   A unified operational treatment of RPS
                                  reconnect delays . . . . . . . . . . . . 78--92
                  R. Nelson and   
                 D. Towsley and   
                  A. N. Tantawi   Performance analysis of parallel
                                  processing systems . . . . . . . . . . . 93--94
               Ziao-Nan Tan and   
              Kenneth C. Sevcik   Reduced distance routing in single-state
                                  shuffle-exchange interconnection
                                  networks . . . . . . . . . . . . . . . . 95--110
            Christos Bouras and   
               John Garofalakis   Queueing delays in buffered multistage
                                  interconnection networks . . . . . . . . 111--121
       Hector Garcia-Molina and   
             Lawrence R. Rogers   Performance through memory . . . . . . . 122--131
         Michael J. Jipping and   
                       Ray Ford   Predicting performance of concurrency
                                  control designs  . . . . . . . . . . . . 132--142
           Anton T. Dahbura and   
         Krishan K. Sabnani and   
                William J. Hery   Performance analysis of a fault
                                  detection scheme in multiprocessor
                                  systems  . . . . . . . . . . . . . . . . 143--154
            Michael A. Salsburg   A statistical approach to computer
                                  performance modeling . . . . . . . . . . 155--162
               Teemu Kerola and   
                 Herb Schwetman   Monit: a performance monitoring tool for
                                  parallel and pseudo-parallel programs    163--174
           M. Ajmone Marsan and   
                   G. Balbo and   
                  G. Chiola and   
                       G. Conte   Modeling the software architecture of a
                                  prototype parallel machine . . . . . . . 175--185
          William Alexander and   
              Tom W. Keller and   
              Ellen E. Boughter   A workload characterization pipeline for
                                  models of parallel systems . . . . . . . 186--194
                 Ingrid M. Graf   Transformation between different levels
                                  of workload characterization for
                                  capacity planning: fundamentals and case
                                  study  . . . . . . . . . . . . . . . . . 195--204
                Zuwang Ruan and   
                Walter F. Tichy   Performance analysis of file replication
                                  schemes in distributed systems . . . . . 205--215
          David R. Cheriton and   
            Carey L. Williamson   Network measurement of the VMTP
                                  request-response protocol in the V
                                  distributed system . . . . . . . . . . . 216--225
       Mohamed Salehmohamed and   
                  W. S. Luk and   
               Joseph G. Peters   Performance evaluation of LAN sorting
                                  algorithms . . . . . . . . . . . . . . . 226--233
          George C. Polyzos and   
                  Mart L. Molle   Delay analysis of a window tree conflict
                                  resolution algorithm in a local area
                                  network environment  . . . . . . . . . . 234--244
                  Scott Shenker   Some conjectures on the behavior of
                                  acknowledgement-based transmission
                                  control of random access communication
                                  channels . . . . . . . . . . . . . . . . 245--255
               Peter Mathys and   
                Boi V. Faltings   The effect of channel-exit protocols on
                                  the performance of finite population
                                  random-access systems  . . . . . . . . . 256--267

ACM SIGMETRICS Performance Evaluation Review
Volume 15, Number 2, August, 1987

                  Robert Fisher   The impact of interactive application
                                  development with CODESTAR  . . . . . . . 13--15

ACM SIGMETRICS Performance Evaluation Review
Volume 15, Number 3--4, February, 1988

            Ulf Körner and   
                Serge Fdida and   
               Harry Perros and   
                 Gerald Shapiro   End to end delays in a catenet
                                  environment  . . . . . . . . . . . . . . 20--28
                 Ravi S. Sharma   Three simple algorithms for the N/1/F
                                  Problem  . . . . . . . . . . . . . . . . 29--32


ACM SIGMETRICS Performance Evaluation Review
Volume 16, Number 1, May, 1988

            R. C. Covington and   
                  S. Madala and   
                   V. Mehta and   
                 J. R. Jump and   
                 J. B. Sinclair   The Rice Parallel Processing Testbed . . 4--11
              B. D. Lubachevsky   Efficient distributed event driven
                                  simulations of multiple-loop networks    12--24
                   B. J. Lucier   Performance evaluation for
                                  multiprocessors programmed using
                                  monitors . . . . . . . . . . . . . . . . 22--29
                    A. Ganz and   
                    I. Chlamtac   Queueing analysis of finite buffer token
                                  networks . . . . . . . . . . . . . . . . 30--36
       M. Zafirovic-Vukotic and   
         I. G. M. M. Niemegeers   Performance modelling of a HSLAN slotted
                                  ring protocol  . . . . . . . . . . . . . 37--46
                 D.-M. Chiu and   
                      R. Sudama   A case study of DECnet applications and
                                  protocol performance . . . . . . . . . . 47--55
                 S. Shenker and   
                     A. Weinrib   Asymptotic analysis of large
                                  heterogeneous queueing systems . . . . . 56--62
                D. L. Eager and   
             E. D. Lazowska and   
                    J. Zahorjan   The limited performance benefits of
                                  migrating active processes for load
                                  sharing  . . . . . . . . . . . . . . . . 63--72
                    J. Hong and   
                     X. Tan and   
                        M. Chen   From local to global: an analysis of
                                  nearest neighbor balancing on hypercube  73--82
                        K. Kant   Application level modeling of parallel
                                  machines . . . . . . . . . . . . . . . . 83--93
                 R. G. Born and   
                  J. R. Kenevan   Analytic derivation of processor
                                  potential utilization in straight line,
                                  ring, square mesh, and hypercube
                                  networks . . . . . . . . . . . . . . . . 94--103
                S. Majumdar and   
                D. L. Eager and   
                     R. B. Bunt   Scheduling in multiprogrammed parallel
                                  systems  . . . . . . . . . . . . . . . . 104--113
                N. M. Patel and   
                 P. G. Harrison   On hot-spot contention in
                                  interconnection networks . . . . . . . . 114--123
              S. C. Kothari and   
            A. Jhunjhunwala and   
                   A. Mukherjee   Performance analysis of multipath
                                  multistage interconnection networks  . . 124--132
         J. L. Melús and   
              E. Sanvicente and   
       J. Magriñá   Modelling and performance evaluation of
                                  multiprocessor based packet switches . . 133--140
                      T. P. Lee   A manufacturing capacity planning
                                  experiment through functional workload
                                  decomposition  . . . . . . . . . . . . . 141--150
                A. E. Irgon and   
         A. H. Dragoni, Jr. and   
                  T. O. Huleatt   FAST: a large scale expert system for
                                  application and system software
                                  performance tuning . . . . . . . . . . . 151--156
               W. Alexander and   
                    G. Copeland   Comparison of dataflow control
                                  techniques in distributed data-intensive
                                  systems  . . . . . . . . . . . . . . . . 157--166
          S. T. Leutenegger and   
                   M. K. Vernon   A mean-value performance analysis of a
                                  new multiprocessor architecture  . . . . 167--176
                J. T. Blake and   
              A. L. Reibman and   
                  K. S. Trivedi   Sensitivity analysis of reliability and
                                  performability measures for
                                  multiprocessor systems . . . . . . . . . 177--186
               R. Mukkamala and   
               S. C. Bruell and   
                   R. K. Shultz   Design of partially replicated
                                  distributed database systems: an
                                  integrated methodology . . . . . . . . . 187--196
              D. Wybranietz and   
                       D. Haban   Monitoring and performance measuring
                                  distributed systems during operation . . 197--206
               S. W. Melvin and   
                     Y. N. Patt   The use of microcode instrumentation for
                                  development, debugging and tuning of
                                  operating system kernels . . . . . . . . 207--214
                  A. Agawal and   
                       A. Gupta   Memory-reference characteristics of
                                  multiprocessor applications under MACH   215--225
               J. M. Murphy and   
                     R. B. Bunt   Characterising program behaviour with
                                  phases and transitions . . . . . . . . . 226--234
               Y. Yoshizawa and   
                        T. Arai   Adaptive storage control for page frame
                                  supply in large scale computer systems   235--243
            K. R. Pattipati and   
                 M. M. Kostreva   On the properties of approximate mean
                                  value analysis algorithms for queueing
                                  networks . . . . . . . . . . . . . . . . 244--252
              A. N. Tantawi and   
                 G. Towsley and   
                        J. Wolf   Optimal allocation of multiple class
                                  resources in computer systems  . . . . . 253--260
                C.-H. Hsieh and   
                      S. S. Lam   PAM --- a noniterative approximate
                                  solution method for closed multichain
                                  queueing networks  . . . . . . . . . . . 261--269

ACM SIGMETRICS Performance Evaluation Review
Volume 16, Number 2--4, February, 1989

                     Anna Ha\'c   Load balancing in distributed systems: a
                                  summary  . . . . . . . . . . . . . . . . 17--19
                     Anna Ha\'c   Knowledge-based distributed system
                                  architecture . . . . . . . . . . . . . . 20--20
                     Anna Ha\'c   Design algorithms for asynchronous
                                  operations in cache memory . . . . . . . 21--21
               Victor Schneider   Approximations for the Halstead software
                                  science software error rate and project
                                  effort estimators  . . . . . . . . . . . 22--29
               Bernard Domanski   A PROLOG-based expert system for tuning
                                  MVS/XA . . . . . . . . . . . . . . . . . 30--47
                 David R. Irvin   A queueing model for local area network
                                  bridges  . . . . . . . . . . . . . . . . 48--57


ACM SIGMETRICS Performance Evaluation Review
Volume 17, Number 1, May, 1989

                        J. Wolf   The placement optimization program: a
                                  practical solution to the disk file
                                  assignment problem . . . . . . . . . . . 1--10
               J. P. Kearns and   
                     S. DeFazio   Diversity in database reference behavior 11--19
                 J. Hellerstein   A statistical approach to diagnosing
                                  intermittent performance-problems using
                                  monotone relationships . . . . . . . . . 20--28
                R. R. Muntz and   
        E. de Souza e Silva and   
                       A. Goyal   Bounding availability of repairable
                                  computer systems . . . . . . . . . . . . 29--38
                 R. Bubenik and   
                  W. Zwaenepoel   Performance of optimistic make . . . . . 39--48
             T. E. Anderson and   
             D. D. Lazowska and   
                     H. M. Levy   The performance implications of thread
                                  management alternatives for
                                  shared-memory multiprocessors  . . . . . 49--60
               J. B. Carter and   
                  W. Zwaenepoel   Optimistic implementation of bulk data
                                  transfer protocols . . . . . . . . . . . 61--69
              C. B. Stunkel and   
                    W. K. Fuchs   TRAPEDS: producing traces for
                                  multicomputers via execution driven
                                  simulation . . . . . . . . . . . . . . . 70--78
                K. Gallivan and   
                  D. Gannon and   
                   W. Jalby and   
                  A. Malony and   
                    H. Wijshoff   Behavioral characterization of
                                  multiprocessor memory systems: a case
                                  study  . . . . . . . . . . . . . . . . . 79--88
                  A. D. Samples   Mache: no-loss trace compaction  . . . . 89--97
               A. Mukherjee and   
            L. H. Landweber and   
               J. C. Strikwerda   Evaluation of retransmission strategies
                                  in a local area network environment  . . 98--107
                   P. B. Danzig   Finite buffers for fast multicast  . . . 108--117
                   B. Mukherjee   Performance of a dual-bus unidirectional
                                  broadcast network operating under
                                  probabilistic scheduling strategy  . . . 118--126
            A. G. Greenberg and   
                     J. McKenna   Solution of closed, product form,
                                  queueing networks via the RECAL and
                                  tree-RECAL methods on a shared memory
                                  multiprocessor . . . . . . . . . . . . . 127--135
                 M. Paterok and   
                 O. Fischer and   
                        L. Opta   Feedback queues with preemption-distance
                                  priorities . . . . . . . . . . . . . . . 136--145
               D. B. Wagner and   
                 E. D. Lazowska   Parallel simulation of queueing
                                  networks: limitations and potentials . . 146--155
                   D. Mitra and   
                     I. Mitrani   Control and coordination policies for
                                  systems with buffers . . . . . . . . . . 156--164
                D. M. Nicol and   
                 J. C. Townsend   Accurate modeling of parallel scientific
                                  computations . . . . . . . . . . . . . . 165--170
                   K. C. Sevcik   Characterizations of parallelism in
                                  applications and their use in scheduling 171--180
               R. D. Nelson and   
                  T. K. Philips   An approximation to the response time
                                  for shortest queue routing . . . . . . . 181--189
           K. E. E. Raatikainen   Approximating response time
                                  distributions  . . . . . . . . . . . . . 190--199
                   D. Mitra and   
                       A. Weiss   A closed network with a discriminatory
                                  processor-sharing server . . . . . . . . 200--208

ACM SIGMETRICS Performance Evaluation Review
Volume 17, Number 2, January, 1990

                      Andy Glew   An empirical investigation of OR
                                  indexing . . . . . . . . . . . . . . . . 41--49
                  N. J. Gunther   Performance pathways . . . . . . . . . . 50--56
            Michael G. Gonzales   Correction of the Halstead length
                                  estimator skew for small Pascal programs 57--59


ACM SIGMETRICS Performance Evaluation Review
Volume 18, Number 1, May, 1990

        Albert G. Greenberg and   
       Boris D. Lubachevsky and   
                    Isi Mitrani   Unboundedly parallel simulations via
                                  recurrence relations . . . . . . . . . . 1--12
                Randolph Nelson   A performance evaluation of a general
                                  parallel processing model  . . . . . . . 13--26
              Wen-Hann Wang and   
                 Jean-Loup Baer   Efficient trace-driven simulation method
                                  for cache performance analysis . . . . . 27--36
               S. J. Eggers and   
            David R. Keppel and   
          Eric J. Koldinger and   
                  Henry M. Levy   Techniques for efficient inline tracing
                                  on a shared-memory multiprocessor  . . . 37--47
              Anant Agarwal and   
                  Minor Huffman   Blocking: exploiting spatial locality
                                  for trace compaction . . . . . . . . . . 48--57
            Tein-Hsiang Lin and   
                   Kang G. Shin   A Bayesian approach to fault
                                  classification . . . . . . . . . . . . . 58--66
            Louise E. Moser and   
                Vikas Kapur and   
            P. M. Melliar-Smith   Probabilistic language analysis of
                                  weighted voting algorithms . . . . . . . 67--73
              Peter M. Chen and   
            Garth A. Gibson and   
              Randy H. Katz and   
             David A. Patterson   An evaluation of redundant arrays of
                                  disks using an Amdahl 5890 . . . . . . . 74--85
         Amarnath Mukherjee and   
      Lawrence H. Landweber and   
             John C. Strikwerda   Simultaneous analysis of flow and error
                                  control strategies with
                                  congestion-dependent errors  . . . . . . 86--95
           Arthur Y. M. Lin and   
              John A. Silvester   Queueing analysis of an ATM switch with
                                  multichannel transmission groups . . . . 96--105
               Theodore Johnson   Approximate analysis of reader and
                                  writer access to a shared resource . . . 106--114
         Thomas E. Anderson and   
             Edward D. Lazowska   Quartz: a tool for tuning parallel
                                  program performance  . . . . . . . . . . 115--125
       Krishna R. Pattipati and   
                  Joel Wolf and   
                    Somnath Deb   A calculus of variations approach to
                                  file allocation problems in computer
                                  systems  . . . . . . . . . . . . . . . . 126--133
           John T. Robinson and   
          Murthy V. Devarakonda   Data cache management using
                                  frequency-based replacement  . . . . . . 134--142
                   Asit Dan and   
                    Don Towsley   An approximate analysis of the LRU and
                                  FIFO buffer replacement schemes  . . . . 143--152
             Raphael Alonso and   
                Andrew W. Appel   An advisor for flexible working sets . . 153--162
           Joseph Torrellas and   
              John Hennessy and   
                   Thierry Weil   Analysis of critical architectural and
                                  programming parameters in a hierarchical 163--172
                 Rajeev Jog and   
           Philip L. Vitale and   
             James R. Callister   Performance evaluation of a commercial
                                  cache-coherent shared memory
                                  multiprocessor . . . . . . . . . . . . . 173--182
                   Erol Gelenbe   Performance analysis of the Connection
                                  Machine  . . . . . . . . . . . . . . . . 183--191
          Darryl L. Willick and   
                    D. L. Eager   An analytic model of multistage
                                  interconnection networks . . . . . . . . 192--202
                   K. Dussa and   
                 B. Carlson and   
                   L. Dowdy and   
                     K.-H. Park   Dynamic partitioning in a transputer
                                  environment  . . . . . . . . . . . . . . 203--213
              John Zahorjan and   
                   Cathy McCann   Processor scheduling in shared memory
                                  multiprocessors  . . . . . . . . . . . . 214--225
       Scott T. Leutenegger and   
                 Mary K. Vernon   The performance of multiprogrammed
                                  multiprocessor scheduling algorithms . . 226--236
              W. P. Dawkins and   
                  V. Debbad and   
                 J. R. Jump and   
                 J. B. Sinclair   Efficient simulation of multiprogramming 237--238
                  Scott Shenker   Making flow control work in networks: a
                                  control-theoretic analysis of gateway
                                  service disciplines  . . . . . . . . . . 239--240
                  Scott Shenker   Making greed work in networks: a
                                  game-theoretic analysis of gateway
                                  service disciplines  . . . . . . . . . . 241--242
    Shahram Ghandeharizadeh and   
                David J. DeWitt   Factors affecting the performance of
                                  multiuser database management systems    243--244
            Susanne Englert and   
                   Jim Gray and   
              Terrye Kocher and   
                    Praful Shah   A benchmark of NonStop SQL release 2
                                  demonstrating near-linear speedup and
                                  scaleup on large databases . . . . . . . 245--246
             Arun K. Somani and   
            James A. Ritcey and   
               Stephen H. L. Au   Phased mission reliability analysis  . . 247--248
             Lionel C. Mitchell   Performance analysis of a fault tolerant
                                  computer system  . . . . . . . . . . . . 249--250
            David W. Jensen and   
                 Daniel A. Reed   Ray tracing on distributed memory
                                  parallel systems . . . . . . . . . . . . 251--252
         Dinesh Mirchandani and   
               Prabuddha Biswas   Characterizing and modeling Ethernet
                                  performance of distributed DECwindows
                                  applications . . . . . . . . . . . . . . 253--254
          Patrick F. McGehearty   Challenges in obtaining peak parallel
                                  performance with a Convex C240, parallel
                                  vector processor . . . . . . . . . . . . 255--256
             Steven A. Heimlich   Traffic characterization of the NSFNET
                                  national backbone  . . . . . . . . . . . 257--258
           Jack W. Davidson and   
               David B. Whalley   Ease: an environment for architecture
                                  study and experimentation  . . . . . . . 259--260
          John G. Waclawsky and   
              Ashok K. Agrawala   Dynamic queue behavior in networks with
                                  window protocols . . . . . . . . . . . . 261--262
        John D. Garofalakis and   
               Paul G. Spirakis   The performance of multistage
                                  interconnection networks with finite
                                  buffers  . . . . . . . . . . . . . . . . 263--264
    Athanasios V. Vasilakos and   
      Christos A. Moschonas and   
      Constantinos T. Paximadis   Adaptive window flow control and
                                  learning algorithms for adaptive routing
                                  in data networks . . . . . . . . . . . . 265--266
            Daniel Nussbaum and   
     Ingmar Vuong-Adlerberg and   
                  Anant Agarwal   Modeling a circuit switched
                                  multiprocessor interconnect  . . . . . . 267--269

ACM SIGMETRICS Performance Evaluation Review
Volume 18, Number 2, August, 1990

              Blaine D. Gaither   Editor's readings  . . . . . . . . . . . 25--26
                    R. E. Vance   Article review: `A message-based
                                  approach to discrete event simulation'
                                  by R. L. Bagrodia, K. M. Chandy, and J.
                                  Misra. IEEE Trans. Softw. Eng. SE-13, 6
                                  (June 1987)  . . . . . . . . . . . . . . 27--27
            Arnold O. Allen and   
                     Gary Hynes   Approximate MVA solutions with fixed
                                  throughput classes . . . . . . . . . . . 31--40
             Patrick McGehearty   Challenges in obtaining peak parallel
                                  performance with a Convex C240, a
                                  parallel vector processor  . . . . . . . 41--47
                 Blaine Gaither   Scientific visualization of performance
                                  data: evaluation of DV-Draw  . . . . . . 48--53

ACM SIGMETRICS Performance Evaluation Review
Volume 18, Number 3, November, 1990

                 H. Reza Taheri   An analysis of the Neal Nelson Business
                                  Benchmark  . . . . . . . . . . . . . . . 13--18
                     Tom Keller   SPEC benchmarks and competitive results  19--20
                   David Finkel   Book review: `Computer Systems
                                  Performance Management and Capacity
                                  Planning' by J. Cady and B. Howarth
                                  (Prentice-Hall, 1990)  . . . . . . . . . 21--21
                   David Finkel   Book review: `The Art of Computer
                                  Systems Performance Analysis' by R. Jain
                                  (Wiley-Interscience, 1991) . . . . . . . 21--22
                   David Finkel   Book review: `Computer and Communication
                                  Systems Performance Modelling' by Peter
                                  J. B. King (Prentice Hall 1990)  . . . . 22--22
                   David Finkel   Book review: `Quantitative Analysis of
                                  Computer Systems' by C. H. C. Leung
                                  (Wiley, 1988)  . . . . . . . . . . . . . 22--23
                   David Finkel   Book review: `Fundamentals of
                                  Performance Modeling' by M. K. Molloy
                                  (Macmillan, 1989)  . . . . . . . . . . . 23--23
    Rafael Saavedra-Barrera and   
              Alan J. Smith and   
                    Eugene Miya   Machine Characterization Based on an
                                  Abstract High-level Language Machine . . 24--24
        Shivendra S. Panwar and   
                Don Towsley and   
                   Jack K. Wolf   Optimal scheduling policies for a class
                                  of queues with customer deadlines to the
                                  beginning of service . . . . . . . . . . 25--25
            Hideyuki Tokuda and   
              Makato Kotera and   
             Clifford E. Mercer   A Real-Time Monitor for a Distributed
                                  Real-Time Operating System . . . . . . . 26--26
             Dominique Thiebaut   On the Fractal Dimension of Computer
                                  Programs and its Application to the
                                  Prediction of the Cache Miss Ratio . . . 41--41
                    Carl Ponder   Performance variation across benchmark
                                  suites . . . . . . . . . . . . . . . . . 42--48

ACM SIGMETRICS Performance Evaluation Review
Volume 18, Number 4, April, 1991

                   David Finkel   Book review: `Multiprocessor
                                  Performance' by Erol Gelenbe (John Wiley
                                  & Sons, 1989) . . . . . . . . . . . . . . 9--9
                   David Finkel   Book review: `Performance Analysis of
                                  Transaction Processing Systems' by
                                  Wilbur H. Highleyman (Prentice Hall,
                                  1989)  . . . . . . . . . . . . . . . . . 10--10
                   David Finkel   Book review: `Performance Measurement of
                                  Computer Systems' by Phillip McKerrow
                                  (Addison-Wesley 1988)  . . . . . . . . . 10--11
                   David Finkel   Book review: `Multiple Access Protocols:
                                  Performance and Analysis' by Raphael Rom
                                  and Moshe Sidi (Springer-Verlag, 1990)   11--11
                   David Finkel   Book review: `Performance Engineering of
                                  Software Systems' by Connie U. Smith
                                  (Addison-Wesley, 1990) . . . . . . . . . 11--12
                   Shyam Johari   Performance objectives --- how to define
                                  them . . . . . . . . . . . . . . . . . . 18--19
                 Carl G. Ponder   Benchmark semantics  . . . . . . . . . . 20--24
            Luis-Felipe Cabrera   Technical summary of the Second IEEE
                                  Workshop on Workstation Operating
                                  Systems  . . . . . . . . . . . . . . . . 25--32


ACM SIGMETRICS Performance Evaluation Review
Volume 19, Number 1, May, 1991

        P. M. Melliar-Smith and   
                Louise E. Moser   Performance analysis of a broadcast
                                  communications protocol  . . . . . . . . 1--10
                Peter B. Danzig   An analytical model of operating system
                                  protocol processing including effects of
                                  multiprogramming . . . . . . . . . . . . 11--20
      Venkatesh Harinarayan and   
              Leonard Kleinrock   Load sharing in limited access
                                  distributed systems  . . . . . . . . . . 21--30
            Tein-Hsiang Lin and   
                 Wernhuar Tarng   Scheduling periodic and aperiodic tasks
                                  in hard real-time computing systems  . . 31--38
               Robert Berry and   
             Joseph Hellerstein   An approach to detecting changes in the
                                  factors affecting the performance of
                                  computer systems . . . . . . . . . . . . 39--49
          Robert Bodnarchuk and   
                   Richard Bunt   A synthetic workload model for a
                                  distributed system file server . . . . . 50--59
                  Arif Merchant   A Markov chain approximation for the
                                  analysis of Banyan networks  . . . . . . 60--67
                     T. Lin and   
                   L. Kleinrock   Performance analysis of finite-buffered
                                  multistage interconnection networks with
                                  a general traffic pattern  . . . . . . . 68--78
              David A. Wood and   
               Mark D. Hill and   
                  R. E. Kessler   A model for estimating trace-sample miss
                                  ratios . . . . . . . . . . . . . . . . . 79--89
            Mee-Chow Chiang and   
               Gurindar S. Sohi   Experience with mean value analysis
                                  model for evaluating shared bus,
                                  throughput-oriented multiprocessors  . . 90--100
               Anurag Gupta and   
               Ian Akyildiz and   
            Richard M. Fujimoto   Performance analysis of Time Warp with
                                  homogeneous processors and exponential
                                  task times . . . . . . . . . . . . . . . 101--110
                   Jong Kim and   
                   Chita R. Das   On subcube dependability in a hypercube  111--119
                Anoop Gupta and   
              Andrew Tucker and   
             Shigeru Urushibara   The impact of operating system
                                  scheduling policies and synchronization
                                  methods of performance of parallel
                                  applications . . . . . . . . . . . . . . 120--132
              Songnian Zhou and   
                 Timothy Brecht   Processor-pool-based scheduling for
                                  large-scale NUMA multiprocessors . . . . 133--142
         Mark S. Squillante and   
             Randolph D. Nelson   Analysis of task migration in
                                  shared-memory multiprocessor scheduling  143--155
                   Asit Dan and   
             Daniel M. Dias and   
                   Philip S. Yu   Analytical modelling of a hierarchical
                                  buffer for a data sharing environment    156--167
              Martin Reiman and   
                 Paul E. Wright   Performance analysis of concurrent-read
                                  exclusive-write  . . . . . . . . . . . . 168--177
            James C. French and   
          Terrence W. Pratt and   
                   Mriganka Das   Performance measurement of a parallel
                                  input/output system for the Intel iPSC/2
                                  Hypercube  . . . . . . . . . . . . . . . 178--187
           Ann L. Chervenak and   
                  Randy H. Katz   Performance of a disk array prototype    188--197
                Shenze Chen and   
                    Don Towsley   Performance of a mirrored disk in a
                                  real-time transaction system . . . . . . 198--207
                R. R. Glenn and   
                    D. V. Pryor   Instrumentation for a massively parallel
                                  MIMD application . . . . . . . . . . . . 208--209
             Aaron Goldberg and   
                  John Hennessy   MTOOL: a method for detecting memory
                                  bottlenecks  . . . . . . . . . . . . . . 210--211
                 Yul H. Kim and   
               Mark D. Hill and   
                  David A. Wood   Implementing stack simulation for
                                  highly-associative memories  . . . . . . 212--213
                    Robb Newman   Performance analysis case study
                                  (abstract): application of experimental
                                  design & statistical data analysis
                                  techniques . . . . . . . . . . . . . . . 214--215
                 Arvin Park and   
              Jeffrey C. Becker   Measurements of the paging behavior of
                                  UNIX . . . . . . . . . . . . . . . . . . 216--217
            Joseph Pasquale and   
             Barbara Bittel and   
                 Daniel Kraiman   A static and dynamic workload
                                  characterization study of the San Diego
                                  Supercomputer Center Cray X-MP . . . . . 218--219
                  Calton Pu and   
             Frederick Korz and   
               Robert C. Lehman   An experiment on measuring application
                                  performance over the Internet  . . . . . 220--221
              Myung K. Yang and   
                   Chita R. Das   A parallel branch-and-bound algorithm
                                  for MIN-based multiprocessors  . . . . . 222--223

ACM SIGMETRICS Performance Evaluation Review
Volume 19, Number 2, August, 1991

               Dick H. J. Epema   Book Review: `Computer and Communication
                                  Systems Performance Modelling' by Peter
                                  J.B. King (Prentice Hall, 1990)  . . . . 4--5
              Robert Y. Al-Jaar   Book review: `The Art of Computer
                                  Systems Performance Analysis: Techniques
                                  for Experimental Design, Measurement,
                                  Simulation, and Modeling' by Raj Jain
                                  (John Wiley & Sons 1991)  . . . . . . . . 5--11
                   David Finkel   Brief review: `Probability, Statistics
                                  and Queueing Theory with Computer
                                  Science Applications,' Second Edition by
                                  Arnold O. Allen (Academic Press 1990)    11--12
                   David Finkel   Brief review: `Computer Networks &
                                  Systems: Queueing Theory and Performance
                                  Evaluation' by Thomas Robertazzi
                                  (Springer-Verlag, 1990)  . . . . . . . . 12--12
                   David Finkel   Brief review: ``Queueing Networks ---
                                  Exact Computational Algorithms: A
                                  Unified Theory Based on Decomposition
                                  and Aggregation'' by Adrian E. Conway
                                  and Nicholas D. Georganas (MIT Press
                                  1989)  . . . . . . . . . . . . . . . . . 12--12
                   David Finkel   Brief review: `Performance
                                  Instrumentation & Visualization' by
                                  Margaret Simmons and Rebecca Koskela
                                  (Addison-Wesley & ACM Press, 1989)  . . . 12--13
                   David Finkel   Brief review: `Stochastic Analysis of
                                  Computer and Communication Systems', Ed.
                                  by H. Takagi (Elsevier Science
                                  Publishers B.V. 1990)  . . . . . . . . . 13--13
                  David Frankel   Brief review: `Queueing Analysis: A
                                  Foundation of Performance Evaluation.
                                  Volume 1: Vacation and Priority Systems,
                                  Part 1' by H. Takagi (North-Holland,
                                  1991)  . . . . . . . . . . . . . . . . . 13--13
                    D. Ames and   
                  D. Gibson and   
                        B. Troy   Composite theoretical performance  . . . 24--29
             Bruce Christianson   Amdahl's Law and end of system design    30--32
               David Finkel and   
          Robert E. Kinicki and   
               Jonas A. Lehmann   An overview of the WPI Benchmark Suite   33--35
          Jeffrey C. Becker and   
                     Arvin Park   Analysis of the paging behavior of UNIX  36--43
              A. E. Fateyev and   
            S. M. Porotskiy and   
                 V. I. Drujinin   Comparative evaluation of approximate
                                  methods for modelling of network systems 44--48

ACM SIGMETRICS Performance Evaluation Review
Volume 19, Number 3, February, 1992

                 Ashvini Nangia   Book Review: `Performance Analysis of
                                  Transaction Processing Systems' by
                                  Wilbur H. Highleyman (Prentice Hall,
                                  1989)  . . . . . . . . . . . . . . . . . 9--11
                  Xiannong Meng   Book Review: `Computer Networks and
                                  Systems: Queueing Theory and Performance
                                  Evaluation' by Thomas G. Robertazzi
                                  (Springer-Verlag, 1990)  . . . . . . . . 11--12
                      ?. Finkel   Brief review: `Stochastic Modeling and
                                  the Theory of Queues' by Ronald W. Wolfe
                                  (Prentice-Hall, 1989)  . . . . . . . . . 12--12
                      ?. Finkel   Brief review: `Markovian Queues' by O.P.
                                  Sharma (Ellis Horwood Publishers 1990)   12--13
                      ?. Finkel   Brief review: `The Benchmark Handbook:
                                  Database and Transaction Processing
                                  Systems,' Ed. by Jim Gray (Morgan
                                  Kaufmann Publishers, Inc., 1991) . . . . 13--13
                      ?. Finkel   Brief review: ``Modeling and Analysis of
                                  Local Area Networks'' by Paul J. Fortier
                                  and George Desrochers (CRC Press, 1990)  13--13
               Michael W. Berry   Scientific workload characterization by
                                  loop-based analyses  . . . . . . . . . . 17--29
Corporate Transaction Processing Performance Council   Complete TPC results (as of 9/30/91) . . 32--35
       Hartmut Deike-Glindemann   SIQUEUE-PET: an environment for queueing
                                  network modelling  . . . . . . . . . . . 36--44
             Jozo J. Dujmovi\'c   The use of multiple-subscripted arrays
                                  in benchmark programs  . . . . . . . . . 45--48

ACM SIGMETRICS Performance Evaluation Review
Volume 19, Number 4, May, 1992

                     Rob Pooley   Book Reviews: `Computer and
                                  Communication Systems Performance
                                  Modelling' by Peter J. B. King (Prentice
                                  Hall 1990) . . . . . . . . . . . . . . . 13--14
                       Anna Hac   Modeling distributed file systems  . . . 22--27
              Michael K. Molloy   Anatomy of the NHFSSTONES benchmarks . . 28--39
      William F. Keown, Jr. and   
        Philip Koopman, Jr. and   
                  Aaron Collins   Real-time performance of the HARRIS RTX
                                  2000 stack architecture versus the Sun 4
                                  SPARC and the Sun 3 M68020 architectures
                                  with a proposed real-time performance
                                  benchmark  . . . . . . . . . . . . . . . 40--48


ACM SIGMETRICS Performance Evaluation Review
Volume 20, Number 1, June, 1992

         Margaret Martonosi and   
                Anoop Gupta and   
                Thomas Anderson   MemSpy: analyzing memory system
                                  bottlenecks in programs  . . . . . . . . 1--12
               David B. Whalley   Fast instruction cache performance
                                  evaluation using compile-time analysis   13--22
     Richard P. LaRowe, Jr. and   
           Mark A. Holliday and   
          Carla Schlatter Ellis   An analysis of dynamic page placement on
                                  a NUMA multiprocessor  . . . . . . . . . 23--34
           Victor F. Nicola and   
                   Asit Dan and   
                 Daniel M. Dias   Analysis of the generalized clock buffer
                                  replacement scheme for database
                                  transaction processing . . . . . . . . . 35--46
                S. C. Borst and   
                O. J. Boxma and   
             M. B. Combé   Collection of customers: a correlated
                                  M/G/1 queue  . . . . . . . . . . . . . . 47--59
               Philippe Jacquet   Subexponential tail distribution in
                                  LaPalice queues  . . . . . . . . . . . . 60--69
              Duan-Shin Lee and   
               Bhaskar Sengupta   A reservation based cyclic server queue
                                  with limited service . . . . . . . . . . 70--77
         K. K. Ramakrishnan and   
           Prabuddha Biswas and   
            Ramakrishna Karedla   Analysis of file I/O traces in
                                  commercial computing environments  . . . 78--90
        Harjinder S. Sandhu and   
                  Songnian Zhou   Cluster-based file replication in
                                  large-scale distributed systems  . . . . 91--102
              Arif Merchant and   
                Kun-Lung Wu and   
               Philip S. Yu and   
                 Ming-Syan Chen   Performance analysis of dynamic finite
                                  versioning for concurrent transaction
                                  and query processing . . . . . . . . . . 103--114
            Alexander Thomasian   Performance analysis of locking policies
                                  with limited wait depth  . . . . . . . . 115--127
                     Jim Kurose   On computing per-session performance
                                  bounds in high-speed multi-hop computer
                                  networks . . . . . . . . . . . . . . . . 128--139
             John C. S. Lui and   
               Richard R. Muntz   Algorithmic approach to bounding the
                                  mean response time of a minimum expected
                                  delay routing system . . . . . . . . . . 140--151
   Edmundo de Souza e Silva and   
       Pedro Mejiá Ochoa   State space exploration in Markov models 152--166
            Susan S. Owicki and   
                 Anna R. Karlin   Factors in the performance of the AN1
                                  computer network . . . . . . . . . . . . 167--180
           A. Udaya Shankar and   
      Cengiz Alaettino\uglu and   
              Ibrahim Matta and   
           Klaudia Dussa-Zieger   Performance comparison of routing
                                  protocols using MaRS: distance-vector
                                  versus link-state  . . . . . . . . . . . 181--192
               Eitan Altman and   
                  Philippe Nain   Closed-loop control with delayed
                                  information  . . . . . . . . . . . . . . 193--204
                  Arif Merchant   Analytical models of combining Banyan
                                  networks . . . . . . . . . . . . . . . . 205--212
            Ian F. Akyildiz and   
                 Liang Chen and   
               Samir R. Das and   
        Richard M. Fujimoto and   
             Richard F. Serfozo   Performance analysis of ``Time Warp''
                                  with limited memory  . . . . . . . . . . 213--224
                 John Turek and   
               Joel L. Wolf and   
       Krishna R. Pattipati and   
                   Philip S. Yu   Scheduling parallelizable tasks: putting
                                  it all on the shelf  . . . . . . . . . . 225--236
          P. Brémaud and   
                     W.-B. Gong   Stationary likelihood ratios and
                                  smoothed perturbation analysis gradient
                                  estimates for the routing problem  . . . 237--238
           Rosemary Candlin and   
                 Peter Fisk and   
               Joe Phillips and   
                  Neil Skilling   Studying the performance properties of
                                  concurrent programs by simulation
                                  experiments on synthetic programs  . . . 239--240
            Robert F. Berry and   
          Joseph L. Hellerstein   Characterizing and interpreting periodic
                                  behavior in computer systems . . . . . . 241--242
                Erhard Rahm and   
                Donald Ferguson   High performance cache management for
                                  sequential data access . . . . . . . . . 243--244
                 Ram Chakka and   
                    Isi Mitrani   Multiprocessor systems with general
                                  breakdowns and repairs (extended
                                  abstract)  . . . . . . . . . . . . . . . 245--246
             Eric A. Brewer and   
  Chrysanthos N. Dellarocas and   
            Adrian Colbrook and   
               William E. Weihl   PROTEUS: a high-performance
                                  parallel-architecture simulator  . . . . 247--248
      Dikran S. Meliksetian and   
               C. Y. Roger Chen   Performance analysis of communications
                                  in static interconnection networks . . . 249--250
                   Asit Dan and   
               Philip S. Yu and   
                  Jen-Yao Chung   Characterization of database access skew
                                  in a transaction processing environment  251--252
                Aloke Gupta and   
                 Wen-Mei W. Hwu   Xprof: profiling the execution of X
                                  Window programs  . . . . . . . . . . . . 253--254
                Ruth Shoham and   
                   Uri Yechiali   Elevator-type polling systems (abstract) 255--257
   François Baccelli and   
                 Miguel Canales   Parallel simulation of stochastic Petri
                                  nets using recurrence equations  . . . . 257--258
         Manfred R. Jobmann and   
                Johann Schumann   Performance analysis of a parallel
                                  theorem prover . . . . . . . . . . . . . 259--260

ACM SIGMETRICS Performance Evaluation Review
Volume 20, Number 2, November, 1992

                Kim Shanley and   
                  Amie Belongia   TPC releases new benchmark: TPC-C  . . . 8--22
                     Rob Pooley   Book review: `Performance Engineering of
                                  Software Systems' by Connie U. Smith
                                  (Addison Wesley 1990)  . . . . . . . . . 23--24
                 Stephen Taylor   Book review: ``Queuing Networks ---
                                  Exact Computational Algorithms: A
                                  Unified Theory Based on Decomposition
                                  and Aggregation'' by Adrian E. Conway
                                  and Nicolas D. Georganas (MIT Press
                                  1989)  . . . . . . . . . . . . . . . . . 24--26
               Makoto Kobayashi   A cache multitasking model . . . . . . . 27--37
            S. M. Porotskiy and   
                   A. E. Fateev   Development trends in methods for
                                  efficiency evaluation of ES-based
                                  computer systems . . . . . . . . . . . . 38--42
            S. M. Porotskiy and   
                   A. E. Fateev   System and real performance evaluation
                                  of computer  . . . . . . . . . . . . . . 43--46

ACM SIGMETRICS Performance Evaluation Review
Volume 20, Number 3, March, 1993

         Apple van de Liefvoort   Book review: ``Multiple Access
                                  Protocols: Performance and Analysis'' by
                                  Raphael Rom and Moshe Sidi
                                  (Springer-Verlag, 1990)  . . . . . . . . 5--6
                  Corporate TPC   Summary of TPC results (as of December
                                  22, 1992)  . . . . . . . . . . . . . . . 7--21
                Silvano Maffeis   File access patterns in public FTP
                                  archives and an index for locality of
                                  reference  . . . . . . . . . . . . . . . 22--35
         Özgür Ulusoy   An approximate analysis of a real-time
                                  database concurrency control protocol
                                  via Markov modeling  . . . . . . . . . . 36--48

ACM SIGMETRICS Performance Evaluation Review
Volume 20, Number 4, May, 1993

Corporate IBM Systems Analysis Department   Selected publications: 1992  . . . . . . 3--9
                  Corporate TPC   Summary of TPC results (as of March 15,
                                  1993)  . . . . . . . . . . . . . . . . . 10--23
        Kimmo E. E. Raatikainen   Cluster analysis and workload
                                  classification . . . . . . . . . . . . . 24--30
            Robert B. Smith and   
         James K. Archibald and   
                Brent E. Nelson   Evaluating performance of prefetching
                                  second level caches  . . . . . . . . . . 31--42


ACM SIGMETRICS Performance Evaluation Review
Volume 21, Number 1, June, 1993

              Peter M. Chen and   
             David A. Patterson   A new approach to I/O performance
                                  evaluation: self-scaling I/O benchmarks,
                                  predicted I/O performance  . . . . . . . 1--12
           Prabuddha Biswas and   
         K. K. Ramakrishnan and   
                    Don Towsley   Trace driven analysis of write caching
                                  policies for disks . . . . . . . . . . . 13--23
           Rabin A. Sugumar and   
             Santosh G. Abraham   Efficient simulation of caches under
                                  optimal replacement with applications to
                                  miss characterization  . . . . . . . . . 24--35
           Jacqueline Chame and   
                  Michel Dubois   Cache inclusion and processor sampling
                                  in multiprocessor simulations  . . . . . 36--47
        Steven K. Reinhardt and   
               Mark D. Hill and   
             James R. Larus and   
            Alvin R. Lebeck and   
             James C. Lewis and   
                  David A. Wood   The Wisconsin Wind Tunnel: virtual
                                  prototyping of parallel computers  . . . 48--60
             Vikram S. Adve and   
                 Mary K. Vernon   The influence of random delays on
                                  parallel execution times . . . . . . . . 61--73
                   E. Rosti and   
                  E. Smirni and   
               T. D. Wagner and   
                 A. W. Apon and   
                    L. W. Dowdy   The KSR1: experimentation and modeling
                                  of poststore . . . . . . . . . . . . . . 74--85
          Gregory R. Ganger and   
                   Yale N. Patt   The process-flow model: examining I/O
                                  performance from the system's point of
                                  view . . . . . . . . . . . . . . . . . . 86--97
              Edward K. Lee and   
                  Randy H. Katz   An analytic performance model of disk
                                  arrays . . . . . . . . . . . . . . . . . 98--109
                  Dong Tang and   
            Ravishankar K. Iyer   MEASURE+: a measurement-based
                                  dependability analysis package . . . . . 110--121
               A. V. Ramesh and   
                 Kishor Trivedi   On the sensitivity of transient
                                  solutions of Markov models . . . . . . . 122--134
             David M. Nicol and   
            Philip Heidelberger   Parallel simulation of Markovian
                                  queueing networks using adaptive
                                  uniformization . . . . . . . . . . . . . 135--145
     Stephen R. Goldschmidt and   
               John L. Hennessy   The accuracy of trace-driven simulations
                                  of multiprocessors . . . . . . . . . . . 146--157
           Sanjeev K. Setia and   
         Mark S. Squillante and   
             Satish K. Tripathi   Processor scheduling on multiprogrammed,
                                  distributed memory parallel computers    158--170
                Kun-Lung Wu and   
               Philip S. Yu and   
                  James Z. Teng   Performance comparison of thrashing
                                  control policies for concurrent
                                  Mergesorts with parallel prefetching . . 171--182
      Dikran S. Meliksetian and   
               C. Y. Roger Chen   A Markov-modulated Bernoulli process
                                  approximation for the analysis of Banyan
                                  networks . . . . . . . . . . . . . . . . 183--194
            Hiroshi Arakawa and   
          Daniel I. Katcher and   
          Jay K. Strosnider and   
                Hideyuki Tokuda   Modeling and validation of the real-time
                                  Mach scheduler . . . . . . . . . . . . . 195--206
              Sanjoy Baruah and   
              Jayant R. Haritsa   ROBUST: a hardware solution to real-time
                                  overload . . . . . . . . . . . . . . . . 207--216
             Jayanta K. Dey and   
            James F. Kurose and   
                Don Towsley and   
              C. M. Krishna and   
                  Mahesh Girkar   Efficient on-line processor scheduling
                                  for a class of IRIS (Increasing Reward
                                  with Increasing Service) real-time tasks 217--228
            Robert J. T. Morris   Analysis of superposition of streams
                                  into a cache buffer  . . . . . . . . . . 229--235
                  Jory Tsai and   
                  Anant Agarwal   Analyzing multiprocessor cache behavior
                                  through data reference modeling  . . . . 236--247
         Margaret Martonosi and   
                Anoop Gupta and   
                Thomas Anderson   Effectiveness of trace sampling for
                                  performance debugging tools  . . . . . . 248--259
               Jong-Suk Ahn and   
            Peter B. Danzig and   
             Deborah Estrin and   
               Brenda Timmerman   Hybrid technique for simulating high
                                  bandwidth delay computer networks  . . . 260--261
          Jeffrey C. Becker and   
                     Arvin Park   An analysis of the information content
                                  of address and data reference streams    262--263
    Shahram Ghandeharizadeh and   
                     Luis Ramos   An evaluation of alternative virtual
                                  replication strategies for continuous
                                  retrieval of multimedia data . . . . . . 264--265
               Jonathan Kay and   
                Joseph Pasquale   A summary of TCP/IP networking software
                                  performance for the DECstation 5000  . . 266--267
           Gary Lewandowski and   
                Anne Condon and   
                      Eric Bach   Asynchronous analysis of parallel
                                  dynamic programming  . . . . . . . . . . 268--269
               Kang G. Shin and   
                    Chao-Ju Hou   Evaluation of load sharing in HARTS
                                  while considering message routing and
                                  broadcasting . . . . . . . . . . . . . . 270--271
            Josep Torrellas and   
              Andrew Tucker and   
                    Anoop Gupta   Benefits of cache-affinity scheduling in
                                  shared-memory multiprocessors: a summary 272--274
              Vidar Vetland and   
               Peter Hughes and   
           Arne Sòlvberg   A composite modelling approach to
                                  software performance measurement . . . . 275--276
                David B. Wagner   Approximate mean value analysis of
                                  interconnection networks with deflection
                                  routing  . . . . . . . . . . . . . . . . 277--278
            Carey L. Williamson   Optimizing file transfer response time
                                  using the loss-load curve congestion
                                  control mechanism  . . . . . . . . . . . 279--280

ACM SIGMETRICS Performance Evaluation Review
Volume 21, Number 2, December, 1993

                  Lester Lipsky   Book review: ``Introduction to Computer
                                  System Performance Evaluation'' by
                                  Krishna Kant (McGraw-Hill, 1992) . . . . 7--9
              Robert E. Kinicki   Book review: ``Telecommunications and
                                  Networking'' by Udo W. Pooch, Denis
                                  Machuel and John McCahn (CRC Press,
                                  1991)  . . . . . . . . . . . . . . . . . 9--10
                      Xiren Cao   Some common misconceptions about
                                  performance modeling and validation  . . 11--15
                Silvano Maffeis   Cache management algorithms for flexible
                                  filesystems  . . . . . . . . . . . . . . 16--25
             UNIX International   Performance management activities within
                                  UNIX International . . . . . . . . . . . 42--42

ACM SIGMETRICS Performance Evaluation Review
Volume 21, Number 3--4, April, 1994

             Jozo J. Dujmovi\'c   Book review: ``The Benchmarking Handbook
                                  for Database and Transaction Processing
                                  Systems'' Edited by Jim Gray (Morgan
                                  Kaufmann Publishers, Inc., 1991) . . . . 4--5
                   David Finkel   Book review: ``Encyclopedia of Computer
                                  Science'', Third Edition, edited by
                                  Anthony Ralston and Edwin I. Reilly (Van
                                  Nostrand Reinhold, 1993) . . . . . . . . 6--6
        Colleen D. Schieber and   
                Eric E. Johnson   RATCHET: real-time address trace
                                  compression hardware for extended traces 22--32
          Surendra M. Gupta and   
                Fikri Karaesmen   Solution to complex queueing systems: a
                                  spreadsheet approach . . . . . . . . . . 33--46


ACM SIGMETRICS Performance Evaluation Review
Volume 22, Number 1, May, 1994

               Peter J. Denning   The fifteenth level (keynote address)    1--4
          Vinod G. J. Peris and   
         Mark S. Squillante and   
                  Vijay K. Naik   Analysis of the impact of memory in
                                  distributed parallel processing systems  5--18
               Cathy McCann and   
                  John Zahorjan   Processor allocation policies for
                                  message-passing parallel computers . . . 19--32
              Su-Hui Chiang and   
     Rajesh K. Mansharamani and   
                 Mary K. Vernon   Use of application characteristics and
                                  limited preemption for run-to-completion
                                  parallel processor scheduling policies   33--44
               Joel L. Wolf and   
                 John Turek and   
             Ming-Syan Chen and   
                   Philip S. Yu   Scheduling multiple queries on a
                                  parallel machine . . . . . . . . . . . . 45--55
           Jignesh M. Patel and   
           Michael J. Carey and   
                 Mary K. Vernon   Accurate modeling of the hybrid hash
                                  join algorithm . . . . . . . . . . . . . 56--66
                 Avi Bittan and   
               Yaakov Kogan and   
                   Philip S. Yu   Asymptotic performance of a buffer model
                                  in a data sharing environment  . . . . . 67--76
               Dorina C. Petriu   Approximate mean value analysis of
                                  client-server systems with multi-class
                                  requests . . . . . . . . . . . . . . . . 77--86
                   G. Balbo and   
               S. C. Bruell and   
                      M. Sereno   Arrival theorems for product-form
                                  stochastic Petri nets  . . . . . . . . . 87--97
             Arun K. Somani and   
              Kishor S. Trivedi   Phased-mission system analysis using
                                  Boolean algebraic methods  . . . . . . . 98--107
            Maria R. Ebling and   
              M. Satyanarayanan   SynRGen: an extensible file reference
                                  generator  . . . . . . . . . . . . . . . 108--117
             S. V. Raghavan and   
          D. Vasukiammaiyar and   
                  Gunter Haring   Generative networkload models for a
                                  single server environment  . . . . . . . 118--127
                 Bob Cmelik and   
                   David Keppel   Shade: a fast instruction-set simulator
                                  for execution profiling  . . . . . . . . 128--137
             Brian D. Noble and   
              M. Satyanarayanan   An empirical study of a highly available
                                  file system  . . . . . . . . . . . . . . 138--149
          Michael D. Dahlin and   
         Clifford J. Mather and   
           Randolph Y. Wang and   
         Thomas E. Anderson and   
             David A. Patterson   A quantitative analysis of cache
                                  policies for scalable network file
                                  systems  . . . . . . . . . . . . . . . . 150--160
                 David Kotz and   
                   Preston Crow   The expected lifetime of
                                  ``single-address-space'' operating
                                  systems  . . . . . . . . . . . . . . . . 161--170
      Anand Sivasubramaniam and   
                Aman Singla and   
    Umakishore Ramachandran and   
               H. Venkateswaran   An approach to scalability study of
                                  shared memory parallel systems . . . . . 171--180
               Pankaj Mehra and   
     Catherine H. Schulbach and   
                   Jerry C. Yan   A comparison of two model-based
                                  performance-prediction techniques for
                                  message-passing parallel programs  . . . 181--190
              Graham Horton and   
           Scott T. Leutenegger   A multi-level solution algorithm for
                                  steady-state Markov chains . . . . . . . 191--200
               Samir R. Das and   
            Richard M. Fujimoto   An adaptive memory management protocol
                                  for Time Warp parallel simulation  . . . 201--210
                  Hui Zhang and   
             Edward W. Knightly   Providing end-to-end statistical
                                  performance guarantees with bounding
                                  interval dependent stochastic models . . 211--220
            Sridhar Pingali and   
                Don Towsley and   
                James F. Kurose   A comparison of sender-initiated and
                                  receiver-initiated reliable multicast
                                  protocols  . . . . . . . . . . . . . . . 221--230
          Ioanis Nikolaidis and   
           Richard Fujimoto and   
              C. Anthony Cooper   Time-parallel simulation of cascaded
                                  statistical multiplexers . . . . . . . . 231--240
       Bruce L. Worthington and   
          Gregory R. Ganger and   
                   Yale N. Patt   Scheduling algorithms for modern disk
                                  drives . . . . . . . . . . . . . . . . . 241--251
             David M. Nicol and   
              Shahid H. Bokhari   Optimal multiphase complete exchange on
                                  circuit-switched hypercube architectures 252--260
                   O. Temam and   
                 C. Fricker and   
                       W. Jalby   Cache interference phenomena . . . . . . 261--271
               John Danskin and   
                   Pat Hanrahan   Profiling the X protocol (extended
                                  abstract)  . . . . . . . . . . . . . . . 272--273
             Ann L. Drapeau and   
         David A. Patterson and   
                  Randy H. Katz   Toward workload characterization of
                                  video server and digital library
                                  applications (extended abstract) . . . . 274--275
          Deepinder S. Gill and   
              Songnian Zhou and   
            Harjinder S. Sandhu   A case study of file system workload in
                                  a large-scale distributed environment    276--277
          Joseph L. Hellerstein   A comparison of techniques for
                                  diagnosing performance problems in
                                  information systems (extended abstract)  278--279
                 J. William Lee   Efficient user-level communication on
                                  multicomputers with an optimistic
                                  flow-control protocol (extended
                                  abstract)  . . . . . . . . . . . . . . . 280--281
                J. A. Rolia and   
                 M. Starkey and   
                     G. Boersma   Modeling RPC performance . . . . . . . . 282--283
            Athar B. Tayyab and   
                    Jon G. Kuhl   Stochastic performance models of
                                  parallel task systems (extended
                                  abstract)  . . . . . . . . . . . . . . . 284--285
              Richard Uhlig and   
                David Nagle and   
               Trevor Mudge and   
                Stuart Sechrest   Kernel-based memory simulation (extended
                                  abstract)  . . . . . . . . . . . . . . . 286--287
              Harald Wabnig and   
             Günter Haring   Performance prediction of parallel
                                  systems with scalable specifications ---
                                  methodology and case study . . . . . . . 288--289

ACM SIGMETRICS Performance Evaluation Review
Volume 22, Number 2--4, April, 1995

                S. S. Lavenberg   Selected publications of the Systems
                                  Analysis and Systems Applications
                                  department of the IBM T. J. Watson
                                  Research Center  . . . . . . . . . . . . 6--17
                Kim Shanley and   
                Tracy Derossett   TPC-D measures how quickly real-world
                                  business questions can be answered . . . 18--45
                  H. Wabnig and   
                      G. Haring   Performance prediction of parallel
                                  systems with scalable specifications ---
                                  methodology and case study . . . . . . . 46--62
              Surendra M. Gupta   Queueing model with state dependent
                                  balking and reneging: its complementary
                                  and equivalence  . . . . . . . . . . . . 63--72
                    D. G. Keehn   Visualizing performance in the frequency
                                  plane  . . . . . . . . . . . . . . . . . 73--81


ACM SIGMETRICS Performance Evaluation Review
Volume 23, Number 1, May, 1995

                John Chapin and   
                  A. Herrod and   
           Mendel Rosenblum and   
                    Anoop Gupta   Memory system performance of UNIX on
                                  CC-NUMA multiprocessors  . . . . . . . . 1--13
             Robert C. Bedichek   Talisman: fast and accurate
                                  multicomputer simulation . . . . . . . . 14--24
            Leana Golubchik and   
             John C. S. Lui and   
                  Richard Muntz   Reducing I/O demand in video-on-demand
                                  storage servers  . . . . . . . . . . . . 25--36
    Shahram Ghandeharizadeh and   
                Seon Ho Kim and   
                  Cyrus Shahabi   On configuring a single disk continuous
                                  media server . . . . . . . . . . . . . . 37--46
               Marwan Krunz and   
                  Herman Hughes   A traffic for MPEG-coded VBR streams . . 47--55
            Carey L. Williamson   Network traffic measurement and modeling 56--57
                   Erol Gelenbe   G-networks: new queueing models with
                                  additional control capabilities  . . . . 58--59
         Srini Tridandapani and   
           Anton T. Dahbura and   
          Charles U. Martel and   
              John Matthews and   
                 Arun K. Somani   Free performance and fault tolerance
                                  (extended abstract): using system idle
                                  capacity efficiently . . . . . . . . . . 60--61
                Allen D. Malony   Data interpretation and experiment
                                  planning in performance tools  . . . . . 62--63
                Nitin H. Vaidya   A case for two-level distributed
                                  recovery schemes . . . . . . . . . . . . 64--73
                 D. H. J. Epema   An analysis of decay-usage scheduling in
                                  multiprocessors  . . . . . . . . . . . . 74--85
              Anwar Elwalid and   
              Daniel Heyman and   
             T. V. Lakshman and   
              Debasis Mitra and   
                     Alan Weiss   Fundamental results on the performance
                                  of ATM multiplexers with applications to
                                  video teleconferencing . . . . . . . . . 86--97
         Edward W. Knightly and   
            Dallas E. Wrege and   
        Jörg Liebeherr and   
                      Hui Zhang   Fundamental limits and tradeoffs of
                                  providing deterministic guarantees to
                                  VBR video traffic  . . . . . . . . . . . 98--107
               Youjian Fang and   
      Michael Devetsikiotis and   
         Ioannis Lambadaris and   
                  A. Roger Kaye   Exponential bounds for the waiting time
                                  distribution in Markovian queues, with
                                  applications to TES/GI/1 systems . . . . 108--115
                    S. C. Borst   Optimal probabilistic allocation of
                                  customer types to servers  . . . . . . . 116--125
              Ibrahim Matta and   
               A. Udaya Shankar   Z-iteration: a simple method for
                                  throughput estimation in time-dependent
                                  multi-class systems  . . . . . . . . . . 126--135
              Peter M. Chen and   
                  Edward K. Lee   Striping in a RAID level 5 disk array    136--145
       Bruce L. Worthington and   
          Gregory R. Ganger and   
               Yale N. Patt and   
                    John Wilkes   On-line extraction of SCSI disk drive
                                  parameters . . . . . . . . . . . . . . . 146--156
               Joel L. Wolf and   
               Philip S. Yu and   
                 Hadas Shachnai   DASD dancing: a disk load balancing
                                  optimization scheme for video-on-demand
                                  computer systems . . . . . . . . . . . . 157--166
        Harjinder S. Sandhu and   
              Kenneth C. Sevcik   An analytic study of dynamic hardware
                                  and software cache coherence strategies  167--177
                  Mats Brorsson   SM-prof: a tool to visualise and find
                                  cache coherence performance bottlenecks
                                  in multiprocessor programs . . . . . . . 178--187
                    Pei Cao and   
           Edward W. Felten and   
             Anna R. Karlin and   
                         Kai Li   A study of integrated prefetching and
                                  caching strategies . . . . . . . . . . . 188--197
      Anand Sivasubramaniam and   
                Aman Singla and   
    Umakishore Ramachandran and   
               H. Venkateswaran   On characterizing bandwidth requirements
                                  of parallel applications . . . . . . . . 198--207
               Cathy McCann and   
                  John Zahorjan   Scheduling memory constrained jobs on
                                  distributed memory parallel computers    208--219
            Alvin R. Lebeck and   
                  David A. Wood   Active memory: a new abstraction for
                                  memory-system simulation . . . . . . . . 220--230
   Edmundo de Souza e Silva and   
            H. Richard Gail and   
       Reinaldo Vallejos Campos   Calculating transient distributions of
                                  cumulative reward  . . . . . . . . . . . 231--240
           Juan A. Carrasco and   
          Angel Calderón   Regenerative randomization: theory and
                                  application examples . . . . . . . . . . 241--252
        Albert G. Greenberg and   
                     R. Srikant   Computational techniques for accurate
                                  performance evaluation of multirate,
                                  multihop communication networks  . . . . 253--260
                       Teun Ott   The Internet in evolution, and TCP over
                                  ATM (panel session)  . . . . . . . . . . 261--262
          Kishor S. Trivedi and   
                  A. Bobbio and   
                  G. Ciardo and   
                  R. German and   
               A. Puliafito and   
                       M. Telek   Non-Markovian Petri nets . . . . . . . . 263--264
                Ashok Erramilli   Performance impacts of self-similarity
                                  in traffic . . . . . . . . . . . . . . . 265--266
            Remzi H. Arpaci and   
          Andrea C. Dusseau and   
             Amin M. Vahdat and   
                 Lok T. Liu and   
         Thomas E. Anderson and   
             David A. Patterson   The interaction of parallel and
                                  sequential workloads on a network of
                                  workstations . . . . . . . . . . . . . . 267--278
            Jussi Myllymaki and   
                    Miron Livny   Disk-tape joins: synchronizing disk and
                                  tape access  . . . . . . . . . . . . . . 279--290
           Vidyadhar Phalke and   
         Bhaskarpillai Gopinath   An inter-reference gap model for
                                  temporal locality in program behavior    291--300
                     Jan Braams   Batch class process scheduler for Unix
                                  SVR4 . . . . . . . . . . . . . . . . . . 301--302
               S. Donatelli and   
               G. Franceschinis   State space reductions using stochastic
                                  well-formed net simplifications: an
                                  application to random polling systems    303--304
                 S. Balsamo and   
                        I. Mura   Approximate response time distribution
                                  in Fork and Join systems . . . . . . . . 305--306
             Xiaodong Zhang and   
                     Zhichen Xu   A semi-empirical approach to scalability
                                  study  . . . . . . . . . . . . . . . . . 307--308
                Eric Hughes and   
              Marianne Winslett   PEDCAD: a framework for performance
                                  evaluation of object database
                                  applications . . . . . . . . . . . . . . 309--310
            James D. Salehi and   
            James F. Kurose and   
                    Don Towsley   Scheduling for cache affinity in
                                  parallelized communication protocols . . 311--312
         Amit K. Chatterjee and   
               Vijay K. Konangi   Modeling and analysis of multi channel
                                  asymmetric packet switch modules in a
                                  bursty and nonuniform traffic
                                  environment  . . . . . . . . . . . . . . 313--314
                Gautam Shah and   
    Umakishore Ramachandran and   
               Richard Fujimoto   Timepatch: a novel technique for the
                                  parallel simulation of multiprocessor
                                  caches . . . . . . . . . . . . . . . . . 315--316
          C. R. M. Sundaram and   
                 Derek L. Eager   Future applicability of bus-based shared
                                  memory multiprocessors . . . . . . . . . 317--318
          Gianfranco Ciardo and   
         Ludmila Cherkasova and   
                Vadim Kotov and   
                  Tomas Rokicki   Modeling a Fibre Channel switch with
                                  stochastic Petri nets  . . . . . . . . . 319--320
      Meenakshi Arunachalam and   
                 Alok Choudhary   A prefetching prototype for the parallel
                                  file systems on the Paragon  . . . . . . 321--322


ACM SIGMETRICS Performance Evaluation Review
Volume 24, Number 1, May, 1996

          R. Gopalakrishnan and   
          Gurudatta M. Parulkar   Bringing real-time scheduling theory and
                                  practice closer for multimedia computing 1--12
         Mor Harchol-Balter and   
                Allen B. Downey   Exploiting process lifetime
                                  distributions for dynamic load balancing 13--24
          Andrea C. Dusseau and   
            Remzi H. Arpaci and   
                David E. Culler   Effective distributed scheduling of
                                  parallel workloads . . . . . . . . . . . 25--36
              Beng-Hong Lim and   
              Ricardo Bianchini   Limits on the performance benefits of
                                  multithreading and prefetching . . . . . 37--46
             Peter A. Dinda and   
            David R. O'Hallaron   Fast message assembly using compact
                                  address relations  . . . . . . . . . . . 47--56
            Eric W. Parsons and   
              Kenneth C. Sevcik   Coordinated allocation of memory and
                                  processors in multiprocessors  . . . . . 57--67
             Emmett Witchel and   
               Mendel Rosenblum   Embra: fast and flexible machine
                                  simulation . . . . . . . . . . . . . . . 68--79
         Lawrence S. Brakmo and   
              Larry L. Peterson   Experiences with network simulation  . . 80--90
        Albert G. Greenberg and   
                 S. Shenker and   
           Alexander L. Stolyar   Asynchronous updates in large parallel
                                  systems  . . . . . . . . . . . . . . . . 91--103
        Dimitrios Stiliadis and   
                   Anujan Varma   Design and analysis of frame-based fair
                                  queueing: a new traffic scheduling
                                  algorithm for packet-switched networks   104--115
             David J. Yates and   
             Erich M. Nahum and   
            James F. Kurose and   
                    Don Towsley   Networking support for large scale
                                  multiprocessor servers . . . . . . . . . 116--125
           Martin F. Arlitt and   
            Carey L. Williamson   Web server workload characterization:
                                  the search for invariants  . . . . . . . 126--137
         Margaret Martonosi and   
                David Ofelt and   
                  Mark Heinrich   Integrating performance monitoring and
                                  communication in parallel computers  . . 138--147
         Umesh Krishnaswamy and   
              Isaac D. Scherson   Micro-architecture evaluation using
                                  performance vectors  . . . . . . . . . . 148--159
           Mark E. Crovella and   
                 Azer Bestavros   Self-similarity in World Wide Web
                                  traffic: evidence and possible causes    160--169
           Bruce K. Hillyer and   
               Avi Silberschatz   On the modeling and performance
                                  characteristics of a serpentine tape
                                  drive  . . . . . . . . . . . . . . . . . 170--179
   Daniel A. Menascé and   
     Odysseas I. Pentakalos and   
                   Yelena Yesha   An analytic model of hierarchical mass
                                  storage systems with network-attached
                                  storage devices  . . . . . . . . . . . . 180--189
                   Ken Chen and   
           Laurent Decreusefond   An approximate analysis of waiting time
                                  in multi-class M/G/1/./EDF queues  . . . 190--199
             Charu Aggarwal and   
                  Joel Wolf and   
                   Philip S. Yu   On optimal piggyback merging policies
                                  for video-on-demand systems  . . . . . . 200--209
             Richard Gerber and   
                   Ladan Gharai   Experiments with digital video playback  210--221
            James D. Salehi and   
               Zhi-Li Zhang and   
            James F. Kurose and   
                    Don Towsley   Supporting stored video: reducing rate
                                  variability and end-to-end resource
                                  requirements through optimal smoothing   222--231
            Elizabeth Varki and   
              Lawrence W. Dowdy   Analysis of balanced fork-join queueing
                                  networks . . . . . . . . . . . . . . . . 232--241
           Juan A. Carrasco and   
      Javier Escribá and   
          Angel Calderón   Efficient exploration of availability
                                  models guided by failure distances . . . 242--251
                Sachin Garg and   
               Yennun Huang and   
            Chandra Kintala and   
              Kishor S. Trivedi   Minimizing completion time of a program
                                  by checkpointing and rejuvenation  . . . 252--261
              Tracy Kimbrel and   
                    Pei Cao and   
           Edward W. Felten and   
             Anna R. Karlin and   
                         Kai Li   Integrated parallel prefetching and
                                  caching  . . . . . . . . . . . . . . . . 262--263
       Scott T. Leutenegger and   
                 Mario A. Lopez   A buffer model for evaluating R-tree
                                  performance  . . . . . . . . . . . . . . 264--265
          Joseph L. Hellerstein   An approach to selecting metrics for
                                  detecting performance problems in
                                  information systems  . . . . . . . . . . 266--267
   William V. Courtright II and   
               Garth Gibson and   
               Mark Holland and   
                    Jim Zelenka   RAIDframe: rapid prototyping for disk
                                  arrays . . . . . . . . . . . . . . . . . 268--269
         Swaminathan Ramany and   
                    Derek Eager   Quantifying achievable routing
                                  performance in multiprocessor
                                  interconnection networks . . . . . . . . 270--271
              Steven Hotovy and   
            David Schneider and   
              Timothy O'Donnell   Analysis of the early workload on the
                                  Cornell Theory Center IBM SP2  . . . . . 272--273


