Last update:
Mon Sep 9 17:10:24 MDT 2024
Ralph E. Keirstead and Donn B. Parker Software testing and certification . . . 3--8
Thomas E. Bell Computer measurement and evaluation: artistry, or science? . . . . . . . . . 4--10 Jacob Palme Beware of the Gibson mix . . . . . . . . 10--11
Robert R. Johnson Some steps toward an information system performance theory . . . . . . . . . . . 4--15 B. W. Kernighan and P. J. Plauger and D. J. Plauger On comparing apples and oranges, or, my machine is better than your machine . . 16--20
W. C. Lynch Do disk arms move? . . . . . . . . . . . 3--16
M. H. Halstead Language level, a missing concept in information theory . . . . . . . . . . . 7--9 M. H. Halstead An experimental determination of the `purity' of a trivial algorithm . . . . 10--15 Peter J. Denning Review of `Statistical Computer Performance Evaluation' by Walter Frieberger; Academic Press (1972) . . . 16--22 Liba Svobodova Communications: Some notes on the Computer Synectics hardware monitor sum 23--25
Haruhisa Ishida and Nobumasa Takahashi Job statistics at a 2000-user university computer center . . . . . . . . . . . . 2--13 Don R. Rice An analytical model for computer system performance evaluation . . . . . . . . . 14--30 Kenneth W. Kolence The software empiricist . . . . . . . . 31--36
Kenneth W. Kolence and Philip J. Kiviat Software unit profiles & Kiviat figures 2--12 Peter J. Denning Why our approach to performance evaluation is SDRAWKCAB . . . . . . . . 13--16 Norman Beck and Gordon Ashby On cost of static linking and loading of subprograms . . . . . . . . . . . . . . 17--20 Ken Kolence The software empiricist experimental disciplines & computer measurements . . . 21--23
James Hughes and David Cronshaw On using a hardware monitor as an intelligent peripheral . . . . . . . . . 3--19 Liba Svobodova Measuring computer system utilization with a hardware and a hybrid monitor . . 20--34
David B. Wortman A note on high resolution timing . . . . 3--9 Rowan Snyder A quantitative study of the addition of extended core storage . . . . . . . . . 10--33 H. E. Barry Merrill A technique for comparative analysis of Kiviat graphs . . . . . . . . . . . . . 34--39
Thomas G. Peterson A comparison of software and hardware monitors . . . . . . . . . . . . . . . . 2--5 Gordon H. Syms Benchmarked comparison of terminal support systems for IBM 360 computers 6--34
Michael F. Morris Kiviat graphs: conventions and `figures of merit' . . . . . . . . . . . . . . . 2--8 Paul L. Lujanac A note on Syms' benchmarked comparison 9--10
G. Scott Graham and Peter J. Denning Multiprogramming and program behavior 1--8 A. Brandwain and J. Buzen and E. Gelenbe and D. Potier A model of performance for virtual memory systems . . . . . . . . . . . . . 9--9 Greg Henderson and Juan Rodriguez-Rosell The optimal choice of window sizes for working set dispatching . . . . . . . . 10--33 Peter J. Denning Comments on a linear paging model . . . 34--48 Richard S. Brice and J. C. Browne Feedback coupled resource allocation policies in the multiprogramming-multiprocessor computer system . . . . . . . . . . . . . . . . . 49--53 Baruch Halachmi and W. R. Franta A closed, cyclic, two-stage multiprogrammed system model and its diffusion approximation solution . . . . 54--64 H. D. Schwetman Analysis of a time-sharing subsystem (a preliminary report) . . . . . . . . . . 65--75 M. Reiser and A. G. Konheim The analysis of storage constraints by a queueing network model with blocking . . 76--81 M. Schatzoff and C. C. Tillman Statistical validation of a trace-driven simulator . . . . . . . . . . . . . . . 82--93 Domenico Ferrari and Mark Liu A general-purpose software measurement tool . . . . . . . . . . . . . . . . . . 94--105 James D. Foley and John W. McInroy An event-driven data collection and analysis facility for a two-computer network . . . . . . . . . . . . . . . . 106--120 A. P. Batson and R. E. Brundage Measurements of the virtual memory demands of Algol-60 programs (Extended Abstract) . . . . . . . . . . . . . . . 121--126 Peter R. Sebastian HEMI (Hybrid Events Monitoring Instrument) . . . . . . . . . . . . . . 127--139 Springer W. Cox Interpretive analysis of computer system performance . . . . . . . . . . . . . . 140--155 J. D. Noe and N. W. Runstein Develop your computer performance pattern . . . . . . . . . . . . . . . . 156--165 D. E. Brotherton The computer capacity curve --- a prerequisite for computer performance evaluation and improvement . . . . . . . 166--179 Warren J. Erikson The value of CPU utilization as a criterion for computer system usage . . 180--187 M. Badel and E. Gelenbe and J. Leroudier and D. Potier and J. Lenfant Adaptive optimization of the performance of a virtual memory computer . . . . . . 188--188 Stephen R. Kimbleton Batch computer scheduling: a heuristically motivated approach . . . . 189--198 Joseph C. Sharp and James N. Roberts An adaptive policy driven scheduler . . 199--208
H. W. Barry Merrill Further comments on comparative evaluation of Kiviat graphs . . . . . . 1--10 Barry A. Stevens A note on figure of merit . . . . . . . 11--19 Thomas E. Bell Managing computer performance with control limits . . . . . . . . . . . . . 21--28 J. C. Browne An analysis of measurement procedures for computer systems . . . . . . . . . . 29--32
Kornel Terplan Cost-optimal reliability of data processing systems . . . . . . . . . . . 1--12 Carl E. Landwehr Usage statistics for MTS . . . . . . . . 13--23 Y. V. Reddy Experimental evaluation of a multiprogrammed computer system . . . . 24--32 Dileep P. Bhandarkar A practical application of memory interference models . . . . . . . . . . 33--39
Dieter Bahr A note on figures of merit . . . . . . . 1--3 B. W. Boehm and T. E. Bell Issues in computer performance evaluation: some consensus, some divergence . . . . . . . . . . . . . . . 4--39
Eric Ole Barber and Arne Asphjell and Arve Dispen Benchmark construction . . . . . . . . . 3--14 J. P. Marrevée Measurements of the Philips P1400 multiprogramming system . . . . . . . . 15--45
Linda S. Wright and William A. Burnette An approach to evaluating time sharing systems: MH-TSS a case study . . . . . . 8--28 John M. Calcagni Shape in ranking Kiviat graphs . . . . . 35--37 J. Eisenfeld and David R. Barker and David J. Mishelvich Iconic representation of the human face with computer graphics . . . . . . . . . 38--39 Gary J. Nutt Tutorial: computer system monitors . . . 41--51
Ira W. Cotton Some fundamentals of price theory for computer services . . . . . . . . . . . 1--12 Thomas Giammo Deficiencies in computer pricing structure theory . . . . . . . . . . . . 13--21 Stephen R. Kimbleton Considerations in pricing distributed computing . . . . . . . . . . . . . . . 22--30 Philip J. Kiviat A brief review of the GAO task group's recommendations on management guidelines for pricing computer services in the federal government . . . . . . . . . . . 71--83 Michael F. Morris Problems in implementing and processing computer charging schemes . . . . . . . 84--88 Gottfried W. R. Luderer Charging problems in mixed time-sharing/batch systems: cross subsidization and invariant work units 89--93 David J. Oatey SIGMETRICS technical meeting on pricing computer services . . . . . . . . . . . 94--102 Richard H. Gutsche User experience . . . . . . . . . . . . 103--107 Anonymous Participant's choice . . . . . . . . . . 108--122
Gottfried W. R. Luderer Defining a computer resource unit . . . 5--10 K. Roehr and K. Niebel Proposal for instruction time objectives 11--18 John P. Collins Performance improvement of the CP-V loader through use of the ADAM hardware monitor . . . . . . . . . . . . . . . . 63--67 A. Brandwajn Simulation of the load of an interactive system . . . . . . . . . . . . . . . . . 69--92
G. W. J. Coppens and M. P. F. M. van Dongen and J. P. C. Kleijnen Quantile estimation in regenerative simulation: a case study . . . . . . . . 5--15 Robert G. Estell How fast is `real-time'? . . . . . . . . 16--18 Philip M. Mills A simple model for cost considerations in a batch multiprocessor environment 19--27
Irene Buchanan and David A. Duce An interactive benchmark for a multi-user minicomputer system . . . . . 5--17 Robert G. Estell How fast is `real-time'? . . . . . . . . 18--20 Abbas Rafii Study of the performance of RPS . . . . 21--38 Thomas G. Price A comparison of queuing network models and measurements of a multiprogrammed computer system . . . . . . . . . . . . 39--62 J. P. Buzen Tuning: tools and techniques . . . . . . 63--81
Mitchell G. Spiegel Workshop summary: `Applications of queuing models to ADP system performance prediction' . . . . . . . . . . . . . . 13--33 L. Hellerman A table of work formulae with derivations and applications . . . . . . 35--54 R. C. Allen and S. R. Clark A note on an empirical study of paging on an IBM 370/145 . . . . . . . . . . . 55--62
Robert L. Morrison Abstracts from the 1977 SIGMETRICS/CMG VIII conference . . . . . . . . . . . . 3--21
Constantine Lazos Functional distribution of the workload of a linked computer system and its simulation . . . . . . . . . . . . . . . 5--14 A.-W. Scheer Combination of an optimization model for hardware selection with data determination methods . . . . . . . . . 15--26 Terence Berinato An analytical model of a teleprocessing system . . . . . . . . . . . . . . . . . 27--32 Samuel T. Chanson and Craig D. Bishop A simulation study of adaptive scheduling policies in interactive computer systems . . . . . . . . . . . . 33--39
Kurt Ziegler A data sharing tutorial . . . . . . . . 3--7 Shirley E. Scott Pricing D.P. products: a timesharing implementation . . . . . . . . . . . . . 8--12 Alain Sarzotti Transactional terminal system on micro-processor: a method for identifying & modeling overall performance . . . . . . . . . . . . . . 13--22 Mieczyslaw Bazewicz and Adam Peterseil Use of modelling in performance evaluation of computer systems: a case of installations in the Technical University of Wroclaw . . . . . . . . . 22--26 R. A. Orchard A new methodology for computer system data gathering . . . . . . . . . . . . . 27--41
Mark A. Underwood Human performance evaluation in the use of federal computer systems: recommendations . . . . . . . . . . . . 6--14 Aridaman K. Jain A guideline to statistical approaches in computer performance evaluation studies 18--32 Anonymous Proceedings of the Software Quality and Assurance Workshop . . . . . . . . . . . 32--32 Howard P. Honig Data path analysis: analyzing large I/O environments . . . . . . . . . . . . . . 34--37 C. H. Sauer and E. A. MacNair Simultaneous resource possession in queueing models of computers . . . . . . 41--52
Pamela R. Pfau Applied quality assurance methodology 1--8 Edward H. Bersoff and Vilas D. Henderson and Stan G. Siegel Software Configuration Management . . . 9--17 Robert L. Glass Computing failure: a learning experience 18--19 Donald A. Woodmancy A Software Quality Improvement Program 20--26 Marilyn S. Fujii A comparison of software assurance methods . . . . . . . . . . . . . . . . 27--32 Alan N. Sukert and Amrit L. Goel Error modelling applications in software quality assurance . . . . . . . . . . . 33--38 Joe W. Duran and John J. Wiorkowski Toward models for probabilistic program correctness . . . . . . . . . . . . . . 39--44 B. H. Yin and J. W. Winchester The establishment and use of measures to evaluate the quality of software designs 45--52 Robert A. Pierce A Requirements Tracing Tool . . . . . . 53--60 Alan M. Davis and Walter J. Rataj Requirements language processing for the effective testing of real-time systems 61--66 Lawrence Peters Relating software requirements and design . . . . . . . . . . . . . . . . . 67--71 Allan M. Stavely Design feedback and its use in software design aid systems . . . . . . . . . . . 72--78 Cornelia M. Yoder and Marilyn L. Schrag Nassi--Shneiderman charts an alternative to flowcharts for design . . . . . . . . 79--86 J. P. Benson and S. H. Saib A software quality assurance experiment 87--91 Jonathan Bauer and Susan Faasse and Alan Finger and William Goodhue The automatic generation and execution of function test plans for electronic switching systems . . . . . . . . . . . 92--100 K. A. Martin Software acceptance testing that goes beyond the book . . . . . . . . . . . . 101--105 Frederick J. Drasch and Richard A. Bowen IDBUG: a tool for program development 106--110 M. E. Stickney An application of graph theory to software test data selection . . . . . . 111--115 Kurt F. Fischer Software quality assurance tools: Recent experience and future requirements . . . 116--121 Alan L. Glasser The evolution of a Source Code Control System . . . . . . . . . . . . . . . . . 122--125 William H. Josephs A mini-computer based library control system . . . . . . . . . . . . . . . . . 126--132 Joseph P. Cavano and James A. McCall A framework for the measurement of software quality . . . . . . . . . . . . 133--139 Gary W. Cobb A measurement of structure for unstructured programming languages . . . 140--147 John B. Bowen Are current approaches sufficient for measuring software quality? . . . . . . 148--155 Joann Lockett Using performance metrics in system design . . . . . . . . . . . . . . . . . 156--159 Richard N. Southworth Responding to MIL-S-52779 . . . . . . . 160--164 Michael F. Tighe The value of a proper software quality assurance methodology . . . . . . . . . 165--172 Peter Chase Belford and Carlo Broglio A quantitative evaluation of the effectiveness of quality assurance as experienced on a large-scale software development effort . . . . . . . . . . . 173--180 Paul J. Kacik An example of software quality assurance techniques used in a successful large scale software development . . . . . . . 181--186
Wolfgang Kreutzer Computer system modelling and simulation 9--35 Rollins Turner An investigation of several mathematical models of queueing systems . . . . . . . 36--44 Charles H. Sauer Confidence intervals for queueing simulations of computer systems . . . . 45--55 Jack P. C. Kleijnen A note on computer system data gathering 56--56 M. K. Rajaraman Performance prediction of a virtual machine . . . . . . . . . . . . . . . . 57--62 Aridaman K. Jain A guideline to statistical approaches in computer performance evaluation studies 63--77 E. Schwartz Development of credible computer system simulation models . . . . . . . . . . . 78--95 Jon D. Clark and Thomas J. Reynolds and Michael J. Intille Computer performance evaluation: an empirical approach . . . . . . . . . . . 97--101 Ron Willis Techniques in simulation which enhance software reliability . . . . . . . . . . 102--115
Russ Blake Tailor: a simple model that works . . . 1--11 William D. Strecker An analysis of central processor-input-output processor contention . . . . . . . . . . . . . . . 27--40 Cheryl A. Wiecek and Simon C. Steely, Jr. Performance simulation as a tool in central processing unit design . . . . . 41--47 David A. Bennett and Christopher A. Landauer Simulation of a distributed system for performance modelling . . . . . . . . . 49--56 Edward D. Lazowska The benchmarking, tuning and analytic modeling of VAX/VMS . . . . . . . . . . 57--64 William T. Marshall and C. Thomas Nute Analytic modelling of ``working set like'' replacement algorithms . . . . . 65--72 Fayé A. Briggs Effects of buffered memory requests in multiprocessor systems . . . . . . . . . 73--81 Abbas Raffi Effects of channel blocking on the performance of shared disk pack in a multi-computer system . . . . . . . . . 83--87 John Zahorjan An exact solution method for the general class of closed separable queueing networks . . . . . . . . . . . . . . . . 107--112 Martin G. Kienzle and K. C. Sevcik Survey of analytic queueing network models of computer systems . . . . . . . 113--129 Steve P. Landry and Bruce D. Shriver A simulation environment for performing dataflow research . . . . . . . . . . . 131--139 David D. Langan and Bruce D. Shriver Simulated execution of dataflow programs on processors having finite resources 141--149 Brian W. Unger and James R. Parker An operating system implementation and simulation language (OASIS) . . . . . . 151--161 John Sanguinetti A technique for integrating simulation and system design . . . . . . . . . . . 163--172 Rami R. Razouk and Mary Vernon and Gerald Estrin Evaluation methods in SARA --- the graph model simulator . . . . . . . . . . . . 189--206 Stone H. Yu and Tadao Murata Modeling and simulating data flow computations at machine language level 207--213 R. M. Mattheyses and S. E. Conry Models for specification and analysis of parallel computing systems . . . . . . . 215--224 Ilya Gertner Performance evaluation of communicating processes . . . . . . . . . . . . . . . 241--248 Christopher R. Spooner Benchmarking interactive systems: Producing the software . . . . . . . . . 249--257 Jozo J. Dujmovi\'c Criteria for computer performance analysis . . . . . . . . . . . . . . . . 259--267 James O. Dyal and William DeWald, Jr. Small business system performance analysis . . . . . . . . . . . . . . . . 269--275 Robert W. Huff System characterization of a Retail Business System . . . . . . . . . . . . 277--284 Gary Stroebel Field performance aids for IBM GSD systems . . . . . . . . . . . . . . . . 285--291
Jon D. Clark A feature analysis of performance evaluation texts . . . . . . . . . . . . 9--11 Lawrence W. Dowdy Synopsis of workshop on the theory and application of analytical models to ADP system performance prediction . . . . . 13--17 Arthur Petrella and Harold Farrey Simulating working sets under MVS . . . 24--36 Daniel L. Pierson Performance evaluation of a minicomputer-based data collection system . . . . . . . . . . . . . . . . . 37--44 H. Pat Artis Capacity planning for MVS computer systems . . . . . . . . . . . . . . . . 45--62 M. K. Rajaraman Performance of a virtual memory: some experimental results . . . . . . . . . . 63--68
Peter J. Denning What's a working set? . . . . . . . . . 6--10 Arthur Petrella and Harold Farrey Simulating working sets under MVS . . . 11--23 Mitchell G. Spiegel Measuring and evaluating performance . . 33--34 P. J. Dixon Planning MIS investment and expense levels . . . . . . . . . . . . . . . . . 35--37 Thomas S. Moran Capacity planning: `the volume' . . . . 38--40 Tom DeMarco Breaking the language barrier . . . . . 41--45 Howard L. Giles Communications systems management . . . 46--51 Robert F. Erlandson System evaluation methodologies: combined multidimensional scaling and ordering techniques . . . . . . . . . . 52--58 Sammy W. Pearson and James E. Bailey Measurement of computer user satisfaction . . . . . . . . . . . . . . 59--68
K. Mani Chandy and Charles H. Sauer Computational algorithms for product form queueing networks . . . . . . . . . 1--1 Karen D. Gordon and Lawrence W. Dowdy The impact of certain parameter estimation errors in queueing network models . . . . . . . . . . . . . . . . . 3--9 Russ Blake XRAY: Instrumentation for multiple computers . . . . . . . . . . . . . . . 11--25 James H. Hughes DIAMOND a digital analyzer and monitoring device . . . . . . . . . . . 27--34 Douglas L. Bashioum Benchmarking interactive systems: Calibrating the model . . . . . . . . . 35--41 Axel Lehmann Performance evaluation and prediction of storage hierarchies . . . . . . . . . . 43--54 Timo O. Alanko and Ilkka J. Haikala and Petri H. Kutvonen Methodology and empirical results of program behaviour measurements . . . . . 55--66 Gopa Kumar and C. Thomas Nute Program restructuring for block structured languages . . . . . . . . . . 67--79 Hendrik T. Vantilborgh and Richard L. Garner and Edward D. Lazowska Near-complete decomposability of queueing networks with clusters of strongly interacting servers . . . . . . 81--92 Alexandre Brandwajn Further results on equivalence and decomposition in queueing network models 93--104 William J. Stewart and Gerald A. Zeiszler On the existence of composite flow equivalent Markovian servers . . . . . . 105--116 Raymond Marie Calculating equilibrium probabilities for $ \lambda (n) / C_k / 1 / N $ queues 117--125 Robert A. Wagner and Kishor S. Trivedi Hardware configuration selection through discretizing a continuous variable solution . . . . . . . . . . . . . . . . 127--142 Yonathan Bard A model of shared DASD and multipathing 143--143 T. L. Lo Computer capacity planning using queueing network models . . . . . . . . 145--152 A. Kurinckx and G. Pujolle Overallocation in a virtual circuit computer network . . . . . . . . . . . . 153--158 Richard A. Upton and Satish K. Tripathi Analysis of design alternatives for a packet switched I/O system . . . . . . . 159--171 Edward E. Balkovich and Colin Whitby-Strevens On the performance of decentralized software . . . . . . . . . . . . . . . . 173--180 Dale H. Grit and Rex L. Page Performance of a multiprocessor for applicative programs . . . . . . . . . . 181--189 C. Retna Dhas Performance evaluation of a feedback data flow processor using simulation . . 191--197 Raymond M. Bryant On homogeneity in M/G/1 queueing systems 199--208 E. G. Coffman, Jr. and Erol Gelenbe and Roger C. Wood Optimal replication of parallel-read, sequential-write systems . . . . . . . . 209--216 John E. Shore The lazy repairman and other models: Performance collapse due to overhead in simple, single-server queuing systems 217--224 Simon S. Lam and A. Udaya Shankar Response time distributions for a multi-class queue with feedback . . . . 225--234 Y. T. Wang Analysis of an intrinsic overload control for a class of queueing systems 235--243 Connie Smith and J. C. Browne Aspects of software design analysis: Concurrency and blocking . . . . . . . . 245--253 D. Potier and Ph. Leblanc Analysis of locking policies in database management systems . . . . . . . . . . . 255--255 E. G. Coffman, Jr. and E. Gelenbe and B. Plateau Optimization of the number of copies in a distribution data base . . . . . . . . 257--263 Manfred Ruschitzka The response of job classes with distinct policy functions (Extended Abstract) . . . . . . . . . . . . . . . 265--265 K. H. Kim and Mahmoud Naghibzadeh Prevention of task overruns in real-time non-preemptive multiprogramming systems 267--276 P. J. B. King and I. Mitrani Numerical methods for infinite Markov processes . . . . . . . . . . . . . . . 277--282 G. Fayolle and P. J. B. King and I. Mitrani The solution of certain two-dimensional Markov models . . . . . . . . . . . . . 283--289
Jon D. Clark and Robert M. Golladay Empirical investigation of the effectiveness of several computer performance evaluation tools . . . . . . 31--36 Robert G. Estell Benchmarks and watermarks . . . . . . . 39--44 J. P. C. Kleijnen Scoring methods, multiple criteria, and utility analysis . . . . . . . . . . . . 45--56
Peter J. Denning A tale of two islands: a fable . . . . . 7--10 Mark J. Yader ADP capacity planning: a case study . . 11--25 J. Marrevée How friendly and fast is FAST DUMP RESTORE . . . . . . . . . . . . . . . . 28--35 J. C. Bernard T-scan: the use of micro computers for response time measurements . . . . . . . 39--50
Thomas E. Bell Structured life-cycle assumptions . . . 1--3 Donald T. Coughlin System development methodology or system research methodology? . . . . . . . . . 5--6 Dennis M. Earle An alchemical approach to brokerage . . 7--8 Mitchell G. Spiegel Prototyping: an approach to information and communication system design . . . . 9--19 C. Wesley Jenkins Application prototyping: a case study 21--27 Patricia R. Cox Specification of a regression test for a mini computer operating system . . . . . 29--32 William Bryan and Stanley Siegel and Gary Whiteleather An approach to software configuration control . . . . . . . . . . . . . . . . 33--47 C. R. Fredrick Project implementation of Software Configuration Management . . . . . . . . 49--56 H. Ronald Berlack Implementing software configuration control in the structured programming environment . . . . . . . . . . . . . . 57--77 Peter Gross Producers and consumers views of software quality (Panel Session) . . . . 79--79 Sallie Henry and Dennis Kafura and Kathy Harris On the relationships among three software metrics . . . . . . . . . . . . 81--88 Paul A. Szulewski and Mark H. Whitworth and Philip Buchan and J. Barton DeWolf The measurement of software science parameters in software designs . . . . . 89--94 Victor R. Basili and Tsai-Yun Phillips Evaluating and comparing software metrics in the software engineering laboratory . . . . . . . . . . . . . . . 95--106 James Ronback Test metrics for software quality . . . 107--107 J. P. Benson Adaptive search techniques applied to software testing . . . . . . . . . . . . 109--116 Michael Paige Data space testing . . . . . . . . . . . 117--127 Amrit L. Goel Optimal testing policies for software systems . . . . . . . . . . . . . . . . 129--130 B. Littlewood A Bayesian differential debugging model for software reliability . . . . . . . . 129--130 J. D. Musa and A. Iannino Software reliability modeling accounting for program size variation due to integration or design changes . . . . . 129--130 John D. Musa Software reliability measurement session 129--130 Amrit L. Goel and Kazuhira Okumoto When to stop testing and start using software? . . . . . . . . . . . . . . . 131--138 B. Littlewood Stochastic reliability growth: a model with applications to computer software faults and hardware design faults . . . 139--152 Linda M. Ottenstein Software defects --- a software science perspective . . . . . . . . . . . . . . 153--155 Linda Ottenstein Predicting numbers of errors using software science . . . . . . . . . . . . 157--167 Victor Schneider Some experimental estimators for developmental and delivered errors in software development projects . . . . . 169--172 H. Sneed SOFTDOC --- A system for automated software static analysis and documentation . . . . . . . . . . . . . 173--177 John D. Crowley The application development process: What's wrong with it? . . . . . . . . . 179--187 C. T. Bailey and W. L. Dingee A software study using Halstead metrics 189--197
A. Esposito and A. Mazzeo and P. Costa Workload characterization for trend analysis . . . . . . . . . . . . . . . . 5--15 J. D. Musa and A. Iannino Software reliability modeling: accounting for program size variation due to integration or design changes . . 16--25 J. R. Comer and J. R. Rinewalt and M. M. Tanik A comparison of two different program complexity measures . . . . . . . . . . 26--28 Marshall D. Abrams and Dorothy C. Neiman NBS network measurement methodology applied to synchronous communications 29--36 R. L. Larsen and J. R. Agre and A. K. Agrawala A comparative evaluation of local area communication technology . . . . . . . . 37--47 Herman D. Hughes A highly parameterized tool for studying performance of computer systems . . . . 48--65 Mitchell G. Spiegel RTE's: past is prologue . . . . . . . . 66--73
J. C. Browne Designing systems for performance . . . 1--1 David Reiner and Tad Pinkerton A method for adaptive performance improvement of operating systems . . . . 2--10 Y. T. Wang On the VAX/VMS time-critical process scheduling . . . . . . . . . . . . . . . 11--18 Lars Söderlund Evaluation of concurrent physical database reorganization through simulation modeling . . . . . . . . . . 19--32 Edward D. Lazowska and John Zahorjan Analytic modelling of disk I/O subsystems: a tutorial . . . . . . . . . 33--35 Lawrence W. Dowdy and Hans J. Breitenlohner A model of Univac 1100/42 swapping . . . 36--47 Rollins Turner and Henry Levy Segmented FIFO page replacement . . . . 48--51 Domenico Ferrari A generative model of working set dynamics . . . . . . . . . . . . . . . . 52--57 J. Zahorjan and K. C. Sevcik and D. L. Eager and B. I. Galler Balanced job bound analysis of queueing networks . . . . . . . . . . . . . . . . 58--58 D. Neuse and K. Chandy SCAT: a heuristic algorithm for queueing network models of computing systems . . 59--79 John Zahorjan and Eugene Wong The solution of separable queueing network models using mean value analysis 80--85 Alexander Thomasian and Behzad Nadji Aggregation of stations in queueing network models of multiprogrammed computers . . . . . . . . . . . . . . . 86--104 Herb Schwetman Computer system models: an introduction 105--105 Peter J. Denning Performance evaluation: Experimental computer science at its best . . . . . . 106--109 Abbas Rafii Structure and application of a measurement tool --- SAMPLER/3000 . . . 110--120 Stephen Tolopka An event trace monitor for the VAX 11/780 . . . . . . . . . . . . . . . . . 121--128 H. Pat Artis A log file design for analyzing secondary storage occupancy . . . . . . 129--135 John Sanguinetti The effects of solid state paging devices in a large time-sharing system 136--153 Richard T. Wang and J. C. Browne Virtual machine-based simulation of distributed computing and network computing . . . . . . . . . . . . . . . 154--156 Ragnar Huslende A combined evaluation of performance and reliability for degradable systems . . . 157--164 Patricia A. Jacobson and Edward D. Lazowska The method of surrogate delays: Simultaneous resource possession in analytic models of computer systems . . 165--174 Patricia Jacobson Approximate analytic models of arbiters 175--180 Fayé A. Briggs and Michel Dubois Performance of cache-based multiprocessors . . . . . . . . . . . . 181--190 R. M. Bryant and J. R. Agre A queueing network approach to the module allocation problem in distributed systems . . . . . . . . . . . . . . . . 191--204 Madhav Marathe and Sujit Kumar Analytical models for an Ethernet-like local area network link . . . . . . . . 205--215
Michael A. Pechura Page life measurements . . . . . . . . . 10--12 Jon D. Clark An update on economies-of-scale in computing systems . . . . . . . . . . . 13--14 Edward R. Janusz Getting the most out of a small computer 22--35 Springer Cox Data, definition, deduction: an empirical view of operational analysis 36--44 Hiroshi Muramatsu and Masahiro Date and Takanori Maki Structural validation in queueing network models of computer systems . . . 41--46 Charles H. Sauer Numerical solution of some multiple chain queueing networks . . . . . . . . 47--56 Thomas A. Nemeth An approach to interactive performance analysis in a busy production system (NOS/BE) . . . . . . . . . . . . . . . . 57--73 Michael E. Knudson A computer performance evaluation operational methodology . . . . . . . . 74--80
P. V. Afshari and S. C. Bruell and R. Y. Kain Modeling a new technique for accessing shared buses . . . . . . . . . . . . . . 4--13 Aurel A. Lazar Optimal control of a M/M/m queue . . . . 14--20 Jeffrey R. Spirn Network modeling with bursty traffic and finite buffer space . . . . . . . . . . 21--28 Simon S. Lam and Y. Luke Lien Optimal routing in networks with flow-controlled virtual channels . . . . 38--46 Miron Livny and Myron Melman Load balancing in homogeneous broadcast distributed systems . . . . . . . . . . 47--55 Stuart Wecker and Robert Gordon and James Gray and James Herman and Raj Kanodia and Dan Seligman Performance of globally distributed networks . . . . . . . . . . . . . . . . 58--58 R. L. Gordon Operational measurements on a high performance ring . . . . . . . . . . . . 59--59 James P. Gray Performance of SNA's LU-LU session protocols . . . . . . . . . . . . . . . 60--61 James G. Herman ARPANET performance tuning techniques 62--62 Avner Aleh and K. Dan Levin The determination of upper bounds for economically effective compression in packet switching networks . . . . . . . 64--72 Patrick V. McGregor Concentrator modeling with pipelining arrivals compensation . . . . . . . . . 73--94 Alan Mink and Charles B. Silio, Jr. Modular expansion in a class of homogeneous networks . . . . . . . . . . 95--100 Ashok K. Thareja and Satish K. Tripathi and Richard A. Upton On updating buffer allocation . . . . . 101--110 M. Y. Elsanadidi and Wesley W. Chu An analysis of a time window multiaccess protocol with collision size feedback (WCSF) . . . . . . . . . . . . . . . . . 112--118 Kuno M. Roehr and Horst Sadlowski Performance analysis of local communication loops . . . . . . . . . . 119--129 R. H. Sherman and M. G. Gable and A. W. Chung Distributed virtual hosts and networks: Measurement and control . . . . . . . . 130--136 Richard Brice and William Alexander A network performance analyst's workbench . . . . . . . . . . . . . . . 138--146 Donald F. DuBois A Hierarchical Modeling System for computer networks . . . . . . . . . . . 147--155 K. Terplan Network performance reporting . . . . . 156--170 Mitchell G. Spiegel Questions for Local Area Network panelists . . . . . . . . . . . . . . . 172--172 Kuno M. Roehr and Horst Sadlowski Performance analysis of local communication loops . . . . . . . . . . 173--173 Barbara R. Sternick Systems aids in determining Local Area Network performance characteristics . . 174--174 Anonymous Authors Index . . . . . . . . . . . . . 175--175
M. K. Rajaraman Performance evaluation through job scheduler modeling . . . . . . . . . . . 9--15 Peter S. Mager Toward a parametric approach for modeling local area network performance 17--28 John E. Gaffney, Jr. Score `82 --- a summary (at IBM Systems Research Institute, 3/23-3/24/82) . . . 30--32 Linda D. Misek-Falkoff The new field of ``Software Linguistics'': an early-bird view . . . 35--51 Mitchell G. Spiegel Software counting rules: Will history repeat itself? . . . . . . . . . . . . . 52--56 Krishna M. Kavi and U. B. Jackson Effect of declarations on software metrics: an experiment in software science . . . . . . . . . . . . . . . . 57--71 John E. Gaffney, Jr. Machine Instruction Count Program . . . 72--79 Linda D. Misek-Falkoff A unification of Halstead's Software Science counting rules for programs and English text, and a claim space approach to extensions . . . . . . . . . . . . . 80--114 George E. Estes Distinguishing the potential operands in FORTRAN programs . . . . . . . . . . . . 115--117 S. D. Conte and V. Y. Shen and K. Dickey On the effect of different counting rules for control flow operators on Software Science metrics in Fortran . . 118--126
J. G. Shanthikumar and P. K. Varshney and K. Sriram A priority cutoff flow control scheme for integrated voice-data multiplexers 8--14 Springer Cox Data, definition, deduction: an empirical view of operational analysis 15--20 H. G. Perros The queue-length distribution of the M/Ck/1 queue . . . . . . . . . . . . . . 21--24 Gordon E. Anderson Bernoulli methods for predicting communication processor performance . . 25--29 Timo Laurmaa and Markku Syrjänen APL and Halstead's theory: a measuring tool and some experiments . . . . . . . 32--47 Nicholas Beser Foundations and experiments in software science . . . . . . . . . . . . . . . . 48--72 Karl Ernst Schnurer Product Assurance Program Analyzer (P.A.P.A.) a tool for program complexity evaluation . . . . . . . . . . . . . . . 73--74 David R. Gross and Mary A. King and Michael R. Murr and Michael R. Eddy Complexity measurement of Electronic Switching System (ESS) software . . . . 75--85 Sandra D. Hartman A counting tool for RPG . . . . . . . . 86--100 Farid A. Naib An application of software science to the quantitative measurement of code quality . . . . . . . . . . . . . . . . 101--128
Russ Blake Optimal control of thrashing . . . . . . 1--10 Özalp Babao\uglu Hierarchical replacement decisions in hierarchical stores . . . . . . . . . . 11--19 Robert B. Hagmann and Robert S. Fabry Program page reference patterns . . . . 20--29 R. B. Bunt and R. S. Harbus and S. J. Plumb The effective management of paging storage hierarchies . . . . . . . . . . 30--38 Larry F. Hodges and William J. Stewart Workload characterization and performance evaluation in a research environment . . . . . . . . . . . . . . 39--50 Günter Haring On state-dependent workload characterization by software resources 51--57 M. L. Bolzoni and M. C. Calzarossa and P. Mapelli and G. Serazzi A package for the implementation of static workload models . . . . . . . . . 58--67 Gene McDaniel The Mesa Spy: an interactive tool for performance debugging . . . . . . . . . 68--76 Uwe Hercksen and Rainer Klar and Wolfgang Kleinöder and Franz Kneißl Measuring simultaneous events in a multiprocessor system . . . . . . . . . 77--88 Erol Gelenbe Stationary deterministic flows in discrete systems: I . . . . . . . . . . 89--101 F. Baccelli and E. G. Coffman A data base replication analysis using an M/M/m queue with service interruptions . . . . . . . . . . . . . 102--107 Brigitte Plateau and Andreas Staphylopatis Modelling of the parallel resolution of a numerical problem on a locally distributed computing system . . . . . . 108--117 Yonathan Bard Modeling I/O systems with dynamic path selection, and general transmission networks . . . . . . . . . . . . . . . . 118--129 Edward D. Lazowska and John Zahorjan Multiple class memory constrained queueing networks . . . . . . . . . . . 130--140 Alexandre Brandwajn Fast approximate solution of multiprogramming models . . . . . . . . 141--149 Subhash C. Agrawal and Jeffrey P. Buzen The aggregate server method for analyzing serialization delays in computer systems . . . . . . . . . . . . 150--150 Connie U. Smith and David D. Loendorf Performance analysis of software for an MIMD computer . . . . . . . . . . . . . 151--162 Jon R. Agre and Satish K. Tripathi Modeling reentrant and nonreentrant software . . . . . . . . . . . . . . . . 163--178 L. T. Wu Operational models for the evaluation of degradable computing systems . . . . . . 179--185 Raymond A. Marie and Patricia M. Snyder and William J. Stewart Extensions and computational aspects of an iterative method . . . . . . . . . . 186--194 Doug Neuse and K. Mani Chandy HAM: the heuristic aggregation method for solving general closed queueing network models of computer systems . . . 195--212 D. L. Eager and K. C. Sevcik Performance bound hierarchies for queueing networks . . . . . . . . . . . 213--214 Jeffrey A. Brumfield and Peter J. Denning Error analysis of homogeneous mean queue and response time estimators . . . . . . 215--221 Alan Harbitter and Satish K. Tripathi A model of transport level flow control 222--232 Erol Gelenbe and Isi Mitrani Control policies in CSMA local area networks: Ethernet controls . . . . . . 233--240 Satish K. Tripathi and Alan Harbitter An analysis of two flow control techniques . . . . . . . . . . . . . . . 241--249 P. J. B. King and I. Mitrani Modelling the Cambridge Ring . . . . . . 250--258
J. Marrevee The power of the read track and the need for a write track command for disk back-up and restore utilities . . . . . 10--14 H. G. Perros A model for predicting the response time of an on-line system for electronic fund transfer . . . . . . . . . . . . . . . . 15--21 Reinhard Augustin and Klaus-Jürgen Büscher Characteristics of the COX-distribution 22--32
H. G. Perros Queueing networks with blocking: a bibliography . . . . . . . . . . . . . . 8--12 Tom DeMarco An algorithm for sizing software products . . . . . . . . . . . . . . . . 13--22 Paul A. Fishwick and Stefan Feyock PROFGEN: a procedure for generating machine independent high-level language profilers . . . . . . . . . . . . . . . 27--31 M. K. Rajaraman Performance measures for a local network 34--37 Greg A. Jones Performance evaluation of a job scheduler . . . . . . . . . . . . . . . 38--43 Jon D. Clark and Thomas C. Richards A note on the cost-performance ratios of IBM's 43XX series . . . . . . . . . . . 44--45
E. G. Coffman, Jr. Recent progress in the performance evaluation of fundamental allocation algorithms . . . . . . . . . . . . . . . 2--6 Domenico Ferrari On the foundations of artificial workload design . . . . . . . . . . . . 8--14 Alfredo de J. Perez-Davila and Lawrence W. Dowdy Parameter interdependencies of file placement models in a Unix system . . . 15--26 Richard B. Bunt and Jennifer M. Murphy and Shikharesh Majumdar A measure of program locality and its application . . . . . . . . . . . . . . 28--40 A. Krzesinski and J. Greyling Improved lineariser methods for queueing networks with queue dependent centres 41--51 John Zahorjan and Edward D. Lazowska Incorporating load dependent servers in approximate mean value analysis . . . . 52--62 Subhash C. Agrawal and Jeffrey P. Buzen and Annie W. Shum Response Time Preservation: a general technique for developing approximate algorithms for queueing networks . . . . 63--77 Ph. Mussi and Ph. Nain Evaluation of parallel execution of program tree structures . . . . . . . . 78--87 John Sanguinetti Program optimization for a pipelined machine a case study . . . . . . . . . . 88--95 Rollins Turner and Jeffrey Schriesheim and Indrajit Mitra Performance of a DECnet based disk block server . . . . . . . . . . . . . . . . . 96--104 Bengt Stavenow Throughput-delay characteristics and stability considerations of the access channel in a mobile telephone system . . 105--112 Elizabeth Williams Processor queueing disciplines in distributed systems . . . . . . . . . . 113--119 Lindsey E. Stephens and Lawrence W. Dowdy Convolutional bound hierarchies . . . . 120--133 Rajan Suri and Gregory W. Diehl A new `building block' for performance evaluation of queueing networks with finite buffers . . . . . . . . . . . . . 134--142 Stephen S. Lavenberg A simple analysis of exclusive and shared lock contention in a database system . . . . . . . . . . . . . . . . . 143--148 S. T. Becker and K. M. Rege and B. Sengupta A modeling methodology for sizing a computer based system in a netted environment . . . . . . . . . . . . . . 149--157 Darwyn R. Peachey and Richard B. Bunt and Carey L. Williamson and Tim B. Brecht An experimental investigation of scheduling strategies for UNIX . . . . . 158--166 Daniel A. Menascé and Leonardo Lellis P. Leite Performance evaluation of isolated and interconnected token bus local area networks . . . . . . . . . . . . . . . . 167--175 Subhash C. Agrawal and Jeffrey P. Buzen and Ashok K. Thareja A Unified Approach to Scan Time Analysis of Token Rings and Polling Networks . . 176--185 Alexandre Brandwajn and William M. McCormack Efficient approximation for models of multiprogramming with shared domains . . 186--194 André B. Bondi and Jeffrey P. Buzen The response times of priority classes under preemptive resume in M/G/m queues 195--201 Alexander Thomasian and Paul Bay Analysis of Queueing Network Models with population size constraints and delayed blocked customers . . . . . . . . . . . 202--216
John E. Gaffney Instruction entropy, a possible measure of program/architecture compatibility 13--18 Charles H. Sauer Numerical solution of some multiple chain queueing networks . . . . . . . . 19--28 Alexander Thomasian and Kameshwar Gargeya Speeding up computer system simulations using hierarchical modeling . . . . . . 34--39 James L. Elshoff The PEEK measurement program . . . . . . 40--53 Anna Hác A survey of techniques for the modeling of serialization delays in computer systems . . . . . . . . . . . . . . . . 54--56
Ali Mosleh and E. Richard Hilton and Peter S. Browne Bayesian probabilistic risk analysis . . 5--12 Huisheng Gong and Monika Schmidt A complexity measure based on selection and nesting . . . . . . . . . . . . . . 14--19 Michael E. Knudson A performance measurement and system evaluation project plan proposal . . . . 20--31 Lem O. Ejiogu A simple measure of software complexity 33--47
Derek L. Eager and Edward D. Lazowska and John Zahorjan A comparison of receiver-initiated and sender-initiated adaptive load sharing (extended abstract) . . . . . . . . . . 1--3 David Gelernter and Sunil Podar and Hussein G. Badr An adaptive communications protocol for network computers (extended abstract) 4--5 Erol Gelenbe and David Finkel and Satish K. Tripathi On the availability of a distributed computer system with failing components 6--13 A. E. Conway and N. D. Georganas RECAL --- a new efficient algorithm for the exact analysis of multiple-chain closed queueing networks (abstract) . . 14--14 G. Balbo and S. C. Bruell and S. Ghanta Modeling priority schemes . . . . . . . 15--26 Robbe J. Walstra Nonexponential networks of queues: a maximum entropy analysis . . . . . . . . 27--37 Maria Calzarossa and Domenico Ferrari A sensitivity study of the clustering approach to workload modeling (extended abstract) . . . . . . . . . . . . . . . 38--39 S. V. Raghavan and R. Kalyanakrishnan On the classification of interactive user behaviour indices . . . . . . . . . 40--48 A. Inkeri Verkamo Empirical results on locality in database referencing . . . . . . . . . . 49--58 Halin M. Khelalfa and Anneliese K. von Mayrhauser Degradable computer systems with dependent subsystems . . . . . . . . . . 59--68 Ram Chillarege and Ravishankar K. Lyer The effect of system workload on error latency: an experimental study . . . . . 69--77 Timothy A. Gonsalves Performance characteristics of two Ethernets: an experimental study . . . . 78--86 I. Chlamtac and M. Eisinger Performance of integrated services (voice/data) CSMA/CD networks . . . . . 87--93 I. Chlamtac and M. Eisinger An analytic model of the hyperchannel network using multiple channel architecture . . . . . . . . . . . . . . 94--104 Sandra Bleistein and Shin-Sun Cho and Robert T. Goettge Analytic performance model of the U.S. en route air traffic control computer systems . . . . . . . . . . . . . . . . 105--115 Lawrence W. Dowdy and Manvinder S. Chopra On the applicability of using multiprogramming level distributions . . 116--127 A. E. Krzesinski and P. Teunissen Multiclass queueing networks with population constrainted subnetworks . . 128--139 Alexandre Branwajn and Yung-Li Lily Jow A note on service interruptions . . . . 140--148 Brigitte Plateau On the stochastic structure of parallelism and synchronization models for distributed algorithms . . . . . . . 147--154 Patricia M. Snyder and William J. Stewart An approximate numerical solution for multiclass preemptive priority queues with general service time distributions 155--165 Alan R. Hevner Evaluation of optical disk systems for very large database applications . . . . 166--172 Gilbert E. Houtekamer The local disk controller . . . . . . . 173--182 Philip S. Yu and Daniel M. Dias and John T. Robinson and Balakrishna R. Iyer and Douglas Cornell Modelling of centralized concurrency control in a multi-system environment 183--191 Alexander Thomasian and In Kyung Ryu Analysis of some optimistic concurrency control schemes based on certification 192--203