ACM SIGMETRICS Performance Evaluation Review
Volume 25, Number 1, June, 1997

              Hans-Werner Braun   Architecture and performance of large
                                  internets, based on terrestrial and
                                  satellite infrastructure . . . . . . . . 1--1
          Hari Balakrishnan and   
                 Mark Stemm and   
          Srinivasan Seshan and   
                  Randy H. Katz   Analyzing stability in wide-area network
                                  performance  . . . . . . . . . . . . . . 2--12
            Carlos Maltzahn and   
        Kathy J. Richardson and   
                  Dirk Grunwald   Performance issues of enterprise level
                                  Web proxies  . . . . . . . . . . . . . . 13--23
               D. P. Heyman and   
             T. V. Lakshman and   
            Arnold L. Neidhardt   A new method for analysing
                                  feedback-based protocols with
                                  applications to engineering Web traffic
                                  over the Internet  . . . . . . . . . . . 24--38
                Qingming Ma and   
             K. K. Ramakrishnan   Queue management for explicit rate based
                                  congestion control . . . . . . . . . . . 39--51
              Teunis J. Ott and   
                  Neil Aggarwal   TCP over ATM: ABR or UBR?  . . . . . . . 52--63
            Sneha K. Kasera and   
                 Jim Kurose and   
                    Don Towsley   Scalable reliable multicast using
                                  multiple multicast groups  . . . . . . . 64--74
      Ramakrishnan Rajamony and   
                    Alan L. Cox   Performance debugging shared memory
                                  parallel programs using run-time
                                  dependence analysis  . . . . . . . . . . 75--87
         Martin C. Herbordt and   
               Owais Kidwai and   
               Charles C. Weems   Preprototyping SIMD coprocessors using
                                  virtual machine emulation and trace
                                  compilation  . . . . . . . . . . . . . . 88--99
             Andrew Tomkins and   
          R. Hugo Patterson and   
                   Garth Gibson   Informed multi-process prefetching and
                                  caching  . . . . . . . . . . . . . . . . 100--114
               Gideon Glass and   
                        Pei Cao   Adaptive page replacement based on
                                  memory reference behavior  . . . . . . . 115--126
        Geoffrey M. Voelker and   
   Hervé A. Jamrozik and   
             Mary K. Vernon and   
              Henry M. Levy and   
             Edward D. Lazowska   Managing server load in global memory
                                  systems  . . . . . . . . . . . . . . . . 127--138
            Michael E. Woodward   Size-limited batch movement in
                                  product-form closed discrete-time
                                  queueing networks  . . . . . . . . . . . 139--146
            Leana Golubchik and   
                 John C. S. Lui   Bounding of performance measures for a
                                  threshold-based queueing system with
                                  hysteresis . . . . . . . . . . . . . . . 147--157
               John P. Lehoczky   Using real-time queueing theory to
                                  control lateness in real-time systems    158--168
                Erich Nahum and   
                David Yates and   
                 Jim Kurose and   
                    Don Towsley   Cache behavior of network protocols  . . 169--180
             Edward W. Knightly   Second moment resource allocation in
                                  multi-service networks . . . . . . . . . 181--191
               Marwan Krunz and   
             Satish K. Tripathi   On the characterization of VBR MPEG
                                  streams  . . . . . . . . . . . . . . . . 192--202
             Keith A. Smith and   
               Margo I. Seltzer   File system aging --- increasing the
                                  relevance of file system benchmarks  . . 203--213
             Aaron B. Brown and   
               Margo I. Seltzer   Operating system benchmarking in the
                                  wake of lmbench: a case study of the
                                  performance of NetBSD on the Intel x86
                                  architecture . . . . . . . . . . . . . . 214--224
             Anurag Acharya and   
                Guy Edjlali and   
                     Joel Saltz   The utility of exploiting idle
                                  workstations for parallel computation    225--234
                Xiaohan Qin and   
                 Jean-Loup Baer   A performance evaluation of cluster
                                  architectures  . . . . . . . . . . . . . 237--247
            Tzi-cker Chiueh and   
           Srinidhi Varadarajan   Design and evaluation of a DRAM-based
                                  shared memory ATM switch . . . . . . . . 248--259
               Junehwa Song and   
                   Asit Dan and   
                 Dinkar Sitaram   Efficient retrieval of composite
                                  multimedia objects in the JINSIL
                                  distributed system . . . . . . . . . . . 260--271
            Garth A. Gibson and   
             David F. Nagle and   
               Khalil Amiri and   
               Fay W. Chang and   
         Eugene M. Feinberg and   
             Howard Gobioff and   
                   Chen Lee and   
              Berend Ozceri and   
                Erik Riedel and   
             David Rochberg and   
                    Jim Zelenka   File server scaling with
                                  network-attached secure disks  . . . . . 272--284
     Athanassios K. Tsiolis and   
                 Mary K. Vernon   Group-guaranteed channel capacity in
                                  multimedia storage servers . . . . . . . 285--297

ACM SIGMETRICS Performance Evaluation Review
Volume 25, Number 2, September, 1997

                  Richard Muntz   Special Issue on Multimedia Storage
                                  Systems  . . . . . . . . . . . . . . . . 2--2
            Banu Özden and   
             Rajeev Rastogi and   
               Avi Silberschatz   Architecture issues in multimedia
                                  storage systems  . . . . . . . . . . . . 3--12
                Weifeng Shi and   
        Shahram Ghandeharizadeh   Buffer sharing in video-on-demand
                                  servers  . . . . . . . . . . . . . . . . 13--20
                Leana Golubchik   On issues and tradeoffs in design of
                                  fault tolerant VOD servers . . . . . . . 21--28
              Richard Muntz and   
         Jose Renato Santos and   
                   Steve Berson   RIO: a real-time multimedia object
                                  server . . . . . . . . . . . . . . . . . 29--35
          Michele Colajanni and   
                   Philip S. Yu   Adaptive TTL schemes for load balancing
                                  of distributed Web servers . . . . . . . 36--42

ACM SIGMETRICS Performance Evaluation Review
Volume 25, Number 3, December, 1997

                     David Kotz   Special Issue on Parallel I/O Systems    2--2
           Thomas H. Cormen and   
                 David M. Nicol   Out-of-core FFTs with parallel disks . . 3--12
          Maria Papadopouli and   
                Leana Golubchik   Support of VBR video streams under disk
                                  bandwidth limitations  . . . . . . . . . 13--20
          Rajesh Bordawekar and   
            Steven Landherr and   
                  Don Capps and   
                     Mark Davis   Experimental evaluation of the
                                  Hewlett--Packard Exemplar file system    21--28
             David Rochberg and   
                   Garth Gibson   Prefetching over a network: early
                                  experience with CTIP . . . . . . . . . . 29--36
                  Jai Menon and   
                   Kent Treiber   Daisy: virtual-disk hierarchical storage
                                  manager  . . . . . . . . . . . . . . . . 37--44

ACM SIGMETRICS Performance Evaluation Review
Volume 25, Number 4, March, 1998

                 David M. Nicol   Special Issue on the Telecommunications
                                  Description Language . . . . . . . . . . 3--3
           Kalyan Perumalla and   
           Richard Fujimoto and   
                Andrew Ogielski   TED --- a language for modeling
                                  telecommunication networks . . . . . . . 4--11
           Kalyan Perumalla and   
            Matthew Andrews and   
                  Sandeep Bhatt   TED models for ATM internetworks . . . . 12--21
             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   Optimistic parallel simulation of
                                  reliable multicast protocols . . . . . . 22--29
            Jignesh Panchal and   
                 Owen Kelly and   
                    Jie Lai and   
           Narayan Mandayam and   
        Andarew T. Ogielski and   
                      Roy Yates   Parallel simulations of wireless
                                  networks with TED: radio propagation,
                                  mobility and protocols . . . . . . . . . 30--39
           Brian J. Premore and   
                 David M. Nicol   Transformation of ns TCP models to TED   40--48


ACM SIGMETRICS Performance Evaluation Review
Volume 26, Number 1, June, 1998

              V. Srinivasan and   
                George Varghese   Faster IP lookups using controlled
                                  prefix expansion . . . . . . . . . . . . 1--10
                    Vern Paxson   On calibrating measurements of packet
                                  transit times  . . . . . . . . . . . . . 11--21
           Randolph Y. Wang and   
       Arvind Krishnamurthy and   
          Richard P. Martin and   
         Thomas E. Anderson and   
                David E. Culler   Modeling communication pipeline latency  22--32
        Geoffrey M. Voelker and   
           Eric J. Anderson and   
              Tracy Kimbrel and   
          Michael J. Feeley and   
           Jeffrey S. Chase and   
             Anna R. Karlin and   
                  Henry M. Levy   Implementing cooperative prefetching and
                                  caching in a globally-managed memory
                                  system . . . . . . . . . . . . . . . . . 33--43
         Prashant J. Shenoy and   
                 Harrick M. Vin   Cello: a disk scheduling framework for
                                  next generation operating systems  . . . 44--55
               Emilia Rosti and   
           Giuseppe Serazzi and   
             Evgenia Smirni and   
             Mark S. Squillante   The impact of I/O on program behavior
                                  and parallel scheduling  . . . . . . . . 56--65
              Sandeep Bajaj and   
                Lee Breslau and   
                  Scott Shenker   Is service priority useful in networks?  66--77
        Lampros Kalampoukas and   
               Anujan Varma and   
             K. K. Ramakrishnan   Improving TCP throughput over two-way
                                  asymmetric links: analysis and solutions 78--89
             Suchitra Raman and   
             Steven McCanne and   
                  Scott Shenker   Asymptotic behavior of global recovery
                                  in SRM . . . . . . . . . . . . . . . . . 90--99
                O. J. Boxma and   
                       V. Dumas   The busy period in the fluid queue . . . 100--110
             Guang-Liang Li and   
               Jun-Hong Cui and   
                      Bo Li and   
                   Fang-Ming Li   Transient loss performance of a class of
                                  finite buffer queueing systems . . . . . 111--120
         Martin W. McKinnon and   
          George N. Rouskas and   
                Harry G. Perros   Queueing-based analysis of broadcast
                                  optical networks . . . . . . . . . . . . 121--130
             Andy C. Bavier and   
             A. Brady Montz and   
              Larry L. Peterson   Predicting MPEG execution times  . . . . 131--140
          Steven D. Gribble and   
        Gurmeet Singh Manku and   
               Drew Roselli and   
             Eric A. Brewer and   
          Timothy J. Gibson and   
                Ethan L. Miller   Self-similarity in file systems  . . . . 141--150
               Paul Barford and   
                  Mark Crovella   Generating representative Web workloads
                                  for network and server performance
                                  evaluation . . . . . . . . . . . . . . . 151--160
                  Minwen Ji and   
           Edward W. Felten and   
                         Kai Li   Performance measurements for
                                  multithreaded programs . . . . . . . . . 161--170
             Dongming Jiang and   
            Jaswinder Pal Singh   A methodology and an evaluation of the
                                  SGI Origin 2000  . . . . . . . . . . . . 171--181
          Elizabeth Shriver and   
              Arif Merchant and   
                    John Wilkes   An analytic behavior model for disk
                                  drives with readahead caches and request
                                  reordering . . . . . . . . . . . . . . . 182--191
        Basilio B. Fraguela and   
        Ramón Doallo and   
               Emilio L. Zapata   Modeling set associative caches behavior
                                  for irregular computations . . . . . . . 192--201
               Tianji Jiang and   
           Mostafa H. Ammar and   
                Ellen W. Zegura   Inter-receiver fairness: a novel
                                  performance measure for multicast ABR
                                  sessions . . . . . . . . . . . . . . . . 202--211
        Costas Courcoubetis and   
          Vasilios A. Siris and   
            George D. Stamoulis   Application and evaluation of large
                                  deviation techniques for traffic
                                  engineering in broadband networks  . . . 212--221
        Arnold L. Neidhardt and   
               Jonathan L. Wang   The concept of relevant time scales and
                                  its application to queuing analysis of
                                  self-similar traffic (or is Hurst
                                  naughty or nice?)  . . . . . . . . . . . 222--232
   Andrea C. Arpaci-Dusseau and   
            David E. Culler and   
             Alan M. Mainwaring   Scheduling with implicit information in
                                  distributed systems  . . . . . . . . . . 233--243
              Thu D. Nguyen and   
                  John Zahorjan   Scheduling policies to support
                                  distributed $3$D multimedia applications 244--253
        Csaba Andras Moritz and   
               Matthew I. Frank   LoGPC: modeling network contention in
                                  message-passing programs . . . . . . . . 254--263
               Rakesh Barve and   
          Elizabeth Shriver and   
         Phillip B. Gibbons and   
           Bruce K. Hillyer and   
               Yossi Matias and   
           Jeffrey Scott Vitter   Modeling and optimizing I/O throughput
                                  of multiple disks on a bus (summary) . . 264--265
          Robert D. Blumofe and   
         Dionisios Papadopoulos   The performance of work stealing in
                                  multiprogrammed environments (extended
                                  abstract)  . . . . . . . . . . . . . . . 266--267
           Mark E. Crovella and   
         Mor Harchol-Balter and   
              Cristina D. Murta   Task assignment in a distributed system
                                  (extended abstract): improving
                                  performance by unbalancing load  . . . . 268--269
             Stephen Manley and   
              Margo Seltzer and   
                Michael Courage   A self-scaling and self-configuring
                                  benchmark for Web servers (extended
                                  abstract)  . . . . . . . . . . . . . . . 270--271
              Alex Rousskov and   
                Valery Soloviev   On performance of caching proxies
                                  (extended abstract)  . . . . . . . . . . 272--273
                  J. Waldby and   
                  U. Madhow and   
                 T. V. Lakshman   Total acknowledgements (extended
                                  abstract): a robust feedback mechanism
                                  for end-to-end congestion control  . . . 274--275
           Thomas E. Willis and   
            George B. Adams III   Portable, continuous recording of
                                  complete computer behavior with low
                                  overhead (extended abstract) . . . . . . 276--277
             Anurag Acharya and   
                  Sanjeev Setia   Using idle memory for data-intensive
                                  computations (extended abstract) . . . . 278--279
           Mohamed Aboutabl and   
             Ashok Agrawala and   
      Jean-Dominique Decotignie   Temporally determinate disk access
                                  (extended abstract): an experimental
                                  approach . . . . . . . . . . . . . . . . 280--281

ACM SIGMETRICS Performance Evaluation Review
Volume 26, Number 2, August, 1998

           M. Ajmone Marsan and   
                   G. Balbo and   
                   G. Conte and   
               S. Donatelli and   
               G. Franceschinis   Modelling with Generalized Stochastic
                                  Petri Nets . . . . . . . . . . . . . . . 2--2
                Falko Bause and   
           Pieter S. Kritzinger   Stochastic Petri Nets: An Introduction
                                  to the Theory  . . . . . . . . . . . . . 2--3
            Christoph Lindemann   Performance Modelling with Deterministic
                                  and Stochastic Petri Nets  . . . . . . . 3--3
            Christoph Lindemann   Special issue on stochastic Petri nets   4--4
             Peter Buchholz and   
                   Peter Kemper   On generating a hierarchy for GSPN
                                  analysis . . . . . . . . . . . . . . . . 5--14
          Ricardo M. Fricks and   
          Antonio Puliafito and   
        Miklós Telek and   
              Kishor S. Trivedi   Applications of non-Markovian stochastic
                                  Petri nets . . . . . . . . . . . . . . . 15--27
        Marco Ajmone Marsan and   
                  Rossano Gaeta   Modeling ATM systems with GSPNs and SWNs 28--37
              Alexander Ost and   
         Boudewijn R. Haverkort   Analysis of windowing mechanisms with
                                  infinite-state stochastic Petri nets . . 38--46

ACM SIGMETRICS Performance Evaluation Review
Volume 26, Number 3, December, 1998

         Jozo J. Dujmovi\'c and   
                 Ivo Dujmovi\'c   Evolution and evaluation of SPEC
                                  benchmarks . . . . . . . . . . . . . . . 2--9
                    Pei Cao and   
                Sekhar Sarukkai   Guest Editors' Introduction  . . . . . . 10--10
Ramón Cáceres and   
               Fred Douglis and   
              Anja Feldmann and   
               Gideon Glass and   
             Michael Rabinovich   Web proxy caching: the devil is in the
                                  details  . . . . . . . . . . . . . . . . 11--15
      Diwakar Krishnamurthy and   
                   Jerome Rolia   Predicting the QoS of an electronic
                                  commerce server: those mean percentiles  16--22
               Gaurav Bangs and   
             Peter Druschel and   
               Jeffrey C. Mogul   Better operating system features for
                                  faster network servers . . . . . . . . . 23--30
            David Mosberger and   
                        Tai Jin   httperf --- a tool for measuring Web
                                  server performance . . . . . . . . . . . 31--37
                   Amy Ward and   
                Peter Glynn and   
               Kathy Richardson   Internet service performance failure
                                  detection  . . . . . . . . . . . . . . . 38--43
               Mehmet Sayal and   
             Yuri Breitbart and   
          Peter Scheuermann and   
                Radek Vingralek   Selection algorithms for replicated Web
                                  servers  . . . . . . . . . . . . . . . . 44--50

ACM SIGMETRICS Performance Evaluation Review
Volume 26, Number 4, March, 1999

   Jeffrey K. Hillingsworth and   
               Barton P. Miller   Summary of the SIGMETRICS Symposium on
                                  Parallel and Distributed Processing  . . 2--12
              Kenneth C. Sevcik   Special Issue on Scheduling in
                                  Multiprogrammed Parallel Systems . . . . 13--13
            Allen B. Downey and   
              Dror G. Feitelson   The elusive goal of workload
                                  characterization . . . . . . . . . . . . 14--29
              Sanjeev Setia and   
         Mark S. Squillante and   
                  Vijay K. Naik   The impact of job memory requirements on
                                  gang-scheduling performance  . . . . . . 30--39
             Yuet-Ning Chan and   
      Sivarama P. Dandamudi and   
            Shikharesh Majumdar   Experiences with parallel job scheduling
                                  on a transputer system . . . . . . . . . 40--51
         Mark S. Squillante and   
               David D. Yao and   
                       Li Zhang   The impact of job arrival patterns on
                                  parallel scheduling  . . . . . . . . . . 52--59
                L. W. Dowdy and   
                   E. Rosti and   
                 G. Serazzi and   
                      E. Smirni   Scheduling issues in high-performance
                                  computing  . . . . . . . . . . . . . . . 60--69


ACM SIGMETRICS Performance Evaluation Review
Volume 27, Number 1, June, 1999

           Vinay J. Ribeiro and   
            Rudolf H. Riedi and   
          Matthew S. Crouse and   
            Richard G. Baraniuk   Simulation of nonGaussian
                                  long-range-dependent traffic using
                                  wavelets . . . . . . . . . . . . . . . . 1--12
                   Wei Zhao and   
             Satish K. Tripathi   Bandwidth-efficient continuous media
                                  streaming through optimal multiplexing   13--22
              Sanjeev Kumar and   
             Dongming Jiang and   
              Rohit Chandra and   
            Jaswinder Pal Singh   Evaluating synchronization on shared
                                  address space multiprocessors:
                                  methodology and performance  . . . . . . 23--34
             Anurag Acharya and   
                  Sanjeev Setia   Availability and utility of idle memory
                                  in workstation clusters  . . . . . . . . 35--46
            Scott F. Kaplan and   
         Yannis Smaragdakis and   
                 Paul R. Wilson   Trace reduction for virtual memory
                                  simulations  . . . . . . . . . . . . . . 47--58
            John R. Douceur and   
             William J. Bolosky   A large-scale study of file-system
                                  contents . . . . . . . . . . . . . . . . 59--70
          Richard P. Martin and   
                David E. Culler   NFS sensitivity to high performance
                                  networks . . . . . . . . . . . . . . . . 71--82
               Rakesh Barve and   
          Elizabeth Shriver and   
         Phillip B. Gibbons and   
           Bruce K. Hillyer and   
               Yossi Matias and   
           Jeffrey Scott Vitter   Modeling and optimizing I/O throughput
                                  of multiple disks on a bus . . . . . . . 83--92
             Jay Sethuraman and   
             Mark S. Squillante   Optimal stochastic scheduling in
                                  multiclass parallel queues . . . . . . . 93--102
                Elizabeth Varki   Mean value technique for closed
                                  fork-join networks . . . . . . . . . . . 103--112
         Peter A. Franaszek and   
        Philip Heidelberger and   
              Michael Wazlowski   On management of free space in
                                  compressed memory systems  . . . . . . . 113--121
         Yannis Smaragdakis and   
               Scott Kaplan and   
                    Paul Wilson   EELRU: simple and effective adaptive
                                  page replacement . . . . . . . . . . . . 122--133
                Donghee Lee and   
               Jongmoo Choi and   
               Jong-Hun Kim and   
                 Sam H. Noh and   
              Sang Lyul Min and   
                 Yookun Cho and   
                 Chong Sang Kim   On the existence of a spectrum of
                                  policies that subsumes the least
                                  recently used (LRU) and least frequently
                                  used (LFU) policies  . . . . . . . . . . 134--143
              Reiner Ludwig and   
              Bela Rathonyi and   
            Almudena Konrad and   
              Kimberly Oden and   
                 Anthony Joseph   Multi-layer tracing of TCP over a
                                  reliable wireless link . . . . . . . . . 144--154
               Farooq Anjum and   
             Leandros Tassiulas   On the behavior of different TCP
                                  algorithms over a wireless channel with
                                  correlated packet losses . . . . . . . . 155--165
   Kunwadee Sripanidkulchai and   
                 Andy Myers and   
                      Hui Zhang   A third-party value-added network
                                  service approach to reliable multicast   166--177
                     Li Fan and   
                    Pei Cao and   
                    Wei Lin and   
                 Quinn Jacobson   Web prefetching between low-bandwidth
                                  clients and proxies: potential and
                                  performance  . . . . . . . . . . . . . . 178--187
               Paul Barford and   
                  Mark Crovella   A performance evaluation of hyper text
                                  transfer protocols . . . . . . . . . . . 188--197
                 Huican Zhu and   
                  Ben Smith and   
                       Tao Yang   Hierarchical resource management for Web
                                  server clusters with dynamic content . . 198--199
                 Cheng Liao and   
         Margaret Martonosi and   
               Douglas W. Clark   An adaptive globally-synchronizing clock
                                  algorithm and its implementation on a
                                  Myrinet-based PC cluster . . . . . . . . 200--201
               ChengFu Chou and   
            Leana Golubchik and   
                 John C. S. Lui   A performance study of dynamic
                                  replication techniques in continuous
                                  media servers  . . . . . . . . . . . . . 202--203
      Constantinos Dovrolis and   
            Dimitrios Stiliadis   Relative differentiated services in the
                                  Internet: issues and mechanisms  . . . . 204--205
             Gretta Bartels and   
                Anna Karlin and   
           Darrell Anderson and   
              Jeffrey Chase and   
                 Henry Levy and   
               Geoffrey Voelker   Potentials and limitations of
                                  fault-based Markov prefetching for
                                  virtual memory pages . . . . . . . . . . 206--207
            Patrick Crowley and   
                 Jean-Loup Baer   On the use of trace sampling for
                                  architectural studies of desktop
                                  applications . . . . . . . . . . . . . . 208--209
               Sumeer Bhola and   
                Mustaque Ahamad   Workload modeling for highly interactive
                                  applications . . . . . . . . . . . . . . 210--211
     Narayanan Venkitaraman and   
                Tae-eun Kim and   
                   Kang-Won Lee   Design and evaluation of congestion
                                  control algorithms in the future
                                  Internet . . . . . . . . . . . . . . . . 212--213
                 E. N. Elnozahy   Address trace compression through loop
                                  detection and reduction  . . . . . . . . 214--215
                Erich Nahum and   
           Tsipora Barzilai and   
                  Dilip Kandlur   Performance issues in WWW servers  . . . 216--217
            T. S. Eugene Ng and   
        Donpaul C. Stephens and   
                 Ion Stoica and   
                      Hui Zhang   Supporting best-effort traffic with fair
                                  service curve  . . . . . . . . . . . . . 218--219
            Jitendra Padhye and   
                 Jim Kurose and   
                Don Towsley and   
                  Rajeev Koodli   A TCP-friendly rate adjustment protocol
                                  for continuous media flows over best
                                  effort networks  . . . . . . . . . . . . 220--221
                Allen B. Downey   Using pathchar to estimate Internet link
                                  characteristics  . . . . . . . . . . . . 222--223
              Yuval Hershko and   
               Daniel Segal and   
                 Hadas Shachnai   Self-tuning synchronization mechanisms
                                  in network operating systems . . . . . . 224--225
                    Pradip Bose   Performance evaluation and validation of
                                  microprocessors  . . . . . . . . . . . . 226--227
        Shikharesh Majumdar and   
              Dale Streibel and   
             Bruce Beninger and   
              Brian Carroll and   
             Neveenta Verma and   
                      Minru Liu   Controlling memory contention on a
                                  scalable multiprocessor-based telephone
                                  switch . . . . . . . . . . . . . . . . . 228--229
               Eugenio Cervetto   Model-based performance analysis of an
                                  EDP/ERP-oriented wide area network . . . 230--231
        Srinivas Ramanathan and   
                Edward H. Perry   The value of a systematic approach to
                                  measurement and analysis: an ISP case
                                  study  . . . . . . . . . . . . . . . . . 232--233
                  Janet Siebert   Improving performance of data analysis
                                  in data warehouses: a methodology and
                                  case study . . . . . . . . . . . . . . . 234--235

ACM SIGMETRICS Performance Evaluation Review
Volume 27, Number 2, September, 1999

               Carey Williamson   Special Issue on Network Traffic
                                  Measurements and Workload
                                  Characterization . . . . . . . . . . . . 2--2
          Judith L. Jerkins and   
                John Monroe and   
               Jonathan L. Wang   A measurement analysis of Internet
                                  traffic over frame relay . . . . . . . . 3--14
               Raja Epsilon and   
                     Jun Ke and   
               Carey Williamson   Analysis of ISP IP/ATM network traffic
                                  measurements . . . . . . . . . . . . . . 15--24
              Martin Arlitt and   
             Rich Friedrich and   
                        Tai Jin   Workload characterization of a Web proxy
                                  in a cable modem environment . . . . . . 25--36
               Paul Barford and   
                  Mark Crovella   Measuring Web performance in the wide
                                  area . . . . . . . . . . . . . . . . . . 37--48

ACM SIGMETRICS Performance Evaluation Review
Volume 27, Number 3, December, 1999

             Mark S. Squillante   Special issue on the Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA `99)  . . . . . . . . . . 2--2
         E. G. Coffman, Jr. and   
                 Ph. Robert and   
                  A. L. Stolyar   The interval packing process of linear
                                  networks . . . . . . . . . . . . . . . . 3--4
          R. Cáceres and   
             N. G. Duffield and   
                J. Horowitz and   
               F. Lo Presti and   
                     D. Towsley   Statistical inference of internal
                                  network loss and topology  . . . . . . . 5--6
             D. H. J. Epema and   
           J. F. C. M. de Jongh   Proportional-share scheduling in
                                  single-server and multiple-server
                                  computing systems  . . . . . . . . . . . 7--10
         Dimitris Bertsimas and   
             David Gamarnik and   
             John N. Tsitsiklis   Performance analysis of multiclass
                                  queueing networks  . . . . . . . . . . . 11--14
                  Ulrich Herzog   Process algebras are getting mature for
                                  performance evaluation?! . . . . . . . . 15--18
              Laszlo Gyorfi and   
                Andras Racz and   
                  Ken Duffy and   
              John T. Lewis and   
            Raymond Russell and   
                  Fergal Toomey   Distribution-free confidence intervals
                                  for measurement of effective bandwidths  19--19
             Sandeep Juneja and   
             Perwez Shahabuddin   Simulating heavy tailed processes using
                                  delayed hazard rate twisting (extended
                                  abstract)  . . . . . . . . . . . . . . . 20--22
                   Zhen Liu and   
                    Don Towsley   Stochastic bounds for queueing systems
                                  with multiple Markov modulated sources   23--23
         Mark S. Squillante and   
               David D. Yao and   
                       Li Zhang   Web traffic modeling and Web server
                                  performance analysis . . . . . . . . . . 24--27
        Jeffrey P. Bradford and   
                  Russell Quong   An empirical study on how program layout
                                  affects cache miss rates . . . . . . . . 28--42
               Andrew Moore and   
                   Simon Crosby   An experimental configuration for the
                                  evaluation of CAC algorithms . . . . . . 43--54

ACM SIGMETRICS Performance Evaluation Review
Volume 27, Number 4, March, 2000

              Martin Arlitt and   
         Ludmila Cherkasova and   
                John Dilley and   
             Rich Friedrich and   
                        Tai Jin   Evaluating content management techniques
                                  for Web proxy caches . . . . . . . . . . 3--11
                Marco Conti and   
             Enrico Gregori and   
                 Fabio Panzieri   Load distribution among replicated Web
                                  servers: QoS-based approach  . . . . . . 12--19
            Carsten Griwodz and   
            Michael Liepert and   
               Michael Zink and   
                 Ralf Steinmetz   Tune to Lambda patching  . . . . . . . . 20--26
   Daniel A. Menaséc and   
            Rodrigo Fonseca and   
     Virgilio A. F. Almeida and   
                Marco A. Mendes   Resource management policies for
                                  e-commerce servers . . . . . . . . . . . 27--35
              Greg Minshall and   
              Yasushi Saito and   
           Jeffrey C. Mogul and   
                   Ben Verghese   Application performance pitfalls and
                                  TCP's Nagle algorithm  . . . . . . . . . 36--44
           Chris Roadknight and   
               Ian Marshall and   
                  Debbie Vearer   File popularity characterisation . . . . 45--50
             Gary Tomlinson and   
                 Drew Major and   
                        Ron Lee   High-capacity Internet middleware:
                                  Internet caching system architectural
                                  overview . . . . . . . . . . . . . . . . 51--56
          R. D. van der Mei and   
              W. K. Ehrlich and   
               P. K. Reeser and   
                J. P. Francisco   A decision support system for tuning Web
                                  servers in distributed object oriented
                                  network architectures  . . . . . . . . . 57--62


ACM SIGMETRICS Performance Evaluation Review
Volume 28, Number 1, June, 2000

               Yang-hua Chu and   
              Sanjay G. Rao and   
                      Hui Zhang   A case for end system multicast (keynote
                                  address) . . . . . . . . . . . . . . . . 1--12
                  A. Legout and   
                 E. W. Biersack   PLM: fast convergence for cumulative
                                  layered multicast transmission schemes   13--22
                Sambit Sahu and   
              Philippe Nain and   
            Christophe Diot and   
              Victor Firoiu and   
                Don Towsley and   
                    Don Iowsley   On achievable service differentiation
                                  with token bucket marking for TCP  . . . 23--33
         William J. Bolosky and   
            John R. Douceur and   
                  David Ely and   
                 Marvin Theimer   Feasibility of a serverless distributed
                                  file system deployed on an existing set
                                  of desktop PCs . . . . . . . . . . . . . 34--43
         Jose Renato Santos and   
           Richard R. Muntz and   
          Berthier Ribeiro-Neto   Comparing random data allocation and
                                  data striping in multimedia servers  . . 44--55
       John Linwood Griffin and   
        Steven W. Schlosser and   
          Gregory R. Ganger and   
                 David F. Nagle   Modeling and performance of MEMS-based
                                  storage devices  . . . . . . . . . . . . 56--65
         Mohammad S. Raunak and   
            Prashant Shenoy and   
                Pawan Goyal and   
             Krithi Ramamritham   Implications of proxy caching for
                                  provisioning networks and servers  . . . 66--77
                 Jiong Yang and   
                   Wei Wang and   
                  Richard Muntz   Collaborative Web caching based on proxy
                                  affinities . . . . . . . . . . . . . . . 78--89
                 Mohit Aron and   
             Peter Druschel and   
               Willy Zwaenepoel   Cluster reserves: a mechanism for
                                  resource management in cluster-based
                                  network servers  . . . . . . . . . . . . 90--101
              Chadi Barakat and   
                   Eitan Altman   Analysis of the phenomenon of several
                                  slow start phases in TCP (poster
                                  session) . . . . . . . . . . . . . . . . 102--103
            Wai-Man R. Wong and   
               Richard R. Muntz   Providing guaranteed quality of service
                                  for interactive visualization
                                  applications (poster session)  . . . . . 104--105
                   Xin Wang and   
                      C. Yu and   
        Henning Schulzrinne and   
                Paul Stirpe and   
                         Wei Wu   IP multicast fault recovery in PIM over
                                  OSPF (poster session)  . . . . . . . . . 106--107
       Emmanuel Léty and   
           Thierry Turletti and   
       François Baccelli   Cell-based multicast grouping in
                                  large-scale virtual environments (poster
                                  session) (extended abstract) . . . . . . 108--109
                Shudong Jin and   
                 Azer Bestavros   Temporal locality in Web request streams
                                  (poster session) (extended abstract):
                                  sources, characteristics, and caching
                                  implications . . . . . . . . . . . . . . 110--111
             Jiri Schindler and   
              Gregory R. Ganger   Automated disk drive characterization
                                  (poster session) . . . . . . . . . . . . 112--113
                  Zhen Fang and   
                Lixin Zhang and   
                John Carter and   
                Sally McKee and   
                   Wilson Hsieh   Online superpage promotion revisited
                                  (poster session) . . . . . . . . . . . . 114--115
          Ioanis Nikolaidis and   
                    Fulu Li and   
                       Ailan Hu   An inherently loss-less and
                                  bandwidth-efficient periodic broadcast
                                  scheme for VBR video (poster session)    116--117
            Can Emre Koksal and   
              Hisham Kassab and   
              Hari Balakrishnan   An analysis of short-term fairness in
                                  wireless media access protocols (poster
                                  session) . . . . . . . . . . . . . . . . 118--119
           Srinath R. Joshi and   
                    Injong Rhee   RESCU: dynamic hybrid packet-loss
                                  recovery for video transmission over the
                                  Internet (poster session)  . . . . . . . 120--121
     Venkata N. Padmanabhan and   
                       Lili Qiu   The content and access dynamics of a
                                  busy Web server (poster session) . . . . 122--123
               Eitan Altman and   
     Konstantin Avrachenkov and   
                  Chadi Barakat   TCP in presence of bursty losses . . . . 124--133
                 Jim Martin and   
               Arne Nilsson and   
                    Injong Rhee   The incremental deployability of
                                  RTT-based congestion avoidance for high
                                  speed TCP Internet connections . . . . . 134--144
             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   Detecting shared congestion of flows via
                                  end-to-end measurement . . . . . . . . . 145--155
                   Xin Wang and   
        Henning Schulzrinne and   
              Dilip Kandlur and   
                   Dinesh Verma   Measurement and analysis of LDAP
                                  performance  . . . . . . . . . . . . . . 156--165
       William S. Cleveland and   
                   Dong Lin and   
                     Don X. Sun   IP packet generation: statistical models
                                  for TCP start times based on
                                  connection-rate superposition  . . . . . 166--177
                Nidhi Hegde and   
                Khosrow Sohraby   On the impact of soft hand-off in
                                  cellular systems . . . . . . . . . . . . 178--187
          Sanjay Shakkottai and   
                     R. Srikant   Delay asymptotics for a priority
                                  queueing system  . . . . . . . . . . . . 188--195
            Leana Golubchik and   
                 John C. S. Lui   A fast and accurate iterative solution
                                  of a multi-class threshold-based
                                  queueing system with hysteresis  . . . . 196--206
            Andrew S. Miner and   
          Gianfranco Ciardo and   
              Susanna Donatelli   Using the exact state space of a Markov
                                  model to compute approximate stationary
                                  measures . . . . . . . . . . . . . . . . 207--216
             Derek L. Eager and   
            Daniel J. Sorin and   
                 Mary K. Vernon   AMVA techniques for high service time
                                  variability  . . . . . . . . . . . . . . 217--228
                David Ofelt and   
               John L. Hennessy   Efficient performance prediction for
                                  modern microprocessors . . . . . . . . . 229--239
              Yasuhiro Endo and   
                  Margo Seltzer   Improving interactive performance using
                                  TIPME  . . . . . . . . . . . . . . . . . 240--251
            Keith I. Farkas and   
                Jason Flinn and   
                Godmar Back and   
              Dirk Grunwald and   
           Jennifer M. Anderson   Quantifying the energy consumption of a
                                  pocket computer and a Java Virtual
                                  Machine  . . . . . . . . . . . . . . . . 252--263
                Jin-Soo Kim and   
                     Yarsun Hsu   Memory system behavior of Java programs:
                                  methodology and analysis . . . . . . . . 264--274
            Magnus Karlsson and   
             Per Stenström   An analytical model of the working-set
                                  sizes in decision-support systems  . . . 275--285
               Jongmoo Choi and   
                 Sam H. Noh and   
              Sang Lyul Min and   
                     Yookun Cho   Towards application/file-level
                                  characterization of block references: a
                                  case for fine-grained buffer management  286--295
         Murali S. Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Online multicast routing with bandwidth
                                  guarantees: a new approach using
                                  multicast network flow . . . . . . . . . 296--306
                  Lixin Gao and   
               Jennifer Rexford   Stable Internet routing without global
                                  coordination . . . . . . . . . . . . . . 307--317
             Turgay Korkmaz and   
               Marwan Krunz and   
               Spyros Tragoudas   An efficient algorithm for finding a
                                  path subject to two additive constraints 318--327

ACM SIGMETRICS Performance Evaluation Review
Volume 28, Number 2, September, 2000

                   Krishna Kant   Workshop on Performance and Architecture
                                  of Web Servers (PAWS-2000) . . . . . . . 3--4
               Krishna Kant and   
              Prasant Mohapatra   Scalable Internet servers: issues and
                                  challenges . . . . . . . . . . . . . . . 5--8
               Onn Brandman and   
                Junghoo Cho and   
       Hector Garcia-Molina and   
           Narayanan Shivakumar   Crawler-friendly Web servers . . . . . . 9--14
            Randal C. Burns and   
         Darrell D. E. Long and   
                 Robert M. Rees   Consistency and locking for distributing
                                  updates to Web servers using a file
                                  system . . . . . . . . . . . . . . . . . 15--21
          Nikolaos Vasiliou and   
                 Hanan Lutfiyya   Providing a differentiated quality of
                                  service in a World Wide Web server . . . 22--28
       Samrat Bhattacharjee and   
           William C. Cheng and   
              Cheng-Fu Chou and   
            Leana Golubchik and   
                  Samir Khuller   Bistro: a framework for building
                                  scalable wide-area \em Upload
                                  applications . . . . . . . . . . . . . . 29--35
                 E. Kraemer and   
           G. Paixão and   
                  D. Guedes and   
              W. Meira, Jr. and   
                     V. Almeida   Minimizing the impact of orphan requests
                                  in e-commerce services . . . . . . . . . 36--42
           Brian D. Davison and   
            Vincenzo Liberatore   Pushing politely: improving Web
                                  responsiveness one packet at a time  . . 43--43
                  Martin Arlitt   Characterizing Web user sessions . . . . 50--63
                R. Hadharan and   
              W. K. Ehrlich and   
                    D. Cura and   
                   P. K. Reeser   End to End Performance Modeling of Web
                                  Server Architectures . . . . . . . . . . 57--63

ACM SIGMETRICS Performance Evaluation Review
Volume 28, Number 3, December, 2000

                    Weiping Zhu   An approximate analysis of the shortest
                                  queue policy on soft real-time
                                  scheduling . . . . . . . . . . . . . . . 3--10
                      Bo Li and   
                  Kazem Sohraby   Special Issue on Performance Issues in
                                  Mobile Computing . . . . . . . . . . . . 11--11
            Ming Feng Chang and   
                    Yi-Bing Lin   Performance of a weakly consistent
                                  wireless Web access mechanism  . . . . . 12--20
                  C.-K. Toh and   
               Richard Chen and   
               Minar Delwar and   
                   Donald Allen   Experimenting with an Ad Hoc wireless
                                  network on campus: insights and
                                  experiences  . . . . . . . . . . . . . . 21--29
                 Tanja Lang and   
                Daniel Floreani   Performance evaluation of different TCP
                                  error detection and congestion control
                                  strategies over a wireless link  . . . . 30--38
          Vikrant A. Chitre and   
                 John N. Daigle   IP-based services over GPRS  . . . . . . 39--47

ACM SIGMETRICS Performance Evaluation Review
Volume 28, Number 4, March, 2001

             Mark S. Squillante   Special issue on the Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2000) . . . . . . . . . . 2--2
             Mor Harchol-Balter   Job placement with unknown duration and
                                  no preemption  . . . . . . . . . . . . . 3--5
            Leana Golubchik and   
                 John C. S. Lui   Open problems for threshold-based
                                  systems  . . . . . . . . . . . . . . . . 6--8
         E. G. Coffman, Jr. and   
           Predrag Jelenkovi\'c   Threshold policies for single-resource
                                  reservation systems  . . . . . . . . . . 9--10
               Joel L. Wolf and   
                   Philip S. Yu   Load balancing for clustered Web farms   11--13
   Edmundo de Souza e Silva and   
     Rosa M. M. Leão and   
              Morganna C. Diniz   Transient analysis applied to traffic
                                  modeling . . . . . . . . . . . . . . . . 14--16
                      T. Bu and   
                     D. Towsley   A fixed point approximation of TCP
                                  behavior in a network  . . . . . . . . . 17--18
          Cheng-Shang Chang and   
              Yuh-ming Chiu and   
             Wheyming Tina Song   Large deviation analysis for
                                  multiplexing independent regulated
                                  inputs . . . . . . . . . . . . . . . . . 19--21
                  Lei Kuang and   
             Armand M. Makowski   Convex stability and asymptotic convex
                                  ordering for non-stationary arrival
                                  processes  . . . . . . . . . . . . . . . 22--23
                  Eitan Bachmat   Recent results in mathematical modeling
                                  and performance evaluation of disks and
                                  disk array . . . . . . . . . . . . . . . 24--26
             Karin Hogstedt and   
              Doug Kimelman and   
                V. T. Rajan and   
                  Tova Roth and   
                    Mark Wegman   Graph cutting algorithms for distributed
                                  applications partitioning  . . . . . . . 27--29
            Paulo Fernandes and   
               Brigitte Plateau   Triangular solution of linear systems in
                                  tensor product format  . . . . . . . . . 30--32
                   L. Capra and   
              C. Dutheillet and   
           G. Franceschinis and   
              J. M. Ilié   On the use of partial symmetries for
                                  lumping Markov chains  . . . . . . . . . 33--35
                  Peter J. Haas   Estimation of delays in non-regenerative
                                  discrete-event stochastic systems  . . . 36--38
                 David Gamarnik   On deciding stability of constrained
                                  random walks and queueing systems  . . . 39--40
         Mark S. Squillante and   
               Baffelly Woo and   
                       Li Zhang   Analysis of queues under correlated
                                  arrivals with applications to Web server
                                  performance  . . . . . . . . . . . . . . 41--43


ACM SIGMETRICS Performance Evaluation Review
Volume 29, Number 1, June, 2001

            Girija Narlikar and   
                   Francis Zane   Performance modeling for fast IP lookups 1--12
                 Xiaohu Qie and   
                Andy Bavier and   
             Larry Peterson and   
                   Scott Karlin   Scheduling computations on a
                                  software-based router  . . . . . . . . . 13--24
                     Xun Su and   
             Gustavo de Veciana   Dynamic multi-path routing: asymptotic
                                  approximation and simulations  . . . . . 25--36
           Michael B. Jones and   
                  Stefan Saroiu   Predictability requirements of a soft
                                  modem  . . . . . . . . . . . . . . . . . 37--49
             Jacob R. Lorch and   
                 Alan Jay Smith   Improving dynamic voltage scaling
                                  algorithms with PACE . . . . . . . . . . 50--61
  Kalyanaraman Vaidyanathan and   
          Richard E. Harper and   
           Steven W. Hunter and   
              Kishor S. Trivedi   Analysis and implementation of software
                                  rejuvenation in cluster systems  . . . . 62--71
                    Gabriel Loh   A time-stamping algorithm for efficient
                                  performance estimation of superscalar
                                  processors . . . . . . . . . . . . . . . 72--81
              Thomas Bonald and   
       Laurent Massoulié   Impact of fairness on Internet
                                  performance  . . . . . . . . . . . . . . 82--91
     Kavé Salamatian and   
                 Sandrine Vaton   Hidden Markov modeling for network
                                  communication channels . . . . . . . . . 92--101
                    Jin Cao and   
       William S. Cleveland and   
                   Dong Lin and   
                     Don X. Sun   On the nonstationarity of Internet
                                  traffic  . . . . . . . . . . . . . . . . 102--112
             Hung-Yun Hsieh and   
           Raghupathy Sivakumar   Performance comparison of cellular and
                                  multi-hop wireless networks: a
                                  quantitative study . . . . . . . . . . . 113--122
                Nidhi Hegde and   
                Khosrow Sohraby   Blocking in large mobile cellular
                                  networks with bursty traffic . . . . . . 123--132
               Apurva Kumar and   
                   Rajeev Gupta   Capacity evaluation of frequency hopping
                                  based ad-hoc systems . . . . . . . . . . 133--142
                 Dongyu Qiu and   
                 Ness B. Shroff   A new predictive flow control scheme for
                                  efficient network utilization and QoS    143--153
    Ioannis Ch. Paschalidis and   
            Spyridon Vassilaras   Model-based estimation of buffer
                                  overflow probabilities from measurements 154--163
                Rudra Dutta and   
              George N. Rouskas   On optimal traffic grooming in WDM rings 164--174
            Jean-Yves Le Boudec   Some properties of variable length
                                  packet shapers . . . . . . . . . . . . . 175--183
          Cheng-Shang Chang and   
              Yuh-ming Chiu and   
             Wheyming Tina Song   On the performance of multiplexing
                                  independent regulated inputs . . . . . . 184--193
                 Yefim Shuf and   
        Mauricio J. Serrano and   
               Manish Gupta and   
            Jaswinder Pal Singh   Characterizing the memory behavior of
                                  Java workloads: a structured view and
                                  opportunities for optimizations  . . . . 194--205
               Sohum Sohoni and   
                    Rui Min and   
                 Zhiyong Xu and   
                      Yiming Hu   A study of memory system performance of
                                  multimedia applications  . . . . . . . . 206--215
                    Tian Bu and   
                    Don Towsley   Fixed point approximations for TCP
                                  behavior in an AQM network . . . . . . . 216--225
              Steven H. Low and   
             Larry Peterson and   
                     Limin Wang   Understanding TCP Vegas: a duality model 226--235
                   J. Talim and   
                     Z. Liu and   
                   Ph. Nain and   
             E. G. Coffman, Jr.   Controlling the robots of Web search
                                  engines  . . . . . . . . . . . . . . . . 236--244
          F. Donelson Smith and   
Félix Hernández Campos and   
               Kevin Jeffay and   
                      David Ott   What TCP/IP protocol headers can tell us
                                  about the Web  . . . . . . . . . . . . . 245--256
             Erich M. Nahum and   
        Marcel-Catalin Rosu and   
          Srinivasan Seshan and   
                Jussara Almeida   The effects of wide-area conditions on
                                  WWW server performance . . . . . . . . . 257--267
              Philippe Nain and   
Redusindo Núñez-Queija   A M/M/1 queue in a semi-Markovian
                                  environment  . . . . . . . . . . . . . . 268--278
              Nikhil Bansal and   
             Mor Harchol-Balter   Analysis of SRPT scheduling:
                                  investigating unfairness . . . . . . . . 279--290
        Johannes Lüthi and   
       Catalina M. Lladó   Interval parameters for capturing
                                  uncertainties in an EJB performance
                                  model  . . . . . . . . . . . . . . . . . 291--300
            Hesham El-Sayed and   
                Don Cameron and   
                Murray Woodside   Automation support for software
                                  performance engineering  . . . . . . . . 301--311
        Michael K. Bradshaw and   
                  Bing Wang and   
             Subhabrata Sen and   
                  Lixin Gao and   
                 Jim Kurose and   
            Prashant Shenoy and   
                    Don Towsley   Periodic broadcast and patching
                                  services: implementation, measurement,
                                  and analysis in an Internet streaming
                                  video testbed  . . . . . . . . . . . . . 312--313
          Yang Richard Yang and   
                Xiaozhou Li and   
               Simon S. Lam and   
                 Xincheng Zhang   Towards scalable and reliable group key
                                  management . . . . . . . . . . . . . . . 314--315
          Anat Bremler-Barr and   
                Yehuda Afek and   
                Haim Kaplan and   
                Edith Cohen and   
                Michael Merritt   Restoration path concatenation: fast
                                  recovery of MPLS paths . . . . . . . . . 316--317
           Andreas Savvides and   
                  Sung Park and   
             Mani B. Srivastava   On modeling networks of wireless
                                  microsensors . . . . . . . . . . . . . . 318--319
           Philippas Tsigas and   
                       Yi Zhang   Evaluating the performance of
                                  non-blocking synchronization on
                                  shared-memory multiprocessors  . . . . . 320--321
                Wee Teck Ng and   
               Bruce K. Hillyer   Obtaining high performance for storage
                                  outsourcing  . . . . . . . . . . . . . . 322--323
    Venkata N. Padamanabban and   
 Lealkshminarayanan Subramanian   Determining the geographic location of
                                  Internet hosts . . . . . . . . . . . . . 324--325
             Michel Mandjes and   
                Iraj Saniee and   
              Alexander Stolyar   Load characterization and anomaly
                                  detection for voice over IP traffic  . . 326--327
                Allen B. Downey   The structural cause of file size
                                  distributions  . . . . . . . . . . . . . 328--329
             Rishi Bhargava and   
                Ashish Goel and   
                  Adam Meyerson   Using approximate majorization to
                                  characterize protocol fairness . . . . . 330--331
        John Mellor-Crummey and   
              Robert Fowler and   
                  David Whalley   On providing useful information for
                                  analyzing and tuning applications  . . . 332--333
              Cyrus Shahabi and   
    Mohammad R. Kolahdouzan and   
                Greg Barish and   
           Roger Zimmermann and   
                   Didi Yao and   
                     Kun Fu and   
                 Lingling Zhang   Alternative techniques for the efficient
                                  acquisition of haptic data . . . . . . . 334--335
                 Peter A. Dinda   Online prediction of the running time of
                                  tasks  . . . . . . . . . . . . . . . . . 336--337
    Virgilío Almeida and   
      Daniel Menascé and   
               Rudolf Riedi and   
 Flávia Peligrinelli and   
            Rodrigo Fonseca and   
              Wagner Meira, Jr.   Analyzing robot behavior in e-business
                                  sites  . . . . . . . . . . . . . . . . . 338--339
         Jussara M. Almeida and   
            Jeffrey Krueger and   
                 Mary K. Vernon   Characterization of user access to
                                  streaming media files  . . . . . . . . . 340--341
              Thomas Bonald and   
                  James Roberts   Performance modeling of elastic traffic
                                  in overload  . . . . . . . . . . . . . . 342--343
                   Lili Qiu and   
            George Varghese and   
                   Subhash Suri   Fast firewall implementations for
                                  software-based and hardware-based
                                  routers  . . . . . . . . . . . . . . . . 344--345

ACM SIGMETRICS Performance Evaluation Review
Volume 29, Number 2, September, 2001

                    K. Kant and   
              Prasant Mohapatra   Current research trends in Internet
                                  servers  . . . . . . . . . . . . . . . . 5--7
          Amy Csizmar Dalal and   
                   Scott Jordan   An optimal service ordering for a World
                                  Wide Web server  . . . . . . . . . . . . 8--13
         Valeria Cardellini and   
       Emiliano Casalicchio and   
          Michele Colajanni and   
                 Marco Mambelli   Web switch support for differentiated
                                  services . . . . . . . . . . . . . . . . 14--19
               Thiemo Voigt and   
                Per Gunningberg   Kernel-based control of persistent Web
                                  server connections . . . . . . . . . . . 20--25
                   Jun Wang and   
                    Rui Min and   
                 Zhuying Wu and   
                      Yiming Hu   Boosting I/O performance of Internet
                                  servers with user-level custom file
                                  systems  . . . . . . . . . . . . . . . . 26--31
                   Xin Chen and   
                 Xiaodong Zhang   Coordinated data prefetching by
                                  utilizing reference information at both
                                  proxy and Web servers  . . . . . . . . . 32--38
               Oscar Ardaiz and   
              Felix Freitag and   
                Leandro Navarro   Improving the service time of Web
                                  clients using server redirection . . . . 39--44

ACM SIGMETRICS Performance Evaluation Review
Volume 29, Number 3, December, 2001

                Shudong Jin and   
                 Azer Bestavros   GISMO: a Generator of Internet Streaming
                                  Media Objects and workloads  . . . . . . 2--10
             Mark S. Squillante   Special issue on the Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2001) . . . . . . . . . . 11--11
              Nikhil Bansal and   
             Mor Harchol-Balter   Analysis of M/G/1/SRPT under transient
                                  overload . . . . . . . . . . . . . . . . 12--14
                     E. Bachmat   Average case analysis for batched disk
                                  scheduling and increasing subsequences   15--16
               Anton Riabov and   
                 Jay Sethuraman   Scheduling periodic task graphs with
                                  communication delays . . . . . . . . . . 17--18
       Jean-Michel Fourneau and   
                   Erol Gelenbe   G-networks with resets . . . . . . . . . 19--20
                Michael Shalmon   Queueing analysis for polling and
                                  prioritized service of aggregated
                                  regenerative variable rate ON-OFF
                                  traffic sources  . . . . . . . . . . . . 20--20
                  Alan Bain and   
                      Peter Key   Modelling the performance of distributed
                                  admission control for adaptive
                                  applications . . . . . . . . . . . . . . 21--22
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
                Ching-Ming Lien   Load balanced Birkhoff--von Neumann
                                  switches with resequencing . . . . . . . 23--24
                   Yaakov Kogan   Asymptotic expansions for probability
                                  distributions in large loss and closed
                                  queueing networks  . . . . . . . . . . . 25--27
          Yuliy Baryshnikov and   
         E. G. Coffman, Jr. and   
           Predrag Jelenkovi\'c   Kelly's LAN model revisited  . . . . . . 28--29
                 David Gamarnik   Stochastic online binpacking problem:
                                  exact conditions for bounded expected
                                  queue lengths under the best fit packing
                                  heuristic  . . . . . . . . . . . . . . . 30--31
                     S. Lam and   
              Rocky K. C. Chang   Stability comparison in
                                  single-server-multiple-queue systems . . 32--34
Árpád Szlávik   GI/G/1 type processes: a non-inversive
                                  matrix analytical solution . . . . . . . 35--37
             Nam Kyoo Boots and   
             Perwez Shahabuddin   Simulating tail probabilities in GI/GI/1
                                  queues and insurance risk processes with
                                  subexponential distributions (extended
                                  abstract)  . . . . . . . . . . . . . . . 38--39
                  Sem Borst and   
             Michel Mandjes and   
             Miranda van Uitert   Generalized processor sharing with
                                  heterogeneous traffic classes  . . . . . 40--42
                   Zhen Liu and   
         Mark S. Squillante and   
                   Joel L. Wolf   On maximizing service-level-agreement
                                  profits  . . . . . . . . . . . . . . . . 43--44
                Yingdong Lu and   
            Jing-Sheng Song and   
                    Weian Zheng   Performance analysis of
                                  assemble-to-order systems through strong
                                  approximations . . . . . . . . . . . . . 45--46
         Mark S. Squillante and   
               Cathy H. Xia and   
                       Li Zhang   Optimal scheduling in queueing network
                                  models of high-volume commercial Web
                                  sites  . . . . . . . . . . . . . . . . . 47--48

ACM SIGMETRICS Performance Evaluation Review
Volume 29, Number 4, March, 2002

          Kenneth C. Sevcik and   
                       Hai Wang   Solution properties and convergence of
                                  an approximate mean value analysis
                                  algorithm  . . . . . . . . . . . . . . . 3--10
           Carey Williamson and   
                        Qian Wu   A case for context-aware TCP/IP  . . . . 11--23
       Daniel A. Menascé   Simple analytic modeling of software
                                  contention . . . . . . . . . . . . . . . 24--30
           William C. Cheng and   
              Cheng-Fu Chou and   
            Leana Golubchik and   
                  Samir Khuller   A performance study of Bistro, a
                                  scalable upload architecture . . . . . . 31--39
            Barry G. Lawson and   
                 Evgenia Smirni   Multiple-queue backfilling scheduling
                                  with priorities and reservations for
                                  parallel systems . . . . . . . . . . . . 40--47


ACM SIGMETRICS Performance Evaluation Review
Volume 30, Number 1, June, 2002

      Attila Pásztor and   
                  Darryl Veitch   PC based precision timing without GPS    1--10
                Mark Coates and   
                 Rui Castro and   
               Robert Nowak and   
              Manik Gadhiok and   
                  Ryan King and   
                  Yolanda Tsang   Maximum likelihood network topology
                                  identification from edge-based unicast
                                  measurements . . . . . . . . . . . . . . 11--20
                    Tian Bu and   
              Nick Duffield and   
        Francesco Lo Presti and   
                    Don Towsley   Network tomography on general topologies 21--30
                 Song Jiang and   
                 Xiaodong Zhang   LIRS: an efficient low inter-reference
                                  recency set replacement policy to
                                  improve buffer cache performance . . . . 31--42
         Mark S. Squillante and   
              Yanyong Zhang and   
      Anand Sivasubramaniam and   
           Natarajan Gautam and   
            Hubertus Franke and   
                   Jose Moreira   Modeling and analysis of dynamic
                                  coscheduling in parallel and distributed
                                  environments . . . . . . . . . . . . . . 43--54
              Eitan Bachmat and   
                 Jiri Schindler   Analysis of methods for scheduling low
                                  priority disk drive tasks  . . . . . . . 55--65
              Allan Snavely and   
            Dean M. Tullsen and   
                  Geoff Voelker   Symbiotic jobscheduling with priorities
                                  for a simultaneous multithreading
                                  processor  . . . . . . . . . . . . . . . 66--76
          Peter G. Harrison and   
         William J. Knottenbelt   Passage time distributions in large
                                  Markov chains  . . . . . . . . . . . . . 77--85
                 Alma Riska and   
                 Evgenia Smirni   Exact aggregate solutions for M/G/1-type
                                  Markov processes . . . . . . . . . . . . 86--96
                Shudong Jin and   
                 Azer Bestavros   Scalability of multicast delivery for
                                  non-sequential streaming access  . . . . 97--107
              Carl J. Mauer and   
               Mark D. Hill and   
                  David A. Wood   Full-system timing-first simulation  . . 108--116
                Ruoming Jin and   
                  Gagan Agrawal   Performance prediction for random write
                                  reductions: a case study in modeling
                                  shared memory programs . . . . . . . . . 117--128
         Gokul B. Kandiraju and   
          Anand Sivasubramaniam   Characterizing the $d$-TLB behavior of
                                  SPEC CPU2000 benchmarks  . . . . . . . . 129--139
              Matthew Hertz and   
       Stephen M. Blackburn and   
           J. Eliot B. Moss and   
        Kathryn S. McKinley and   
             Darko Stefanovi\'c   Error-free garbage collection traces:
                                  how to cheat and not get caught  . . . . 140--151
           Craig W. Cameron and   
              Steven H. Low and   
                   David X. Wei   High-density model for server allocation
                                  and placement  . . . . . . . . . . . . . 152--159
         David P. Olshefski and   
                 Jason Nieh and   
                 Dakshi Agrawal   Inferring client response time at the
                                  Web server . . . . . . . . . . . . . . . 160--171
              Sam C. M. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Admission control and dynamic adaptation
                                  for a proportional-delay
                                  diffserv-enabled Web server  . . . . . . 172--182
                 Haonan Tan and   
             Derek L. Eager and   
             Mary K. Vernon and   
                    Hongfei Guo   Quality of service evaluations of
                                  multicast streaming protocols  . . . . . 183--194
         Anand Balachandran and   
        Geoffrey M. Voelker and   
              Paramvir Bahl and   
               P. Venkat Rangan   Characterizing user behavior and network
                                  performance in a public wireless LAN . . 195--205
             Harkirat Singh and   
                   Suresh Singh   Energy consumption of TCP Reno, Newreno,
                                  and SACK in multi-hop wireless networks  206--216
              Taliver Heath and   
          Richard P. Martin and   
                  Thu D. Nguyen   Improving cluster availability using
                                  workstation validation . . . . . . . . . 217--227
                 Albert Lai and   
                     Jason Nieh   Limits of wide-area thin-client
                                  computing  . . . . . . . . . . . . . . . 228--239
                 Jeffrey Vetter   Dynamic statistical profiling of
                                  communication activity in distributed
                                  applications . . . . . . . . . . . . . . 240--250
               Jeanine Cook and   
          Richard L. Oliver and   
                Eric E. Johnson   Toward reducing processor simulation
                                  time via dynamic reduction of
                                  microarchitecture complexity . . . . . . 252--253
              Jimmy S. Shih and   
                  Randy H. Katz   Evaluating tradeoffs of congestion
                                  pricing for voice calls  . . . . . . . . 254--255
         Miriam Sivan-Zimet and   
             Tara M. Madhyastha   Workload based optimization of
                                  probe-based storage  . . . . . . . . . . 256--257
                     Qin Lv and   
                    Pei Cao and   
                Edith Cohen and   
                     Kai Li and   
                  Scott Shenker   Search and replication in unstructured
                                  peer-to-peer networks  . . . . . . . . . 258--259
            Y. Chandramouli and   
               Arnold Neidhardt   Application level traffic measurements
                                  for capacity engineering . . . . . . . . 260--261
           Carey Williamson and   
                        Qian Wu   Context-aware TCP/IP . . . . . . . . . . 262--263
              Chadi Barakat and   
             Patrick Thiran and   
        Gianluca Iannaccone and   
                Christophe Diot   On Internet backbone traffic modeling    264--265
        Alexander Thomasian and   
                      Chang Liu   Some new disk scheduling policies and
                                  their performance  . . . . . . . . . . . 266--267
               Kang-Won Lee and   
               Khalil Amiri and   
                Sambit Sahu and   
            Chitra Venkatramani   On the sensitivity of cooperative
                                  caching performance to workload and
                                  network characteristics  . . . . . . . . 268--269
  Vaidyanathan Anantharaman and   
           Raghupathy Sivakumar   A microscopic analysis of TCP
                                  performance over wireless ad-hoc
                                  networks . . . . . . . . . . . . . . . . 270--271
            Baek-Young Choi and   
               Jaesung Park and   
                   Zhi-Li Zhang   Adaptive random sampling for load change
                                  detection  . . . . . . . . . . . . . . . 272--273
                 Zhili Zhao and   
              Jayesh Ametha and   
             Swaroop Darbha and   
          A. L. Narasimha Reddy   A method for estimating non-responsive
                                  traffic at a router  . . . . . . . . . . 274--275
                  Liang Guo and   
                  Ibrahim Matta   Scheduling flows with unknown sizes:
                                  approximate analysis . . . . . . . . . . 276--277
                 Sara Alouf and   
               Fabrice Huet and   
                  Philippe Nain   Forwarders vs. centralized server: an
                                  evaluation of two approaches for
                                  locating mobile agents . . . . . . . . . 278--279
             Hyunseok Chang and   
            Ramesh Govindan and   
                Sugih Jamin and   
           Scott J. Shenker and   
               Walter Willinger   Towards capturing representative
                                  AS-level Internet topologies . . . . . . 280--281
             Nevil Brownlee and   
                      kc claffy   Internet stream size distributions . . . 282--283
                 Yingwu Zhu and   
                      Yiming Hu   Can large disk built-in caches really
                                  improve system performance?  . . . . . . 284--285
               Rob Simmonds and   
           Carey Williamson and   
           Russell Bradford and   
              Martin Arlitt and   
                    Brian Unger   Web server benchmarking using parallel
                                  WAN emulation  . . . . . . . . . . . . . 286--287

ACM SIGMETRICS Performance Evaluation Review
Volume 30, Number 2, September, 2002

           Virgilio Almeida and   
              Martin Arlitt and   
                    Jerry Rolia   Analyzing a Web-based system's
                                  performance measures at multiple time
                                  scales . . . . . . . . . . . . . . . . . 3--9
           Mauro Andreolini and   
          Michele Colajanni and   
               Ruggero Morselli   Performance study of dispatching
                                  algorithms in multi-tier Web
                                  architectures  . . . . . . . . . . . . . 10--20
                   Yan Chen and   
              Khian Hao Lim and   
              Randy H. Katz and   
                  Chris Overton   On the stability of network distance
                                  estimation . . . . . . . . . . . . . . . 21--30
        Alexander Thomasian and   
                      Chang Liu   Disk scheduling policies with lookahead  31--40
            Alexandre Brandwajn   A note on SCSI bus waits . . . . . . . . 41--47
   Daniel A. Menascé and   
          Lavanya Kanchanapalli   Probabilistic scalable P2P resource
                                  location services  . . . . . . . . . . . 48--58

ACM SIGMETRICS Performance Evaluation Review
Volume 30, Number 3, December, 2002

             Mark S. Squillante   Special issue on the Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2002) . . . . . . . . . . 2--2
                 Shengke Yu and   
          Marianne Winslett and   
               Jonghyun Lee and   
                    Xiaosong Ma   Automatic and portable performance
                                  modeling for parallel I/O: a
                                  machine-learning approach  . . . . . . . 3--5
                 Alma Riska and   
              Vesselin Diev and   
                 Evgenia Smirni   Efficient fitting of long-tailed data
                                  sets into phase-type distributions . . . 6--8
         Mor Harchol-Balter and   
                Karl Sigman and   
                   Adam Wierman   Understanding the slowdown of large jobs
                                  in an M/GI/1 system  . . . . . . . . . . 9--11
            Leana Golubchik and   
                 John C. S. Lui   Multi-path streaming: is it worth the
                                  trouble? . . . . . . . . . . . . . . . . 12--14
             Y. Baryshnikov and   
                 E. Coffman and   
            P. Jelenkovi\'c and   
          P. Mom\vcilovi\'c and   
                  D. Rubenstein   Flood search under the California split
                                  strategy . . . . . . . . . . . . . . . . 15--16
               Vladimir Marbukh   Robust traffic engineering: game
                                  theoretic perspective  . . . . . . . . . 17--19
                H. Benaboud and   
                  A. Berqia and   
                       N. Mikou   An analytical study of CANIT algorithm
                                  in TCP protocol  . . . . . . . . . . . . 20--22
                 Ahmed E. Kamal   Modeling TCP Reno with RED-based routers 23--25
 Charalampos (Babis) Samios and   
                 Mary K. Vernon   Modeling throughput in TCP Vegas . . . . 26--28
            Y. Chandramouli and   
            Arnold L. Neidhardt   Mathematical analysis of the use of
                                  application-level traffic measurements
                                  for capacity engineering . . . . . . . . 29--31
               Cathy H. Xia and   
                   Zhen Liu and   
         Mark S. Squillante and   
                   Li Zhang and   
                 Naceur Malouch   Traffic modeling and performance
                                  analysis of commercial Web sites . . . . 32--34
              Peter J. Haas and   
                 Peter W. Glynn   On the validity of long-run estimation
                                  methods for discrete-event systems . . . 35--37
                 David Gamarnik   Computing stationary probability
                                  distributions and large deviation rates
                                  for constrained random walks: the
                                  undecidability results . . . . . . . . . 38--40
              Peter G. Harrison   Product-forms from a CAT and DOG . . . . 41--43

ACM SIGMETRICS Performance Evaluation Review
Volume 30, Number 4, March, 2003

                    Mark Allman   An evaluation of XML-RPC . . . . . . . . 2--11
                   Jon Weissman   Guest editorial: special issue on grid
                                  computing  . . . . . . . . . . . . . . . 12--12
             Valerie Taylor and   
                  Xingfu Wu and   
                   Rick Stevens   Prophesy: an infrastructure for
                                  performance analysis and modeling of
                                  parallel and Grid applications . . . . . 13--18
              Bruce B. Lowekamp   Combining active and passive network
                                  measurements to build scalable
                                  monitoring systems on the Grid . . . . . 19--26
              Allan Snavely and   
                  Greg Chun and   
             Henri Casanova and   
   Rob F. Van der Wijngaart and   
             Michael A. Frumkin   Benchmarks for Grid computing: a review
                                  of ongoing efforts and future directions 27--32
                    Dong Lu and   
                 Peter A. Dinda   GridG: generating realistic
                                  computational grids  . . . . . . . . . . 33--40
                    Rich Wolski   Experiences with predicting resource
                                  performance on-line in computational
                                  grid settings  . . . . . . . . . . . . . 41--49


ACM SIGMETRICS Performance Evaluation Review
Volume 31, Number 1, June, 2003

             Sylvain Girbal and   
            Gilles Mouchard and   
               Albert Cohen and   
                  Olivier Temam   DiST: a simple, reliable and scalable
                                  method to significantly reduce processor
                                  architecture simulation time . . . . . . 1--12
              Tor M. Aamodt and   
            Pedro Marcuello and   
                  Paul Chow and   
    Antonio González and   
             Per Hammarlund and   
                  Hong Wang and   
                   John P. Shen   A framework for modeling and
                                  optimization of prescient instruction
                                  prefetch . . . . . . . . . . . . . . . . 13--24
               Cathy H. Xia and   
                       Zhen Liu   Queueing systems with long-range
                                  dependent input process and
                                  subexponential service times . . . . . . 25--36
   Sebasti\`a Galmés and   
                Ramon Puigjaner   An algorithm for computing the mean
                                  response time of a single server queue
                                  with generalized on/off traffic arrivals 37--46
            Michele Garetto and   
                    Don Towsley   Modeling, simulation and measurements of
                                  queuing delay under long-tail Internet
                                  traffic  . . . . . . . . . . . . . . . . 47--57
            Stephan Bohacek and   
    João P. Hespanha and   
                 Junsoo Lee and   
                 Katia Obraczka   A hybrid systems modeling framework for
                                  fast and accurate simulation of data
                                  communication networks . . . . . . . . . 58--69
 Charalampos (Babis) Samios and   
                 Mary K. Vernon   Modeling the throughput of TCP Vegas . . 71--81
               Jiantao Wang and   
                    Ao Tang and   
                  Steven H. Low   Maximum and asymptotic UDP throughput
                                  under CHOKe  . . . . . . . . . . . . . . 82--90
                   Yong Liu and   
        Francesco Lo Presti and   
               Vishal Misra and   
                Don Towsley and   
                          Yu Gu   Fluid models and solutions for
                                  large-scale IP networks  . . . . . . . . 91--101

ACM SIGMETRICS Performance Evaluation Review
Volume 31, Number 2, September, 2003

                 P. G. Harrison   G-networks with propagating resets via
                                  RCAT . . . . . . . . . . . . . . . . . . 3--5
               Adam Wierman and   
           Takayuki Osogami and   
       Jörgen Olsén   Modeling TCP-Vegas under on/off traffic  6--8
             David Gamarnik and   
                 John Hasenbein   Weak instability in stochastic and fluid
                                  queueing networks  . . . . . . . . . . . 9--10
    Flávio P. Duarte and   
   Edmundo de Souza e Silva and   
                    Don Towsley   An adaptive FEC algorithm using hidden
                                  Markov chains  . . . . . . . . . . . . . 11--13
       Lachlan L. H. Andrew and   
          Yuliy Baryshnikov and   
              E. G. Coffman and   
           Stephen V. Hanly and   
                   Jolyon White   An asymptotically optimal greedy
                                  algorithm for large optical burst
                                  switching systems  . . . . . . . . . . . 14--16
               Vladimir Marbukh   Towards mean field theory of wireless
                                  networks . . . . . . . . . . . . . . . . 17--19
                    Sum Lam and   
              Rocky K. C. Chang   Per-queue stability analysis of a
                                  dynamic quota sharing scheme for
                                  wireless networks  . . . . . . . . . . . 20--22
           Richard T. B. Ma and   
                  C. M. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Incentive P2P networks: a protocol to
                                  encourage information sharing and
                                  contribution . . . . . . . . . . . . . . 23--25
                  Eitan Bachmat   On the performance of D-redundant
                                  storage systems  . . . . . . . . . . . . 26--27
                 Alma Riska and   
             Evgenia Smirni and   
              Gianfranco Ciardo   An aggregation-based method for the
                                  exact analysis of a class of GI/G/1-type
                                  processes  . . . . . . . . . . . . . . . 28--30
                  Wuqin Lin and   
                   Zhen Liu and   
         Harry Stavropoulos and   
                   Cathy H. Xia   Hard deadline queueing system with
                                  application to unified messaging service 31--33
                  Nikhil Bansal   On the average sojourn time under
                                  M/M/1/SRPT . . . . . . . . . . . . . . . 34--35
                Hanhua Feng and   
                   Vishal Misra   Mixed scheduling disciplines for network
                                  flows  . . . . . . . . . . . . . . . . . 36--39
            Soumyadip Ghosh and   
             Mark S. Squillante   Revisiting correlations and scheduling
                                  in Web servers . . . . . . . . . . . . . 40--42