In Kyung Ryu Review of 'OS 1100-of performance algorithms: a guide to the resource allocation algorithms of OS-1100' by John C. Kelly . . . . . . . . . . . . . 9--9 H. G. Perros and D. Mirchandani An analytic model of a file server for bulk file transfers . . . . . . . . . . 14--22 Bernard Domanski Building IMS synthetic workloads . . . . 23--28
Jeffrey P. Buzen Modeling I/O subsystems (tutorial) . . . 1--1 Domenico Ferrari Workload characterization (tutorial): issues and approaches . . . . . . . . . 1--1 Amrit L. Goel Software reliability modeling (tutorial) 2--2 Kye Hedlund Performance modeling in integrated curcuit design (tutorial) . . . . . . . 2--2 H. Pat Artis Expert systems for performance analysis (tutorial) . . . . . . . . . . . . . . . 3--3 Satish K. Tripathi Performance issues in local area networks (tutorial) . . . . . . . . . . 3--3 Harold S. Stone and Dominique Thibaut Footprints in the cache . . . . . . . . 4--8 Mary K. Vernon and Mark A. Holliday Performance analysis of multiprocessor cache consistency protocols using generalized timed Petri nets . . . . . . 9--17 P. G. Harrison and A. J. Field Performance modelling of parallel computer architectures . . . . . . . . . 18--27 Stuart Madnick and Y. Richard Wang Modeling multiprocessor computer systems with unbalanced flows . . . . . . . . . 28--34 Lindsay Kleeman and Antonio Cantoni The analysis and performance of batching arbiters . . . . . . . . . . . . . . . . 35--43 John P. Lehoczky and Lui Sha Performance of real-time bus scheduling algorithms . . . . . . . . . . . . . . . 44--53 Will Leland and Teunis J. Ott Load-balancing heuristics and process behavior . . . . . . . . . . . . . . . . 54--69 Kyoo Jeong Lee and Don Towsley A comparison of priority-based decentralized load balancing policies 70--77 Jean-Yves Le Boudec A BCMP extension to multiserver stations with concurrent classes of customers . . 78--91 A. E. Conway and N. D. Georganas An efficient algorithm for semi-homogeneous queueing network models 92--99 Philippe Nain and Keith Ross Optimal multiplexing of heterogeneous traffic with hard constraint . . . . . . 100--108 Kenneth Sevcik and Marjory J. Johnson Cycle time properties of the FDDI token ring protocol (extended abstract) . . . 109--110 Yves Dallery and Rajan Suri Approximate disaggregation and performance bounds for queueing networks with multiple-server stations . . . . . 111--128 Johann Strelen A generalization of mean value analysis to higher moments: moment analysis . . . 129--140 William A. Massey A probabilistic analysis of a database system . . . . . . . . . . . . . . . . . 141--146 Andrew Witkowski Performance evaluation of multiversion with the Oracle synchronization . . . . 147--158 Mukesh Swinghal and A. K. Agrawala Performance analysis of an algorithm for concurrency control in replicated database systems . . . . . . . . . . . . 159--169 Ilkka Haikala ARMA models of program behaviour . . . . 170--179 Shikharesh Majumdar and Richard B. Bunt Measurement and analysis of locality phases in file referencing behaviour . . 180--192 Rami R. Razouk and Terri Stewart and Michael Wilson Measuring operating system performance on modern micro-processors . . . . . . . 193--202 Victor F. Nicola and V. G. Kulkarni and Kishor S. Trivedi Queueing analysis of fault-tolerant computer systems (extended abstract) . . 203--203 E. G. Coffman, Jr. and E. Gelenbe and E. N. Gilbert Analysis of a conveyor queue in a flexible manufacturing system . . . . . 204--223 Demetres D. Kouvatsos A maximum entropy queue length distribution for the G/G/1 finite capacity queue . . . . . . . . . . . . . 224--236 Hideaki Takagi and Masayuki Murata Queueing analysis of nonpreemptive reservation priority discipline . . . . 237--244 Micha Hofri Queueing systems with a procrastinating server . . . . . . . . . . . . . . . . . 245--253 O. J. Boxma and B. Meister Waiting-time approximations for cyclic-service systems with switch-over times . . . . . . . . . . . . . . . . . 254--262
Irene Hu Measuring file access patterns in UNIX 15--20 Domenico Ferrari Considerations on the insularity of performance evaluation . . . . . . . . . 21--32
Satish K. Tripathi and Steve Kaisler and Sharat Chandran and Ashok K. Agrawala Report on the Workshop on Design & Performance Issues in Parallel Architectures . . . . . . . . . . . . . 16--32
Jim Gray A view of database system performance measures . . . . . . . . . . . . . . . . 3--4 Philip Heidelberger and Seetha Lakshmi A performance comparison of multi-micro and mainframe database architectures . . 5--6 Daniel A. Reed and Chong-kwon Kim Packet routing algorithms for integrated switching networks . . . . . . . . . . . 7--15 Timothy A. Gonsalves and Fouad A. Tobagi Performance of the Expressnet with voice/data traffic . . . . . . . . . . . 16--26 Subhash Agrawal and Ravi Ramaswamy Analysis of the resequencing delay for M/M/m systems . . . . . . . . . . . . . 27--35 Daniel A. Reed and Allen D. Malony and Bradley D. McCredie Parallel discrete event simulation: a shared memory approach . . . . . . . . . 36--38 Ingrid Y. Bucher and Margaret L. Simmons A close look at vector performance of register-to-register vector computers and a new model . . . . . . . . . . . . 39--45 F. Darema-Rogers and G. F. Pfister and K. So Memory access patterns of parallel scientific programs . . . . . . . . . . 46--58 Robert Geist and Robert Reynolds and Eve Pittard Disk scheduling in System V . . . . . . 59--68 Miron Livny and Setrag Khoshafian and Haran Boral Multi-disk management algorithms . . . . 69--77 Jeffrey P. Buzen and Annie W. Shum A unified operational treatment of RPS reconnect delays . . . . . . . . . . . . 78--92 R. Nelson and D. Towsley and A. N. Tantawi Performance analysis of parallel processing systems . . . . . . . . . . . 93--94 Ziao-Nan Tan and Kenneth C. Sevcik Reduced distance routing in single-state shuffle-exchange interconnection networks . . . . . . . . . . . . . . . . 95--110 Christos Bouras and John Garofalakis Queueing delays in buffered multistage interconnection networks . . . . . . . . 111--121 Hector Garcia-Molina and Lawrence R. Rogers Performance through memory . . . . . . . 122--131 Michael J. Jipping and Ray Ford Predicting performance of concurrency control designs . . . . . . . . . . . . 132--142 Anton T. Dahbura and Krishan K. Sabnani and William J. Hery Performance analysis of a fault detection scheme in multiprocessor systems . . . . . . . . . . . . . . . . 143--154 Michael A. Salsburg A statistical approach to computer performance modeling . . . . . . . . . . 155--162 Teemu Kerola and Herb Schwetman Monit: a performance monitoring tool for parallel and pseudo-parallel programs 163--174 M. Ajmone Marsan and G. Balbo and G. Chiola and G. Conte Modeling the software architecture of a prototype parallel machine . . . . . . . 175--185 William Alexander and Tom W. Keller and Ellen E. Boughter A workload characterization pipeline for models of parallel systems . . . . . . . 186--194 Ingrid M. Graf Transformation between different levels of workload characterization for capacity planning: fundamentals and case study . . . . . . . . . . . . . . . . . 195--204 Zuwang Ruan and Walter F. Tichy Performance analysis of file replication schemes in distributed systems . . . . . 205--215 David R. Cheriton and Carey L. Williamson Network measurement of the VMTP request-response protocol in the V distributed system . . . . . . . . . . . 216--225 Mohamed Salehmohamed and W. S. Luk and Joseph G. Peters Performance evaluation of LAN sorting algorithms . . . . . . . . . . . . . . . 226--233 George C. Polyzos and Mart L. Molle Delay analysis of a window tree conflict resolution algorithm in a local area network environment . . . . . . . . . . 234--244 Scott Shenker Some conjectures on the behavior of acknowledgement-based transmission control of random access communication channels . . . . . . . . . . . . . . . . 245--255 Peter Mathys and Boi V. Faltings The effect of channel-exit protocols on the performance of finite population random-access systems . . . . . . . . . 256--267
Robert Fisher The impact of interactive application development with CODESTAR . . . . . . . 13--15
Ulf Körner and Serge Fdida and Harry Perros and Gerald Shapiro End to end delays in a catenet environment . . . . . . . . . . . . . . 20--28 Ravi S. Sharma Three simple algorithms for the N/1/F Problem . . . . . . . . . . . . . . . . 29--32
R. C. Covington and S. Madala and V. Mehta and J. R. Jump and J. B. Sinclair The Rice Parallel Processing Testbed . . 4--11 B. D. Lubachevsky Efficient distributed event driven simulations of multiple-loop networks 12--24 B. J. Lucier Performance evaluation for multiprocessors programmed using monitors . . . . . . . . . . . . . . . . 22--29 A. Ganz and I. Chlamtac Queueing analysis of finite buffer token networks . . . . . . . . . . . . . . . . 30--36 M. Zafirovic-Vukotic and I. G. M. M. Niemegeers Performance modelling of a HSLAN slotted ring protocol . . . . . . . . . . . . . 37--46 D.-M. Chiu and R. Sudama A case study of DECnet applications and protocol performance . . . . . . . . . . 47--55 S. Shenker and A. Weinrib Asymptotic analysis of large heterogeneous queueing systems . . . . . 56--62 D. L. Eager and E. D. Lazowska and J. Zahorjan The limited performance benefits of migrating active processes for load sharing . . . . . . . . . . . . . . . . 63--72 J. Hong and X. Tan and M. Chen From local to global: an analysis of nearest neighbor balancing on hypercube 73--82 K. Kant Application level modeling of parallel machines . . . . . . . . . . . . . . . . 83--93 R. G. Born and J. R. Kenevan Analytic derivation of processor potential utilization in straight line, ring, square mesh, and hypercube networks . . . . . . . . . . . . . . . . 94--103 S. Majumdar and D. L. Eager and R. B. Bunt Scheduling in multiprogrammed parallel systems . . . . . . . . . . . . . . . . 104--113 N. M. Patel and P. G. Harrison On hot-spot contention in interconnection networks . . . . . . . . 114--123 S. C. Kothari and A. Jhunjhunwala and A. Mukherjee Performance analysis of multipath multistage interconnection networks . . 124--132 J. L. Melús and E. Sanvicente and J. Magriñá Modelling and performance evaluation of multiprocessor based packet switches . . 133--140 T. P. Lee A manufacturing capacity planning experiment through functional workload decomposition . . . . . . . . . . . . . 141--150 A. E. Irgon and A. H. Dragoni, Jr. and T. O. Huleatt FAST: a large scale expert system for application and system software performance tuning . . . . . . . . . . . 151--156 W. Alexander and G. Copeland Comparison of dataflow control techniques in distributed data-intensive systems . . . . . . . . . . . . . . . . 157--166 S. T. Leutenegger and M. K. Vernon A mean-value performance analysis of a new multiprocessor architecture . . . . 167--176 J. T. Blake and A. L. Reibman and K. S. Trivedi Sensitivity analysis of reliability and performability measures for multiprocessor systems . . . . . . . . . 177--186 R. Mukkamala and S. C. Bruell and R. K. Shultz Design of partially replicated distributed database systems: an integrated methodology . . . . . . . . . 187--196 D. Wybranietz and D. Haban Monitoring and performance measuring distributed systems during operation . . 197--206 S. W. Melvin and Y. N. Patt The use of microcode instrumentation for development, debugging and tuning of operating system kernels . . . . . . . . 207--214 A. Agawal and A. Gupta Memory-reference characteristics of multiprocessor applications under MACH 215--225 J. M. Murphy and R. B. Bunt Characterising program behaviour with phases and transitions . . . . . . . . . 226--234 Y. Yoshizawa and T. Arai Adaptive storage control for page frame supply in large scale computer systems 235--243 K. R. Pattipati and M. M. Kostreva On the properties of approximate mean value analysis algorithms for queueing networks . . . . . . . . . . . . . . . . 244--252 A. N. Tantawi and G. Towsley and J. Wolf Optimal allocation of multiple class resources in computer systems . . . . . 253--260 C.-H. Hsieh and S. S. Lam PAM --- a noniterative approximate solution method for closed multichain queueing networks . . . . . . . . . . . 261--269
Anna Ha\'c Load balancing in distributed systems: a summary . . . . . . . . . . . . . . . . 17--19 Anna Ha\'c Knowledge-based distributed system architecture . . . . . . . . . . . . . . 20--20 Anna Ha\'c Design algorithms for asynchronous operations in cache memory . . . . . . . 21--21 Victor Schneider Approximations for the Halstead software science software error rate and project effort estimators . . . . . . . . . . . 22--29 Bernard Domanski A PROLOG-based expert system for tuning MVS/XA . . . . . . . . . . . . . . . . . 30--47 David R. Irvin A queueing model for local area network bridges . . . . . . . . . . . . . . . . 48--57
J. Wolf The placement optimization program: a practical solution to the disk file assignment problem . . . . . . . . . . . 1--10 J. P. Kearns and S. DeFazio Diversity in database reference behavior 11--19 J. Hellerstein A statistical approach to diagnosing intermittent performance-problems using monotone relationships . . . . . . . . . 20--28 R. R. Muntz and E. de Souza e Silva and A. Goyal Bounding availability of repairable computer systems . . . . . . . . . . . . 29--38 R. Bubenik and W. Zwaenepoel Performance of optimistic make . . . . . 39--48 T. E. Anderson and D. D. Lazowska and H. M. Levy The performance implications of thread management alternatives for shared-memory multiprocessors . . . . . 49--60 J. B. Carter and W. Zwaenepoel Optimistic implementation of bulk data transfer protocols . . . . . . . . . . . 61--69 C. B. Stunkel and W. K. Fuchs TRAPEDS: producing traces for multicomputers via execution driven simulation . . . . . . . . . . . . . . . 70--78 K. Gallivan and D. Gannon and W. Jalby and A. Malony and H. Wijshoff Behavioral characterization of multiprocessor memory systems: a case study . . . . . . . . . . . . . . . . . 79--88 A. D. Samples Mache: no-loss trace compaction . . . . 89--97 A. Mukherjee and L. H. Landweber and J. C. Strikwerda Evaluation of retransmission strategies in a local area network environment . . 98--107 P. B. Danzig Finite buffers for fast multicast . . . 108--117 B. Mukherjee Performance of a dual-bus unidirectional broadcast network operating under probabilistic scheduling strategy . . . 118--126 A. G. Greenberg and J. McKenna Solution of closed, product form, queueing networks via the RECAL and tree-RECAL methods on a shared memory multiprocessor . . . . . . . . . . . . . 127--135 M. Paterok and O. Fischer and L. Opta Feedback queues with preemption-distance priorities . . . . . . . . . . . . . . . 136--145 D. B. Wagner and E. D. Lazowska Parallel simulation of queueing networks: limitations and potentials . . 146--155 D. Mitra and I. Mitrani Control and coordination policies for systems with buffers . . . . . . . . . . 156--164 D. M. Nicol and J. C. Townsend Accurate modeling of parallel scientific computations . . . . . . . . . . . . . . 165--170 K. C. Sevcik Characterizations of parallelism in applications and their use in scheduling 171--180 R. D. Nelson and T. K. Philips An approximation to the response time for shortest queue routing . . . . . . . 181--189 K. E. E. Raatikainen Approximating response time distributions . . . . . . . . . . . . . 190--199 D. Mitra and A. Weiss A closed network with a discriminatory processor-sharing server . . . . . . . . 200--208
Andy Glew An empirical investigation of OR indexing . . . . . . . . . . . . . . . . 41--49 N. J. Gunther Performance pathways . . . . . . . . . . 50--56 Michael G. Gonzales Correction of the Halstead length estimator skew for small Pascal programs 57--59
Albert G. Greenberg and Boris D. Lubachevsky and Isi Mitrani Unboundedly parallel simulations via recurrence relations . . . . . . . . . . 1--12 Randolph Nelson A performance evaluation of a general parallel processing model . . . . . . . 13--26 Wen-Hann Wang and Jean-Loup Baer Efficient trace-driven simulation method for cache performance analysis . . . . . 27--36 S. J. Eggers and David R. Keppel and Eric J. Koldinger and Henry M. Levy Techniques for efficient inline tracing on a shared-memory multiprocessor . . . 37--47 Anant Agarwal and Minor Huffman Blocking: exploiting spatial locality for trace compaction . . . . . . . . . . 48--57 Tein-Hsiang Lin and Kang G. Shin A Bayesian approach to fault classification . . . . . . . . . . . . . 58--66 Louise E. Moser and Vikas Kapur and P. M. Melliar-Smith Probabilistic language analysis of weighted voting algorithms . . . . . . . 67--73 Peter M. Chen and Garth A. Gibson and Randy H. Katz and David A. Patterson An evaluation of redundant arrays of disks using an Amdahl 5890 . . . . . . . 74--85 Amarnath Mukherjee and Lawrence H. Landweber and John C. Strikwerda Simultaneous analysis of flow and error control strategies with congestion-dependent errors . . . . . . 86--95 Arthur Y. M. Lin and John A. Silvester Queueing analysis of an ATM switch with multichannel transmission groups . . . . 96--105 Theodore Johnson Approximate analysis of reader and writer access to a shared resource . . . 106--114 Thomas E. Anderson and Edward D. Lazowska Quartz: a tool for tuning parallel program performance . . . . . . . . . . 115--125 Krishna R. Pattipati and Joel Wolf and Somnath Deb A calculus of variations approach to file allocation problems in computer systems . . . . . . . . . . . . . . . . 126--133 John T. Robinson and Murthy V. Devarakonda Data cache management using frequency-based replacement . . . . . . 134--142 Asit Dan and Don Towsley An approximate analysis of the LRU and FIFO buffer replacement schemes . . . . 143--152 Raphael Alonso and Andrew W. Appel An advisor for flexible working sets . . 153--162 Joseph Torrellas and John Hennessy and Thierry Weil Analysis of critical architectural and programming parameters in a hierarchical 163--172 Rajeev Jog and Philip L. Vitale and James R. Callister Performance evaluation of a commercial cache-coherent shared memory multiprocessor . . . . . . . . . . . . . 173--182 Erol Gelenbe Performance analysis of the Connection Machine . . . . . . . . . . . . . . . . 183--191 Darryl L. Willick and D. L. Eager An analytic model of multistage interconnection networks . . . . . . . . 192--202 K. Dussa and B. Carlson and L. Dowdy and K.-H. Park Dynamic partitioning in a transputer environment . . . . . . . . . . . . . . 203--213 John Zahorjan and Cathy McCann Processor scheduling in shared memory multiprocessors . . . . . . . . . . . . 214--225 Scott T. Leutenegger and Mary K. Vernon The performance of multiprogrammed multiprocessor scheduling algorithms . . 226--236 W. P. Dawkins and V. Debbad and J. R. Jump and J. B. Sinclair Efficient simulation of multiprogramming 237--238 Scott Shenker Making flow control work in networks: a control-theoretic analysis of gateway service disciplines . . . . . . . . . . 239--240 Scott Shenker Making greed work in networks: a game-theoretic analysis of gateway service disciplines . . . . . . . . . . 241--242 Shahram Ghandeharizadeh and David J. DeWitt Factors affecting the performance of multiuser database management systems 243--244 Susanne Englert and Jim Gray and Terrye Kocher and Praful Shah A benchmark of NonStop SQL release 2 demonstrating near-linear speedup and scaleup on large databases . . . . . . . 245--246 Arun K. Somani and James A. Ritcey and Stephen H. L. Au Phased mission reliability analysis . . 247--248 Lionel C. Mitchell Performance analysis of a fault tolerant computer system . . . . . . . . . . . . 249--250 David W. Jensen and Daniel A. Reed Ray tracing on distributed memory parallel systems . . . . . . . . . . . . 251--252 Dinesh Mirchandani and Prabuddha Biswas Characterizing and modeling Ethernet performance of distributed DECwindows applications . . . . . . . . . . . . . . 253--254 Patrick F. McGehearty Challenges in obtaining peak parallel performance with a Convex C240, parallel vector processor . . . . . . . . . . . . 255--256 Steven A. Heimlich Traffic characterization of the NSFNET national backbone . . . . . . . . . . . 257--258 Jack W. Davidson and David B. Whalley Ease: an environment for architecture study and experimentation . . . . . . . 259--260 John G. Waclawsky and Ashok K. Agrawala Dynamic queue behavior in networks with window protocols . . . . . . . . . . . . 261--262 John D. Garofalakis and Paul G. Spirakis The performance of multistage interconnection networks with finite buffers . . . . . . . . . . . . . . . . 263--264 Athanasios V. Vasilakos and Christos A. Moschonas and Constantinos T. Paximadis Adaptive window flow control and learning algorithms for adaptive routing in data networks . . . . . . . . . . . . 265--266 Daniel Nussbaum and Ingmar Vuong-Adlerberg and Anant Agarwal Modeling a circuit switched multiprocessor interconnect . . . . . . 267--269
Blaine D. Gaither Editor's readings . . . . . . . . . . . 25--26 R. E. Vance Article review: `A message-based approach to discrete event simulation' by R. L. Bagrodia, K. M. Chandy, and J. Misra. IEEE Trans. Softw. Eng. SE-13, 6 (June 1987) . . . . . . . . . . . . . . 27--27 Arnold O. Allen and Gary Hynes Approximate MVA solutions with fixed throughput classes . . . . . . . . . . . 31--40 Patrick McGehearty Challenges in obtaining peak parallel performance with a Convex C240, a parallel vector processor . . . . . . . 41--47 Blaine Gaither Scientific visualization of performance data: evaluation of DV-Draw . . . . . . 48--53
H. Reza Taheri An analysis of the Neal Nelson Business Benchmark . . . . . . . . . . . . . . . 13--18 Tom Keller SPEC benchmarks and competitive results 19--20 David Finkel Book review: `Computer Systems Performance Management and Capacity Planning' by J. Cady and B. Howarth (Prentice-Hall, 1990) . . . . . . . . . 21--21 David Finkel Book review: `The Art of Computer Systems Performance Analysis' by R. Jain (Wiley-Interscience, 1991) . . . . . . . 21--22 David Finkel Book review: `Computer and Communication Systems Performance Modelling' by Peter J. B. King (Prentice Hall 1990) . . . . 22--22 David Finkel Book review: `Quantitative Analysis of Computer Systems' by C. H. C. Leung (Wiley, 1988) . . . . . . . . . . . . . 22--23 David Finkel Book review: `Fundamentals of Performance Modeling' by M. K. Molloy (Macmillan, 1989) . . . . . . . . . . . 23--23 Rafael Saavedra-Barrera and Alan J. Smith and Eugene Miya Machine Characterization Based on an Abstract High-level Language Machine . . 24--24 Shivendra S. Panwar and Don Towsley and Jack K. Wolf Optimal scheduling policies for a class of queues with customer deadlines to the beginning of service . . . . . . . . . . 25--25 Hideyuki Tokuda and Makato Kotera and Clifford E. Mercer A Real-Time Monitor for a Distributed Real-Time Operating System . . . . . . . 26--26 Dominique Thiebaut On the Fractal Dimension of Computer Programs and its Application to the Prediction of the Cache Miss Ratio . . . 41--41 Carl Ponder Performance variation across benchmark suites . . . . . . . . . . . . . . . . . 42--48
David Finkel Book review: `Multiprocessor Performance' by Erol Gelenbe (John Wiley & Sons, 1989) . . . . . . . . . . . . . . 9--9 David Finkel Book review: `Performance Analysis of Transaction Processing Systems' by Wilbur H. Highleyman (Prentice Hall, 1989) . . . . . . . . . . . . . . . . . 10--10 David Finkel Book review: `Performance Measurement of Computer Systems' by Phillip McKerrow (Addison-Wesley 1988) . . . . . . . . . 10--11 David Finkel Book review: `Multiple Access Protocols: Performance and Analysis' by Raphael Rom and Moshe Sidi (Springer-Verlag, 1990) 11--11 David Finkel Book review: `Performance Engineering of Software Systems' by Connie U. Smith (Addison-Wesley, 1990) . . . . . . . . . 11--12 Shyam Johari Performance objectives --- how to define them . . . . . . . . . . . . . . . . . . 18--19 Carl G. Ponder Benchmark semantics . . . . . . . . . . 20--24 Luis-Felipe Cabrera Technical summary of the Second IEEE Workshop on Workstation Operating Systems . . . . . . . . . . . . . . . . 25--32
P. M. Melliar-Smith and Louise E. Moser Performance analysis of a broadcast communications protocol . . . . . . . . 1--10 Peter B. Danzig An analytical model of operating system protocol processing including effects of multiprogramming . . . . . . . . . . . . 11--20 Venkatesh Harinarayan and Leonard Kleinrock Load sharing in limited access distributed systems . . . . . . . . . . 21--30 Tein-Hsiang Lin and Wernhuar Tarng Scheduling periodic and aperiodic tasks in hard real-time computing systems . . 31--38 Robert Berry and Joseph Hellerstein An approach to detecting changes in the factors affecting the performance of computer systems . . . . . . . . . . . . 39--49 Robert Bodnarchuk and Richard Bunt A synthetic workload model for a distributed system file server . . . . . 50--59 Arif Merchant A Markov chain approximation for the analysis of Banyan networks . . . . . . 60--67 T. Lin and L. Kleinrock Performance analysis of finite-buffered multistage interconnection networks with a general traffic pattern . . . . . . . 68--78 David A. Wood and Mark D. Hill and R. E. Kessler A model for estimating trace-sample miss ratios . . . . . . . . . . . . . . . . . 79--89 Mee-Chow Chiang and Gurindar S. Sohi Experience with mean value analysis model for evaluating shared bus, throughput-oriented multiprocessors . . 90--100 Anurag Gupta and Ian Akyildiz and Richard M. Fujimoto Performance analysis of Time Warp with homogeneous processors and exponential task times . . . . . . . . . . . . . . . 101--110 Jong Kim and Chita R. Das On subcube dependability in a hypercube 111--119 Anoop Gupta and Andrew Tucker and Shigeru Urushibara The impact of operating system scheduling policies and synchronization methods of performance of parallel applications . . . . . . . . . . . . . . 120--132 Songnian Zhou and Timothy Brecht Processor-pool-based scheduling for large-scale NUMA multiprocessors . . . . 133--142 Mark S. Squillante and Randolph D. Nelson Analysis of task migration in shared-memory multiprocessor scheduling 143--155 Asit Dan and Daniel M. Dias and Philip S. Yu Analytical modelling of a hierarchical buffer for a data sharing environment 156--167 Martin Reiman and Paul E. Wright Performance analysis of concurrent-read exclusive-write . . . . . . . . . . . . 168--177 James C. French and Terrence W. Pratt and Mriganka Das Performance measurement of a parallel input/output system for the Intel iPSC/2 Hypercube . . . . . . . . . . . . . . . 178--187 Ann L. Chervenak and Randy H. Katz Performance of a disk array prototype 188--197 Shenze Chen and Don Towsley Performance of a mirrored disk in a real-time transaction system . . . . . . 198--207 R. R. Glenn and D. V. Pryor Instrumentation for a massively parallel MIMD application . . . . . . . . . . . . 208--209 Aaron Goldberg and John Hennessy MTOOL: a method for detecting memory bottlenecks . . . . . . . . . . . . . . 210--211 Yul H. Kim and Mark D. Hill and David A. Wood Implementing stack simulation for highly-associative memories . . . . . . 212--213 Robb Newman Performance analysis case study (abstract): application of experimental design & statistical data analysis techniques . . . . . . . . . . . . . . . 214--215 Arvin Park and Jeffrey C. Becker Measurements of the paging behavior of UNIX . . . . . . . . . . . . . . . . . . 216--217 Joseph Pasquale and Barbara Bittel and Daniel Kraiman A static and dynamic workload characterization study of the San Diego Supercomputer Center Cray X-MP . . . . . 218--219 Calton Pu and Frederick Korz and Robert C. Lehman An experiment on measuring application performance over the Internet . . . . . 220--221 Myung K. Yang and Chita R. Das A parallel branch-and-bound algorithm for MIN-based multiprocessors . . . . . 222--223
Dick H. J. Epema Book Review: `Computer and Communication Systems Performance Modelling' by Peter J. B. King (Prentice Hall, 1990) . . . . 4--5 Robert Y. Al-Jaar Book review: `The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling' by Raj Jain (John Wiley & Sons 1991) . . . . . . . . 5--11 David Finkel Brief review: `Probability, Statistics and Queueing Theory with Computer Science Applications,' Second Edition by Arnold O. Allen (Academic Press 1990) 11--12 David Finkel Brief review: `Computer Networks & Systems: Queueing Theory and Performance Evaluation' by Thomas Robertazzi (Springer-Verlag, 1990) . . . . . . . . 12--12 David Finkel Brief review: ``Queueing Networks --- Exact Computational Algorithms: A Unified Theory Based on Decomposition and Aggregation'' by Adrian E. Conway and Nicholas D. Georganas (MIT Press 1989) . . . . . . . . . . . . . . . . . 12--12 David Finkel Brief review: `Performance Instrumentation & Visualization' by Margaret Simmons and Rebecca Koskela (Addison-Wesley & ACM Press, 1989) . . . 12--13 David Finkel Brief review: `Stochastic Analysis of Computer and Communication Systems', Ed. by H. Takagi (Elsevier Science Publishers B.V. 1990) . . . . . . . . . 13--13 David Frankel Brief review: `Queueing Analysis: A Foundation of Performance Evaluation. Volume 1: Vacation and Priority Systems, Part 1' by H. Takagi (North-Holland, 1991) . . . . . . . . . . . . . . . . . 13--13 D. Ames and D. Gibson and B. Troy Composite theoretical performance . . . 24--29 Bruce Christianson Amdahl's Law and end of system design 30--32 David Finkel and Robert E. Kinicki and Jonas A. Lehmann An overview of the WPI Benchmark Suite 33--35 Jeffrey C. Becker and Arvin Park Analysis of the paging behavior of UNIX 36--43 A. E. Fateyev and S. M. Porotskiy and V. I. Drujinin Comparative evaluation of approximate methods for modelling of network systems 44--48
Ashvini Nangia Book Review: `Performance Analysis of Transaction Processing Systems' by Wilbur H. Highleyman (Prentice Hall, 1989) . . . . . . . . . . . . . . . . . 9--11 Xiannong Meng Book Review: `Computer Networks and Systems: Queueing Theory and Performance Evaluation' by Thomas G. Robertazzi (Springer-Verlag, 1990) . . . . . . . . 11--12 ?. Finkel Brief review: `Stochastic Modeling and the Theory of Queues' by Ronald W. Wolfe (Prentice-Hall, 1989) . . . . . . . . . 12--12 ?. Finkel Brief review: `Markovian Queues' by O. P. Sharma (Ellis Horwood Publishers 1990) . . . . . . . . . . . . . . . . . 12--13 ?. Finkel Brief review: `The Benchmark Handbook: Database and Transaction Processing Systems,' Ed. by Jim Gray (Morgan Kaufmann Publishers, Inc., 1991) . . . . 13--13 ?. Finkel Brief review: ``Modeling and Analysis of Local Area Networks'' by Paul J. Fortier and George Desrochers (CRC Press, 1990) 13--13 Michael W. Berry Scientific workload characterization by loop-based analyses . . . . . . . . . . 17--29 Corporate Transaction Processing Performance Council Complete TPC results (as of 9/30/91) . . 32--35 Hartmut Deike-Glindemann SIQUEUE-PET: an environment for queueing network modelling . . . . . . . . . . . 36--44 Jozo J. Dujmovi\'c The use of multiple-subscripted arrays in benchmark programs . . . . . . . . . 45--48
Rob Pooley Book Reviews: `Computer and Communication Systems Performance Modelling' by Peter J. B. King (Prentice Hall 1990) . . . . . . . . . . . . . . . 13--14 Anna Hac Modeling distributed file systems . . . 22--27 Michael K. Molloy Anatomy of the NHFSSTONES benchmarks . . 28--39 William F. Keown, Jr. and Philip Koopman, Jr. and Aaron Collins Real-time performance of the HARRIS RTX 2000 stack architecture versus the Sun 4 SPARC and the Sun 3 M68020 architectures with a proposed real-time performance benchmark . . . . . . . . . . . . . . . 40--48
Margaret Martonosi and Anoop Gupta and Thomas Anderson MemSpy: analyzing memory system bottlenecks in programs . . . . . . . . 1--12 David B. Whalley Fast instruction cache performance evaluation using compile-time analysis 13--22 Richard P. LaRowe, Jr. and Mark A. Holliday and Carla Schlatter Ellis An analysis of dynamic page placement on a NUMA multiprocessor . . . . . . . . . 23--34 Victor F. Nicola and Asit Dan and Daniel M. Dias Analysis of the generalized clock buffer replacement scheme for database transaction processing . . . . . . . . . 35--46 S. C. Borst and O. J. Boxma and M. B. Combé Collection of customers: a correlated M/G/1 queue . . . . . . . . . . . . . . 47--59 Philippe Jacquet Subexponential tail distribution in LaPalice queues . . . . . . . . . . . . 60--69 Duan-Shin Lee and Bhaskar Sengupta A reservation based cyclic server queue with limited service . . . . . . . . . . 70--77 K. K. Ramakrishnan and Prabuddha Biswas and Ramakrishna Karedla Analysis of file I/O traces in commercial computing environments . . . 78--90 Harjinder S. Sandhu and Songnian Zhou Cluster-based file replication in large-scale distributed systems . . . . 91--102 Arif Merchant and Kun-Lung Wu and Philip S. Yu and Ming-Syan Chen Performance analysis of dynamic finite versioning for concurrent transaction and query processing . . . . . . . . . . 103--114 Alexander Thomasian Performance analysis of locking policies with limited wait depth . . . . . . . . 115--127 Jim Kurose On computing per-session performance bounds in high-speed multi-hop computer networks . . . . . . . . . . . . . . . . 128--139 John C. S. Lui and Richard R. Muntz Algorithmic approach to bounding the mean response time of a minimum expected delay routing system . . . . . . . . . . 140--151 Edmundo de Souza e Silva and Pedro Mejiá Ochoa State space exploration in Markov models 152--166 Susan S. Owicki and Anna R. Karlin Factors in the performance of the AN1 computer network . . . . . . . . . . . . 167--180 A. Udaya Shankar and Cengiz Alaettino\uglu and Ibrahim Matta and Klaudia Dussa-Zieger Performance comparison of routing protocols using MaRS: distance-vector versus link-state . . . . . . . . . . . 181--192 Eitan Altman and Philippe Nain Closed-loop control with delayed information . . . . . . . . . . . . . . 193--204 Arif Merchant Analytical models of combining Banyan networks . . . . . . . . . . . . . . . . 205--212 Ian F. Akyildiz and Liang Chen and Samir R. Das and Richard M. Fujimoto and Richard F. Serfozo Performance analysis of ``Time Warp'' with limited memory . . . . . . . . . . 213--224 John Turek and Joel L. Wolf and Krishna R. Pattipati and Philip S. Yu Scheduling parallelizable tasks: putting it all on the shelf . . . . . . . . . . 225--236 P. Brémaud and W.-B. Gong Stationary likelihood ratios and smoothed perturbation analysis gradient estimates for the routing problem . . . 237--238 Rosemary Candlin and Peter Fisk and Joe Phillips and Neil Skilling Studying the performance properties of concurrent programs by simulation experiments on synthetic programs . . . 239--240 Robert F. Berry and Joseph L. Hellerstein Characterizing and interpreting periodic behavior in computer systems . . . . . . 241--242 Erhard Rahm and Donald Ferguson High performance cache management for sequential data access . . . . . . . . . 243--244 Ram Chakka and Isi Mitrani Multiprocessor systems with general breakdowns and repairs (extended abstract) . . . . . . . . . . . . . . . 245--246 Eric A. Brewer and Chrysanthos N. Dellarocas and Adrian Colbrook and William E. Weihl PROTEUS: a high-performance parallel-architecture simulator . . . . 247--248 Dikran S. Meliksetian and C. Y. Roger Chen Performance analysis of communications in static interconnection networks . . . 249--250 Asit Dan and Philip S. Yu and Jen-Yao Chung Characterization of database access skew in a transaction processing environment 251--252 Aloke Gupta and Wen-Mei W. Hwu Xprof: profiling the execution of X Window programs . . . . . . . . . . . . 253--254 Ruth Shoham and Uri Yechiali Elevator-type polling systems (abstract) 255--257 François Baccelli and Miguel Canales Parallel simulation of stochastic Petri nets using recurrence equations . . . . 257--258 Manfred R. Jobmann and Johann Schumann Performance analysis of a parallel theorem prover . . . . . . . . . . . . . 259--260
Kim Shanley and Amie Belongia TPC releases new benchmark: TPC-C . . . 8--22 Rob Pooley Book review: `Performance Engineering of Software Systems' by Connie U. Smith (Addison Wesley 1990) . . . . . . . . . 23--24 Stephen Taylor Book review: ``Queuing Networks --- Exact Computational Algorithms: A Unified Theory Based on Decomposition and Aggregation'' by Adrian E. Conway and Nicolas D. Georganas (MIT Press 1989) . . . . . . . . . . . . . . . . . 24--26 Makoto Kobayashi A cache multitasking model . . . . . . . 27--37 S. M. Porotskiy and A. E. Fateev Development trends in methods for efficiency evaluation of ES-based computer systems . . . . . . . . . . . . 38--42 S. M. Porotskiy and A. E. Fateev System and real performance evaluation of computer . . . . . . . . . . . . . . 43--46
Apple van de Liefvoort Book review: ``Multiple Access Protocols: Performance and Analysis'' by Raphael Rom and Moshe Sidi (Springer-Verlag, 1990) . . . . . . . . 5--6 Corporate TPC Summary of TPC results (as of December 22, 1992) . . . . . . . . . . . . . . . 7--21 Silvano Maffeis File access patterns in public FTP archives and an index for locality of reference . . . . . . . . . . . . . . . 22--35 Özgür Ulusoy An approximate analysis of a real-time database concurrency control protocol via Markov modeling . . . . . . . . . . 36--48
Corporate IBM Systems Analysis Department Selected publications: 1992 . . . . . . 3--9 Corporate TPC Summary of TPC results (as of March 15, 1993) . . . . . . . . . . . . . . . . . 10--23 Kimmo E. E. Raatikainen Cluster analysis and workload classification . . . . . . . . . . . . . 24--30 Robert B. Smith and James K. Archibald and Brent E. Nelson Evaluating performance of prefetching second level caches . . . . . . . . . . 31--42
Peter M. Chen and David A. Patterson A new approach to I/O performance evaluation: self-scaling I/O benchmarks, predicted I/O performance . . . . . . . 1--12 Prabuddha Biswas and K. K. Ramakrishnan and Don Towsley Trace driven analysis of write caching policies for disks . . . . . . . . . . . 13--23 Rabin A. Sugumar and Santosh G. Abraham Efficient simulation of caches under optimal replacement with applications to miss characterization . . . . . . . . . 24--35 Jacqueline Chame and Michel Dubois Cache inclusion and processor sampling in multiprocessor simulations . . . . . 36--47 Steven K. Reinhardt and Mark D. Hill and James R. Larus and Alvin R. Lebeck and James C. Lewis and David A. Wood The Wisconsin Wind Tunnel: virtual prototyping of parallel computers . . . 48--60 Vikram S. Adve and Mary K. Vernon The influence of random delays on parallel execution times . . . . . . . . 61--73 E. Rosti and E. Smirni and T. D. Wagner and A. W. Apon and L. W. Dowdy The KSR1: experimentation and modeling of poststore . . . . . . . . . . . . . . 74--85 Gregory R. Ganger and Yale N. Patt The process-flow model: examining I/O performance from the system's point of view . . . . . . . . . . . . . . . . . . 86--97 Edward K. Lee and Randy H. Katz An analytic performance model of disk arrays . . . . . . . . . . . . . . . . . 98--109 Dong Tang and Ravishankar K. Iyer MEASURE+: a measurement-based dependability analysis package . . . . . 110--121 A. V. Ramesh and Kishor Trivedi On the sensitivity of transient solutions of Markov models . . . . . . . 122--134 David M. Nicol and Philip Heidelberger Parallel simulation of Markovian queueing networks using adaptive uniformization . . . . . . . . . . . . . 135--145 Stephen R. Goldschmidt and John L. Hennessy The accuracy of trace-driven simulations of multiprocessors . . . . . . . . . . . 146--157 Sanjeev K. Setia and Mark S. Squillante and Satish K. Tripathi Processor scheduling on multiprogrammed, distributed memory parallel computers 158--170 Kun-Lung Wu and Philip S. Yu and James Z. Teng Performance comparison of thrashing control policies for concurrent Mergesorts with parallel prefetching . . 171--182 Dikran S. Meliksetian and C. Y. Roger Chen A Markov-modulated Bernoulli process approximation for the analysis of Banyan networks . . . . . . . . . . . . . . . . 183--194 Hiroshi Arakawa and Daniel I. Katcher and Jay K. Strosnider and Hideyuki Tokuda Modeling and validation of the real-time Mach scheduler . . . . . . . . . . . . . 195--206 Sanjoy Baruah and Jayant R. Haritsa ROBUST: a hardware solution to real-time overload . . . . . . . . . . . . . . . . 207--216 Jayanta K. Dey and James F. Kurose and Don Towsley and C. M. Krishna and Mahesh Girkar Efficient on-line processor scheduling for a class of IRIS (Increasing Reward with Increasing Service) real-time tasks 217--228 Robert J. T. Morris Analysis of superposition of streams into a cache buffer . . . . . . . . . . 229--235 Jory Tsai and Anant Agarwal Analyzing multiprocessor cache behavior through data reference modeling . . . . 236--247 Margaret Martonosi and Anoop Gupta and Thomas Anderson Effectiveness of trace sampling for performance debugging tools . . . . . . 248--259 Jong-Suk Ahn and Peter B. Danzig and Deborah Estrin and Brenda Timmerman Hybrid technique for simulating high bandwidth delay computer networks . . . 260--261 Jeffrey C. Becker and Arvin Park An analysis of the information content of address and data reference streams 262--263 Shahram Ghandeharizadeh and Luis Ramos An evaluation of alternative virtual replication strategies for continuous retrieval of multimedia data . . . . . . 264--265 Jonathan Kay and Joseph Pasquale A summary of TCP/IP networking software performance for the DECstation 5000 . . 266--267 Gary Lewandowski and Anne Condon and Eric Bach Asynchronous analysis of parallel dynamic programming . . . . . . . . . . 268--269 Kang G. Shin and Chao-Ju Hou Evaluation of load sharing in HARTS while considering message routing and broadcasting . . . . . . . . . . . . . . 270--271 Josep Torrellas and Andrew Tucker and Anoop Gupta Benefits of cache-affinity scheduling in shared-memory multiprocessors: a summary 272--274 Vidar Vetland and Peter Hughes and Arne Sòlvberg A composite modelling approach to software performance measurement . . . . 275--276 David B. Wagner Approximate mean value analysis of interconnection networks with deflection routing . . . . . . . . . . . . . . . . 277--278 Carey L. Williamson Optimizing file transfer response time using the loss-load curve congestion control mechanism . . . . . . . . . . . 279--280
Lester Lipsky Book review: ``Introduction to Computer System Performance Evaluation'' by Krishna Kant (McGraw-Hill, 1992) . . . . 7--9 Robert E. Kinicki Book review: ``Telecommunications and Networking'' by Udo W. Pooch, Denis Machuel and John McCahn (CRC Press, 1991) . . . . . . . . . . . . . . . . . 9--10 Xiren Cao Some common misconceptions about performance modeling and validation . . 11--15 Silvano Maffeis Cache management algorithms for flexible filesystems . . . . . . . . . . . . . . 16--25 UNIX International Performance management activities within UNIX International . . . . . . . . . . . 42--42
Jozo J. Dujmovi\'c Book review: ``The Benchmarking Handbook for Database and Transaction Processing Systems'' Edited by Jim Gray (Morgan Kaufmann Publishers, Inc., 1991) . . . . 4--5 David Finkel Book review: ``Encyclopedia of Computer Science'', Third Edition, edited by Anthony Ralston and Edwin I. Reilly (Van Nostrand Reinhold, 1993) . . . . . . . . 6--6 Colleen D. Schieber and Eric E. Johnson RATCHET: real-time address trace compression hardware for extended traces 22--32 Surendra M. Gupta and Fikri Karaesmen Solution to complex queueing systems: a spreadsheet approach . . . . . . . . . . 33--46