ACM SIGMETRICS Performance Evaluation Review
Volume 31, Number 3, December, 2003

           Lance Titchkosky and   
              Martin Arlitt and   
               Carey Williamson   A performance comparison of dynamic Web
                                  technologies . . . . . . . . . . . . . . 2--11
                Mark Allman and   
             Wesley M. Eddy and   
                Shawn Ostermann   Estimating loss rates with TCP . . . . . 12--24
                John R. Douceur   Is remote host availability governed by
                                  a universal law? . . . . . . . . . . . . 25--29
               Paul Brebner and   
                 Jeffrey Gosper   J2EE infrastructure scalability and
                                  throughput estimation  . . . . . . . . . 30--36
                   Jike Cui and   
          Mansur. H. Samadzadeh   A new hybrid approach to exploit
                                  localities: LRFU with adaptive
                                  prefetching  . . . . . . . . . . . . . . 37--43

ACM SIGMETRICS Performance Evaluation Review
Volume 31, Number 4, March, 2004

                Doug Burger and   
          Anand Sivasubramaniam   Tools for computer architecture research 2--3
                Doug Burger and   
             Todd M. Austin and   
             Stephen W. Keckler   Recent extensions to the SimpleScalar
                                  Tool suite . . . . . . . . . . . . . . . 4--7
             Patrick Bohrer and   
             James Peterson and   
            Mootaz Elnozahy and   
               Ram Rajamony and   
               Ahmed Gheith and   
               Ron Rockhold and   
            Charles Lefurgy and   
                Hazim Shafi and   
                Tarun Nakra and   
               Rick Simpson and   
               Evan Speight and   
              Kartik Sudeep and   
        Eric Van Hensbergen and   
                    Lixin Zhang   Mambo: a full system simulator for the
                                  PowerPC architecture . . . . . . . . . . 8--12
               David Brooks and   
                Pradip Bose and   
             Margaret Martonosi   Power-performance simulation: design and
                                  validation strategies  . . . . . . . . . 13--18
        Manish Vachharajani and   
          Neil Vachharajani and   
             David A. Penry and   
             Jason A. Blome and   
                David I. August   The Liberty Simulation Environment,
                                  version 1.0  . . . . . . . . . . . . . . 19--24
               Greg Hamerly and   
              Erez Perelman and   
                    Brad Calder   How to use SimPoint to pick simulation
                                  points . . . . . . . . . . . . . . . . . 25--30
       Nikolaos Hardavellas and   
            Stephen Somogyi and   
          Thomas F. Wenisch and   
       Roland E. Wunderlich and   
               Shelley Chen and   
                Jangwoo Kim and   
              Babak Falsafi and   
               James C. Hoe and   
            Andreas G. Nowatzyk   SimFlex: a fast, accurate, flexible
                                  full-system simulation framework for
                                  performance evaluation of server
                                  architecture . . . . . . . . . . . . . . 31--34


ACM SIGMETRICS Performance Evaluation Review
Volume 32, Number 1, June, 2004

                  Debasis Mitra   Stochastic traffic engineering for
                                  demand uncertainty and risk-aware
                                  network revenue management . . . . . . . 1--1
              Gabriel Marin and   
            John Mellor-Crummey   Cross-architecture performance
                                  predictions for scientific applications
                                  using parameterized models . . . . . . . 2--13
                  Lan Huang and   
                  Gang Peng and   
                Tzi-cker Chiueh   Multi-dimensional storage virtualization 14--24
       Stephen M. Blackburn and   
                Perry Cheng and   
            Kathryn S. McKinley   Myths and realities: the performance
                                  impact of garbage collection . . . . . . 25--36
                    Wei Jin and   
           Jeffrey S. Chase and   
                   Jasleen Kaur   Interposed proportional sharing for a
                                  storage service utility  . . . . . . . . 37--48
             Augustin Soule and   
      Kavé Salamatia and   
                  Nina Taft and   
            Richard Emilion and   
       Konstantina Papagiannaki   Flow classification by histograms: or
                                  how to go on safari in the Internet  . . 49--60
            Anukool Lakhina and   
   Konstantina Papagiannaki and   
              Mark Crovella and   
            Christophe Diot and   
           Eric D. Kolaczyk and   
                      Nina Taft   Structural analysis of network traffic
                                  flows  . . . . . . . . . . . . . . . . . 61--72
             Augustin Soule and   
              Antonio Nucci and   
                  Rene Cruz and   
            Emilio Leonardi and   
                      Nina Taft   How to identify and estimate the largest
                                  traffic matrix elements in a dynamic
                                  environment  . . . . . . . . . . . . . . 73--84
              Nick Duffield and   
               Carsten Lund and   
                  Mikkel Thorup   Flow sampling under hard resource
                                  constraints  . . . . . . . . . . . . . . 85--96
               Samuli Aalto and   
               Urtzi Ayesta and   
            Eeva Nyberg-Oksanen   Two-level processor-sharing scheduling
                                  disciplines: mean delay analysis . . . . 97--105
               Idris A. Rai and   
     Guillaume Urvoy-Keller and   
             Mary K. Vernon and   
              Ernst W. Biersack   Performance analysis of LAS-based
                                  scheduling disciplines in a packet
                                  switched network . . . . . . . . . . . . 106--117
                  Peter Key and   
   Laurent Massoulié and   
                      Bing Wang   Emulating low-priority transport at the
                                  application layer: a background transfer
                                  service  . . . . . . . . . . . . . . . . 118--129
                  David Raz and   
                Hanoch Levy and   
            Benjamin Avi-Itzhak   A resource-allocation queueing fairness
                                  measure  . . . . . . . . . . . . . . . . 130--141
                    Vern Paxson   Measuring adversaries  . . . . . . . . . 142--142
               Hwangnam Kim and   
                Jennifer C. Hou   A fast simulation framework for IEEE
                                  802.11-operated wireless LANs  . . . . . 143--154
                   Fang Hao and   
            Murali Kodialam and   
                 T. V. Lakshman   ACCEL-RATE: a faster mechanism for
                                  memory efficient per-flow traffic
                                  estimation . . . . . . . . . . . . . . . 155--166
               Martin Burtscher   VPC3: a fast and effective
                                  trace-compression algorithm  . . . . . . 167--176
             Abhishek Kumar and   
                 Minho Sung and   
               Jun (Jim) Xu and   
                       Jia Wang   Data streaming algorithms for efficient
                                  and accurate estimation of flow size
                                  distribution . . . . . . . . . . . . . . 177--188
           Richard T. B. Ma and   
              Sam C. M. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   A game theoretic approach to provide
                                  incentive and service differentiation in
                                  P2P networks . . . . . . . . . . . . . . 189--198
               Simon S. Lam and   
                     Huaiyu Liu   Failure recovery for structured P2P
                                  networks: protocol design and
                                  performance evaluation . . . . . . . . . 199--210
              Xiaoming Wang and   
              Yueping Zhang and   
                 Xiafeng Li and   
                Dmitri Loguinov   On zone-balancing of peer-to-peer
                                  networks: analysis of random node join   211--222
                Aman Kansal and   
               Dunny Potter and   
             Mani B. Srivastava   Performance aware tasking for
                                  environmentally powered sensor networks  223--234
              Thomas Bonald and   
          Alexandre Prouti\`ere   On performance bounds for the
                                  integration of elastic and adaptive
                                  streaming flows  . . . . . . . . . . . . 235--245
               Supratim Deb and   
                     R. Srikant   Rate-based versus queue-based models of
                                  congestion control . . . . . . . . . . . 246--257
      Kartikeya Chandrayana and   
         Shivkumar Kalyanaraman   Uncooperative congestion control . . . . 258--269
            David Applegate and   
                Lee Breslau and   
                    Edith Cohen   Coping with network failures: routing
                                  strategies for optimal demand oblivious
                                  restoration  . . . . . . . . . . . . . . 270--281
              Kenneth C. Sevcik   Some systems, applications and models I
                                  have known . . . . . . . . . . . . . . . 282--282
Peerapol Tinnakornsrisuphap and   
                  Richard J. La   Characterization of queue fluctuations
                                  in probabilistic AQM mechanisms  . . . . 283--294
            Sarut Vanichpun and   
             Armand M. Makowski   The output of a cache under the
                                  independent reference model: where did
                                  the locality of reference go?  . . . . . 295--306
            Renata Teixeira and   
                Aman Shaikh and   
                Tim Griffin and   
               Jennifer Rexford   Dynamics of hot-potato routing in IP
                                  networks . . . . . . . . . . . . . . . . 307--319
             Sharad Agarwal and   
             Chen-Nee Chuah and   
     Supratik Bhattacharyya and   
                Christophe Diot   The impact of BGP dynamics on
                                  intra-domain traffic . . . . . . . . . . 319--330
              Nick Feamster and   
               Jared Winick and   
               Jennifer Rexford   A model of BGP routing for network
                                  engineering  . . . . . . . . . . . . . . 331--342
   François Baccelli and   
        Augustin Chaintreau and   
      Danny De Vleeschauwer and   
                 David McDonald   A mean-field analysis of short lived
                                  interacting TCP flows  . . . . . . . . . 343--354
                    N. Hohn and   
                  D. Veitch and   
            K. Papagiannaki and   
                        C. Diot   Bridging router performance and queuing
                                  theory . . . . . . . . . . . . . . . . . 355--366
                  T. Bonald and   
              M. Jonckheere and   
            A. Proutiére   Insensitive load balancing . . . . . . . 367--377
                  T. Bonald and   
                   S. Borst and   
                   N. Hegde and   
            A. Proutiére   Wireless data performance in multi-cell
                                  scenarios  . . . . . . . . . . . . . . . 378--380
               Rohit Kapoor and   
              Ling-Jyh Chen and   
                Alok Nandan and   
                Mario Gerla and   
                 M. Y. Sanadidi   CapProbe: a simple and accurate capacity
                                  estimation technique for wired and
                                  wireless environments  . . . . . . . . . 390--391
               Joel Sommers and   
               Hyungsuk Kim and   
                   Paul Barford   Harpoon: a flow-level traffic generator
                                  for router and network tests . . . . . . 392--392
           Vinay J. Ribeiro and   
            Rudolf H. Riedi and   
            Richard G. Baraniuk   Spatio-temporal available bandwidth
                                  estimation with STAB . . . . . . . . . . 394--395
        Raj Kumar Rajendran and   
                 Dan Rubenstein   Optimizing the quality of scalable video
                                  streams on P2P networks  . . . . . . . . 396--397
              Helen J. Wang and   
                 John Platt and   
                    Yu Chen and   
                Ruyun Zhang and   
                    Yi-Min Wang   PeerPressure for automatic
                                  troubleshooting  . . . . . . . . . . . . 398--399
      Jörg Hähner and   
        Dominique Dudkowski and   
Pedro José Marrón and   
                 Kurt Rothermel   A quantitative analysis of partitioning
                                  in mobile ad hoc networks  . . . . . . . 400--401
                 Dalu Zhang and   
                Weili Huang and   
                       Chen Lin   Locating the tightest link of a network
                                  path . . . . . . . . . . . . . . . . . . 402--403
          David G. Sullivan and   
           Margo I. Seltzer and   
                    Avi Pfeffer   Using probabilistic reasoning to
                                  automate software tuning . . . . . . . . 404--405
                  Bing Wang and   
                 Jim Kurose and   
            Prashant Shenoy and   
                    Don Towsley   Multimedia streaming via TCP: an
                                  analytic performance study . . . . . . . 406--407
               Laura Wynter and   
               Cathy H. Xia and   
                      Fan Zhang   Parameter inference of queueing models
                                  for IT systems using end-to-end
                                  measurements . . . . . . . . . . . . . . 408--409
                      Ben Pfaff   Performance analysis of BSTs in system
                                  software . . . . . . . . . . . . . . . . 410--411
               Mengzhi Wang and   
                  Kinman Au and   
        Anastassia Ailamaki and   
          Anthony Brockwell and   
         Christos Faloutsos and   
              Gregory R. Ganger   Storage device performance prediction
                                  with CART models . . . . . . . . . . . . 412--413
              Abhinav Kamra and   
               Vishal Misra and   
                    Erich Nahum   Controlling the performance of 3-tiered
                                  Web sites: modeling, design and
                                  implementation . . . . . . . . . . . . . 414--415
            Matthew Roughan and   
                Tim Griffin and   
                 Morley Mao and   
           Albert Greenberg and   
                  Brian Freeman   Combining routing and traffic data for
                                  detection of IP forwarding anomalies . . 416--417
                    Shu Tao and   
                    Kuai Xu and   
                    Ying Xu and   
                   Teng Fei and   
                  Lixin Gao and   
                Roch Guerin and   
                 Jim Kurose and   
                Don Towsley and   
                   Zhi-Li Zhang   Exploring the performance benefits of
                                  end-to-end path switching  . . . . . . . 418--419
                Scott F. Kaplan   Complete or fast reference trace
                                  collection for simulating
                                  multiprogrammed workloads: choose one    420--421
           Satish Raghunath and   
     Shivkumar Kalyanaraman and   
             K. K. Ramakrishnan   Quantifying trade-offs in resource
                                  allocation for VPNs  . . . . . . . . . . 422--423
               Yaoping Ruan and   
                   Vivek S. Pai   The origins of network server latency &
                                  the myth of connection scheduling  . . . 424--425
         K. G. Anagnostakis and   
                M. B. Greenwald   A hybrid direct-indirect estimator of
                                  network internal delays  . . . . . . . . 426--427
            Niklas Carlsson and   
             Derek L. Eager and   
                 Mary K. Vernon   Multicast protocols for scalable
                                  on-demand download . . . . . . . . . . . 428--429
               Vijay S. Pai and   
               Scott Rixner and   
                 Hyong-youb Kim   Isolating the performance impacts of
                                  network interface cards through
                                  microbenchmarks  . . . . . . . . . . . . 430--431
                  Jacky Chu and   
              Kevin Labonte and   
              Brian Neil Levine   An evaluation of Chord using traces of
                                  peer-to-peer file sharing  . . . . . . . 432--433

ACM SIGMETRICS Performance Evaluation Review
Volume 32, Number 2, September, 2004

             Mark S. Squillante   Guest Editor's foreword  . . . . . . . . 2--2
           Takayuki Osogami and   
               Adam Wierman and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   A recursive analysis technique for
                                  multi-dimensionally infinite Markov
                                  chains . . . . . . . . . . . . . . . . . 3--5
   Ana Paula Couto da Silva and   
       Rosa M. M. Leäo and   
       Edmundo de Souza e Silva   An efficient approximate technique for
                                  solving fluid models . . . . . . . . . . 6--8
               Yaakov Kogan and   
                Gagan Choudhury   Two problems in Internet reliability:
                                  new questions for old models . . . . . . 9--11
               Adam Wierman and   
             Mor Harchol-Balter   Formalizing SMART scheduling . . . . . . 12--13
                  David Raz and   
        Benjamin Avi-Itzhak and   
                    Hanoch Levy   How fair is queue prioritization?  . . . 14--16
                Hanhua Feng and   
                   Vishal Misra   On the relationship between coefficient
                                  of variation and the performance of
                                  M/G/1-FB queues  . . . . . . . . . . . . 17--19
               Junxia Chang and   
              Hayriye Ayhan and   
                        Jim Dai   Dynamic scheduling of multiclass open
                                  queueing networks in a slowly changing
                                  environment  . . . . . . . . . . . . . . 20--21
               Vladimir Marbukh   A knowledge plane as a pricing mechanism
                                  for aggregate, user-centric utility
                                  maximization . . . . . . . . . . . . . . 22--24
                  Wuqin Lin and   
                   Zhen Liu and   
               Cathy H. Xia and   
                       Li Zhang   Cost minimization of multi-tiered
                                  e-business infrastructure with
                                  end-to-end delay guarantees  . . . . . . 25--27
                Micah Adler and   
               Rakesh Kumar and   
                 Keith Ross and   
             Dan Rubenstein and   
               David Turner and   
                   David D. Yao   Two optimal peer selection problems  . . 28--30
              E. G. Coffman and   
     Andreas Constantinides and   
             Dan Rubenstein and   
             Bruce Shepherd and   
                Angelos Stavrou   Content distribution for seamless
                                  transmission . . . . . . . . . . . . . . 31--32
             David Gamarnik and   
           Petar Mom\vcilovi\'c   An asymptotic optimality of the
                                  transposition rule for linear lists  . . 33--34
          Yuliy Baryshnikov and   
                 Ed Coffman and   
           Petar Mom\vcilovi\'c   Self assembly times in DNA-based
                                  computation  . . . . . . . . . . . . . . 35--37
                Iraj Saniee and   
              Indra Widjaja and   
                  John Morrison   Performance of a distributed scheduling
                                  protocol for TWIN  . . . . . . . . . . . 38--40
         René Bekker and   
                  Sem Borst and   
Rudesindo Néñez-Queija   Integration of TCP-friendly streaming
                                  sessions and heavy-tailed elastic flows  41--43
            Gijs van Kessel and   
Rudesindo Núñez-Queija and   
                      Sem Borst   Asymptotic regimes and approximations
                                  for discriminatory processor sharing . . 44--46
                     Yi Cui and   
                   Yuan Xue and   
                Klara Nahrstedt   Optimal distributed multicast routing
                                  using network coding: theory and
                                  applications . . . . . . . . . . . . . . 47--49
                    Xuan Li and   
                   David D. Yao   Control and pricing in stochastic
                                  networks with concurrent resource
                                  occupancy  . . . . . . . . . . . . . . . 50--52
                    Xin Guo and   
                Yingdong Lu and   
             Mark S. Squillante   Optimal probabilistic routing in
                                  distributed parallel queues  . . . . . . 53--54

ACM SIGMETRICS Performance Evaluation Review
Volume 32, Number 3, December, 2004

   Humberto T. Marques Neto and   
         Jussara M. Almeida and   
       Leonardo C. D. Rocha and   
               Wagner Meira and   
         Pedro H. C. Guerra and   
         Virgilio A. F. Almeida   A characterization of broadband user
                                  behavior and their e-business activities 3--13
           Mauro Andreolini and   
          Michele Colajanni and   
       Riccardo Lancellotti and   
              Francesca Mazzoni   Fine grain performance evaluation of
                                  e-commerce sites . . . . . . . . . . . . 14--23
             Monchai Sopitkamol   Ranking configuration parameters in
                                  multi-tiered e-commerce sites  . . . . . 24--33
               S. D'Antonio and   
                M. Esposito and   
               S. P. Romano and   
                      G. Ventre   Assessing the scalability of
                                  component-based frameworks: the CADENUS
                                  case study . . . . . . . . . . . . . . . 34--43
                     Tao Ye and   
         Shivkumar Kalyanaraman   A recursive random search algorithm for
                                  network parameter optimization . . . . . 44--53

ACM SIGMETRICS Performance Evaluation Review
Volume 32, Number 4, March, 2005

     Boudewijn R. Haverkort and   
            Joost-Pieter Katoen   Performance and verification . . . . . . 3--3
          Gianfranco Ciardo and   
                Andrew S. Miner   Implicit data structures for logic and
                                  stochastic systems analysis  . . . . . . 4--9
             Christel Baier and   
     Boudewijn R. Haverkort and   
            Holger Hermanns and   
            Joost-Pieter Katoen   Model checking meets performance
                                  evaluation . . . . . . . . . . . . . . . 10--15
          Marta Kwiatkowska and   
              Gethin Norman and   
                   David Parker   Probabilistic model checking in
                                  practice: case studies with PRISM  . . . 16--21
             Christel Baier and   
            Frank Ciesinski and   
       Marcus Größer   ProbMela and verification of Markov
                                  decision processes . . . . . . . . . . . 22--27
            David N. Jansen and   
                Holger Hermanns   QoS modelling and analysis with UML
                                  statecharts: the StoCharts approach  . . 28--33
              Gerd Behrmann and   
              Kim G. Larsen and   
             Jacob I. Rasmussen   Optimal scheduling using priced timed
                                  automata . . . . . . . . . . . . . . . . 34--40
           Annabelle McIver and   
                 Carroll Morgan   Abstraction and refinement in
                                  probabilistic systems  . . . . . . . . . 41--47


ACM SIGMETRICS Performance Evaluation Review
Volume 33, Number 1, June, 2005

                    Urs Hoelzle   Google: or how I learned to love
                                  terabytes  . . . . . . . . . . . . . . . 1--1
   Laurent Massoulié and   
               Milan Vojnovi\'C   Coupon replication systems . . . . . . . 2--13
             Chunqiang Tang and   
            Melissa J. Buco and   
              Rong N. Chang and   
          Sandhya Dwarkadas and   
              Laura Z. Luan and   
                  Edward So and   
               Christopher Ward   Low traffic overlay networks with large
                                  routing tables . . . . . . . . . . . . . 14--25
              Derek Leonard and   
                  Vivek Rai and   
                Dmitri Loguinov   On lifetime-based node failure and
                                  stochastic resilience of decentralized
                                  peer-to-peer networks  . . . . . . . . . 26--37
                D. Dumitriu and   
                E. Knightly and   
              A. Kuzmanovic and   
                  I. Stoica and   
                  W. Zwaenepoel   Denial-of-service resilience in
                                  peer-to-peer file sharing systems  . . . 38--49
            Andrew W. Moore and   
                     Denis Zuev   Internet traffic classification using
                                  Bayesian analysis techniques . . . . . . 50--60
             Abhishek Kumar and   
                 Minho Sung and   
               Jun (Jim) Xu and   
                Ellen W. Zegura   A data streaming algorithm for
                                  estimating subpopulation flow size
                                  distribution . . . . . . . . . . . . . . 61--72
                Edith Cohen and   
                   Carsten Lund   Packet classification in large ISPs:
                                  design and evaluation of decision tree
                                  classifiers  . . . . . . . . . . . . . . 73--84
                   Ken Keys and   
                David Moore and   
                 Cristian Estan   A robust system for accurate real-time
                                  summaries of Internet traffic  . . . . . 85--96
              Sunwoong Choi and   
                Kihong Park and   
                 Chong-kwon Kim   On the performance characteristics of
                                  WLANs: revisited . . . . . . . . . . . . 97--108
         Venkatesh Ramaiyan and   
               Anurag Kumar and   
                   Eitan Altman   Fixed point analysis of single cell IEEE
                                  802.11e WLANs: uniqueness,
                                  multistability and throughput
                                  differentiation  . . . . . . . . . . . . 109--120
        Christoph Lindemann and   
            Oliver P. Waldhorst   Modeling epidemic information
                                  dissemination on mobile devices with
                                  finite buffers . . . . . . . . . . . . . 121--132
           V. S. Anil Kumar and   
          Madhav V. Marathe and   
   Srinivasan Parthasarathy and   
             Aravind Srinivasan   Algorithmic aspects of capacity in
                                  wireless networks  . . . . . . . . . . . 133--144
               Zhifeng Chen and   
                  Yan Zhang and   
              Yuanyuan Zhou and   
                Heidi Scott and   
                 Berni Schiefer   Empirical evaluation of multi-level
                                  buffer cache collaboration for storage
                                  systems  . . . . . . . . . . . . . . . . 145--156
                Ali R. Butt and   
               Chris Gniady and   
                  Y. Charlie Hu   The performance impact of kernel
                                  prefetching on buffer cache replacement
                                  algorithms . . . . . . . . . . . . . . . 157--168
                  Erik Berg and   
                 Erik Hagersten   Fast data-locality profiling of native
                                  execution  . . . . . . . . . . . . . . . 169--180
                Kamen Yotov and   
             Keshav Pingali and   
                 Paul Stodghill   Automatic measurement of memory
                                  hierarchy parameters . . . . . . . . . . 181--192
              M. Jonckheere and   
                     J. Virtamo   Optimal insensitive routing and
                                  bandwidth sharing in simple data
                                  networks . . . . . . . . . . . . . . . . 193--204
               Adam Wierman and   
         Mor Harchol-Balter and   
               Takayuki Osogami   Nearly insensitive bounds on SMART
                                  scheduling . . . . . . . . . . . . . . . 205--216
                 A. Kortebi and   
             L. Muscariello and   
                S. Oueslati and   
                     J. Roberts   Evaluating the number of active flows in
                                  a scheduler realizing fair statistical
                                  bandwidth sharing  . . . . . . . . . . . 217--228
               Adam Wierman and   
             Mor Harchol-Balter   Classifying scheduling policies with
                                  respect to higher moments of conditional
                                  response time  . . . . . . . . . . . . . 229--240
                  Hao Jiang and   
          Constantinos Dovrolis   Why is the Internet traffic bursty in
                                  short time scales? . . . . . . . . . . . 241--252
                Matthew Roughan   Fundamental bounds on the accuracy of
                                  network performance measurements . . . . 253--264
                Manish Jain and   
          Constantinos Dovrolis   End-to-end estimation of the available
                                  bandwidth variation range  . . . . . . . 265--276
                Mung Chiang and   
                  J. W. Lee and   
              R. Calderbank and   
                 D. Palomar and   
                       M. Fazel   Network utility maximization with
                                  nonconcave, coupled, and
                                  reliability-based utilities  . . . . . . 277--277
                Mung Chiang and   
                     Steven Low   Optimization and Control of
                                  Communication Networks . . . . . . . . . 277--277
                 Steven Low and   
                   J. Doyle and   
                      L. Li and   
                    A. Tang and   
                        J. Wang   Optimization model of Internet protocols 277--277
                  Debasis Mitra   Joint pricing-network design and
                                  stochastic traffic engineering to manage
                                  demand uncertainty . . . . . . . . . . . 278--278
             John Musacchio and   
                   Jean Walrand   Achieving fair rates with ingress
                                  policing . . . . . . . . . . . . . . . . 278--278
                Ness Shroff and   
                    Xiaojun Lin   An optimization based approach for
                                  cross-layer design in wireless
                                  communication networks . . . . . . . . . 278--278
               Florin Ciucu and   
             Almut Burchard and   
            Jörg Liebeherr   A network service curve approach for the
                                  stochastic analysis of networks  . . . . 279--290
           Bhuvan Urgaonkar and   
          Giovanni Pacifici and   
            Prashant Shenoy and   
             Mike Spreitzer and   
                  Asser Tantawi   An analytical model for multi-tier
                                  Internet services and its applications   291--302
                  Yiyu Chen and   
                Amitayu Das and   
                   Wubi Qin and   
      Anand Sivasubramaniam and   
                  Qian Wang and   
               Natarajan Gautam   Managing server energy and operational
                                  costs in hosting centers . . . . . . . . 303--314
               Yaoping Ruan and   
               Vivek S. Pai and   
                Erich Nahum and   
                 John M. Tracey   Evaluating the impact of simultaneous
                                  multithreading on network servers using
                                  real hardware  . . . . . . . . . . . . . 315--326
              Benoit Donnet and   
            Philippe Raoult and   
             Timur Friedman and   
                  Mark Crovella   Efficient algorithms for large-scale
                                  topology discovery . . . . . . . . . . . 327--338
              Z. Morley Mao and   
                   Lili Qiu and   
                   Jia Wang and   
                      Yin Zhang   On AS-level path inference . . . . . . . 339--349
           Qi (George) Zhao and   
             Abhishek Kumar and   
                   Jia Wang and   
                   Jun (Jim) Xu   Data streaming algorithms for accurate
                                  and efficient measurement of traffic and
                                  flow matrices  . . . . . . . . . . . . . 350--361
             Augustin Soule and   
            Anukool Lakhina and   
                  Nina Taft and   
   Konstantina Papagiannaki and   
            Kave Salamatian and   
              Antonio Nucci and   
              Mark Crovella and   
                Christophe Diot   Traffic matrices: balancing
                                  measurements, inference and modeling . . 362--373
          Saurabh Ganeriwal and   
            Deepak Ganesanl and   
                Mark Hansen and   
         Mani B. Srivastava and   
                 Deborah Estrin   Rate-adaptive time synchronization for
                                  long-lived sensor networks . . . . . . . 374--375
               An-I A. Wang and   
               Peter Reiher and   
                 Geoff Kuenning   Introducing permuted states for
                                  analyzing conflict rates in optimistic
                                  replication  . . . . . . . . . . . . . . 376--377
           James W. Mickens and   
                 Brian D. Noble   Predicting node availability in
                                  peer-to-peer networks  . . . . . . . . . 378--379
                   Lili Qiu and   
              Paramvir Bahl and   
                 Ananth Rao and   
                    Lidong Zhou   Troubleshooting multihop wireless
                                  networks . . . . . . . . . . . . . . . . 380--381
                  David Raz and   
        Benjamin Avi-Itzhak and   
                    Hanoch Levy   Fair operation of multi-server and
                                  multi-queue systems  . . . . . . . . . . 382--383
              Eric Anderson and   
                 Dirk Beyer and   
         Kamalika Chaudhuri and   
              Terence Kelly and   
             Norman Salazar and   
            Cipriano Santos and   
            Ram Swaminathan and   
              Robert Tarjan and   
               Janet Wiener and   
                   Yunhong Zhou   Deadline scheduling for animation
                                  rendering  . . . . . . . . . . . . . . . 384--385
                   Simin He and   
                 Shutao Sun and   
                   Wei Zhao and   
              Yanfeng Zheng and   
                        Wen Gao   Smooth switching problem in buffered
                                  crossbar switches  . . . . . . . . . . . 386--387
                      Qi He and   
      Constantinos Dovrolis and   
                  Mostafa Ammar   Prediction of TCP throughput:
                                  formula-based and history-based methods  388--389
                 David Chua and   
           Eric D. Kolaczyk and   
                  Mark Crovella   A statistical framework for efficient
                                  monitoring of end-to-end network
                                  properties . . . . . . . . . . . . . . . 390--391
               Ningning Zhu and   
                 Jiawu Chen and   
            Tzi-cker Chiueh and   
                  Daniel Ellard   TBBT: scalable and accurate trace replay
                                  for file server evaluation . . . . . . . 392--393
              Sandeep Sarat and   
           Vasileios Pappas and   
                 Andreas Terzis   On the use of anycast in DNS . . . . . . 394--395
          Jayaram Mudigonda and   
             Harrick M. Vin and   
                   Raj Yavatkar   Managing memory access latency in packet
                                  processing . . . . . . . . . . . . . . . 396--397
         Ashwin R. Bharambe and   
              Cormac Herley and   
         Venkata N. Padmanabhan   Some observations on BitTorrent
                                  performance  . . . . . . . . . . . . . . 398--399
          Sridhar Machiraju and   
              Darryl Veitch and   
   François Baccelli and   
              Antonio Nucci and   
                  Jean C. Bolot   Theory and practice of cross-traffic
                                  estimation . . . . . . . . . . . . . . . 400--401
           Daniel Stutzbach and   
                    Reza Rejaie   Characterizing the two-tier Gnutella
                                  topology . . . . . . . . . . . . . . . . 402--403
             Saurabh Tewari and   
              Leonard Kleinrock   Analysis of search and replication in
                                  unstructured peer-to-peer networks . . . 404--405
             Jianyong Zhang and   
      Anand Sivasubramaniam and   
                 Alma Riska and   
                  Qian Wang and   
                    Erik Riedel   An interposed 2-Level I/O scheduling
                                  framework for performance virtualization 406--407
          Thomas F. Wenisch and   
       Roland E. Wunderlich and   
              Babak Falsafi and   
                   James C. Hoe   TurboSMARTS: accurate microarchitecture
                                  simulation sampling in minutes . . . . . 408--409
                  Chunyu Hu and   
                Jennifer C. Hou   A reactive channel model for expediting
                                  wireless network simulation  . . . . . . 410--411
           Robin Groenevelt and   
              Philippe Nain and   
                      Ger Koole   Message delay in MANET . . . . . . . . . 412--413

ACM SIGMETRICS Performance Evaluation Review
Volume 33, Number 2, September, 2005

             Mark S. Squillante   Special issue on the workshop on
                                  MAthematical performance Modeling And
                                  Analysis (MAMA 2005): Guest Editor's
                                  foreword . . . . . . . . . . . . . . . . 2--2
        Giovanna Carofiglio and   
              Rossano Gaeta and   
            Michele Garetto and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                  Matteo Sereno   A statistical physics approach for
                                  modelling P2P systems  . . . . . . . . . 3--5
       Ananth I. Sundararaj and   
               Manan Sanghi and   
              John R. Lange and   
                 Peter A. Dinda   An optimization problem in adaptive
                                  virtual environments . . . . . . . . . . 6--8
                 David M. Nicol   Optimized pre-copy calibration of hard
                                  drives . . . . . . . . . . . . . . . . . 9--11
                 J. Kumaran and   
                K. Mitchell and   
            A. van de Liefvoort   A spectral approach to compute
                                  performance measures in a correlated
                                  single server queue  . . . . . . . . . . 12--14
          Pierre M. Fiorini and   
             Robert Sheahan and   
                  Lester Lipsky   On unreliable computing systems when
                                  heavy-tails appear as a result of the
                                  recovery procedure . . . . . . . . . . . 15--17
                   Qi Zhang and   
               Armin Heindl and   
                 Evgenia Smirni   Models of the departure process of a
                                  BMAP/MAP/1 queue . . . . . . . . . . . . 18--20
    Krishna K. Ramachandran and   
                  Biplab Sikdar   A population based approach to model
                                  network lifetime in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 21--23
              Abhinav Kamra and   
                Jon Feldman and   
               Vishal Misra and   
                 Dan Rubenstein   Data persistence in sensor networks:
                                  towards optimal encoding for data
                                  recovery in partial network failures . . 24--26
               Wenjie Jiang and   
             John C. S. Lui and   
                  Dah-Ming Chiu   Interaction of overlay networks:
                                  properties and implications  . . . . . . 27--29
           Richard T. B. Ma and   
               Vishal Misra and   
                 Dan Rubenstein   Cooperative and non-cooperative models
                                  for slotted-Aloha type MAC protocols . . 30--32
             Michele Covell and   
                  Sumit Roy and   
                    Beomjoo Seo   Predictive modeling of streaming servers 33--35
         Mor Harchol-Balter and   
           Takayuki Osogami and   
             Alan Scheller-Wolf   Robustness of threshold policies in
                                  beneficiary-donor model  . . . . . . . . 36--38
                  David Raz and   
        Benjamin Avi-Itzhak and   
                    Hanoch Levy   Locality of reference and the use of
                                  sojourn time variance for measuring
                                  queue unfairness: extended abstract  . . 39--41
                Yingdong Lu and   
             Mark S. Squillante   Dynamic scheduling to optimize utility
                                  functions of sojourn time moments in
                                  queueing systems . . . . . . . . . . . . 42--44

ACM SIGMETRICS Performance Evaluation Review
Volume 33, Number 3, December, 2005

   Konstantina Papagiannaki and   
                      Yin Zhang   Guest Editor's foreword  . . . . . . . . 2--2
            Y. Chandramouli and   
               Arnold Neidhardt   Analysis of network congestion inference
                                  techniques . . . . . . . . . . . . . . . 3--9
                  Hal Burch and   
                    Chris Chase   Monitoring link delays with one
                                  measurement host . . . . . . . . . . . . 10--17
            Baek-Young Choi and   
         Supratik Bhattacharyya   Observations on Cisco sampled NetFlow    18--23
             Augustin Soule and   
     Kavé Salamatian and   
              Antonio Nucci and   
                      Nina Taft   Traffic matrix tracking using Kalman
                                  filters  . . . . . . . . . . . . . . . . 24--31
                 Ryan Lance and   
                    Ian Frommer   Round-trip time inference via passive
                                  monitoring . . . . . . . . . . . . . . . 32--38
              Earl Lawrence and   
         George Michailidis and   
                  Vijay N. Nair   Local area network analysis using
                                  end-to-end delay tomography  . . . . . . 39--45
                   Wenhong Tian   The transient analysis of loss networks  46--50
             Daniel Fiedler and   
            Kristen Walcott and   
          Thomas Richardson and   
      Gregory M. Kapfhammer and   
                 Ahmed Amer and   
           Panos K. Chrysanthis   Towards the measurement of tuple space
                                  performance  . . . . . . . . . . . . . . 51--62

ACM SIGMETRICS Performance Evaluation Review
Volume 33, Number 4, March, 2006

                 Alma Riska and   
                    Erik Riedel   Guest Editor's foreword: bigger and
                                  faster and smaller . . . . . . . . . . . 2--3
            Kimberly Keeton and   
                  Arif Merchant   Challenges in managing dependable data
                                  systems  . . . . . . . . . . . . . . . . 4--10
             Jianyong Zhang and   
           Prasenjit Sarkar and   
          Anand Sivasubramaniam   Achieving completion time guarantees in
                                  an opportunistic data migration scheme   11--16
            Alexander Thomasian   Multi-level RAID for very large disk
                                  arrays . . . . . . . . . . . . . . . . . 17--22
            Michael Mesnier and   
              Matthew Wachs and   
             Brandon Salmon and   
              Gregory R. Ganger   Relative fitness models for storage  . . 23--28
   Andrea C. Arpaci-Dusseau and   
    Remzi H. Arpaci-Dusseau and   
 Lakshmi N. Bairavasundaram and   
          Timothy E. Denehy and   
     Florentina I. Popovici and   
        Vijayan Prabhakaran and   
              Muthian Sivathanu   Semantically-smart disk systems: past,
                                  present, and future  . . . . . . . . . . 29--35
              Eitan Bachmat and   
             Vladimir Braverman   Batched disk scheduling with delays  . . 36--41
           Saman Zarandioon and   
            Alexander Thomasian   Optimization of online disk scheduling
                                  algorithms . . . . . . . . . . . . . . . 42--46


ACM SIGMETRICS Performance Evaluation Review
Volume 34, Number 1, June, 2006

                 Daniel A. Reed   Performance and reliability: the
                                  ubiquitous challenge . . . . . . . . . . 1--2
               Eno Thereska and   
             Brandon Salmon and   
                John Strunk and   
              Matthew Wachs and   
       Michael Abd-El-Malek and   
                Julio Lopez and   
              Gregory R. Ganger   Stardust: tracking activity in a
                                  distributed storage system . . . . . . . 3--14
           Eduardo Pinheiro and   
          Ricardo Bianchini and   
                Cezary Dubnicki   Exploiting redundancy to conserve energy
                                  in storage systems . . . . . . . . . . . 15--26
              Eytan Modiano and   
              Devavrat Shah and   
                    Gil Zussman   Maximizing throughput in wireless
                                  networks via gossiping . . . . . . . . . 27--38
                    Yan Gao and   
              Dah-Ming Chiu and   
                 John C. S. Lui   Determining the end-to-end throughput
                                  capacity in multi-hop networks:
                                  methodology and applications . . . . . . 39--50
            Can Emre Koksal and   
              Kyle Jamieson and   
               Emre Telatar and   
                 Patrick Thiran   Impacts of channel variability on
                                  link-level throughput in wireless
                                  networks . . . . . . . . . . . . . . . . 51--62
             Arunesh Mishra and   
          Vivek Shrivastava and   
             Suman Banerjee and   
                William Arbaugh   Partially overlapped channels not
                                  considered harmful . . . . . . . . . . . 63--74
                P. Lieshout and   
                 M. Mandjes and   
                       S. Borst   GPS scheduling: selection of optimal
                                  weights and comparison with strict
                                  priorities . . . . . . . . . . . . . . . 75--86
       H. Christian Gromoll and   
            Philippe Robert and   
                 Bert Zwart and   
                 Richard Bakker   The impact of reneging in processor
                                  sharing queues . . . . . . . . . . . . . 87--96
             Chang-Woo Yang and   
               Adam Wierman and   
          Sanjay Shakkottai and   
             Mor Harchol-Balter   Tail asymptotics for policies favoring
                                  short jobs in a many-flows regime  . . . 97--108
              Thomas Bonald and   
           Aleksi Penttinen and   
                  Jorma Virtamo   On light and heavy traffic
                                  approximations of balanced fairness  . . 109--120
               Han Hee Song and   
                   Lili Qiu and   
                      Yin Zhang   NetQuest: a flexible framework for
                                  large-scale network measurement  . . . . 121--132
                    Qi Zhao and   
                   Zihui Ge and   
                   Jia Wang and   
                         Jun Xu   Robust traffic matrix estimation with
                                  imperfect information: making use of
                                  multiple data sources  . . . . . . . . . 133--144
                Ashwin Lall and   
                 Vyas Sekar and   
          Mitsunori Ogihara and   
                     Jun Xu and   
                      Hui Zhang   Data streaming algorithms for estimating
                                  entropy of network traffic . . . . . . . 145--156
               Sanghwan Lee and   
               Zhi-Li Zhang and   
                Sambit Sahu and   
                  Debanjan Saha   On suitability of Euclidean embedding of
                                  Internet hosts . . . . . . . . . . . . . 157--168
                Giuliano Casale   An efficient algorithm for the exact
                                  analysis of multiclass queueing networks
                                  with large population sizes  . . . . . . 169--180
           J. Van Velthoven and   
               B. Van Houdt and   
                     C. Blondia   Transient analysis of tree-like
                                  processes and its application to random
                                  access systems . . . . . . . . . . . . . 181--190
                 Peter Buchholz   Bounding stationary results of Tandem
                                  networks with MAP input and PH service
                                  time distributions . . . . . . . . . . . 191--202
                Varun Gupta and   
         Mor Harchol-Balter and   
         Alan Scheller Wolf and   
                   Uri Yechiali   Fundamental characteristics of queues
                                  with fluctuating load  . . . . . . . . . 203--215
        Satish Narayanasamy and   
          Cristiano Pereira and   
               Harish Patil and   
                Robert Cohn and   
                    Brad Calder   Automatic logging of operating system
                                  effects to guide application-level
                                  architecture simulation  . . . . . . . . 216--227
                    Fei Guo and   
                    Yan Solihin   An analytical model for cache
                                  replacement policy performance . . . . . 228--239
            David Olshefski and   
                     Jason Nieh   Understanding the management of client
                                  perceived response time  . . . . . . . . 240--251
                  Mikkel Thorup   Confidence intervals for priority
                                  sampling . . . . . . . . . . . . . . . . 252--263
           Takayuki Osogami and   
                Toshinari Itoko   Finding probably better system
                                  configurations quickly . . . . . . . . . 264--275
                  Thomas Bonald   The Erlang model with non-Poisson call
                                  arrivals . . . . . . . . . . . . . . . . 276--286
              Markus Fidler and   
                Jens B. Schmitt   On the way to a distributed systems
                                  calculus: an end-to-end network calculus
                                  with data scaling  . . . . . . . . . . . 287--298
             Enoch Peserico and   
                  Larry Rudolph   Robust network connectivity: when it's
                                  the big picture that matters . . . . . . 299--310
               Qunfeng Dong and   
             Suman Banerjee and   
                   Jia Wang and   
            Dheeraj Agrawal and   
                Ashutosh Shukla   Packet classifiers in ternary CAMs can
                                  be smaller . . . . . . . . . . . . . . . 311--322
                    Qi Zhao and   
                     Jun Xu and   
                       Zhen Liu   Design of a novel statistics counter
                                  architecture with optimal space and time
                                  efficiency . . . . . . . . . . . . . . . 323--334
               Rakesh Kumar and   
               David D. Yao and   
            Amitabha Bagchi and   
              Keith W. Ross and   
                 Dan Rubenstein   Fluid modeling of pollution
                                  proliferation in P2P networks  . . . . . 335--346
                    Kang Li and   
                   Zhenyu Zhong   Fast statistical spam filter by
                                  approximate classifications  . . . . . . 347--358
                George Kola and   
                 Mary K. Vernon   QuickProbe: available bandwidth
                                  estimation in two roundtrips . . . . . . 359--360
           Neena R. Kaushik and   
         Silvia M. Figueira and   
           Stephen A. Chiappari   Flexible time-windows for advance
                                  reservation in LambdaGrids . . . . . . . 361--362
             Chad Verbowski and   
               Emre Kiciman and   
               Brad Daniels and   
                Yi-Min Wang and   
             Roussi Roussev and   
                    Shan Lu and   
                      Juhan Lee   Analyzing persistent state interactions
                                  to improve state management  . . . . . . 363--364
             Maaike Verloop and   
Rudesindo Núñez-Queija and   
                      Sem Borst   Delay-optimal scheduling in
                                  bandwidth-sharing networks . . . . . . . 365--366
              Michael Menth and   
              Robert Henjes and   
           Christian Zepfel and   
             Sebastian Gehrsitz   Throughput performance of popular JMS
                                  servers  . . . . . . . . . . . . . . . . 367--368
                 Rahul Garg and   
               Yogish Sabharwal   Optimizing the HPCC randomaccess
                                  benchmark on Blue Gene/L supercomputer   369--370
         Tadeusz Piotrowski and   
             Suman Banerjee and   
          Sudeept Bhatnagar and   
             Samrat Ganguly and   
                  Rauf Izmailov   Peer-to-peer streaming of stored media:
                                  the indirect approach  . . . . . . . . . 371--372
              Ajay Dholakia and   
      Evangelos Eleftheriou and   
                 Xiao-Yu Hu and   
              Ilias Iliadis and   
                  Jai Menon and   
                         KK Rao   Analysis of a new intra-disk redundancy
                                  scheme for high-reliability RAID storage
                                  systems in the presence of unrecoverable
                                  errors . . . . . . . . . . . . . . . . . 373--374
              Fred A. Bower and   
                Derek Hower and   
              Mahmut Yilmaz and   
            Daniel J. Sorin and   
                      Sule Ozev   Applying architectural vulnerability
                                  Analysis to hard faults in the
                                  microprocessor . . . . . . . . . . . . . 375--376
           James A. Broberg and   
                   Zhen Liu and   
               Cathy H. Xia and   
                       Li Zhang   A multicommodity flow model for
                                  distributed stream processing  . . . . . 377--378

ACM SIGMETRICS Performance Evaluation Review
Volume 34, Number 2, September, 2006

                      T. Bonald   Guest Editor's foreword  . . . . . . . . 2--2
          Sophie Hautphenne and   
             Kenji Leibnitz and   
             Marie-Ange Remiche   Extinction probability in peer-to-peer
                                  file diffusion . . . . . . . . . . . . . 3--4
               J. Mundinger and   
                R. R. Weber and   
                       G. Weiss   Analysis of peer-to-peer file
                                  dissemination amongst users of different
                                  upload capacities  . . . . . . . . . . . 5--6
            Emmanuel Besson and   
               Aline Gouget and   
            Hervé Sibert   The GAIA sensor: an early DDoS detection
                                  tool . . . . . . . . . . . . . . . . . . 7--8
                   G. Hardy and   
                   C. Lucet and   
                     N. Limnios   Probability of connection in regular
                                  stochastic networks  . . . . . . . . . . 9--10
              Ana Bu\vsi\'c and   
           Jean-Michel Fourneau   Bounding transient and steady-state
                                  dependability measures through
                                  algorithmic stochastic comparison  . . . 11--12
               Craig Bossie and   
              Pierre M. Fiorini   On checkpointing and heavy-tails in
                                  unreliable computing environments  . . . 13--15
           James W. Mickens and   
                 Brian D. Noble   Improving distributed system performance
                                  using machine availability prediction    16--18
             Andrzej Chydzinski   Buffer overflow calculations in a batch
                                  arrival queue  . . . . . . . . . . . . . 19--21
   Daniel A. Menascé and   
                 Vasudeva Akula   Evaluating caching policies for online
                                  auctions . . . . . . . . . . . . . . . . 22--23
          Jean-Marc Vincent and   
     Jérôme Vienne   Perfect simulation of index based
                                  routing queueing networks  . . . . . . . 24--25
          Cheng-Shang Chang and   
               Yi-Ting Chen and   
                  Jay Cheng and   
               Po-Kai Huang and   
                  Duan-Shin Lee   From switching theory to `queueing'
                                  theory . . . . . . . . . . . . . . . . . 26--28
      Anastasios Giannoulis and   
  Konstantinos P. Tsoukatos and   
             Leandros Tassiulas   Cross-layer power control in wireless
                                  networks . . . . . . . . . . . . . . . . 29--31

ACM SIGMETRICS Performance Evaluation Review
Volume 34, Number 3, December, 2006

             Mark S. Squillante   Foreword . . . . . . . . . . . . . . . . 2--2
          Anastase Nakassis and   
               Vladimir Marbukh   Towards power and QoS aware wireless
                                  networks . . . . . . . . . . . . . . . . 3--5
        Emine \cSule Yazici and   
Selda Küçükçifçi and   
    Öznur Özkasap and   
           Mine Ça\uglar   Exact probability distributions for
                                  peer-to-peer epidemic information
                                  diffusion  . . . . . . . . . . . . . . . 6--8
                   Hao Luan and   
          Danny H. K. Tsang and   
                  Kin Wah Kwong   Media overlay construction via a Markov
                                  chain Monte Carlo method . . . . . . . . 9--11
           Jochen Mundinger and   
              Richard Weber and   
                   Gideon Weiss   Analysis of peer-to-peer file
                                  dissemination  . . . . . . . . . . . . . 12--14
                  David Raz and   
                Hanoch Levy and   
            Benjamin Avi-Itzhak   On the twin measure and system
                                  predictability and fairness  . . . . . . 15--17
                  Patrick Brown   Comparing FB and PS scheduling policies  18--20
                   Adam Wierman   On the effect of inexact size
                                  information in size based policies . . . 21--23
             Robert Sheahan and   
              Lester Lipsky and   
          Pierre M. Fiorini and   
          Sòren Asmussen   On the completion time distribution for
                                  tasks that must restart from the
                                  beginning if a failure occurs  . . . . . 24--26
          Fernando Silveira and   
       Edmundo de Souza e Silva   Modeling the short-term dynamics of
                                  packet losses  . . . . . . . . . . . . . 27--29
              Teunis J. Ott and   
                  Jason Swanson   Stationarity of some processes in
                                  transport protocols  . . . . . . . . . . 30--32
          Yuliy Baryshnikov and   
                 Ed Coffman and   
                  Jing Feng and   
                   Vishal Misra   Free-Drop TCP  . . . . . . . . . . . . . 33--35
              G. Carofiglio and   
             C. Chiasserini and   
                 M. Garetto and   
                    E. Leonardi   Analysis of route stability under the
                                  random direction mobility model  . . . . 36--38
               Takayuki Osogami   Finding probably best system
                                  configurations quickly . . . . . . . . . 39--41
               David D. Yao and   
                   Heng-Qing Ye   Asymptotic optimality of threshold
                                  control in a stochastic network based on
                                  a fixed-point approximation  . . . . . . 42--44
              Mohsen Bayati and   
              Mayank Sharma and   
             Mark S. Squillante   Optimal scheduling in a multiserver
                                  stochastic network . . . . . . . . . . . 45--47
           Mahmoud Elhaddad and   
                Rami Melhem and   
                    Taieb Znati   Analysis of a transmission scheduling
                                  algorithm for supporting bandwidth
                                  guarantees in bufferless networks  . . . 48--63

ACM SIGMETRICS Performance Evaluation Review
Volume 34, Number 4, March, 2007

             Mor Harchol-Balter   Foreword . . . . . . . . . . . . . . . . 2--3
                   Adam Wierman   Fairness and classifications . . . . . . 4--12
                 Onno Boxma and   
                     Bert Zwart   Tails in scheduling  . . . . . . . . . . 13--20
          Ernst W. Biersack and   
           Bianca Schroeder and   
         Guillaume Urvoy-Keller   Scheduling in practice . . . . . . . . . 21--28
              Thomas Bonald and   
                  James Roberts   Scheduling network traffic . . . . . . . 29--35
               Samuli Aalto and   
               Urtzi Ayesta and   
                  Sem Borst and   
               Vishal Misra and   
Rudesindo Núñez-Queija   Beyond processor sharing . . . . . . . . 36--43
             Mark S. Squillante   Stochastic analysis of multiserver
                                  systems  . . . . . . . . . . . . . . . . 44--51
                     Kirk Pruhs   Competitive online scheduling for server
                                  systems  . . . . . . . . . . . . . . . . 52--58
                     Hui Li and   
               Michael Muskulus   Analysis and modeling of job arrivals in
                                  a production grid  . . . . . . . . . . . 59--70


ACM SIGMETRICS Performance Evaluation Review
Volume 35, Number 1, June, 2007

             Ismail Kadayif and   
                Mahmut Kandemir   Modeling and improving data cache
                                  reliability: 1 . . . . . . . . . . . . . 12--12
                Ajay Gulati and   
              Arif Merchant and   
                Peter J. Varman   pClock: an arrival curve based approach
                                  for QoS guarantees in shared storage
                                  systems  . . . . . . . . . . . . . . . . 13--24
                  Ravi Iyer and   
                    Li Zhao and   
                    Fei Guo and   
            Ramesh Illikkal and   
           Srihari Makineni and   
                 Don Newell and   
                Yan Solihin and   
                   Lisa Hsu and   
                Steve Reinhardt   QoS policies and architecture for
                                  cache/memory in CMP platforms  . . . . . 25--36
         Michael P. Mesnier and   
              Matthew Wachs and   
         Raja R. Sambasivan and   
             Alice X. Zheng and   
              Gregory R. Ganger   Modeling the relative fitness of storage 37--48
                 Zhihua Wen and   
             Sipat Triukose and   
             Michael Rabinovich   Facilitating focused Internet
                                  measurements . . . . . . . . . . . . . . 49--60
                 Yiyi Huang and   
              Nick Feamster and   
            Anukool Lakhina and   
                   Jim (Jun) Xu   Diagnosing network disruptions with
                                  network-wide analysis  . . . . . . . . . 61--72
            Himabindu Pucha and   
                 Ying Zhang and   
              Z. Morley Mao and   
                  Y. Charlie Hu   Understanding network delay changes
                                  caused by routing events . . . . . . . . 73--84
           Abhishek Kashyap and   
           Sudipta Sengupta and   
             Randeep Bhatia and   
                    M. Kodialam   Two-phase routing, scheduling and power
                                  control for wireless mesh networks with
                                  variable traffic . . . . . . . . . . . . 85--96
              Mariyam Mirza and   
               Joel Sommers and   
               Paul Barford and   
                    Xiaojin Zhu   A machine learning approach to TCP
                                  throughput prediction  . . . . . . . . . 97--108
            Haakon Ringberg and   
             Augustin Soule and   
           Jennifer Rexford and   
                Christophe Diot   Sensitivity of PCA for traffic anomaly
                                  detection  . . . . . . . . . . . . . . . 109--120
              Seungjoon Lee and   
                 Dave Levin and   
       Vijay Gopalakrishnan and   
            Bobby Bhattacharjee   Backbone construction in selfish
                                  wireless networks  . . . . . . . . . . . 121--132
               Cathy H. Xia and   
                   Zhen Liu and   
                Don Towsley and   
                   Marc Lelarge   Scalability of fork/join queueing
                                  networks with blocking . . . . . . . . . 133--144
           Takayuki Osogami and   
                       Sei Kato   Optimizing system configurations quickly
                                  by guessing at the performance . . . . . 145--156
                   Zhe Wang and   
                   Wei Dong and   
          William Josephson and   
                     Qin Lv and   
             Moses Charikar and   
                         Kai Li   Sizing sketches: a rank-based analysis
                                  for similarity search  . . . . . . . . . 157--168
                Soyeon Park and   
              Weihang Jiang and   
              Yuanyuan Zhou and   
                    Sarita Adve   Managing energy-performance tradeoffs
                                  for multithreaded applications on
                                  multiprocessor architectures . . . . . . 169--180
              Andrej Cvetkovski   An algorithm for approximate counting
                                  using limited memory resources . . . . . 181--190
                Eric S. Lee and   
                    Thom Whalen   Synthetic designs: a new form of true
                                  experimental design for use in
                                  information systems development  . . . . 191--202
                Hanhua Feng and   
               Vishal Misra and   
                 Dan Rubenstein   PBS: a unified priority-based scheduler  203--214
      Predrag R. Jelenkovic and   
               Xiaozhu Kang and   
                       Jian Tan   Adaptive and scalable comparison
                                  scheduling . . . . . . . . . . . . . . . 215--226
             Sandeep Bhadra and   
                Yingdong Lu and   
             Mark S. Squillante   Optimal capacity planning in stochastic
                                  loss networks with time-varying
                                  workloads  . . . . . . . . . . . . . . . 227--238
                Jiaping Liu and   
      Alexandre Prouti\`ere and   
                    Yung Yi and   
                Mung Chiang and   
                H. Vincent Poor   Flow-level stability of data networks
                                  with non-convex and time-varying rate
                                  regions  . . . . . . . . . . . . . . . . 239--250
             Evgenia Smirni and   
           Frederica Darema and   
           Albert Greenberg and   
              Adolfy Hoisie and   
                    Don Towsley   Future directions in performance
                                  evaluation research  . . . . . . . . . . 251--252
               Qunfeng Dong and   
             Suman Banerjee and   
                   Jia Wang and   
                Dheeraj Agrawal   Wire speed packet classification without
                                  TCAMs: a few more registers (and a bit
                                  of logic) are enough . . . . . . . . . . 253--264
                  Martin Hirzel   Data layouts for object-oriented
                                  programs . . . . . . . . . . . . . . . . 265--276
                   Fang Hao and   
            Murali Kodialam and   
                 T. V. Lakshman   Building high accuracy Bloom filters
                                  using partitioned hashing  . . . . . . . 277--288
 Lakshmi N. Bairavasundaram and   
           Garth R. Goodson and   
          Shankar Pasupathy and   
                 Jiri Schindler   An analysis of latent sector errors in
                                  disk drives  . . . . . . . . . . . . . . 289--300
              Arnaud Legout and   
            Nikitas Liogkas and   
               Eddie Kohler and   
                    Lixia Zhang   Clustering and sharing incentives in
                                  BitTorrent systems . . . . . . . . . . . 301--312
             Sujay Sanghavi and   
                    Loc Bui and   
                     R. Srikant   Distributed link scheduling with
                                  constant overhead  . . . . . . . . . . . 313--324
        Raj Kumar Rajendran and   
               Vishal Misra and   
                 Dan Rubenstein   Theoretical bounds on control-plane
                                  self-monitoring in routing protocols . . 325--336
                   Xin Yuan and   
            Wickus Nienaber and   
               Zhenhai Duan and   
                    Rami Melhem   Oblivious routing for fat-tree based
                                  system area networks with uncertain
                                  traffic demands  . . . . . . . . . . . . 337--348
             Erich M. Nahum and   
                John Tracey and   
              Charles P. Wright   Evaluating SIP server performance  . . . 349--350
            Thomas R. Puzak and   
            Allan Hartstein and   
            Viji Srinivasan and   
                Philip Emma and   
                   Arthur Nadas   Pipeline spectroscopy  . . . . . . . . . 351--352
                Edith Cohen and   
                    Haim Kaplan   Bottom-$k$ sketches: better and more
                                  efficient estimation of aggregates . . . 353--354
                      Yu Gu and   
                Lee Breslau and   
           Nick G. Duffield and   
                 Subhabrata Sen   GRE encapsulated multicast probing: a
                                  scalable technique for measuring one-way
                                  loss . . . . . . . . . . . . . . . . . . 355--356
            Jelena Mirkovic and   
            Alefiya Hussain and   
              Brett Willson and   
                Sonia Fahmy and   
                Wei-Min Yao and   
               Peter Reiher and   
             Stephen Schwab and   
                  Roshan Thomas   When is service really denied?: a
                                  user-centric DoS metric  . . . . . . . . 357--358
                    Lei Guo and   
                  Enhua Tan and   
              Songqing Chen and   
                  Zhen Xiao and   
                 Xiaodong Zhang   Does Internet media traffic really
                                  follow Zipf-like distribution? . . . . . 359--360
        Gerolf F. Hoflehner and   
              Darshan Desai and   
           Daniel M. Lavery and   
          Alexandru Nicolau and   
        Alexander V. Veidenbaum   Comparative characterization of SPEC
                                  CPU2000 and CPU2006 on Itanium\reg
                                  architecture . . . . . . . . . . . . . . 361--362
                    Bin Lin and   
             Arindam Mallik and   
             Peter A. Dinda and   
               Gokhan Memik and   
                 Robert P. Dick   Power reduction through measurement and
                                  modeling of users and CPUs: summary  . . 363--364
                 Chong Wang and   
                  John W. Byers   Generating representative ISP topologies
                                  from first-principles  . . . . . . . . . 365--366
        George Dean Bissias and   
          Brian Neil Levine and   
               Arnold Rosenberg   Bounding damage from link destruction,
                                  with application to the Internet . . . . 367--368
              Jeffrey Erman and   
            Anirban Mahanti and   
              Martin Arlitt and   
                  Ira Cohen and   
               Carey Williamson   Semi-supervised network traffic
                                  classification . . . . . . . . . . . . . 369--370
                Ningfang Mi and   
                 Alma Riska and   
                   Qi Zhang and   
             Evgenia Smirni and   
                    Erik Riedel   Efficient management of idleness in
                                  systems  . . . . . . . . . . . . . . . . 371--372
        Douglas V. de Jager and   
              Jeremy T. Bradley   Asynchronous iterative solution for
                                  state-based performance metrics  . . . . 373--374
              Kenneth Hoste and   
            Lieven Eeckhout and   
               Hendrik Blockeel   Analyzing commercial processor
                                  performance numbers for predicting
                                  performance of applications of interest  375--376
                  Jiayue He and   
            Augustin Chaintreau   BRADO: scalable streaming through
                                  reconfigurable trees . . . . . . . . . . 377--378
       Daniel Charles Nurmi and   
                John Brevik and   
                    Rich Wolski   QBETS: queue bounds estimation from time
                                  series . . . . . . . . . . . . . . . . . 379--380
                Leiwen Deng and   
          Aleksandar Kuzmanovic   Pong: diagnosing spatio-temporal
                                  Internet congestion properties . . . . . 381--382
               Samuli Aalto and   
                   Urtzi Ayesta   Mean delay optimization for the M/G/1
                                  queue with Pareto type service times . . 383--384

ACM SIGMETRICS Performance Evaluation Review
Volume 35, Number 2, September, 2007

             Mark S. Squillante   Foreword . . . . . . . . . . . . . . . . 2--2
           Gabriele Gianini and   
                Ernesto Damiani   Poisson-noise removal in self-similarity
                                  studies based on packet-counting:
                                  factorial-moment/strip-integral approach 3--5
               Vladimir Marbukh   Fair bandwidth sharing under flow
                                  arrivals/departures: effect of
                                  retransmissions on stability and
                                  performance  . . . . . . . . . . . . . . 6--8
               Takayuki Osogami   Accuracy of measured throughputs and
                                  mean response times  . . . . . . . . . . 9--11
                Varun Gupta and   
                    Jim Dai and   
         Mor Harchol-Balter and   
                     Bert Zwart   The effect of higher moments of job size
                                  distribution on the performance of an
                                  M/G/s queueing system  . . . . . . . . . 12--14
       Tobias Hoßfeld and   
             Kenji Leibnitz and   
             Marie-Ange Remiche   Modeling of an online TV recording
                                  service  . . . . . . . . . . . . . . . . 15--17
                  Peng Wang and   
                Stephan Bohacek   An overview of tractable computation of
                                  optimal scheduling and routing in mesh
                                  networks . . . . . . . . . . . . . . . . 18--20
                   Florin Ciucu   Exponential supermartingales for
                                  evaluating end-to-end backlog bounds . . 21--23
                Varun Gupta and   
                Karl Sigman and   
         Mor Harchol-Balter and   
                     Ward Whitt   Insensitivity for PS server farms with
                                  JSQ routing  . . . . . . . . . . . . . . 24--26
            Giuliano Casale and   
              Eddy Z. Zhang and   
                 Evgenia Smirni   Characterization of moments and
                                  autocorrelation in MAPs  . . . . . . . . 27--29
                 Tony Field and   
                 Peter Harrison   Approximate analysis of a network of
                                  fluid queues . . . . . . . . . . . . . . 30--32
               Joshua Reich and   
               Vishal Misra and   
                 Dan Rubenstein   The time-correlated update problem . . . 33--35
                 W. N. Kang and   
                F. P. Kelly and   
                  N. H. Lee and   
                 R. J. Williams   Product form stationary distributions
                                  for diffusion approximations to a
                                  flow-level model operating under a
                                  proportional fair sharing policy . . . . 36--38
                Yingdong Lu and   
          Ana Radovanovi\'c and   
             Mark S. Squillante   Optimal capacity planning in stochastic
                                  loss networks  . . . . . . . . . . . . . 39--41
         Ludmila Cherkasova and   
              Diwaker Gupta and   
                    Amin Vahdat   Comparison of the three CPU schedulers
                                  in Xen . . . . . . . . . . . . . . . . . 42--51

ACM SIGMETRICS Performance Evaluation Review
Volume 35, Number 3, December, 2007

        Marco Ajmone Marsan and   
                Prashant Shenoy   Foreword . . . . . . . . . . . . . . . . 2--3
                  M. Cesana and   
                L. Campelli and   
                   F. Borgonovo   Efficiency of physical carrier sensing
                                  in wireless access networks  . . . . . . 4--6
           Juan-Carlos Cano and   
    José-Manuel Cano and   
        Eva González and   
            Carlos Calafate and   
                 Pietro Manzoni   How does energy consumption impact
                                  performance in Bluetooth?  . . . . . . . 7--9
                Georg Lukas and   
         André Herms and   
              Daniel Mahrenholz   Interval based off-line clock
                                  synchronization for wireless mesh
                                  networks . . . . . . . . . . . . . . . . 10--12
             Andrzej Chydzinski   Solving finite-buffer queues with
                                  Markovian arrivals . . . . . . . . . . . 13--15
          Gianfranco Ciardo and   
            Andrew S. Miner and   
                    Min Wan and   
                Andy Jinqing Yu   Approximating stationary measures of
                                  structured continuous-time Markov models
                                  using matrix diagrams  . . . . . . . . . 16--18
          Fernando Silveira and   
       Edmundo de Souza e Silva   Predicting packet loss statistics with
                                  hidden Markov models . . . . . . . . . . 19--21
              Michael Menth and   
   Andreas Binzenhöfer and   
            Stefan Mühleck   A note on source models for speech
                                  traffic  . . . . . . . . . . . . . . . . 22--24
          Lorenzo Bracciale and   
       Francesca Lo Piccolo and   
                Dario Luzzi and   
                Stefano Salsano   OPSS: an overlay peer-to-peer streaming
                                  simulator for large-scale networks . . . 25--27
                 Kai Engels and   
               Ralf Heidger and   
           Reinhold Kroeger and   
           Morris Milekovic and   
               Jan Schaefer and   
              Markus Schmid and   
                   Marcus Thoss   eMIVA: tool support for the
                                  instrumentation of critical distributed
                                  applications . . . . . . . . . . . . . . 28--30
               Parijat Dube and   
             Corinne Touati and   
                   Laura Wynter   Capacity planning, quality of service
                                  and price wars . . . . . . . . . . . . . 31--33
               Thomas Begin and   
        Alexandre Brandwajn and   
               Bruno Baynat and   
         Bernd E. Wolfinger and   
                    Serge Fdida   High-level approach to modeling of
                                  observed system behavior . . . . . . . . 34--36
                   Vishal Misra   Foreword . . . . . . . . . . . . . . . . 37--37
                 Wenbin Zhu and   
         Patrick G. Bridges and   
              Arthur B. Maccabe   Light-weight application monitoring and
                                  tuning with embedded gossip  . . . . . . 38--39
           Riadh M. Kortebi and   
              Yvon Gourhant and   
                Nazim Agoulmine   Interference-aware SINR-based routing:
                                  algorithms and evaluation  . . . . . . . 40--42
                    Loc Bui and   
                 R. Srikant and   
              Alexander Stolyar   Optimal resource allocation for
                                  multicast flows in multihop wireless
                                  networks . . . . . . . . . . . . . . . . 43--43
                    Ningfang Mi   Performance impacts of autocorrelated
                                  flows in multi-tiered systems  . . . . . 44--45
              Neena Kaushik and   
            Silvia Figueira and   
           Stephen A. Chiappari   Resource co-allocation using advance
                                  reservations with flexible time-windows  46--48
             Maaike Verloop and   
Rudesindo Núñez-Queija   Efficient resource allocation in
                                  bandwidth-sharing networks . . . . . . . 49--50
            D. I. Miretskiy and   
       W. R. W. Scheinhardt and   
               M. R. H. Mandjes   Tandem queue with server slow-down . . . 51--52
               Y. Volkovich and   
                  D. Donato and   
                      N. Litvak   Stochastic models for Web ranking  . . . 53--53
             Anthony Hylick and   
                Andrew Rice and   
                Brian Jones and   
                 Ripduman Sohan   Hard drive power consumption uncovered   54--55
                Ajay Gulati and   
               Peter Varman and   
              Arif Merchant and   
                  Mustafa Uysal   Towards fairness and efficiency in
                                  storage systems  . . . . . . . . . . . . 56--58
           Simon Heimlicher and   
           Pavan Nuggehalli and   
                     Martin May   End-to-end vs. hop-by-hop transport  . . 59--60
     Sandoche Balakrichenan and   
            Thomas Bugnazet and   
                 Monique Becker   A simulation platform: for testing and
                                  optimization of ENUM architecture  . . . 61--63
             Kathryn Mohror and   
             Karen L. Karavanic   Scalable event-based performance
                                  measurement in high-end environments . . 64--65
             Claudio Vicari and   
            Chiara Petrioli and   
            Francesco Lo Presti   Dynamic replica placement and traffic
                                  redirection in content delivery networks 66--68
    Fragkiskos Papadopoulos and   
           Konstantinos Psounis   Predicting the performance of
                                  Internet-like networks using scaled-down
                                  replicas . . . . . . . . . . . . . . . . 69--71
              Jawwad Shamsi and   
              Monica Brockmeyer   PSON: predictable service overlay
                                  networks . . . . . . . . . . . . . . . . 72--74

ACM SIGMETRICS Performance Evaluation Review
Volume 35, Number 4, March, 2008

            Stephen Gilmore and   
                  Jane Hillston   Foreword . . . . . . . . . . . . . . . . 2--2
            Stephen Gilmore and   
                  Jane Hillston   Performance evaluation comes to life:
                                  quantitative methods applied to
                                  biological systems . . . . . . . . . . . 3--13
          Marta Kwiatkowska and   
              Gethin Norman and   
                   David Parker   Using probabilistic model checking in
                                  systems biology  . . . . . . . . . . . . 14--21
           Matthias Jeschke and   
               Roland Ewald and   
                Alfred Park and   
           Richard Fujimoto and   
          Adelinde M. Uhrmacher   A parallel and distributed discrete
                                  event approach for spatial
                                  cell-biological simulations  . . . . . . 22--31
     Lorenzo Dematté and   
             Corrado Priami and   
             Alessandro Romanel   Modelling and simulation of biological
                                  processes in BlenX . . . . . . . . . . . 32--39
               Joel Sommers and   
               Paul Barford and   
           Albert Greenberg and   
               Walter Willinger   An SLA perspective on the router buffer
                                  sizing problem . . . . . . . . . . . . . 40--51
              Dmitry Korzun and   
                  Andrei Gurtov   A Diophantine model of routes in
                                  structured P2P overlays  . . . . . . . . 52--61
                  Fadi N. Sibai   Evaluating the performance of single and
                                  multiple core processors with
                                  PCMARK\reg05 and benchmark analysis  . . 62--71


ACM SIGMETRICS Performance Evaluation Review
Volume 36, Number 1, June, 2008

          Charles Bordenave and   
             David McDonald and   
            Alexandre Proutiere   Performance of random medium access
                                  control, an asymptotic approach  . . . . 1--12
            Giuliano Casale and   
                Ningfang Mi and   
                 Evgenia Smirni   Bound analysis of closed queueing
                                  networks with workload burstiness  . . . 13--24
               Adam Wierman and   
                   Misja Nuyens   Scheduling despite inexact job-size
                                  information  . . . . . . . . . . . . . . 25--36
               Marc Lelarge and   
                     Jean Bolot   Network externalities and the deployment
                                  of security features and protocols in
                                  the Internet . . . . . . . . . . . . . . 37--48
                  Eli Brosh and   
         Salman Abdul Baset and   
             Dan Rubenstein and   
            Henning Schulzrinne   The delay-friendliness of TCP  . . . . . 49--60
              Changhoon Kim and   
           Alexandre Gerber and   
               Carsten Lund and   
                    Dan Pei and   
                 Subhabrata Sen   Scalable VPN routing via relaying  . . . 61--72
          Dominique Tschopp and   
              Suhas Diggavi and   
          Matthias Grossglauser   Hierarchical routing over dynamic
                                  wireless networks  . . . . . . . . . . . 73--84
           Shravan Rayanchu and   
              Sayandeep Sen and   
                Jianming Wu and   
             Suman Banerjee and   
               Sudipta Sengupta   Loss-aware network coding for unicast
                                  wireless sessions: design,
                                  implementation, and performance
                                  evaluation . . . . . . . . . . . . . . . 85--96
              Thomas Schmid and   
          Zainul Charbiwala and   
          Jonathan Friedman and   
               Young H. Cho and   
             Mani B. Srivastava   Exploiting manufacturing variations for
                                  compensating environment-induced clock
                                  drift in time synchronization  . . . . . 97--108
                Edith Cohen and   
              Nick Duffield and   
               Carsten Lund and   
                  Mikkel Thorup   Confident estimation for multistage
                                  measurement sampling and aggregation . . 109--120
                      Yi Lu and   
           Andrea Montanari and   
           Balaji Prabhakar and   
       Sarang Dharmapurikar and   
                  Abdul Kabbani   Counter braids: a novel counter
                                  architecture for per-flow measurement    121--132
      Animashree Anandkumar and   
        Chatschik Bisdikian and   
                 Dakshi Agrawal   Tracking in a spaghetti bowl: monitoring
                                  transactions using footprints  . . . . . 133--144
              Harsh Singhal and   
             George Michailidis   Optimal sampling in state space models
                                  with applications to network monitoring  145--156
          Stratis Ioannidis and   
                  Peter Marbach   On the design of hybrid peer-to-peer
                                  systems  . . . . . . . . . . . . . . . . 157--168
               Minghua Chen and   
             Miroslav Ponec and   
           Sudipta Sengupta and   
                     Jin Li and   
                 Philip A. Chou   Utility maximization in peer-to-peer
                                  systems  . . . . . . . . . . . . . . . . 169--180
            Florian Simatos and   
            Philippe Robert and   
              Fabrice Guillemin   A queueing system for modeling a file
                                  sharing principle  . . . . . . . . . . . 181--192
            Sharon Goldberg and   
                 David Xiao and   
                Eran Tromer and   
                 Boaz Barak and   
               Jennifer Rexford   Path-quality monitoring in the presence
                                  of adversaries . . . . . . . . . . . . . 193--204
           Pedram Pedarsani and   
       Daniel R. Figueiredo and   
          Matthias Grossglauser   Densification arising from sampling
                                  fixed graphs . . . . . . . . . . . . . . 205--216
        Ricardo V. Oliveira and   
                    Dan Pei and   
           Walter Willinger and   
             Beichuan Zhang and   
                    Lixia Zhang   In search of the elusive ground truth:
                                  the Internet's as-level connectivity
                                  structure  . . . . . . . . . . . . . . . 217--228
                Yungang Bao and   
                Mingyu Chen and   
                  Yuan Ruan and   
                     Li Liu and   
               Jianping Fan and   
                Qingbo Yuan and   
                    Bo Song and   
                     Jianwei Xu   HMTT: a platform independent full-system
                                  memory trace monitoring system . . . . . 229--240
              Ilias Iliadis and   
                Robert Haas and   
                 Xiao-Yu Hu and   
          Evangelos Eleftheriou   Disk scrubbing versus intra-disk
                                  redundancy for high-reliability raid
                                  storage systems  . . . . . . . . . . . . 241--252
               Eno Thereska and   
              Gregory R. Ganger   Ironmodel: robust performance models in
                                  the wild . . . . . . . . . . . . . . . . 253--264
                Alex X. Liu and   
                   Fei Chen and   
              JeeHyun Hwang and   
                        Tao Xie   Xengine: a fast and scalable XACML
                                  policy evaluation engine . . . . . . . . 265--276
            Avishay Traeger and   
                 Ivan Deras and   
                     Erez Zadok   DARC: dynamic analysis of root causes of
                                  latency distributions  . . . . . . . . . 277--288
            Shiva Chaitanya and   
           Bhuvan Urgaonkar and   
          Anand Sivasubramaniam   QDSL: a queuing model for systems with
                                  differential service levels  . . . . . . 289--300
               Nadim Parvez and   
           Carey Williamson and   
            Anirban Mahanti and   
                Niklas Carlsson   Analysis of BitTorrent-like protocols
                                  for on-demand stored media streaming . . 301--312
                   Shao Liu and   
             Rui Zhang-Shen and   
               Wenjie Jiang and   
           Jennifer Rexford and   
                    Mung Chiang   Performance bounds for peer-assisted
                                  live streaming . . . . . . . . . . . . . 313--324
              Thomas Bonald and   
   Laurent Massoulié and   
             Fabien Mathieu and   
               Diego Perino and   
                   Andrew Twigg   Epidemic live streaming: optimal
                                  performance trade-offs . . . . . . . . . 325--336
                  Jiang Lin and   
            Hongzhong Zheng and   
                Zhichun Zhu and   
            Eugene Gorbatov and   
               Howard David and   
                     Zhao Zhang   Software thermal management of DRAM
                                  memory for multicore systems . . . . . . 337--348
              Ishai Menache and   
                  Nahum Shimkin   Noncooperative power control and
                                  transmission scheduling in wireless
                                  collision channels . . . . . . . . . . . 349--358
            Mahmut Kandemir and   
                   Ozcan Ozturk   Software-directed combined CPU/link
                                  voltage scaling for NoC-based CMPs . . . 359--370
                   Igor Crk and   
                Mingsong Bi and   
                   Chris Gniady   Interaction-aware energy management for
                                  wireless network cards . . . . . . . . . 371--382
             Rade Stanojevi and   
                 Robert Shorten   Fully decentralized emulation of
                                  best-effort and processor sharing queues 383--394
       Srikanth Jagabathula and   
                  Devavrat Shah   Optimal delay scheduling in networks
                                  with arbitrary constraints . . . . . . . 395--406
                Kyomin Jung and   
                Yingdong Lu and   
              Devavrat Shah and   
              Mayank Sharma and   
             Mark S. Squillante   Revisiting stochastic loss networks:
                                  structures and algorithms  . . . . . . . 407--418
              Thomas Bonald and   
                Ali Ibrahim and   
                  James Roberts   Traffic capacity of multi-cell WLANS . . 419--430
                Jan Reineke and   
                   Daniel Grund   Relative competitiveness of cache
                                  replacement policies . . . . . . . . . . 431--432
                 Zhihua Wen and   
             Michael Rabinovich   Network distance estimation with dynamic
                                  landmark triangles . . . . . . . . . . . 433--434
               Murat Yuksel and   
  Kadangode K. Ramakrishnan and   
     Shivkumar Kalyanaraman and   
            Joseph D. Houle and   
                  Rita Sadhvani   Class-of-service in IP backbones:
                                  informing the network neutrality debate  435--436
              Holger Dreger and   
              Anja Feldmann and   
                Vern Paxson and   
                   Robin Sommer   Predicting the resource consumption of
                                  network intrusion detection systems  . . 437--438
                     Bin Li and   
                    Lu Peng and   
          Balachandran Ramadass   Efficient MART-aided modeling for
                                  microarchitecture design space
                                  exploration and performance prediction   439--440
                Simon Balon and   
                      Guy Leduc   Combined intra- and inter-domain traffic
                                  engineering using hot-potato aware link
                                  weights optimization . . . . . . . . . . 441--442
           Eric W. Anderson and   
          Caleb T. Phillips and   
             Kevin S. Bauer and   
           Dirk C. Grunwald and   
              Douglas C. Sicker   Modeling directionality in wireless
                                  networks: extended abstract  . . . . . . 443--444
          Anat Bremler-Barr and   
                  David Hay and   
              Danny Hendler and   
                   Boris Farber   Layered interval codes for TCAM-based
                                  classification . . . . . . . . . . . . . 445--446
         Sriram Ramabhadran and   
                Joseph Pasquale   Durability of replicated distributed
                                  storage systems  . . . . . . . . . . . . 447--448
                  Feihui Li and   
            Mahmut Kandemir and   
                  Mary J. Irwin   Implementation and evaluation of a
                                  migration-based NUCA design for chip
                                  multiprocessors  . . . . . . . . . . . . 449--450
                 Sara Alouf and   
               Eitan Altman and   
              Amar Prakash Azad   M/G/1 queue with repeated inhomogeneous
                                  vacations applied to IEEE 802.16e power
                                  saving . . . . . . . . . . . . . . . . . 451--452
     Srinivasan Seetharaman and   
               Mostafa H. Ammar   Managing inter-domain traffic in the
                                  presence of BitTorrent file-sharing  . . 453--454
          Edmar Mota-Garcia and   
       Rogelio Hasimoto-Beltran   Clock offset estimation using
                                  collaborative one-way transit time . . . 455--456
             Gagan R. Gupta and   
                 Ness B. Shroff   Scheduling with queue length guarantees
                                  for shared resource systems  . . . . . . 457--458
                 Aiyou Chen and   
                      Li Li and   
                        Jin Cao   Estimating cardinality distributions in
                                  network traffic: extended abstract . . . 459--460
              Laura E. Grit and   
               Jeffrey S. Chase   Weighted fair sharing for dynamic
                                  virtual clusters . . . . . . . . . . . . 461--462
         Vasumathi Sundaram and   
           Abhishek Chandra and   
                   Jon Weissman   Exploring the throughput-fairness
                                  tradeoff of deadline scheduling in
                                  heterogeneous computing environments . . 463--464
                 Gabor Papp and   
           Chris GauthierDickey   Characterizing multiparty voice
                                  communication for multiplayer games  . . 465--466
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Algorithmic approaches to redesigning
                                  TCAM-based systems . . . . . . . . . . . 467--468
                John R. Douceur   Performance analysis in the real world   469--470

ACM SIGMETRICS Performance Evaluation Review
Volume 36, Number 2, September, 2008

                 Tingxi Tan and   
               Rob Simmonds and   
               Bradley Arlt and   
              Martin Arlitt and   
                   Bruce Walker   Image management in a virtualized data
                                  center . . . . . . . . . . . . . . . . . 4--9
           Abhishek Chandra and   
              Rohini Prinja and   
               Sourabh Jain and   
                    ZhiLi Zhang   Co-designing the failure analysis and
                                  monitoring of large-scale systems  . . . 10--15
         Abhishek B. Sharma and   
            Ranjita Bhagwan and   
          Monojit Choudhury and   
            Leana Golubchik and   
            Ramesh Govindan and   
            Geoffrey M. Voelker   Automatic request categorization in
                                  Internet services  . . . . . . . . . . . 16--25
                Aman Kansal and   
                      Feng Zhao   Fine-grained energy profiling for
                                  power-aware application design . . . . . 26--31
              Nahur Fonseca and   
              Mark Crovella and   
         Kavé Salamatian   Long range mutual information  . . . . . 32--37
            Giuliano Casale and   
                Ningfang Mi and   
         Ludmila Cherkasova and   
                 Evgenia Smirni   How to parameterize models with bursty
                                  workloads  . . . . . . . . . . . . . . . 38--44
                   Bill Lin and   
                   Jun (Jim) Xu   DRAM is plenty fast for wirespeed
                                  statistics counting  . . . . . . . . . . 45--51
              Nitin Agrawal and   
   Andrea C. Arpaci-Dusseau and   
        Remzi H. Arpaci-Dusseau   Towards realistic file-system benchmarks
                                  with CodeMRI . . . . . . . . . . . . . . 52--57
     Elias Weingärtner and   
            Florian Schmidt and   
                Tobias Heer and   
                   Klaus Wehrle   Synchronized network emulation: matching
                                  prototypes with complex simulations  . . 58--63
  Balachander Krishnamurthy and   
               Walter Willinger   What are our standards for validation of
                                  measurement-based networking research?   64--69
                Roger Curry and   
             Cameron Kiddle and   
          Nayden Markatchev and   
               Rob Simmonds and   
                 Tingxi Tan and   
              Martin Arlitt and   
                   Bruce Walker   Running applications efficiently in
                                  online social networks . . . . . . . . . 71--74
           Eddy Zheng Zhang and   
            Giuliano Casale and   
                 Evgenia Smirni   KPC-Toolbox: best recipes toward
                                  automatization of workload fitting . . . 75--78
             Daniel De Vera and   
Pablo Rodríguez-Bocca and   
                 Gerardo Rubino   Automatic quality of experience
                                  measuring on video delivering networks   79--82
                Dario Rossi and   
             Silvio Valenti and   
               Paolo Veglia and   
            Dario Bonfiglio and   
               Marco Mellia and   
                    Michela Meo   Pictures from the Skype  . . . . . . . . 83--86
              Justin Ormont and   
              Jordan Walker and   
                 Suman Banerjee   Continuous monitoring of wide-area
                                  wireless networks: data collection and
                                  visualization  . . . . . . . . . . . . . 87--89
              Hicham Anouar and   
           Christian Bonnet and   
        Daniel Câmara and   
               Fethi Filali and   
                  Raymond Knopp   An overview of OpenAirInterface wireless
                                  network emulation methodology  . . . . . 90--94
                  Xiaoyue Jiang   New perspectives on network calculus . . 95--97
     Chaitanya Garikiparthi and   
     Appie van de Liefvoort and   
                   Ken Mitchell   Busy period analysis of finite QBD
                                  processes  . . . . . . . . . . . . . . . 98--100
    Predrag R. Jelenkovi\'c and   
                   Xiaozhu Kang   Is fair resource sharing responsible for
                                  spreading long delays? . . . . . . . . . 101--103
                    Varun Gupta   Finding the optimal quantum size:
                                  Sensitivity analysis of the \em M/G/1
                                  round-robin queue  . . . . . . . . . . . 104--106
              Eitan Bachmat and   
                  Hagit Sarfati   Analysis of size interval task
                                  assignment policies  . . . . . . . . . . 107--109
                Ho-Lin Chen and   
            Jason R. Marden and   
                   Adam Wierman   The effect of local scheduling in load
                                  balancing designs  . . . . . . . . . . . 110--112
                    Yuan Wu and   
              Danny H. K. Tsang   Joint rate-and-power allocation for
                                  multi-channel spectrum sharing networks  113--115
                     Pei Li and   
             John C. S. Lui and   
                     Yinlong Xu   A stochastic model for BitTorrent-like
                                  systems  . . . . . . . . . . . . . . . . 116--118
    Predrag R. Jelenkovi\'c and   
                   Xiaozhu Kang   Characterizing the miss sequence of the
                                  LRU cache  . . . . . . . . . . . . . . . 119--121
            Florian Simatos and   
                  Danielle Tibi   Study of a stochastic model for mobile
                                  networks . . . . . . . . . . . . . . . . 122--124
       Petar Mom\vcilovi\'c and   
             Mark S. Squillante   On throughput in stochastic linear loss
                                  networks . . . . . . . . . . . . . . . . 125--127
                Varun Gupta and   
              Peter G. Harrison   Fluid level in a reservoir with an
                                  on-off source  . . . . . . . . . . . . . 128--130
                 K. J. Kwak and   
          Y. M. Baryshnikov and   
                  E. G. Coffman   Self-assembling sweep-and-sleep sensor
                                  systems  . . . . . . . . . . . . . . . . 131--133
                Giuliano Casale   CoMoM: class-oriented evaluation of
                                  multiclass models  . . . . . . . . . . . 134--136
               A. B. Dieker and   
                   S. Ghosh and   
               M. S. Squillante   Capacity optimization in feedforward
                                  Brownian networks  . . . . . . . . . . . 137--139

ACM SIGMETRICS Performance Evaluation Review
Volume 36, Number 3, December, 2008

     Boudewijn R. Haverkort and   
              Markus Siegle and   
              Maarten van Steen   Quantitative analysis of gossiping
                                  protocols  . . . . . . . . . . . . . . . 2--2
            Joost-Pieter Katoen   How to model and analyze gossiping
                                  protocols? . . . . . . . . . . . . . . . 3--6
             Pepijn Crouzen and   
            Jaco van de Pol and   
                  Arend Rensink   Applying formal methods to gossiping
                                  networks with mCRL and groove  . . . . . 7--16
          Marta Kwiatkowska and   
              Gethin Norman and   
                   David Parker   Analysis of a gossip protocol in PRISM   17--22
             Thomas Krieger and   
               Martin Riedl and   
            Johann Schuster and   
                  Markus Siegle   A view-probability-matrix approach to
                                  the modelling of gossiping protocols . . 23--30
               Rena Bakhshi and   
                Lucia Cloth and   
                Wan Fokkink and   
         Boudewijn R. Haverkort   MeanField analysis for the evaluation of
                                  gossip protocols . . . . . . . . . . . . 31--39
             Trilce Estrada and   
               Olac Fuentes and   
                 Michela Taufer   A distributed evolutionary method to
                                  design scheduling policies for volunteer
                                  computing  . . . . . . . . . . . . . . . 40--49
                 Wesley M. Eddy   Basic properties of the IPv6 AS-level
                                  topology . . . . . . . . . . . . . . . . 50--57

ACM SIGMETRICS Performance Evaluation Review
Volume 36, Number 4, March, 2009

            Giuliano Casale and   
           Richard R. Muntz and   
               Giuseppe Serazzi   Special issue on tools for computer
                                  performance modeling and reliability
                                  analysis . . . . . . . . . . . . . . . . 2--3
              Soheib Baarir and   
              Marco Beccuti and   
             Davide Cerotti and   
     Massimiliano De Pierro and   
          Susanna Donatelli and   
         Giuliana Franceschinis   The GreatSPN tool: recent enhancements   4--9
              Marco Bertoli and   
            Giuliano Casale and   
               Giuseppe Serazzi   JMT: performance engineering tools for
                                  system modeling  . . . . . . . . . . . . 10--15
            Shravan Gaonkar and   
                  Ken Keefe and   
             Ruth Lamprecht and   
                Eric Rozier and   
               Peter Kemper and   
             William H. Sanders   Performance and dependability modeling
                                  with Möbius . . . . . . . . . . . . . . . 16--21
                Markus Arns and   
             Peter Buchholz and   
             Dennis Müller   OPEDo: a tool for the optimization of
                                  performance and dependability models . . 22--27
           Mirco Tribastone and   
                Adam Duguid and   
                Stephen Gilmore   The PEPA Eclipse plugin  . . . . . . . . 28--33
         Nicholas J. Dingle and   
     William J. Knottenbelt and   
                     Tamas Suto   PIPE2: a tool for the performance
                                  evaluation of generalised stochastic
                                  Petri Nets . . . . . . . . . . . . . . . 34--39
          Marta Kwiatkowska and   
              Gethin Norman and   
                   David Parker   PRISM: probabilistic model checking for
                                  performance and reliability analysis . . 40--45
              Samuel Kounev and   
                Christofer Dutz   QPME: a performance modeling tool based
                                  on queueing Petri Nets . . . . . . . . . 46--51
           Kisho S. Trivedi and   
                   Robin Sahner   SHARPE at the age of twenty two  . . . . 52--57
          Gianfranco Ciardo and   
            Andrew S. Miner and   
                        Min Wan   Advanced features in SMART: the
                                  stochastic model checking analyzer for
                                  reliability and timing . . . . . . . . . 58--63
   Edmundo de Souza e Silva and   
       Daniel R. Figueiredo and   
         Rosa M. M. Leão   The TANGRAMII integrated modeling
                                  environment for computer systems and
                                  networks . . . . . . . . . . . . . . . . 64--69


ACM SIGMETRICS Performance Evaluation Review
Volume 37, Number 1, June, 2009

                   Marc Lelarge   Efficient control of epidemics over
                                  random networks  . . . . . . . . . . . . 1--12
             Abhinav Pathak and   
                  Feng Qian and   
              Y. Charlie Hu and   
              Z. Morley Mao and   
             Supranamaya Ranjan   Botnet spam campaigns can be long
                                  lasting: evidence, implications, and
                                  analysis . . . . . . . . . . . . . . . . 13--24
            Ruben D. Torres and   
         Mohammad Y. Hajjat and   
              Sanjay G. Rao and   
               Marco Mellia and   
             Maurizio M. Munafo   Inferring undesirable behavior from P2P
                                  traffic analysis . . . . . . . . . . . . 25--36
                Ashok Anand and   
       Chitra Muthukrishnan and   
              Aditya Akella and   
            Ramachandran Ramjee   Redundancy in network traffic: findings
                                  and implications . . . . . . . . . . . . 37--48
                     Yu Jin and   
           Esam Sharafuddin and   
                   Zhi-Li Zhang   Unveiling core network-wide
                                  communication patterns through
                                  application traffic activity graph
                                  decomposition  . . . . . . . . . . . . . 49--60
Venugopalan Ramasubramanian and   
              Dahlia Malkhi and   
                Fabian Kuhn and   
        Mahesh Balakrishnan and   
               Archit Gupta and   
                  Aditya Akella   On the treeness of Internet latency and
                                  bandwidth  . . . . . . . . . . . . . . . 61--72
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Topological transformation approaches to
                                  optimizing TCAM-based packet
                                  classification systems . . . . . . . . . 73--84
                   Kai Shen and   
        Christopher Stewart and   
               Chuanpeng Li and   
                         Xin Li   Reference-driven performance anomaly
                                  identification . . . . . . . . . . . . . 85--96
             Gagan R. Gupta and   
             Sujay Sanghavi and   
                 Ness B. Shroff   Node weighted scheduling . . . . . . . . 97--108
        Augustin Chaintreau and   
        Jean-Yves Le Boudec and   
             Nikodin Ristanovic   The age of gossip: spatial mean field
                                  regime . . . . . . . . . . . . . . . . . 109--120
         Shreeshankar Bodas and   
          Sanjay Shakkottai and   
                   Lei Ying and   
                     R. Srikant   Scheduling in multi-channel wireless
                                  networks: rate function optimality in
                                  the small-buffer regime  . . . . . . . . 121--132
     Shreevatsa Rajagopalan and   
              Devavrat Shah and   
                    Jinwoo Shin   Network adiabatic theorem: an efficient
                                  randomized protocol for contention
                                  resolution . . . . . . . . . . . . . . . 133--144
         Abhishek B. Sharma and   
            Leana Golubchik and   
            Ramesh Govindan and   
               Michael J. Neely   Dynamic data compression in multi-hop
                                  wireless networks  . . . . . . . . . . . 145--156
              Anshul Gandhi and   
         Mor Harchol-Balter and   
               Rajarshi Das and   
                Charles Lefurgy   Optimal power allocation in server farms 157--168
             Ayse K. Coskun and   
             Richard Strong and   
            Dean M. Tullsen and   
          Tajana Simunic Rosing   Evaluating the impact of job scheduling
                                  and power management on processor
                                  lifetime for chip multiprocessors  . . . 169--180
                  Feng Chen and   
           David A. Koufaty and   
                 Xiaodong Zhang   Understanding intrinsic characteristics
                                  and system implications of flash memory
                                  based solid state drives . . . . . . . . 181--192
           Bianca Schroeder and   
           Eduardo Pinheiro and   
            Wolf-Dietrich Weber   DRAM errors in the wild: a large-scale
                                  field study  . . . . . . . . . . . . . . 193--204
                Ningfang Mi and   
                 Alma Riska and   
                     Xin Li and   
             Evgenia Smirni and   
                    Erik Riedel   Restrained utilization of idleness for
                                  transparent scheduling of background
                                  tasks  . . . . . . . . . . . . . . . . . 205--216
                    Yi Wang and   
           Michael Schapira and   
               Jennifer Rexford   Neighbor-specific BGP: more flexible
                                  routing policies while improving global
                                  stability  . . . . . . . . . . . . . . . 217--228
         Nikolaos Laoutaris and   
       Georgios Smaragdakis and   
            Pablo Rodriguez and   
                  Ravi Sundaram   Delay tolerant bulk data transfers on
                                  the Internet . . . . . . . . . . . . . . 229--238
               Wenjie Jiang and   
             Rui Zhang-Shen and   
           Jennifer Rexford and   
                    Mung Chiang   Cooperative content distribution and
                                  traffic engineering in an ISP network    239--250
                Edith Cohen and   
                    Haim Kaplan   Leveraging discarded samples for tighter
                                  estimation of multiple-set aggregates    251--262
            Patrick Loiseau and   
     Paulo Gonçalves and   
     Stéphane Girard and   
            Florence Forbes and   
     Pascale Vicat-Blanc Primet   Maximum likelihood estimation of the
                                  flow size distribution tail index from
                                  sampled packet data  . . . . . . . . . . 263--274
               Tongqing Qiu and   
                   Zihui Ge and   
              Seungjoon Lee and   
                   Jia Wang and   
                    Qi Zhao and   
                         Jun Xu   Modeling channel popularity dynamics in
                                  a large IPTV system  . . . . . . . . . . 275--286
         Mor Harchol-Balter and   
         Alan Scheller-Wolf and   
                Andrew R. Young   Surprising results on task assignment in
                                  server farms with high-variability
                                  workloads  . . . . . . . . . . . . . . . 287--298
            Thomas Sandholm and   
                      Kevin Lai   MapReduce optimization using regulated
                                  dynamic prioritization . . . . . . . . . 299--310
                Varun Gupta and   
             Mor Harchol-Balter   Self-adaptive admission control policies
                                  for resource-sharing systems . . . . . . 311--322

ACM SIGMETRICS Performance Evaluation Review
Volume 37, Number 2, September, 2009

     Björn Scheuermann and   
                 Wolfgang Kiess   Who said that?: the send-receive
                                  correlation problem in network log
                                  analysis . . . . . . . . . . . . . . . . 3--5
      Animashree Anandkumar and   
        Chatschik Bisdikian and   
                    Ting He and   
                 Dakshi Agrawal   Selectively retrofitting monitoring in
                                  distributed systems  . . . . . . . . . . 6--8
             Abhishek Dubey and   
             Rajat Mehrotra and   
          Sherif Abdelwahed and   
                  Asser Tantawi   Performance modeling of distributed
                                  multi-tier enterprise systems  . . . . . 9--11
                  Chao Wang and   
                      Xiaoli Ma   Deriving Cramér--Rao bounds and maximum
                                  likelihood estimators for traffic matrix
                                  inference  . . . . . . . . . . . . . . . 12--14
            Dmitri Krioukov and   
    Fragkiskos Papadopoulos and   
Marián Boguñá and   
                    Amin Vahdat   Greedy forwarding in scale-free networks
                                  embedded in hyperbolic metric spaces . . 15--17
              Jeong-woo Cho and   
                   Yuming Jiang   Basic theorems on the backoff process in
                                  802.11 . . . . . . . . . . . . . . . . . 18--20
          Jayakrishnan Nair and   
                  Steven H. Low   Optimal job fragmentation  . . . . . . . 21--23
                  Erlin Yao and   
                Yungang Bao and   
              Guangming Tan and   
                    Mingyu Chen   Extending Amdahl's Law in the multicore
                                  era  . . . . . . . . . . . . . . . . . . 24--26
              Dmitry Korzun and   
                  Andrei Gurtov   A local equilibrium model for P2P
                                  resource ranking . . . . . . . . . . . . 27--29
Daniel Sadoc Menasché and   
Antonio A. Aragão Rocha and   
   Edmundo de Souza e Silva and   
   Rosa M. Meri Leão and   
                Don Towsley and   
             Arun Venkataramani   Modeling chunk availability in P2P
                                  swarming systems . . . . . . . . . . . . 30--32
            Oliver Hohlfeld and   
                   Florin Ciucu   Viewing impaired video transmissions
                                  from a modeling perspective  . . . . . . 33--35
             Gagan R. Gupta and   
             Sujay Sanghavi and   
                 Ness B. Shroff   Workload optimality in switches without
                                  arrivals . . . . . . . . . . . . . . . . 36--38
       Lachlan L. H. Andrew and   
               Adam Wierman and   
                        Ao Tang   Optimal speed scaling under arbitrary
                                  power functions  . . . . . . . . . . . . 39--41
              I. M. Verloop and   
                  U. Ayesta and   
  R. Núñez-Queija   Heavy-traffic analysis of the M/PH/1
                                  discriminatory processor sharing queue
                                  with phase-dependent weights . . . . . . 42--44
                 J. Anselmi and   
                      Y. Lu and   
                  M. Sharma and   
               M. S. Squillante   Improved Approximations for Stochastic
                                  Loss Networks  . . . . . . . . . . . . . 45--47
     Elias Weingärtner and   
            Florian Schmidt and   
                Tobias Heer and   
                   Klaus Wehrle   Time accurate integration of software
                                  prototypes with event-based network
                                  simulations  . . . . . . . . . . . . . . 49--50
               Haifeng Chen and   
              Wenxuan Zhang and   
                   Guofei Jiang   Experience transfer for the
                                  configuration tuning in large scale
                                  computing systems  . . . . . . . . . . . 51--52
                   Bill Lin and   
               Jun (Jim) Xu and   
                    Nan Hua and   
                   Hao Wang and   
           Haiquan (Chuck) Zhao   A randomized interleaved DRAM
                                  architecture for the maintenance of
                                  exact statistics counters  . . . . . . . 53--54
                Bridge Zhao and   
                   y. K. Li and   
             John C. S. Lui and   
                  Dah-Ming Chiu   On modeling product advertisement in
                                  social networks  . . . . . . . . . . . . 55--56
                Thomas Zahn and   
                Greg O'Shea and   
                Antony Rowstron   An empirical study of flooding in mesh
                                  networks . . . . . . . . . . . . . . . . 57--58
             Sipat Triukose and   
                 Zhihua Wen and   
             Michael Rabinovich   Content delivery networks: how big is
                                  big enough?  . . . . . . . . . . . . . . 59--60
                  Zhibin Yu and   
                        Hai Jin   Simple and fast micro-architecture
                                  simulation: a trisection Cantor fractal
                                  approach . . . . . . . . . . . . . . . . 61--62
                  Peter Key and   
            Alexandre Proutiere   Routing games with elastic traffic . . . 63--64
              John R. Lange and   
            J. Scott Miller and   
                 Peter A. Dinda   EmNet: satisfying the individual user
                                  through empathic home networks: summary  65--66
                 Alma Riska and   
                    Erik Riedel   Evaluation of disk-level workloads at
                                  different time scales  . . . . . . . . . 67--68
               Vinith Reddy and   
              Younghoon Kim and   
        Srinivas Shakkottai and   
          A. L. Narasimha Reddy   MultiTrack: a delay and cost aware P2P
                                  overlay architecture . . . . . . . . . . 69--70
                  Sem Borst and   
                Varun Gupta and   
                    Anwar Walid   Self-organizing algorithms for cache
                                  cooperation in content distribution
                                  networks . . . . . . . . . . . . . . . . 71--72
  Benjamin I. P. Rubinstein and   
              Blaine Nelson and   
                 Ling Huang and   
          Anthony D. Joseph and   
              Shing-hon Lau and   
                 Satish Rao and   
                  Nina Taft and   
                    J. D. Tygar   Stealthy poisoning attacks on PCA-based
                                  anomaly detectors  . . . . . . . . . . . 73--74
            Douglas G. Down and   
       H. Christian Gromoll and   
                  Amber L. Puha   State-dependent response times via fluid
                                  limits in shortest remaining processing
                                  time queues  . . . . . . . . . . . . . . 75--76
               Jianwei Chen and   
           Murali Annavaram and   
                  Michel Dubois   SlackSim: a platform for parallel
                                  simulations of CMPs on CMPs  . . . . . . 77--78
                Ajay Gulati and   
              Arif Merchant and   
              Mustafa Uysal and   
             Pradeep Padala and   
                   Peter Varman   Efficient and adaptive proportional
                                  share I/O scheduling . . . . . . . . . . 79--80
                   Yang Liu and   
              Linfeng Zhang and   
                      Yong Guan   A distributed data streaming algorithm
                                  for network-wide traffic anomaly
                                  detection  . . . . . . . . . . . . . . . 81--82
   François Baccelli and   
            Bruno Kauffmann and   
                  Darryl Veitch   Towards multihop available bandwidth
                                  estimation . . . . . . . . . . . . . . . 83--84
              Animesh Nandi and   
        Bobby Bhattacharjee and   
                 Peter Druschel   What a mesh: understanding the design
                                  tradeoffs for streaming multicast  . . . 85--86
      Daniel Sadoc Menasche and   
    Antonio A. Aragao Rocha and   
                     Bin Li and   
                Don Towsley and   
             Arun Venkataramani   Modeling content availability in
                                  peer-to-peer swarming systems  . . . . . 87--88
                  Ravi Iyer and   
            Ramesh Illikkal and   
                    Li Zhao and   
                 Don Newell and   
                  Jaideep Moses   Virtual platform architectures for
                                  resource metering in datacenters . . . . 89--90

ACM SIGMETRICS Performance Evaluation Review
Volume 37, Number 3, December, 2009

                   Krishna Kant   Challenges in distributed energy
                                  adaptive computing . . . . . . . . . . . 3--7
                Xinghao Pan and   
                  Jiaqi Tan and   
              Soila Kavulya and   
              Rajeev Gandhi and   
               Priya Narasimhan   Ganesha: black-box diagnosis of
                                  MapReduce systems  . . . . . . . . . . . 8--13
                Ashok Anand and   
                  Aditya Akella   NetReplay: a new network primitive . . . 14--19
             Daniele Crocey and   
              Marco Melliay and   
               Emilio Leonardiy   The quest for bandwidth estimation
                                  techniques for large-scale distributed
                                  systems  . . . . . . . . . . . . . . . . 20--25
            Kimberly Keeton and   
               Pankaj Mehra and   
                    John Wilkes   Do you know your IQ?: a research agenda
                                  for information quality in systems . . . 26--31
            Giuliano Casale and   
               Amir Kalbasi and   
      Diwakar Krishnamurthy and   
                    Jerry Rolia   Automatically generating bursty
                                  benchmarks for multitier systems . . . . 32--37
      Joseph L. Hellerstein and   
             Vance Morrison and   
                Eric Eilebrecht   Applying control theory in the real
                                  world: experience with building a
                                  controller for the .NET thread pool  . . 38--42
                 Alma Riska and   
                Ningfang Mi and   
             Evgenia Smirni and   
                Giuliano Casale   Feasibility regions: exploiting
                                  tradeoffs between power and performance
                                  in disk drives . . . . . . . . . . . . . 43--48
           Walter Willinger and   
                Reza Rejaie and   
           Mojtaba Torkjazi and   
             Masoud Valafar and   
                 Mauro Maggioni   Research on online social networks: time
                                  to face the real challenges  . . . . . . 49--54
               Omesh Tickoo and   
                  Ravi Iyer and   
            Ramesh Illikkal and   
                     Don Newell   Modeling virtual machine performance:
                                  challenges and approaches  . . . . . . . 55--60
                Ajay Gulati and   
              Chethan Kumar and   
                    Irfan Ahmad   Modeling workloads and devices for IO
                                  load balancing in virtualized
                                  environments . . . . . . . . . . . . . . 61--66
                 Damien Fay and   
              Hamed Haddadi and   
            Andrew W. Moore and   
            Richard Mortier and   
                Steve Uhlig and   
             Almerima Jamakovic   A weighted spectrum metric for
                                  comparison of Internet topologies  . . . 67--72

ACM SIGMETRICS Performance Evaluation Review
Volume 37, Number 4, March, 2010

            Ramesh Illikkal and   
              Vineet Chadha and   
            Andrew Herdrich and   
                  Ravi Iyer and   
                  Donald Newell   PIRATE: QoS and performance management
                                  in CMP architectures . . . . . . . . . . 3--10
               Parijat Dube and   
                   Li Zhang and   
                 David Daly and   
                    Alan Bivens   Performance of large low-associativity
                                  caches . . . . . . . . . . . . . . . . . 11--18
                 Yaping Zhu and   
           Jennifer Rexford and   
             Subhabrata Sen and   
                    Aman Shaikh   Route Oracle: where have all the packets
                                  gone?  . . . . . . . . . . . . . . . . . 19--25
              Bjoern Doebel and   
                Peter Nobel and   
               Eno Thereska and   
                    Alice Zheng   Towards versatile performance models for
                                  complex, popular applications  . . . . . 26--33
             Asit K. Mishra and   
      Joseph L. Hellerstein and   
             Walfredo Cirne and   
                   Chita R. Das   Towards characterizing cloud backend
                                  workloads: insights from Google compute
                                  clusters . . . . . . . . . . . . . . . . 34--41
              Martin Arlitt and   
               Keith Farkas and   
                  Subu Iyer and   
          Preethi Kumaresan and   
                 Sandro Rafaeli   Systematically improving the quality of
                                  IT utilization data  . . . . . . . . . . 42--49
                Jianying Hu and   
                Yingdong Lu and   
    Aleksandra Mojsilovi\'c and   
              Mayank Sharma and   
             Mark S. Squillante   Performance management of IT services
                                  delivery . . . . . . . . . . . . . . . . 50--57
                 Shuyi Chen and   
          Kaustubh R. Joshi and   
          Matti A. Hiltunen and   
     Richard D. Schlichting and   
             William H. Sanders   Blackbox prediction of the impact of
                                  DVFS on end-to-end performance of
                                  multitier systems  . . . . . . . . . . . 59--63
              Manish Marwah and   
               Paulo Maciel and   
                  Amip Shah and   
             Ratnesh Sharma and   
              Tom Christian and   
           Virgilio Almeida and   
       Carlos Araújo and   
                Erica Souza and   
             Gustavo Callou and   
                Bruno Silva and   
      Sérgio Galdino and   
                     Jose Pires   Quantifying the sustainability impact of
                                  data center availability . . . . . . . . 64--68
        Marco Ajmone Marsan and   
                    Michela Meo   Energy efficient management of two
                                  cellular access networks . . . . . . . . 69--73
       Paschalis Tsiaflakis and   
                    Yung Yi and   
                Mung Chiang and   
                    Marc Moonen   Fair greening for DSL broadband access   74--78
                  Jason Ord and   
             Ellen Chappell and   
             Scott Canonico and   
                   Tim Strecker   Product environmental metrics for
                                  printers . . . . . . . . . . . . . . . . 79--83
               Steve Cayzer and   
                   Chris Preist   The sustainability hub: an information
                                  management tool for analysis and
                                  decision making  . . . . . . . . . . . . 84--88


ACM SIGMETRICS Performance Evaluation Review
Volume 38, Number 1, June, 2010

               Eno Thereska and   
              Bjoern Doebel and   
             Alice X. Zheng and   
                    Peter Nobel   Practical performance models for
                                  complex, popular applications  . . . . . 1--12
               Nicolas Gast and   
                   Gaujal Bruno   A mean field model of work stealing in
                                  large-scale systems  . . . . . . . . . . 13--24
          Simonetta Balsamo and   
          Peter G. Harrison and   
                   Andrea Marin   A unifying approach to product-forms in
                                  networks with finite capacity
                                  constraints  . . . . . . . . . . . . . . 25--36
       Lachlan L. H. Andrew and   
               Minghong Lin and   
                   Adam Wierman   Optimality, fairness, and robustness in
                                  speed scaling designs  . . . . . . . . . 37--48
                   Wei Dong and   
                 Yunhao Liu and   
                 Xiaofan Wu and   
                     Lin Gu and   
                      Chun Chen   Elon: enabling efficient and long-term
                                  reprogramming for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 49--60
               Amin Karbasi and   
                     Sewoong Oh   Distributed sensor network localization
                                  from local connectivity: performance
                                  analysis for the HOP-TERRAIN algorithm   61--70
                   Kuang Xu and   
             Olivier Dousse and   
                 Patrick Thiran   Self-synchronizing properties of CSMA
                                  wireless multi-hop networks  . . . . . . 71--82
            Ciamac Moallemi and   
                  Devavrat Shah   On the flow-level dynamics of a
                                  packet-switched network  . . . . . . . . 83--94
        P. Brighten Godfrey and   
           Michael Schapira and   
                 Aviv Zohar and   
                  Scott Shenker   Incentive compatibility and dynamics of
                                  congestion control . . . . . . . . . . . 95--106
              Devavrat Shah and   
                    Jinwoo Shin   Dynamics in congestion games . . . . . . 107--118
               Liping Xiang and   
                 Yinlong Xu and   
             John C. S. Lui and   
                     Qian Chang   Optimal recovery of single disk failure
                                  in RDP code storage systems  . . . . . . 119--130
             Saeed Ghanbari and   
        Gokul Soundararajan and   
                 Cristiana Amza   A query language and runtime tool for
                                  evaluating behavior of multi-tier
                                  servers  . . . . . . . . . . . . . . . . 131--142
                Ashish Goel and   
                   Pankaj Gupta   Small subset queries and bloom filters
                                  using ternary associative memories, with
                                  applications . . . . . . . . . . . . . . 143--154
                Oren Laadan and   
            Nicolas Viennot and   
                     Jason Nieh   Transparent, lightweight application
                                  execution replay on commodity
                                  multiprocessor operating systems . . . . 155--166
                    Jian Ni and   
                 R. Srikant and   
                     Xinzhou Wu   Coloring spatial point processes with
                                  applications to peer discovery in large
                                  wireless networks  . . . . . . . . . . . 167--178
        Peter M. van de Ven and   
  Augustus J. E. M. Janssen and   
    Johan S. H. van Leeuwaarden   Optimal tradeoff between exposed and
                                  hidden nodes in large wireless networks  179--190
                Shihuan Liu and   
                   Lei Ying and   
                     R. Srikant   Scheduling in multichannel wireless
                                  networks with flow-level dynamics  . . . 191--202
              Devavrat Shah and   
                   Tauhid Zaman   Detecting sources of computer viruses in
                                  networks: theory and experiment  . . . . 203--214
               Vishal Misra and   
          Stratis Ioannidis and   
        Augustin Chaintreau and   
       Laurent Massoulié   Incentivizing peer-assisted services: a
                                  fluid Shapley value approach . . . . . . 215--226
                    Yadi Ma and   
             Suman Banerjee and   
                    Shan Lu and   
                 Cristian Estan   Leveraging parallelism for
                                  multi-dimensional packet classification
                                  on software routers  . . . . . . . . . . 227--238
              Devavrat Shah and   
         John N. Tsitsiklis and   
                     Yuan Zhong   Qualitative properties of $ \alpha
                                  $-weighted scheduling policies . . . . . 239--250
            Giuliano Casale and   
                Ningfang Mi and   
                 Evgenia Smirni   CWS: a model-driven scheduling policy
                                  for correlated workloads . . . . . . . . 251--262
             Haoqiang Zheng and   
                     Jason Nieh   RSIO: automatic user interaction
                                  detection and scheduling . . . . . . . . 263--274
              Maury Bramson and   
                      Yi Lu and   
               Balaji Prabhakar   Randomized load balancing with general
                                  service time distributions . . . . . . . 275--286
            Ayalvadi Ganesh and   
           Sarah Lilienthal and   
               D. Manjunath and   
        Alexandre Proutiere and   
                Florian Simatos   Load balancing via random local search
                                  in closed and open systems . . . . . . . 287--298
       Haiquan (Chuck) Zhao and   
               Cathy H. Xia and   
                   Zhen Liu and   
                    Don Towsley   A unified modeling framework for
                                  distributed resource allocation of
                                  general fork and join processing
                                  networks . . . . . . . . . . . . . . . . 299--310
          Stratis Ioannidis and   
          Laurent Massoulie and   
            Augustin Chaintreau   Distributed caching over heterogeneous
                                  mobile networks  . . . . . . . . . . . . 311--322
             Nelson Antunes and   
     Gonçalo Jacinto and   
         António Pacheco   An analytical framework to infer
                                  multihop path reliability in MANETs  . . 323--332
                 Ed Coffman and   
            Philippe Robert and   
            Florian Simatos and   
               Shuzo Tarumi and   
                    Gil Zussman   Channel fragmentation in dynamic
                                  spectrum access systems: a theoretical
                                  study  . . . . . . . . . . . . . . . . . 333--344
        Jean-Claude Bermond and   
            Dorian Mazauric and   
               Vishal Misra and   
                  Philippe Nain   A distributed scheduling algorithm for
                                  wireless networks with constant overhead
                                  and arbitrary binary interference  . . . 345--346
           Guillaume Sagnol and   
           Mustapha Bouhtou and   
        Stéphane Gaubert   Successive $c$-optimal designs: a
                                  scalable technique to optimize the
                                  measurements on large networks . . . . . 347--348
        Rubén Cuevas and   
         Nikolaos Laoutaris and   
              Xiaoyuan Yang and   
            Georgos Siganos and   
                Pablo Rodriguez   Deep diving into BitTorrent locality . . 349--350
                     Yu Jin and   
              Nick Duffield and   
            Patrick Haffner and   
             Subhabrata Sen and   
                   Zhi-Li Zhang   Inferring applications at the network
                                  layer using collective traffic
                                  statistics . . . . . . . . . . . . . . . 351--352
            Jonatha Anselmi and   
                   Bruno Gaujal   The price of anarchy in parallel queues
                                  revisited  . . . . . . . . . . . . . . . 353--354
          M. H. R. Khouzani and   
             Saswati Sarkar and   
                   Eitan Altman   Optimal propagation of security patches
                                  in mobile wireless networks: extended
                                  abstract . . . . . . . . . . . . . . . . 355--356
                    Kien Le and   
               Ozlem Bilgir and   
          Ricardo Bianchini and   
         Margaret Martonosi and   
                  Thu D. Nguyen   Managing the cost, energy consumption,
                                  and carbon footprint of Internet
                                  services . . . . . . . . . . . . . . . . 357--358
             Asit K. Mishra and   
        Shekhar Srikantaiah and   
            Mahmut Kandemir and   
                   Chita R. Das   Coordinated power management of voltage
                                  islands in CMPs  . . . . . . . . . . . . 359--360
             Hung X. Nguyen and   
                Matthew Roughan   Rigorous statistical analysis of
                                  Internet loss measurements . . . . . . . 361--362
           Takayuki Osogami and   
                   Rudy Raymond   Semidefinite optimization for transient
                                  analysis of queues . . . . . . . . . . . 363--364
              Dongchul Park and   
             Biplob Debnath and   
                       David Du   CFTL: a convertible flash translation
                                  layer adaptive to data access patterns   365--366
                  Feng Qian and   
             Abhinav Pathak and   
              Yu Charlie Hu and   
        Zhuoqing Morley Mao and   
                   Yinglian Xie   A case for unsupervised-learning-based
                                  spam filtering . . . . . . . . . . . . . 367--368
     Shreevatsa Rajagopalan and   
                  Devavrat Shah   Distributed averaging in dynamic
                                  networks . . . . . . . . . . . . . . . . 369--370
              Ruhi Sarikaya and   
               Canturk Isci and   
           Alper Buyuktosunoglu   Program behavior prediction using a
                                  statistical metric model . . . . . . . . 371--372
              Devavrat Shah and   
                    Jinwoo Shin   Delay optimal queue-based CSMA . . . . . 373--374
                  Alex Shye and   
        Benjamin Scholbrock and   
               Gokhan Memik and   
                 Peter A. Dinda   Characterizing and modeling user
                                  activity on smartphones: summary . . . . 375--376
          Fernando Silveira and   
            Christophe Diot and   
                  Nina Taft and   
                Ramesh Govindan   Detecting traffic anomalies using an
                                  equilibrium property . . . . . . . . . . 377--378
     Niranjan Soundararajan and   
      Anand Sivasubramaniam and   
                Vijay Narayanan   Characterizing the soft error
                                  vulnerability of multicores running
                                  multithreaded applications . . . . . . . 379--380
                   Jian Tan and   
                    Wei Wei and   
                   Bo Jiang and   
                Ness Shroff and   
                    Don Towsley   Can multipath mitigate power law
                                  delays?: effects of parallelism on tail
                                  performance  . . . . . . . . . . . . . . 381--382
       Dan-Cristian Tomozei and   
       Laurent Massoulié   Distributed user profiling via spectral
                                  methods  . . . . . . . . . . . . . . . . 383--384

ACM SIGMETRICS Performance Evaluation Review
Volume 38, Number 2, September, 2010

            David K. George and   
                   Cathy H. Xia   Asymptotic analysis of closed queueing
                                  networks and its implications to
                                  achievable service levels  . . . . . . . 3--5
                  Ana Buaic and   
                Varun Gupta and   
                  Jean Mairesse   Stability of the bipartite matching
                                  model  . . . . . . . . . . . . . . . . . 6--8
              Ali Tizghadam and   
            Alberto Leon-Garcia   On random walks in direction-aware
                                  network problems . . . . . . . . . . . . 9--11
               Minghong Lin and   
               Adam Wierman and   
                     Bert Zwart   The average response time in a
                                  heavy-traffic SRPT queue . . . . . . . . 12--14
                Karl Sigman and   
                     Ward Whitt   Heavy-traffic limits for nearly
                                  deterministic queues . . . . . . . . . . 15--17
               Heng-Qing Ye and   
                   David D. Yao   Diffusion limit of a two-class network:
                                  stationary distributions and interchange
                                  of limits  . . . . . . . . . . . . . . . 18--20
   José Niño-Mora   Index policies for admission and routing
                                  of soft real-time traffic to parallel
                                  queues . . . . . . . . . . . . . . . . . 21--23
            Philippe Robert and   
                    Jim Roberts   A mean field approximation for the
                                  capacity of server-limited, gate-limited
                                  multi-server polling systems . . . . . . 24--26
                  Yunan Liu and   
                     Ward Whitt   A fluid approximation for large-scale
                                  service systems  . . . . . . . . . . . . 27--29
               Nicolas Gast and   
                   Bruno Gaujal   Mean field limit of non-smooth systems
                                  and differential inclusions  . . . . . . 30--32
          Ana Radovanovi\'c and   
                    Assaf Zeevi   Revenue maximization through ``smart''
                                  inventory management in
                                  reservation-based online advertising . . 33--35
              Jeong-woo Cho and   
        Jean-Yves Le Boudec and   
                   Yuming Jiang   On the validity of the fixed point
                                  equation and decoupling assumption for
                                  analyzing the 802.11 MAC protocol  . . . 36--38
           P. M. van de Ven and   
                S. C. Borst and   
               D. Denteneer and   
        A. J. E. M. Janssen and   
       J. S. H. van Leeuwaarden   Equalizing throughputs in random-access
                                  networks . . . . . . . . . . . . . . . . 39--41
               Michel Marot and   
               Vincent Gauthier   Reducing collision probability on a
                                  shared medium using a variational method 42--44
                Yingdong Lu and   
             Mark S. Squillante   On approximations for multiple
                                  multidimensional stochastic knapsacks    45--47
              Anshul Gandhi and   
         Mor Harchol-Balter and   
                       Ivo Adan   Decomposition results for an M/M/k with
                                  staggered setup  . . . . . . . . . . . . 48--50
                 Ranjan Pal and   
                Leana Golubchik   On the economics of information
                                  security: the problem of designing
                                  optimal cyber-insurance contracts  . . . 51--53
               Parijat Dube and   
                       Li Zhang   Resiliency of distributed clock
                                  synchronization networks . . . . . . . . 54--56

ACM SIGMETRICS Performance Evaluation Review
Volume 38, Number 3, December, 2010

                Xiaozhou Li and   
           Mark Lillibridge and   
                  Mustafa Uysal   Reliability analysis of deduplicated and
                                  erasure-coded storage  . . . . . . . . . 4--9
            Milind Kulkarni and   
                  Vijay Pai and   
                   Derek Schuff   Towards architecture independent metrics
                                  for multicore performance analysis . . . 10--14
            Clayton Shepard and   
              Ahmad Rahmati and   
               Chad Tossell and   
                  Lin Zhong and   
                 Phillip Kortum   LiveLab: measuring wireless networks and
                                  smartphone users in the field  . . . . . 15--20
              Dongwoon Hahn and   
                 Ginnah Lee and   
             Brenton Walker and   
               Matt Beecher and   
                   Padma Mundur   Using virtualization and live migration
                                  in a scalable mobile wireless testbed    21--25
        Srinivas Shakkottai and   
                   Lei Ying and   
                    Sankalp Sah   Targeted coupon distribution using
                                  social networks  . . . . . . . . . . . . 26--30
 Ragavendran Gopalakrishnan and   
            Jason R. Marden and   
                   Adam Wierman   An architectural view of game theoretic
                                  control  . . . . . . . . . . . . . . . . 31--36
               Zhongmei Yao and   
          Daren B. H. Cline and   
                Dmitri Loguinov   In-degree dynamics of large-scale P2P
                                  systems  . . . . . . . . . . . . . . . . 37--42
            Diana Joumblatt and   
            Renata Teixeira and   
      Jaideep Chandrashekar and   
                      Nina Taft   HostView: annotating end-host
                                  performance measurements with user
                                  feedback . . . . . . . . . . . . . . . . 43--48
       Vijay Kumar Adhikari and   
               Sourabh Jain and   
                   Zhi-Li Zhang   From traffic matrix to routing matrix:
                                  PoP level traffic characteristics for a
                                  Tier-1 ISP . . . . . . . . . . . . . . . 49--54
              Martin Arlitt and   
            Niklas Carlsson and   
                    Jerry Rolia   Special issue on the 2010 GreenMetrics
                                  workshop . . . . . . . . . . . . . . . . ??
           Bhavani Krishnan and   
            Hrishikesh Amur and   
            Ada Gavrilovska and   
                 Karsten Schwan   VM power metering: feasibility and
                                  challenges . . . . . . . . . . . . . . . 56--60
            Steven Phillips and   
         Sheryl L. Woodward and   
              Mark D. Feuer and   
                Peter D. Magill   A regression approach to infer
                                  electricity consumption of legacy
                                  telecom equipment  . . . . . . . . . . . 61--65
                  Biplab Sikdar   Environmental impact of IEEE 802.11
                                  access points: a case study  . . . . . . 66--70
             Prabhakar T.V. and   
   Akshay Uttama Nambi S.N. and   
             Jamadagni H.S. and   
            Krishna Swaroop and   
       R. Venkatesha Prasad and   
         I. G. M. M. Niemegeers   A novel DTN based energy neutral
                                  transfer scheme for energy harvested WSN
                                  Gateways . . . . . . . . . . . . . . . . 71--75
             Alfio Lombardo and   
            Carla Panarello and   
              Giovanni Schembra   Achieving energy savings and QoS in
                                  Internet access routers  . . . . . . . . 76--80
        Aruna Prem Bianzino and   
         Anand Kishore Raju and   
                    Dario Rossi   Apples-to-apples: a framework analysis
                                  for energy-efficiency in networks  . . . 81--85

ACM SIGMETRICS Performance Evaluation Review
Volume 38, Number 4, March, 2011

          Curtis L. Janssen and   
        Helgi Adalsteinsson and   
                Joseph P. Kenny   Using simulation to design extremescale
                                  applications and architectures:
                                  programming model exploration  . . . . . 4--8
                M. B. Giles and   
             G. R. Mudalige and   
                  Z. Sharif and   
                 G. Markall and   
                 P. H. J. Kelly   Performance analysis of the OP2
                                  framework on many-core architectures . . 9--15
              J. A. Herdman and   
               W. P. Gaudin and   
                 D. Turland and   
                  S. D. Hammond   Benchmarking and modelling of POWER7,
                                  Westmere, BG/P, and GPUs: an industry
                                  case study . . . . . . . . . . . . . . . 16--22
            S. J. Pennycook and   
              S. D. Hammond and   
               S. A. Jarvis and   
                 G. R. Mudalige   Performance analysis of a hybrid
                                  MPI/CUDA implementation of the NASLU
                                  benchmark  . . . . . . . . . . . . . . . 23--29
            Sandeep Budanur and   
              Frank Mueller and   
                   Todd Gamblin   Memory Trace Compression and Replay for
                                  SPMD Systems using Extended PRSDs? . . . 30--36
            A. F. Rodrigues and   
              K. S. Hemmert and   
              B. W. Barrett and   
                  C. Kersey and   
                R. Oldfield and   
                  M. Weston and   
                   R. Risen and   
                    J. Cook and   
               P. Rosenfeld and   
             E. CooperBalls and   
                       B. Jacob   The Structural Simulation Toolkit  . . . 37--42
                 Ian Karlin and   
           Elizabeth Jessup and   
            Geoffrey Belter and   
                 Jeremy G. Siek   Parallel memory prediction for fused
                                  linear algebra kernels . . . . . . . . . 43--49
               Naohito Nakasato   A fast GEMM implementation on the
                                  Cypress GPU  . . . . . . . . . . . . . . 50--55
                  Xingfu Wu and   
                 Valerie Taylor   Performance characteristics of hybrid
                                  MPI/OpenMP implementations of NAS
                                  parallel benchmarks SP and BT on
                                  large-scale multicore supercomputers . . 56--62
              Ming-yu Hsieh and   
             Arun Rodrigues and   
                Rolf Riesen and   
             Kevin Thompson and   
                   William Song   A framework for architecture-level
                                  power, area, and thermal simulation and
                                  its application to network-on-chip
                                  design exploration . . . . . . . . . . . 63--68
                   O. Perks and   
              S. D. Hammond and   
            S. J. Pennycook and   
                   S. A. Jarvis   Should we worry about memory loss? . . . 69--74
               Jeanine Cook and   
              Jonathan Cook and   
               Waleed Alkohlani   A statistical performance model of the
                                  Opteron processor  . . . . . . . . . . . 75--80
           Alexandre Tabbal and   
           Matthew Anderson and   
           Maciej Brodowicz and   
             Hartmut Kaiser and   
                Thomas Sterling   Preliminary design examination of the
                                  ParalleX system from a software and
                                  hardware perspective . . . . . . . . . . 81--87
       Simon McIntosh-Smith and   
               Terry Wilson and   
                  Jon Crisp and   
Amaurys Ávila Ibarra and   
            Richard B. Sessions   Energy-aware metrics for benchmarking
                                  heterogeneous systems  . . . . . . . . . 88--94


ACM SIGMETRICS Performance Evaluation Review
Volume 39, Number 1, June, 2011

                  Jian Chen and   
           Lizy Kurian John and   
             Dimitris Kaseridis   Modeling program resource demand using
                                  inherent program characteristics . . . . 1--12
              Akbar Sharifi and   
        Shekhar Srikantaiah and   
             Asit K. Mishra and   
            Mahmut Kandemir and   
                   Chita R. Das   METE: meeting end-to-end QoS in
                                  multicores through system-wide resource
                                  management . . . . . . . . . . . . . . . 13--24
              Yuanrui Zhang and   
            Mahmut Kandemir and   
                 Taylan Yemliha   Studying inter-core data reuse in
                                  multicores . . . . . . . . . . . . . . . 25--36
                   Fang Liu and   
                    Yan Solihin   Studying the impact of hardware
                                  prefetching and bandwidth partitioning
                                  in chip-multiprocessors  . . . . . . . . 37--48
          Mohammad Alizadeh and   
              Abdul Kabbani and   
              Berk Atikoglu and   
               Balaji Prabhakar   Stability analysis of QCN: the averaging
                                  principle  . . . . . . . . . . . . . . . 49--60
               Vinay Joseph and   
             Gustavo de Veciana   Stochastic networks with multipath flow
                                  control: impact of resource pools on
                                  flow-level performance and network
                                  congestion . . . . . . . . . . . . . . . 61--72
          Mohammad Alizadeh and   
             Adel Javanmard and   
               Balaji Prabhakar   Analysis of DCTCP: stability,
                                  convergence, and fairness  . . . . . . . 73--84
                  Jinho Suh and   
       Mehrtash Manoochehri and   
           Murali Annavaram and   
                  Michel Dubois   Soft error benchmarking of L2 caches
                                  with PARMA . . . . . . . . . . . . . . . 85--96
             Martin Suchara and   
                   Dahai Xu and   
          Robert Doverspike and   
              David Johnson and   
               Jennifer Rexford   Network architecture for joint failure
                                  recovery and traffic engineering . . . . 97--108
          Dinesh Subhraveti and   
                     Jason Nieh   Record and transplay: partial
                                  checkpointing for replay debugging
                                  across heterogeneous systems . . . . . . 109--120
         John N. Tsitsiklis and   
                       Kuang Xu   On the power of (even a little)
                                  centralization in distributed processing 121--132
               Thanh Nguyen and   
                 Milan Vojnovic   Weighted proportional allocation . . . . 133--144
               Samuli Aalto and   
           Aleksi Penttinen and   
               Pasi Lassila and   
                   Prajwal Osti   On the optimal trade-off between SRPT
                                  and opportunistic scheduling . . . . . . 145--155
                Edith Cohen and   
             Graham Cormode and   
                  Nick Duffield   Structure-aware sampling on data streams 157--168
         Satish Babu Korada and   
           Andrea Montanari and   
                     Sewoong Oh   Gossip PCA . . . . . . . . . . . . . . . 169--180
            Rahul Urgaonkar and   
           Bhuvan Urgaonkar and   
           Michael J. Neely and   
          Anand Sivasubramaniam   Optimal power cost management using
                                  stored energy in data centers  . . . . . 181--192
                Zhenhua Liu and   
               Minghong Lin and   
               Adam Wierman and   
              Steven H. Low and   
           Lachlan L. H. Andrew   Greening geographical load balancing . . 193--204
         Giang T. K. Nguyen and   
             Rachit Agarwal and   
                  Junda Liu and   
             Matthew Caesar and   
        P. Brighten Godfrey and   
                  Scott Shenker   Slick packets  . . . . . . . . . . . . . 205--216
               Simon S. Lam and   
                      Chen Qian   Geographic routing in $d$-dimensional
                                  spaces with guaranteed delivery and low
                                  stretch  . . . . . . . . . . . . . . . . 217--228
                Eric Rozner and   
               Mi Kyung Han and   
                   Lili Qiu and   
                      Yin Zhang   Model-driven optimization of
                                  opportunistic routing  . . . . . . . . . 229--240
              Maciej Kurant and   
                Minas Gjoka and   
            Carter T. Butts and   
             Athina Markopoulou   Walking on a graph with a magnifying
                                  glass: stratified sampling via weighted
                                  random walks . . . . . . . . . . . . . . 241--252
      Animashree Anandkumar and   
          Avinatan Hassidim and   
                Jonathan Kelner   Topology discovery of sparse random
                                  graphs with few participants . . . . . . 253--264
           M. Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
                       Jia Wang   Characterizing and modeling Internet
                                  traffic dynamics of cellular devices . . 265--276
                   Qiang Xu and   
              Junxian Huang and   
             Zhaoguang Wang and   
                  Feng Qian and   
           Alexandre Gerber and   
            Zhuoqing Morley Mao   Cellular data network infrastructure
                                  characterization and implication on
                                  mobile content placement . . . . . . . . 277--288
               Myungjin Lee and   
            Sharon Goldberg and   
        Ramana Rao Kompella and   
                George Varghese   Fine-grained latency and loss
                                  measurements in the presence of
                                  reordering . . . . . . . . . . . . . . . 289--300
                   Xia Zhou and   
          Stratis Ioannidis and   
              Laurent Massoulie   On the stability and optimality of
                                  universal swarms . . . . . . . . . . . . 301--312
            Patrick J. Eibl and   
             Albert Meixner and   
                Daniel J. Sorin   An FPGA-based experimental evaluation of
                                  microprocessor core error detection with
                                  Argus-2  . . . . . . . . . . . . . . . . 313--314
                 Lele Zhang and   
              Darryl Veitch and   
         Kotagiri Ramamohanarao   The role of KL divergence in anomaly
                                  detection  . . . . . . . . . . . . . . . 315--316
                Elie Krevat and   
               Tomer Shiran and   
              Eric Anderson and   
               Joseph Tucek and   
               Jay J. Wylie and   
              Gregory R. Ganger   Applying idealized lower-bound runtime
                                  models to understand inefficiencies in
                                  data-intensive computing . . . . . . . . 317--318
               Jinyoung Han and   
             Taejoong Chung and   
               Seungbae Kim and   
         Ted Taekyoung Kwon and   
              Hyun-chul Kim and   
                   Yanghee Choi   How prevalent is content bundling in
                                  BitTorrent?  . . . . . . . . . . . . . . 319--320
                    Jia Rao and   
               Xiangping Bu and   
                   Kun Wang and   
                 Cheng-Zhong Xu   Self-adaptive provisioning of
                                  virtualized resources in cloud computing 321--322
                    Chao Li and   
                Amer Qouneh and   
                         Tao Li   Characterizing and analyzing renewable
                                  energy driven data centers . . . . . . . 323--324
                Varun Gupta and   
               Takayuki Osogami   Tight moments-based bounds for queueing
                                  systems  . . . . . . . . . . . . . . . . 325--326
                Suk-Bok Lee and   
                    Dan Pei and   
   MohammadTaghi Hajiaghayi and   
        Ioannis Pefkianakis and   
                  Songwu Lu and   
                     He Yan and   
                   Zihui Ge and   
             Jennifer Yates and   
                 Mario Kosseifi   Scalable monitoring via threshold
                                  compression in a large operational $3$G
                                  network  . . . . . . . . . . . . . . . . 327--328
       Vijay Kumar Adhikari and   
               Sourabh Jain and   
              Yingying Chen and   
                   Zhi-Li Zhang   How do you 'Tube'? . . . . . . . . . . . 329--330
                   Krishna Kant   A control scheme for batching DRAM
                                  requests to improve power efficiency . . 331--332
                  Hao Zhang and   
                  Ziyu Shao and   
               Minghua Chen and   
             Kannan Ramchandran   Optimal neighbor selection in
                                  BitTorrent-like peer-to-peer networks    333--334
               Sunghwan Ihm and   
                   Vivek S. Pai   Towards understanding modern Web traffic 335--336
              Aditya Akella and   
              Shuchi Chawla and   
             Holly Esquivel and   
           Chitra Muthukrishnan   De-ossifying Internet routing through
                                  intrinsic support for end-network and
                                  ISP selfishness  . . . . . . . . . . . . 337--338
                 Yu-Ju Hong and   
                Jiachen Xue and   
            Mithuna Thottethodi   Dynamic server provisioning to minimize
                                  cost in an IaaS cloud  . . . . . . . . . 339--340
       Sadagopan Srinivasan and   
           Ravishankar Iyer and   
                    Li Zhao and   
                Ramesh Illikkal   HeteroScouts: hardware assist for OS
                                  scheduling in heterogeneous CMPs . . . . 341--342
              Bruno Ribeiro and   
          Daniel Figueiredo and   
   Edmundo de Souza e Silva and   
                    Don Towsley   Characterizing continuous-time random
                                  walks on dynamic networks  . . . . . . . 343--344
                  Jian Chen and   
               Lizy Kurian John   Autocorrelation analysis: a new and
                                  improved method for measuring branch
                                  predictability . . . . . . . . . . . . . 345--346
         Satinder Pal Singh and   
             Randolph Baden and   
                  Choon Lee and   
        Bobby Bhattacharjee and   
                 Richard La and   
                   Mark Shayman   IP geolocation in metropolitan areas . . 347--348
                   Jay Chen and   
          Janardhan Iyengar and   
Lakshminarayanan Subramanian and   
                     Bryan Ford   TCP behavior in sub packet regimes . . . 349--350
       Rhys Alistair Bowden and   
            Matthew Roughan and   
                     Nigel Bean   Network link tomography and compressive
                                  sensing  . . . . . . . . . . . . . . . . 351--352
                Ajay Gulati and   
                    Irfan Ahmad   Storage technologies, management and
                                  troubleshooting in virtualized
                                  datacenters  . . . . . . . . . . . . . . 353--354
               Sudipta Sengupta   Cloud data center networks:
                                  technologies, trends, and challenges . . 355--356
                Giuliano Casale   Building accurate workload models using
                                  Markovian arrival processes  . . . . . . 357--358
                   Florin Ciucu   Non-asymptotic capacity and delay
                                  analysis of mobile wireless networks . . 359--360

ACM SIGMETRICS Performance Evaluation Review
Volume 39, Number 2, September, 2011