Peter J. Denning The fifteenth level (keynote address) 1--4 Vinod G. J. Peris and Mark S. Squillante and Vijay K. Naik Analysis of the impact of memory in distributed parallel processing systems 5--18 Cathy McCann and John Zahorjan Processor allocation policies for message-passing parallel computers . . . 19--32 Su-Hui Chiang and Rajesh K. Mansharamani and Mary K. Vernon Use of application characteristics and limited preemption for run-to-completion parallel processor scheduling policies 33--44 Joel L. Wolf and John Turek and Ming-Syan Chen and Philip S. Yu Scheduling multiple queries on a parallel machine . . . . . . . . . . . . 45--55 Jignesh M. Patel and Michael J. Carey and Mary K. Vernon Accurate modeling of the hybrid hash join algorithm . . . . . . . . . . . . . 56--66 Avi Bittan and Yaakov Kogan and Philip S. Yu Asymptotic performance of a buffer model in a data sharing environment . . . . . 67--76 Dorina C. Petriu Approximate mean value analysis of client-server systems with multi-class requests . . . . . . . . . . . . . . . . 77--86 G. Balbo and S. C. Bruell and M. Sereno Arrival theorems for product-form stochastic Petri nets . . . . . . . . . 87--97 Arun K. Somani and Kishor S. Trivedi Phased-mission system analysis using Boolean algebraic methods . . . . . . . 98--107 Maria R. Ebling and M. Satyanarayanan SynRGen: an extensible file reference generator . . . . . . . . . . . . . . . 108--117 S. V. Raghavan and D. Vasukiammaiyar and Gunter Haring Generative networkload models for a single server environment . . . . . . . 118--127 Bob Cmelik and David Keppel Shade: a fast instruction-set simulator for execution profiling . . . . . . . . 128--137 Brian D. Noble and M. Satyanarayanan An empirical study of a highly available file system . . . . . . . . . . . . . . 138--149 Michael D. Dahlin and Clifford J. Mather and Randolph Y. Wang and Thomas E. Anderson and David A. Patterson A quantitative analysis of cache policies for scalable network file systems . . . . . . . . . . . . . . . . 150--160 David Kotz and Preston Crow The expected lifetime of ``single-address-space'' operating systems . . . . . . . . . . . . . . . . 161--170 Anand Sivasubramaniam and Aman Singla and Umakishore Ramachandran and H. Venkateswaran An approach to scalability study of shared memory parallel systems . . . . . 171--180 Pankaj Mehra and Catherine H. Schulbach and Jerry C. Yan A comparison of two model-based performance-prediction techniques for message-passing parallel programs . . . 181--190 Graham Horton and Scott T. Leutenegger A multi-level solution algorithm for steady-state Markov chains . . . . . . . 191--200 Samir R. Das and Richard M. Fujimoto An adaptive memory management protocol for Time Warp parallel simulation . . . 201--210 Hui Zhang and Edward W. Knightly Providing end-to-end statistical performance guarantees with bounding interval dependent stochastic models . . 211--220 Sridhar Pingali and Don Towsley and James F. Kurose A comparison of sender-initiated and receiver-initiated reliable multicast protocols . . . . . . . . . . . . . . . 221--230 Ioanis Nikolaidis and Richard Fujimoto and C. Anthony Cooper Time-parallel simulation of cascaded statistical multiplexers . . . . . . . . 231--240 Bruce L. Worthington and Gregory R. Ganger and Yale N. Patt Scheduling algorithms for modern disk drives . . . . . . . . . . . . . . . . . 241--251 David M. Nicol and Shahid H. Bokhari Optimal multiphase complete exchange on circuit-switched hypercube architectures 252--260 O. Temam and C. Fricker and W. Jalby Cache interference phenomena . . . . . . 261--271 John Danskin and Pat Hanrahan Profiling the X protocol (extended abstract) . . . . . . . . . . . . . . . 272--273 Ann L. Drapeau and David A. Patterson and Randy H. Katz Toward workload characterization of video server and digital library applications (extended abstract) . . . . 274--275 Deepinder S. Gill and Songnian Zhou and Harjinder S. Sandhu A case study of file system workload in a large-scale distributed environment 276--277 Joseph L. Hellerstein A comparison of techniques for diagnosing performance problems in information systems (extended abstract) 278--279 J. William Lee Efficient user-level communication on multicomputers with an optimistic flow-control protocol (extended abstract) . . . . . . . . . . . . . . . 280--281 J. A. Rolia and M. Starkey and G. Boersma Modeling RPC performance . . . . . . . . 282--283 Athar B. Tayyab and Jon G. Kuhl Stochastic performance models of parallel task systems (extended abstract) . . . . . . . . . . . . . . . 284--285 Richard Uhlig and David Nagle and Trevor Mudge and Stuart Sechrest Kernel-based memory simulation (extended abstract) . . . . . . . . . . . . . . . 286--287 Harald Wabnig and Günter Haring Performance prediction of parallel systems with scalable specifications --- methodology and case study . . . . . . . 288--289
S. S. Lavenberg Selected publications of the Systems Analysis and Systems Applications department of the IBM T. J. Watson Research Center . . . . . . . . . . . . 6--17 Kim Shanley and Tracy Derossett TPC-D measures how quickly real-world business questions can be answered . . . 18--45 H. Wabnig and G. Haring Performance prediction of parallel systems with scalable specifications --- methodology and case study . . . . . . . 46--62 Surendra M. Gupta Queueing model with state dependent balking and reneging: its complementary and equivalence . . . . . . . . . . . . 63--72 D. G. Keehn Visualizing performance in the frequency plane . . . . . . . . . . . . . . . . . 73--81
John Chapin and A. Herrod and Mendel Rosenblum and Anoop Gupta Memory system performance of UNIX on CC-NUMA multiprocessors . . . . . . . . 1--13 Robert C. Bedichek Talisman: fast and accurate multicomputer simulation . . . . . . . . 14--24 Leana Golubchik and John C. S. Lui and Richard Muntz Reducing I/O demand in video-on-demand storage servers . . . . . . . . . . . . 25--36 Shahram Ghandeharizadeh and Seon Ho Kim and Cyrus Shahabi On configuring a single disk continuous media server . . . . . . . . . . . . . . 37--46 Marwan Krunz and Herman Hughes A traffic for MPEG-coded VBR streams . . 47--55 Carey L. Williamson Network traffic measurement and modeling 56--57 Erol Gelenbe G-networks: new queueing models with additional control capabilities . . . . 58--59 Srini Tridandapani and Anton T. Dahbura and Charles U. Martel and John Matthews and Arun K. Somani Free performance and fault tolerance (extended abstract): using system idle capacity efficiently . . . . . . . . . . 60--61 Allen D. Malony Data interpretation and experiment planning in performance tools . . . . . 62--63 Nitin H. Vaidya A case for two-level distributed recovery schemes . . . . . . . . . . . . 64--73 D. H. J. Epema An analysis of decay-usage scheduling in multiprocessors . . . . . . . . . . . . 74--85 Anwar Elwalid and Daniel Heyman and T. V. Lakshman and Debasis Mitra and Alan Weiss Fundamental results on the performance of ATM multiplexers with applications to video teleconferencing . . . . . . . . . 86--97 Edward W. Knightly and Dallas E. Wrege and Jörg Liebeherr and Hui Zhang Fundamental limits and tradeoffs of providing deterministic guarantees to VBR video traffic . . . . . . . . . . . 98--107 Youjian Fang and Michael Devetsikiotis and Ioannis Lambadaris and A. Roger Kaye Exponential bounds for the waiting time distribution in Markovian queues, with applications to TES/GI/1 systems . . . . 108--115 S. C. Borst Optimal probabilistic allocation of customer types to servers . . . . . . . 116--125 Ibrahim Matta and A. Udaya Shankar Z-iteration: a simple method for throughput estimation in time-dependent multi-class systems . . . . . . . . . . 126--135 Peter M. Chen and Edward K. Lee Striping in a RAID level 5 disk array 136--145 Bruce L. Worthington and Gregory R. Ganger and Yale N. Patt and John Wilkes On-line extraction of SCSI disk drive parameters . . . . . . . . . . . . . . . 146--156 Joel L. Wolf and Philip S. Yu and Hadas Shachnai DASD dancing: a disk load balancing optimization scheme for video-on-demand computer systems . . . . . . . . . . . . 157--166 Harjinder S. Sandhu and Kenneth C. Sevcik An analytic study of dynamic hardware and software cache coherence strategies 167--177 Mats Brorsson SM-prof: a tool to visualise and find cache coherence performance bottlenecks in multiprocessor programs . . . . . . . 178--187 Pei Cao and Edward W. Felten and Anna R. Karlin and Kai Li A study of integrated prefetching and caching strategies . . . . . . . . . . . 188--197 Anand Sivasubramaniam and Aman Singla and Umakishore Ramachandran and H. Venkateswaran On characterizing bandwidth requirements of parallel applications . . . . . . . . 198--207 Cathy McCann and John Zahorjan Scheduling memory constrained jobs on distributed memory parallel computers 208--219 Alvin R. Lebeck and David A. Wood Active memory: a new abstraction for memory-system simulation . . . . . . . . 220--230 Edmundo de Souza e Silva and H. Richard Gail and Reinaldo Vallejos Campos Calculating transient distributions of cumulative reward . . . . . . . . . . . 231--240 Juan A. Carrasco and Angel Calderón Regenerative randomization: theory and application examples . . . . . . . . . . 241--252 Albert G. Greenberg and R. Srikant Computational techniques for accurate performance evaluation of multirate, multihop communication networks . . . . 253--260 Teun Ott The Internet in evolution, and TCP over ATM (panel session) . . . . . . . . . . 261--262 Kishor S. Trivedi and A. Bobbio and G. Ciardo and R. German and A. Puliafito and M. Telek Non-Markovian Petri nets . . . . . . . . 263--264 Ashok Erramilli Performance impacts of self-similarity in traffic . . . . . . . . . . . . . . . 265--266 Remzi H. Arpaci and Andrea C. Dusseau and Amin M. Vahdat and Lok T. Liu and Thomas E. Anderson and David A. Patterson The interaction of parallel and sequential workloads on a network of workstations . . . . . . . . . . . . . . 267--278 Jussi Myllymaki and Miron Livny Disk-tape joins: synchronizing disk and tape access . . . . . . . . . . . . . . 279--290 Vidyadhar Phalke and Bhaskarpillai Gopinath An inter-reference gap model for temporal locality in program behavior 291--300 Jan Braams Batch class process scheduler for Unix SVR4 . . . . . . . . . . . . . . . . . . 301--302 S. Donatelli and G. Franceschinis State space reductions using stochastic well-formed net simplifications: an application to random polling systems 303--304 S. Balsamo and I. Mura Approximate response time distribution in Fork and Join systems . . . . . . . . 305--306 Xiaodong Zhang and Zhichen Xu A semi-empirical approach to scalability study . . . . . . . . . . . . . . . . . 307--308 Eric Hughes and Marianne Winslett PEDCAD: a framework for performance evaluation of object database applications . . . . . . . . . . . . . . 309--310 James D. Salehi and James F. Kurose and Don Towsley Scheduling for cache affinity in parallelized communication protocols . . 311--312 Amit K. Chatterjee and Vijay K. Konangi Modeling and analysis of multi channel asymmetric packet switch modules in a bursty and nonuniform traffic environment . . . . . . . . . . . . . . 313--314 Gautam Shah and Umakishore Ramachandran and Richard Fujimoto Timepatch: a novel technique for the parallel simulation of multiprocessor caches . . . . . . . . . . . . . . . . . 315--316 C. R. M. Sundaram and Derek L. Eager Future applicability of bus-based shared memory multiprocessors . . . . . . . . . 317--318 Gianfranco Ciardo and Ludmila Cherkasova and Vadim Kotov and Tomas Rokicki Modeling a Fibre Channel switch with stochastic Petri nets . . . . . . . . . 319--320 Meenakshi Arunachalam and Alok Choudhary A prefetching prototype for the parallel file systems on the Paragon . . . . . . 321--322
R. Gopalakrishnan and Gurudatta M. Parulkar Bringing real-time scheduling theory and practice closer for multimedia computing 1--12 Mor Harchol-Balter and Allen B. Downey Exploiting process lifetime distributions for dynamic load balancing 13--24 Andrea C. Dusseau and Remzi H. Arpaci and David E. Culler Effective distributed scheduling of parallel workloads . . . . . . . . . . . 25--36 Beng-Hong Lim and Ricardo Bianchini Limits on the performance benefits of multithreading and prefetching . . . . . 37--46 Peter A. Dinda and David R. O'Hallaron Fast message assembly using compact address relations . . . . . . . . . . . 47--56 Eric W. Parsons and Kenneth C. Sevcik Coordinated allocation of memory and processors in multiprocessors . . . . . 57--67 Emmett Witchel and Mendel Rosenblum Embra: fast and flexible machine simulation . . . . . . . . . . . . . . . 68--79 Lawrence S. Brakmo and Larry L. Peterson Experiences with network simulation . . 80--90 Albert G. Greenberg and S. Shenker and Alexander L. Stolyar Asynchronous updates in large parallel systems . . . . . . . . . . . . . . . . 91--103 Dimitrios Stiliadis and Anujan Varma Design and analysis of frame-based fair queueing: a new traffic scheduling algorithm for packet-switched networks 104--115 David J. Yates and Erich M. Nahum and James F. Kurose and Don Towsley Networking support for large scale multiprocessor servers . . . . . . . . . 116--125 Martin F. Arlitt and Carey L. Williamson Web server workload characterization: the search for invariants . . . . . . . 126--137 Margaret Martonosi and David Ofelt and Mark Heinrich Integrating performance monitoring and communication in parallel computers . . 138--147 Umesh Krishnaswamy and Isaac D. Scherson Micro-architecture evaluation using performance vectors . . . . . . . . . . 148--159 Mark E. Crovella and Azer Bestavros Self-similarity in World Wide Web traffic: evidence and possible causes 160--169 Bruce K. Hillyer and Avi Silberschatz On the modeling and performance characteristics of a serpentine tape drive . . . . . . . . . . . . . . . . . 170--179 Daniel A. Menascé and Odysseas I. Pentakalos and Yelena Yesha An analytic model of hierarchical mass storage systems with network-attached storage devices . . . . . . . . . . . . 180--189 Ken Chen and Laurent Decreusefond An approximate analysis of waiting time in multi-class M/G/1/./EDF queues . . . 190--199 Charu Aggarwal and Joel Wolf and Philip S. Yu On optimal piggyback merging policies for video-on-demand systems . . . . . . 200--209 Richard Gerber and Ladan Gharai Experiments with digital video playback 210--221 James D. Salehi and Zhi-Li Zhang and James F. Kurose and Don Towsley Supporting stored video: reducing rate variability and end-to-end resource requirements through optimal smoothing 222--231 Elizabeth Varki and Lawrence W. Dowdy Analysis of balanced fork-join queueing networks . . . . . . . . . . . . . . . . 232--241 Juan A. Carrasco and Javier Escribá and Angel Calderón Efficient exploration of availability models guided by failure distances . . . 242--251 Sachin Garg and Yennun Huang and Chandra Kintala and Kishor S. Trivedi Minimizing completion time of a program by checkpointing and rejuvenation . . . 252--261 Tracy Kimbrel and Pei Cao and Edward W. Felten and Anna R. Karlin and Kai Li Integrated parallel prefetching and caching . . . . . . . . . . . . . . . . 262--263 Scott T. Leutenegger and Mario A. Lopez A buffer model for evaluating R-tree performance . . . . . . . . . . . . . . 264--265 Joseph L. Hellerstein An approach to selecting metrics for detecting performance problems in information systems . . . . . . . . . . 266--267 William V. Courtright II and Garth Gibson and Mark Holland and Jim Zelenka RAIDframe: rapid prototyping for disk arrays . . . . . . . . . . . . . . . . . 268--269 Swaminathan Ramany and Derek Eager Quantifying achievable routing performance in multiprocessor interconnection networks . . . . . . . . 270--271 Steven Hotovy and David Schneider and Timothy O'Donnell Analysis of the early workload on the Cornell Theory Center IBM SP2 . . . . . 272--273
Hans-Werner Braun Architecture and performance of large internets, based on terrestrial and satellite infrastructure . . . . . . . . 1--1 Hari Balakrishnan and Mark Stemm and Srinivasan Seshan and Randy H. Katz Analyzing stability in wide-area network performance . . . . . . . . . . . . . . 2--12 Carlos Maltzahn and Kathy J. Richardson and Dirk Grunwald Performance issues of enterprise level Web proxies . . . . . . . . . . . . . . 13--23 D. P. Heyman and T. V. Lakshman and Arnold L. Neidhardt A new method for analysing feedback-based protocols with applications to engineering Web traffic over the Internet . . . . . . . . . . . 24--38 Qingming Ma and K. K. Ramakrishnan Queue management for explicit rate based congestion control . . . . . . . . . . . 39--51 Teunis J. Ott and Neil Aggarwal TCP over ATM: ABR or UBR? . . . . . . . 52--63 Sneha K. Kasera and Jim Kurose and Don Towsley Scalable reliable multicast using multiple multicast groups . . . . . . . 64--74 Ramakrishnan Rajamony and Alan L. Cox Performance debugging shared memory parallel programs using run-time dependence analysis . . . . . . . . . . 75--87 Martin C. Herbordt and Owais Kidwai and Charles C. Weems Preprototyping SIMD coprocessors using virtual machine emulation and trace compilation . . . . . . . . . . . . . . 88--99 Andrew Tomkins and R. Hugo Patterson and Garth Gibson Informed multi-process prefetching and caching . . . . . . . . . . . . . . . . 100--114 Gideon Glass and Pei Cao Adaptive page replacement based on memory reference behavior . . . . . . . 115--126 Geoffrey M. Voelker and Hervé A. Jamrozik and Mary K. Vernon and Henry M. Levy and Edward D. Lazowska Managing server load in global memory systems . . . . . . . . . . . . . . . . 127--138 Michael E. Woodward Size-limited batch movement in product-form closed discrete-time queueing networks . . . . . . . . . . . 139--146 Leana Golubchik and John C. S. Lui Bounding of performance measures for a threshold-based queueing system with hysteresis . . . . . . . . . . . . . . . 147--157 John P. Lehoczky Using real-time queueing theory to control lateness in real-time systems 158--168 Erich Nahum and David Yates and Jim Kurose and Don Towsley Cache behavior of network protocols . . 169--180 Edward W. Knightly Second moment resource allocation in multi-service networks . . . . . . . . . 181--191 Marwan Krunz and Satish K. Tripathi On the characterization of VBR MPEG streams . . . . . . . . . . . . . . . . 192--202 Keith A. Smith and Margo I. Seltzer File system aging --- increasing the relevance of file system benchmarks . . 203--213 Aaron B. Brown and Margo I. Seltzer Operating system benchmarking in the wake of lmbench: a case study of the performance of NetBSD on the Intel x86 architecture . . . . . . . . . . . . . . 214--224 Anurag Acharya and Guy Edjlali and Joel Saltz The utility of exploiting idle workstations for parallel computation 225--234 Xiaohan Qin and Jean-Loup Baer A performance evaluation of cluster architectures . . . . . . . . . . . . . 237--247 Tzi-cker Chiueh and Srinidhi Varadarajan Design and evaluation of a DRAM-based shared memory ATM switch . . . . . . . . 248--259 Junehwa Song and Asit Dan and Dinkar Sitaram Efficient retrieval of composite multimedia objects in the JINSIL distributed system . . . . . . . . . . . 260--271 Garth A. Gibson and David F. Nagle and Khalil Amiri and Fay W. Chang and Eugene M. Feinberg and Howard Gobioff and Chen Lee and Berend Ozceri and Erik Riedel and David Rochberg and Jim Zelenka File server scaling with network-attached secure disks . . . . . 272--284 Athanassios K. Tsiolis and Mary K. Vernon Group-guaranteed channel capacity in multimedia storage servers . . . . . . . 285--297
Richard Muntz Special Issue on Multimedia Storage Systems . . . . . . . . . . . . . . . . 2--2 Banu Özden and Rajeev Rastogi and Avi Silberschatz Architecture issues in multimedia storage systems . . . . . . . . . . . . 3--12 Weifeng Shi and Shahram Ghandeharizadeh Buffer sharing in video-on-demand servers . . . . . . . . . . . . . . . . 13--20 Leana Golubchik On issues and tradeoffs in design of fault tolerant VOD servers . . . . . . . 21--28 Richard Muntz and Jose Renato Santos and Steve Berson RIO: a real-time multimedia object server . . . . . . . . . . . . . . . . . 29--35 Michele Colajanni and Philip S. Yu Adaptive TTL schemes for load balancing of distributed Web servers . . . . . . . 36--42
David Kotz Special Issue on Parallel I/O Systems 2--2 Thomas H. Cormen and David M. Nicol Out-of-core FFTs with parallel disks . . 3--12 Maria Papadopouli and Leana Golubchik Support of VBR video streams under disk bandwidth limitations . . . . . . . . . 13--20 Rajesh Bordawekar and Steven Landherr and Don Capps and Mark Davis Experimental evaluation of the Hewlett--Packard Exemplar file system 21--28 David Rochberg and Garth Gibson Prefetching over a network: early experience with CTIP . . . . . . . . . . 29--36 Jai Menon and Kent Treiber Daisy: virtual-disk hierarchical storage manager . . . . . . . . . . . . . . . . 37--44
David M. Nicol Special Issue on the Telecommunications Description Language . . . . . . . . . . 3--3 Kalyan Perumalla and Richard Fujimoto and Andrew Ogielski TED --- a language for modeling telecommunication networks . . . . . . . 4--11 Kalyan Perumalla and Matthew Andrews and Sandeep Bhatt TED models for ATM internetworks . . . . 12--21 Dan Rubenstein and Jim Kurose and Don Towsley Optimistic parallel simulation of reliable multicast protocols . . . . . . 22--29 Jignesh Panchal and Owen Kelly and Jie Lai and Narayan Mandayam and Andarew T. Ogielski and Roy Yates Parallel simulations of wireless networks with TED: radio propagation, mobility and protocols . . . . . . . . . 30--39 Brian J. Premore and David M. Nicol Transformation of ns TCP models to TED 40--48