           Ahmed Elmokashfi and   
             Amund Kvalbein and   
           Constantine Dovrolis   SIMROT: a scalable inter-domain routing
                                  toolbox  . . . . . . . . . . . . . . . . 4--13
                 Aritra Sen and   
                 Ankit Garg and   
               Akshat Verma and   
                    Tapan Nayak   CloudBridge: on integrated
                                  hardware-software consolidation  . . . . 14--25
          Jayakrishnan Nair and   
               Adam Wierman and   
                     Bert Zwart   Exploiting network effects in the
                                  provisioning of large scale systems  . . 26--28
          James Nightingale and   
                    Qi Wang and   
                Christos Grecos   Performance evaluation of scalable video
                                  streaming in multihomed mobile networks  29--31
                  N. Bouman and   
                S. C. Borst and   
       J. S. H. van Leeuwaarden   Delay performance of backlog based
                                  random access  . . . . . . . . . . . . . 32--34
                Seva Shneer and   
            Peter M. van de Ven   Comparing slotted and continuous CSMA:
                                  throughputs and fairness . . . . . . . . 35--37
              Evgeny Shvets and   
             Andrey Lyakhov and   
          Alexander Safonov and   
                  Evgeny Khorov   Analytical model of IEEE 802.11s
                                  MCCAbased streaming in the presence of
                                  noise  . . . . . . . . . . . . . . . . . 38--40
                  U. Ayesta and   
                A. Izagirre and   
                  I. M. Verloop   Heavy traffic analysis of the
                                  discriminatory random-order-of-service
                                  discipline . . . . . . . . . . . . . . . 41--43
              M. A. A. Boon and   
          R. D. van der Mei and   
               E. M. M. Winands   Queueing networks with a single shared
                                  server: light and heavy traffic  . . . . 44--46
             Maria Frolkova and   
                  Josh Reed and   
                     Bert Zwart   Fixed-point approximations of bandwidth
                                  sharing networks with rate constraints   47--49
             Maria Dolores Cano   Improving path failure detection in SCTP
                                  using adaptive heartbeat time intervals  50--52
               Nuutti Varis and   
                   Jukka Manner   In the network: Sandy Bridge versus
                                  Nehalem  . . . . . . . . . . . . . . . . 53--55
    Jonatha Anselmi Anselmi and   
                   Bruno Gaujal   On the efficiency of perfect simulation
                                  in monotone queueing networks  . . . . . 56--58
          Y. M. Baryshnikov and   
              E. G. Coffman and   
                     K. J. Kwak   CAUCHY localization: a distributed
                                  computation of WSNs  . . . . . . . . . . 59--61
                  Oana Goga and   
            Patrick Loiseau and   
         Paulo Gonçalves   On the impact of the flow size
                                  distribution's tail index on network
                                  performance with TCP connections . . . . 62--64
                   B. Van Houdt   Load balancing and the power of
                                  preventive probing . . . . . . . . . . . 65--67
               Eitan Altman and   
           Rachid El Azouzi and   
  Daniel S. Menasché and   
                     Yuedong Xu   Poster: Aging control for smartphones in
                                  hybrid networks  . . . . . . . . . . . . 68--68
  Hossein Kaffash Bokharaei and   
             Yashar Ganjali and   
             Ram Keralapura and   
                  Antonio Nucci   Poster: Telephony network
                                  characterization for spammer
                                  identification . . . . . . . . . . . . . 69--69
               Joost Bosman and   
            Rob van der Mei and   
                Gerard Hoekstra   Poster: Optimal dispatching policies for
                                  parallel processor sharing nodes with
                                  partial information  . . . . . . . . . . 70--70
                    Ke Dong and   
          Diptanil DebBarma and   
              R. Venkatesha and   
               Prasad Cheng Guo   Poster: Performance study of clustering
                                  of Zigbee devices in OPNET . . . . . . . 71--71
           Ralf Lübben and   
                  Markus Fidler   Poster: On the capacity delay error
                                  tradeoff of source coding  . . . . . . . 72--72
               Vladimir Marbukh   Poster: Tcp effective bandwidth and
                                  Internet performance . . . . . . . . . . 73--73
          William A. Massey and   
                   Jamol Pender   Poster: Skewness variance approximation
                                  for dynamic rate MultiServer queues with
                                  abandonment  . . . . . . . . . . . . . . 74--74
             Ashikur Rahman and   
               Carey Williamson   Poster: $ \Delta $-Graphs: flexible
                                  topology control in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 75--75
             Ashikur Rahman and   
             Hanan Shpungin and   
               Carey Williamson   Poster: On capacity maximization in
                                  wireless relay networks  . . . . . . . . 76--76
               Paolo Romano and   
                Matteo Leonetti   Poster: Selftuning batching in total
                                  order broadcast via analytical modelling
                                  and reinforcement learning . . . . . . . 77--77
                Zhichao Yan and   
                   Dan Feng and   
                     Yujuan Tan   Poster: Dissection the version
                                  management schemes in hardware
                                  transactional memory systems . . . . . . 78--78

ACM SIGMETRICS Performance Evaluation Review
Volume 39, Number 3, December, 2011

        Ricardo M. Czekster and   
            Paulo Fernandes and   
                   Thais Webber   Efficient vector-descriptor product
                                  exploiting time-memory trade-offs! . . . 2--9
             David J. Lilja and   
         Raffaela Mirandola and   
                      Kai Sachs   Paper abstracts of the second
                                  international conference on performance
                                  engineering (ICPE 2011)  . . . . . . . . 2--9
             Mark S. Squillante   Instrumentation-based tool for latency
                                  measurements (abstracts only)  . . . . . 20--20
      Dimitri Papadimitriou and   
               Florin Coras and   
                Albert Cabellos   Path-vector routing stability analysis   22--24
               Haotian Zhao and   
                     Yinlong Xu   A deterministic algorithm of single
                                  failed node recovery in MSR-based
                                  distributed storage systems  . . . . . . 25--27
             Siddharth Garg and   
           Shreyas Sundaram and   
                 Hiren D. Patel   Robust heterogeneous data center design:
                                  a principled approach  . . . . . . . . . 28--30
              Ali Tizghadam and   
        Alberto Leon-Garcia and   
                   Hassan Naser   On robust wireless network optimization
                                  using network criticality  . . . . . . . 31--33
                   Marc Lelarge   Diffusion and cascading behavior in
                                  random networks  . . . . . . . . . . . . 34--36
        Omer H. Abdelrahman and   
                   Erol Gelenbe   Search in non-homogeneous random
                                  environments?  . . . . . . . . . . . . . 37--39
                Hanhua Feng and   
               Parijat Dube and   
                       Li Zhang   On estimation problems for the $ G / G /
                                  \infty $ Queue . . . . . . . . . . . . . 40--42
            Sherwin Doroudi and   
 Ragavendran Gopalakrishnan and   
                   Adam Wierman   Dispatching to incentivize fast service
                                  in multi-server queues . . . . . . . . . 43--45
             Osman T. Akgun and   
             Rhonda Righter and   
                   Ronald Wolff   The power of partial power of two
                                  choices  . . . . . . . . . . . . . . . . 46--48
                 Ranjan Pal and   
                Sokol Kosta and   
                        Pan Hui   Settling for less: a QoS compromise
                                  mechanism for opportunistic mobile
                                  networks . . . . . . . . . . . . . . . . 49--51
                Zichao Yang and   
                 John C. S. Lui   Investigating the effect of node
                                  heterogeneity and network externality on
                                  security adoption  . . . . . . . . . . . 52--54
Daniel Sadoc Menasché and   
     Antonio A. de A. Rocha and   
Edmundo A. de Souza e Silva and   
                Don Towsley and   
         Rosa M. Meri Leäo   Implications of peer selection
                                  strategies by publishers on the
                                  performance of P2P swarming systems  . . 55--57
               Samuli Aalto and   
               Pasi Lassila and   
           Petri Savolainen and   
                   Sasu Tarkoma   How impatience affects the performance
                                  and scalability of P2P video-on-demand
                                  systems  . . . . . . . . . . . . . . . . 58--60
              Martin Arlitt and   
            Niklas Carlsson and   
                    Jerry Rolia   Proceedings of the 2011 GreenMetrics
                                  workshop . . . . . . . . . . . . . . . . 58--60
                Zhenhua Liu and   
               Minghong Lin and   
               Adam Wierman and   
              Steven H. Low and   
           Lachlan L. H. Andrew   Geographical load balancing with
                                  renewables . . . . . . . . . . . . . . . 62--66
               Eitan Altman and   
         Manjesh K. Hanawal and   
            Rachid ElAzouzi and   
                 Sholomo Shamai   Tradeoffs in green cellular networks . . 67--71
             Andrew Sucevic and   
       Lachlan L. H. Andrew and   
              Thuy T. T. Nguyen   Powering down for energy efficient
                                  peer-to-peer file distribution . . . . . 72--76
              Michael Brown and   
                     Jose Renau   ReRack: power simulation for data
                                  centers with renewable energy generation 77--81
                   Feng Yan and   
         Xenia Mountrouidou and   
                 Alma Riska and   
                 Evgenia Smirni   Copy rate synchronization with
                                  performance guarantees for work
                                  consolidation in storage clusters  . . . 82--86
               Vishal Gupta and   
              Ripal Nathuji and   
                 Karsten Schwan   An analysis of power reduction in
                                  datacenters using heterogeneous chip
                                  multiprocessors  . . . . . . . . . . . . 87--91
            Giuliano Casale and   
                     Ioan Raicu   HPDC/SIGMETRICS student research posters 92--96
                 Doron Chen and   
                Ealan Henis and   
               Ronen I. Kat and   
            Dmitry Sotnikov and   
           Cinzia Cappiello and   
   Alexandre Mello Ferreira and   
            Barbara Pernici and   
              Monica Vitali and   
                  Tao Jiang and   
                    Jia Liu and   
                 Alexander Kipp   Usage centric green performance
                                  indicators . . . . . . . . . . . . . . . 92--96
              Yuanrui Zhang and   
                    Jun Liu and   
  Sai Prashanth Muralidhara and   
                Mahmut Kandemir   BrickX: building hybrid systems for
                                  recursive computations . . . . . . . . . 98--100
           Jeremy Blackburn and   
             Ramanuja Simha and   
               Clayton Long and   
                  Xiang Zuo and   
         Nicolas Kourtellis and   
              John Skvoretz and   
              Adriana Iamnitchi   Cheaters in a gaming social network  . . 101--103
             Anton Stefanek and   
          Richard A. Hayden and   
              Jeremy T. Bradley   Fluid computation of the performance:
                                  energy tradeoff in large scale Markov
                                  models . . . . . . . . . . . . . . . . . 104--106
                Shingyu Kim and   
                Junghee Won and   
                  Hyuck Han and   
              Hyeonsang Eom and   
                   Heon Y. Yeom   Improving Hadoop performance in
                                  intercloud environments  . . . . . . . . 107--109
                    Yong Oh Lee   Improving performance and energy savings
                                  through alternative forwarding . . . . . 110--112
               Seungmi Choi and   
                Shingyu Kim and   
                  Hyuck Han and   
                   Heon Y. Yeom   Improving performance of MapReduce
                                  framework on InterCloud by avoiding
                                  transmission of unnecessary data . . . . 113--115
           Hrishikesh Gadre and   
                Ivan Rodero and   
                Manish Parashar   Investigating MapReduce framework
                                  extensions for efficient processing of
                                  geographically scattered datasets  . . . 116--118
              Richard A. Hayden   Mean-field approximations for
                                  performance models with generally-timed
                                  transitions  . . . . . . . . . . . . . . 119--121
               Rohan Gandhi and   
    Dimitrios Koutsonikolas and   
                  Y. Charlie Hu   Multicasting MDC videos to receivers
                                  with different screen resolution . . . . 122--124
               Lina Sawalha and   
              Monte P. Tull and   
               Ronald D. Barnes   Thread scheduling for heterogeneous
                                  multicore processors using phase
                                  identification . . . . . . . . . . . . . 125--127
                 Tonglin Li and   
                Raman Verma and   
                    Xi Duan and   
                    Hui Jin and   
                     Ioan Raicu   Exploring distributed hash tables in
                                  HighEnd computing  . . . . . . . . . . . 128--130

ACM SIGMETRICS Performance Evaluation Review
Volume 39, Number 4, April, 2012

         Philip F. Burdette and   
           William F. Jones and   
             Brian C. Blose and   
          Gregory M. Kapfhammer   An empirical comparison of Java remote
                                  communication primitives for intra-node
                                  data transmission  . . . . . . . . . . . 2--11
         Sathish Gopalakrishnan   Sharp utilization thresholds for some
                                  realtime scheduling problems . . . . . . 12--22
              Edward G. Coffman   Synthesis of local-rule processes:
                                  successes and challenges (abstract only) 24--24
               Steven S. G. Kou   First passage times and option pricing
                                  under a mixed-exponential jump diffusion
                                  model (abstract only)  . . . . . . . . . 24--24
                Marcel F. Neuts   The algorithmization of mathematics: the
                                  story of stochastic models (abstract
                                  only)  . . . . . . . . . . . . . . . . . 24--24
                  Devavrat Shah   Product-form distributions and network
                                  algorithms (abstract only) . . . . . . . 24--24
              Jung Woo Baek and   
                 Ho Woo Lee and   
                 Se Won Lee and   
                     Soohan Ahn   Factorization properties for a
                                  MAP-modulated fluid flow model under
                                  server vacation policies (abstract only) 25--25
               Mogens Bladt and   
      Luz Judith R. Esparza and   
               Bo Friis Nielsen   Bilateral matrix-exponential
                                  distributions (abstract only)  . . . . . 25--25
               Mogens Bladt and   
               Bo Friis Nielsen   Moment distributions of phase-type
                                  (abstract only)  . . . . . . . . . . . . 25--26
               Steve Drekic and   
             David Stanford and   
               Douglas Woolford   A self-promoting priority model for
                                  transplant queues (abstract only)  . . . 26--26
                  Mark Fackrell   Characterizing matrix-exponential
                                  distributions of order $4$ (abstract
                                  only)  . . . . . . . . . . . . . . . . . 26--26
              Sophie Hautphenne   An EM algorithm for the model fitting of
                                  Markovian binary trees (abstract only)   26--27
          Sophie Hautphenne and   
               Guy Latouche and   
                Giang T. Nguyen   Markovian trees subject to catastrophes:
                                  would they survive forever? (abstract
                                  only)  . . . . . . . . . . . . . . . . . 27--27
                 Qi-Ming He and   
                   Jiandong Ren   On a discrete multi-variate phase-type
                                  distribution and its applications
                                  (abstract only)  . . . . . . . . . . . . 27--27
                 Qi-Ming He and   
               Hanqin Zhang and   
                      Juan Vera   Majorization and Extremal
                                  PH-Distributions (abstract only) . . . . 27--27
Gábor Horváth and   
            Miklós Telek   Acceptance-rejection methods for
                                  generating random variates from matrix
                                  exponential distributions and rational
                                  arrival processes (abstract only)  . . . 27--27
         Masahiro Kobayashi and   
              Yutaka Sakuma and   
              Masakiyo Miyazawa   Tail asymptotics of the stationary
                                  distribution for M/M-JSQ with $k$
                                  parallel queues (abstract only)  . . . . 28--28
          A. Krishnamoorthy and   
         Viswanath C. Narayanan   Stochastic decomposition in production
                                  inventory with service time (abstract
                                  only)  . . . . . . . . . . . . . . . . . 28--28
               Guy Latouche and   
            Giang T. Nguyen and   
             Zbigniew Palmowski   Two-dimensional fluid queues with
                                  temporary assistance (abstract only) . . 28--28
                   V. Ramaswami   A fluid introduction to Brownian motion &
                                  stochastic integration (abstract only)   29--29
            Nikki Sonenberg and   
                Peter G. Taylor   A network of fluid models and its
                                  application in MANETs (abstract only)    29--29
             David Stanford and   
            Peter G. Taylor and   
                   Ilze Ziedins   A new paradigm for priority patient
                                  selection (abstract only)  . . . . . . . 29--29
          Hiroshi Toyoizumi and   
                   Jeremy Field   Analysis of the dynamics of social
                                  queues by quasi-birth-and-death
                                  processes (abstract only)  . . . . . . . 29--30
               B. Van Houdt and   
             J. F. Pérez   The impact of dampening demand
                                  variability in a production/inventory
                                  system with multiple retailers (abstract
                                  only)  . . . . . . . . . . . . . . . . . 30--30
              Nigel G. Bean and   
               Bo Friis Nielsen   Analysis of queues with rational arrival
                                  process components: a general approach   31--31
              Nigel G. Bean and   
        Ma\lgorzata M. O'Reilly   A stochastic fluid model driven by an
                                  uncountable-state process, which is a
                                  stochastic fluid model itself: the
                                  stochastic fluid-fluid model . . . . . . 32--32
              Dario A. Bini and   
               Paola Favati and   
                 Beatrice Meini   A compressed cyclic reduction for QBDs
                                  with low rank upper and lower
                                  transitions  . . . . . . . . . . . . . . 33--33
               Mogens Bladt and   
               Bo Friis Nielsen   An overview of multivariate gamma
                                  distributions as seen from a
                                  (multivariate) matrix exponential
                                  perspective  . . . . . . . . . . . . . . 34--34
              Jose Blanchet and   
                      Jing Dong   Rare-event simulation for multi-server
                                  queues in the Halfin--Whitt regime . . . 35--35
            Giuliano Casale and   
          Peter G. Harrison and   
         Maria Grazia Vigliotti   Product-form approximation of queueing
                                  networks with phase-type service . . . . 36--36
                  J. G. Dai and   
                   Shuangchi He   Numerical analysis for diffusion models
                                  of GI/Ph/n $+$ GI queues . . . . . . . . 37--37
            Eric V. Denardo and   
         Eugene A. Feinberg and   
              Uriel G. Rothblum   Splitting in a finite Markov decision
                                  problem  . . . . . . . . . . . . . . . . 38--38
            Eric V. Denardo and   
         Eugene A. Feinberg and   
              Uriel G. Rothblum   The multi-armed bandit, with constraints 39--39
               S. Dendievel and   
                G. Latouche and   
                   M-A. Remiche   Stationary distribution of a perturbed
                                  QBD process  . . . . . . . . . . . . . . 40--40
              Maria Govorun and   
               Guy Latouche and   
             Marie-Ange Remiche   Profits and risks of pension plans . . . 41--41
         Masahiro Kobayashi and   
              Masakiyo Miyazawa   Revisit to the tail asymptotics of the
                                  double QBD process by the analytic
                                  function method  . . . . . . . . . . . . 42--42
                  Yunan Liu and   
                     Ward Whitt   A fluid model for many-server queues
                                  with time-varying arrivals and
                                  phase-type service distribution  . . . . 43--43
              Barbara Margolius   Numerical study of Markovian arrival
                                  processes (MAP) with time-varying
                                  periodic arrival rates . . . . . . . . . 44--44
    Ma\lgorzata M. O'Reilly and   
                  Nigel G. Bean   Stochastic 2-dimensional fluid model . . 45--45
                    D. Bini and   
                   B. Meini and   
           S. Steffé and   
         J. F. Pérez and   
                   B. Van Houdt   SMCSolver and Q-MAM: tools for
                                  matrix-analytic methods  . . . . . . . . 46--46
            Giuliano Casale and   
                 Evgenia Smirni   KPC-toolbox: fitting Markovian arrival
                                  processes and phase-type distributions
                                  with MATLAB  . . . . . . . . . . . . . . 47--47
                 Marco Cote and   
               German Riano and   
    Raha Akhavan-Tabatabaei and   
        Juan Fernando Perez and   
           Andres Sarmiento and   
                     Julio Goez   jMarkov package: a stochastic modeling
                                  tool . . . . . . . . . . . . . . . . . . 48--48
              Sara Casolari and   
          Michele Colajanni and   
                  Stefania Tosi   Selective resource characterization for
                                  evaluation of system dynamics  . . . . . 51--60
             Giuseppe Aceto and   
              Antonio Pescap\`e   On the recent use of email through
                                  traffic and network analysis: the impact
                                  of OSNs, new trends, and other
                                  communication platforms  . . . . . . . . 61--70
        Salvatore Distefano and   
          Antonio Puliafito and   
              Kishor S. Trivedi   Dynamic aspects and behaviors of complex
                                  systems in performance and reliability
                                  assessment . . . . . . . . . . . . . . . 71--78
              Nidhal Mahmud and   
              Martin Walker and   
           Yiannis Papadopoulos   Compositional synthesis of temporal
                                  fault trees from state machines  . . . . 79--88
               Marco Abundo and   
         Valeria Cardellini and   
            Francesco Lo Presti   Admission control policies for a
                                  multi-class QoS-aware service oriented
                                  architecture . . . . . . . . . . . . . . 89--98
    Vittoria de Nitto Person\`a   Heuristics for QoS maintenance: adaptive
                                  policies in differentiated services
                                  wireless networks  . . . . . . . . . . . 99--107
        Emmanuelle Anceaume and   
           Romaric Ludinard and   
                 Bruno Sericola   Performance evaluation of large-scale
                                  dynamic systems  . . . . . . . . . . . . 108--117


ACM SIGMETRICS Performance Evaluation Review
Volume 40, Number 1, June, 2012

                Naresh M. Patel   Performance implications of flash and
                                  storage class memories . . . . . . . . . 1--2
                       Zhen Liu   High-performance computing in mobile
                                  services . . . . . . . . . . . . . . . . 3--4
                   Jian Tan and   
              Xiaoqiao Meng and   
                       Li Zhang   Delay tails in MapReduce scheduling  . . 5--16
              Devavrat Shah and   
                Neil Walton and   
                     Yuan Zhong   Optimal queue-size scaling in switched
                                  networks . . . . . . . . . . . . . . . . 17--28
            Esa Hyytiä and   
               Samuli Aalto and   
               Aleksi Penttinen   Minimizing slowdown in heterogeneous
                                  size-aware dispatching systems . . . . . 29--40
            Mathieu Leconte and   
               Marc Lelarge and   
       Laurent Massoulié   Bipartite graph structures for efficient
                                  balancing of heterogeneous loads . . . . 41--52
              Berk Atikoglu and   
                  Yuehai Xu and   
         Eitan Frachtenberg and   
                 Song Jiang and   
                  Mike Paleczny   Workload analysis of a large-scale
                                  key-value store  . . . . . . . . . . . . 53--64
     Muhammad Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
                       Jia Wang   A first look at cellular
                                  machine-to-machine traffic: large scale
                                  measurement and characterization . . . . 65--76
               Jinyoung Han and   
               Seungbae Kim and   
             Taejoong Chung and   
         Ted Taekyoung Kwon and   
              Hyun-chul Kim and   
                   Yanghee Choi   Bundling practice in BitTorrent: what,
                                  how, and why . . . . . . . . . . . . . . 77--88
                Lingwen Gan and   
                Anwar Walid and   
                     Steven Low   Energy-efficient congestion control  . . 89--100
      Predrag R. Jelenkovic and   
            Evangelia D. Skiani   Uniform approximation of the
                                  distribution for the number of
                                  retransmissions of bounded documents . . 101--112
            Benny Van Houdt and   
                Luca Bortolussi   Fluid limit of an asynchronous optical
                                  packet switch with shared per link full
                                  range wavelength conversion  . . . . . . 113--124
                    Nan Hua and   
                Ashwin Lall and   
                 Baochun Li and   
                         Jun Xu   Towards optimal error-estimating codes
                                  through the lens of Fisher information
                                  analysis . . . . . . . . . . . . . . . . 125--136
            Ashish Vulimiri and   
                Gul A. Agha and   
    Philip Brighten Godfrey and   
       Karthik Lakshminarayanan   How well can congestion pricing
                                  neutralize denial of service attacks?    137--150
                     Di Niu and   
                  Chen Feng and   
                     Baochun Li   Pricing cloud bandwidth reservations
                                  under demand uncertainty . . . . . . . . 151--162
           Nosayba El-Sayed and   
        Ioan A. Stefanovici and   
         George Amvrosiadis and   
              Andy A. Hwang and   
               Bianca Schroeder   Temperature management in data centers:
                                  why some (might) like it hot . . . . . . 163--174
                Zhenhua Liu and   
                  Yuan Chen and   
                Cullen Bash and   
               Adam Wierman and   
               Daniel Gmach and   
                Zhikui Wang and   
              Manish Marwah and   
                    Chris Hyser   Renewable and cooling aware workload
                                  management for sustainable data centers  175--186
                    Di Wang and   
              Chuangang Ren and   
      Anand Sivasubramaniam and   
           Bhuvan Urgaonkar and   
                    Hosam Fathy   Energy storage in datacenters: what,
                                  where, and how much? . . . . . . . . . . 187--198
              Devavrat Shah and   
                   Tauhid Zaman   Rumor centrality: a universal source
                                  detector . . . . . . . . . . . . . . . . 199--210
        Praneeth Netrapalli and   
                 Sujay Sanghavi   Learning the graph of epidemic cascades  211--222
              Chris Milling and   
      Constantine Caramanis and   
                Shie Mannor and   
              Sanjay Shakkottai   Network forensics: random infection vs
                                  spreading epidemic . . . . . . . . . . . 223--234
                 Hyojun Kim and   
              Moonkyung Ryu and   
        Umakishore Ramachandran   What is a good buffer cache replacement
                                  scheme for mobile flash storage? . . . . 235--246
          Mohammad Alizadeh and   
             Adel Javanmard and   
           Shang-Tse Chuang and   
                Sundar Iyer and   
                          Yi Lu   Versatile refresh: low complexity
                                  refresh scheduling for high-throughput
                                  multi-banked eDRAM . . . . . . . . . . . 247--258
       Suparna Bhattacharya and   
          Karthick Rajamani and   
                K. Gopinath and   
                   Manish Gupta   Does lean imply green?: a study of the
                                  power performance implications of Java
                                  runtime bloat  . . . . . . . . . . . . . 259--270
             Seung-Hwan Lim and   
               Jae-Seok Huh and   
               Youngjae Kim and   
           Galen M. Shipman and   
                   Chita R. Das   D-factor: a quantitative model of
                                  application slow-down in multi-resource
                                  shared systems . . . . . . . . . . . . . 271--282
                Wucherl Yoo and   
               Kevin Larson and   
                  Lee Baugh and   
               Sangkyum Kim and   
                Roy H. Campbell   ADP: automated diagnosis of performance
                                  pathologies using hardware events  . . . 283--294
                      Di Xu and   
               Chenggang Wu and   
              Pen-Chung Yew and   
                 Jianjun Li and   
                 Zhenjiang Wang   Providing fairness on shared-memory
                                  multiprocessors via process scheduling   295--306
          Daniel Figueiredo and   
              Philippe Nain and   
              Bruno Ribeiro and   
   Edmundo de Souza e Silva and   
                    Don Towsley   Characterizing continuous time random
                                  walks on time varying graphs . . . . . . 307--318
                Chul-Ho Lee and   
                     Xin Xu and   
                   Do Young Eun   Beyond random walk and
                                  Metropolis--Hastings samplers: why you
                                  should not backtrack for unbiased graph
                                  sampling . . . . . . . . . . . . . . . . 319--330
               Han Hee Song and   
              Berkant Savas and   
                Tae Won Cho and   
                 Vacha Dave and   
               Zhengdong Lu and   
        Inderjit S. Dhillon and   
                  Yin Zhang and   
                       Lili Qiu   Clustered embedding of massive social
                                  networks . . . . . . . . . . . . . . . . 331--342
                Edith Cohen and   
             Graham Cormode and   
                  Nick Duffield   Don't let the negatives bring you down:
                                  sampling from streams of signed updates  343--354
                Ammar Ammar and   
                  Devavrat Shah   Efficient rank aggregation using partial
                                  data . . . . . . . . . . . . . . . . . . 355--366
                  Nick Duffield   Fair sampling across network flow
                                  measurements . . . . . . . . . . . . . . 367--378
               Kunyang Peng and   
                   Qunfeng Dong   TCAM-based NFA implementation  . . . . . 379--380
         Elliot Anshelevich and   
                 Ameya Hate and   
                Koushik Kar and   
                  Michael Usher   Stable and efficient pricing for
                                  inter-domain traffic forwarding  . . . . 381--382
            Lucas DiCioccio and   
            Renata Teixeira and   
            Catherine Rosenberg   Measuring and characterizing home
                                  networks . . . . . . . . . . . . . . . . 383--384
               Joel Sommers and   
                   Paul Barford   Comparing metro-area cellular and WiFi
                                  performance: extended abstract . . . . . 385--386
 Gábor Németh and   
Gábor Rétvári   Towards a statistical characterization
                                  of the competitiveness of oblivious
                                  routing  . . . . . . . . . . . . . . . . 387--388
          Sajjad Zarifzadeh and   
            Madhwaraj G. K. and   
           Constantine Dovrolis   Range tomography . . . . . . . . . . . . 389--390
               Myungjin Lee and   
              Nick Duffield and   
            Ramana Rao Kompella   A scalable architecture for maintaining
                                  packet latency measurements  . . . . . . 391--392
               Markus Laner and   
            Philipp Svoboda and   
                    Markus Rupp   Modeling randomness in network traffic   393--394
              Massimo Gallo and   
            Bruno Kauffmann and   
           Luca Muscariello and   
             Alain Simonian and   
               Christian Tanguy   Performance evaluation of the random
                                  replacement policy for networks of
                                  caches . . . . . . . . . . . . . . . . . 395--396
            Koyel Mukherjee and   
              Samir Khuller and   
                 Amol Deshpande   Saving on cooling: the thermal
                                  scheduling problem . . . . . . . . . . . 397--398
         Shreeshankar Bodas and   
              Devavrat Shah and   
                  Damon Wischik   Congestion control meets medium access:
                                  throughput, delay, and complexity  . . . 399--400
               Asser N. Tantawi   Optimized cloud placement of virtual
                                  clusters using biased importance
                                  sampling . . . . . . . . . . . . . . . . 401--402
                   Kai Shen and   
         Arrvindh Shriraman and   
          Sandhya Dwarkadas and   
                     Xiao Zhang   Power and energy containers for
                                  multicore servers  . . . . . . . . . . . 403--404
                   Kai Wang and   
               Minghong Lin and   
               Florin Ciucu and   
               Adam Wierman and   
                     Chuang Lin   Characterizing the impact of the
                                  workload on the value of dynamic
                                  resizing in data centers . . . . . . . . 405--406
                    Yue Tan and   
                Yingdong Lu and   
                   Cathy H. Xia   Provisioning for large scale cloud
                                  computing services . . . . . . . . . . . 407--408
          Srinivas Narayana and   
           Joe Wenjie Jiang and   
           Jennifer Rexford and   
                    Mung Chiang   Distributed wide-area traffic management
                                  for cloud services . . . . . . . . . . . 409--410
         Advait Abhay Dixit and   
              Pawan Prakash and   
        Ramana Rao Kompella and   
                     Charlie Hu   On the efficacy of fine-grained traffic
                                  splitting protocols in data center
                                  networks . . . . . . . . . . . . . . . . 411--412
             Benjamin Frank and   
               Ingmar Poese and   
       Georgios Smaragdakis and   
                Steve Uhlig and   
                  Anja Feldmann   Content-aware traffic engineering  . . . 413--414
                    Jian Hu and   
                 Hong Jiang and   
                 Prakash Manden   Understanding performance anomalies of
                                  SSDs and their impact in enterprise
                                  application environment  . . . . . . . . 415--416
               Eduard Glatz and   
       Xenofontas Dimitropoulos   Classifying Internet one-way traffic . . 417--418
               Manish Arora and   
                  Feng Wang and   
                Bob Rychlik and   
                   Dean Tullsen   Fast cost efficient designs by building
                                  upon the Plackett and Burman method  . . 419--420
            Matthias Keller and   
                 Jan Beutel and   
                  Lothar Thiele   Multi-hop network tomography: path
                                  reconstruction and per-hop arrival time
                                  estimation from partial information  . . 421--422
     Ioannis Papapanagiotou and   
             Erich M. Nahum and   
               Vasileios Pappas   Smartphones vs. laptops: comparing Web
                                  browsing behavior and the implications
                                  for caching  . . . . . . . . . . . . . . 423--424
           Philipp Reinecke and   
        Miklós Telek and   
                 Katinka Wolter   Micro and macro views of discrete-state
                                  Markov models and their application to
                                  efficient simulation with phase-type
                                  distributions  . . . . . . . . . . . . . 425--426
              Ramon Bertran and   
            Marc Gonz\`alez and   
           Xavier Martorell and   
              Nacho Navarro and   
          Eduard Ayguadé   POTRA: a framework for building power
                                  models for next generation multicore
                                  architectures  . . . . . . . . . . . . . 427--428
              Richard A. Hayden   Basic theory and some applications of
                                  martingales  . . . . . . . . . . . . . . 429--430
   Edmundo de Souza e Silva and   
          Daniel Sadoc Menasche   Applications of machine learning to
                                  performance evaluation . . . . . . . . . 431--432
                  Jay Aikat and   
                   Kevin Jeffay   Introduction to network experiments
                                  using the GENI cyberinfrastructure . . . 433--434

ACM SIGMETRICS Performance Evaluation Review
Volume 40, Number 2, September, 2012

             Brian Eriksson and   
               Paul Barford and   
                Bruce Maggs and   
                   Robert Nowak   Posit: a lightweight approach for IP
                                  geolocation  . . . . . . . . . . . . . . 2--11
           Pierre Coucheney and   
      Patrick Maillé and   
                   Bruno Tuffin   Comparison of search engines non-neutral
                                  and neutral behaviors  . . . . . . . . . 14--17
         Manjesh K. Hanawal and   
               Eitan Altman and   
              Rajesh Sundaresan   Game theoretic analysis of collusions in
                                  nonneutral networks  . . . . . . . . . . 18--21
               Seung Min Yu and   
                 Seong-Lyun Kim   Guaranteeing user welfare in network
                                  service: comparison of two subsidy
                                  schemes  . . . . . . . . . . . . . . . . 22--25
                   R. Berry and   
                   M. Honig and   
                  T. Nguyen and   
             V. Subramanian and   
                    H. Zhou and   
                       R. Vohra   Newsvendor model of capacity sharing . . 26--29
           Richard T. B. Ma and   
              Dah Ming Chiu and   
             John C. S. Lui and   
               Vishal Misra and   
                 Dan Rubenstein   Price differentiation in the Kelly
                                  mechanism  . . . . . . . . . . . . . . . 30--33
            Zied Ben Houidi and   
                 Helia Pouyllau   The price of tussles: bankrupt in
                                  cyberspace?  . . . . . . . . . . . . . . 34--37
                Aemen Lodhi and   
            Amogh Dhamdhere and   
           Constantine Dovrolis   Peering strategy adoption by transit
                                  providers in the Internet: a game
                                  theoretic approach?  . . . . . . . . . . 38--41
          Loretta Mastroeni and   
                 Maurizio Naldi   Pricing of insurance policies against
                                  cloud storage price rises  . . . . . . . 42--45
              Dongmyung Lee and   
               Jeonghoon Mo and   
                    Jinwoo Park   ISP vs. ISP $+$ CDN: can ISPs in duopoly
                                  profit by introducing CDN services?  . . 46--48
András Gulyás and   
         Attila Korösi and   
  Dávid Szabó and   
          Gergely Biczók   On greedy network formation  . . . . . . 49--52
       Lavanya Ramakrishnan and   
             R. Shane Canon and   
             Krishna Muriki and   
             Iwona Sakrejda and   
             Nicholas J. Wright   Evaluating Interconnect and
                                  Virtualization Performance for High
                                  Performance Computing  . . . . . . . . . 55--60
             G. R. Mudalige and   
                M. B. Giles and   
                C. Bertolli and   
                 P. H. J. Kelly   Predictive modeling and analysis of OP2
                                  on distributed memory GPU clusters . . . 61--67
           Gabriel Mateescu and   
           Gregory H. Bauer and   
              Robert A. Fiedler   Optimizing matrix transposes using a
                                  POWER7 cache model and explicit
                                  prefetching  . . . . . . . . . . . . . . 68--73
            Anthony Danalis and   
             Piotr Luszczek and   
              Gabriel Marin and   
          Jeffrey S. Vetter and   
                  Jack Dongarra   BlackjackBench: portable hardware
                                  characterization . . . . . . . . . . . . 74--79
               Adrian Tineo and   
              Sadaf R. Alam and   
           Thomas C. Schulthess   Towards autotuning by alternating
                                  communication methods  . . . . . . . . . 80--85
            Roman Iakymchuk and   
               Paolo Bientinesi   Modeling performance through
                                  memory-stalls  . . . . . . . . . . . . . 86--91
             Hongzhang Shan and   
         Nicholas J. Wright and   
                 John Shalf and   
           Katherine Yelick and   
              Marcus Wagner and   
                Nathan Wichmann   A preliminary evaluation of the hardware
                                  acceleration of the Cray Gemini
                                  interconnect for PGAS languages and
                                  comparison with MPI  . . . . . . . . . . 92--98
            Vivek Deshpande and   
                    Xing Wu and   
                  Frank Mueller   Auto-generation of communication
                                  benchmark traces . . . . . . . . . . . . 99--105
                  ChunYi Su and   
                    Dong Li and   
  Dimitrios S. Nikolopoulos and   
              Matthew Grove and   
               Kirk Cameron and   
          Bronis R. de Supinski   Critical path-based thread placement for
                                  NUMA systems . . . . . . . . . . . . . . 106--112
                DongJin Lee and   
         Michael O'Sullivan and   
                 Cameron Walker   Benchmarking and modeling disk-based
                                  storage tiers for practical storage
                                  design . . . . . . . . . . . . . . . . . 113--118
              Lingyuan Wang and   
             Miaoqing Huang and   
               Tarek El-Ghazawi   Towards efficient GPU sharing on
                                  multicore processors . . . . . . . . . . 119--124
                Xian-He Sun and   
                     Dawei Wang   APC: a performance metric of memory
                                  systems  . . . . . . . . . . . . . . . . 125--130

ACM SIGMETRICS Performance Evaluation Review
Volume 40, Number 3, December, 2012

             Roberto Vitali and   
      Alessandro Pellegrini and   
              Francesco Quaglia   Load sharing for optimistic parallel
                                  simulations on multi core machines . . . 2--11
         Marcus Hähnel and   
      Björn Döbel and   
           Marcus Völp and   
            Hermann Härtig   Measuring energy consumption for short
                                  code paths using RAPL  . . . . . . . . . 13--17
           Michele Mazzucco and   
                    Isi Mitrani   Empirical evaluation of power saving
                                  policies for data centers  . . . . . . . 18--22
               Pooja Ghumre and   
                  Junwei Li and   
              Mukil Kesavan and   
            Ada Gavrilovska and   
                 Karsten Schwan   Evaluating the need for complexity in
                                  energy-aware management for cloud
                                  platforms  . . . . . . . . . . . . . . . 23--27
               Nicolas Gast and   
       Dan-Cristian Tomozei and   
            Jean-Yves Le Boudec   Optimal storage policies with wind
                                  forecast uncertainties . . . . . . . . . 28--32
           Andrey Bernstein and   
           Daniel Bienstock and   
                  David Hay and   
           Meric Uzuno\uglu and   
                    Gil Zussman   Sensitivity analysis of the power grid
                                  vulnerability to large-scale cascading
                                  failures . . . . . . . . . . . . . . . . 33--37
              O. Ardakanian and   
               C. Rosenberg and   
                      S. Keshav   RealTime distributed congestion control
                                  for electrical vehicle charging  . . . . 38--42
            Omid Ardakanian and   
        Catherine Rosenberg and   
                      S. Keshav   On the impact of storage in residential
                                  power distribution systems . . . . . . . 43--47
                 David Chiu and   
        Christopher Stewart and   
                   Bart McManus   Electric grid balancing through low-cost
                                  workload migration . . . . . . . . . . . 48--52
  Daniel S. Menasché and   
  Rosa Maria Meri Leäo and   
   Edmundo de Souza e Silva and   
           Alberto Avritzer and   
              Sindhu Suresh and   
             Kishor Trivedi and   
           Raymond A. Marie and   
                Lucia Happe and   
                  Anne Koziolek   Survivability analysis of power
                                  distribution in smart grids with active
                                  and reactive power modeling  . . . . . . 53--57
         E. G. Coffman, Jr. and   
                   Y. Kogan and   
                     W. Lai and   
                   V. Ramaswami   Uptime and downtime analysis for
                                  hierarchical redundant systems in
                                  telecommunications . . . . . . . . . . . 59--61
             K. Avrachenkov and   
                  U. Ayesta and   
                  J. Doncel and   
                       P. Jacko   Optimal congestion control of TCP flows
                                  for Internet routers . . . . . . . . . . 62--64
 Angela Schörgendorfer and   
        Peter M. van de Ven and   
                       Bo Zhang   Temporal load balancing for distributed
                                  backup scheduling  . . . . . . . . . . . 65--67
              Yuval Rochman and   
                Hanoch Levy and   
                      Eli Brosh   Efficient replication in multi-regional
                                  peer-supported VoD systems . . . . . . . 68--70
            Christian Borgs and   
         Jennifer T. Chayes and   
            Sherwin Doroudi and   
         Mor Harchol-Balter and   
                       Kuang Xu   Pricing and queueing . . . . . . . . . . 71--73
      Antonie S. Godtschalk and   
                   Florin Ciucu   Stochastic bounds for randomized load
                                  balancing  . . . . . . . . . . . . . . . 74--76
            Daniel S. Myers and   
                 Mary K. Vernon   Estimating queue length distributions
                                  for queues with random arrivals  . . . . 77--79
            Paolo Cremonesi and   
              Andrea Sansottera   Modeling response times in the Google
                                  ROADEF/EURO challenge  . . . . . . . . . 80--82
                    Yue Tan and   
                Yingdong Lu and   
                   Cathy H. Xia   Provisioning for large scale loss
                                  network systems with applications in
                                  cloud computing  . . . . . . . . . . . . 83--85
                 Ranjan Pal and   
                        Pan Hui   CyberInsurance for cybersecurity a
                                  topological take on modulating insurance
                                  premiums . . . . . . . . . . . . . . . . 86--88
               Maryam Elahi and   
           Carey Williamson and   
                Philipp Woelfel   Meeting the fairness deadline in speed
                                  scaling systems: is turbocharging
                                  enough?  . . . . . . . . . . . . . . . . 89--91
              Eitan Bachmat and   
                 Assaf Natanzon   Analysis of SITA queues with many
                                  servers and spacetime geometry . . . . . 92--94
              Thomas Bonald and   
                    Davide Cuda   RateOptimal scheduling schemes for
                                  asynchronous InputQueued packet switches 95--97
               Minghong Lin and   
               Adam Wierman and   
               Alan Roytman and   
              Adam Meyerson and   
           Lachlan L. H. Andrew   Online optimization with switching cost  98--100
            B. Blaszczyszyn and   
                      K. Gaurav   Farout vertices in weighted repeated
                                  configuration model  . . . . . . . . . . 100--103
    Fragkiskos Papadopoulos and   
        Constantinos Psomas and   
                Dmitri Krioukov   Replaying the geometric growth of
                                  complex networks and application to the
                                  AS Internet  . . . . . . . . . . . . . . 104--106
              Ali Tizghadam and   
                  Weiwei Li and   
            Alberto Leon-Garcia   Network criticality in vehicular
                                  networks . . . . . . . . . . . . . . . . 107--109

ACM SIGMETRICS Performance Evaluation Review
Volume 40, Number 4, March, 2013

             John C. S. Lui and   
                       Li Zhang   A study of pricing for cloud resources   3--12
             Zhizhong Zhang and   
                   Chuan Wu and   
             David W. L. Cheung   A survey on cloud interoperability:
                                  taxonomies, standards, and practice  . . 13--22
                   Lei Yang and   
               Jiannong Cao and   
                   Yin Yuan and   
                     Tao Li and   
                   Andy Han and   
                     Alvin Chan   A framework for partitioning and
                                  execution of data stream applications in
                                  mobile cloud computing . . . . . . . . . 23--32
                 Weina Wang and   
                    Kai Zhu and   
                   Lei Ying and   
                   Jian Tan and   
                       Li Zhang   A throughput optimal algorithm for map
                                  task scheduling in MapReduce with data
                                  locality . . . . . . . . . . . . . . . . 33--42
                  Qun Huang and   
              Patrick P. C. Lee   An experimental study of cascading
                                  performance interference in a
                                  virtualized environment  . . . . . . . . 43--52
                Rahul Singh and   
            Prashant Shenoy and   
              Maitreya Natu and   
          Vaishali Sadaphal and   
                    Harrick Vin   Analytical modeling for what-if analysis
                                  in complex cloud computing applications  53--62
                    Jia Liu and   
               Cathy H. Xia and   
             Ness B. Shroff and   
                 Xiaodong Zhang   On distributed computation rate
                                  optimization for deploying cloud
                                  computing programming frameworks . . . . 63--72
            Giuliano Casale and   
               Mirco Tribastone   Modelling exogenous variability in cloud
                                  deployments  . . . . . . . . . . . . . . 73--82
               Shah Mahmood and   
                    Yvo Desmedt   Two new economic models for privacy  . . 84--89
                Luke Hutton and   
              Tristan Henderson   An architecture for ethical and
                                  privacy-sensitive social network
                                  experiments  . . . . . . . . . . . . . . 90--95
               Minaxi Gupta and   
        Yuqing (Melanie) Wu and   
           Swapnil S. Joshi and   
              Aparna Tiwari and   
                Ashish Nair and   
              Ezhilan Ilangovan   On the linkability of complementary
                                  information from free versions of people
                                  databases  . . . . . . . . . . . . . . . 96--100
          Florian Tschorsch and   
         Björn Scheuermann   How (not) to build a transport layer for
                                  anonymity overlays . . . . . . . . . . . 101--106


ACM SIGMETRICS Performance Evaluation Review
Volume 41, Number 1, June, 2013

               Balaji Prabhakar   Designing large-scale nudge engines  . . 1--2
                 David A. Maltz   Challenges in cloud scale data centers   3--4
                   Xia Zhou and   
              Zengbin Zhang and   
                  Gang Wang and   
                Xiaoxiao Yu and   
                Ben Y. Zhao and   
                   Haitao Zheng   Practical conflict graphs for dynamic
                                  spectrum distribution  . . . . . . . . . 5--16
     Muhammad Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
        Shobha Venkataraman and   
                       Jia Wang   A first look at cellular network
                                  performance during crowded events  . . . 17--28
                  Ning Ding and   
              Daniel Wagner and   
              Xiaomeng Chen and   
             Abhinav Pathak and   
              Y. Charlie Hu and   
                    Andrew Rice   Characterizing and modeling the impact
                                  of wireless signal strength on
                                  smartphone battery drain . . . . . . . . 29--40
       Alexander L. Stolyar and   
                     Yuan Zhong   A large-scale service system with
                                  packing constraints: minimizing the
                                  number of occupied servers . . . . . . . 41--52
                    Lian Lu and   
                 Jinlong Tu and   
               Chi-Kin Chau and   
               Minghua Chen and   
                    Xiaojun Lin   Online energy generation scheduling for
                                  microgrids with intermittent energy
                                  sources and co-generation  . . . . . . . 53--66
     Ganesha Shanmuganathan and   
                Ajay Gulati and   
                   Peter Varman   Defragmenting the cloud using
                                  demand-based resource allocation . . . . 67--80
            David R. Karger and   
                 Sewoong Oh and   
                  Devavrat Shah   Efficient crowdsourcing for multi-class
                                  labeling . . . . . . . . . . . . . . . . 81--92
              Myunghwan Kim and   
             Roshan Sumbaly and   
                       Sam Shah   Root cause detection in a
                                  service-oriented architecture  . . . . . 93--104
           Aaron D. Jaggard and   
             Swara Kopparty and   
         Vijay Ramachandran and   
              Rebecca N. Wright   The design space of probing algorithms
                                  for network-performance measurement  . . 105--116
                Niek Bouman and   
                  Sem Borst and   
          Johan van Leeuwaarden   Delays and mixing times in random-access
                                  networks . . . . . . . . . . . . . . . . 117--128
               Fabio Cecchi and   
                    Peter Jacko   Scheduling of users with Markovian
                                  time-varying transmission rates  . . . . 129--140
            Florian Simatos and   
                Niek Bouman and   
                      Sem Borst   Lingering issues in distributed
                                  scheduling . . . . . . . . . . . . . . . 141--152
              Anshul Gandhi and   
            Sherwin Doroudi and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Exact analysis of the M/M/k/setup class
                                  of Markov chains via recursive renewal
                                  reward . . . . . . . . . . . . . . . . . 153--166
         John N. Tsitsiklis and   
                       Kuang Xu   Queueing system topologies with limited
                                  flexibility  . . . . . . . . . . . . . . 167--178
                 Yongkun Li and   
          Patrick P. C. Lee and   
                 John C. S. Lui   Stochastic modeling of large-scale
                                  solid-state storage systems: analysis,
                                  design tradeoffs and optimization  . . . 179--190
                Benny Van Houdt   A mean field model for a class of
                                  garbage collection algorithms in
                                  flash-based solid state drives . . . . . 191--202
             Myoungsoo Jung and   
                Mahmut Kandemir   Revisiting widely held SSD expectations
                                  and rethinking system-level implications 203--216
             Marcelo Cintra and   
             Niklas Linkewitsch   Characterizing the impact of process
                                  variation on write endurance enhancing
                                  techniques for non-volatile memory
                                  systems  . . . . . . . . . . . . . . . . 217--228
            Abhigyan Sharma and   
         Arun Venkataramani and   
            Ramesh K. Sitaraman   Distributing content simplifies ISP
                                  traffic engineering  . . . . . . . . . . 229--242
         Vytautas Valancius and   
               Bharath Ravi and   
              Nick Feamster and   
                Alex C. Snoeren   Quantifying the benefits of joint
                                  content and network routing  . . . . . . 243--254
        Dilip Nijagal Simha and   
            Tzi-cker Chiueh and   
Ganesh Karuppur Rajagopalan and   
                    Pallav Bose   High-throughput low-latency fine-grained
                                  disk logging . . . . . . . . . . . . . . 255--266
        Bogdan Marius Tudor and   
                  Yong Meng Teo   On understanding the energy consumption
                                  of ARM-based multicore servers . . . . . 267--278
               Rathijit Sen and   
                  David A. Wood   Reuse-based online models for caches . . 279--292
           Muhammad Shahzad and   
                    Alex X. Liu   Probabilistic optimal tree hopping for
                                  RFID identification  . . . . . . . . . . 293--304
                 Qiuyu Peng and   
                Anwar Walid and   
                  Steven H. Low   Multipath TCP algorithms: theory and
                                  design . . . . . . . . . . . . . . . . . 305--316
                  Guang Tan and   
                Zhimeng Yin and   
                   Hongbo Jiang   Trap array: a unified model for
                                  scalability evaluation of geometric
                                  routing  . . . . . . . . . . . . . . . . 317--328
             Lachlan Andrew and   
           Siddharth Barman and   
             Katrina Ligett and   
               Minghong Lin and   
              Adam Meyerson and   
               Alan Roytman and   
                   Adam Wierman   A tale of two metrics: simultaneous
                                  bounds on competitiveness and regret . . 329--330
                  Zhibin Yu and   
            Lieven Eeckhout and   
           Nilanjan Goswami and   
                     Tao Li and   
                  Lizy John and   
                    Hai Jin and   
                  Chengzhong Xu   Accelerating GPGPU architecture
                                  simulation . . . . . . . . . . . . . . . 331--332
                    Di Wang and   
              Chuangang Ren and   
            Sriram Govindan and   
      Anand Sivasubramaniam and   
           Bhuvan Urgaonkar and   
                Aman Kansal and   
                  Kushagra Vaid   ACE: abstracting, characterizing and
                                  exploiting peaks and valleys in
                                  datacenter power consumption . . . . . . 333--334
            Rahul Potharaju and   
                   Navendu Jain   An empirical analysis of intra- and
                                  inter-datacenter network failures for
                                  geo-distributed services . . . . . . . . 335--336
            Dorian Mazauric and   
               Saleh Soltan and   
                    Gil Zussman   Computational analysis of cascading
                                  failures in power networks . . . . . . . 337--338
             John C. Nelson and   
           Jonathan Connell and   
               Canturk Isci and   
              Jonathan Lenchner   Data center asset tracking using a
                                  mobile robot . . . . . . . . . . . . . . 339--340
                Zhenhua Liu and   
               Adam Wierman and   
                  Yuan Chen and   
             Benjamin Razon and   
                  Niangjun Chen   Data center demand response: avoiding
                                  the coincident peak via workload
                                  shifting and local generation  . . . . . 341--342
    Juan Carlos Sáez and   
            Fernando Castro and   
              Daniel Chaver and   
                  Manuel Prieto   Delivering fairness and priority
                                  enforcement on asymmetric multicore
                                  systems via OS scheduling  . . . . . . . 343--344
              Ake Arvidsson and   
                     Ying Zhang   Detecting user dissatisfaction and
                                  understanding the underlying reasons . . 345--346
               Deguang Kong and   
                    Guanhua Yan   Discriminant malware distance learning
                                  on structural information for automated
                                  malware classification . . . . . . . . . 347--348
                 Enoch Peserico   Elastic paging . . . . . . . . . . . . . 349--350
                Lingwen Gan and   
                      Na Li and   
                 Steven Low and   
                     Ufuk Topcu   Exact convex relaxation for optimal
                                  power flow in distribution networks  . . 351--352
               Jaewook Kwak and   
                Chul-Ho Lee and   
                   Do Young Eun   Exploiting the past to reduce delay in
                                  CSMA scheduling: a high-order Markov
                                  chain approach . . . . . . . . . . . . . 353--354
       Ignasi Paredes-Oliva and   
            Pere Barlet-Ros and   
       Xenofontas Dimitropoulos   FaRNet: fast recognition of high
                                  multi-dimensional network traffic
                                  patterns . . . . . . . . . . . . . . . . 355--356
  Yashar Ghiassi-Farrokhfal and   
          Srinivasan Keshav and   
        Catherine Rosenberg and   
                   Florin Ciucu   Firming solar power  . . . . . . . . . . 357--358
                    Yi Wang and   
                Dongzhe Tai and   
                 Ting Zhang and   
                Jianyuan Lu and   
                  Boyang Xu and   
                Huichen Dai and   
                        Bin Liu   Greedy name lookup for named data
                                  networking . . . . . . . . . . . . . . . 359--360
                  Mian Dong and   
                   Tian Lan and   
                      Lin Zhong   How does energy accounting matter for
                                  energy management? . . . . . . . . . . . 361--362
            Sharayu Moharir and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Online load balancing under graph
                                  constraints  . . . . . . . . . . . . . . 363--364
           Melanie Kambadur and   
                   Kui Tang and   
               Joshua Lopez and   
                  Martha A. Kim   Parallel scaling properties from a basic
                                  block view . . . . . . . . . . . . . . . 365--366
               Florin Ciucu and   
             Felix Poloczek and   
                   Jens Schmitt   Sharp bounds in stochastic network
                                  calculus . . . . . . . . . . . . . . . . 367--368
                     Ji Zhu and   
          Stratis Ioannidis and   
                Nidhi Hegde and   
              Laurent Massoulie   Stable and scalable universal swarms . . 369--370
        Georgios S. Paschos and   
             Leandros Tassiulas   Sustainability of service provisioning
                                  systems under attack . . . . . . . . . . 371--372
                    Hong Xu and   
                  Chen Feng and   
                     Baochun Li   Temperature aware workload management in
                                  geo-distributed datacenters  . . . . . . 373--374
                    Ming Li and   
          Andrey Lukyanenko and   
               Sasu Tarkoma and   
                   Yong Cui and   
Antti Ylä-Jääski   Tolerating path heterogeneity in
                                  multipath TCP with bounded receive
                                  buffers  . . . . . . . . . . . . . . . . 375--376
                   Chen Dai and   
                    Chao Lv and   
                  Jiaxin Li and   
               Weihua Zhang and   
                     Binyu Zang   Understanding architectural
                                  characteristics of multimedia retrieval
                                  workloads  . . . . . . . . . . . . . . . 377--378
        Athula Balachandran and   
                 Vyas Sekar and   
              Aditya Akella and   
              Srinivasan Seshan   Understanding Internet video viewing
                                  behavior in the wild . . . . . . . . . . 379--380
                  Nan Jiang and   
                     Yu Jin and   
               Ann Skudlark and   
                   Zhi-Li Zhang   Understanding SMS spam in a large
                                  cellular network . . . . . . . . . . . . 381--382
        Srikanth Sundaresan and   
           Nazanin Magharei and   
              Nick Feamster and   
            Renata Teixeira and   
                   Sam Crawford   Web performance bottlenecks in broadband
                                  access networks  . . . . . . . . . . . . 383--384
             Marcos K. Aguilera   Tutorial on geo-replication in data
                                  center applications  . . . . . . . . . . 385--386
          Jayakrishnan Nair and   
               Adam Wierman and   
                     Bert Zwart   The fundamentals of heavy-tails:
                                  properties, emergence, and
                                  identification . . . . . . . . . . . . . 387--388
                 Jiri Schindler   Profiling and analyzing the I/O
                                  performance of NoSQL DBs . . . . . . . . 389--390

ACM SIGMETRICS Performance Evaluation Review
Volume 41, Number 2, September, 2013

                     X. Gao and   
                      y. Lu and   
                  M. Sharma and   
           M. S. Squillante and   
                   J. W. Bosman   Stochastic optimal control for a general
                                  class of dynamic resource allocation
                                  problems . . . . . . . . . . . . . . . . 3--14
    Predrag R. Jelenkovi\'c and   
            Evangelia D. Skiani   Retransmissions over correlated channels 15--25
            A. Hasan Mahmud and   
                    Shaolei Ren   Online capacity provisioning for
                                  carbon-neutral data center with
                                  demand-responsive electricity prices . . 26--37
           Naser M. Asghari and   
             Michel Mandjes and   
                    Anwar Walid   Optimizing energy management in
                                  multi-core servers . . . . . . . . . . . 38--40
                  R. Bekker and   
              J. L. Dorsman and   
          R. D. van der Mei and   
                     P. Vis and   
               E. M. M. Winands   Scheduling in polling systems in heavy
                                  traffic  . . . . . . . . . . . . . . . . 41--43
                Pedro Casas and   
            Michael Seufert and   
                 Raimund Schatz   YOUQMON: a system for on-line monitoring
                                  of YouTube QoE in operational 3G
                                  networks . . . . . . . . . . . . . . . . 44--46
         Jan-Pieter Dorsman and   
              Maria Vlasiou and   
                     Bert Zwart   Parallel queueing networks with
                                  Markov-modulated service speeds in heavy
                                  traffic  . . . . . . . . . . . . . . . . 47--49
               Dieter Fiems and   
                  Koen De Turck   Spreading rumours in Euclidean space . . 50--52
            Eleni Vatamidou and   
                   Ivo Adan and   
              Maria Vlasiou and   
                     Bert Zwart   Corrected phase-type approximations for
                                  the workload of the MAP/G/1 queue with
                                  heavy-tailed service times . . . . . . . 53--55

ACM SIGMETRICS Performance Evaluation Review
Volume 41, Number 3, December, 2013

             Heiko Koziolek and   
             Steffen Becker and   
                 Jens Happe and   
                  Petr Tuma and   
             Thijmen de Gooijer   Towards software performance engineering
                                  for multicore and manycore systems . . . 2--11
              Eitan Bachmat and   
                   Ilan Elhanan   Analysis of the GSTF disk scheduling
                                  algorithm  . . . . . . . . . . . . . . . 13--15
               Minghong Lin and   
                   Li Zhang and   
               Adam Wierman and   
                       Jian Tan   Joint optimization of overlapping phases
                                  in MapReduce . . . . . . . . . . . . . . 16--18
              Javad Ghaderi and   
                  Sem Borst and   
                   Phil Whiting   Random access in wireless networks: how
                                  much aggressiveness can cause
                                  instability? . . . . . . . . . . . . . . 19--21
                   Ivo Adan and   
                 Marko Boon and   
                Ana Busi\'c and   
              Jean Mairesse and   
                   Gideon Weiss   Queues with skill based parallel servers
                                  and a FCFS infinite matching model . . . 22--24
          Eugene A. Feinber and   
                   Fenghsu Yang   Dynamic price optimization for an
                                  M/M/k/N queue with several customer
                                  types  . . . . . . . . . . . . . . . . . 25--27
           Bhuvan Urgaonkar and   
             George Kesidis and   
           Uday V. Shanbhag and   
                     Cheng Wang   Pricing of service in clouds: optimal
                                  response and strategic interactions  . . 28--30
                 Sungsu Lim and   
                Kyomin Jung and   
                 John C. S. Lui   Phase transition of multi-state
                                  diffusion process in networks  . . . . . 31--33
             Nelson Antunes and   
     Gonçalo Jacinto and   
         António Pacheco   Probing a M/G/1 queue with general input
                                  and service times  . . . . . . . . . . . 34--36
                 Peter Harrison   Sojourn time distributions in tandem
                                  batch-networks . . . . . . . . . . . . . 37--39
               Joel Spencer and   
                Madhu Sudan and   
                       Kuang Xu   Queueing with future information . . . . 40--42
             Felix Poloczek and   
                   Florin Ciucu   A martingale-envelope and applications   43--45
               Weining Kang and   
                Hongyuan Lu and   
                   Guodong Pang   Fluid approximations of many-server
                                  queues with delayed feedback and
                                  heterogeneous service and patience times 46--48
               A. B. Dieker and   
                         T. Suk   Diffusion approximations for large-scale
                                  buffered systems . . . . . . . . . . . . 49--51
                Yingdong Lu and   
         Mark S. Squillante and   
                   David D. Yao   Asymptotics of a class of resource
                                  planning problems  . . . . . . . . . . . 52--54
               Heng-Qing Ye and   
                   David D. Yao   Interchange of limits in heavy traffic
                                  analysis under a moment condition  . . . 55--57
          Edward G. Coffman and   
             Petar Momcilovi\'c   A particle process underlying SSD
                                  storage structures . . . . . . . . . . . 58--60
                     X. Gao and   
                      Y. Lu and   
                  M. Sharma and   
           M. S. Squillante and   
                   J. W. Bosman   Rewards, costs and flexibility in
                                  dynamic resource allocation: a
                                  stochastic optimal control approach  . . 61--63
          William G. Temple and   
               Richard T. B. Ma   Monotonic marginal pricing: demand
                                  response with price certainty  . . . . . 65--70
               Sahil Singla and   
  Yashar Ghiassi-Farrokhfal and   
              Srinivasan Keshav   Battery provisioning and scheduling for
                                  a hybrid battery-diesel generator system 71--76
                Lingwen Gan and   
               Adam Wierman and   
                 Ufuk Topcu and   
              Niangjun Chen and   
                  Steven H. Low   Real-time deferrable load control:
                                  handling the uncertainties of renewable
                                  generation . . . . . . . . . . . . . . . 77--79
                   Kai Yang and   
                    Anwar Walid   Outage-capacity tradeoff for smart grid
                                  with renewables  . . . . . . . . . . . . 80--82
          Christine S. Chan and   
                Boxiang Pan and   
                Kenny Gross and   
        Kalyan Vaidyanathan and   
        Tajana Simuni\'c Rosing   Correcting vibration-induced performance
                                  degradation in enterprise servers  . . . 83--88
                   Hao Wang and   
              Jianwei Huang and   
                Xiaojun Lin and   
            Hamed Mohsenian-Rad   Exploring smart grid and data center
                                  interactions for electric power load
                                  balancing  . . . . . . . . . . . . . . . 89--94
         Mikko Pervilä and   
                Lassi Remes and   
              Jussi Kangasharju   Harvesting heat in an urban greenhouse   95--97
              Indra Widjaja and   
                Anwar Walid and   
                 Yanbin Luo and   
                    Yang Xu and   
               H. Jonathan Chao   Switch sizing for energy-efficient
                                  datacenter networks  . . . . . . . . . . 98--100
               Chenying Hou and   
                   Fa Zhang and   
Antonio Fernández Anta and   
                   Lin Wang and   
                    Zhiyong Liu   A hop-by-hop energy efficient
                                  distributed routing scheme . . . . . . . 101--106
                   Lin Wang and   
                   Fa Zhang and   
    Athanasios V. Vasilakos and   
               Chenying Hou and   
                    Zhiyong Liu   Joint virtual machine assignment and
                                  traffic engineering for green data
                                  center networks  . . . . . . . . . . . . 107--112

ACM SIGMETRICS Performance Evaluation Review
Volume 41, Number 4, March, 2014

            Patrick Loiseau and   
            David C. Parkes and   
                   Jean Walrand   MultiDefender security games on networks 4--7
                Aron Laszka and   
                   Assane Gueye   Quantifying all-to-one network topology
                                  robustness under budget constraints  . . 8--11
          Lemonia Dritsoula and   
                 John Musacchio   A game of clicks: economic incentives to
                                  fight click fraud in ad networks . . . . 12--15
       Emir Kavurmacio\uglu and   
             Murat Alanyali and   
              David Starobinski   Demand-insensitive price relationships
                                  in competitive private commons . . . . . 16--19
        Costas Courcoubetis and   
            Kostas Sdrolias and   
                  Richard Weber   Revenue Models, Price Differentiation
                                  and Network Neutrality Implications in
                                  the Internet . . . . . . . . . . . . . . 20--23
                 Jiwon Park and   
                   Jeonghoon Mo   ISP and CP revenue sharing and content
                                  piracy . . . . . . . . . . . . . . . . . 24--27
                 Bar Ifrach and   
            Costis Maglaras and   
                 Marco Scarsini   Bayesian social learning with consumer
                                  reviews  . . . . . . . . . . . . . . . . 28--28
             Munther Dahleh and   
       Alireza TahbazSalehi and   
         John N. Tsitsiklis and   
           Spyros I. Zoumpoulis   Coordination with local information  . . 29--29
             Zeinab Abbassi and   
                Nidhi Hegde and   
       Laurent Massoulié   Distributed content curation on the Web  30--33
                     Jie Xu and   
         Mihaela van der Schaar   Incentive design for heterogeneous
                                  user-generated content networks  . . . . 34--37
                Chong Jiang and   
            Carolyn L. Beck and   
                     R. Srikant   Bidding with limited statistical
                                  knowledge in online auctions . . . . . . 38--41
           Swati Rallapalli and   
                   Qiang Ma and   
               Han Hee Song and   
                Mario Baldi and   
           S. Muthukrishnan and   
                       Lili Qiu   Modeling the value of information
                                  granularity in targeted advertising  . . 42--45
                    Mung Chiang   SDP: Smart Data Pricing, from theorems
                                  to trials  . . . . . . . . . . . . . . . 46--46
            Jonatha Anselmi and   
             Danilo Ardagna and   
             John C. S. Lui and   
               Adam Wierman and   
                 Yunjian Xu and   
                    Zichao Yang   The economics of the cloud: price
                                  competition and congestion . . . . . . . 47--49
          Gerardo Berbeglia and   
                Peter Sloan and   
                   Adrian Vetta   Pricing mechanisms for a durable good
                                  monopolist . . . . . . . . . . . . . . . 50--50
                 Bar Ifrach and   
                   Rameh Johari   Pricing a bestseller: sales and
                                  visibility in the marketplace for mobile
                                  apps . . . . . . . . . . . . . . . . . . 51--51
           Daniel T. Wagner and   
                Andrew Rice and   
          Alastair R. Beresford   Device analyzer: largescale mobile data
                                  collection . . . . . . . . . . . . . . . 53--56
            Eugene Feinberg and   
                 Xiaoxuan Zhang   Optimizing cloud utilization via
                                  switching decisions  . . . . . . . . . . 57--60
                Onur Yilmaz and   
           Mustafa U. Torun and   
                  Ali N. Akansu   A fast derivation of Karhunen--Loeve
                                  transform kernel for first-order
                                  autoregressive discrete process  . . . . 61--64
            Bharat B. Madan and   
                    Manoj Banik   Attack tolerant architecture for big
                                  data file systems  . . . . . . . . . . . 65--69
                Shan Suthaharan   Big data classification: problems and
                                  challenges in network intrusion
                                  prediction with machine learning . . . . 70--73
         Abhishek B. Sharma and   
           Franjo Ivanci\'c and   
  Alexandru Niculescu-Mizil and   
               Haifeng Chen and   
                   Guofei Jiang   Modeling and analytics for
                                  cyber-physical systems in the age of big
                                  data . . . . . . . . . . . . . . . . . . 74--77
                     Jie Hu and   
                   Kun Meng and   
               Xiaomin Chen and   
                 Chuang Lin and   
                    Jiwei Huang   Analysis of influence maximization in
                                  large-scale social networks  . . . . . . 78--81
             Jeff Whitworth and   
                Shan Suthaharan   Security problems and challenges in a
                                  machine learning-based hybrid big data
                                  processing network systems . . . . . . . 82--85
                 Onur Savas and   
              Yalin Sagduyu and   
                 Julia Deng and   
                       Jason Li   Tactical big data analytics: challenges,
                                  use cases, and solutions . . . . . . . . 86--89
                   Yu Zhang and   
                   Daby Sow and   
              Deepak Turaga and   
         Mihaela van der Schaar   A fast online learning algorithm for
                                  distributed mining of BigData  . . . . . 90--93
            Benjamin Heintz and   
               Abhishek Chandra   Beyond graphs: toward scalable
                                  hypergraph analysis systems  . . . . . . 94--97
         Jameela Al-Jaroodi and   
              Nader Mohamed and   
                    Abdulla Eid   Dual direction big data download and
                                  analysis . . . . . . . . . . . . . . . . 98--101
                Jacob Brock and   
                    Hao Luo and   
                      Chen Ding   Locality analysis: a nonillion time
                                  window problem . . . . . . . . . . . . . 102--105


ACM SIGMETRICS Performance Evaluation Review
Volume 42, Number 1, June, 2014

                Zhaoxu Wang and   
              Wenxiang Dong and   
                Wenyi Zhang and   
                   Chee Wei Tan   Rumor source detection with multiple
                                  observations: fundamental limits and
                                  algorithms . . . . . . . . . . . . . . . 1--13
               Jinyoung Han and   
                Daejin Choi and   
             Byung-Gon Chun and   
                   Ted Kwon and   
              Hyun-chul Kim and   
                   Yanghee Choi   Collecting, organizing, and sharing pins
                                  in pinterest: interest-driven or
                                  social-driven? . . . . . . . . . . . . . 15--27
                 Jiaming Xu and   
                     Rui Wu and   
                    Kai Zhu and   
                Bruce Hajek and   
                 R. Srikant and   
                       Lei Ying   Jointly clustering rows and columns of
                                  binary matrices: algorithms and
                                  trade-offs . . . . . . . . . . . . . . . 29--41
                  Avner May and   
        Augustin Chaintreau and   
              Nitish Korula and   
                Silvio Lattanzi   Filter & follow: how social media foster
                                  content curation . . . . . . . . . . . . 43--55
          Stratis Ioannidis and   
           Andrea Montanari and   
              Udi Weinsberg and   
              Smriti Bhagat and   
                Nadia Fawaz and   
                      Nina Taft   Privacy tradeoffs in predictive
                                  analytics  . . . . . . . . . . . . . . . 57--69
                 Weijie Shi and   
              Linquan Zhang and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   An online auction framework for dynamic
                                  resource provisioning in cloud computing 71--83
          Jayakrishnan Nair and   
             Sachin Adlakha and   
                   Adam Wierman   Energy procurement strategies in the
                                  presence of intermittent sources . . . . 85--97
              Linquan Zhang and   
                Zongpeng Li and   
                       Chuan Wu   Randomized auction design for
                                  electricity markets between grids and
                                  microgrids . . . . . . . . . . . . . . . 99--110
                Zhenhua Liu and   
                   Iris Liu and   
                 Steven Low and   
                   Adam Wierman   Pricing data center demand response  . . 111--123
   Maialen Larrañaga and   
               Urtzi Ayesta and   
              Ina Maria Verloop   Index policies for a multi-class queue
                                  with convex holding cost and
                                  abandonments . . . . . . . . . . . . . . 125--137
             Neil Stuart Walton   Concave switching in single and multihop
                                  networks . . . . . . . . . . . . . . . . 139--151
               Longbo Huang and   
                    Xin Liu and   
                   Xiaohong Hao   The power of online learning in
                                  stochastic network optimization  . . . . 153--165
      Predrag R. Jelenkovic and   
            Evangelia D. Skiani   Is sharing with retransmissions causing
                                  instabilities? . . . . . . . . . . . . . 167--179
                   Jian Tan and   
               Yandong Wang and   
                 Weikuan Yu and   
                       Li Zhang   Non-work-conserving effects in
                                  MapReduce: diffusion limit and
                                  criticality  . . . . . . . . . . . . . . 181--192
                     Ion Stoica   Conquering big data with spark and BDAS  193--193
                Zain Shamsi and   
             Ankur Nandwani and   
              Derek Leonard and   
                Dmitri Loguinov   Hershel: single-packet OS fingerprinting 195--206
           Muhammad Shahzad and   
                    Alex X. Liu   Noise can help: accurate and efficient
                                  per-flow latency measurement without
                                  packet probing and time stamping . . . . 207--219
            Nicolas Viennot and   
              Edward Garcia and   
                     Jason Nieh   A measurement study of Google Play . . . 221--233
             Chung Hwan Kim and   
              Junghwan Rhee and   
                  Hui Zhang and   
                Nipun Arora and   
               Guofei Jiang and   
              Xiangyu Zhang and   
                     Dongyan Xu   IntroPerf: transparent context-sensitive
                                  multi-layer performance inference using
                                  system stack traces  . . . . . . . . . . 235--247
               Sahil Suneja and   
               Canturk Isci and   
               Vasanth Bala and   
               Eyal de Lara and   
                   Todd Mummert   Non-intrusive, out-of-band and
                                  out-of-the-box systems monitoring in the
                                  cloud  . . . . . . . . . . . . . . . . . 249--261
     Subhashini Krishnasamy and   
        Siddhartha Banerjee and   
              Sanjay Shakkottai   The behavior of epidemics under bounded
                                  susceptibility . . . . . . . . . . . . . 263--275
           Maksym Gabielkov and   
                 Ashwin Rao and   
                  Arnaud Legout   Studying social networks at scale:
                                  macroscopic anatomy of the Twitter
                                  social graph . . . . . . . . . . . . . . 277--288
         Swapna Buccapatnam and   
            Atilla Eryilmaz and   
                 Ness B. Shroff   Stochastic bandits with side
                                  observations on networks . . . . . . . . 289--300
                Jungseul Ok and   
                Youngmi Jin and   
                Jinwoo Shin and   
                        Yung Yi   On maximizing diffusion speed in social
                                  networks: impact of random seeding and
                                  clustering . . . . . . . . . . . . . . . 301--313
               Jose Yallouz and   
          Ori Rottenstreich and   
                     Ariel Orda   Tunable survivable spanning trees  . . . 315--327
                Bogdan Ghit and   
            Nezih Yigitbasi and   
            Alexandru Iosup and   
                     Dick Epema   Balanced resource allocations across
                                  multiple dynamic MapReduce clusters  . . 329--341
           Daniel S. Berger and   
             Martin Karsten and   
                   Jens Schmitt   On the relevance of adversarial queueing
                                  theory in practice . . . . . . . . . . . 343--354
Nachiappan Chidambaram Nachiappan and   
         Praveen Yedlapalli and   
     Niranjan Soundararajan and   
     Mahmut Taylan Kandemir and   
      Anand Sivasubramaniam and   
                   Chita R. Das   GemDroid: a framework to evaluate mobile
                                  platforms  . . . . . . . . . . . . . . . 355--366
     Muhammad Zubair Shafiq and   
              Jeffrey Erman and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
                       Jia Wang   Understanding the impact of network
                                  dynamics on mobile video user engagement 367--379
                Jiwei Huang and   
                   Sen Yang and   
                Ashwin Lall and   
             Justin Romberg and   
                     Jun Xu and   
                     Chuang Lin   Error estimating codes for insertion and
                                  deletion channels  . . . . . . . . . . . 381--393
      Thomas M. M. Meyfroyt and   
               Sem C. Borst and   
              Onno J. Boxma and   
                  Dee Denteneer   Data dissemination performance in
                                  large-scale sensor networks  . . . . . . 395--406
            Maria Gorlatova and   
                 John Sarik and   
                 Guy Grebla and   
                  Mina Cong and   
           Ioannis Kymissis and   
                    Gil Zussman   Movers and shakers: kinetic energy
                                  harvesting for the Internet of Things    407--419
                Chengdi Lai and   
              Steven H. Low and   
            Ka-Cheong Leung and   
                Victor O. K. Li   Pricing link by time . . . . . . . . . . 421--433
            Sharayu Moharir and   
              Javad Ghaderi and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Serving content with unknown demand: the
                                  high-dimensional regime  . . . . . . . . 435--447
                  Paul Tune and   
                Matthew Roughan   Network-design sensitivity analysis  . . 449--461
                Lingqing Ai and   
                    Xian Wu and   
             Lingxiao Huang and   
               Longbo Huang and   
             Pingzhong Tang and   
                        Jian Li   The multi-shop ski rental problem  . . . 463--475
                   Wei Ding and   
                Mahmut Kandemir   CApRI: CAche-conscious data reordering
                                  for irregular codes  . . . . . . . . . . 477--489
                     Yu Cai and   
               Gulay Yalcin and   
                 Onur Mutlu and   
          Erich F. Haratsch and   
                Osman Unsal and   
             Adrian Cristal and   
                        Ken Mai   Neighbor-cell assisted error correction
                                  for MLC NAND flash memories  . . . . . . 491--504
             Nagendra Gulur and   
           Mahesh Mehendale and   
           Raman Manikantan and   
         Ramaswamy Govindarajan   ANATOMY: an analytical model of memory
                                  system performance . . . . . . . . . . . 505--517
                Samira Khan and   
               Donghyuk Lee and   
                 Yoongu Kim and   
         Alaa R. Alameldeen and   
            Chris Wilkerson and   
                     Onur Mutlu   The efficacy of error mitigation
                                  techniques for DRAM retention failures:
                                  a comparative experimental study . . . . 519--532
                 Kaibo Wang and   
              Xiaoning Ding and   
                  Rubao Lee and   
               Shinpei Kato and   
                 Xiaodong Zhang   GDM: device memory management for GPGPU
                                  computing  . . . . . . . . . . . . . . . 533--545
               Nuno Diegues and   
               Paolo Romano and   
          Luís Rodrigues   On the energy and performance of
                                  commodity hardware transactional memory  547--548
                    Qi Wang and   
                  Liang Liu and   
               Jinbei Zhang and   
                 Xinyu Wang and   
               Xinbing Wang and   
                      Songwu Lu   Impact of correlated mobility and
                                  cluster scalability on connectivity of
                                  wireless networks  . . . . . . . . . . . 549--550
             Arash Tavakkol and   
          Mohammad Arjomand and   
             Hamid Sarbazi-Azad   Unleashing the potentials of dynamism
                                  for page allocation strategies in SSDs   551--552
        Chinmoy V. Mandayam and   
               Balaji Prabhakar   Traffic congestion: models, costs and
                                  optimal transport  . . . . . . . . . . . 553--554
         Arpan Mukhopadhyay and   
               Ravi R. Mazumdar   Randomized routing schemes for large
                                  processor sharing systems with multiple
                                  service rates  . . . . . . . . . . . . . 555--556
            Alexander Tarvo and   
                Steven P. Reiss   Automated analysis of multithreaded
                                  programs for performance modeling  . . . 557--558
               Manish Arora and   
             Srilatha Manne and   
              Yasuko Eckert and   
               Indrani Paul and   
             Nuwan Jayasena and   
                   Dean Tullsen   A comparison of core power gating
                                  strategies implemented in modern
                                  hardware . . . . . . . . . . . . . . . . 559--560
                   Avik Ray and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Topic modeling from network spread . . . 561--562
            A. Hasan Mahmud and   
                 Yuxiong He and   
                    Shaolei Ren   BATS: budget-constrained autoscaling for
                                  cloud performance optimization . . . . . 563--564
                Ammar Ammar and   
                 Sewoong Oh and   
              Devavrat Shah and   
             Luis Filipe Voloch   What's your choice?: learning the mixed
                                  multi-nomial . . . . . . . . . . . . . . 565--566
     Muhammad Zubair Shafiq and   
                Alex X. Liu and   
               Amir R. Khakpour   Revisiting caching in content delivery
                                  networks . . . . . . . . . . . . . . . . 567--568
                   Qiang Xu and   
             Thomas Andrews and   
                  Yong Liao and   
         Stanislav Miskovic and   
              Z. Morley Mao and   
                Mario Baldi and   
                  Antonio Nucci   FLOWR: a self-learning system for
                                  classifying mobile-application traffic   569--570
                   Wei Dong and   
              Xuefeng Zhang and   
               Jiliang Wang and   
                     Yi Gao and   
                  Chun Chen and   
                      Jiajun Bu   Accurate and robust time reconstruction
                                  for deployed sensor networks . . . . . . 571--572
             Shaoquan Zhang and   
               Longbo Huang and   
               Minghua Chen and   
                        Xin Liu   Effect of proactive serving on user
                                  delay reduction in service systems . . . 573--574
                Fanxin Kong and   
                    Xue Liu and   
                        Lei Rao   Optimal energy source selection and
                                  capacity planning for green datacenters  575--576
                Jinwoo Shin and   
                   Tonghoon Suk   Scheduling using interactive oracles:
                                  connection between iterative
                                  optimization and low-complexity
                                  scheduling . . . . . . . . . . . . . . . 577--578
           Swati Rallapalli and   
                   Wei Dong and   
                   Lili Qiu and   
                      Yin Zhang   Unified localization framework using
                                  trajectory signatures  . . . . . . . . . 579--580
             Dong Hyun Kang and   
               Changwoo Min and   
                   Young Ik Eom   TS-CLOCK: temporal and spatial locality
                                  aware buffer replacement algorithm for
                                  NAND flash storages  . . . . . . . . . . 581--582
                 Juhoon Kim and   
             Yung-Chih Chen and   
              Ramin Khalili and   
                Don Towsley and   
                  Anja Feldmann   Multi-source multipath HTTP (mHTTP): a
                                  proposal . . . . . . . . . . . . . . . . 583--584
          Christina Vlachou and   
              Albert Banchs and   
              Julien Herzen and   
                 Patrick Thiran   Performance analysis of MAC for
                                  power-line communications  . . . . . . . 585--586
                    Long Vu and   
              Deepak Turaga and   
       Srinivasan Parthasarathy   Impact of DHCP churn on network
                                  characterization . . . . . . . . . . . . 587--588
                   Yang Guo and   
       Alexander L. Stolyar and   
                    Anwar Walid   Online algorithms for joint
                                  application-VM-physical-machine
                                  auto-scaling in a cloud  . . . . . . . . 589--590
                    Jia Liu and   
               Cathy H. Xia and   
             Ness B. Shroff and   
               Hanif D. Sherali   Distributed optimal load shedding for
                                  disaster recovery in smart electric
                                  power grids: a second-order approach . . 591--592
           Richard G. Clegg and   
                 Raul Landa and   
João Taveira Araújo and   
            Eleni Mykoniati and   
              David Griffin and   
                     Miguel Rio   TARDIS: stably shifting traffic in space
                                  and time . . . . . . . . . . . . . . . . 593--594
           Daniel S. Berger and   
              Philipp Gland and   
               Sahil Singla and   
                   Florin Ciucu   Exact analysis of TTL cache networks:
                                  the case of caching policies driven by
                                  stopping times . . . . . . . . . . . . . 595--596
      Sangeetha Abdu Jyothi and   
               Ankit Singla and   
        P. Brighten Godfrey and   
                Alexandra Kolla   Measuring throughput of data center
                                  network topologies . . . . . . . . . . . 597--598
                    Da Wang and   
                Gauri Joshi and   
                Gregory Wornell   Efficient task replication for fast
                                  response times in parallel computation   599--600

ACM SIGMETRICS Performance Evaluation Review
Volume 42, Number 2, September, 2014

             Peter Buchholz and   
                Benny Van Houdt   Joint latency and cost optimization for
                                  erasure-coded data center storage  . . . 3--14
                   Bo Zhang and   
               Guodong Pang and   
                     Bert Zwart   Refining piecewise stationary
                                  approximation for a Markov-regulated
                                  fluid queue  . . . . . . . . . . . . . . 15--17
                A. Izagirre and   
                 A. M. Makowski   Light traffic performance under the
                                  power of two load balancing strategy:
                                  the case of server heterogeneity . . . . 18--20
                  Shigeo Shioda   Random walk based biased sampling for
                                  data collection on communication
                                  networks . . . . . . . . . . . . . . . . 21--23
               Majed Haddad and   
            Oussama Habachi and   
               Piotr Wiecek and   
                 Yezekael Hayel   Spectral efficiency of energy efficient
                                  multicarrier systems . . . . . . . . . . 24--26
                  Tao Zhang and   
             Guangshuo Chen and   
                    Wei Shu and   
                     Min-You Wu   Microarchitectural characterization of
                                  irregular applications on GPGPUs . . . . 27--29
          Jayakrishnan Nair and   
       Vijay G. Subramanian and   
                   Adam Wierman   On competitive provisioning of cloud
                                  services . . . . . . . . . . . . . . . . 30--32
               Joost Bosman and   
          Jayakrishnan Nair and   
                     Bert Zwart   On the probability of current and
                                  temperature overloading in power grids:
                                  a large deviations approach  . . . . . . 33--35
                   Erol Gelenbe   A sensor node with energy harvesting . . 37--39
          Thomas M. M. Meyfroyt   A cooperative sequential adsorption
                                  model for wireless gossiping . . . . . . 40--42
                  Paul Tune and   
                Matthew Roughan   Maximum entropy traffic matrix synthesis 43--45
          Milan Bradonji\'c and   
                Iraj Saniee and   
                  Indra Widjaja   Scaling of capacity and reliability in
                                  data center networks . . . . . . . . . . 46--48
              Yuval Rochman and   
                Hanoch Levy and   
                      Eli Brosh   Efficient resource placement in cloud
                                  computing and network applications . . . 49--51
                   Hong Xie and   
                 John C. S. Lui   Modeling crowdsourcing systems: design
                                  and analysis of incentive mechanism and
                                  rating system  . . . . . . . . . . . . . 52--54
                Arash Asadi and   
                Peter Jacko and   
               Vincenzo Mancuso   Modeling D2D communications with LTE and
                                  WiFi . . . . . . . . . . . . . . . . . . 55--57
                Liang Zheng and   
                   Chee Wei Tan   Egalitarian fairness framework for joint
                                  rate and power optimization in wireless
                                  networks . . . . . . . . . . . . . . . . 58--60
             D. A. Goldberg and   
                 D. A. Katz and   
                      Y. Lu and   
                  M. Sharma and   
               M. S. Squillante   Asymptotic optimality of constant
                                  capacity allocation policies for dynamic
                                  resource planning  . . . . . . . . . . . 61--63
              Javad Ghaderi and   
                 Yuan Zhong and   
                     R. Srikant   Asymptotic optimality of BestFit for
                                  stochastic bin packing . . . . . . . . . 64--66
              Ali Tizghadam and   
            Alberto Leon-Garcia   On the impact of subgraph insertion or
                                  removal on Moore--Penrose Laplacian and
                                  resistance distance  . . . . . . . . . . 67--69
              Masakiyo Miyazawa   Tail asymptotics of the stationary
                                  distribution for a two-node generalized
                                  Jackson network  . . . . . . . . . . . . 70--72
         Mark S. Squillante and   
                Don Towsley and   
                    Sean Barker   Improving the scalability of search in
                                  networks through multiple random walks   73--75

ACM SIGMETRICS Performance Evaluation Review
Volume 42, Number 3, December, 2014

                John Chuang and   
                Patrick Loiseau   The Joint Workshop on Pricing and
                                  Incentives in Networks and Systems
                                  (WPIN+NetEcon 2014)  . . . . . . . . . . 2--3
               Vijay Kamble and   
                   Jean Walrand   Strategy-proof Mechanisms for Purchasing
                                  a Shared Resource  . . . . . . . . . . . 4--7
          Saravana Manickam and   
           Mahesh K. Marina and   
          Sofia Pediaditaki and   
                 Maziar Nekovee   An Iterative and Truthful Multi-Unit
                                  Auction Scheme for Coordinated Sharing
                                  of Spectrum White Spaces . . . . . . . . 8--11
              Abhinav Sinha and   
       Achilleas Anastasopoulos   A General Mechanism Design Methodology
                                  for Social Utility Maximization with
                                  Linear Constraints . . . . . . . . . . . 12--15
               Steven Weber and   
             Roch Guérin   Facilitating Adoption of Services with
                                  Positive Externalities via Subsidies . . 16--19
               Amir Ajorlou and   
              Ali Jadbabaie and   
                    Ali Kakhbod   Strategic Information Diffusion: Spread
                                  vs. Exploit  . . . . . . . . . . . . . . 20--23
             Daron Acemoglu and   
               Giacomo Como and   
              Fabio Fagnani and   
                Asuman Ozdaglar   Harmonic Influence in Largescale
                                  Networks . . . . . . . . . . . . . . . . 24--24
  Vamseedhar Reddyvari Raja and   
        Srinivas Shakkottai and   
            Amogh Dhamdhere and   
                      kc claffy   Fair, Flexible and Feasible ISP Billing  25--28
            Laszlo Gyarmati and   
         Nikolaos Laoutaris and   
            Kostas Sdrolias and   
            Pablo Rodriguez and   
            Costas Courcoubetis   From advertising profits to bandwidth
                                  prices: a quantitative methodology for
                                  negotiating premium peering  . . . . . . 29--32
                Eran Simhon and   
              David Starobinski   Advance Reservation Games and the Price
                                  of Conservatism  . . . . . . . . . . . . 33--33
                Iddo Bentov and   
                Charles Lee and   
               Alex Mizrahi and   
                 Meni Rosenfeld   Proof of Activity: Extending Bitcoin's
                                  Proof of Work via Proof of Stake
                                  [Extended Abstract]y . . . . . . . . . . 34--37
             Daron Acemoglu and   
         Azarakhsh Malekian and   
                   Asu Ozdaglar   Network Security and Contagion . . . . . 38--38
                     Aaron Roth   Differential Privacy as a Tool for
                                  Mechanism Design in Large Systems  . . . 39--39
        Leonidas Georgiadis and   
           George Iosifidis and   
             Leandros Tassiulas   Dynamic Exchange of Communication
                                  Services . . . . . . . . . . . . . . . . 40--40
              Eiichiro Kazumori   Generalizing Deferred Acceptance
                                  Auctions to Allow Multiple
                                  Relinquishment Options . . . . . . . . . 41--41
            Ashraf Al Daoud and   
             George Kesidis and   
            Jörg Liebeherr   A Game of Uncoordinated Sharing of
                                  Private Spectrum Commons . . . . . . . . 42--42
    Konstantinos Poularakis and   
        Ioannis Pefkianakis and   
      Jaideep Chandrashekar and   
             Leandros Tassiulas   Quid Pro Quo: Reducing Peak Traffic
                                  Costs with (Subscriber) Price Incentives 43--43
      Mohammad Hassan Lotfi and   
             George Kesidis and   
                 Saswati Sarkar   Network NonNeutrality on the Internet:
                                  Content Provision Under a Subscription
                                  Revenue Model  . . . . . . . . . . . . . 44--44
                Siny Joseph and   
           Vinod Namboodiri and   
                  Vishnu C. Dev   A Market-Driven Framework Towards
                                  Environmentally Sustainable Mobile
                                  Computing  . . . . . . . . . . . . . . . 46--48
             Fatemeh Jalali and   
                   Rob Ayre and   
            Arun Vishwanath and   
               Kerry Hinton and   
               Tansu Alpcan and   
                     Rod Tucker   Energy Consumption of Content
                                  Distribution from Nano Data Centers
                                  versus Centralized Data Centers  . . . . 49--54
               Shinobu Miwa and   
             Charles R. Lefurgy   Evaluation of Core Hopping on POWER7 . . 55--60
      Fikru Getachew Debele and   
                 Nanfang Li and   
                Michela Meo and   
                Marco Ricca and   
                       Yi Zhang   Experimenting Resource-on-Demand
                                  Strategies for Green WLANs . . . . . . . 61--66
                    Qing Yi and   
                   Suresh Singh   Minimizing Energy Consumption of FatTree
                                  Data Center Networks . . . . . . . . . . 67--72
                Shaolei Ren and   
              Mohammad A. Islam   A First Look at Colocation Demand
                                  Response . . . . . . . . . . . . . . . . 73--75
        Derya Çavdar and   
              Andrea Ros\`a and   
              Lydia Y. Chen and   
              Walter Binder and   
              Fatih Alagöz   Quantifying the Brown Side of Priority
                                  Schedulers: Lessons from Big Clusters    76--81

ACM SIGMETRICS Performance Evaluation Review
Volume 42, Number 4, March, 2015

             Danilo Ardagna and   
             Mark S. Squillante   Special Issue on Performance and
                                  Resource Management in Big Data
                                  Applications . . . . . . . . . . . . . . 2--2
                    Yue Tan and   
                   Cathy H. Xia   An Adaptive Learning Approach for
                                  Efficient Resource Provisioning in Cloud
                                  Services . . . . . . . . . . . . . . . . 3--11
              Andrea Ros\`a and   
              Lydia Y. Chen and   
               Robert Birke and   
                  Walter Binder   Demystifying Casualties of Evictions in
                                  Big Data Priority Scheduling . . . . . . 12--21
                 Yijun Ying and   
               Robert Birke and   
                 Cheng Wang and   
              Lydia Y. Chen and   
               Gautam Natarajan   On Energyaware Allocation and Execution
                                  for Batch and Interactive MapReduce  . . 22--30
                   Jian Tan and   
                   Li Zhang and   
                     Min Li and   
                   Yandong Wang   Multi-resource Fair Sharing for
                                  Multiclass Workflows . . . . . . . . . . 31--37
              Zhuoyao Zhang and   
         Ludmila Cherkasova and   
                  Boon Thau Loo   Exploiting Cloud Heterogeneity to
                                  Optimize Performance and Cost of
                                  MapReduce Processing . . . . . . . . . . 38--50
         Marzieh Malekimajd and   
             Danilo Ardagna and   
           Michele Ciavotta and   
     Alessandro Maria Rizzi and   
            Mauro Passacantando   Optimal Map Reduce Job Capacity
                                  Allocation in Cloud Systems  . . . . . . 51--61
                  Wei Zhang and   
     Sundaresan Rajasekaran and   
               Shaohua Duan and   
               Timothy Wood and   
                    Mingfa Zhuy   Minimizing Interference and Maximizing
                                  Progress for Hadoop Virtual Machines . . 62--71


ACM SIGMETRICS Performance Evaluation Review
Volume 43, Number 1, June, 2015

                    Bruce Hajek   Bounds Implied by Drift with
                                  Applications . . . . . . . . . . . . . . 1--1
               Xiaoxi Zhang and   
                Zhiyi Huang and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   Online Auctions in IaaS Clouds: Welfare
                                  and Profit Maximization with Server
                                  Costs  . . . . . . . . . . . . . . . . . 3--15
               Se-Young Yun and   
            Alexandre Proutiere   Distributed Proportional Fair Load
                                  Balancing in Heterogeneous Systems . . . 17--30
              Thomas Bonald and   
                  James Roberts   Multi-Resource Fairness: Objectives,
                                  Algorithms and Performance . . . . . . . 31--42
        Leonidas Georgiadis and   
           George Iosifidis and   
             Leandros Tassiulas   Exchange of Services in Networks:
                                  Competition, Cooperation, and Fairness   43--56
               Samuli Aalto and   
               Pasi Lassila and   
                   Prajwal Osti   Whittle Index Approach to Size-aware
                                  Scheduling with Time-varying Channels    57--69
                 Sanjib Sur and   
      Vignesh Venkateswaran and   
                Xinyu Zhang and   
             Parmesh Ramanathan   60 GHz Indoor Networking through
                                  Flexible Beams: a Link-Level Profiling   71--84
                Liang Zhang and   
                  Weijie Wu and   
                       Dan Wang   Sponsored Data Plan: a Two-Class Service
                                  Model in Wireless Data Networks  . . . . 85--96
                     Bin Li and   
             Rayadurgam Srikant   Queue-Proportional Rate Allocation with
                                  Per-Link Information in Multihop
                                  Networks . . . . . . . . . . . . . . . . 97--108
           Jelena Marasevic and   
                   Jin Zhou and   
        Harish Krishnaswamy and   
                 Yuan Zhong and   
                    Gil Zussman   Resource Allocation and Rate Gains in
                                  Practical Full-Duplex Systems  . . . . . 109--122
               Nicolas Gast and   
                Benny Van Houdt   Transient and Steady-state Regime of a
                                  Family of List-based Cache Replacement
                                  Algorithms . . . . . . . . . . . . . . . 123--136
            Mahmut Kandemir and   
                   Hui Zhao and   
                Xulong Tang and   
                Mustafa Karakoy   Memory Row Reuse Distance and its Role
                                  in Optimizing Application Performance    137--149
              Xiaomeng Chen and   
                  Ning Ding and   
            Abhilash Jindal and   
              Y. Charlie Hu and   
               Maruti Gupta and   
               Rath Vannithamby   Smartphone Energy Drain in the Wild:
                                  Analysis and Implications  . . . . . . . 151--164
                  Ming Chen and   
            Dean Hildebrand and   
             Geoff Kuenning and   
  Soujanya Shankaranarayana and   
               Bharat Singh and   
                     Erez Zadok   Newer Is Sometimes Better: an Evaluation
                                  of NFSv4.1 . . . . . . . . . . . . . . . 165--176
                Justin Meza and   
                   Qiang Wu and   
               Sanjev Kumar and   
                     Onur Mutlu   A Large-Scale Study of Flash Memory
                                  Failures in the Field  . . . . . . . . . 177--190
              Niangjun Chen and   
              Anish Agarwal and   
               Adam Wierman and   
           Siddharth Barman and   
           Lachlan L. H. Andrew   Online Convex Optimization Using
                                  Predictions  . . . . . . . . . . . . . . 191--204
              Donghyeon Lee and   
              Joonyoung Kim and   
                Hyunmin Lee and   
                    Kyomin Jung   Reliable Multiple-choice Iterative
                                  Algorithm for Crowdsourcing Systems  . . 205--216
                   Yang Liu and   
                    Mingyan Liu   An Online Learning Approach to Improving
                                  the Quality of Crowd-Sourcing  . . . . . 217--230
             Richard Combes and   
           Stefan Magureanu and   
        Alexandre Proutiere and   
                Cyrille Laroche   Learning to Rank: Regret Lower Bounds
                                  and Efficient Algorithms . . . . . . . . 231--244
             Richard Combes and   
                Chong Jiang and   
             Rayadurgam Srikant   Bandits with Budgets: Regret Lower
                                  Bounds and Optimal Algorithms  . . . . . 245--257
        Parinya Chalermsook and   
            Atish Das Sarma and   
                Ashwin Lall and   
              Danupon Nanongkai   Social Network Monetization via
                                  Sponsored Viral Marketing  . . . . . . . 259--270
               Giulia Fanti and   
              Peter Kairouz and   
                 Sewoong Oh and   
               Pramod Viswanath   Spy vs. Spy: Rumor Source Obfuscation    271--284
   Laurent Massoulié and   
      Mesrob I. Ohannessian and   
          Alexandre Prouti\`ere   Greedy-Bayes for Targeted News
                                  Dissemination  . . . . . . . . . . . . . 285--296
             Mojtaba Tarihi and   
              Hossein Asadi and   
             Hamid Sarbazi-Azad   DiskAccel: Accelerating Disk-Based
                                  Experiments by Representative Sampling   297--308
                     Ye Jin and   
                Xiaosong Ma and   
              Mingliang Liu and   
                   Qing Liu and   
               Jeremy Logan and   
         Norbert Podhorszki and   
             Jong Youl Choi and   
                   Scott Klasky   Combining Phase Identification and
                                  Statistic Modeling for Automated
                                  Parallel Benchmark Generation  . . . . . 309--320
                Qiaomin Xie and   
                Xiaobo Dong and   
                      Yi Lu and   
             Rayadurgam Srikant   Power of $d$ Choices for Large-Scale Bin
                                  Packing: a Loss Model  . . . . . . . . . 321--334
                   Amr Rizk and   
             Felix Poloczek and   
                   Florin Ciucu   Computable Bounds in Fork-Join Queueing
                                  Systems  . . . . . . . . . . . . . . . . 335--346
            Kristen Gardner and   
             Samuel Zbarsky and   
            Sherwin Doroudi and   
         Mor Harchol-Balter and   
                     Esa Hyytia   Reducing Latency via Redundant Requests:
                                  Exact Analysis . . . . . . . . . . . . . 347--360
               Saleh Soltan and   
         Mihalis Yannakakis and   
                    Gil Zussman   Joint Cyber and Physical Attacks on
                                  Power Grids: Graph Theoretical
                                  Approaches for Information Recovery  . . 361--374
                 Virag Shah and   
             Gustavo de Veciana   Impact of Fairness and Heterogeneity on
                                  Delays in Large-scale Content Delivery
                                  Networks . . . . . . . . . . . . . . . . 375--387
                    Ting He and   
                  Chang Liu and   
            Ananthram Swami and   
                Don Towsley and   
        Theodoros Salonidis and   
           Andrei Iu. Bejan and   
                        Paul Yu   Fisher Information-based Experiment
                                  Design for Network Tomography  . . . . . 389--402
               Robert Birke and   
    Mathias Björkqvist and   
          Cyriel Minkenberg and   
             Martin Schmatz and   
                  Lydia Y. Chen   When Virtual Meets Physical at the Edge:
                                  a Field Study on Datacenters' Virtual
                                  Traffic  . . . . . . . . . . . . . . . . 403--415
               Qingjun Xiao and   
               Shigang Chen and   
                   Min Chen and   
                     Yibei Ling   Hyper-Compact Virtual Estimators for Big
                                  Network Data Based on Register Sharing   417--428
         Vasileios Kotronis and   
           Rowan Klöti and   
              Matthias Rost and   
    Panagiotis Georgopoulos and   
              Bernhard Ager and   
              Stefan Schmid and   
       Xenofontas Dimitropoulos   Investigating the Potential of the
                                  Inter-IXP Multigraph for the
                                  Provisioning of Guaranteed End-to-End
                                  Services . . . . . . . . . . . . . . . . 429--430
                Rahul Singh and   
              Alexander Stolyar   MaxWeight Scheduling: Asymptotic
                                  Behavior of Unscaled Queue-Differentials
                                  in Heavy Traffic . . . . . . . . . . . . 431--432
               Carlo Fuerst and   
              Stefan Schmid and   
              Lalith Suresh and   
                    Paolo Costa   Kraken: Towards Elastic Performance
                                  Guarantees in Multi-tenant Data Centers  433--434
                 Keqiang He and   
              Junaid Khalid and   
                 Sourav Das and   
      Aaron Gember-Jacobson and   
           Chaithan Prakash and   
              Aditya Akella and   
                Li Erran Li and   
                 Marina Thottan   Latency in Software Defined Networks:
                                  Measurements and Mitigation Techniques   435--436
                Yongquan Fu and   
                 Ernst Biersack   Tree-structured Bloom Filters for Joint
                                  Optimization of False Positive
                                  Probability and Transmission Bandwidth   437--438
              Javad Ghaderi and   
          Sanjay Shakkottai and   
             Rayadurgam Srikant   Scheduling Storms and Streams in the
                                  Cloud  . . . . . . . . . . . . . . . . . 439--440
              Eli A. Meirom and   
              Chris Milling and   
      Constantine Caramanis and   
                Shie Mannor and   
          Sanjay Shakkottai and   
                     Ariel Orda   Localized Epidemic Detection in Networks
                                  with Overwhelming Noise  . . . . . . . . 441--442
                   Zhi Zhou and   
               Fangming Liu and   
                    Zongpeng Li   Pricing Bilateral Electricity Trade
                                  between Smart Grids and Hybrid Green
                                  Datacenters  . . . . . . . . . . . . . . 443--444
     Subhashini Krishnasamy and   
                  Rajat Sen and   
                 Sewoong Oh and   
              Sanjay Shakkottai   Detecting Sponsored Recommendations  . . 445--446
                  Yong Zhao and   
                    Jia Rao and   
                Xiaobo Zhou and   
                        Qing Yi   Understanding Parallel Performance Under
                                  Interferences in Multi-tenant Clouds . . 447--448
                     Rui Wu and   
                 Jiaming Xu and   
         Rayadurgam Srikant and   
          Laurent Massoulie and   
               Marc Lelarge and   
                    Bruce Hajek   Clustering and Inference From Pairwise
                                  Comparisons  . . . . . . . . . . . . . . 449--450
Shaileshh Bojja Venkatakrishnan and   
               Pramod Viswanath   Deterministic Near-Optimal P2P Streaming 451--452
          Azalia Mirhoseini and   
        Ebrahim M. Songhori and   
       Bita Darvish Rouhani and   
             Farinaz Koushanfar   Flexible Transformations For Learning
                                  Big Data . . . . . . . . . . . . . . . . 453--454
                    Jian Li and   
                 Bainan Xia and   
                 Xinbo Geng and   
                   Hao Ming and   
        Srinivas Shakkottai and   
          Vijay Subramanian and   
                         Le Xie   Energy Coupon: a Mean Field Game
                                  Perspective on Demand Response in Smart
                                  Grids  . . . . . . . . . . . . . . . . . 455--456
               Ibrahim Umar and   
          Otto Johan Anshus and   
                 Phuong Hoai Ha   DeltaTree: a Locality-aware Concurrent
                                  Search Tree  . . . . . . . . . . . . . . 457--458
                Faraz Ahmed and   
              Jeffrey Erman and   
                   Zihui Ge and   
                Alex X. Liu and   
                   Jia Wang and   
                         He Yan   Detecting and Localizing End-to-End
                                  Performance Degradation for Cellular
                                  Data Services  . . . . . . . . . . . . . 459--460
        Rémi Varloot and   
    Ana Busíü'c and   
                 Anne Bouillard   Speeding up Glauber Dynamics for Random
                                  Generation of Independent Sets . . . . . 461--462
              Linquan Zhang and   
                Zongpeng Li and   
                   Chuan Wu and   
                    Shaolei Ren   Online Electricity Cost Saving
                                  Algorithms for Co-Location Data Centers  463--464
          Guillaume Ducoffe and   
     Mathias Lécuyer and   
        Augustin Chaintreau and   
                Roxana Geambasu   Web Transparency for Complex Targeting:
                                  Algorithms, Limits, and Tradeoffs  . . . 465--466
                Varun Gupta and   
                Ana Radovanovic   Lagrangian-based Online Stochastic Bin
                                  Packing  . . . . . . . . . . . . . . . . 467--468
                 Vani Gupta and   
                Stephen Lee and   
            Prashant Shenoy and   
           Ramesh Sitaraman and   
                Rahul Urgaonkar   Towards Cooling Internet-Scale
                                  Distributed Networks on the Cheap  . . . 469--470
              Russell Clapp and   
            Martin Dimitrov and   
              Karthik Kumar and   
           Vish Viswanathan and   
                Thomas Willhalm   A Simple Model to Quantify the Impact of
                                  Memory Latency and Bandwidth on
                                  Performance  . . . . . . . . . . . . . . 471--472
                  Qiumin Xu and   
           Huzefa Siyamwala and   
              Mrinmoy Ghosh and   
               Manu Awasthi and   
               Tameesh Suri and   
                  Zvika Guz and   
          Anahita Shayesteh and   
             Vijay Balakrishnan   Performance Characterization of
                                  Hyperscale Applicationson on NVMe SSDs   473--474

ACM SIGMETRICS Performance Evaluation Review
Volume 43, Number 2, September, 2015

            Leana Golubchik and   
                     Bert Zwart   Spatial Loss Systems: Exact Simulation
                                  and Rare Event Behavior  . . . . . . . . 3--6
         Martijn Onderwater and   
             Sandjai Bhulai and   
                Rob van der Mei   Learning Optimal Policies in Markov
                                  Decision Processes with Value Function
                                  Discovery? . . . . . . . . . . . . . . . 7--9
Johan S. H. van Leeuwaarden and   
      Britt W. J. Mathijsen and   
                Fiona Sloothaak   Delayed workload shifting in many-server
                                  systems  . . . . . . . . . . . . . . . . 10--12
                  F. Cecchi and   
                S. C. Borst and   
      J. S. H. van Leeuwaardena   Mean-Field Analysis of Ultra-Dense CSMA
                                  Networks . . . . . . . . . . . . . . . . 13--15
              Brendan Patch and   
              Thomas Taimre and   
                 Yoni Nazarathy   Performance of Faulty Loss Systems with
                                  Persistent Connections . . . . . . . . . 16--18
                Seva Shneer and   
            Peter M. van de Ven   Stability and instability of individual
                                  nodes in multi-hop wireless CSMA/CA
                                  networks . . . . . . . . . . . . . . . . 19--21
                    O. Brun and   
              H. Ben Cheikh and   
                   B. J. Prabhu   A Fluid model based Heuristic for
                                  Optimal Speed-scaling of Multi-class
                                  Single Server Queues . . . . . . . . . . 22--23
        Matthieu Jonckheere and   
                    Seva Shneer   Gradient bandwidth allocations . . . . . 24--25
   Jan Willem Kleinrouweler and   
             Sergio Cabrero and   
            Rob van der Mei and   
                    Pablo Cesar   Modeling the Effect of Sharing Policies
                                  for Network-assisted HTTP Adaptive Video
                                  Streaming  . . . . . . . . . . . . . . . 26--27
                Naresh M. Patel   Half-Latency Rule for Finding the Knee
                                  of the Latency Curve . . . . . . . . . . 28--29
              Mikael Touati and   
            Rachid Elazouzi and   
         Marceau Coupechoux and   
               Eitan Altman and   
                Jean-Marc Kelif   About Joint Stable User Association and
                                  Resource Allocation in Multi-Rate IEEE
                                  802.11 WLANs . . . . . . . . . . . . . . 30--31
                 Huaming Wu and   
                     Yi Sun and   
                 Katinka Wolter   Analysis of the Energy-Response Time
                                  Tradeoff for Delayed Mobile Cloud
                                  Offloading . . . . . . . . . . . . . . . 33--35
              Niangjun Chen and   
                 Xiaoqi Ren and   
                Shaolei Ren and   
                   Adam Wierman   Greening Multi-Tenant Data Center Demand
                                  Response . . . . . . . . . . . . . . . . 36--38
             Shaoquan Zhang and   
               Longbo Huang and   
               Minghua Chen and   
                        Xin Liu   Proactive Serving Decreases User Delay
                                  Exponentially  . . . . . . . . . . . . . 39--41
                 Xiaoqi Ren and   
    Ganesh Ananthanarayanan and   
               Adam Wierman and   
                      Minlan Yu   Speculation-aware Cluster Scheduling . . 42--44
                Weikun Wang and   
                Giuliano Casale   Maximum Likelihood Estimation of Closed
                                  Queueing Network Demands from Queue
                                  Length Data  . . . . . . . . . . . . . . 45--47
                 G. Kesidis and   
                    Y. Shan and   
               B. Urgaonkar and   
                   J. Liebeherr   Network calculus for parallel processing 48--50
          Pierre M. Fiorini and   
                  Lester Lipsky   Exact Analysis of Some Split-Merge
                                  Queues . . . . . . . . . . . . . . . . . 51--53
                Gauri Joshi and   
             Emina Soljanin and   
                Gregory Wornell   Queues with Redundancy: Latency-Cost
                                  Analysis . . . . . . . . . . . . . . . . 54--56
           Daniel S. Berger and   
       Sebastian Henningsen and   
               Florin Ciucu and   
                Jens B. Schmitt   Maximizing Cache Hit Ratios by Variance
                                  Reduction  . . . . . . . . . . . . . . . 57--59
                   Jian Tan and   
                   Li Zhang and   
                   Yandong Wang   Miss behavior for caching with lease . . 60--62
                Yudong Yang and   
               Vishal Misra and   
                 Dan Rubenstein   On the Optimality of Greedy Garbage
                                  Collection for SSDs  . . . . . . . . . . 63--65
                Sam Spencer and   
                     R. Srikant   On the Impossibility of Localizing
                                  Multiple Rumor Sources in a Line Graph   66--68
                   Nicolas Gast   The Power of Two Choices on Graphs: the
                                  Pair-Approximation is Accurate?  . . . . 69--71
        Siva Theja Maguluri and   
                     R. Srikant   Heavy-Traffic Behavior of the MaxWeight
                                  Algorithm in a Switch with Uniform
                                  Traffic  . . . . . . . . . . . . . . . . 72--74
              Ana Bu\vsi\'c and   
                      Sean Meyn   Approximate optimality with bounded
                                  regret in dynamic matching models  . . . 75--77
                Yingdong Lu and   
         Mark S. Squillante and   
                Chai Wah Wu and   
                       Bo Zhang   On the Control of Epidemic-Like
                                  Stochastic Processes with Time-Varying
                                  Behavior?  . . . . . . . . . . . . . . . 78--80

ACM SIGMETRICS Performance Evaluation Review
Volume 43, Number 3, December, 2015

               Marco Canini and   
                James Kempf and   
                  Stefan Schmid   How many planet-wide leaders should
                                  there be?  . . . . . . . . . . . . . . . 3--6
                    Da Wang and   
                Gauri Joshi and   
                Gregory Wornell   Using Straggler Replication to Reduce
                                  Latency in Large-scale Parallel
                                  Computing  . . . . . . . . . . . . . . . 7--11
              Anshul Gandhi and   
                    Justin Chan   Analyzing the Network for AWS
                                  Distributed Cloud Computing  . . . . . . 12--15
                    Rui Jia and   
          Sherif Abdelwahed and   
              Abdelkarim Erradi   A Predictive Control Approach for Fault
                                  Management of Computing Systems  . . . . 16--20
       Hylson Vescovi Netto and   
             Lau Cheuk Lung and   
     Tulio Alberton Ribeiro and   
             Miguel Correia and   
          Aldelir Fernando Luiz   Anticipating Requests to Improve
                                  Performance and Reduce Costs in Cloud
                                  Storage  . . . . . . . . . . . . . . . . 21--24
                 Nadav Lavi and   
                    Hanoch Levy   Admit or Reject? Preserve or Drop?:
                                  Operational Dilemmas upon Server
                                  Failures on the Cloud  . . . . . . . . . 25--29
             Tianrong Zhang and   
                     Yufeng Xin   Towards Designing a Truthful Online
                                  Auction Framework for Deadline-aware
                                  Cloud Resource Allocation  . . . . . . . 30--33
             Nguyen H. Tran and   
                Cuong T. Do and   
           Choong Seon Hong and   
                Shaolei Ren and   
                        Zhu Han   Coordinated Colocation Datacenters for
                                  Economic Demand Responce . . . . . . . . 34--37
                Arne Ludwig and   
                  Stefan Schmid   Distributed Cloud Market: Who Benefits
                                  from Specification Flexibilities?  . . . 38--41
                     Bo Mao and   
                      Suzhen Wu   Deduplication-Assisted Data Reduction
                                  and Distribution in Cloud-of-Clouds  . . 42--42
              Anshul Gandhi and   
               Naman Mittal and   
                       Xi Zhang   Optimal Load-Balancing for Heterogeneous
                                  Clusters . . . . . . . . . . . . . . . . 43--43
                  Tan N. Le and   
              Bong Jun Choi and   
                    Pradipta De   Energy Cost Aware Scheduling of
                                  MapReduce Jobs across Geographically
                                  Distributed Nodes  . . . . . . . . . . . 44--44
            Sushil Bhojwani and   
              Matt Hemmings and   
                Dan Ingalls and   
                Jens Lincke and   
               Robert Krahn and   
                 David Lary and   
                Rick McGeer and   
               Glenn Ricart and   
                Marko Roder and   
               Yvonne Coady and   
                   Ulrike Stege   The Ignite Distributed Collaborative
                                  Visualization System . . . . . . . . . . 45--46
      Patrick Maillé and   
                   Bruno Tuffin   Impact of Content Delivery Networks on
                                  Service and Content Innovation . . . . . 49--52
               Kartik Ahuja and   
              Simpson Zhang and   
         Mihaela van der Schaar   The Population Dynamics of Websites:
                                  [Extended Abstract]  . . . . . . . . . . 53--56
                   Yuan Luo and   
              Nihar B. Shah and   
              Jianwei Huang and   
                   Jean Walrand   Parametric Prediction from Parametric
                                  Agents?  . . . . . . . . . . . . . . . . 57--57
             Daron Acemoglu and   
              Ali Makhdoumi and   
         Azarakhsh Malekian and   
                   Asu Ozdaglar   Privacy-Constrained Network Formation    58--58
         Arthi Ramachandran and   
            Augustin Chaintreau   The Network Effect of Privacy Choices    59--62
            M. H. Afrasiabi and   
               R. Guérin   Choice-based Pricing for User-Provided
                                  Connectivity?  . . . . . . . . . . . . . 63--66
                Reshef Meir and   
                   David Parkes   Playing the Wrong Game: Smoothness
                                  Bounds for Congestion Games with
                                  Behavioral Biases  . . . . . . . . . . . 67--70
             Michal Feldman and   
                 Ophir Friedler   Convergence to Strong Equilibrium in
                                  Network Design Games . . . . . . . . . . 71--71
              Mikael Touati and   
           Rachid El-Azouzi and   
         Marceau Coupechoux and   
               Eitan Altman and   
                Jean-Marc Kelif   Core Stable Algorithms for Coalition
                                  Games with Complementarities and Peer
                                  Effects  . . . . . . . . . . . . . . . . 72--75
            Cinar Kilcioglu and   
                Costis Maglaras   Revenue Maximization for Cloud Computing
                                  Services . . . . . . . . . . . . . . . . 76--76
         Janardhan Kulkarni and   
                 Vahab Mirrokni   Dynamic Coordination Mechanisms:
                                  [Extended Abstract]  . . . . . . . . . . 77--77
        Hamidreza Tavafoghi and   
         Demosthenis Teneketzis   Sequential Contracts for Uncertain
                                  Electricity Resources  . . . . . . . . . 78--81
                Eran Simhon and   
              David Starobinski   On the Impact of Sharing Information in
                                  Advance Reservation Systems  . . . . . . 82--82
                Sofia Ceppi and   
                       Ian Kash   Personalized Payments for
                                  Storage-as-a-Service . . . . . . . . . . 83--86
             Saif Benjaafar and   
              Guangwen Kong and   
                       Xiang Li   Modeling and Analysis of Collaborative
                                  Consumption in Peer-to-Peer Car Sharing  87--90

ACM SIGMETRICS Performance Evaluation Review
Volume 43, Number 4, March, 2016

      Diwakar Krishnamurthy and   
                  Anne Koziolek   Performance Challenges, Current Bad
                                  Practices, and Hints in PaaS Cloud
                                  Application Design . . . . . . . . . . . 3--12
                Robert Heinrich   Architectural Run-time Models for
                                  Performance and Privacy Analysis in
                                  Dynamic Cloud Applications?  . . . . . . 13--22
                   Zheng Li and   
               Liam O'Brien and   
                     Maria Kihl   DoKnowMe: Towards a Domain
                                  Knowledge-driven Methodology for
                                  Performance Evaluation . . . . . . . . . 23--32
            Michael Grottke and   
           Alberto Avritzer and   
  Daniel S. Menasché and   
       Leandro P. de Aguiar and   
                   Eitan Altman   On the Efficiency of Sampling and
                                  Countermeasures to
                                  Critical-Infrastructure-Targeted Malware
                                  Campaigns  . . . . . . . . . . . . . . . 33--42
         Kim-Thomas Rehmann and   
               Changyun Seo and   
              Dongwon Hwang and   
           Binh Than Truong and   
            Alexander Boehm and   
                   Dong Hun Lee   Performance Monitoring in SAP HANA's
                                  Continuous Integration Process . . . . . 43--52
              Manoj Nambiar and   
              Ajay Kattepur and   
            Gopal Bhaskaran and   
              Rekha Singhal and   
            Subhasri Duttagupta   Model Driven Software Performance
                                  Engineering: Current Challenges and Way
                                  Ahead  . . . . . . . . . . . . . . . . . 53--62


ACM SIGMETRICS Performance Evaluation Review
Volume 44, Number 1, June, 2016

             David Gamarnik and   
         John N. Tsitsiklis and   
                Martin Zubeldia   Delay, Memory, and Messaging Tradeoffs
                                  in Distributed Service Systems . . . . . 1--12
        Siva Theja Maguluri and   
            Sai Kiran Burle and   
                     R. Srikant   Optimal Heavy-Traffic Queue Length
                                  Scaling in an Incompletely Saturated
                                  Switch . . . . . . . . . . . . . . . . . 13--24
                   Yun Zeng and   
        Augustin Chaintreau and   
                Don Towsley and   
                   Cathy H. Xia   A Necessary and Sufficient Condition for
                                  Throughput Scalability of Fork and Join
                                  Networks with Blocking . . . . . . . . . 25--36
            Michele Garetto and   
            Emilio Leonardi and   
          Giovanni Luca Torrisi   Generalized Threshold-Based Epidemics in
                                  Random Graphs: The Power of Extreme
                                  Values . . . . . . . . . . . . . . . . . 37--50
              Eliav Buchnik and   
                    Edith Cohen   Reverse Ranking by Graph Structure:
                                  Model and Scalable Algorithms  . . . . . 51--62
             Daniel Cullina and   
                 Negar Kiyavash   Improved Achievability and Converse
                                  Bounds for Erd\Hos--Rényi Graph Matching  63--72
             Mor Harchol-Balter   A Better Model for Task Assignment in
                                  Server Farms: How Replication can Help   73--73
Shaileshh Bojja Venkatakrishnan and   
          Mohammad Alizadeh and   
               Pramod Viswanath   Costly Circuits, Submodular Schedules
                                  and Approximate Carathéodory Theorems . . 75--88
Shankaranarayanan Puzhavakath Narayanan and   
              Yun Seong Nam and   
          Ashiwan Sivakumar and   
Balakrishnan Chandrasekaran and   
                Bruce Maggs and   
                     Sanjay Rao   Reducing Latency Through Page-aware
                                  Management of Web Objects by Content
                                  Delivery Networks  . . . . . . . . . . . 89--100
     Andrés Ferragut and   
           Ismael Rodriguez and   
              Fernando Paganini   Optimizing TTL Caches under Heavy-Tailed
                                  Demands  . . . . . . . . . . . . . . . . 101--112
          Stratis Ioannidis and   
                     Edmund Yeh   Adaptive Caching Networks with
                                  Optimality Guarantees  . . . . . . . . . 113--124
               Philippe Jacquet   Breathing Mankind Thoughts . . . . . . . 125--125
                Zain Shamsi and   
                Dmitri Loguinov   Unsupervised Clustering Under Temporal
                                  Feature Volatility in Network Stack
                                  Fingerprinting . . . . . . . . . . . . . 127--138
                Haipeng Dai and   
              Yuankun Zhong and   
                Alex X. Liu and   
                   Wei Wang and   
                        Meng Li   Noisy Bloom Filters for Multi-Set
                                  Membership Testing . . . . . . . . . . . 139--151
               Giulia Fanti and   
              Peter Kairouz and   
                 Sewoong Oh and   
         Kannan Ramchandran and   
               Pramod Viswanath   Rumor Source Obfuscation on Irregular
                                  Trees  . . . . . . . . . . . . . . . . . 153--164
     Konstantin Avrachenkov and   
              Bruno Ribeiro and   
           Jithin K. Sreedharan   Inference in OSNs via Lightweight
                                  Partial Crawls . . . . . . . . . . . . . 165--177
           Maksym Gabielkov and   
         Arthi Ramachandran and   
        Augustin Chaintreau and   
                  Arnaud Legout   Social Clicks: What and Who Gets Read on
                                  Twitter? . . . . . . . . . . . . . . . . 179--192
              Niangjun Chen and   
              Joshua Comden and   
                Zhenhua Liu and   
              Anshul Gandhi and   
                   Adam Wierman   Using Predictions in Online
                                  Optimization: Looking Forward with an
                                  Eye on the Past  . . . . . . . . . . . . 193--206
                Guy Bresler and   
              Devavrat Shah and   
             Luis Filipe Voloch   Collaborative Filtering with Low Regret  207--220
                        Jia Liu   Achieving Low-Delay and Fast-Convergence
                                  in Stochastic Network Optimization: a
                                  Nesterovian Approach . . . . . . . . . . 221--234
                Liang Zheng and   
            Carlee Joe-Wong and   
     Christopher G. Brinton and   
               Chee Wei Tan and   
                 Sangtae Ha and   
                    Mung Chiang   On the Viability of a Cloud Virtual
                                  Service Provider . . . . . . . . . . . . 235--248
                 Weina Wang and   
                   Lei Ying and   
                  Junshan Zhang   The Value of Privacy: Strategic Data
                                  Subjects, Incentive Mechanisms and
                                  Fundamental Limits . . . . . . . . . . . 249--260
                 Yuanjie Li and   
               Haotian Deng and   
                  Jiayao Li and   
                Chunyi Peng and   
                      Songwu Lu   Instability in Distributed Mobility
                                  Management: Revisiting Configuration
                                  Management in 3G/4G Mobile Networks  . . 261--272
                Arne Ludwig and   
              Szymon Dudyzc and   
              Matthias Rost and   
                  Stefan Schmid   Transiently Secure Network Updates . . . 273--284
                       Lei Ying   On the Approximation Error of Mean-Field
                                  Models . . . . . . . . . . . . . . . . . 285--297
                   Bo Jiang and   
       Daniel R. Figueiredo and   
              Bruno Ribeiro and   
                    Don Towsley   On the Duration and Intensity of
                                  Competitions in Nonlinear Pólya Urn
                                  Processes with Fitness . . . . . . . . . 299--310
        Matthieu Jonckheere and   
          Balakrishna J. Prabhu   Asymptotics of Insensitive Load
                                  Balancing and Blocking Phases  . . . . . 311--322
             Kevin K. Chang and   
           Abhijith Kashyap and   
               Hasan Hassan and   
              Saugata Ghose and   
                Kevin Hsieh and   
               Donghyuk Lee and   
                 Tianshi Li and   
         Gennady Pekhimenko and   
                Samira Khan and   
                     Onur Mutlu   Understanding Latency Variation in
                                  Modern DRAM Chips: Experimental
                                  Characterization, Analysis, and
                                  Optimization . . . . . . . . . . . . . . 323--336
                 Idan Yaniv and   
                    Dan Tsafrir   Hash, Don't Cache (the Page Table) . . . 337--350
                 Adwait Jog and   
               Onur Kayiran and   
          Ashutosh Pattnaik and   
         Mahmut T. Kandemir and   
                 Onur Mutlu and   
           Ravishankar Iyer and   
                   Chita R. Das   Exploiting Core Criticality for Enhanced
                                  GPU Performance  . . . . . . . . . . . . 351--363
              Lam M. Nguyen and   
           Alexander L. Stolyar   A Service System with Randomly Behaving
                                  On-demand Agents . . . . . . . . . . . . 365--366
           Stanko Novakovic and   
          Alexandros Daglis and   
            Edouard Bugnion and   
              Babak Falsafi and   
                     Boris Grot   An Analysis of Load Imbalance in
                                  Scale-out Data Serving . . . . . . . . . 367--368
                     Yi Cao and   
               Javad Nejati and   
             Pavan Maguluri and   
      Aruna Balasubramanian and   
                  Anshul Gandhi   Analyzing the Power Consumption of the
                                  Mobile Page Load . . . . . . . . . . . . 369--370
     Mubashir Adnan Qureshi and   
              Ajay Mahimkar and   
                   Lili Qiu and   
                   Zihui Ge and   
           Sarat Puthenpura and   
                 Nabeel Mir and   
                  Sanjeev Ahuja   Automated Test Location Selection For
                                  Cellular Network Upgrades  . . . . . . . 371--372
                 Wenjie Liu and   
                 Ping Huang and   
                   Kun Tang and   
                    Ke Zhou and   
                       Xubin He   CAR: a Compression-Aware Refresh
                                  Approach to Improve Memory Performance
                                  and Energy Efficiency  . . . . . . . . . 373--374
             Felix Poloczek and   
                   Florin Ciucu   Contrasting Effects of Replication in
                                  Parallel Systems: From Overload to
                                  Underload and Back . . . . . . . . . . . 375--376
                Benny Van Houdt   Explicit Back-off Rates for Achieving
                                  Target Throughputs in CSMA/CA Networks   377--379
                  Liang Liu and   
                Yating Wang and   
              Lance Fortnow and   
                     Jin Li and   
                         Jun Xu   Freestyle Dancing: Randomized Algorithms
                                  for Dynamic Storage Load-Balancing . . . 381--382
                 Xiaoqi Ren and   
               Palma London and   
                 Juba Ziani and   
                   Adam Wierman   Joint Data Purchasing and Data Placement
                                  in a Geo-Distributed Data Market . . . . 383--384
         Arpan Mukhopadhyay and   
           Ravi R. Mazumdar and   
                      Rahul Roy   Majority Rule Based Opinion Dynamics
                                  with Biased and Stubborn Agents  . . . . 385--386
  Vamseedhar Reddyvari Raja and   
            Vinod Ramaswamy and   
        Srinivas Shakkottai and   
              Vijay Subramanian   Mean Field Equilibria of Pricing Games
                                  in Internet Marketplaces . . . . . . . . 387--388
            Mansour Shafaei and   
 Mohammad Hossein Hajkazemi and   
            Peter Desnoyers and   
               Abutalib Aghayev   Modeling SMR Drive Performance . . . . . 389--390
             Richard Combes and   
                 Habib Sidi and   
                 Salah Elayoubi   Multipath Streaming: Fundamental Limits
                                  and Efficient Algorithms . . . . . . . . 391--392
         Alireza Shekaramiz and   
             Jorg Liebeherr and   
                 Almut Burchard   Network Calculus Analysis of a Feedback
                                  System with Random Service . . . . . . . 393--394
                Adnan Ahmed and   
              Zubair Shafiq and   
                  Amir Khakpour   QoE Analysis of a Large-Scale Live Video
                                  Streaming Event  . . . . . . . . . . . . 395--396
                   Sen Yang and   
                   Bill Lin and   
                         Jun Xu   Safe Randomized Load-Balanced Switching
                                  by Diffusing Extra Loads . . . . . . . . 397--398
                   Avik Ray and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Searching For A Single Community in a
                                  Graph  . . . . . . . . . . . . . . . . . 399--400
                Daiping Liu and   
                   Xing Gao and   
              Mingwei Zhang and   
                   Haining Wang   Shoot for the Moon and You Will Never
                                  Miss: Characterizing and Detecting
                                  Aimbots in Online Games  . . . . . . . . 401--402
      Anastasios Giovanidis and   
              Apostolos Avranas   Spatial Multi-LRU Caching for Wireless
                                  Networks with Coverage Overlaps  . . . . 403--405
         Iyswarya Narayanan and   
                    Di Wang and   
             Myeongjae Jeon and   
              Bikash Sharma and   
            Laura Caulfield and   
      Anand Sivasubramaniam and   
                 Ben Cutler and   
                    Jie Liu and   
         Badriddine Khessib and   
                  Kushagra Vaid   SSD Failures in Datacenters: What, When
                                  and Why? . . . . . . . . . . . . . . . . 407--408
            Kristen Gardner and   
             Samuel Zbarsky and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   The Power of $d$ Choices for Redundancy  409--410
                   Hui Wang and   
                   Peter Varman   Time-Based Bandwidth Allocation for
                                  Heterogeneous Storage  . . . . . . . . . 411--413
                   Wei Wang and   
                 Baochun Li and   
                  Ben Liang and   
                         Jun Li   Towards Multi-Resource Fair Allocation
                                  with Placement Constraints . . . . . . . 415--416
                   Hong Xie and   
           Richard T. B. Ma and   
                 John C. S. Lui   Trading Discount for Reputation?: On the
                                  Design and Analysis of E-Commerce
                                  Discount Mechanisms  . . . . . . . . . . 417--418

ACM SIGMETRICS Performance Evaluation Review
Volume 44, Number 2, September, 2016

             Mark S. Squillante   Estimation of the traffic intensity in a
                                  piecewise-stationary Mt/Gt/1 queue with
                                  probing  . . . . . . . . . . . . . . . . 3--5
                   Nicolas Gast   Construction of Lyapunov Functions via
                                  Relative Entropy with Application to
                                  Caching  . . . . . . . . . . . . . . . . 6--8
        Guilherme Domingues and   
   Edmundo de Souza e Silva and   
           Rosa Leão and   
     Daniel Menasché and   
                    Don Towsley   Search and Placement in Tiered Cache
                                  Networks . . . . . . . . . . . . . . . . 9--11
                 Kechao Cai and   
                   Hong Xie and   
                 John C. S. Lui   Generalization of Information Spreading
                                  Forensics via Sequential Dependent
                                  Snapshots  . . . . . . . . . . . . . . . 12--14
                   Erol Gelenbe   Agreement in Spins and Social Networks   15--17
                Josu Doncel and   
               Nicolas Gast and   
                   Bruno Gaujal   Are Mean-field Games the Limits of
                                  Finite Stochastic Games? . . . . . . . . 18--20
         Eugene A. Feinberg and   
                      Yan Liang   Structure of Optimal Solutions to
                                  Periodic-Review Total-Cost Stochastic
                                  Inventory Control Problems . . . . . . . 21--23
          Christine Fricker and   
          Fabrice Guillemin and   
                Philippe Robert   Analysis of Downgrading for Resource
                                  Allocation . . . . . . . . . . . . . . . 24--26
                Yingdong Lu and   
        Siva Theja Maguluri and   
         Mark S. Squillante and   
                    Chai Wah Wu   Risk-Based Dynamic Allocation of
                                  Computing Resources  . . . . . . . . . . 27--29
           Pavlos Sermpezis and   
       Xenofontas Dimitropoulos   Inter-domain SDN: Analysing the Effects
                                  of Routing Centralization on BGP
                                  Convergence Time . . . . . . . . . . . . 30--32
            Kristen Gardner and   
             Samuel Zbarsky and   
           Mark Velednitsky and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Understanding Response Time in the
                                  Redundancy-$d$ System  . . . . . . . . . 33--35
         Debankur Mukherjee and   
                  Sem Borst and   
      Johan van Leeuwaarden and   
                   Phil Whiting   Universality of Power-of-$d$ Load
                                  Balancing Schemes  . . . . . . . . . . . 36--38
                  S. Juneja and   
                   D. Manjunath   To Lounge or to Queue Up . . . . . . . . 39--41
           Alexander L. Stolyar   Large-scale Service Systems with Packing
                                  Constraints and Heterogeneous Servers    42--44
                      Y. Lu and   
             S. T. Maguluri and   
           M. S. Squillante and   
                         T. Suk   Delay-Optimal Scheduling for Some
                                  Input-Queued Switches  . . . . . . . . . 45--47
          Navid Azizan Ruhi and   
              Niangjun Chen and   
    Krishnamurthy Dvijotham and   
                   Adam Wierman   Opportunities for Price Manipulation by
                                  Aggregators in Electricity Markets . . . 49--51
              Joshua Comden and   
                Zhenhua Liu and   
                       Yue Zhao   Optimizing the Level of Commitment in
                                  Demand Response  . . . . . . . . . . . . 52--67
               Ruiting Zhou and   
                Zongpeng Li and   
                       Chuan Wu   An Emergency Demand Response Mechanism
                                  for Cloud Computing  . . . . . . . . . . 58--63
            Giovanni Neglia and   
              Matteo Sereno and   
               Giuseppe Bianchi   Geographical Load Balancing across Green
                                  Datacenters: a Mean Field Analysis . . . 64--69
        Alessandro Facchini and   
          Cristina Rottondi and   
              Giacomo Verticale   Emergence of Shared Behaviour in
                                  Distributed Scheduling Systems for
                                  Domestic Appliances  . . . . . . . . . . 70--75
              Claudio Rossi and   
             Manuel Gaetani and   
                 Antonio Defina   AURORA: an Energy Efficient Public
                                  Lighting IoT System for Smart Cities . . 76--81
            Mattia Dalmasso and   
                Michela Meo and   
                  Daniela Renga   Radio Resource Management for Improving
                                  Energy Self-sufficiency of Green Mobile
                                  Networks . . . . . . . . . . . . . . . . 82--87
                 Xiaoyi Fan and   
                  Feng Wang and   
                 Jiangchuan Liu   Boosting Service Availability for Base
                                  Stations of Cellular Networks by
                                  Event-driven Battery Profiling . . . . . 88--93
                Jianyuan Lu and   
                  Liang Liu and   
             Jun ``Jim'' Xu and   
                        Bin Liu   Toward Power-Efficient Backbone Routers  94--99

ACM SIGMETRICS Performance Evaluation Review
Volume 44, Number 3, December, 2016

                 Rahul Vaze and   
             Marceau Coupechoux   Online Budgeted Truthful Matching  . . . 3--6
               Yongwhan Lim and   
            Asuman Ozdaglar and   
           Alexander Teytelboym   Competitive Rumor Spread in Social
                                  Networks . . . . . . . . . . . . . . . . 7--14
                 Arpit Goel and   
               Vijay Kamble and   
        Siddhartha Banerjee and   
                    Ashish Goel   Network Formation of Coalition Loyalty
                                  Programs . . . . . . . . . . . . . . . . 15--20
                Reed Harder and   
                   Vikrant Vaze   Two-Stage Game Theoretic Modelling of
                                  Airline Frequency and Fare Competition   21--21
             Ashish R. Hota and   
            Harsha Honnappa and   
               Shreyas Sundaram   The Superposition-Traffic Game . . . . . 22--25
  Alexandre Reiffers-Masson and   
         Eduardo Hargreaves and   
               Eitan Altman and   
              Wouter Caarls and   
      Daniel S. Menasché   Timelines are Publisher-Driven Caches:
                                  Analyzing and Shaping Timeline Networks  26--29
                    Y. Shan and   
                C. Lo Prete and   
                 G. Kesidis and   
                   D. J. Miller   A simulation framework for uneconomic
                                  virtual bidding in day-ahead electricity
                                  markets: Short talk  . . . . . . . . . . 30--30
            Pierre L'Ecuyer and   
      Patrick Maillé and   
 Nicolás Stier-Moses and   
                   Bruno Tuffin   Search (Non-)Neutrality and Impact on
                                  Innovation: Short talk . . . . . . . . . 31--31
                    Qian Ma and   
              Jianwei Huang and   
                Tamer Basar and   
                     Ji Liu and   
                    Xudong Chen   Pricing for Sharing Economy with
                                  Reputation . . . . . . . . . . . . . . . 32--32
     J.-Ch. Grégoire and   
          Ang\`ele M. Hamel and   
                D. Marc Kilgour   Pricing for a Hybrid Delivery Model of
                                  Video Streaming  . . . . . . . . . . . . 33--36
       Angelos Antonopoulos and   
             Chiara Perillo and   
            Christos Verikoukis   Internet Service Providers vs.
                                  Over-the-Top Companies: Friends or Foes?
                                  --- Short talk . . . . . . . . . . . . . 37--37
                Chaolun Xia and   
                Saikat Guha and   
               S. Muthukrishnan   How Much is Your Attention Worth?:
                                  Analysis of Prices in LinkedIn
                                  Advertising Network --- Short talk . . . 38--38
         Thi Thu Han Nguyen and   
               Olivier Brun and   
          Balakrishna J. Prabhu   Performance of a fixed reward incentive
                                  scheme for two-hop DTNs with competing
                                  relays: Short talk . . . . . . . . . . . 39--39

ACM SIGMETRICS Performance Evaluation Review
Volume 44, Number 4, March, 2017

         Martijn Onderwater and   
            Gerard Hoekstra and   
                Rob van der Mei   Throughput Modeling of the IEEE MAC for
                                  Sensor Networks  . . . . . . . . . . . . 2--9
         Valeria Cardellini and   
            Vincenzo Grassi and   
        Francesco Lo Presti and   
                Matteo Nardelli   Optimal Operator Replication and
                                  Placement for Distributed Stream
                                  Processing Systems . . . . . . . . . . . 11--22
           Eugenio Gianniti and   
     Alessandro Maria Rizzi and   
          Enrico Barbierato and   
             Marco Gribaudo and   
                 Danilo Ardagna   Fluid Petri Nets for the Performance
                                  Evaluation of MapReduce and Spark
                                  Applications . . . . . . . . . . . . . . 23--36
            Francesco Longo and   
                Rahul Ghosh and   
              Vijay K. Naik and   
           Andrew J. Rindos and   
              Kishor S. Trivedi   An Approach for Resiliency
                                  Quantification of Large Scale Systems    37--48
             Claudia Canali and   
           Riccardo Lancellotti   Identifying Communication Patterns
                                  between Virtual Machines in
                                  Software-Defined Data Centers  . . . . . 49--56
          Francesco Bianchi and   
            Francesco Lo Presti   A Markov Reward based Resource-Latency
                                  Aware Heuristic for the Virtual Network
                                  Embedding Problem  . . . . . . . . . . . 57--68
         Lorenzo Donatiello and   
                 Gustavo Marfia   Analyzing and shaping the lifetime and
                                  the performance of barrier coverage
                                  sensor networks  . . . . . . . . . . . . 69--79
         Riccardo Pinciroli and   
            Salvatore Distefano   Characterization and Evaluation of
                                  Mobile Crowdsensing Performance and
                                  Energy Indicators  . . . . . . . . . . . 80--90
       Niccoló Totis and   
               Laura Follia and   
             Chiara Riganti and   
          Francesco Novelli and   
          Francesca Cordero and   
                  Marco Beccuti   Overcoming the lack of kinetic
                                  information in biochemical reactions
                                  networks . . . . . . . . . . . . . . . . 91--102