V. Srinivasan and George Varghese Faster IP lookups using controlled prefix expansion . . . . . . . . . . . . 1--10 Vern Paxson On calibrating measurements of packet transit times . . . . . . . . . . . . . 11--21 Randolph Y. Wang and Arvind Krishnamurthy and Richard P. Martin and Thomas E. Anderson and David E. Culler Modeling communication pipeline latency 22--32 Geoffrey M. Voelker and Eric J. Anderson and Tracy Kimbrel and Michael J. Feeley and Jeffrey S. Chase and Anna R. Karlin and Henry M. Levy Implementing cooperative prefetching and caching in a globally-managed memory system . . . . . . . . . . . . . . . . . 33--43 Prashant J. Shenoy and Harrick M. Vin Cello: a disk scheduling framework for next generation operating systems . . . 44--55 Emilia Rosti and Giuseppe Serazzi and Evgenia Smirni and Mark S. Squillante The impact of I/O on program behavior and parallel scheduling . . . . . . . . 56--65 Sandeep Bajaj and Lee Breslau and Scott Shenker Is service priority useful in networks? 66--77 Lampros Kalampoukas and Anujan Varma and K. K. Ramakrishnan Improving TCP throughput over two-way asymmetric links: analysis and solutions 78--89 Suchitra Raman and Steven McCanne and Scott Shenker Asymptotic behavior of global recovery in SRM . . . . . . . . . . . . . . . . . 90--99 O. J. Boxma and V. Dumas The busy period in the fluid queue . . . 100--110 Guang-Liang Li and Jun-Hong Cui and Bo Li and Fang-Ming Li Transient loss performance of a class of finite buffer queueing systems . . . . . 111--120 Martin W. McKinnon and George N. Rouskas and Harry G. Perros Queueing-based analysis of broadcast optical networks . . . . . . . . . . . . 121--130 Andy C. Bavier and A. Brady Montz and Larry L. Peterson Predicting MPEG execution times . . . . 131--140 Steven D. Gribble and Gurmeet Singh Manku and Drew Roselli and Eric A. Brewer and Timothy J. Gibson and Ethan L. Miller Self-similarity in file systems . . . . 141--150 Paul Barford and Mark Crovella Generating representative Web workloads for network and server performance evaluation . . . . . . . . . . . . . . . 151--160 Minwen Ji and Edward W. Felten and Kai Li Performance measurements for multithreaded programs . . . . . . . . . 161--170 Dongming Jiang and Jaswinder Pal Singh A methodology and an evaluation of the SGI Origin 2000 . . . . . . . . . . . . 171--181 Elizabeth Shriver and Arif Merchant and John Wilkes An analytic behavior model for disk drives with readahead caches and request reordering . . . . . . . . . . . . . . . 182--191 Basilio B. Fraguela and Ramón Doallo and Emilio L. Zapata Modeling set associative caches behavior for irregular computations . . . . . . . 192--201 Tianji Jiang and Mostafa H. Ammar and Ellen W. Zegura Inter-receiver fairness: a novel performance measure for multicast ABR sessions . . . . . . . . . . . . . . . . 202--211 Costas Courcoubetis and Vasilios A. Siris and George D. Stamoulis Application and evaluation of large deviation techniques for traffic engineering in broadband networks . . . 212--221 Arnold L. Neidhardt and Jonathan L. Wang The concept of relevant time scales and its application to queuing analysis of self-similar traffic (or is Hurst naughty or nice?) . . . . . . . . . . . 222--232 Andrea C. Arpaci-Dusseau and David E. Culler and Alan M. Mainwaring Scheduling with implicit information in distributed systems . . . . . . . . . . 233--243 Thu D. Nguyen and John Zahorjan Scheduling policies to support distributed $3$D multimedia applications 244--253 Csaba Andras Moritz and Matthew I. Frank LoGPC: modeling network contention in message-passing programs . . . . . . . . 254--263 Rakesh Barve and Elizabeth Shriver and Phillip B. Gibbons and Bruce K. Hillyer and Yossi Matias and Jeffrey Scott Vitter Modeling and optimizing I/O throughput of multiple disks on a bus (summary) . . 264--265 Robert D. Blumofe and Dionisios Papadopoulos The performance of work stealing in multiprogrammed environments (extended abstract) . . . . . . . . . . . . . . . 266--267 Mark E. Crovella and Mor Harchol-Balter and Cristina D. Murta Task assignment in a distributed system (extended abstract): improving performance by unbalancing load . . . . 268--269 Stephen Manley and Margo Seltzer and Michael Courage A self-scaling and self-configuring benchmark for Web servers (extended abstract) . . . . . . . . . . . . . . . 270--271 Alex Rousskov and Valery Soloviev On performance of caching proxies (extended abstract) . . . . . . . . . . 272--273 J. Waldby and U. Madhow and T. V. Lakshman Total acknowledgements (extended abstract): a robust feedback mechanism for end-to-end congestion control . . . 274--275 Thomas E. Willis and George B. Adams III Portable, continuous recording of complete computer behavior with low overhead (extended abstract) . . . . . . 276--277 Anurag Acharya and Sanjeev Setia Using idle memory for data-intensive computations (extended abstract) . . . . 278--279 Mohamed Aboutabl and Ashok Agrawala and Jean-Dominique Decotignie Temporally determinate disk access (extended abstract): an experimental approach . . . . . . . . . . . . . . . . 280--281
M. Ajmone Marsan and G. Balbo and G. Conte and S. Donatelli and G. Franceschinis Modelling with Generalized Stochastic Petri Nets . . . . . . . . . . . . . . . 2--2 Falko Bause and Pieter S. Kritzinger Stochastic Petri Nets: An Introduction to the Theory . . . . . . . . . . . . . 2--3 Christoph Lindemann Performance Modelling with Deterministic and Stochastic Petri Nets . . . . . . . 3--3 Christoph Lindemann Special issue on stochastic Petri nets 4--4 Peter Buchholz and Peter Kemper On generating a hierarchy for GSPN analysis . . . . . . . . . . . . . . . . 5--14 Ricardo M. Fricks and Antonio Puliafito and Miklós Telek and Kishor S. Trivedi Applications of non-Markovian stochastic Petri nets . . . . . . . . . . . . . . . 15--27 Marco Ajmone Marsan and Rossano Gaeta Modeling ATM systems with GSPNs and SWNs 28--37 Alexander Ost and Boudewijn R. Haverkort Analysis of windowing mechanisms with infinite-state stochastic Petri nets . . 38--46
Jozo J. Dujmovi\'c and Ivo Dujmovi\'c Evolution and evaluation of SPEC benchmarks . . . . . . . . . . . . . . . 2--9 Pei Cao and Sekhar Sarukkai Guest Editors' Introduction . . . . . . 10--10 Ramón Cáceres and Fred Douglis and Anja Feldmann and Gideon Glass and Michael Rabinovich Web proxy caching: the devil is in the details . . . . . . . . . . . . . . . . 11--15 Diwakar Krishnamurthy and Jerome Rolia Predicting the QoS of an electronic commerce server: those mean percentiles 16--22 Gaurav Bangs and Peter Druschel and Jeffrey C. Mogul Better operating system features for faster network servers . . . . . . . . . 23--30 David Mosberger and Tai Jin httperf --- a tool for measuring Web server performance . . . . . . . . . . . 31--37 Amy Ward and Peter Glynn and Kathy Richardson Internet service performance failure detection . . . . . . . . . . . . . . . 38--43 Mehmet Sayal and Yuri Breitbart and Peter Scheuermann and Radek Vingralek Selection algorithms for replicated Web servers . . . . . . . . . . . . . . . . 44--50
Jeffrey K. Hillingsworth and Barton P. Miller Summary of the SIGMETRICS Symposium on Parallel and Distributed Processing . . 2--12 Kenneth C. Sevcik Special Issue on Scheduling in Multiprogrammed Parallel Systems . . . . 13--13 Allen B. Downey and Dror G. Feitelson The elusive goal of workload characterization . . . . . . . . . . . . 14--29 Sanjeev Setia and Mark S. Squillante and Vijay K. Naik The impact of job memory requirements on gang-scheduling performance . . . . . . 30--39 Yuet-Ning Chan and Sivarama P. Dandamudi and Shikharesh Majumdar Experiences with parallel job scheduling on a transputer system . . . . . . . . . 40--51 Mark S. Squillante and David D. Yao and Li Zhang The impact of job arrival patterns on parallel scheduling . . . . . . . . . . 52--59 L. W. Dowdy and E. Rosti and G. Serazzi and E. Smirni Scheduling issues in high-performance computing . . . . . . . . . . . . . . . 60--69
Vinay J. Ribeiro and Rudolf H. Riedi and Matthew S. Crouse and Richard G. Baraniuk Simulation of nonGaussian long-range-dependent traffic using wavelets . . . . . . . . . . . . . . . . 1--12 Wei Zhao and Satish K. Tripathi Bandwidth-efficient continuous media streaming through optimal multiplexing 13--22 Sanjeev Kumar and Dongming Jiang and Rohit Chandra and Jaswinder Pal Singh Evaluating synchronization on shared address space multiprocessors: methodology and performance . . . . . . 23--34 Anurag Acharya and Sanjeev Setia Availability and utility of idle memory in workstation clusters . . . . . . . . 35--46 Scott F. Kaplan and Yannis Smaragdakis and Paul R. Wilson Trace reduction for virtual memory simulations . . . . . . . . . . . . . . 47--58 John R. Douceur and William J. Bolosky A large-scale study of file-system contents . . . . . . . . . . . . . . . . 59--70 Richard P. Martin and David E. Culler NFS sensitivity to high performance networks . . . . . . . . . . . . . . . . 71--82 Rakesh Barve and Elizabeth Shriver and Phillip B. Gibbons and Bruce K. Hillyer and Yossi Matias and Jeffrey Scott Vitter Modeling and optimizing I/O throughput of multiple disks on a bus . . . . . . . 83--92 Jay Sethuraman and Mark S. Squillante Optimal stochastic scheduling in multiclass parallel queues . . . . . . . 93--102 Elizabeth Varki Mean value technique for closed fork-join networks . . . . . . . . . . . 103--112 Peter A. Franaszek and Philip Heidelberger and Michael Wazlowski On management of free space in compressed memory systems . . . . . . . 113--121 Yannis Smaragdakis and Scott Kaplan and Paul Wilson EELRU: simple and effective adaptive page replacement . . . . . . . . . . . . 122--133 Donghee Lee and Jongmoo Choi and Jong-Hun Kim and Sam H. Noh and Sang Lyul Min and Yookun Cho and Chong Sang Kim On the existence of a spectrum of policies that subsumes the least recently used (LRU) and least frequently used (LFU) policies . . . . . . . . . . 134--143 Reiner Ludwig and Bela Rathonyi and Almudena Konrad and Kimberly Oden and Anthony Joseph Multi-layer tracing of TCP over a reliable wireless link . . . . . . . . . 144--154 Farooq Anjum and Leandros Tassiulas On the behavior of different TCP algorithms over a wireless channel with correlated packet losses . . . . . . . . 155--165 Kunwadee Sripanidkulchai and Andy Myers and Hui Zhang A third-party value-added network service approach to reliable multicast 166--177 Li Fan and Pei Cao and Wei Lin and Quinn Jacobson Web prefetching between low-bandwidth clients and proxies: potential and performance . . . . . . . . . . . . . . 178--187 Paul Barford and Mark Crovella A performance evaluation of hyper text transfer protocols . . . . . . . . . . . 188--197 Huican Zhu and Ben Smith and Tao Yang Hierarchical resource management for Web server clusters with dynamic content . . 198--199 Cheng Liao and Margaret Martonosi and Douglas W. Clark An adaptive globally-synchronizing clock algorithm and its implementation on a Myrinet-based PC cluster . . . . . . . . 200--201 ChengFu Chou and Leana Golubchik and John C. S. Lui A performance study of dynamic replication techniques in continuous media servers . . . . . . . . . . . . . 202--203 Constantinos Dovrolis and Dimitrios Stiliadis Relative differentiated services in the Internet: issues and mechanisms . . . . 204--205 Gretta Bartels and Anna Karlin and Darrell Anderson and Jeffrey Chase and Henry Levy and Geoffrey Voelker Potentials and limitations of fault-based Markov prefetching for virtual memory pages . . . . . . . . . . 206--207 Patrick Crowley and Jean-Loup Baer On the use of trace sampling for architectural studies of desktop applications . . . . . . . . . . . . . . 208--209 Sumeer Bhola and Mustaque Ahamad Workload modeling for highly interactive applications . . . . . . . . . . . . . . 210--211 Narayanan Venkitaraman and Tae-eun Kim and Kang-Won Lee Design and evaluation of congestion control algorithms in the future Internet . . . . . . . . . . . . . . . . 212--213 E. N. Elnozahy Address trace compression through loop detection and reduction . . . . . . . . 214--215 Erich Nahum and Tsipora Barzilai and Dilip Kandlur Performance issues in WWW servers . . . 216--217 T. S. Eugene Ng and Donpaul C. Stephens and Ion Stoica and Hui Zhang Supporting best-effort traffic with fair service curve . . . . . . . . . . . . . 218--219 Jitendra Padhye and Jim Kurose and Don Towsley and Rajeev Koodli A TCP-friendly rate adjustment protocol for continuous media flows over best effort networks . . . . . . . . . . . . 220--221 Allen B. Downey Using pathchar to estimate Internet link characteristics . . . . . . . . . . . . 222--223 Yuval Hershko and Daniel Segal and Hadas Shachnai Self-tuning synchronization mechanisms in network operating systems . . . . . . 224--225 Pradip Bose Performance evaluation and validation of microprocessors . . . . . . . . . . . . 226--227 Shikharesh Majumdar and Dale Streibel and Bruce Beninger and Brian Carroll and Neveenta Verma and Minru Liu Controlling memory contention on a scalable multiprocessor-based telephone switch . . . . . . . . . . . . . . . . . 228--229 Eugenio Cervetto Model-based performance analysis of an EDP/ERP-oriented wide area network . . . 230--231 Srinivas Ramanathan and Edward H. Perry The value of a systematic approach to measurement and analysis: an ISP case study . . . . . . . . . . . . . . . . . 232--233 Janet Siebert Improving performance of data analysis in data warehouses: a methodology and case study . . . . . . . . . . . . . . . 234--235
Carey Williamson Special Issue on Network Traffic Measurements and Workload Characterization . . . . . . . . . . . . 2--2 Judith L. Jerkins and John Monroe and Jonathan L. Wang A measurement analysis of Internet traffic over frame relay . . . . . . . . 3--14 Raja Epsilon and Jun Ke and Carey Williamson Analysis of ISP IP/ATM network traffic measurements . . . . . . . . . . . . . . 15--24 Martin Arlitt and Rich Friedrich and Tai Jin Workload characterization of a Web proxy in a cable modem environment . . . . . . 25--36 Paul Barford and Mark Crovella Measuring Web performance in the wide area . . . . . . . . . . . . . . . . . . 37--48
Mark S. Squillante Special issue on the Workshop on MAthematical performance Modeling and Analysis (MAMA `99) . . . . . . . . . . 2--2 E. G. Coffman, Jr. and Ph. Robert and A. L. Stolyar The interval packing process of linear networks . . . . . . . . . . . . . . . . 3--4 R. Cáceres and N. G. Duffield and J. Horowitz and F. Lo Presti and D. Towsley Statistical inference of internal network loss and topology . . . . . . . 5--6 D. H. J. Epema and J. F. C. M. de Jongh Proportional-share scheduling in single-server and multiple-server computing systems . . . . . . . . . . . 7--10 Dimitris Bertsimas and David Gamarnik and John N. Tsitsiklis Performance analysis of multiclass queueing networks . . . . . . . . . . . 11--14 Ulrich Herzog Process algebras are getting mature for performance evaluation?! . . . . . . . . 15--18 Laszlo Gyorfi and Andras Racz and Ken Duffy and John T. Lewis and Raymond Russell and Fergal Toomey Distribution-free confidence intervals for measurement of effective bandwidths 19--19 Sandeep Juneja and Perwez Shahabuddin Simulating heavy tailed processes using delayed hazard rate twisting (extended abstract) . . . . . . . . . . . . . . . 20--22 Zhen Liu and Don Towsley Stochastic bounds for queueing systems with multiple Markov modulated sources 23--23 Mark S. Squillante and David D. Yao and Li Zhang Web traffic modeling and Web server performance analysis . . . . . . . . . . 24--27 Jeffrey P. Bradford and Russell Quong An empirical study on how program layout affects cache miss rates . . . . . . . . 28--42 Andrew Moore and Simon Crosby An experimental configuration for the evaluation of CAC algorithms . . . . . . 43--54
Martin Arlitt and Ludmila Cherkasova and John Dilley and Rich Friedrich and Tai Jin Evaluating content management techniques for Web proxy caches . . . . . . . . . . 3--11 Marco Conti and Enrico Gregori and Fabio Panzieri Load distribution among replicated Web servers: QoS-based approach . . . . . . 12--19 Carsten Griwodz and Michael Liepert and Michael Zink and Ralf Steinmetz Tune to Lambda patching . . . . . . . . 20--26 Daniel A. Menaséc and Rodrigo Fonseca and Virgilio A. F. Almeida and Marco A. Mendes Resource management policies for e-commerce servers . . . . . . . . . . . 27--35 Greg Minshall and Yasushi Saito and Jeffrey C. Mogul and Ben Verghese Application performance pitfalls and TCP's Nagle algorithm . . . . . . . . . 36--44 Chris Roadknight and Ian Marshall and Debbie Vearer File popularity characterisation . . . . 45--50 Gary Tomlinson and Drew Major and Ron Lee High-capacity Internet middleware: Internet caching system architectural overview . . . . . . . . . . . . . . . . 51--56 R. D. van der Mei and W. K. Ehrlich and P. K. Reeser and J. P. Francisco A decision support system for tuning Web servers in distributed object oriented network architectures . . . . . . . . . 57--62
Yang-hua Chu and Sanjay G. Rao and Hui Zhang A case for end system multicast (keynote address) . . . . . . . . . . . . . . . . 1--12 A. Legout and E. W. Biersack PLM: fast convergence for cumulative layered multicast transmission schemes 13--22 Sambit Sahu and Philippe Nain and Christophe Diot and Victor Firoiu and Don Towsley and Don Iowsley On achievable service differentiation with token bucket marking for TCP . . . 23--33 William J. Bolosky and John R. Douceur and David Ely and Marvin Theimer Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs . . . . . . . . . . . . . 34--43 Jose Renato Santos and Richard R. Muntz and Berthier Ribeiro-Neto Comparing random data allocation and data striping in multimedia servers . . 44--55 John Linwood Griffin and Steven W. Schlosser and Gregory R. Ganger and David F. Nagle Modeling and performance of MEMS-based storage devices . . . . . . . . . . . . 56--65 Mohammad S. Raunak and Prashant Shenoy and Pawan Goyal and Krithi Ramamritham Implications of proxy caching for provisioning networks and servers . . . 66--77 Jiong Yang and Wei Wang and Richard Muntz Collaborative Web caching based on proxy affinities . . . . . . . . . . . . . . . 78--89 Mohit Aron and Peter Druschel and Willy Zwaenepoel Cluster reserves: a mechanism for resource management in cluster-based network servers . . . . . . . . . . . . 90--101 Chadi Barakat and Eitan Altman Analysis of the phenomenon of several slow start phases in TCP (poster session) . . . . . . . . . . . . . . . . 102--103 Wai-Man R. Wong and Richard R. Muntz Providing guaranteed quality of service for interactive visualization applications (poster session) . . . . . 104--105 Xin Wang and C. Yu and Henning Schulzrinne and Paul Stirpe and Wei Wu IP multicast fault recovery in PIM over OSPF (poster session) . . . . . . . . . 106--107 Emmanuel Léty and Thierry Turletti and François Baccelli Cell-based multicast grouping in large-scale virtual environments (poster session) (extended abstract) . . . . . . 108--109 Shudong Jin and Azer Bestavros Temporal locality in Web request streams (poster session) (extended abstract): sources, characteristics, and caching implications . . . . . . . . . . . . . . 110--111 Jiri Schindler and Gregory R. Ganger Automated disk drive characterization (poster session) . . . . . . . . . . . . 112--113 Zhen Fang and Lixin Zhang and John Carter and Sally McKee and Wilson Hsieh Online superpage promotion revisited (poster session) . . . . . . . . . . . . 114--115 Ioanis Nikolaidis and Fulu Li and Ailan Hu An inherently loss-less and bandwidth-efficient periodic broadcast scheme for VBR video (poster session) 116--117 Can Emre Koksal and Hisham Kassab and Hari Balakrishnan An analysis of short-term fairness in wireless media access protocols (poster session) . . . . . . . . . . . . . . . . 118--119 Srinath R. Joshi and Injong Rhee RESCU: dynamic hybrid packet-loss recovery for video transmission over the Internet (poster session) . . . . . . . 120--121 Venkata N. Padmanabhan and Lili Qiu The content and access dynamics of a busy Web server (poster session) . . . . 122--123 Eitan Altman and Konstantin Avrachenkov and Chadi Barakat TCP in presence of bursty losses . . . . 124--133 Jim Martin and Arne Nilsson and Injong Rhee The incremental deployability of RTT-based congestion avoidance for high speed TCP Internet connections . . . . . 134--144 Dan Rubenstein and Jim Kurose and Don Towsley Detecting shared congestion of flows via end-to-end measurement . . . . . . . . . 145--155 Xin Wang and Henning Schulzrinne and Dilip Kandlur and Dinesh Verma Measurement and analysis of LDAP performance . . . . . . . . . . . . . . 156--165 William S. Cleveland and Dong Lin and Don X. Sun IP packet generation: statistical models for TCP start times based on connection-rate superposition . . . . . 166--177 Nidhi Hegde and Khosrow Sohraby On the impact of soft hand-off in cellular systems . . . . . . . . . . . . 178--187 Sanjay Shakkottai and R. Srikant Delay asymptotics for a priority queueing system . . . . . . . . . . . . 188--195 Leana Golubchik and John C. S. Lui A fast and accurate iterative solution of a multi-class threshold-based queueing system with hysteresis . . . . 196--206 Andrew S. Miner and Gianfranco Ciardo and Susanna Donatelli Using the exact state space of a Markov model to compute approximate stationary measures . . . . . . . . . . . . . . . . 207--216 Derek L. Eager and Daniel J. Sorin and Mary K. Vernon AMVA techniques for high service time variability . . . . . . . . . . . . . . 217--228 David Ofelt and John L. Hennessy Efficient performance prediction for modern microprocessors . . . . . . . . . 229--239 Yasuhiro Endo and Margo Seltzer Improving interactive performance using TIPME . . . . . . . . . . . . . . . . . 240--251 Keith I. Farkas and Jason Flinn and Godmar Back and Dirk Grunwald and Jennifer M. Anderson Quantifying the energy consumption of a pocket computer and a Java Virtual Machine . . . . . . . . . . . . . . . . 252--263 Jin-Soo Kim and Yarsun Hsu Memory system behavior of Java programs: methodology and analysis . . . . . . . . 264--274 Magnus Karlsson and Per Stenström An analytical model of the working-set sizes in decision-support systems . . . 275--285 Jongmoo Choi and Sam H. Noh and Sang Lyul Min and Yookun Cho Towards application/file-level characterization of block references: a case for fine-grained buffer management 286--295 Murali S. Kodialam and T. V. Lakshman and Sudipta Sengupta Online multicast routing with bandwidth guarantees: a new approach using multicast network flow . . . . . . . . . 296--306 Lixin Gao and Jennifer Rexford Stable Internet routing without global coordination . . . . . . . . . . . . . . 307--317 Turgay Korkmaz and Marwan Krunz and Spyros Tragoudas An efficient algorithm for finding a path subject to two additive constraints 318--327