ACM SIGMETRICS Performance Evaluation Review
Volume 45, Number 1, June, 2017

                Leana Golubchik   Delay Scalings and Mean-Field Limits in
                                  Networked Systems  . . . . . . . . . . . 1--1
     Konstantin Avrachenkov and   
            Jasper Goseling and   
               Berksan Serbetci   A Low-Complexity Approach to Distributed
                                  Cooperative Caching with Geographic
                                  Constraints  . . . . . . . . . . . . . . 2--2
         Debankur Mukherjee and   
               Souvik Dhara and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Optimal Service Elasticity in
                                  Large-Scale Distributed Systems  . . . . 3--3
                  Long Gong and   
                  Paul Tune and   
                  Liang Liu and   
                   Sen Yang and   
                   Jun (Jim) Xu   Queue-Proportional Sampling: a Better
                                  Approach to Crossbar Scheduling for
                                  Input-Queued Switches  . . . . . . . . . 4--4
                  Xiaoen Ju and   
               Hani Jamjoom and   
                   Kang G. Shin   Hieroglyph: Locally-Sufficient Graph
                                  Processing via Compute-Sync-Merge  . . . 5--5
                  Lingda Li and   
                 Robel Geda and   
               Ari B. Hayes and   
                Yanhao Chen and   
           Pranav Chaudhari and   
              Eddy Z. Zhang and   
                  Mario Szegedy   A Simple Yet Effective Balanced Edge
                                  Partition Model for Parallel Computing   6--6
            Maxime C. Cohen and   
             Philipp Keller and   
             Vahab Mirrokni and   
         Morteza Zadimoghadddam   Overcommitment in Cloud Services Bin
                                  packing with Chance Constraints  . . . . 7--7
                 Alan Quach and   
              Zhongjie Wang and   
                    Zhiyun Qian   Investigation of the 2016 Linux TCP
                                  Stack Vulnerability at Scale . . . . . . 8--8
               Brandon Wang and   
                  Xiaoye Li and   
       Leandro P. de Aguiar and   
         Daniel S. Menasche and   
                  Zubair Shafiq   Characterizing and Modeling Patching
                                  Practices of Industrial Control Systems  9--9
                Sinong Wang and   
                    Ness Shroff   Security Game with Non-additive
                                  Utilities and Multiple Attacker
                                  Resources  . . . . . . . . . . . . . . . 10--10
            Anton Braverman and   
                  J. G. Dai and   
                    Xin Liu and   
                       Lei Ying   Fluid-Model-Based Car Routing for Modern
                                  Ridesharing Systems  . . . . . . . . . . 11--12
                Alan Kuhnle and   
                 Tianyi Pan and   
       Victoria G. Crawford and   
              Md Abdul Alim and   
                     My T. Thai   Pseudo-Separation for Assessment of
                                  Structural Vulnerability of a Network    13--14
                   Han Deng and   
                     I-Hong Hou   On the Capacity Requirement for
                                  Arbitrary End-to-End Deadline and
                                  Reliability Guarantees in Multi-hop
                                  Networks . . . . . . . . . . . . . . . . 15--16
                 Maotong Xu and   
              Sultan Alamro and   
                   Tian Lan and   
             Suresh Subramaniam   Optimizing Speculative Execution of
                                  Deadline-Sensitive Jobs in Cloud . . . . 17--18
          Mohammad A. Islam and   
                 Xiaoqi Ren and   
                Shaolei Ren and   
                   Adam Wierman   A Spot Capacity Market to Increase Power
                                  Infrastructure Utilization in
                                  Multi-Tenant Data Centers  . . . . . . . 19--20
                   Lin Yang and   
    Mohammad H. Hajiesmaili and   
                 Hanling Yi and   
                   Minghua Chen   Hour-Ahead Offering Strategies in
                                  Electricity Market for Power Producers
                                  with Storage and Intermittent Supply . . 21--22
                   Xing Gao and   
                   Zhang Xu and   
               Haining Wang and   
                      Li Li and   
                   Xiaorui Wang   Why ``Some'' Like It Hot Too: Thermal
                                  Attack on Data Centers . . . . . . . . . 23--24
              Joshua Comden and   
                Zhenhua Liu and   
                       Yue Zhao   Incentivizing Reliable Demand Response
                                  with Customers' Uncertainties and
                                  Capacity Planning  . . . . . . . . . . . 25--26
                Amin Jadidi and   
          Mohammad Arjomand and   
            Mahmut Kandemir and   
                      Chita Das   A Study on Performance and Power
                                  Efficiency of Dense Non-Volatile Caches
                                  in Multi-Core Systems  . . . . . . . . . 27--28
          Mehrnoosh Shafiee and   
                  Javad Ghaderi   Scheduling Coflows in Datacenter
                                  Networks: Improved Bound for Total
                                  Weighted Completion Time . . . . . . . . 29--30
                  Qin Xiong and   
                     Fei Wu and   
                Zhonghai Lu and   
                    Yue Zhu and   
                   You Zhou and   
                 Yibing Chu and   
             Changsheng Xie and   
                     Ping Huang   Characterizing $3$D Floating Gate NAND
                                  Flash  . . . . . . . . . . . . . . . . . 31--32
               Yeon-sup Lim and   
             Erich M. Nahum and   
                Don Towsley and   
             Richard J. Gibbens   ECF: an MPTCP Path Scheduler to Manage
                                  Heterogeneous Paths  . . . . . . . . . . 33--34
         Mehmet Fatih Aktas and   
                  Elie Najm and   
                 Emina Soljanin   Simplex Queues for Hot-Data Download . . 35--36
            Siddharth Singh and   
               Vedant Nanda and   
              Rijurekha Sen and   
               Sohaib Ahmad and   
           Satadal Sengupta and   
            Amreesh Phokeer and   
          Zaid Ahmed Farooq and   
         Taslim Arefin Khan and   
   Ponnurangam Kumaragaguru and   
           Ihsan Ayyub Qazi and   
             David Choffnes and   
             Krishna P. Gummadi   An Empirical Analysis of Facebook's Free
                                  Basics . . . . . . . . . . . . . . . . . 37--38
                 Jorge Mena and   
              Peter Bankole and   
                    Mario Gerla   Multipath TCP on a VANET: a Performance
                                  Study  . . . . . . . . . . . . . . . . . 39--40
                      Ye Yu and   
         Djamal Belazzougui and   
                  Chen Qian and   
                      Qin Zhang   A Fast, Small, and Dynamic Forwarding
                                  Information Base . . . . . . . . . . . . 41--42
                    Ning Wu and   
                 Yingjie Bi and   
             Nithin Michael and   
                    Ao Tang and   
                 John Doyle and   
                  Nikolai Matni   HFTraC: High-Frequency Traffic Control   43--44
                Soumya Basu and   
         Aditya Sundarrajan and   
              Javad Ghaderi and   
          Sanjay Shakkottai and   
               Ramesh Sitaraman   Adaptive TTL-Based Caching for Content
                                  Delivery . . . . . . . . . . . . . . . . 45--46
                 Vahab Mirrokni   Online Optimization for Markets and the
                                  Cloud: Theory and Practice . . . . . . . 47--48
                       Lei Ying   Stein's Method for Mean-Field
                                  Approximations in Light and Heavy
                                  Traffic Regimes  . . . . . . . . . . . . 49--49
                   Nicolas Gast   Expected Values Estimated via Mean-Field
                                  Approximation are $ 1 / N $-Accurate:
                                  Extended Abstract  . . . . . . . . . . . 50--50
                    Wen Sun and   
     Véronique Simon and   
    Sébastien Monnet and   
            Philippe Robert and   
                    Pierre Sens   Analysis of a Stochastic Model of
                                  Replication in Large Distributed Storage
                                  Systems: a Mean-Field Approach . . . . . 51--51
             Kevin K. Chang and   
Abdullah Giray Yaglikçi and   
              Saugata Ghose and   
             Aditya Agrawal and   
       Niladrish Chatterjee and   
           Abhijith Kashyap and   
               Donghyuk Lee and   
              Mike O'Connor and   
               Hasan Hassan and   
                     Onur Mutlu   Understanding Reduced-Voltage Operation
                                  in Modern DRAM Devices: Experimental
                                  Characterization, Analysis, and
                                  Mechanisms . . . . . . . . . . . . . . . 52--52
                 Wonil Choi and   
          Mohammad Arjomand and   
             Myoungsoo Jung and   
             Mahmut T. Kandemir   Exploiting Data Longevity for Enhancing
                                  the Lifetime of Flash-based Storage
                                  Class Memory . . . . . . . . . . . . . . 53--53
               Donghyuk Lee and   
                Samira Khan and   
        Lavanya Subramanian and   
              Saugata Ghose and   
    Rachata Ausavarungnirun and   
         Gennady Pekhimenko and   
             Vivek Seshadri and   
                     Onur Mutlu   Design-Induced Latency Variation in
                                  Modern DRAM Chips: Characterization,
                                  Analysis, and Latency Reduction
                                  Mechanisms . . . . . . . . . . . . . . . 54--54
            Mathias Gibbens and   
               Chris Gniady and   
                     Lei Ye and   
                 Beichuan Zhang   Hadoop on Named Data Networking:
                                  Experience and Results . . . . . . . . . 55--55
                 Cheng Wang and   
           Bhuvan Urgaonkar and   
             Neda Nasiriani and   
                 George Kesidis   Using Burstable Instances in the Public
                                  Cloud: Why, When and How?  . . . . . . . 56--56
Shaileshh Bojja Venkatakrishnan and   
               Giulia Fanti and   
               Pramod Viswanath   Dandelion: Redesigning the Bitcoin
                                  Network for Anonymity  . . . . . . . . . 57--57
                 Michael Jordan   On Gradient-Based Optimization:
                                  Accelerated, Distributed, Asynchronous
                                  and Stochastic . . . . . . . . . . . . . 58--58
             Prateek Sharma and   
                David Irwin and   
                Prashant Shenoy   Portfolio-driven Resource Management for
                                  Transient Cloud Servers  . . . . . . . . 59--59
                Zijun Zhang and   
                Zongpeng Li and   
                       Chuan Wu   Optimal Posted Prices for Online Cloud
                                  Resource Allocation  . . . . . . . . . . 60--60
                   Xin Wang and   
           Richard T. B. Ma and   
                     Yinlong Xu   On Optimal Two-Sided Pricing of
                                  Congested Networks . . . . . . . . . . . 61--61
                     Sewoong Oh   Matrix Factorization at the Frontier of
                                  Non-convex Optimizations: Abstract for
                                  SIGMETRICS 2017 Rising Star Award Talk   62--62
             Hung T. Nguyen and   
              Tri P. Nguyen and   
                  Tam N. Vu and   
                  Thang N. Dinh   Outward Influence and Cascade Size
                                  Estimation in Billion-scale Networks . . 63--63
                Giuliano Casale   Accelerating Performance Inference over
                                  Closed Systems by Asymptotic Methods . . 64--64
            Steffen Bondorf and   
              Paul Nikolaus and   
                Jens B. Schmitt   Quality and Cost of Deterministic
                                  Network Calculus: Design and Evaluation
                                  of an Accurate and Fast Analysis . . . . 65--65
               David Formby and   
                Anwar Walid and   
                   Raheem Beyah   A Case Study in Power Substation Network
                                  Dynamics . . . . . . . . . . . . . . . . 66--66
                   You Zhou and   
                  Yian Zhou and   
                   Min Chen and   
                   Shigang Chen   Persistent Spread Measurement for Big
                                  Network Data Based on Register
                                  Intersection . . . . . . . . . . . . . . 67--67
                     Yi Cao and   
               Javad Nejati and   
           Muhammad Wajahat and   
      Aruna Balasubramanian and   
                  Anshul Gandhi   Deconstructing the Energy Consumption of
                                  the Mobile Page Load . . . . . . . . . . 68--68
           Richard T. B. Ma and   
                   Vishal Misra   Routing Money, Not Packets: a Tutorial
                                  on Internet Economics  . . . . . . . . . 69--70

ACM SIGMETRICS Performance Evaluation Review
Volume 45, Number 2, 2017

             Mark S. Squillante   On the Optimality of Reflection Control,
                                  with Production-Inventory Applications   3--5
         Eugene A. Feinberg and   
                Jefferson Huang   Strongly Polynomial Algorithms for
                                  Transient and Average-Cost MDPs  . . . . 6--8
                    Gauri Joshi   Boosting Service Capacity via Adaptive
                                  Task Replication . . . . . . . . . . . . 9--11
         Mehmet Fatih Aktas and   
                   Pei Peng and   
                 Emina Soljanin   Effective Straggler Mitigation: Which
                                  Clones Should Attack and When? . . . . . 12--14
                Weixuan Lin and   
            John Z. F. Pang and   
               Eilyan Bitar and   
                   Adam Wierman   Networked Cournot Competition in
                                  Platform Markets: Access Control and
                                  Efficiency Loss  . . . . . . . . . . . . 15--17
                Tyler Maxey and   
               Hakjin Chung and   
               Hyun-Soo Ahn and   
                 Rhonda Righter   When is Anarchy Beneficial?  . . . . . . 18--20
        Nitish K. Panigrahy and   
                    Jian Li and   
                    Don Towsley   Hit Rate vs. Hit Probability Based Cache
                                  Utility Maximization . . . . . . . . . . 21--23
                   Bo Jiang and   
              Philippe Nain and   
                    Don Towsley   LRU Cache under Stationary Requests  . . 24--26
                Gautam Goel and   
              Niangjun Chen and   
                   Adam Wierman   Thinking Fast and Slow: Optimization
                                  Decomposition Across Timescales  . . . . 27--29
               Palma London and   
              Niangjun Chen and   
                 Shai Vardi and   
                   Adam Wierman   Distributed Optimization via Local
                                  Computation Algorithms . . . . . . . . . 30--32
         Angelos Aveklouris and   
             Yorie Nakahira and   
              Maria Vlasiou and   
                     Bert Zwart   Electric vehicle charging: a queueing
                                  approach . . . . . . . . . . . . . . . . 33--35
                 Ziv Scully and   
               Guy Blelloch and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Optimally Scheduling Jobs with Multiple
                                  Tasks  . . . . . . . . . . . . . . . . . 36--38
          Yuliy Baryshnikov and   
                   Abram Magner   Large Deviations for Increasing
                                  Subsequences of Permutations and a
                                  Concurrency Application  . . . . . . . . 39--41
              Arnab Ganguly and   
             Kavita Ramanan and   
            Philippe Robert and   
                        Wen Sun   A Large-Scale Network with Moving
                                  Servers  . . . . . . . . . . . . . . . . 42--44
                Sergey Foss and   
           Alexander L. Stolyar   Join-Idle-Queue system with general
                                  service times: Large-scale limit of
                                  stationary distributions . . . . . . . . 45--47
                Yingdong Lu and   
         Mark S. Squillante and   
                    Chai Wah Wu   Nearly Completely Decomposable
                                  Epidemic-Like Stochastic Processes with
                                  Time-Varying Behavior  . . . . . . . . . 48--50
              Joshua Comden and   
                Zhenhua Liu and   
                       Yue Zhao   Distributed Algorithm Design for
                                  Probabilistic Demand Response  . . . . . 52--54
    Mohammad H. Hajiesmaili and   
               Minghua Chen and   
            Enrique Mallada and   
                   Chi-Kin Chau   Summary of Recent Results: Crowd-Sourced
                                  Storage-Assisted Demand Response in
                                  Microgrids . . . . . . . . . . . . . . . 55--57
                  Tan N. Le and   
                  Jie Liang and   
                Zhenhua Liu and   
        Ramesh K. Sitaraman and   
          Jayakrishnan Nair and   
                  Bong Jun Choi   Optimal Energy Procurement for
                                  Geo-distributed Data Centers in
                                  Multi-timescale Electricity Markets  . . 58--63
                   Wei Wang and   
                     Nanpeng Yu   Phase Balancing in Power Distribution
                                  Network with Data Center . . . . . . . . 64--69
                     Hitoshi Oi   A Case Study of Energy Efficiency on a
                                  Heterogeneous Multi-Processor  . . . . . 70--72
                 Qiang Wang and   
                    Xiaowen Chu   GPGPU Power Estimation with Core and
                                  Memory Frequency Scaling . . . . . . . . 73--78
                  Dong Chen and   
                    David Irwin   Black-box Solar Performance Modeling:
                                  Comparing Physical, Machine Learning,
                                  and Hybrid Approaches  . . . . . . . . . 79--84
              Pengcheng You and   
                Youxian Sun and   
                  John Pang and   
                 Steven Low and   
                   Minghua Chen   Battery Swapping Assignment for Electric
                                  Vehicles: a Bipartite Matching Approach  85--87
              Thinh T. Doan and   
            Subhonmesh Bose and   
                Carolyn L. Beck   Distributed Lagrangian Method for
                                  Tie-Line Scheduling in Power Grids under
                                  Uncertainty  . . . . . . . . . . . . . . 88--90
          Mohammad A. Islam and   
                Shaolei Ren and   
                   Adam Wierman   A First Look at Power Attacks in
                                  Multi-Tenant Data Centers  . . . . . . . 91--93
            John Z. F. Pang and   
                  Linqi Guo and   
                  Steven H. Low   Load-side Frequency Regulation with
                                  Limited Control Coverage . . . . . . . . 94--96
                 Andjelka Kelic   Interdependencies in Critical
                                  Infrastructure Modeling  . . . . . . . . 99--102
                  Linqi Guo and   
                 Chen Liang and   
                  Steven H. Low   Monotonicity Properties and Spectral
                                  Characterization of Power Redistribution
                                  in Cascading Failures  . . . . . . . . . 103--106
          Jorik Oostenbrink and   
               Fernando Kuipers   Computing the Impact of Disasters on
                                  Networks . . . . . . . . . . . . . . . . 107--110
               Saleh Soltan and   
                    Gil Zussman   Algorithms for Power Grid State
                                  Estimation after Cyber-Physical Attacks  111--114
           Daniel Bienstock and   
                  Mauro Escobar   Computing undetectable attacks on power
                                  grids  . . . . . . . . . . . . . . . . . 115--118
       George Stergiopoulos and   
           Evangelos Valvis and   
     Foivos Anagnou-Misyris and   
               Nick Bozovic and   
             Dimitris Gritzalis   Interdependency analysis of junctions
                                  for congestion mitigation in
                                  Transportation Infrastructures . . . . . 119--124
                Juntao Chen and   
             Corinne Touati and   
                    Quanyan Zhu   A Dynamic Game Analysis and Design of
                                  Infrastructure Network Protection and
                                  Recovery: 125  . . . . . . . . . . . . . 128
               Jianguo Ding and   
                Yacine Atif and   
             Sten F. Andler and   
    Birgitta Lindström and   
               Manfred Jeusfeld   CPS-based Threat Modeling for Critical
                                  Infrastructure Protection  . . . . . . . 129--132

ACM SIGMETRICS Performance Evaluation Review
Volume 45, Number 3, December, 2017

                     Xunyu Zhou   Who Are I: Intrapersonal Conflicts in
                                  Performance Measure and Control  . . . . 1--1
            Ali Yekkehkhany and   
             Avesta Hojjati and   
        Mohammad H. Hajiesmaili   GB-PANDAS: Throughput and heavy-traffic
                                  optimality analysis for affinity
                                  scheduling . . . . . . . . . . . . . . . 2--14
           Diego Goldsztajn and   
            Andres Ferragut and   
          Fernando Paganini and   
            Matthieu Jonckheere   Controlling the number of active
                                  instances in a cloud environment . . . . 15--20
                    Gauri Joshi   Synergy via Redundancy: Boosting Service
                                  Capacity with Adaptive Replication . . . 21--28
                        Ting He   Distributed Link Anomaly Detection via
                                  Partial Network Tomography . . . . . . . 29--42
        Diman Zad Tootaghaj and   
                    Ting He and   
                Thomas La Porta   Parsimonious Tomography: Optimizing
                                  Cost-Identifiability Trade-off for
                                  Probing-based Network Monitoring . . . . 43--55
                Bart Jansen and   
            Timothy Goodwin and   
                Varun Gupta and   
           Fernando Kuipers and   
                    Gil Zussman   Performance Evaluation of WebRTC-based
                                  Video Conferencing . . . . . . . . . . . 56--68
                 S. B. Moka and   
                  S. Juneja and   
               M. R. H. Mandjes   Analysis of Perfect Sampling Methods for
                                  Hard-sphere Models . . . . . . . . . . . 69--75
         Alexandre Hollocou and   
              Thomas Bonald and   
                   Marc Lelarge   Multiple Local Community Detection . . . 76--83
           Yuli Baryshnikov and   
                   Abram Magner   Large Deviations for Increasing
                                  Subsequences of Permutations and a
                                  Concurrency Application  . . . . . . . . 84--89
                Sujay Bhatt and   
           Vikram Krishnamurthy   Incentivized Information Fusion with
                                  Social Sensors . . . . . . . . . . . . . 90--95
                  Emmanuel Abbe   Learning from graphical data . . . . . . 96--96
                Fengyou Sun and   
                   Yuming Jiang   A Statistical Property of Wireless
                                  Channel Capacity: Theory and Application 97--108
                  F. Cecchi and   
           P. M. Van de Ven and   
                      S. Shneer   Mean-field limits for multi-hop
                                  random-access networks . . . . . . . . . 109--122
                  F. Cecchi and   
                S. C. Borst and   
   J. S. H. van Leeuwaarden and   
                  P. A. Whiting   Spatial Mean-Field Limits for
                                  Ultra-Dense Random-Access Networks . . . 123--136
                  S. Juneja and   
                     N. Shimkin   On the Computation of Dynamic User
                                  Equilibrium in the Multiclass Transient
                                  Fluid Queue  . . . . . . . . . . . . . . 137--142
               Miklos Telek and   
                Benny Van Houdt   Response Time Distribution of a Class of
                                  Limited Processor Sharing Queues . . . . 143--155
                      Y. C. Tay   A technique to estimate a system's
                                  asymptotic delay and throughput  . . . . 156--159
                Yingdong Lu and   
         Mark S. Squillante and   
                    Chai Wah Wu   Epidemic-Like Stochastic Processes with
                                  Time-Varying Behavior: Structural
                                  Properties and Asymptotic Limits . . . . 160--166
             Zaid Allybokus and   
     Konstantin Avrachenkov and   
Jérémie Leguay and   
                  Lorenzo Maggi   Lower Bounds for the Fair Resource
                                  Allocation Problem . . . . . . . . . . . 167--173
                 Ruidi Chen and   
            Ioannis Paschalidis   Outlier Detection Using Robust
                                  Optimization with Uncertainty Sets
                                  Constructed from Risk Measures . . . . . 174--179
               Jiankui Yang and   
               David D. Yao and   
                   Heng-Qing Ye   On the Optimality of Reflection Control,
                                  with Production-Inventory Applications   180--183
               Albert Greenberg   Azure Networking . . . . . . . . . . . . 184--184
                  Tan N. Le and   
                  Jie Liang and   
                Zhenhua Liu and   
        Ramesh K. Sitaraman and   
          Jayakrishnan Nair and   
                  Bong Jun Choi   Optimal Energy Procurement for
                                  Geo-distributed Data Centers in
                                  Multi-timescale Electricity Markets  . . 185--197
               Hale Cetinay and   
               Saleh Soltan and   
        Fernando A. Kuipers and   
                Gil Zussman and   
               Piet Van Mieghem   Analyzing Cascading Failures in Power
                                  Grids under the AC and DC Power Flow
                                  Models . . . . . . . . . . . . . . . . . 198--203
            Eleonora Deiana and   
               Guy Latouche and   
             Marie-Ange Remiche   Fluid flow model for energy-aware server
                                  performance evaluation . . . . . . . . . 204--209
              Debasis Mitra and   
                     Qiong Wang   Management Strategies for Industrial
                                  Laboratories with Knowledge Memory . . . 210--216
                      Y. Lu and   
             S. T. Maguluri and   
           M. S. Squillante and   
                     T. Suk and   
                          X. Wu   Optimal Energy Procurement for
                                  Geo-distributed Data Centers in
                                  Multi-timescale Electricity Markets  . . 217--223
         Mehmet Fatih Aktas and   
                   Pei Peng and   
                 Emina Soljanin   Straggler Mitigation by Delayed Relaunch
                                  of Tasks . . . . . . . . . . . . . . . . 224--231
                 Weina Wang and   
        Siva Theja Maguluri and   
                 R. Srikant and   
                       Lei Ying   Heavy-Traffic Delay Insensitivity in
                                  Connection-Level Models of Data Transfer
                                  with Proportionally Fair Bandwidth
                                  Sharing  . . . . . . . . . . . . . . . . 232--245
            Giuliano Casale and   
           Giuseppe Serazzi and   
                      Lulai Zhu   Performance Evaluation with Java
                                  Modelling Tools: a Hands-on Introduction 246--247
              Giacomo Nannicini   Straggler Mitigation by Delayed Relaunch
                                  of Tasks . . . . . . . . . . . . . . . . 248--248
        Siva Theja Maguluri and   
                 R. Srikant and   
                     Weina Wang   The Drift Method for Heavy Traffic
                                  Limits, with Applications in Data
                                  Centers and Networks . . . . . . . . . . 249--249
            Anton Braverman and   
                        Jim Dai   Stein's Method for Steady-State
                                  Approximations: Error Bounds and
                                  Engineering Solutions  . . . . . . . . . 250--250

ACM SIGMETRICS Performance Evaluation Review
Volume 45, Number 4, March, 2018

     Konstantin Avrachenkov and   
                    Tejas Bodas   On the equivalence between multiclass
                                  processor sharing and random order
                                  scheduling policies  . . . . . . . . . . 2--6
                 Ranjan Pal and   
            Leana Golubchik and   
       Konstantinos Psounis and   
                        Pan Hui   Improving Cyber-Security via Profitable
                                  Insurance Markets  . . . . . . . . . . . 7--15
                   Vishal Misra   Session details: Performance Evaluation
                                  Review . . . . . . . . . . . . . . . . . 


ACM SIGMETRICS Performance Evaluation Review
Volume 46, Number 1, June, 2018

                        Jim Dai   Steady-state Approximations: Achievement
                                  Lecture  . . . . . . . . . . . . . . . . 1--1
        Siddhartha Banerjee and   
               Yash Kanoria and   
                    Pengyu Qian   State Dependent Control of Closed
                                  Queueing Networks  . . . . . . . . . . . 2--4
               Giulia Fanti and   
Shaileshh Bojja Venkatakrishnan and   
               Surya Bakshi and   
              Bradley Denby and   
            Shruti Bhargava and   
              Andrew Miller and   
               Pramod Viswanath   Dandelion++: Lightweight Cryptocurrency
                                  Networking with Formal Anonymity
                                  Guarantees . . . . . . . . . . . . . . . 5--7
              Eliav Buchnik and   
                    Edith Cohen   Bootstrapped Graph Diffusions: Exposing
                                  the Power of Nonlinearity  . . . . . . . 8--10
           Jessica Hoffmann and   
          Constantine Caramanis   The Cost of Uncertainty in Curing
                                  Epidemics  . . . . . . . . . . . . . . . 11--13
Thibault Séjourné and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   The Price of Fragmentation in
                                  Mobility-on-Demand Services  . . . . . . 14--16
          Muhammad J. Amjad and   
                  Devavrat Shah   Censored Demand Estimation in Retail . . 17--19
             Margaret Martonosi   New Metrics and Models for a Post-ISA
                                  Era: Managing Complexity and Scaling
                                  Performance in Heterogeneous Parallelism
                                  and Internet-of-Things . . . . . . . . . 20--20
                  Sem Borst and   
                Martin Zubeldia   Delay Scaling in Many-Sources Wireless
                                  Networks without Queue State Information 21--23
           Daniel S. Berger and   
            Nathan Beckmann and   
             Mor Harchol-Balter   Practical Bounds on Optimal Caching with
                                  Variable Object Sizes  . . . . . . . . . 24--26
                   Jian Tan and   
               Guocong Quan and   
                   Kaiyi Ji and   
                    Ness Shroff   On Resource Pooling and Separation for
                                  LRU Caching  . . . . . . . . . . . . . . 27--27
                   Lin Yang and   
            Wing Shing Wong and   
        Mohammad H. Hajiesmaili   An Optimal Randomized Online Algorithm
                                  for QoS Buffer Management  . . . . . . . 28--30
              Qingkai Liang and   
                  Eytan Modiano   Minimizing Queue Length Regret Under
                                  Adversarial Network Models . . . . . . . 31--32
             Rupert Freeman and   
         Seyed Majid Zahedi and   
           Vincent Conitzer and   
                Benjamin C. Lee   Dynamic Proportional Sharing: a
                                  Game-Theoretic Approach  . . . . . . . . 33--35
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   SOAP: One Clean Analysis of All
                                  Age-Based Scheduling Policies  . . . . . 36--38
                Arjun Anand and   
             Gustavo de Veciana   A Whittle's Index Based Approach for QoE
                                  Optimization in Wireless Networks  . . . 39--39
                  Jon Kleinberg   Inherent Trade-Offs in Algorithmic
                                  Fairness . . . . . . . . . . . . . . . . 40--40
                   Lin Yang and   
                   Lei Deng and   
    Mohammad H. Hajiesmaili and   
                  Cheng Tan and   
                Wing Shing Wong   An Optimal Algorithm for Online
                                  Non-Convex Learning  . . . . . . . . . . 41--43
             Santiago Duran and   
              Ina Maria Verloop   Asymptotic Optimal Control of
                                  Markov-Modulated Restless Bandits  . . . 44--46
           Stefan Magureanu and   
        Alexandre Proutiere and   
            Marcus Isaksson and   
                    Boxun Zhang   Online Learning of Optimally Diverse
                                  Rankings . . . . . . . . . . . . . . . . 47--49
     Mohammad Sadegh Talebi and   
            Alexandre Proutiere   Learning Proportionally Fair Allocations
                                  with Low Regret  . . . . . . . . . . . . 50--52
                Donggyu Yun and   
               Sumyeong Ahn and   
        Alexandre Proutiere and   
                Jinwoo Shin and   
                        Yung Yi   Multi-armed Bandit with Additional
                                  Observations . . . . . . . . . . . . . . 53--55
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Learning in Weakly Coupled Markov
                                  Decision Processes: a Convergence Time
                                  Study  . . . . . . . . . . . . . . . . . 56--58
              Pengfei Zheng and   
                Benjamin C. Lee   Hound: Causal Learning for
                                  Datacenter-scale Straggler Diagnosis . . 59--61
                  Vlad Nitu and   
             Aram Kocharyan and   
                Hannas Yaya and   
               Alain Tchana and   
            Daniel Hagimont and   
             Hrachya Astsatryan   Working Set Size Estimation Techniques
                                  in Virtualized Environments: One Size
                                  Does not Fit All . . . . . . . . . . . . 62--63
             Shenglin Zhang and   
                   Ying Liu and   
                Weibin Meng and   
                Zhiling Luo and   
                  Jiahao Bu and   
                   Sen Yang and   
              Peixian Liang and   
                    Dan Pei and   
                     Jun Xu and   
                Yuzhi Zhang and   
                    Yu Chen and   
                   Hui Dong and   
                Xianping Qu and   
                       Lei Song   PreFix: Switch Failure Prediction in
                                  Datacenter Networks  . . . . . . . . . . 64--66
       Konstantinos Psychas and   
                  Javad Ghaderi   On Non-Preemptive VM Scheduling in the
                                  Cloud  . . . . . . . . . . . . . . . . . 67--69
          Mohammad A. Islam and   
                Luting Yang and   
            Kiran Ranganath and   
                    Shaolei Ren   Why Some Like It Loud: Timing Power
                                  Attacks in Multi-tenant Data Centers
                                  Using an Acoustic Side Channel . . . . . 70--72
              Saba Ahmadian and   
                 Onur Mutlu and   
                  Hossein Asadi   ECI-Cache: a High-Endurance and
                                  Cost-Efficient I/O Caching Scheme for
                                  Virtualized Platforms  . . . . . . . . . 73--73
                Zhaowei Tan and   
                 Yuanjie Li and   
                  Qianru Li and   
               Zhehui Zhang and   
                  Zhehan Li and   
                      Songwu Lu   Supporting Mobile VR in LTE Networks:
                                  How Close Are We?  . . . . . . . . . . . 74--74
       Yvonne-Anne Pignolet and   
              Stefan Schmid and   
                  Gilles Tredan   Tomographic Node Placement Strategies
                                  and the Impact of the Routing Model  . . 75--77
          Christina Vlachou and   
        Ioannis Pefkianakis and   
                    Kyu-Han Kim   LTERadar: Towards LTE-Aware Wi-Fi Access
                                  Points . . . . . . . . . . . . . . . . . 78--80
                Alan Kuhnle and   
       Victoria G. Crawford and   
                     My T. Thai   Network Resilience and the
                                  Length-Bounded Multicut Problem:
                                  Reaching the Dynamic Billion-Scale with
                                  Guarantees . . . . . . . . . . . . . . . 81--83
                   Sen Yang and   
                     He Yan and   
                   Zihui Ge and   
               Dongmei Wang and   
                         Jun Xu   Predictive Impact Analysis for Designing
                                  a Resilient Cellular Backhaul Network    84--86
         Kausik Subramanian and   
             Loris D'Antoni and   
                  Aditya Akella   Synthesis of Fault-Tolerant Distributed
                                  Router Configurations  . . . . . . . . . 87--89
                   Kuang Xu and   
                   Se-Young Yun   Reinforcement with Fading Memories . . . 90--92
              Thinh T. Doan and   
            Carolyn L. Beck and   
                     R. Srikant   On the Convergence Rate of Distributed
                                  Gradient Methods for Finite-Sum
                                  Optimization under Communication Delays  93--95
                Yudong Chen and   
                    Lili Su and   
                     Jiaming Xu   Distributed Statistical Machine Learning
                                  in Adversarial Settings: Byzantine
                                  Gradient Descent . . . . . . . . . . . . 96--96
                 Mowei Wang and   
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
                   Dan Yang and   
                   Kai Chen and   
                        Jun Zhu   Neural Network Meets DCN: Traffic-driven
                                  Topology Adaptation with Deep Learning   97--99
             Tao B. Schardl and   
            Tyler Denniston and   
               Damon Doucet and   
        Bradley C. Kuszmaul and   
        I-Ting Angelina Lee and   
           Charles E. Leiserson   The CSI Framework for Compiler-Inserted
                                  Program Instrumentation  . . . . . . . . 100--102
                Akshay Jain and   
             Mahmoud Khairy and   
              Timothy G. Rogers   A Quantitative Evaluation of
                                  Contemporary GPU Simulation Methodology  103--105
                  Yixin Luo and   
              Saugata Ghose and   
                     Yu Cai and   
          Erich F. Haratsch and   
                     Onur Mutlu   Improving $3$D NAND Flash Memory
                                  Lifetime by Tolerating Early Retention
                                  Loss and Process Variation . . . . . . . 106--106
              Xiaomeng Chen and   
                 Jiayi Meng and   
              Y. Charlie Hu and   
               Maruti Gupta and   
           Ralph Hasholzner and   
Venkatesan Nallampatti Ekambaram and   
               Ashish Singh and   
    Srikathyayani Srikanteswara   A Fine-grained Event-based Modem Power
                                  Model for Enabling In-depth Modem Energy
                                  Drain Analysis . . . . . . . . . . . . . 107--109
              Saugata Ghose and   
Abdullah Giray Yaglikçi and   
               Raghav Gupta and   
               Donghyuk Lee and   
              Kais Kudrolli and   
             William X. Liu and   
               Hasan Hassan and   
             Kevin K. Chang and   
       Niladrish Chatterjee and   
             Aditya Agrawal and   
              Mike O'Connor and   
                     Onur Mutlu   What Your DRAM Power Models Are Not
                                  Telling You: Lessons from a Detailed
                                  Experimental Study . . . . . . . . . . . 110--110
          Oleksii Oleksenko and   
          Dmitrii Kuvaiskii and   
            Pramod Bhatotia and   
              Pascal Felber and   
                Christof Fetzer   Intel MPX Explained: a Cross-layer
                                  Analysis of the Intel MPX System Stack   111--112
               Nicolas Gast and   
                Benny Van Houdt   A Refined Mean Field Approximation . . . 113--113
              Tim Hellemans and   
                Benny Van Houdt   On the Power-of-d-choices with Least
                                  Loaded Server Selection  . . . . . . . . 114--114
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
          Kannan Srinivasan and   
                    Ness Shroff   Degree of Queue Imbalance: Overcoming
                                  the Limitation of Heavy-traffic Delay
                                  Optimality in Load Balancing Systems . . 115--115
              Benjamin Berg and   
         Jan-Pieter Dorsman and   
             Mor Harchol-Balter   Towards Optimality in Parallel Job
                                  Scheduling . . . . . . . . . . . . . . . 116--118
                   Bo Jiang and   
              Philippe Nain and   
                Don Towsley and   
                    Saikat Guha   On a Class of Stochastic Multilayer
                                  Networks . . . . . . . . . . . . . . . . 119--121
                   Yun Zeng and   
                   Jian Tan and   
              Cathy Honghui Xia   Fork and Join Queueing Networks with
                                  Heavy Tails: Scaling Dimension and
                                  Throughput Limit . . . . . . . . . . . . 122--124
              Thomas Bonald and   
        Céline Comte and   
                 Fabien Mathieu   Performance of Balanced Fairness in
                                  Resource Pools: a Recursive Approach . . 125--127
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
                    Yin Sun and   
                    Ness Shroff   Designing Low-Complexity Heavy-Traffic
                                  Delay-Optimal Load Balancing Schemes:
                                  Theory to Algorithms . . . . . . . . . . 128--128
                Sinong Wang and   
                    Ness Shroff   Towards Fast-Convergence, Low-Delay and
                                  Low-Complexity Network Optimization  . . 129--131
              Reza Aghajani and   
                 Xingjie Li and   
                 Kavita Ramanan   The PDE Method for the Analysis of
                                  Randomized Load Balancing Networks . . . 132--134
                   Sen Yang and   
                   Bill Lin and   
                         Jun Xu   Safe Randomized Load-Balanced Switching
                                  by Diffusing Extra Loads . . . . . . . . 135--137
         Debankur Mukherjee and   
                  Sem Borst and   
    Johan S. H. van Leeuwaarden   Asymptotically Optimal Load Balancing
                                  Topologies . . . . . . . . . . . . . . . 138--138
                    Nidhi Hegde   ACM Sigmetrics Performance Evaluation
                                  Review: a New Series on Diversity  . . . 139--139
            Leana Golubchik and   
                  Mallory Redel   Diversity in Faculty Recruiting: a WiSE
                                  Approach . . . . . . . . . . . . . . . . 140--142
                   Giulia Fanti   Session details: Load Balancing  . . . . 
                   Nicolas Gast   Session details: Resource Management II  
                Leana Golubchik   Session details: Learning I  . . . . . . 
             Mor Harchol-Balter   Session details: Scheduling I  . . . . . 
                Benny Van Houdt   Session details: Networking  . . . . . . 
            Siva Theja Maguluri   Session details: Emerging Areas  . . . . 
                   Vishal Misra   Session details: Resource Management I   
                    Shaolei Ren   Session details: Systems . . . . . . . . 
                  Devavrat Shah   Session details: Learning II . . . . . . 

ACM SIGMETRICS Performance Evaluation Review
Volume 46, Number 2, September, 2018

             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2018) . . . . . . . . . . 2--2
                   Hong Xie and   
                  John C. S Lui   A Markov Decision Process Approach to
                                  Analyze Discount & Reputation Trade-offs
                                  in E-commerce Systems  . . . . . . . . . 3--5
                Yudong Yang and   
               Vishal Misra and   
                 Dan Rubenstein   A Modeling Approach to Classifying
                                  Malicious Cloud Users via Shuffling  . . 6--8
               Isaac Grosof and   
                 Ziv Scully and   
             Mor Harchol-Balter   SRPT for Multiserver Systems . . . . . . 9--11
             Yorie Nakahira and   
            Andres Ferragut and   
                   Adam Wierman   Minimal-variance distributed scheduling
                                  under strict demands and deadlines . . . 12--14
                    Xin Liu and   
                       Lei Ying   A Simple Steady-State Analysis of Load
                                  Balancing Algorithms in the
                                  Sub-Halfin--Whitt Regime . . . . . . . . 15--17
         Debankur Mukherjee and   
              Alexander Stolyar   Join-Idle-Queue with Service Elasticity  18--20
                   Xiao Sun and   
                  Tan N. Le and   
         Mosharaf Chowdhury and   
                    Zhenhua Liu   Fair Allocation of Heterogeneous and
                                  Interchangeable Resources  . . . . . . . 21--23
                   Urtzi Ayesta   On redundancy-$d$ with cancel-on-start
                                  a.k.a Join-shortest-work ($d$) . . . . . 24--26
        Nitish K. Panigrahy and   
             Prithwish Basu and   
                Don Towsley and   
            Ananthram Swami and   
              Kevin S. Chan and   
                   Kin K. Leung   A queueing-theoretic model for resource
                                  allocation in one-dimensional
                                  distributed analytics network? . . . . . 27--29
               Nicolas Gast and   
              Diego Latella and   
                  Mieke Massink   A Refined Mean Field Approximation for
                                  Synchronous Population Processes . . . . 30--32
                Seva Shneer and   
              Alexander Stolyar   Stability of a standard decentralised
                                  medium access  . . . . . . . . . . . . . 33--35
     Anirudh Anirudh Sabnis and   
        Ramesh K. Sitaraman and   
                 Donald Towsley   OCCAM: an Optimization Based Approach to
                                  Network Inference  . . . . . . . . . . . 36--38
                 Junjie Qin and   
              Ram Rajagopal and   
                 Shai Vardi and   
                   Adam Wierman   Convex Prophet Inequalities  . . . . . . 39--41
                    Gautam Goel   Smoothed Online Convex Optimization via
                                  Online Balanced Descent  . . . . . . . . 42--44
            Soumyadip Ghosh and   
         Mark S. Squillante and   
               Ebisa D. Wollega   On Min-Max Optimization Over Large Data
                                  Sets . . . . . . . . . . . . . . . . . . 45--47
                 My T. Thai and   
                   Arun Sen and   
                       Arun Das   ACM SIGMETRICS International Workshop on
                                  Critical Infrastructure Network Security 48--49
               Saleh Soltan and   
         Mihalis Yannakakis and   
                    Gil Zussman   REACT to Cyber-Physical Attacks on Power
                                  grids (Extended Abstract)  . . . . . . . 50--51
                Linan Huang and   
                    Quanyan Zhu   Adaptive Strategic Cyber Defense for
                                  Advanced Persistent Threats in Critical
                                  Infrastructure Networks  . . . . . . . . 52--56
                  Linqi Guo and   
                 Chen Liang and   
           Alessandro Zocca and   
              Steven H. Low and   
                   Adam Wierman   Failure Localization in Power Systems
                                  via Tree Partitions  . . . . . . . . . . 57--61
          Jorik Oostenbrink and   
        Fernando A. Kuipers and   
           Poul E. Heegaard and   
               Bjarne E. Helvik   Evaluating Local Disaster Recovery
                                  Strategies . . . . . . . . . . . . . . . 62--66
            Hana Khamfroush and   
       Samuel Lofumbwa Iloo and   
        Mahshid Rahnamay-Naeini   Vulnerability of Interdependent
                                  Infrastructures Under Random Attacks . . 67--71
                 Andjelka Kelic   Cyber Risk in Critical Infrastructure    72--75
                Zhenhua Liu and   
        Ganesh Ananthanarayanan   Special Issue on the Work-in-Progress
                                  (WIP) session at the ACM SIGMETRICS 2018
                                  Conference . . . . . . . . . . . . . . . 76--76
                  Tan N. Le and   
                   Xiao Sun and   
         Mosharaf Chowdhury and   
                    Zhenhua Liu   BoPF: Mitigating the Burstiness-Fairness
                                  Tradeoff in Multi-Resource Clusters  . . 77--78
                  Linqi Guo and   
                 Chen Liang and   
           Alessandro Zocca and   
              Steven H. Low and   
                   Adam Wierman   Failure Localization in Power Systems
                                  via Tree Partitions  . . . . . . . . . . 79--80
      Daniela Hurtado-Lange and   
            Siva Theja Maguluri   A Novel View of the Drift: Method for
                                  Heavy Traffic Limits of Queueing Systems 81--82
                Yichen Ruan and   
                Carlee Joe-Wong   On the Economic Value of Vehicular
                                  Caching  . . . . . . . . . . . . . . . . 83--84
                 Junjie Qin and   
              Ram Rajagopal and   
                 Shai Vardi and   
                   Adam Wierman   Convex Prophet Inequalities  . . . . . . 85--86
                  Tan N. Le and   
                   Xiao Sun and   
         Mosharaf Chowdhury and   
                    Zhenhua Liu   AlloX: Allocation across Computing
                                  Resources for Hybrid CPU/GPU clusters    87--88
                Jinhang Zuo and   
               Xiaoxi Zhang and   
                Carlee Joe-Wong   Observe Before Play: Multi-armed Bandit
                                  with Pre-Observations  . . . . . . . . . 89--90
                Justin Wang and   
              Benjamin Berg and   
           Daniel S. Berger and   
                 Siddhartha Sen   Maximizing Page-Level Cache Hit Ratios
                                  in LargeWeb Services . . . . . . . . . . 91--92
                Zhihui Shao and   
          Mohammad A. Islam and   
                    Shaolei Ren   A First Look at Thermal Attacks in
                                  Multi-Tenant Data Centers  . . . . . . . 93--94
               Shan-Hsiang Shen   An Efficient Network Monitor for SDN
                                  Networks . . . . . . . . . . . . . . . . 95--96

ACM SIGMETRICS Performance Evaluation Review
Volume 46, Number 3, December, 2018

             Leandros Tassiulas   Optimizing the network edge for flexible
                                  service provisioning . . . . . . . . . . 1--1
                 Weina Wang and   
         Mor Harchol-Balter and   
              Haotian Jiang and   
         Alan Scheller-Wolf and   
                     R. Srikant   Delay Asymptotics and Bounds for
                                  Multi-Task Parallel Jobs . . . . . . . . 2--7
               Isaac Grosof and   
                 Ziv Scully and   
             Mor Harchol-Balter   SRPT for Multiserver Systems . . . . . . 8--9
                Xingyu Zhou and   
                   Jian Tan and   
                    Ness Shroff   Flexible Load Balancing with
                                  Multi-dimensional State-space Collapse:
                                  Throughput and Heavy-traffic Delay
                                  Optimality . . . . . . . . . . . . . . . 10--11
    L. E. Chatzieleftheriou and   
                G. Darzanos and   
           M. Karaliopoulos and   
                I. Koutsopoulos   Joint User Association, Content Caching
                                  and Recommendations in Wireless Edge
                                  Networks . . . . . . . . . . . . . . . . 12--17
              Yung Fei Wong and   
       Lachlan L. H. Andrew and   
           Y. Ahmet Sekercioglu   Hidden semi-Markov models for
                                  electricity load disaggregation  . . . . 18--23
        Arash Molavi Kakhki and   
            Vijay Erramilli and   
              Phillipa Gill and   
        Augustin Chaintreau and   
      Balachander Krishnamurthy   Information Market for Web Browsing:
                                  Design, Usability and Incremental
                                  Adoption . . . . . . . . . . . . . . . . 24--24
               Nicolas Gast and   
            Luca Bortolussi and   
               Mirco Tribastone   Size Expansions of Mean Field
                                  Approximation: Transient and
                                  Steady-State Analysis  . . . . . . . . . 25--26
             Paola Bermolen and   
        Matthieu Jonckheere and   
           Federico Larroca and   
                   Manuel Saenz   Degree-Greedy Algorithms on Large Random
                                  Graphs . . . . . . . . . . . . . . . . . 27--32
                  M. Yajima and   
                   T. Phung-Duc   A central limit theorem for a
                                  Markov-modulated infinite-server queue
                                  with batch Poisson arrivals and binomial
                                  catastrophes . . . . . . . . . . . . . . 33--34
                Lianjie Shi and   
                   Xin Wang and   
           Richard T. B. Ma and   
                      Y. C. Tay   Weighted Fair Caching: Occupancy-Centric
                                  Allocation for Space-Shared Resources    35--36
            Niklas Carlsson and   
                    Derek Eager   Worst-case Bounds and Optimized Cache on
                                  $M$-th Request Cache Insertion Policies
                                  under Elastic Conditions . . . . . . . . 37--38
                     Fan Ni and   
                  Xingbo Wu and   
                  Weijun Li and   
                   Lei Wang and   
                     Song Jiang   WOJ: Enabling Write-Once Full-data
                                  Journaling in SSDs by Using
                                  Weak-Hashing-based Deduplication . . . . 39--40
            Stephane Durand and   
             Federica Garin and   
                   Bruno Gaujal   Efficiency of Best Response Dynamics
                                  with High Playing Rates in Potential
                                  Games  . . . . . . . . . . . . . . . . . 41--42
            Ayman Chouayakh and   
           Aurelien Bechler and   
               Isabel Amigo and   
              Loutfi Nuaymi and   
          Patrick Maillé   Auction mechanisms for Licensed Shared
                                  Access: reserve prices and
                                  revenue-fairness trade offs  . . . . . . 43--48
                    Mao Zou and   
           Richard T. B. Ma and   
                     Yinlong Xu   Towards An Efficient Market Mediator for
                                  Divisible Resources  . . . . . . . . . . 49--50
                 Patrick Thiran   Locating the Source of Diffusion in
                                  Large-scale and Random Networks. . . . . 51--51
               Alessandro Zocca   Temporal starvation in multi-channel
                                  CSMA networks: an analytical framework   52--53
     Thirupathaiah Vasantam and   
         Arpan Mukhopadhyay and   
               Ravi R. Mazumdar   The Mean-field Behavior of Processor
                                  Sharing Systems with General Job Lengths
                                  Under the SQ(d) Policy . . . . . . . . . 54--55
             Yorie Nakahira and   
            Andres Ferragut and   
                   Adam Wierman   Minimal-Variance Distributed Deadline
                                  Scheduling in a Stationary Environment   56--61
            Martin Zeballos and   
            Andres Ferragut and   
              Fernando Paganini   Achieving fairness for EV charging in
                                  overload: a fluid approach . . . . . . . 62--67
         Eduardo Hargreaves and   
             Claudio Agosti and   
            Daniel Menasche and   
            Giovanni Neglia and   
  Alexandre Reiffers-Masson and   
                   Eitan Altman   Fairness in Online Social Network
                                  Timelines: Measurements, Models and
                                  Mechanism Design . . . . . . . . . . . . 68--69
             Julien Floquet and   
             Richard Combes and   
                     Zwi Altman   Hierarchical Beamforming: Resource
                                  Allocation, Fairness and Flow Level
                                  Performance  . . . . . . . . . . . . . . 70--71
             Y. Raaijmakers and   
                S. C. Borst and   
                    O. J. Boxma   Delta probing policies for redundancy    72--73
               T. Hellemans and   
                    B. Vanhoudt   Analysis of Redundancy(d) with Identical
                                  Replicas . . . . . . . . . . . . . . . . 74--79
               Urtzi Ayesta and   
                Tejas Bodas and   
              Ina Maria Verloop   On a unifying product form framework for
                                  redundancy models  . . . . . . . . . . . 80--81
            Catherine Rosenberg   Highlight Talk on Battery Modeling:
                                  Trade-offs between Accuracy and
                                  Complexity . . . . . . . . . . . . . . . 82--83
                Omid Ardakanian   Leveraging Sparsity in Distribution
                                  Grids: System Identification and
                                  Harmonic State Estimation  . . . . . . . 84--85
             Dominik Danner and   
                Hermann de Meer   State Estimation in the Power
                                  Distribution System  . . . . . . . . . . 86--88
               Benoit Vinot and   
             Florent Cadoux and   
                   Nicolas Gast   Congestion Avoidance in Low-Voltage
                                  Networks by using the Advanced Metering
                                  Infrastructure . . . . . . . . . . . . . 89--91
                 Yujie Tang and   
        Emiliano Dall'Anese and   
           Andrey Bernstein and   
                      S. H. Low   A Primal-Dual Gradient Method for
                                  Time-Varying Optimization with
                                  Application to Power Systems . . . . . . 92--92
                   Nader Alagha   Satellite Air Interface Evolutions in
                                  the $5$G and IoT Era . . . . . . . . . . 93--95
      Maria Rita Palattella and   
                 Ridha Soua and   
       André Stemper and   
                   Thomas Engel   Aggregation of MQTT Topics over
                                  Integrated Satellite-Terrestrial
                                  Networks . . . . . . . . . . . . . . . . 96--97
            Doanh Kim Luong and   
               Muhammad Ali and   
            Fouad Benamrane and   
              Ibrahim Ammar and   
                     Yim-Fun Hu   Seamless handover for video streaming
                                  over an SDN-based Aeronautical
                                  Communications Network . . . . . . . . . 98--99
                     J. Bas and   
                    M. Caus and   
                   A. Perez and   
               R. Soleymani and   
                 N. A. K. Beigi   Interference Management Schemes for High
                                  Spectral Efficiency Satellite
                                  Communications . . . . . . . . . . . . . 100--103
  Julio A. Medina-Caballero and   
      M. Angeles Vazquez-Castro   Link Quality Optimization for Hybrid
                                  LEO--GSO Systems . . . . . . . . . . . . 104--107
                  P. Asuquo and   
             H. Cruickshank and   
                  C. P. A. Ogah   Securing Emergency Communications for
                                  the Next-Generation Networks:
                                  Performance Analysis of Distributed
                                  Trust Computing for Future Emergency
                                  Communications . . . . . . . . . . . . . 108--111
                   Nicolas Kuhn   Research trends in SATCOM  . . . . . . . 112--112
                Aad van Moorsel   Benchmarks and Models for Blockchain:
                                  Consensus Algorithms . . . . . . . . . . 113--113
              Tim Hellemans and   
            Benny Van Houdt and   
         Daniel S. Menasche and   
               Mandar Datar and   
             Swapnil Dhamal and   
                 Corinne Touati   Mining competition in a
                                  multi-cryptocurrency ecosystem at the
                                  network edge: a congestion game approach 114--117
              Manuel Zander and   
                  Tom Waite and   
                   Dominik Harz   DAGsim: Simulation of DAG-based
                                  distributed ledger protocols . . . . . . 118--121
                Saulo Ricci and   
           Eduardo Ferreira and   
      Daniel Sadoc Menasche and   
              Artur Ziviani and   
         Jose Eduardo Souza and   
             Alex Borges Vieira   Learning Blockchain Delays: a Queueing
                                  Theory Approach  . . . . . . . . . . . . 122--125
                C. Grunspan and   
                 R. Perez-Marco   On profitability of block withholding
                                  strategies . . . . . . . . . . . . . . . 126--126
          Francesco Bruschi and   
              Vincenzo Rana and   
            Lorenzo Gentile and   
               Donatella Sciuto   Mine with it or sell it: the
                                  superhashing power dilemma . . . . . . . 127--130
                     Nico Smuts   What Drives Cryptocurrency Prices?: an
                                  Investigation of Google Trends and
                                  Telegram Sentiment . . . . . . . . . . . 131--134
              Maher Alharby and   
                Aad van Moorsel   BlockSim: a Simulation Framework for
                                  Blockchain Systems . . . . . . . . . . . 135--138
        Vladyslav Fedchenko and   
            Giovanni Neglia and   
                  Bruno Ribeiro   Feedforward Neural Networks for Caching:
                                  Enough or Too Much?  . . . . . . . . . . 139--142
           Martino Trevisan and   
                   Idilio Drago   Robust URL Classification With
                                  Generative Adversarial Networks  . . . . 143--146
       Gonzalo Marín and   
                Pedro Casas and   
      Germán Capdehourat   DeepSec meets RawPower --- Deep Learning
                                  for Detection of Network Attacks Using
                                  Raw Representations  . . . . . . . . . . 147--150
            Michal Piskozub and   
           Riccardo Spolaor and   
                Ivan Martinovic   MalAlert: Detecting Malware in
                                  Large-Scale Network Traffic Using
                                  Statistical Features . . . . . . . . . . 151--154
           Sarah Wassermann and   
             Nikolas Wehner and   
                    Pedro Casas   Machine Learning Models for YouTube QoE
                                  and User Engagement Prediction in
                                  Smartphones  . . . . . . . . . . . . . . 155--158
              Gaetano Manzo and   
     Juan Sebastian Otalora and   
        Marco Ajmone Marsan and   
                 Gianluca Rizzo   A Deep Learning Strategy for Vehicular
                                  Floating Content Management  . . . . . . 159--162
                     Rui Li and   
              Chaoyun Zhang and   
                Paul Patras and   
             Razvan Stanica and   
                 Fabrice Valois   Learning Driven Mobility Control of
                                  Airborne Base Stations in Emergency
                                  Networks . . . . . . . . . . . . . . . . 163--166
               Johan Garcia and   
                  Topi Korhonen   On Runtime and Classification
                                  Performance of the Discretize--Optimize
                                  (DISCO) Classification Approach  . . . . 167--170
         Manjesh K. Hanawal and   
                 Sumit J. Darak   Distributed Learning in Ad-Hoc Networks
                                  with Unknown Number of Players . . . . . 171--174

ACM SIGMETRICS Performance Evaluation Review
Volume 46, Number 4, March, 2019

                 Ranjan Pal and   
               Aditya Ahuja and   
               Sung-Han Lin and   
             Abhishek Kumar and   
            Leana Golubchik and   
      Nachikethas A. Jagadeesan   On the Economic Sustainability of Cloud
                                  Sharing Systems Are Dynamic Single
                                  Resource Sharing Markets Stable? . . . . 2--10


ACM SIGMETRICS Performance Evaluation Review
Volume 47, Number 1, December, 2019

                    Lili Su and   
            Martin Zubeldia and   
                    Nancy Lynch   Collaboratively Learning the Best Option
                                  on Graphs, Using Bounded Local Memory    1--2
           Jessica Hoffmann and   
          Constantine Caramanis   Learning Graphs from Noisy Epidemic
                                  Cascades . . . . . . . . . . . . . . . . 3--4
                Xingyu Zhou and   
                   Jian Tan and   
                    Ness Shroff   Heavy-traffic Delay Optimality in
                                  Pull-based Load Balancing Systems:
                                  Necessary and Sufficient Conditions  . . 5--6
              Tim Hellemans and   
                Tejas Bodas and   
                Benny Van Houdt   Performance Analysis of Workload
                                  Dependent Load Balancing Policies  . . . 7--8
               Isaac Grosof and   
                 Ziv Scully and   
             Mor Harchol-Balter   Load Balancing Guardrails: Keeping Your
                                  Heavy Traffic on the Road to Low
                                  Response Times . . . . . . . . . . . . . 9--10
              Dengwang Tang and   
           Vijay G. Subramanian   Random Walk Based Sampling for Load
                                  Balancing in Multi-Server Systems  . . . 11--12
              Lan N. Nguyen and   
                     My T. Thai   Network Resilience Assessment via QoS
                                  Degradation Metrics: an Algorithmic
                                  Approach . . . . . . . . . . . . . . . . 13--14
                Dhruv Kumar and   
                    Jian Li and   
           Ramesh Sitaraman and   
               Abhishek Chandra   A TTL-based Approach for Data
                                  Aggregation in Geo-distributed Streaming
                                  Analytics  . . . . . . . . . . . . . . . 15--16
        Pavlos Nikolopoulos and   
            Christos Pappas and   
          Katerina Argyraki and   
                  Adrian Perrig   Retroactive Packet Sampling for Traffic
                                  Receipts . . . . . . . . . . . . . . . . 17--18
           Pavlos Sermpezis and   
             Vasileios Kotronis   Inferring Catchment in Internet Routing  19--20
               Shoaib Akram and   
         Jennifer B. Sartor and   
        Kathryn S. McKinley and   
                Lieven Eeckhout   Crystal Gazer: Profile-Driven
                                  Write-Rationing Garbage Collection for
                                  Hybrid Memories  . . . . . . . . . . . . 21--22
            Mustafa Karakoy and   
               Orhan Kislal and   
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
          Meenakshi Arunachalam   Architecture-Aware Approximate Computing 23--24
                Xulong Tang and   
          Ashutosh Pattnaik and   
               Onur Kayiran and   
                 Adwait Jog and   
     Mahmut Taylan Kandemir and   
                      Chita Das   Quantifying Data Locality in Dynamic
                                  Parallelism in GPUs  . . . . . . . . . . 25--26
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                   Hui Zhao and   
             Myoungsoo Jung and   
                Mustafa Karakoy   Computing with Near Data . . . . . . . . 27--28
       Santiago R. Balseiro and   
             David B. Brown and   
                      Chen Chen   Dynamic Pricing of Relocating Resources
                                  in Large Networks  . . . . . . . . . . . 29--30
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
             Kostas Kollias and   
                Kamesh Munagala   The Segmentation-Thickness Tradeoff in
                                  Online Marketplaces  . . . . . . . . . . 31--32
                   Ming Shi and   
                Xiaojun Lin and   
                       Lei Jiao   On the Value of Look-Ahead in
                                  Competitive Online Convex Optimization   33--34
                 Qiulin Lin and   
                 Hanling Yi and   
                  John Pang and   
               Minghua Chen and   
               Adam Wierman and   
              Michael Honig and   
                 Yuanzhang Xiao   Competitive Online Optimization under
                                  Inventory Constraints  . . . . . . . . . 35--36
                  Haoran Yu and   
                  Ermin Wei and   
               Randall A. Berry   Analyzing Location-Based Advertising for
                                  Vehicle Service Providers Using
                                  Effective Resistances  . . . . . . . . . 37--38
                Daniel Vial and   
              Vijay Subramanian   A Structural Result for Personalized
                                  PageRank and its Algorithmic
                                  Consequences . . . . . . . . . . . . . . 39--40
                Semih Cayci and   
            Atilla Eryilmaz and   
                     R. Srikant   Learning to Control Renewal Processes
                                  with Bandit Feedback . . . . . . . . . . 41--42
           Monika Henzinger and   
             Stefan Neumann and   
                  Stefan Schmid   Efficient Distributed Workload
                                  (Re-)Embedding . . . . . . . . . . . . . 43--44
             Pradeep Ambati and   
                    David Irwin   Optimizing the Cost of Executing Mixed
                                  Interactive and Batch Workloads on
                                  Transient VMs  . . . . . . . . . . . . . 45--46
              Joshua Comden and   
                  Sijie Yao and   
              Niangjun Chen and   
               Haipeng Xing and   
                    Zhenhua Liu   Online Optimization in Cloud Resource
                                  Provisioning: Predictions, Regrets, and
                                  Algorithms . . . . . . . . . . . . . . . 47--48
               Guocong Quan and   
                   Jian Tan and   
            Atilla Eryilmaz and   
                    Ness Shroff   A New Flexible Multi-flow LRU Cache
                                  Management Paradigm for Minimizing
                                  Misses . . . . . . . . . . . . . . . . . 49--50
               Doron Zarchy and   
             Radhika Mittal and   
           Michael Schapira and   
                  Scott Shenker   Axiomatizing Congestion Control  . . . . 51--52
                   Kuang Xu and   
                     Yuan Zhong   Information, Memory and Capacity in
                                  Dynamic Resource Allocation  . . . . . . 53--54
    Muhammad Jehangir Amjad and   
               Vishal Misra and   
              Devavrat Shah and   
                    Dennis Shen   mRSC: Multi-dimensional Robust Synthetic
                                  Control  . . . . . . . . . . . . . . . . 55--56
               Lavanya Jose and   
             Stephen Ibanez and   
          Mohammad Alizadeh and   
                   Nick McKeown   A Distributed Algorithm to Calculate
                                  Max-Min Fair Rates Without Per-Flow
                                  State  . . . . . . . . . . . . . . . . . 57--58
                Benny Van Houdt   Global Attraction of ODE-based Mean
                                  Field Models with Hyperexponential Job
                                  Sizes  . . . . . . . . . . . . . . . . . 59--60
          Mark van der Boor and   
                  Sem Borst and   
          Johan van Leeuwaarden   Hyper-Scalable JSQ with Sparse Feedback  61--62
               Florin Ciucu and   
                 Felix Poloczek   Two Extensions of Kingman's GI/G/1 Bound 63--64
               Florin Ciucu and   
             Felix Poloczek and   
                       Amr Rizk   Queue and Loss Distributions in
                                  Finite-Buffer Queues . . . . . . . . . . 65--66
                 Jiaming Xu and   
                     Yuan Zhong   Improved Queue-Size Scaling for
                                  Input-Queued Switches via Graph
                                  Factorization  . . . . . . . . . . . . . 67--68
                  Youil Han and   
               Bryan S. Kim and   
               Jeseong Yeon and   
                Sungjin Lee and   
                      Eunji Lee   TeksDB: Weaving Data Structures for a
                                  High-Performance Key--Value Store  . . . 69--70
            Milan Radulovic and   
Rommel Sánchez Verdejo and   
             Paul Carpenter and   
         Petar Radojkovi\'c and   
                Bruce Jacob and   
          Eduard Ayguadé   PROFET: Modeling System Performance and
                                  Energy Without Simulating the CPU  . . . 71--72
                   Song Wei and   
                  Kun Zhang and   
                        Bibo Tu   HyperBench: a Benchmark Suite for
                                  Virtualization Capabilities  . . . . . . 73--74
                  Lei Zhang and   
                Zhemin Yang and   
                    Yuyu He and   
                  Mingqi Li and   
                   Sen Yang and   
                   Min Yang and   
                 Yuan Zhang and   
                    Zhiyun Qian   App in the Middle: Demystify Application
                                  Virtualization in Android and its
                                  Security Threats . . . . . . . . . . . . 75--76
               Tu Dinh Ngoc and   
                    Bao Bui and   
            Stella Bitchebe and   
               Alain Tchana and   
          Valerio Schiavoni and   
              Pascal Felber and   
                Daniel Hagimont   Everything You Should Know About Intel
                                  SGX Performance on Virtualized Systems   77--78
                Honghao Wei and   
               Xiaohan Kang and   
                 Weina Wang and   
                       Lei Ying   QuickStop: a Markov Optimal Stopping
                                  Approach for Quickest Misinformation
                                  Detection  . . . . . . . . . . . . . . . 79--80
               Alberto Vera and   
            Siddhartha Banerjee   The Bayesian Prophet: a Low-Regret
                                  Framework for Online Decision Making . . 81--82
                    Lili Su and   
                     Jiaming Xu   Securing Distributed Gradient Descent in
                                  High Dimensional Statistical Learning    83--84
              Anish Agarwal and   
    Muhammad Jehangir Amjad and   
              Devavrat Shah and   
                    Dennis Shen   Model Agnostic Time Series Analysis via
                                  Matrix Estimation  . . . . . . . . . . . 85--86
        Behnam Pourghassemi and   
         Ardalan Amiri Sani and   
     Aparna Chandramowlishwaran   What-If Analysis of Page Load Time in
                                  Web Browsers Using Causal Profiling  . . 87--88
                    Ran Liu and   
                 Edmund Yeh and   
                Atilla Eryilmaz   Proactive Caching for Low Access-Delay
                                  Services under Uncertain Predictions . . 89--90
                   Xiao Zhu and   
            Yihua Ethan Guo and   
           Ashkan Nikravesh and   
                  Feng Qian and   
                  Z. Morley Mao   Understanding the Networking Performance
                                  of Wear OS . . . . . . . . . . . . . . . 91--92
              Saugata Ghose and   
                 Tianshi Li and   
         Nastaran Hajinazar and   
           Damla Senol Cali and   
                     Onur Mutlu   Demystifying Complex Workload-DRAM
                                  Interactions: an Experimental Study  . . 93--93
                Chul-Ho Lee and   
                   Min Kang and   
                   Do Young Eun   Non-Markovian Monte Carlo on Directed
                                  Graphs . . . . . . . . . . . . . . . . . 94--95
             Osman Emre Dai and   
             Daniel Cullina and   
             Negar Kiyavash and   
          Matthias Grossglauser   Analysis of a Canonical Labeling
                                  Algorithm for the Alignment of
                                  Correlated Erd\Hos--Rényi Graphs  . . . . 96--97
             Richard Combes and   
                  Mikael Touati   Computationally Efficient Estimation of
                                  the Spectral Gap of a Markov Chain . . . 98--100

ACM SIGMETRICS Performance Evaluation Review
Volume 47, Number 2, September, 2019

             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2019) . . . . . . . . . . 2--2
                  Abuthahir and   
               Gaurav Raina and   
                   Thomas Voice   Do we need two forms of feedback in the
                                  Rate Control Protocol (RCP)? . . . . . . 3--5
                Gautam Goel and   
                   Adam Wierman   An Online Algorithm for Smoothed Online
                                  Convex Optimization  . . . . . . . . . . 6--8
                 Xiaoqi Tan and   
        Alberto Leon-Garcia and   
              Danny H. K. Tsang   Optimal Posted Prices for Online
                                  Resource Allocation with Supply Costs    9--11
            Kristen Gardner and   
                  Cole Stephens   Smart Dispatching in Heterogeneous
                                  Systems  . . . . . . . . . . . . . . . . 12--14
                Elene Anton and   
               Urtzi Ayesta and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Redundancy with Processor Sharing
                                  servers  . . . . . . . . . . . . . . . . 15--17
              Benjamin Berg and   
                Rein Vesilo and   
             Mor Harchol-Balter   heSRPT: Optimal Scheduling of Parallel
                                  Jobs with Known Sizes  . . . . . . . . . 18--20
                      Yu Su and   
                 Xiaoqi Ren and   
                 Shai Vardi and   
               Adam Wierman and   
                     Yuxiong He   Communication-Aware Scheduling of
                                  Precedence-Constrained Tasks . . . . . . 21--23
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Simple Near-Optimal Scheduling for the
                                  M/G/1  . . . . . . . . . . . . . . . . . 24--26
            Gayane Vardoyan and   
                Saikat Guha and   
              Philippe Nain and   
                    Don Towsley   On the Stochastic Analysis of a Quantum
                                  Entanglement Switch  . . . . . . . . . . 27--29
            Giuliano Casale and   
          Peter G. Harrison and   
                   Ong Wai Hong   Novel Solutions for Closed Queueing
                                  Networks with Load-Dependent Stations    30--32
           Gagan Somashekar and   
           Mohammad Delasay and   
                  Anshul Gandhi   Tighter Lyapunov Truncation for
                                  Multi-Dimensional Continuous Time Markov
                                  Chains with Known Moments  . . . . . . . 33--35
      Daniela Hurtado Lange and   
            Siva Theja Maguluri   Heavy-traffic Analysis of the
                                  Generalized Switch under
                                  Multidimensional State Space Collapse    36--38

ACM SIGMETRICS Performance Evaluation Review
Volume 47, Number 3, January, 2020

                   Navid Azizan   Optimization Algorithms for Large-Scale
                                  Systems: From Deep Learning to Energy
                                  Markets  . . . . . . . . . . . . . . . . 2--5
                  Joshua Comden   Algorithms for Online and Distributed
                                  Optimization and their Applications  . . 6--9
             Salvatore Dipietro   Performance Modelling and Optimisation
                                  of NoSQL Database Systems  . . . . . . . 10--13
            Seyyed Ahmad Javadi   Analytical Approaches for Dynamic
                                  Scheduling in Cloud Environments . . . . 14--16
                        Qian Li   Vision-based Sensor Coverage in
                                  Uncertain Geometric Domains  . . . . . . 17--19
            Behnam Pourghassemi   Scalable Dynamic Analysis of Browsers
                                  for Privacy and Performance  . . . . . . 20--23
                        Lili Su   Defending Distributed Systems Against
                                  Adversarial Attacks: Consensus,
                                  Consensus-based Learning, and
                                  Statistical Learning . . . . . . . . . . 24--27
               Muhammad Wajahat   Cost-Efficient Dynamic Management of
                                  Cloud Resources through Supervised
                                  Learning . . . . . . . . . . . . . . . . 28--30
                     Pei-Duo YU   Network Centralities as Statistical
                                  Inference for Large Networks:
                                  Combinatorics, Probability and Efficient
                                  Graph Algorithms . . . . . . . . . . . . 31--33
                    Xingyu Zhou   Asymptotically Optimal Load Balancing:
                                  Theory and Algorithms  . . . . . . . . . 34--37