Krishna Kant Workshop on Performance and Architecture of Web Servers (PAWS-2000) . . . . . . . 3--4 Krishna Kant and Prasant Mohapatra Scalable Internet servers: issues and challenges . . . . . . . . . . . . . . . 5--8 Onn Brandman and Junghoo Cho and Hector Garcia-Molina and Narayanan Shivakumar Crawler-friendly Web servers . . . . . . 9--14 Randal C. Burns and Darrell D. E. Long and Robert M. Rees Consistency and locking for distributing updates to Web servers using a file system . . . . . . . . . . . . . . . . . 15--21 Nikolaos Vasiliou and Hanan Lutfiyya Providing a differentiated quality of service in a World Wide Web server . . . 22--28 Samrat Bhattacharjee and William C. Cheng and Cheng-Fu Chou and Leana Golubchik and Samir Khuller Bistro: a framework for building scalable wide-area \em Upload applications . . . . . . . . . . . . . . 29--35 E. Kraemer and G. Paixão and D. Guedes and W. Meira, Jr. and V. Almeida Minimizing the impact of orphan requests in e-commerce services . . . . . . . . . 36--42 Brian D. Davison and Vincenzo Liberatore Pushing politely: improving Web responsiveness one packet at a time . . 43--43 Martin Arlitt Characterizing Web user sessions . . . . 50--63 R. Hadharan and W. K. Ehrlich and D. Cura and P. K. Reeser End to End Performance Modeling of Web Server Architectures . . . . . . . . . . 57--63
Weiping Zhu An approximate analysis of the shortest queue policy on soft real-time scheduling . . . . . . . . . . . . . . . 3--10 Bo Li and Kazem Sohraby Special Issue on Performance Issues in Mobile Computing . . . . . . . . . . . . 11--11 Ming Feng Chang and Yi-Bing Lin Performance of a weakly consistent wireless Web access mechanism . . . . . 12--20 C.-K. Toh and Richard Chen and Minar Delwar and Donald Allen Experimenting with an Ad Hoc wireless network on campus: insights and experiences . . . . . . . . . . . . . . 21--29 Tanja Lang and Daniel Floreani Performance evaluation of different TCP error detection and congestion control strategies over a wireless link . . . . 30--38 Vikrant A. Chitre and John N. Daigle IP-based services over GPRS . . . . . . 39--47
Mark S. Squillante Special issue on the Workshop on MAthematical performance Modeling and Analysis (MAMA 2000) . . . . . . . . . . 2--2 Mor Harchol-Balter Job placement with unknown duration and no preemption . . . . . . . . . . . . . 3--5 Leana Golubchik and John C. S. Lui Open problems for threshold-based systems . . . . . . . . . . . . . . . . 6--8 E. G. Coffman, Jr. and Predrag Jelenkovi\'c Threshold policies for single-resource reservation systems . . . . . . . . . . 9--10 Joel L. Wolf and Philip S. Yu Load balancing for clustered Web farms 11--13 Edmundo de Souza e Silva and Rosa M. M. Leão and Morganna C. Diniz Transient analysis applied to traffic modeling . . . . . . . . . . . . . . . . 14--16 T. Bu and D. Towsley A fixed point approximation of TCP behavior in a network . . . . . . . . . 17--18 Cheng-Shang Chang and Yuh-ming Chiu and Wheyming Tina Song Large deviation analysis for multiplexing independent regulated inputs . . . . . . . . . . . . . . . . . 19--21 Lei Kuang and Armand M. Makowski Convex stability and asymptotic convex ordering for non-stationary arrival processes . . . . . . . . . . . . . . . 22--23 Eitan Bachmat Recent results in mathematical modeling and performance evaluation of disks and disk array . . . . . . . . . . . . . . . 24--26 Karin Hogstedt and Doug Kimelman and V. T. Rajan and Tova Roth and Mark Wegman Graph cutting algorithms for distributed applications partitioning . . . . . . . 27--29 Paulo Fernandes and Brigitte Plateau Triangular solution of linear systems in tensor product format . . . . . . . . . 30--32 L. Capra and C. Dutheillet and G. Franceschinis and J. M. Ilié On the use of partial symmetries for lumping Markov chains . . . . . . . . . 33--35 Peter J. Haas Estimation of delays in non-regenerative discrete-event stochastic systems . . . 36--38 David Gamarnik On deciding stability of constrained random walks and queueing systems . . . 39--40 Mark S. Squillante and Baffelly Woo and Li Zhang Analysis of queues under correlated arrivals with applications to Web server performance . . . . . . . . . . . . . . 41--43
Girija Narlikar and Francis Zane Performance modeling for fast IP lookups 1--12 Xiaohu Qie and Andy Bavier and Larry Peterson and Scott Karlin Scheduling computations on a software-based router . . . . . . . . . 13--24 Xun Su and Gustavo de Veciana Dynamic multi-path routing: asymptotic approximation and simulations . . . . . 25--36 Michael B. Jones and Stefan Saroiu Predictability requirements of a soft modem . . . . . . . . . . . . . . . . . 37--49 Jacob R. Lorch and Alan Jay Smith Improving dynamic voltage scaling algorithms with PACE . . . . . . . . . . 50--61 Kalyanaraman Vaidyanathan and Richard E. Harper and Steven W. Hunter and Kishor S. Trivedi Analysis and implementation of software rejuvenation in cluster systems . . . . 62--71 Gabriel Loh A time-stamping algorithm for efficient performance estimation of superscalar processors . . . . . . . . . . . . . . . 72--81 Thomas Bonald and Laurent Massoulié Impact of fairness on Internet performance . . . . . . . . . . . . . . 82--91 Kavé Salamatian and Sandrine Vaton Hidden Markov modeling for network communication channels . . . . . . . . . 92--101 Jin Cao and William S. Cleveland and Dong Lin and Don X. Sun On the nonstationarity of Internet traffic . . . . . . . . . . . . . . . . 102--112 Hung-Yun Hsieh and Raghupathy Sivakumar Performance comparison of cellular and multi-hop wireless networks: a quantitative study . . . . . . . . . . . 113--122 Nidhi Hegde and Khosrow Sohraby Blocking in large mobile cellular networks with bursty traffic . . . . . . 123--132 Apurva Kumar and Rajeev Gupta Capacity evaluation of frequency hopping based ad-hoc systems . . . . . . . . . . 133--142 Dongyu Qiu and Ness B. Shroff A new predictive flow control scheme for efficient network utilization and QoS 143--153 Ioannis Ch. Paschalidis and Spyridon Vassilaras Model-based estimation of buffer overflow probabilities from measurements 154--163 Rudra Dutta and George N. Rouskas On optimal traffic grooming in WDM rings 164--174 Jean-Yves Le Boudec Some properties of variable length packet shapers . . . . . . . . . . . . . 175--183 Cheng-Shang Chang and Yuh-ming Chiu and Wheyming Tina Song On the performance of multiplexing independent regulated inputs . . . . . . 184--193 Yefim Shuf and Mauricio J. Serrano and Manish Gupta and Jaswinder Pal Singh Characterizing the memory behavior of Java workloads: a structured view and opportunities for optimizations . . . . 194--205 Sohum Sohoni and Rui Min and Zhiyong Xu and Yiming Hu A study of memory system performance of multimedia applications . . . . . . . . 206--215 Tian Bu and Don Towsley Fixed point approximations for TCP behavior in an AQM network . . . . . . . 216--225 Steven H. Low and Larry Peterson and Limin Wang Understanding TCP Vegas: a duality model 226--235 J. Talim and Z. Liu and Ph. Nain and E. G. Coffman, Jr. Controlling the robots of Web search engines . . . . . . . . . . . . . . . . 236--244 F. Donelson Smith and Félix Hernández Campos and Kevin Jeffay and David Ott What TCP/IP protocol headers can tell us about the Web . . . . . . . . . . . . . 245--256 Erich M. Nahum and Marcel-Catalin Rosu and Srinivasan Seshan and Jussara Almeida The effects of wide-area conditions on WWW server performance . . . . . . . . . 257--267 Philippe Nain and Redusindo Núñez-Queija A M/M/1 queue in a semi-Markovian environment . . . . . . . . . . . . . . 268--278 Nikhil Bansal and Mor Harchol-Balter Analysis of SRPT scheduling: investigating unfairness . . . . . . . . 279--290 Johannes Lüthi and Catalina M. Lladó Interval parameters for capturing uncertainties in an EJB performance model . . . . . . . . . . . . . . . . . 291--300 Hesham El-Sayed and Don Cameron and Murray Woodside Automation support for software performance engineering . . . . . . . . 301--311 Michael K. Bradshaw and Bing Wang and Subhabrata Sen and Lixin Gao and Jim Kurose and Prashant Shenoy and Don Towsley Periodic broadcast and patching services: implementation, measurement, and analysis in an Internet streaming video testbed . . . . . . . . . . . . . 312--313 Yang Richard Yang and Xiaozhou Li and Simon S. Lam and Xincheng Zhang Towards scalable and reliable group key management . . . . . . . . . . . . . . . 314--315 Anat Bremler-Barr and Yehuda Afek and Haim Kaplan and Edith Cohen and Michael Merritt Restoration path concatenation: fast recovery of MPLS paths . . . . . . . . . 316--317 Andreas Savvides and Sung Park and Mani B. Srivastava On modeling networks of wireless microsensors . . . . . . . . . . . . . . 318--319 Philippas Tsigas and Yi Zhang Evaluating the performance of non-blocking synchronization on shared-memory multiprocessors . . . . . 320--321 Wee Teck Ng and Bruce K. Hillyer Obtaining high performance for storage outsourcing . . . . . . . . . . . . . . 322--323 Venkata N. Padamanabban and Lealkshminarayanan Subramanian Determining the geographic location of Internet hosts . . . . . . . . . . . . . 324--325 Michel Mandjes and Iraj Saniee and Alexander Stolyar Load characterization and anomaly detection for voice over IP traffic . . 326--327 Allen B. Downey The structural cause of file size distributions . . . . . . . . . . . . . 328--329 Rishi Bhargava and Ashish Goel and Adam Meyerson Using approximate majorization to characterize protocol fairness . . . . . 330--331 John Mellor-Crummey and Robert Fowler and David Whalley On providing useful information for analyzing and tuning applications . . . 332--333 Cyrus Shahabi and Mohammad R. Kolahdouzan and Greg Barish and Roger Zimmermann and Didi Yao and Kun Fu and Lingling Zhang Alternative techniques for the efficient acquisition of haptic data . . . . . . . 334--335 Peter A. Dinda Online prediction of the running time of tasks . . . . . . . . . . . . . . . . . 336--337 Virgilío Almeida and Daniel Menascé and Rudolf Riedi and Flávia Peligrinelli and Rodrigo Fonseca and Wagner Meira, Jr. Analyzing robot behavior in e-business sites . . . . . . . . . . . . . . . . . 338--339 Jussara M. Almeida and Jeffrey Krueger and Mary K. Vernon Characterization of user access to streaming media files . . . . . . . . . 340--341 Thomas Bonald and James Roberts Performance modeling of elastic traffic in overload . . . . . . . . . . . . . . 342--343 Lili Qiu and George Varghese and Subhash Suri Fast firewall implementations for software-based and hardware-based routers . . . . . . . . . . . . . . . . 344--345
K. Kant and Prasant Mohapatra Current research trends in Internet servers . . . . . . . . . . . . . . . . 5--7 Amy Csizmar Dalal and Scott Jordan An optimal service ordering for a World Wide Web server . . . . . . . . . . . . 8--13 Valeria Cardellini and Emiliano Casalicchio and Michele Colajanni and Marco Mambelli Web switch support for differentiated services . . . . . . . . . . . . . . . . 14--19 Thiemo Voigt and Per Gunningberg Kernel-based control of persistent Web server connections . . . . . . . . . . . 20--25 Jun Wang and Rui Min and Zhuying Wu and Yiming Hu Boosting I/O performance of Internet servers with user-level custom file systems . . . . . . . . . . . . . . . . 26--31 Xin Chen and Xiaodong Zhang Coordinated data prefetching by utilizing reference information at both proxy and Web servers . . . . . . . . . 32--38 Oscar Ardaiz and Felix Freitag and Leandro Navarro Improving the service time of Web clients using server redirection . . . . 39--44
Shudong Jin and Azer Bestavros GISMO: a Generator of Internet Streaming Media Objects and workloads . . . . . . 2--10 Mark S. Squillante Special issue on the Workshop on MAthematical performance Modeling and Analysis (MAMA 2001) . . . . . . . . . . 11--11 Nikhil Bansal and Mor Harchol-Balter Analysis of M/G/1/SRPT under transient overload . . . . . . . . . . . . . . . . 12--14 E. Bachmat Average case analysis for batched disk scheduling and increasing subsequences 15--16 Anton Riabov and Jay Sethuraman Scheduling periodic task graphs with communication delays . . . . . . . . . . 17--18 Jean-Michel Fourneau and Erol Gelenbe G-networks with resets . . . . . . . . . 19--20 Michael Shalmon Queueing analysis for polling and prioritized service of aggregated regenerative variable rate ON-OFF traffic sources . . . . . . . . . . . . 20--20 Alan Bain and Peter Key Modelling the performance of distributed admission control for adaptive applications . . . . . . . . . . . . . . 21--22 Cheng-Shang Chang and Duan-Shin Lee and Ching-Ming Lien Load balanced Birkhoff--von Neumann switches with resequencing . . . . . . . 23--24 Yaakov Kogan Asymptotic expansions for probability distributions in large loss and closed queueing networks . . . . . . . . . . . 25--27 Yuliy Baryshnikov and E. G. Coffman, Jr. and Predrag Jelenkovi\'c Kelly's LAN model revisited . . . . . . 28--29 David Gamarnik Stochastic online binpacking problem: exact conditions for bounded expected queue lengths under the best fit packing heuristic . . . . . . . . . . . . . . . 30--31 S. Lam and Rocky K. C. Chang Stability comparison in single-server-multiple-queue systems . . 32--34 Árpád Szlávik GI/G/1 type processes: a non-inversive matrix analytical solution . . . . . . . 35--37 Nam Kyoo Boots and Perwez Shahabuddin Simulating tail probabilities in GI/GI/1 queues and insurance risk processes with subexponential distributions (extended abstract) . . . . . . . . . . . . . . . 38--39 Sem Borst and Michel Mandjes and Miranda van Uitert Generalized processor sharing with heterogeneous traffic classes . . . . . 40--42 Zhen Liu and Mark S. Squillante and Joel L. Wolf On maximizing service-level-agreement profits . . . . . . . . . . . . . . . . 43--44 Yingdong Lu and Jing-Sheng Song and Weian Zheng Performance analysis of assemble-to-order systems through strong approximations . . . . . . . . . . . . . 45--46 Mark S. Squillante and Cathy H. Xia and Li Zhang Optimal scheduling in queueing network models of high-volume commercial Web sites . . . . . . . . . . . . . . . . . 47--48
Kenneth C. Sevcik and Hai Wang Solution properties and convergence of an approximate mean value analysis algorithm . . . . . . . . . . . . . . . 3--10 Carey Williamson and Qian Wu A case for context-aware TCP/IP . . . . 11--23 Daniel A. Menascé Simple analytic modeling of software contention . . . . . . . . . . . . . . . 24--30 William C. Cheng and Cheng-Fu Chou and Leana Golubchik and Samir Khuller A performance study of Bistro, a scalable upload architecture . . . . . . 31--39 Barry G. Lawson and Evgenia Smirni Multiple-queue backfilling scheduling with priorities and reservations for parallel systems . . . . . . . . . . . . 40--47
Attila Pásztor and Darryl Veitch PC based precision timing without GPS 1--10 Mark Coates and Rui Castro and Robert Nowak and Manik Gadhiok and Ryan King and Yolanda Tsang Maximum likelihood network topology identification from edge-based unicast measurements . . . . . . . . . . . . . . 11--20 Tian Bu and Nick Duffield and Francesco Lo Presti and Don Towsley Network tomography on general topologies 21--30 Song Jiang and Xiaodong Zhang LIRS: an efficient low inter-reference recency set replacement policy to improve buffer cache performance . . . . 31--42 Mark S. Squillante and Yanyong Zhang and Anand Sivasubramaniam and Natarajan Gautam and Hubertus Franke and Jose Moreira Modeling and analysis of dynamic coscheduling in parallel and distributed environments . . . . . . . . . . . . . . 43--54 Eitan Bachmat and Jiri Schindler Analysis of methods for scheduling low priority disk drive tasks . . . . . . . 55--65 Allan Snavely and Dean M. Tullsen and Geoff Voelker Symbiotic jobscheduling with priorities for a simultaneous multithreading processor . . . . . . . . . . . . . . . 66--76 Peter G. Harrison and William J. Knottenbelt Passage time distributions in large Markov chains . . . . . . . . . . . . . 77--85 Alma Riska and Evgenia Smirni Exact aggregate solutions for M/G/1-type Markov processes . . . . . . . . . . . . 86--96 Shudong Jin and Azer Bestavros Scalability of multicast delivery for non-sequential streaming access . . . . 97--107 Carl J. Mauer and Mark D. Hill and David A. Wood Full-system timing-first simulation . . 108--116 Ruoming Jin and Gagan Agrawal Performance prediction for random write reductions: a case study in modeling shared memory programs . . . . . . . . . 117--128 Gokul B. Kandiraju and Anand Sivasubramaniam Characterizing the $d$-TLB behavior of SPEC CPU2000 benchmarks . . . . . . . . 129--139 Matthew Hertz and Stephen M. Blackburn and J. Eliot B. Moss and Kathryn S. McKinley and Darko Stefanovi\'c Error-free garbage collection traces: how to cheat and not get caught . . . . 140--151 Craig W. Cameron and Steven H. Low and David X. Wei High-density model for server allocation and placement . . . . . . . . . . . . . 152--159 David P. Olshefski and Jason Nieh and Dakshi Agrawal Inferring client response time at the Web server . . . . . . . . . . . . . . . 160--171 Sam C. M. Lee and John C. S. Lui and David K. Y. Yau Admission control and dynamic adaptation for a proportional-delay diffserv-enabled Web server . . . . . . 172--182 Haonan Tan and Derek L. Eager and Mary K. Vernon and Hongfei Guo Quality of service evaluations of multicast streaming protocols . . . . . 183--194 Anand Balachandran and Geoffrey M. Voelker and Paramvir Bahl and P. Venkat Rangan Characterizing user behavior and network performance in a public wireless LAN . . 195--205 Harkirat Singh and Suresh Singh Energy consumption of TCP Reno, Newreno, and SACK in multi-hop wireless networks 206--216 Taliver Heath and Richard P. Martin and Thu D. Nguyen Improving cluster availability using workstation validation . . . . . . . . . 217--227 Albert Lai and Jason Nieh Limits of wide-area thin-client computing . . . . . . . . . . . . . . . 228--239 Jeffrey Vetter Dynamic statistical profiling of communication activity in distributed applications . . . . . . . . . . . . . . 240--250 Jeanine Cook and Richard L. Oliver and Eric E. Johnson Toward reducing processor simulation time via dynamic reduction of microarchitecture complexity . . . . . . 252--253 Jimmy S. Shih and Randy H. Katz Evaluating tradeoffs of congestion pricing for voice calls . . . . . . . . 254--255 Miriam Sivan-Zimet and Tara M. Madhyastha Workload based optimization of probe-based storage . . . . . . . . . . 256--257 Qin Lv and Pei Cao and Edith Cohen and Kai Li and Scott Shenker Search and replication in unstructured peer-to-peer networks . . . . . . . . . 258--259 Y. Chandramouli and Arnold Neidhardt Application level traffic measurements for capacity engineering . . . . . . . . 260--261 Carey Williamson and Qian Wu Context-aware TCP/IP . . . . . . . . . . 262--263 Chadi Barakat and Patrick Thiran and Gianluca Iannaccone and Christophe Diot On Internet backbone traffic modeling 264--265 Alexander Thomasian and Chang Liu Some new disk scheduling policies and their performance . . . . . . . . . . . 266--267 Kang-Won Lee and Khalil Amiri and Sambit Sahu and Chitra Venkatramani On the sensitivity of cooperative caching performance to workload and network characteristics . . . . . . . . 268--269 Vaidyanathan Anantharaman and Raghupathy Sivakumar A microscopic analysis of TCP performance over wireless ad-hoc networks . . . . . . . . . . . . . . . . 270--271 Baek-Young Choi and Jaesung Park and Zhi-Li Zhang Adaptive random sampling for load change detection . . . . . . . . . . . . . . . 272--273 Zhili Zhao and Jayesh Ametha and Swaroop Darbha and A. L. Narasimha Reddy A method for estimating non-responsive traffic at a router . . . . . . . . . . 274--275 Liang Guo and Ibrahim Matta Scheduling flows with unknown sizes: approximate analysis . . . . . . . . . . 276--277 Sara Alouf and Fabrice Huet and Philippe Nain Forwarders vs. centralized server: an evaluation of two approaches for locating mobile agents . . . . . . . . . 278--279 Hyunseok Chang and Ramesh Govindan and Sugih Jamin and Scott J. Shenker and Walter Willinger Towards capturing representative AS-level Internet topologies . . . . . . 280--281 Nevil Brownlee and kc claffy Internet stream size distributions . . . 282--283 Yingwu Zhu and Yiming Hu Can large disk built-in caches really improve system performance? . . . . . . 284--285 Rob Simmonds and Carey Williamson and Russell Bradford and Martin Arlitt and Brian Unger Web server benchmarking using parallel WAN emulation . . . . . . . . . . . . . 286--287
Virgilio Almeida and Martin Arlitt and Jerry Rolia Analyzing a Web-based system's performance measures at multiple time scales . . . . . . . . . . . . . . . . . 3--9 Mauro Andreolini and Michele Colajanni and Ruggero Morselli Performance study of dispatching algorithms in multi-tier Web architectures . . . . . . . . . . . . . 10--20 Yan Chen and Khian Hao Lim and Randy H. Katz and Chris Overton On the stability of network distance estimation . . . . . . . . . . . . . . . 21--30 Alexander Thomasian and Chang Liu Disk scheduling policies with lookahead 31--40 Alexandre Brandwajn A note on SCSI bus waits . . . . . . . . 41--47 Daniel A. Menascé and Lavanya Kanchanapalli Probabilistic scalable P2P resource location services . . . . . . . . . . . 48--58
Mark S. Squillante Special issue on the Workshop on MAthematical performance Modeling and Analysis (MAMA 2002) . . . . . . . . . . 2--2 Shengke Yu and Marianne Winslett and Jonghyun Lee and Xiaosong Ma Automatic and portable performance modeling for parallel I/O: a machine-learning approach . . . . . . . 3--5 Alma Riska and Vesselin Diev and Evgenia Smirni Efficient fitting of long-tailed data sets into phase-type distributions . . . 6--8 Mor Harchol-Balter and Karl Sigman and Adam Wierman Understanding the slowdown of large jobs in an M/GI/1 system . . . . . . . . . . 9--11 Leana Golubchik and John C. S. Lui Multi-path streaming: is it worth the trouble? . . . . . . . . . . . . . . . . 12--14 Y. Baryshnikov and E. Coffman and P. Jelenkovi\'c and P. Mom\vcilovi\'c and D. Rubenstein Flood search under the California split strategy . . . . . . . . . . . . . . . . 15--16 Vladimir Marbukh Robust traffic engineering: game theoretic perspective . . . . . . . . . 17--19 H. Benaboud and A. Berqia and N. Mikou An analytical study of CANIT algorithm in TCP protocol . . . . . . . . . . . . 20--22 Ahmed E. Kamal Modeling TCP Reno with RED-based routers 23--25 Charalampos (Babis) Samios and Mary K. Vernon Modeling throughput in TCP Vegas . . . . 26--28 Y. Chandramouli and Arnold L. Neidhardt Mathematical analysis of the use of application-level traffic measurements for capacity engineering . . . . . . . . 29--31 Cathy H. Xia and Zhen Liu and Mark S. Squillante and Li Zhang and Naceur Malouch Traffic modeling and performance analysis of commercial Web sites . . . . 32--34 Peter J. Haas and Peter W. Glynn On the validity of long-run estimation methods for discrete-event systems . . . 35--37 David Gamarnik Computing stationary probability distributions and large deviation rates for constrained random walks: the undecidability results . . . . . . . . . 38--40 Peter G. Harrison Product-forms from a CAT and DOG . . . . 41--43