ACM SIGMETRICS Performance Evaluation Review
Volume 47, Number 4, April, 2020

              Kartik Palani and   
                 David M. Nicol   Optimal Monitoring Strategies for
                                  Critical Infrastructure Networks . . . . 4--7
              Malhar Padhee and   
          Reetam Sen Biswas and   
               Anamitra Pal and   
               Kaustav Basu and   
                   Arunabha Sen   Identifying Unique Power System
                                  Signatures for Determining Vulnerability
                                  of Critical Power System Assets  . . . . 8--11
          Jorik Oostenbrink and   
            Fernando A. Kuipers   A Moment of Weakness: Protecting Against
                                  Targeted Attacks Following a Natural
                                  Disaster . . . . . . . . . . . . . . . . 12--15
        Evangelos Pournaras and   
          Riccardo Taormina and   
               Manish Thapa and   
            Stefano Galelli and   
            Venkata Palleti and   
                   Robert Kooij   Cascading Failures in Interconnected
                                  Power-to-Water Networks  . . . . . . . . 16--20
                  Yushi Tan and   
             Arindam K. Das and   
      Mareldi Ahumada-Paras and   
           Payman Arabshahi and   
             Daniel S. Kirschen   Scheduling Post-disaster Repairs in
                                  Electricity Distribution Networks with
                                  Uncertain Repair Times . . . . . . . . . 21--24
                   Krishna Kant   Advanced Persistent Threats in
                                  Autonomous Driving . . . . . . . . . . . 25--28


ACM SIGMETRICS Performance Evaluation Review
Volume 48, Number 1, July, 2020

        Siddhartha Banerjee and   
                  Daniel Freund   Uniform Loss Algorithms for Online
                                  Stochastic Decision-Making With
                                  Applications to Bin Packing  . . . . . . 1--2
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Primal-Dual Mirror Descent under
                                  Stochastic Constraints . . . . . . . . . 3--4
                 Sungjin Im and   
           Benjamin Moseley and   
            Kamesh Munagala and   
                     Kirk Pruhs   Dynamic Weighted Fairness with Minimal
                                  Disruptions  . . . . . . . . . . . . . . 5--6
                   Lin Yang and   
    Mohammad H. Hajiesmaili and   
           Ramesh Sitaraman and   
               Adam Wierman and   
            Enrique Mallada and   
                   Wing S. Wong   Online Linear Optimization with
                                  Inventory Management Constraints . . . . 7--8
                 Yiheng Lin and   
                Gautam Goel and   
                   Adam Wierman   Online Optimization with Predictions and
                                  Non-convex Losses  . . . . . . . . . . . 9--10
                 Xiaoqi Tan and   
                     Bo Sun and   
        Alberto Leon-Garcia and   
                    Yuan Wu and   
              Danny H. K. Tsang   Mechanism Design for Online Resource
                                  Allocation: a Unified Approach . . . . . 11--12
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
            Kamesh Munagala and   
                  Kangning Wang   Predict and Match: Prophet Inequalities
                                  with Uncertain Supply  . . . . . . . . . 13--14
     Rajarshi Bhattacharjee and   
         Subhankar Banerjee and   
                 Abhishek Sinha   Fundamental Limits on the Regret of
                                  Online Network-Caching . . . . . . . . . 15--16

ACM SIGMETRICS Performance Evaluation Review
Volume 48, Number 2, November, 2020

             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2020) . . . . . . . . . . 2--2
                 Ping-En Lu and   
              Cheng-Shang Chang   Using Graph Convolutional Networks to
                                  Compute Approximations of Dominant
                                  Eigenvectors . . . . . . . . . . . . . . 3--5
     Rajarshi Bhattacharjee and   
                 Abhishek Sinha   Competitive Algorithms for Minimizing
                                  the Maximum Age-of-Information . . . . . 6--8
                Hanoch Levy and   
                Jhonatan Tavori   Worst Case Attacks on Distributed
                                  Resources Systems  . . . . . . . . . . . 9--11
              Eitan Bachmat and   
                Sveinung Erland   Performance analysis, Optimization and
                                  Optics . . . . . . . . . . . . . . . . . 12--14
               Mandar Datar and   
               Eitan Altman and   
                  Ghilas Ferrat   Routing into parallel collision channels 15--17
          Christine Fricker and   
             Hanene Mohamed and   
                Cedric Bourdais   A mean field analysis of a stochastic
                                  model for reservation in car-sharing
                                  systems  . . . . . . . . . . . . . . . . 18--20
     Boudewijn R. Haverkort and   
           Felix Finkbeiner and   
           Pieter-Tjerk de Boer   Machine Learning Data Center Workloads
                                  Using Generative Adversarial Networks    21--23
  Daniel S. Menasché and   
               Mark Shifrin and   
             Eduardo Hargreaves   Caches and Timelines Operate Under Heavy
                                  Traffic  . . . . . . . . . . . . . . . . 24--26
             George Kesidis and   
          Takis Konstantopoulos   TB/GI/1 queues with arrival traffic
                                  envelopes  . . . . . . . . . . . . . . . 27--29
        Jazeem Abdul Jaleel and   
         Alexander Wickeham and   
            Sherwin Doroudi and   
                Kristen Gardner   A General ``Power-of-$d$'' Dispatching
                                  Framework for Heterogeneous Systems  . . 30--32
                 Ziv Scully and   
               Isaac Grosof and   
             Mor Harchol-Balter   Optimal Multiserver Scheduling with
                                  Unknown Job Sizes in Heavy Traffic . . . 33--35
                Yingdong Lu and   
         Mark S. Squillante and   
                   Tonghoon Suk   Optimal Delay-Cost Scheduling Control in
                                  Fluid Models of General $ n \times n $
                                  Input-Queued Switches  . . . . . . . . . 36--38
              Andrea Araldo and   
              Ivona Brandic and   
                  Stefan Schmid   ACM SIGMETRICS International Workshop on
                                  Distributed Cloud Computing (DCC)  . . . 39--40
     Daniel Balouek-Thomert and   
                Ivan Rodero and   
                Manish Parashar   Harnessing the Computing Continuum for
                                  Urgent Science . . . . . . . . . . . . . 41--46

ACM SIGMETRICS Performance Evaluation Review
Volume 48, Number 3, December, 2020

                Lianjie Shi and   
                   Xin Wang and   
               Richard T. B. Ma   On Multi-Resource Procurement in
                                  Internet Access Markets: Optimal
                                  Strategies and Market Equilibrium  . . . 4--5
          Mohammad A. Hoque and   
                 Ashwin Rao and   
                   Sasu Tarkoma   Network and Application Performance
                                  Measurement Challenges on Android
                                  Devices  . . . . . . . . . . . . . . . . 6--11
             Simon Scherrer and   
              Markus Legner and   
              Adrian Perrig and   
                  Stefan Schmid   Incentivizing Stable Path Selection in
                                  Future Internet Architectures  . . . . . 12--13
          Niels Christensen and   
               Mark Glavind and   
              Stefan Schmid and   
                      Jir' Srba   Latte: Improving the Latency of
                                  Transiently Consistent Network Update
                                  Schedules  . . . . . . . . . . . . . . . 14--26
         Francesco Bronzino and   
               Paul Schmitt and   
                Sara Ayoubi and   
          Guilherme Martins and   
            Renata Teixeira and   
                  Nick Feamster   Inferring Streaming Video Quality from
                                  Encrypted Traffic: Practical Models and
                                  Deployment Experience  . . . . . . . . . 27--32
      Daniela Hurtado-Lange and   
            Siva Theja Maguluri   Heavy-traffic Analysis of the
                                  Generalized Switch under
                                  Multidimensional State Space Collapse    33--34
              Benjamin Berg and   
                Rein Vesilo and   
             Mor Harchol-Balter   heSRPT: Parallel Scheduling to Minimize
                                  Mean Slowdown  . . . . . . . . . . . . . 35--36
            Kristen Gardner and   
        Jazeem Abdul Jaleel and   
         Alexander Wickeham and   
                Sherwin Doroudi   Scalable Load Balancing in the Presence
                                  of Heterogeneous Servers . . . . . . . . 37--38
                 Wenkai Dai and   
       Klaus-Tycho Foerster and   
         David Fuchssteiner and   
                  Stefan Schmid   Load-Optimization in Reconfigurable
                                  Networks: Algorithms and Complexity of
                                  Flow Routing . . . . . . . . . . . . . . 39--44
            Gayane Vardoyan and   
                Saikat Guha and   
              Philippe Nain and   
                    Don Towsley   On the Capacity Region of Bipartite and
                                  Tripartite Entanglement Switching  . . . 45--50
        Nitish K. Panigrahy and   
             Prithwish Basu and   
                Don Towsley and   
            Ananthram Swami and   
                   Kin K. Leung   On the Analysis of Spatially Constrained
                                  Power of Two Choice Policies . . . . . . 51--56
                Xingyu Zhou and   
                Ness Shroff and   
                   Adam Wierman   Asymptotically Optimal Load Balancing in
                                  Large-scale Heterogeneous Systems with
                                  Multiple Dispatchers . . . . . . . . . . 57--58
                 Jianyu Niu and   
                  Ziyu Wang and   
                 Fangyu Gai and   
                      Chen Feng   Incentive Analysis of Bitcoin-NG,
                                  Revisited  . . . . . . . . . . . . . . . 59--60
                 Rahul Vaze and   
              Jayakrishnan Nair   Network Speed Scaling  . . . . . . . . . 61--62
          Shiva Raj Pokhrel and   
               Carey Williamson   A Rent-Seeking Framework for Multipath
                                  TCP  . . . . . . . . . . . . . . . . . . 63--70
               Jingfan Meng and   
                  Long Gong and   
                   Jun (Jim) Xu   Sliding-Window QPS (SW-QPS): a Perfect
                                  Parallel Iterative Switching Algorithm
                                  for Input-Queued Switches  . . . . . . . 71--76
               Guocong Quan and   
            Atilla Eryilmaz and   
                   Jian Tan and   
                    Ness Shroff   Prefetching and Caching for Minimizing
                                  Service Costs: Optimal and Approximation
                                  Strategies . . . . . . . . . . . . . . . 77--78
            Gayane Vardoyan and   
                Saikat Guha and   
              Philippe Nain and   
                    Don Towsley   On the Exact Analysis of an Idealized
                                  Quantum Switch . . . . . . . . . . . . . 79--80
                Guin Gilman and   
            Samuel S. Ogden and   
                   Tian Guo and   
                Robert J. Walls   Demystifying the Placement Policies of
                                  the NVIDIA GPU Thread Block Scheduler
                                  for Concurrent Kernels . . . . . . . . . 81--88
                Yuezhou Liu and   
                Yuanyuan Li and   
                    Qian Ma and   
          Stratis Ioannidis and   
                     Edmund Yeh   Fair Caching Networks  . . . . . . . . . 89--90
                  Shigeo Shioda   Distribution of Consensus in a
                                  Broadcasting-based Consensus-forming
                                  Algorithm  . . . . . . . . . . . . . . . 91--96
               Maryam Elahi and   
               Andrea Marin and   
               Sabina Rossi and   
               Carey Williamson   Frequency scaling in multilevel queues   97--98
          Marcin Bienkowski and   
         David Fuchssteiner and   
           Jan Marcinkowski and   
                  Stefan Schmid   Online Dynamic B-Matching: With
                                  Applications to Reconfigurable
                                  Datacenter Networks  . . . . . . . . . . 99--108
                   Yu Huang and   
                   Longbo Huang   Heavy Traffic Analysis of Approximate
                                  Max-Weight Matching Algorithms for
                                  Input-Queued Switches  . . . . . . . . . 109--110
              Fehmina Malik and   
         Manjesh K. Hanawal and   
             Yezekael Hayel and   
              Jayakrishnan Nair   Revenue sharing on the Internet: a Case
                                  for Going Soft on Neutrality Regulations 111--112
        Behnam Pourghassemi and   
         Ardalan Amiri Sani and   
     Aparna Chandramowlishwaran   Only Relative Speed Matters: Virtual
                                  Causal Profiling . . . . . . . . . . . . 113--119
               Myungsuk Kim and   
             Myoungjun Chun and   
                 Duwon Hong and   
                  Yoona Kim and   
                Geonhee Cho and   
                  Dusol Lee and   
                     Jihong Kim   RealWear: Improving Performance and
                                  Lifetime of SSDs Using a NAND Aging
                                  Marker . . . . . . . . . . . . . . . . . 120--121
                Yingdong Lu and   
         Mark S. Squillante and   
                   Tonghoon Suk   Optimal Control in Fluid Models of $ n
                                  \times n $ Input-Queued Switches under
                                  Linear Fluid-Flow Costs  . . . . . . . . 122--127
                 Sounak Kar and   
             Robin Rehrmann and   
         Arpan Mukhopadhyay and   
                Bastian Alt and   
               Florin Ciucu and   
               Heinz Koeppl and   
             Carsten Binnig and   
                       Amr Rizk   On the Throughput Optimization in
                                  Large-Scale Batch-Processing Systems . . 128--129
             Niloofar Bayat and   
                 Richard Ma and   
               Vishal Misra and   
                 Dan Rubenstein   Zero-Rating and Net Neutrality: Who
                                  Wins, Who Loses? . . . . . . . . . . . . 130--135

ACM SIGMETRICS Performance Evaluation Review
Volume 48, Number 4, May, 2021

        William Knottenbelt and   
                 Katinka Wolter   Message from the Chairs  . . . . . . . . 2--2
                     Ingo Weber   Keynote: Analysing Data from Blockchains 3--3
      Felipe Ribas Coutinho and   
               Victor Pires and   
             Claudio Miceli and   
             Daniel S. Menasche   Crypto-Hotwire: Illegal Blockchain
                                  Mining at Zero Cost Using Public
                                  Infrastructures  . . . . . . . . . . . . 4--7
        Jefferson E. Simoes and   
           Eduardo Ferreira and   
  Daniel S. Menasché and   
            Carlos A. V. Campos   Blockchain Privacy Through Merge
                                  Avoidance and Mixing Services: a
                                  Hardness and an Impossibility Result . . 8--11
       Vinicius C. Oliveira and   
    Julia Almeida Valadares and   
      Jose Eduardo A. Sousa and   
         Alex Borges Vieira and   
    Heder Soares Bernardino and   
       Saulo Moraes Villela and   
         Glauber Dias Goncalves   Analyzing Transaction Confirmation in
                                  Ethereum Using Machine Learning
                                  Techniques . . . . . . . . . . . . . . . 12--15
             Rowel Gundlach and   
           Martijn Gijsbers and   
                David Koops and   
                 Jacques Resing   Predicting confirmation times of Bitcoin
                                  transactions . . . . . . . . . . . . . . 16--19
               Ivo Stoepker and   
             Rowel Gundlach and   
             Stella Kapodistria   Robustness analysis of Bitcoin
                                  confirmation times . . . . . . . . . . . 20--23
      Jose Eduardo A. Sousa and   
       Vinicius C. Oliveira and   
    Julia Almeida Valadares and   
         Alex Borges Vieira and   
        Heder S. Bernardino and   
       Saulo Moraes Villela and   
         Glauber Dias Goncalves   Fighting Under-price DoS Attack in
                                  Ethereum with Machine Learning
                                  Techniques . . . . . . . . . . . . . . . 24--27
                Luca Vassio and   
               Zhi-Li Zhang and   
            Danilo Giordano and   
               Abhishek Chandra   Message from the organizers of WAIN  . . 28--28
            Md Rajib Hossen and   
              Mohammad A. Islam   Mobile Task Offloading Under Unreliable
                                  Edge Performance . . . . . . . . . . . . 29--32
           Özge Celenk and   
           Thomas Bauschert and   
                  Marcus Eckert   Machine Learning based KPI Monitoring of
                                  Video Streaming Traffic for QoE
                                  Estimation . . . . . . . . . . . . . . . 33--36
             Nikolas Wehner and   
            Michael Seufert and   
             Joshua Schuler and   
           Sarah Wassermann and   
                Pedro Casas and   
                Tobias Hossfeld   Improving Web QoE Monitoring for
                                  Encrypted Network Traffic through Time
                                  Series Modeling  . . . . . . . . . . . . 37--40
             Dena Markudova and   
           Martino Trevisan and   
                Paolo Garza and   
                Michela Meo and   
         Maurizio M. Munafo and   
            Giovanna Carofiglio   What's my App?: ML-based classification
                                  of RTC applications  . . . . . . . . . . 41--44
           Shunsuke Higuchi and   
             Junji Takemasa and   
               Yuki Koizumi and   
             Atsushi Tagami and   
                  Toru Hasegawa   Feasibility of Longest Prefix Matching
                                  using Learned Index Structures . . . . . 45--48
Gastón García González and   
                Pedro Casas and   
    Alicia Fernández and   
           Gabriel Gómez   On the Usage of Generative Models for
                                  Network Anomaly Detection in
                                  Multivariate Time-Series . . . . . . . . 49--52
               Andrea Marin and   
               Carey Williamson   Cheating at Craps: a Quantitative
                                  Analysis . . . . . . . . . . . . . . . . 53--61
             Giulio Masetti and   
        Silvano Chiaradonna and   
   Felicita Di Giandomenico and   
         William H. Sanders and   
                Brett Feddersen   Extending the Möbius Modeling Environment
                                  with the Advanced Replication Operator   62--67


ACM SIGMETRICS Performance Evaluation Review
Volume 49, Number 1, June, 2021

                  Sanjeev Arora   Opening the Black Box of Deep Learning:
                                  Some Lessons and Take-aways  . . . . . . 1--1
                Zhaowei Zhu and   
               Jingxuan Zhu and   
                     Ji Liu and   
                       Yang Liu   Federated Bandit: a Gossiping Approach   3--4
           Thibaut Cuvelier and   
             Richard Combes and   
                   Eric Gourdin   Statistically Efficient, Polynomial-Time
                                  Algorithms for Combinatorial
                                  Semi-Bandits . . . . . . . . . . . . . . 5--6
                 Tongxin Li and   
                   Yue Chen and   
                     Bo Sun and   
               Adam Wierman and   
                     Steven Low   Information Aggregation for Constrained
                                  Online Control . . . . . . . . . . . . . 7--8
             Niv Buchbinder and   
            Yaron Fairstein and   
         Konstantina Mellou and   
              Ishai Menache and   
            Joseph (Seffi) Naor   Online Virtual Machine Allocation with
                                  Lifetime and Load Predictions  . . . . . 9--10
               Isaac Grosof and   
                 Kunhe Yang and   
                 Ziv Scully and   
             Mor Harchol-Balter   Nudge: Stochastically Improving upon
                                  FCFS . . . . . . . . . . . . . . . . . . 11--12
                 Weina Wang and   
                Qiaomin Xie and   
             Mor Harchol-Balter   Zero Queueing for Multi-Server Jobs  . . 13--14
                 Ziv Scully and   
               Isaac Grosof and   
             Mor Harchol-Balter   The Gittins Policy is Nearly Optimal in
                                  the M/G/$k$ under Extremely General
                                  Conditions . . . . . . . . . . . . . . . 15--16
             Ashish Bijlani and   
    Umakishore Ramachandran and   
                   Roy Campbell   Where did my 256 GB go? A Measurement
                                  Analysis of Storage Consumption on Smart
                                  Mobile Devices . . . . . . . . . . . . . 17--18
                  Yue Zhang and   
           Bayan Turkistani and   
          Allen Yuqing Yang and   
               Chaoshun Zuo and   
                   Zhiqiang Lin   A Measurement Study of Wechat Mini-Apps  19--20
               Rachee Singh and   
                David Tench and   
              Phillipa Gill and   
                Andrew McGregor   PredictRoute: a Network Path Prediction
                                  Toolkit  . . . . . . . . . . . . . . . . 21--22
                Iman Akbari and   
     Mohammad A. Salahuddin and   
                   Leni Ven and   
                Noura Limam and   
              Raouf Boutaba and   
           Bertrand Mathieu and   
           Stephanie Moteau and   
                Stephane Tuffin   A Look Behind the Curtain: Traffic
                                  Classification in an Increasingly
                                  Encrypted Web  . . . . . . . . . . . . . 23--24
                Wentao Weng and   
                     Weina Wang   Achieving Zero Asymptotic Queueing Delay
                                  for Parallel Jobs  . . . . . . . . . . . 25--26
          Youri Raaijmakers and   
                      Sem Borst   Achievable Stability in Redundancy
                                  Systems  . . . . . . . . . . . . . . . . 27--28
         Grzegorz Kielanski and   
                Benny Van Houdt   On the Asymptotic Insensitivity of the
                                  Supermarket Model in Processor Sharing
                                  Systems  . . . . . . . . . . . . . . . . 29--30
          Francesca Randone and   
            Luca Bortolussi and   
               Mirco Tribastone   Refining Mean-field Approximations by
                                  Dynamic State Truncation . . . . . . . . 31--32
                 Bingyu Gao and   
                 Haoyu Wang and   
              Pengcheng Xia and   
                   Siwei Wu and   
                 Yajin Zhou and   
                  Xiapu Luo and   
                   Gareth Tyson   Tracking Counterfeit Cryptocurrency
                                  End-to-end . . . . . . . . . . . . . . . 33--34
                Weimin Chen and   
                  Xinran Li and   
                 Yuting Sui and   
                  Ningyu He and   
                 Haoyu Wang and   
                     Lei Wu and   
                      Xiapu Luo   SADPonzi: Detecting and Characterizing
                                  Ponzi Schemes in Ethereum Smart
                                  Contracts  . . . . . . . . . . . . . . . 35--36
        Behnam Pourghassemi and   
          Jordan Bonecutter and   
                    Zhou Li and   
     Aparna Chandramowlishwaran   adPerf: Characterizing the Performance
                                  of Third-party Ads . . . . . . . . . . . 37--38
                 Hsiao-Wuen Hon   AI for System --- Infusing AI into Cloud
                                  Computing Systems  . . . . . . . . . . . 39--40
             Qingzhao Zhang and   
              David Ke Hong and   
                   Ze Zhang and   
             Qi Alfred Chen and   
               Scott Mahlke and   
                  Z. Morley Mao   A Systematic Framework to Identify
                                  Violations of Scenario-dependent Driving
                                  Rules in Autonomous Vehicle Software . . 43--44
                Lishan Yang and   
                    Bin Nie and   
                 Adwait Jog and   
                 Evgenia Smirni   SUGAR: Speeding Up GPGPU Application
                                  Resilience Estimation with Input Sizing  45--46
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                Mustafa Karakoy   Mix and Match: Reorganizing Tasks for
                                  Enhancing Data Locality  . . . . . . . . 47--48
                Wentao Weng and   
                Xingyu Zhou and   
                     R. Srikant   Optimal Load Balancing with Locality
                                  Constraints  . . . . . . . . . . . . . . 49--50
                Daan Rutten and   
             Debankur Mukherjee   Load Balancing Under Strict
                                  Compatibility Constraints  . . . . . . . 51--52
              Tim Hellemans and   
                Benny Van Houdt   Mean Waiting Time in Large-Scale and
                                  Critically Loaded Power of d Load
                                  Balancing Systems  . . . . . . . . . . . 53--54
                Elene Anton and   
               Urtzi Ayesta and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Improving the Performance of
                                  Heterogeneous Data Centers through
                                  Redundancy . . . . . . . . . . . . . . . 55--56
                   Xin Wang and   
               Richard T. B. Ma   On Private Peering Agreements between
                                  Content and Access Providers: a
                                  Contractual Equilibrium Analysis . . . . 57--58
             Michael Fleder and   
                  Devavrat Shah   I Know What You Bought At Chipotle for
                                  \$9.81 by Solving a Linear Inverse
                                  Problem  . . . . . . . . . . . . . . . . 59--60
       Sushil Mahavir Varma and   
           Francisco Castro and   
            Siva Theja Maguluri   Dynamic Pricing and Matching for
                                  Two-Sided Markets with Strategic Servers 61--62
                  Jing Tang and   
                Xueyan Tang and   
                 Andrew Lim and   
                    Kai Han and   
               Chongshou Li and   
                   Junsong Yuan   Revisiting Modified Greedy Algorithm for
                                  Monotone Submodular Maximization with a
                                  Knapsack Constraint  . . . . . . . . . . 63--64
                    Kai Han and   
                 Shuang Cui and   
              Tianshuai Zhu and   
                Enpei Zhang and   
                  Benwei Wu and   
                Zhizhuo Yin and   
                    Tong Xu and   
               Shaojie Tang and   
                       He Huang   Approximation Algorithms for Submodular
                                  Data Summarization with a Knapsack
                                  Constraint . . . . . . . . . . . . . . . 65--66
                     Bo Sun and   
                Ali Zeynali and   
                 Tongxin Li and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
              Danny H. K. Tsang   Competitive Algorithms for the Online
                                  Multiple Knapsack Problem with
                                  Application to Electric Vehicle Charging 67--68
             Leandros Tassiulas   Enabling Intelligent Services at the
                                  Network Edge . . . . . . . . . . . . . . 69--70
       Klaus-Tycho Foerster and   
          Janne H. Korhonen and   
                    Ami Paz and   
               Joel Rybicki and   
                  Stefan Schmid   Input-Dynamic Distributed Algorithms for
                                  Communication Networks . . . . . . . . . 71--72
Noémie Périvier and   
             Chamsi Hssaine and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   Real-time Approximate Routing for Smart
                                  Transit Systems  . . . . . . . . . . . . 73--74
              Kamiar Asgari and   
               Michael J. Neely   Bregman-style Online Convex Optimization
                                  with Energy Harvesting Constraints . . . 75--76
                   Liren Yu and   
                 Jiaming Xu and   
                    Xiaojun Lin   The Power of D-hops in Matching
                                  Power-Law Graphs . . . . . . . . . . . . 77--78
              Yiguang Zhang and   
            Jessy Xinyi Han and   
              Ilica Mahajan and   
         Priyanjana Bengani and   
            Augustin Chaintreau   Chasm in Hegemony: Explaining and
                                  Reproducing Disparities in Homophilous
                                  Networks . . . . . . . . . . . . . . . . 79--80
              Ahmad Hazimeh and   
             Adrian Herrera and   
                  Mathias Payer   Magma: a Ground-Truth Fuzzing Benchmark  81--82
        Luis F. Abanto-Leon and   
         Andreas Bäuml and   
     Gek Hong (Allyson) Sim and   
           Matthias Hollick and   
                    Arash Asadi   Stay Connected, Leave no Trace:
                                  Enhancing Security and Privacy in WiFi
                                  via Obfuscating Radiometric Fingerprints 83--84

ACM SIGMETRICS Performance Evaluation Review
Volume 49, Number 2, September, 2021

             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2021) . . . . . . . . . . 2--2
                      Yu Su and   
                  Jannie Yu and   
                Vivek Anand and   
                   Adam Wierman   Learning-Augmented Energy-Aware
                                  Scheduling of Precedence-Constrained
                                  Tasks  . . . . . . . . . . . . . . . . . 3--5
              Guocheng Liao and   
                      Yu Su and   
                 Juba Ziani and   
               Adam Wierman and   
                  Jianwei Huang   The Privacy Paradox and Optimal
                                  Bias-Variance Trade-offs in Data
                                  Acquisition  . . . . . . . . . . . . . . 6--8
            Jhonatan Tavori and   
                    Hanoch Levy   Continual Versus Occasional Spreading In
                                  Networks: Modeling Spreading Thresholds
                                  In Epidemic Processes  . . . . . . . . . 9--11
               Julien Ancel and   
          Christine Fricker and   
                 Hanene Mohamed   Mean field analysis for bike and e-bike
                                  sharing systems  . . . . . . . . . . . . 12--14
         Fernando Migu'elez and   
                Josu Doncel and   
                   Urtzi Ayesta   A Resource Sharing Game for the
                                  Freshness of Status Updates  . . . . . . 15--17
                 Ziv Scully and   
              Lucas van Kreveld   When Does the Gittins Policy Have
                                  Asymptotically Optimal Response Time
                                  Tail?  . . . . . . . . . . . . . . . . . 18--20
                    Yingdong Lu   Performance Analysis of A Queueing
                                  System with Server Arrival and Departure 21--23
                Daan Rutten and   
             Debankur Mukherjee   Capacity Scaling Augmented With
                                  Unreliable Machine Learning Predictions  24--26
            Andres Ferragut and   
             Lucas Narbondo and   
              Fernando Paganini   EDF vehicle charging under deadline
                                  uncertainty  . . . . . . . . . . . . . . 27--29
             Niloofar Bayat and   
                Cody Morrin and   
                Yuheng Wang and   
                   Vishal Misra   Rank estimation for (approximately)
                                  low-rank matrices  . . . . . . . . . . . 30--32
           Amir Reza Ramtin and   
                Don Towsley and   
              Philippe Nain and   
   Edmundo de Souza e Silva and   
             Daniel S. Menasche   Are Covert DDoS Attacks Facing
                                  Multi-Feature Detectors Feasible?  . . . 33--35
                     Ziv Scully   Bounding Mean Slowdown in Multiserver
                                  Systems  . . . . . . . . . . . . . . . . 36--38
            Soumyadip Ghosh and   
             Mark S. Squillante   Unbiased Gradient Estimation for Robust
                                  Optimization . . . . . . . . . . . . . . 39--41
               Nicolas Gast and   
                    Neil Walton   Special Issue on the Workshop about
                                  Reinforcement Learning in Networks and
                                  Queues (RLNQ 2021) . . . . . . . . . . . 42--42
               Chen Tessler and   
           Yuval Shpigelman and   
                  Gal Dalal and   
            Amit Mandelbaum and   
      Doron Haritan Kazakov and   
            Benjamin Fuhrer and   
                Gal Chechik and   
                    Shie Mannor   Reinforcement Learning for Datacenter
                                  Congestion Control . . . . . . . . . . . 43--46
          Francisco Robledo and   
               Vivek Borkar and   
               Urtzi Ayesta and   
         Konstantin Avrachenkov   QWI: Q-learning with Whittle Index . . . 47--50
               Conor Newton and   
            Ayalvadi Ganesh and   
                    Henry Reeve   Asymptotic Optimality for Decentralised
                                  Bandits  . . . . . . . . . . . . . . . . 51--53
                    Xin Liu and   
                     Bin Li and   
                 Pengyi Shi and   
                       Lei Ying   A Constrained Bandit Approach for Online
                                  Dispatching  . . . . . . . . . . . . . . 54--56
         Christopher Archer and   
        Siddhartha Banerjee and   
             Mayleen Cortez and   
              Carrie Rucker and   
           Sean R. Sinclair and   
                Max Solberg and   
                Qiaomin Xie and   
               Christina Lee Yu   ORSuite: Benchmarking Suite for
                                  Sequential Operations Models . . . . . . 57--61
                   Giulia Fanti   ACM SIGMETRICS 2021 Student Research
                                  Competition  . . . . . . . . . . . . . . 62--62
                  Shreshth Tuli   SplitPlace: Intelligent Placement of
                                  Split Neural Nets in Mobile Edge
                                  Environments . . . . . . . . . . . . . . 63--65
                      Yige Hong   Sharp Zero-Queueing Bounds for
                                  Multi-Server Jobs  . . . . . . . . . . . 66--68
                Mahshid Ghasemi   Auto-SDA: Automated Video-based Social
                                  Distancing Analyzer  . . . . . . . . . . 69--71
                     Edwin Peng   Exact Response Time Analysis of
                                  Preemptive Priority Scheduling with
                                  Switching Overhead . . . . . . . . . . . 72--74

ACM SIGMETRICS Performance Evaluation Review
Volume 49, Number 3, December, 2021

               Qingsong Liu and   
                  Wenfei Wu and   
               Longbo Huang and   
                   Zhixuan Fang   Simultaneously Achieving Sublinear
                                  Regret and Constraint Violations for
                                  Online Convex Optimization with
                                  Time-varying Constraints . . . . . . . . 4--5
                Russell Lee and   
                 Yutao Zhou and   
                   Lin Yang and   
       Mohammad Hajiesmaili and   
               Ramesh Sitaraman   Competitive Bidding Strategies for
                                  Online Linear Optimization with
                                  Inventory Management Constraints . . . . 6--7
               Jianhan Song and   
         Gustavo de Veciana and   
              Sanjay Shakkottai   Online Learning for Hierarchical
                                  Scheduling to Support Network Slicing in
                                  Cellular Networks  . . . . . . . . . . . 8--9
            Andres Ferragut and   
             Lucas Narbondo and   
              Fernando Paganini   Scheduling EV charging with uncertain
                                  departure times  . . . . . . . . . . . . 10--15
             Simon Scherrer and   
              Markus Legner and   
              Adrian Perrig and   
                  Stefan Schmid   An Axiomatic Perspective on the
                                  Performance Effects of End-Host Path
                                  Selection  . . . . . . . . . . . . . . . 16--17
                    Bai Liu and   
                  Eytan Modiano   Optimal Control for Networks with
                                  Unobservable Malicious Nodes . . . . . . 18--19
           Amir Reza Ramtin and   
              Philippe Nain and   
         Daniel S. Menasche and   
                Don Towsley and   
       Edmundo de Souza e Silva   Fundamental Scaling Laws of Covert DDoS
                                  Attacks  . . . . . . . . . . . . . . . . 20--21
            Anya Chaturvedi and   
            Chandra Chekuri and   
     Andréa W. Richa and   
              Matthias Rost and   
              Stefan Schmid and   
                  Jamison Weber   Improved Throughput for All-or-Nothing
                                  Multicommodity Flows with Arbitrary
                                  Demands  . . . . . . . . . . . . . . . . 22--27
             Xiandong Huang and   
               Qinglin Wang and   
                   Shuyu Lu and   
                Ruochen Hao and   
                Songzhu Mei and   
                        Jie Liu   Evaluating FFT-based Algorithms for
                                  Strided Convolutions on ARMv8
                                  Architectures? . . . . . . . . . . . . . 28--29
            Gayane Vardoyan and   
         Matthew Skrzypczyk and   
               Stephanie Wehner   On the Quantum Performance Evaluation of
                                  Two Distributed Quantum Architectures    30--31
                Guin Gilman and   
                Robert J. Walls   Characterizing Concurrency Mechanisms
                                  for NVIDIA GPUs under Deep Learning
                                  Workloads (Extended Abstract)  . . . . . 32--34
               Maciej Pacut and   
                 Wenkai Dai and   
            Alexandre Labbe and   
       Klaus-Tycho Foerster and   
                  Stefan Schmid   Improved Scalability of Demand-Aware
                                  Datacenter Topologies With Minimal Route
                                  Lengths and Congestion . . . . . . . . . 35--36
               Arnaud Cadas and   
                Josu Doncel and   
       Jean-Michel Fourneau and   
                      Ana Busic   Flexibility can Hurt Dynamic Matching
                                  System Performance . . . . . . . . . . . 37--42
       Sushil Mahavir Varma and   
            Siva Theja Maguluri   A Heavy Traffic Theory of Two-Sided
                                  Queues . . . . . . . . . . . . . . . . . 43--44
                 Rahul Vaze and   
              Jayakrishnan Nair   Speed Scaling with Multiple Servers
                                  under a Sum--Power Constraint  . . . . . 45--50
            Giuliano Casale and   
          Peter G. Harrison and   
                   Wai Hong Ong   Facilitating Load-Dependent Queueing
                                  Analysis Through Factorization (Extended
                                  Abstract)  . . . . . . . . . . . . . . . 51--52
            Martin Zubeldia and   
                 Michel Mandjes   Learning traffic correlations in
                                  multi-class queueing systems by sampling
                                  queue lengths, with routing applications 53--54
                    Bruce Spang   Updating the Theory of Buffer Sizing . . 55--56
            Shiksha Singhal and   
              Veeraruna Kavitha   Coalition Formation Resource Sharing
                                  Games in Networks  . . . . . . . . . . . 57--58
    Vibhaalakshmi Sivaraman and   
               Weizhao Tang and   
Shaileshh Bojja Venkatakrishnan and   
               Giulia Fanti and   
              Mohammad Alizadeh   The Effect of Network Topology on Credit
                                  Network Throughput . . . . . . . . . . . 59--60
               Xusheng Chen and   
              Shixiong Zhao and   
                      Ji Qi and   
               Jianyu Jiang and   
                 Haoze Song and   
                 Cheng Wang and   
                  Tsz On Li and   
           T-H. Hubert Chan and   
              Fengwei Zhang and   
                  Xiapu Luo and   
                   Sen Wang and   
                 Gong Zhang and   
                    Heming Cuih   Efficient and DoS-resistant Consensus
                                  for Permissioned Blockchains . . . . . . 61--62
         Shubham Anand Jain and   
             Shreyas Goenka and   
               Divyam Bapna and   
       Nikhil Karamchandani and   
              Jayakrishnan Nair   Sequential community mode estimation . . 63--64
              Benjamin Berg and   
          Justin Whitehouse and   
           Benjamin Moseley and   
                 Weina Wang and   
             Mor Harchol-Balter   The Case for Phase-Aware Scheduling of
                                  Parallelizable Jobs  . . . . . . . . . . 65--66
                  Xinzhe Fu and   
                  Eytan Modiano   Elastic Job Scheduling with Unknown
                                  Utility Functions  . . . . . . . . . . . 67--68
            Johan Ruuskanen and   
               Tommi Berner and   
            Karl-Erik Arzen and   
                   Anton Cervin   Improving the Mean-Field Fluid Model of
                                  Processor Sharing Queueing Networks for
                                  Dynamic Performance Models in Cloud
                                  Computing  . . . . . . . . . . . . . . . 69--70
            Jonatha Anselmi and   
               Bruno Gaujal and   
 Louis-Sébastien Rebuffi   Optimal Speed Profile of a DVFS
                                  Processor under Soft Deadlines . . . . . 71--72
                 Peter Buchholz   On the Representation of Correlated
                                  Exponential Distributions by Phase Type
                                  Distributions  . . . . . . . . . . . . . 73--78
            Gayane Vardoyan and   
                Saikat Guha and   
              Philippe Nain and   
                    Don Towsley   On the Capacity Region of Bipartite and
                                  Tripartite Entanglement Switching:
                                  Erratum  . . . . . . . . . . . . . . . . 79--80

ACM SIGMETRICS Performance Evaluation Review
Volume 49, Number 4, March, 2022

         Mor Harchol-Balter and   
                     Ziv Scully   The most common queueing theory
                                  questions asked by computer systems
                                  practitioners  . . . . . . . . . . . . . 3--7
                   Chee Wei Tan   The Value of Cooperation: From AIMD to
                                  Flipped Classroom Teaching . . . . . . . 8--13
               Cathy H. Xia and   
               Nanshan Chen and   
                Priya Natarajan   Teaching Performance Modeling via
                                  Software and Instructional Technology    14--19
            Jean-Yves Le Boudec   Performance Evaluation: a Preparation
                                  for Statistics and Data Science ?  . . . 20--23
               Giuseppe Serazzi   Updating the Content of Performance
                                  Analysis Textbooks . . . . . . . . . . . 24--27
          Susanna Donatelli and   
         Giuliana Franceschinis   Special issue on the Workshop on TOols
                                  for Stochastic Modeling and Evaluation
                                  (TOSME 2021) . . . . . . . . . . . . . . 28--28
      Salah Al-Deen Almousa and   
G\textasciiacuteabor Horv\textasciiacuteath and   
Ill \textasciiacutees Horv\textasciiacuteath and   
Andr\textasciiacuteas M\textasciiacuteesz\textasciiacutearos and   
   Mikl \textasciiacuteos Telek   The CME method: Efficient numerical
                                  inverse Laplace transformation with
                                  Concentrated Matrix Exponential
                                  distribution . . . . . . . . . . . . . . 29--34
         Sebastian Allmeier and   
                   Nicolas Gast   rmf tool --- A library to Compute
                                  (Refined) Mean Field Approximation(s)    35--40
             Giulio Masetti and   
             Leonardo Robol and   
        Silvano Chiaradonna and   
       Felicita Di Giandomenico   TAPAS: a Tool for Stochastic Evaluation
                                  of Large Interdependent Composed Models
                                  with Absorbing States  . . . . . . . . . 41--46
                Moreno Marzolla   Queueing Networks and Markov Chains
                                  Analysis with the Octave queueing
                                  package  . . . . . . . . . . . . . . . . 47--52
       Vittorio Cortellessa and   
          Daniele Di Pompeo and   
            Vincenzo Stoico and   
                  Michele Tucci   Software Model Refactoring Driven by
                                  Performance Antipattern Detection  . . . 53--58
                Carlos E. Budde   FIG: the Finite Improbability Generator
                                  v1.3 . . . . . . . . . . . . . . . . . . 59--64
            Paolo Ballarini and   
               Beno\^\it Barbot   Cosmos: Evolution of a Statistical Model
                                  Checking Platform  . . . . . . . . . . . 65--69
            Matthew Sheldon and   
                Giuliano Casale   TauSSA: Simulating Markovian Queueing
                                  Networks with Tau Leaping  . . . . . . . 70--75
              Catalina M. Llado   PIPE 2.7 overview: a Petri net tool for
                                  performance modeling and evaluation  . . 76--80
            Laura Carnevali and   
             Marco Paolieri and   
                 Enrico Vicario   The ORIS tool: app, library, and toolkit
                                  for quantitative evaluation of
                                  non-Markovian systems  . . . . . . . . . 81--86
              Elvio G. Amparore   Stochastic modelling and evaluation
                                  using GreatSPN . . . . . . . . . . . . . 87--91
                Luca Vassio and   
            Danilo Giordano and   
                  Jinoh Kim and   
                  Jon Crowcroft   Message from the organizers of WAIN  . . 92--92
                 Shimin Tao and   
                Weibin Meng and   
               Yimeng Cheng and   
                 Yichen Zhu and   
                   Ying Liu and   
                Chunning Du and   
                    Tao Han and   
              Yongpeng Zhao and   
            Xiangguang Wang and   
                       Hao Yang   LogStamp: Automatic Online Log Parsing
                                  Based on Sequence Labelling  . . . . . . 93--98
                 Wenwen Hao and   
                    Ben Niu and   
                    Yin Luo and   
               Kangkang Liu and   
                         Na Liu   Improving accuracy and adaptability of
                                  SSD failure prediction in hyper-scale
                                  data centers . . . . . . . . . . . . . . 99--104
               Shiva Ketabi and   
            Matthew Buckley and   
          Parsa Pazhooheshy and   
            Faraz Farahvash and   
                 Yashar Ganjali   Correlation-Aware Flow Consolidation for
                                  Load Balancing and Beyond  . . . . . . . 105--110
         David Pujol-Perich and   
         Jose Suarez-Varela and   
   Albert Cabellos-Aparicio and   
                Pere Barlet-Ros   Unveiling the potential of Graph Neural
                                  Networks for robust Intrusion Detection  111--117
Gustavo de Carvalho Bertoli and   
Lourenço Alves Pereira Júnior and   
                  Osamu Saotome   Improving detection of scanning attacks
                                  on heterogeneous networks with Federated
                                  Learning . . . . . . . . . . . . . . . . 118--123
       Matheus F. C. Barros and   
      Carlos H. G. Ferreira and   
      Lourenco A. P. Junior and   
               Marco Mellia and   
         Jussara M. Almeida and   
       Bruno Pereira dos Santos   Understanding mobility in networks: a
                                  node embedding approach  . . . . . . . . 124--130


ACM SIGMETRICS Performance Evaluation Review
Volume 50, Number 2, September, 2022

              James Roberts and   
                    Dario Rossi   Size-based scheduling vs fairness for
                                  datacenter flows: a queuing perspective  2--10
             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2022) . . . . . . . . . . 11--11
              Shigeo Shioda and   
                 Kenta Takehara   Ergodicity of Time Reversal Process of
                                  Stochastic Consensus Formation and Its
                                  Application  . . . . . . . . . . . . . . 12--14
            Jhonatan Tavori and   
                    Hanoch Levy   Queueing-Network Based Applications
                                  Under Worst-case Attacks . . . . . . . . 15--17
               Anand Kalvit and   
                    Assaf Zeevi   Dynamic Learning in Large Matching
                                  Markets  . . . . . . . . . . . . . . . . 18--20
                Harry Jiang and   
               Xiaoxi Zhang and   
                Carlee Joe-Wong   DOLL: Distributed OnLine Learning Using
                                  Preemptible Cloud Instances  . . . . . . 21--23
                   Yuan Yao and   
             Marco Paolieri and   
                Leana Golubchik   Sojourn Time Minimization of Successful
                                  Jobs . . . . . . . . . . . . . . . . . . 24--26
                   Heng-Qing Ye   Optimal Round-Robin Routing to Parallel
                                  Servers in Heavy Traffic . . . . . . . . 27--29
                   E. Anton and   
                 R. Righter and   
                  I. M. Verloop   Scheduling under redundancy  . . . . . . 30--32
                 Xiaoqi Tan and   
                  Siyuan Yu and   
                  Raouf Boutaba   Online Selection with Convex Costs . . . 33--35
              Illes Horvath and   
            Andras Meszaros and   
                   Miklos Telek   Optimized numerical inverse Laplace
                                  transformation . . . . . . . . . . . . . 36--38
                   Rui Ding and   
                Eugene Feinberg   CVaR Optimization for MDPs: Existence
                                  and Computation of Optimal Policies  . . 39--41
        Vasileios Kalantzis and   
         Mark S. Squillante and   
            Shashanka Ubaru and   
                    Lior Horesh   On Quantum Algorithms for Random Walks
                                  in the Nonnegative Quarter Plane . . . . 42--44
    Pravein Govindan Kannan and   
              Priyanka Naik and   
            Praveen Tammana and   
               Mythili Vutukuru   Special Issue on The Workshop on
                                  Performance of host-based Network
                                  Applications (PerfNA 2022) . . . . . . . 45--45
                   Ziyan Wu and   
               Tianming Cui and   
           Arvind Narayanan and   
                 Yang Zhang and   
                 Kangjie Lu and   
               Antonia Zhai and   
                   Zhi-Li Zhang   GranularNF: Granular Decomposition of
                                  Stateful NFV at 100 Gbps Line Speed and
                                  Beyond . . . . . . . . . . . . . . . . . 46--51

ACM SIGMETRICS Performance Evaluation Review
Volume 50, Number 3, December, 2022

                     Ziv Scully   A New Toolbox for Scheduling Theory  . . 3--6
                  Anish Agarwal   Causal Inference for Social and
                                  Engineering Systems  . . . . . . . . . . 7--11
                    Zaiwei Chen   A Unified Lyapunov Framework for
                                  Finite-Sample Analysis of Reinforcement
                                  Learning Algorithms  . . . . . . . . . . 12--15
                  Shreshth Tuli   AI and Co-Simulation Driven Resource
                                  Management in Fog Computing Environments 16--19
                 Tareq Si Salem   Online Learning for Network Resource
                                  Allocation . . . . . . . . . . . . . . . 20--23
              Jessica Maghakian   Online Resource Allocation with Noisy
                                  Predictions  . . . . . . . . . . . . . . 24--27
                   Alim Ul Gias   Model-based Resource Management for
                                  Fine-grained Services  . . . . . . . . . 28--31
                       Xiao Sun   Resource Allocation and Scheduling in
                                  Modern Cloud Computing . . . . . . . . . 32--35
                  Xiaojun Shang   Enabling Data-intensive Workflows in
                                  Heterogeneous Edge-cloud Networks  . . . 36--38

ACM SIGMETRICS Performance Evaluation Review
Volume 50, Number 4, March, 2023

               Andrea Marin and   
               Sabina Rossi and   
                Diletta Olliaro   A product-form network for systems with
                                  job stealing policies  . . . . . . . . . 2--4
               Nitesh Kumar and   
         Gaurav S. Kasbekar and   
                   D. Manjunath   Application of Data Collected by
                                  Endpoint Detection and Response Systems
                                  for Implementation of a Network Security
                                  System based on Zero Trust Principles
                                  and the EigenTrust Algorithm . . . . . . 5--7
                Rooji Jinan and   
              Gaurav Gautam and   
              Parimal Parag and   
                Vaneet Aggarwal   Asymptotic Analysis of Probabilistic
                                  Scheduling for Erasure-Coded
                                  Heterogeneous Systems  . . . . . . . . . 8--10
               Wonjun Hwang and   
                  Yoora Kim and   
                   Kyunghan Lee   Augmenting Epidemic Models with Graph
                                  Neural Networks  . . . . . . . . . . . . 11--13
            Sudeshna Biswas and   
                 Himanshu . and   
             Sushmita Ghosh and   
                 Payali Das and   
               Kaushik Saha and   
                      Swades De   Efficient Data Transfer Mechanism for
                                  DLMS/COSEM Enabled Smart Energy Metering
                                  Platform . . . . . . . . . . . . . . . . 14--16
        Abhishek K. Umrawal and   
                Vaneet Aggarwal   Leveraging the Community Structure of a
                                  Social Network for Maximizing the Spread
                                  of Influence . . . . . . . . . . . . . . 17--19
              Samarth Gupta and   
                Jinhang Zuo and   
            Carlee Joe-Wong and   
                Gauri Joshi and   
                    Osman Yagan   Correlated Combinatorial Bandits for
                                  Online Resource Allocation . . . . . . . 20--22
           Zahidur Talukder and   
              Mohammad A. Islam   Efficient Federated Learning with
                                  Self-Regulating Clients  . . . . . . . . 23--25
   Prakirt Raj Jhunjhunwala and   
            Siva Theja Maguluri   Heavy Traffic Queue Length Distribution
                                  without Resource Pooling in an
                                  Input-Queued Switch  . . . . . . . . . . 26--28
              Shreshth Tuli and   
            Giuliano Casale and   
           Nicholas R. Jennings   Learning to Dynamically Select Cost
                                  Optimal Schedulers in Cloud Computing
                                  Environments . . . . . . . . . . . . . . 29--31
               Kumar Saurav and   
                     Rahul Vaze   Minimizing Age of Information under
                                  Arbitrary Arrival Model with Arbitrary
                                  Packet Size  . . . . . . . . . . . . . . 32--34
              R Sri Prakash and   
       Nikhil Karamchandani and   
                Sharayu Moharir   On the Regret of Online Edge Service
                                  Hosting  . . . . . . . . . . . . . . . . 35--37
  Alexandre Reiffers-Masson and   
                   Isabel Amigo   Online Multi-Agent Decentralized
                                  Byzantine-robust Gradient Estimation . . 38--40
                  Tyler Sam and   
                Yudong Chen and   
               Christina Lee Yu   Overcoming the Long Horizon Barrier for
                                  Sample-Efficient Reinforcement Learning
                                  with Latent Low-Rank Structure . . . . . 41--43
                      Qi Li and   
                      Dong Chen   Peer to Peer Distributed Solar Energy
                                  Trading  . . . . . . . . . . . . . . . . 44--46
                      Wenxin Li   Performance Analysis of Modified SRPT in
                                  Multiple-Processor Multitask Scheduling  47--49
            Md Rajib Hossen and   
              Mohammad A. Islam   Practical Efficient Microservice
                                  Autoscaling  . . . . . . . . . . . . . . 50--52
                  Yinan Zhu and   
               Chunhui Duan and   
                      Xuan Ding   RoSense  . . . . . . . . . . . . . . . . 53--55
               Daksh Mittal and   
             Sandeep Juneja and   
               Shubhada Agrawal   Shift, scale and restart smaller models
                                  to estimate larger ones: Agent based
                                  simulators in epidemiology . . . . . . . 56--58
      Tuhinangshu Choudhury and   
                 Weina Wang and   
                    Gauri Joshi   Tackling Heterogeneous Traffic in
                                  Multi-access Systems via Erasure Coded
                                  Servers  . . . . . . . . . . . . . . . . 59--61
                  Hem Regmi and   
                     Sanjib Sur   Towards Deep Learning Augmented Robust
                                  D-Band Millimeter-Wave Picocell
                                  Deployment . . . . . . . . . . . . . . . 62--64


ACM SIGMETRICS Performance Evaluation Review
Volume 51, Number 1, June, 2023

             Hasan Al Maruf and   
               Yuhong Zhong and   
                Hongyi Wang and   
         Mosharaf Chowdhury and   
                 Asaf Cidon and   
               Carl Waldspurger   Memtrade: Marketplace for Disaggregated
                                  Memory Clouds  . . . . . . . . . . . . . 1--2
              Vamsi Addanki and   
                  Chen Avin and   
                  Stefan Schmid   Mars: Near-Optimal Throughput with
                                  Shallow Buffers in Reconfigurable
                                  Datacenter Networks  . . . . . . . . . . 3--4
        Christina Giannoula and   
              Kailong Huang and   
              Jonathan Tang and   
          Nectarios Koziris and   
            Georgios Goumas and   
             Zeshan Chishti and   
             Nandita Vijaykumar   Architectural Support for Efficient Data
                                  Movement in Fully Disaggregated Systems  5--6
            Johannes Zerwas and   
         Csaba Györgyi and   
              Andreas Blenk and   
              Stefan Schmid and   
                      Chen Avin   Duo: a High-Throughput Reconfigurable
                                  Datacenter Network Using Local Routing
                                  and Control  . . . . . . . . . . . . . . 7--8
                 Jiaxin Lin and   
                     Tao Ji and   
              Xiangpeng Hao and   
                 Hokeun Cha and   
                 Yanfang Le and   
                Xiangyao Yu and   
                  Aditya Akella   Towards Accelerating Data Intensive
                                  Application's Shuffle Process Using
                                  SmartNICs  . . . . . . . . . . . . . . . 9--10
                 Wenzhe Zhu and   
                 Yongkun Li and   
                    Erci Xu and   
                     Fei Li and   
                 Yinlong Xu and   
                 John C. S. Lui   DiffForward: On Balancing Forwarding
                                  Traffic for Modern Cloud Block Services
                                  via Differentiated Forwarding  . . . . . 11--12
              Adithya Kumar and   
      Anand Sivasubramaniam and   
                    Timothy Zhu   SplitRPC: a Control + Data Path
                                  Splitting RPC Stack for ML Inference
                                  Serving  . . . . . . . . . . . . . . . . 13--14
              Itamar Gozlan and   
                  Chen Avin and   
               Gil Einziger and   
               Gabriel Scalosub   Go-to-Controller is Better: Efficient
                                  and Optimal LPM Caching with Splicing    15--16
           Daniele De Sensi and   
         Tiziano De Matteis and   
         Konstantin Taranov and   
      Salvatore Di Girolamo and   
                Tobias Rahn and   
                Torsten Hoefler   Noise in the Clouds: Influence of
                                  Network Performance Variability on
                                  Application Scalability  . . . . . . . . 17--18
                     Yi Liu and   
               Shouqian Shi and   
                Minghao Xie and   
                Heiner Litz and   
                      Chen Qian   Smash: Flexible, Fast, and
                                  Resource-efficient Placement and Lookup
                                  of Distributed Storage . . . . . . . . . 19--20
                Wangkai Jin and   
                  Xiangjun Peng   SLITS: Sparsity-Lightened Intelligent
                                  Thread Scheduling  . . . . . . . . . . . 21--22
               Hongyuan Liu and   
              Sreepathi Pai and   
                     Adwait Jog   Asynchronous Automata Processing on GPUs 23--24
                Canhui Chen and   
                   Zhixuan Fang   Gacha Game Analysis and Design . . . . . 25--26
                Daan Rutten and   
             Debankur Mukherjee   Mean-field Analysis for Load Balancing
                                  on Spatial Graphs  . . . . . . . . . . . 27--28
         Sebastian Allmeier and   
                   Nicolas Gast   Bias and Refinement of Multiscale Mean
                                  Field Models . . . . . . . . . . . . . . 29--30
             Tareq Si Salem and   
         Georgios Iosifidis and   
                Giovanni Neglia   Enabling Long-term Fairness in Dynamic
                                  Resource Allocation  . . . . . . . . . . 31--32
             Serkut Ayvasik and   
              Fidan Mehmeti and   
             Edwin Babaians and   
              Wolfgang Kellerer   PEACH: Proactive and Environment Aware
                                  Channel State Information Prediction
                                  with Depth Images  . . . . . . . . . . . 33--34
                Yunzhuo Liu and   
                   Bo Jiang and   
                   Tian Guo and   
               Zimeng Huang and   
                  Wenhao Ma and   
               Xinbing Wang and   
                   Chenghu Zhou   FuncPipe: a Pipelined Serverless
                                  Framework for Fast and Cost-efficient
                                  Training of Deep Learning Models . . . . 35--36
            Prashanthi S. K and   
    Sai Anuroop Kesanapalli and   
                 Yogesh Simmhan   Characterizing the Performance of
                                  Accelerated Jetson Edge Devices for
                                  Training Deep Learning Models  . . . . . 37--38
 Ali Hossein Abbasi Abyaneh and   
                 Maizi Liao and   
             Seyed Majid Zahedi   Malcolm: Multi-agent Learning for
                                  Cooperative Load Management at Rack
                                  Scale  . . . . . . . . . . . . . . . . . 39--40
             Kyle MacMillan and   
               Tarun Mangla and   
                James Saxon and   
          Nicole P. Marwell and   
                  Nick Feamster   A Comparative Analysis of Ookla
                                  Speedtest and Measurement Labs Network
                                  Diagnostic Test (NDT7) . . . . . . . . . 41--42
               Rashna Kumar and   
                  Sana Asif and   
                  Elise Lee and   
    Fabián E. Bustamante   Each at its Own Pace: Third-Party
                                  Dependency and Centralization Around the
                                  World  . . . . . . . . . . . . . . . . . 43--44
                  Haoran Lu and   
             Qingchuan Zhao and   
             Yongliang Chen and   
              Xiaojing Liao and   
                   Zhiqiang Lin   Detecting and Measuring Aggressive
                                  Location Harvesting in Mobile Apps via
                                  Data-flow Path Embedding . . . . . . . . 45--46
                 Amanda Hsu and   
                   Frank Li and   
                    Paul Pearce   Fiat Lux: Illuminating IPv6
                                  Apportionment with Different Datasets    47--48
               Marco Chiesa and   
          Fábio L. Verdi   Network Monitoring on Multi-Pipe
                                  Switches . . . . . . . . . . . . . . . . 49--50
                 Haibo Wang and   
     Dimitrios Melissourgos and   
                  Chaoyi Ma and   
                   Shigang Chen   Real-time Spread Burst Detection in Data
                                  Streaming  . . . . . . . . . . . . . . . 51--52
               Usama Naseer and   
           Theophilus A. Benson   JS Capsules: a Framework for Capturing
                                  Fine-grained JavaScript Memory
                                  Measurements for the Mobile Web. . . . . 53--54
        Siddhartha Banerjee and   
             Chamsi Hssaine and   
               Sean R. Sinclair   Online Fair Allocation of Perishable
                                  Resources  . . . . . . . . . . . . . . . 55--56
              Mozhengfu Liu and   
                    Xueyan Tang   Dynamic Bin Packing with Predictions . . 57--58
                     Bo Sun and   
                   Lin Yang and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
             John C. S. Lui and   
                Don Towsley and   
              Danny H. K. Tsang   The Online Knapsack Problem with
                                  Departures . . . . . . . . . . . . . . . 59--60
                Fengjiao Li and   
                Xingyu Zhou and   
                          Bo Ji   (Private) Kernelized Bandits with
                                  Distributed Biased Feedback  . . . . . . 61--62
          Santiago Balseiro and   
            Christian Kroer and   
                Rachitesh Kumar   Online Resource Allocation under Horizon
                                  Uncertainty  . . . . . . . . . . . . . . 63--64
                 Shuang Cui and   
                    Kai Han and   
                  Jing Tang and   
                   He Huang and   
                 Xueying Li and   
                       Zhiyu Li   Streaming Algorithms for Constrained
                                  Submodular Maximization  . . . . . . . . 65--66
                Daniel Vial and   
          Sanjay Shakkottai and   
                     R. Srikant   Robust Multi-Agent Bandits Over
                                  Undirected Graphs  . . . . . . . . . . . 67--68
              Naram Mhaisen and   
             Abhishek Sinha and   
           Georgios Paschos and   
               George Iosifidis   Optimistic No-regret Algorithms for
                                  Discrete Caching . . . . . . . . . . . . 69--70
                Daan Rutten and   
       Nicolas Christianson and   
         Debankur Mukherjee and   
                   Adam Wierman   Smoothed Online Optimization with
                                  Unreliable Predictions . . . . . . . . . 71--72
                    Jing Yu and   
                 Dimitar Ho and   
                   Adam Wierman   Online Adversarial Stabilization of
                                  Unknown Networked Systems  . . . . . . . 73--74
         Jalani K. Williams and   
         Mor Harchol-Balter and   
                     Weina Wang   The M/M/$k$ with Deterministic Setup
                                  Times  . . . . . . . . . . . . . . . . . 75--76
                  Xinzhe Fu and   
                  Eytan Modiano   Joint Learning and Control in Stochastic
                                  Queueing Networks with Unknown Utilities 77--78
                  Yehua Wei and   
                 Jiaming Xu and   
                   Sophie H. Yu   Constant Regret Primal-Dual Policy for
                                  Multi-way Dynamic Matching . . . . . . . 79--80
         Dongyan (Lucy) Huo and   
                Yudong Chen and   
                    Qiaomin Xie   Bias and Extrapolation in Markovian
                                  Linear Stochastic Approximation with
                                  Constant Stepsizes . . . . . . . . . . . 81--82
               Yizhou Zhang and   
                 Guannan Qu and   
                     Pan Xu and   
                 Yiheng Lin and   
                Zaiwei Chen and   
                   Adam Wierman   Global Convergence of Localized Policy
                                  Iteration in Networked Multi-Agent
                                  Reinforcement Learning . . . . . . . . . 83--84
                  Tyler Sam and   
                Yudong Chen and   
               Christina Lee Yu   Overcoming the Long Horizon Barrier for
                                  Sample-Efficient Reinforcement Learning
                                  with Latent Low-Rank Structure . . . . . 85--86
             Mingming Zhang and   
                   Xiang Li and   
                 Baojun Liu and   
                  JianYu Lu and   
               Yiming Zhang and   
               Jianjun Chen and   
                Haixin Duan and   
                 Shuang Hao and   
                 Xiaofeng Zheng   Detecting and Measuring Security Risks
                                  of Hosting-Based Dangling Domains  . . . 87--88
         Alexander Goldberg and   
               Giulia Fanti and   
                  Nihar B. Shah   Batching of Tasks by Users of
                                  Pseudonymous Forums: Anonymity
                                  Compromise and Protection  . . . . . . . 89--90
               Kailong Wang and   
                  Yuxi Ling and   
               Yanjun Zhang and   
                    Zhou Yu and   
                 Haoyu Wang and   
              Guangdong Bai and   
              Beng Chin Ooi and   
                  Jin Song Dong   Characterizing Cryptocurrency-themed
                                  Malicious Browser Extensions . . . . . . 91--92
               Weizhao Tang and   
            Lucianna Kiffer and   
               Giulia Fanti and   
                      Ari Juels   Strategic Latency Reduction in
                                  Blockchain Peer-to-Peer Networks . . . . 93--94
       Sushil Mahavir Varma and   
           Francisco Castro and   
            Siva Theja Maguluri   Power-of-d Choices Load Balancing in the
                                  Sub-Halfin Whitt Regime  . . . . . . . . 95--96
                Benny Van Houdt   On the Stochastic and Asymptotic
                                  Improvement of First-Come First-Served
                                  and Nudge Scheduling . . . . . . . . . . 97--98
               Isaac Grosof and   
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Optimal Scheduling in the
                                  Multiserver-job Model under Heavy
                                  Traffic  . . . . . . . . . . . . . . . . 99--100
                Igor Kadota and   
                Dror Jacoby and   
               Hagit Messer and   
                Gil Zussman and   
            Jonatan Ostrometzky   Switching in the Rain: Predictive
                                  Wireless x-haul Network Reconfiguration  101--102
                Ruofeng Liu and   
                   Nakjung Choi   A First Look at Wi-Fi 6 in Action:
                                  Throughput, Latency, Energy Efficiency,
                                  and Security . . . . . . . . . . . . . . 103--104
                 Ding Zhang and   
Panneer Selvam Santhalingam and   
               Parth Pathak and   
                   Zizhan Zheng   CoBF: Coordinated Beamforming in Dense
                                  mmWave Networks  . . . . . . . . . . . . 105--106
                  Yilin Liu and   
               Shijia Zhang and   
              Mahanth Gowda and   
             Srihari Nelakuditi   Leveraging the Properties of mmWave
                                  Signals for $3$D Finger Motion Tracking
                                  for Interactive IoT Applications . . . . 107--108

ACM SIGMETRICS Performance Evaluation Review
Volume 51, Number 2, September, 2023

             Mark S. Squillante   Special Issue on The Workshop on
                                  MAthematical performance Modeling and
                                  Analysis (MAMA 2023) . . . . . . . . . . 2
                  Weici Pan and   
                    Zhenhua Liu   Switching Constrained Online Convex
                                  Optimization with Predictions and
                                  Feedback Delays  . . . . . . . . . . . . 3--5
               Isaac Grosof and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   New Stability Results for
                                  Multiserver-job Models via Product-form
                                  Saturated Systems  . . . . . . . . . . . 6--8
                   E. Anton and   
                     K. Gardner   The stationary distribution of the
                                  redundancy-$d$ model with random order
                                  of service . . . . . . . . . . . . . . . 9--11
                 Runhan Xie and   
            Kristen Gardner and   
                 Rhonda Righter   Insensitivity for Loss Systems with
                                  Compatibilities  . . . . . . . . . . . . 12--14
               Julianna Bor and   
            Giuliano Casale and   
        William Knottenbelt and   
             Evgenia Smirni and   
           Andreas Stathopoulos   Fitting with matrix exponential mixtures
                                  generated by discrete probabilistic
                                  scaling  . . . . . . . . . . . . . . . . 15--17
              Zhisheng Zhao and   
             Debankur Mukherjee   Optimal Rate-Matrix Pruning For
                                  Heterogeneous Systems  . . . . . . . . . 18--20
                Daan Rutten and   
            Martin Zubeldia and   
             Debankur Mukherjee   Distributed Rate Scaling in Large-Scale
                                  Service Systems  . . . . . . . . . . . . 21--23
       Prakirt Jhunjhunwala and   
      Daniela Hurtado-Lange and   
            Siva Theja Maguluri   Exponential Tail Bounds on Queues  . . . 24--26
               Florin Ciucu and   
                 Sima Mehri and   
                       Amr Rizk   On Ultra-Sharp Queueing Bounds . . . . . 27--29
               Nicolas Gast and   
               Bruno Gaujal and   
                    Kimang Khun   What is an Optimal Policy in
                                  Time-Average MDP?  . . . . . . . . . . . 30--32
                  Yige Hong and   
                     Ziv Scully   Performance of the Gittins Policy in the
                                  G/G/1 and G/G/$k$, With and Without
                                  Setup Times  . . . . . . . . . . . . . . 33--35
                 Runhan Xie and   
                     Ziv Scully   Reducing Heavy-Traffic Response Time
                                  with Asymmetric Dispatching  . . . . . . 36--38
                Yingdong Lu and   
         Mark S. Squillante and   
                    Chai Wah Wu   Markov Decision Process Framework for
                                  Control-Based Reinforcement Learning . . 39--41

ACM SIGMETRICS Performance Evaluation Review
Volume 51, Number 3, December, 2023

                     Sara Alouf   ACM SIGMETRICS 2023 Student Research
                                  Competition  . . . . . . . . . . . . . . 2--2
Amanda Camacho Novaes de Oliveira   Learning the Optimal Representation
                                  Dimension for Restricted Boltzmann
                                  Machines . . . . . . . . . . . . . . . . 3--5
                     Zifeng Niu   Graph Learning based Performance
                                  Analysis for Queueing Networks . . . . . 6--7
                   Isaac Grosof   The RESET Technique for Multiserver-Job
                                  Analysis . . . . . . . . . . . . . . . . 8--9
                Md Rajib Hossen   PEMA+: a Comprehensive Resource Manager
                                  for Microservices  . . . . . . . . . . . 10--12
                    Yuanyuan Li   Distributed Experimental Design Networks 13--15
                     Xiangan He   Zephyr: a Cost-Effective, Zero-Knowledge
                                  Light Client for Enhanced Blockchain
                                  Interoperability . . . . . . . . . . . . 16--18
   Beatriz Pereira de Souza and   
    Marcio Nunes de Miranda and   
    Luiz Maltar Castello Branco   An Energy-efficient Wireless Sensor
                                  Network Applied to Greenhouse
                                  Cultivation  . . . . . . . . . . . . . . 19--21
               Nishat Ahmed and   
               Amaan Rahman and   
                    Lucia Rhode   Best Practices for Exoskeleton
                                  Evaluation Using DeepLabCut  . . . . . . 22--24
              Tianhao Huang and   
                Xiaozhi Zhu and   
                         Mo Niu   An End-to-End Benchmarking Tool for
                                  Analyzing the Hardware-Software
                                  Implications of Multi-modal DNNs . . . . 25--27
                   Urtzi Ayesta   Foreword from Chair of 2023 ACM
                                  SIGMETRICS Doctoral Dissertation Award
                                  Committee  . . . . . . . . . . . . . . . 28--28
                   Isaac Grosof   Optimal Scheduling in Multiserver Queues 29--32
       Prakirt Raj Jhunjhunwala   Design and Analysis of Stochastic
                                  Processing and Matching Networks . . . . 33--37
               Sean R. Sinclair   Adaptivity, Structure, and Objectives in
                                  Sequential Decision-Making . . . . . . . 38--41
                Matthew Corbett   Enhancing Security and Privacy in
                                  Head-Mounted Augmented Reality Systems
                                  Using Eye Gaze . . . . . . . . . . . . . 42--45
                  Zhongdong Liu   Data Freshness in Information-update
                                  Systems: Modeling, Scheduling, and
                                  Tradeoffs  . . . . . . . . . . . . . . . 46--49
            Tasmeen Zaman Ornee   Theory of Timely Remote Estimation and
                                  Application to Situational Awareness . . 50--53
                     Abhin Shah   Data-Rich Causal Inference . . . . . . . 54--57
    Md Kamran Chowdhury Shisher   Timely Inference over Networks . . . . . 58--61
              Vishrant Tripathi   Information Freshness for Monitoring and
                                  Control over Wireless Networks . . . . . 62--65
                    Jinhang Zuo   Learning-enabled Networked Systems . . . 66--69