Mark Allman An evaluation of XML-RPC . . . . . . . . 2--11 Jon Weissman Guest editorial: special issue on grid computing . . . . . . . . . . . . . . . 12--12 Valerie Taylor and Xingfu Wu and Rick Stevens Prophesy: an infrastructure for performance analysis and modeling of parallel and Grid applications . . . . . 13--18 Bruce B. Lowekamp Combining active and passive network measurements to build scalable monitoring systems on the Grid . . . . . 19--26 Allan Snavely and Greg Chun and Henri Casanova and Rob F. Van der Wijngaart and Michael A. Frumkin Benchmarks for Grid computing: a review of ongoing efforts and future directions 27--32 Dong Lu and Peter A. Dinda GridG: generating realistic computational grids . . . . . . . . . . 33--40 Rich Wolski Experiences with predicting resource performance on-line in computational grid settings . . . . . . . . . . . . . 41--49
Sylvain Girbal and Gilles Mouchard and Albert Cohen and Olivier Temam DiST: a simple, reliable and scalable method to significantly reduce processor architecture simulation time . . . . . . 1--12 Tor M. Aamodt and Pedro Marcuello and Paul Chow and Antonio González and Per Hammarlund and Hong Wang and John P. Shen A framework for modeling and optimization of prescient instruction prefetch . . . . . . . . . . . . . . . . 13--24 Cathy H. Xia and Zhen Liu Queueing systems with long-range dependent input process and subexponential service times . . . . . . 25--36 Sebasti\`a Galmés and Ramon Puigjaner An algorithm for computing the mean response time of a single server queue with generalized on/off traffic arrivals 37--46 Michele Garetto and Don Towsley Modeling, simulation and measurements of queuing delay under long-tail Internet traffic . . . . . . . . . . . . . . . . 47--57 Stephan Bohacek and João P. Hespanha and Junsoo Lee and Katia Obraczka A hybrid systems modeling framework for fast and accurate simulation of data communication networks . . . . . . . . . 58--69 Charalampos (Babis) Samios and Mary K. Vernon Modeling the throughput of TCP Vegas . . 71--81 Jiantao Wang and Ao Tang and Steven H. Low Maximum and asymptotic UDP throughput under CHOKe . . . . . . . . . . . . . . 82--90 Yong Liu and Francesco Lo Presti and Vishal Misra and Don Towsley and Yu Gu Fluid models and solutions for large-scale IP networks . . . . . . . . 91--101
P. G. Harrison G-networks with propagating resets via RCAT . . . . . . . . . . . . . . . . . . 3--5 Adam Wierman and Takayuki Osogami and Jörgen Olsén Modeling TCP-Vegas under on/off traffic 6--8 David Gamarnik and John Hasenbein Weak instability in stochastic and fluid queueing networks . . . . . . . . . . . 9--10 Flávio P. Duarte and Edmundo de Souza e Silva and Don Towsley An adaptive FEC algorithm using hidden Markov chains . . . . . . . . . . . . . 11--13 Lachlan L. H. Andrew and Yuliy Baryshnikov and E. G. Coffman and Stephen V. Hanly and Jolyon White An asymptotically optimal greedy algorithm for large optical burst switching systems . . . . . . . . . . . 14--16 Vladimir Marbukh Towards mean field theory of wireless networks . . . . . . . . . . . . . . . . 17--19 Sum Lam and Rocky K. C. Chang Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks . . . . . . . . . . . 20--22 Richard T. B. Ma and C. M. Lee and John C. S. Lui and David K. Y. Yau Incentive P2P networks: a protocol to encourage information sharing and contribution . . . . . . . . . . . . . . 23--25 Eitan Bachmat On the performance of D-redundant storage systems . . . . . . . . . . . . 26--27 Alma Riska and Evgenia Smirni and Gianfranco Ciardo An aggregation-based method for the exact analysis of a class of GI/G/1-type processes . . . . . . . . . . . . . . . 28--30 Wuqin Lin and Zhen Liu and Harry Stavropoulos and Cathy H. Xia Hard deadline queueing system with application to unified messaging service 31--33 Nikhil Bansal On the average sojourn time under M/M/1/SRPT . . . . . . . . . . . . . . . 34--35 Hanhua Feng and Vishal Misra Mixed scheduling disciplines for network flows . . . . . . . . . . . . . . . . . 36--39 Soumyadip Ghosh and Mark S. Squillante Revisiting correlations and scheduling in Web servers . . . . . . . . . . . . . 40--42
Lance Titchkosky and Martin Arlitt and Carey Williamson A performance comparison of dynamic Web technologies . . . . . . . . . . . . . . 2--11 Mark Allman and Wesley M. Eddy and Shawn Ostermann Estimating loss rates with TCP . . . . . 12--24 John R. Douceur Is remote host availability governed by a universal law? . . . . . . . . . . . . 25--29 Paul Brebner and Jeffrey Gosper J2EE infrastructure scalability and throughput estimation . . . . . . . . . 30--36 Jike Cui and Mansur. H. Samadzadeh A new hybrid approach to exploit localities: LRFU with adaptive prefetching . . . . . . . . . . . . . . 37--43
Doug Burger and Anand Sivasubramaniam Tools for computer architecture research 2--3 Doug Burger and Todd M. Austin and Stephen W. Keckler Recent extensions to the SimpleScalar Tool suite . . . . . . . . . . . . . . . 4--7 Patrick Bohrer and James Peterson and Mootaz Elnozahy and Ram Rajamony and Ahmed Gheith and Ron Rockhold and Charles Lefurgy and Hazim Shafi and Tarun Nakra and Rick Simpson and Evan Speight and Kartik Sudeep and Eric Van Hensbergen and Lixin Zhang Mambo: a full system simulator for the PowerPC architecture . . . . . . . . . . 8--12 David Brooks and Pradip Bose and Margaret Martonosi Power-performance simulation: design and validation strategies . . . . . . . . . 13--18 Manish Vachharajani and Neil Vachharajani and David A. Penry and Jason A. Blome and David I. August The Liberty Simulation Environment, version 1.0 . . . . . . . . . . . . . . 19--24 Greg Hamerly and Erez Perelman and Brad Calder How to use SimPoint to pick simulation points . . . . . . . . . . . . . . . . . 25--30 Nikolaos Hardavellas and Stephen Somogyi and Thomas F. Wenisch and Roland E. Wunderlich and Shelley Chen and Jangwoo Kim and Babak Falsafi and James C. Hoe and Andreas G. Nowatzyk SimFlex: a fast, accurate, flexible full-system simulation framework for performance evaluation of server architecture . . . . . . . . . . . . . . 31--34
Debasis Mitra Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management . . . . . . . 1--1 Gabriel Marin and John Mellor-Crummey Cross-architecture performance predictions for scientific applications using parameterized models . . . . . . . 2--13 Lan Huang and Gang Peng and Tzi-cker Chiueh Multi-dimensional storage virtualization 14--24 Stephen M. Blackburn and Perry Cheng and Kathryn S. McKinley Myths and realities: the performance impact of garbage collection . . . . . . 25--36 Wei Jin and Jeffrey S. Chase and Jasleen Kaur Interposed proportional sharing for a storage service utility . . . . . . . . 37--48 Augustin Soule and Kavé Salamatia and Nina Taft and Richard Emilion and Konstantina Papagiannaki Flow classification by histograms: or how to go on safari in the Internet . . 49--60 Anukool Lakhina and Konstantina Papagiannaki and Mark Crovella and Christophe Diot and Eric D. Kolaczyk and Nina Taft Structural analysis of network traffic flows . . . . . . . . . . . . . . . . . 61--72 Augustin Soule and Antonio Nucci and Rene Cruz and Emilio Leonardi and Nina Taft How to identify and estimate the largest traffic matrix elements in a dynamic environment . . . . . . . . . . . . . . 73--84 Nick Duffield and Carsten Lund and Mikkel Thorup Flow sampling under hard resource constraints . . . . . . . . . . . . . . 85--96 Samuli Aalto and Urtzi Ayesta and Eeva Nyberg-Oksanen Two-level processor-sharing scheduling disciplines: mean delay analysis . . . . 97--105 Idris A. Rai and Guillaume Urvoy-Keller and Mary K. Vernon and Ernst W. Biersack Performance analysis of LAS-based scheduling disciplines in a packet switched network . . . . . . . . . . . . 106--117 Peter Key and Laurent Massoulié and Bing Wang Emulating low-priority transport at the application layer: a background transfer service . . . . . . . . . . . . . . . . 118--129 David Raz and Hanoch Levy and Benjamin Avi-Itzhak A resource-allocation queueing fairness measure . . . . . . . . . . . . . . . . 130--141 Vern Paxson Measuring adversaries . . . . . . . . . 142--142 Hwangnam Kim and Jennifer C. Hou A fast simulation framework for IEEE 802.11-operated wireless LANs . . . . . 143--154 Fang Hao and Murali Kodialam and T. V. Lakshman ACCEL-RATE: a faster mechanism for memory efficient per-flow traffic estimation . . . . . . . . . . . . . . . 155--166 Martin Burtscher VPC3: a fast and effective trace-compression algorithm . . . . . . 167--176 Abhishek Kumar and Minho Sung and Jun (Jim) Xu and Jia Wang Data streaming algorithms for efficient and accurate estimation of flow size distribution . . . . . . . . . . . . . . 177--188 Richard T. B. Ma and Sam C. M. Lee and John C. S. Lui and David K. Y. Yau A game theoretic approach to provide incentive and service differentiation in P2P networks . . . . . . . . . . . . . . 189--198 Simon S. Lam and Huaiyu Liu Failure recovery for structured P2P networks: protocol design and performance evaluation . . . . . . . . . 199--210 Xiaoming Wang and Yueping Zhang and Xiafeng Li and Dmitri Loguinov On zone-balancing of peer-to-peer networks: analysis of random node join 211--222 Aman Kansal and Dunny Potter and Mani B. Srivastava Performance aware tasking for environmentally powered sensor networks 223--234 Thomas Bonald and Alexandre Prouti\`ere On performance bounds for the integration of elastic and adaptive streaming flows . . . . . . . . . . . . 235--245 Supratim Deb and R. Srikant Rate-based versus queue-based models of congestion control . . . . . . . . . . . 246--257 Kartikeya Chandrayana and Shivkumar Kalyanaraman Uncooperative congestion control . . . . 258--269 David Applegate and Lee Breslau and Edith Cohen Coping with network failures: routing strategies for optimal demand oblivious restoration . . . . . . . . . . . . . . 270--281 Kenneth C. Sevcik Some systems, applications and models I have known . . . . . . . . . . . . . . . 282--282 Peerapol Tinnakornsrisuphap and Richard J. La Characterization of queue fluctuations in probabilistic AQM mechanisms . . . . 283--294 Sarut Vanichpun and Armand M. Makowski The output of a cache under the independent reference model: where did the locality of reference go? . . . . . 295--306 Renata Teixeira and Aman Shaikh and Tim Griffin and Jennifer Rexford Dynamics of hot-potato routing in IP networks . . . . . . . . . . . . . . . . 307--319 Sharad Agarwal and Chen-Nee Chuah and Supratik Bhattacharyya and Christophe Diot The impact of BGP dynamics on intra-domain traffic . . . . . . . . . . 319--330 Nick Feamster and Jared Winick and Jennifer Rexford A model of BGP routing for network engineering . . . . . . . . . . . . . . 331--342 François Baccelli and Augustin Chaintreau and Danny De Vleeschauwer and David McDonald A mean-field analysis of short lived interacting TCP flows . . . . . . . . . 343--354 N. Hohn and D. Veitch and K. Papagiannaki and C. Diot Bridging router performance and queuing theory . . . . . . . . . . . . . . . . . 355--366 T. Bonald and M. Jonckheere and A. Proutiére Insensitive load balancing . . . . . . . 367--377 T. Bonald and S. Borst and N. Hegde and A. Proutiére Wireless data performance in multi-cell scenarios . . . . . . . . . . . . . . . 378--380 Rohit Kapoor and Ling-Jyh Chen and Alok Nandan and Mario Gerla and M. Y. Sanadidi CapProbe: a simple and accurate capacity estimation technique for wired and wireless environments . . . . . . . . . 390--391 Joel Sommers and Hyungsuk Kim and Paul Barford Harpoon: a flow-level traffic generator for router and network tests . . . . . . 392--392 Vinay J. Ribeiro and Rudolf H. Riedi and Richard G. Baraniuk Spatio-temporal available bandwidth estimation with STAB . . . . . . . . . . 394--395 Raj Kumar Rajendran and Dan Rubenstein Optimizing the quality of scalable video streams on P2P networks . . . . . . . . 396--397 Helen J. Wang and John Platt and Yu Chen and Ruyun Zhang and Yi-Min Wang PeerPressure for automatic troubleshooting . . . . . . . . . . . . 398--399 Jörg Hähner and Dominique Dudkowski and Pedro José Marrón and Kurt Rothermel A quantitative analysis of partitioning in mobile ad hoc networks . . . . . . . 400--401 Dalu Zhang and Weili Huang and Chen Lin Locating the tightest link of a network path . . . . . . . . . . . . . . . . . . 402--403 David G. Sullivan and Margo I. Seltzer and Avi Pfeffer Using probabilistic reasoning to automate software tuning . . . . . . . . 404--405 Bing Wang and Jim Kurose and Prashant Shenoy and Don Towsley Multimedia streaming via TCP: an analytic performance study . . . . . . . 406--407 Laura Wynter and Cathy H. Xia and Fan Zhang Parameter inference of queueing models for IT systems using end-to-end measurements . . . . . . . . . . . . . . 408--409 Ben Pfaff Performance analysis of BSTs in system software . . . . . . . . . . . . . . . . 410--411 Mengzhi Wang and Kinman Au and Anastassia Ailamaki and Anthony Brockwell and Christos Faloutsos and Gregory R. Ganger Storage device performance prediction with CART models . . . . . . . . . . . . 412--413 Abhinav Kamra and Vishal Misra and Erich Nahum Controlling the performance of 3-tiered Web sites: modeling, design and implementation . . . . . . . . . . . . . 414--415 Matthew Roughan and Tim Griffin and Morley Mao and Albert Greenberg and Brian Freeman Combining routing and traffic data for detection of IP forwarding anomalies . . 416--417 Shu Tao and Kuai Xu and Ying Xu and Teng Fei and Lixin Gao and Roch Guerin and Jim Kurose and Don Towsley and Zhi-Li Zhang Exploring the performance benefits of end-to-end path switching . . . . . . . 418--419 Scott F. Kaplan Complete or fast reference trace collection for simulating multiprogrammed workloads: choose one 420--421 Satish Raghunath and Shivkumar Kalyanaraman and K. K. Ramakrishnan Quantifying trade-offs in resource allocation for VPNs . . . . . . . . . . 422--423 Yaoping Ruan and Vivek S. Pai The origins of network server latency & the myth of connection scheduling . . . 424--425 K. G. Anagnostakis and M. B. Greenwald A hybrid direct-indirect estimator of network internal delays . . . . . . . . 426--427 Niklas Carlsson and Derek L. Eager and Mary K. Vernon Multicast protocols for scalable on-demand download . . . . . . . . . . . 428--429 Vijay S. Pai and Scott Rixner and Hyong-youb Kim Isolating the performance impacts of network interface cards through microbenchmarks . . . . . . . . . . . . 430--431 Jacky Chu and Kevin Labonte and Brian Neil Levine An evaluation of Chord using traces of peer-to-peer file sharing . . . . . . . 432--433
Mark S. Squillante Guest Editor's foreword . . . . . . . . 2--2 Takayuki Osogami and Adam Wierman and Mor Harchol-Balter and Alan Scheller-Wolf A recursive analysis technique for multi-dimensionally infinite Markov chains . . . . . . . . . . . . . . . . . 3--5 Ana Paula Couto da Silva and Rosa M. M. Leäo and Edmundo de Souza e Silva An efficient approximate technique for solving fluid models . . . . . . . . . . 6--8 Yaakov Kogan and Gagan Choudhury Two problems in Internet reliability: new questions for old models . . . . . . 9--11 Adam Wierman and Mor Harchol-Balter Formalizing SMART scheduling . . . . . . 12--13 David Raz and Benjamin Avi-Itzhak and Hanoch Levy How fair is queue prioritization? . . . 14--16 Hanhua Feng and Vishal Misra On the relationship between coefficient of variation and the performance of M/G/1-FB queues . . . . . . . . . . . . 17--19 Junxia Chang and Hayriye Ayhan and Jim Dai Dynamic scheduling of multiclass open queueing networks in a slowly changing environment . . . . . . . . . . . . . . 20--21 Vladimir Marbukh A knowledge plane as a pricing mechanism for aggregate, user-centric utility maximization . . . . . . . . . . . . . . 22--24 Wuqin Lin and Zhen Liu and Cathy H. Xia and Li Zhang Cost minimization of multi-tiered e-business infrastructure with end-to-end delay guarantees . . . . . . 25--27 Micah Adler and Rakesh Kumar and Keith Ross and Dan Rubenstein and David Turner and David D. Yao Two optimal peer selection problems . . 28--30 E. G. Coffman and Andreas Constantinides and Dan Rubenstein and Bruce Shepherd and Angelos Stavrou Content distribution for seamless transmission . . . . . . . . . . . . . . 31--32 David Gamarnik and Petar Mom\vcilovi\'c An asymptotic optimality of the transposition rule for linear lists . . 33--34 Yuliy Baryshnikov and Ed Coffman and Petar Mom\vcilovi\'c Self assembly times in DNA-based computation . . . . . . . . . . . . . . 35--37 Iraj Saniee and Indra Widjaja and John Morrison Performance of a distributed scheduling protocol for TWIN . . . . . . . . . . . 38--40 René Bekker and Sem Borst and Rudesindo Néñez-Queija Integration of TCP-friendly streaming sessions and heavy-tailed elastic flows 41--43 Gijs van Kessel and Rudesindo Núñez-Queija and Sem Borst Asymptotic regimes and approximations for discriminatory processor sharing . . 44--46 Yi Cui and Yuan Xue and Klara Nahrstedt Optimal distributed multicast routing using network coding: theory and applications . . . . . . . . . . . . . . 47--49 Xuan Li and David D. Yao Control and pricing in stochastic networks with concurrent resource occupancy . . . . . . . . . . . . . . . 50--52 Xin Guo and Yingdong Lu and Mark S. Squillante Optimal probabilistic routing in distributed parallel queues . . . . . . 53--54
Humberto T. Marques Neto and Jussara M. Almeida and Leonardo C. D. Rocha and Wagner Meira and Pedro H. C. Guerra and Virgilio A. F. Almeida A characterization of broadband user behavior and their e-business activities 3--13 Mauro Andreolini and Michele Colajanni and Riccardo Lancellotti and Francesca Mazzoni Fine grain performance evaluation of e-commerce sites . . . . . . . . . . . . 14--23 Monchai Sopitkamol Ranking configuration parameters in multi-tiered e-commerce sites . . . . . 24--33 S. D'Antonio and M. Esposito and S. P. Romano and G. Ventre Assessing the scalability of component-based frameworks: the CADENUS case study . . . . . . . . . . . . . . . 34--43 Tao Ye and Shivkumar Kalyanaraman A recursive random search algorithm for network parameter optimization . . . . . 44--53
Boudewijn R. Haverkort and Joost-Pieter Katoen Performance and verification . . . . . . 3--3 Gianfranco Ciardo and Andrew S. Miner Implicit data structures for logic and stochastic systems analysis . . . . . . 4--9 Christel Baier and Boudewijn R. Haverkort and Holger Hermanns and Joost-Pieter Katoen Model checking meets performance evaluation . . . . . . . . . . . . . . . 10--15 Marta Kwiatkowska and Gethin Norman and David Parker Probabilistic model checking in practice: case studies with PRISM . . . 16--21 Christel Baier and Frank Ciesinski and Marcus Größer ProbMela and verification of Markov decision processes . . . . . . . . . . . 22--27 David N. Jansen and Holger Hermanns QoS modelling and analysis with UML statecharts: the StoCharts approach . . 28--33 Gerd Behrmann and Kim G. Larsen and Jacob I. Rasmussen Optimal scheduling using priced timed automata . . . . . . . . . . . . . . . . 34--40 Annabelle McIver and Carroll Morgan Abstraction and refinement in probabilistic systems . . . . . . . . . 41--47
Urs Hoelzle Google: or how I learned to love terabytes . . . . . . . . . . . . . . . 1--1 Laurent Massoulié and Milan Vojnovi\'C Coupon replication systems . . . . . . . 2--13 Chunqiang Tang and Melissa J. Buco and Rong N. Chang and Sandhya Dwarkadas and Laura Z. Luan and Edward So and Christopher Ward Low traffic overlay networks with large routing tables . . . . . . . . . . . . . 14--25 Derek Leonard and Vivek Rai and Dmitri Loguinov On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks . . . . . . . . . 26--37 D. Dumitriu and E. Knightly and A. Kuzmanovic and I. Stoica and W. Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems . . . 38--49 Andrew W. Moore and Denis Zuev Internet traffic classification using Bayesian analysis techniques . . . . . . 50--60 Abhishek Kumar and Minho Sung and Jun (Jim) Xu and Ellen W. Zegura A data streaming algorithm for estimating subpopulation flow size distribution . . . . . . . . . . . . . . 61--72 Edith Cohen and Carsten Lund Packet classification in large ISPs: design and evaluation of decision tree classifiers . . . . . . . . . . . . . . 73--84 Ken Keys and David Moore and Cristian Estan A robust system for accurate real-time summaries of Internet traffic . . . . . 85--96 Sunwoong Choi and Kihong Park and Chong-kwon Kim On the performance characteristics of WLANs: revisited . . . . . . . . . . . . 97--108 Venkatesh Ramaiyan and Anurag Kumar and Eitan Altman Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness, multistability and throughput differentiation . . . . . . . . . . . . 109--120 Christoph Lindemann and Oliver P. Waldhorst Modeling epidemic information dissemination on mobile devices with finite buffers . . . . . . . . . . . . . 121--132 V. S. Anil Kumar and Madhav V. Marathe and Srinivasan Parthasarathy and Aravind Srinivasan Algorithmic aspects of capacity in wireless networks . . . . . . . . . . . 133--144 Zhifeng Chen and Yan Zhang and Yuanyuan Zhou and Heidi Scott and Berni Schiefer Empirical evaluation of multi-level buffer cache collaboration for storage systems . . . . . . . . . . . . . . . . 145--156 Ali R. Butt and Chris Gniady and Y. Charlie Hu The performance impact of kernel prefetching on buffer cache replacement algorithms . . . . . . . . . . . . . . . 157--168 Erik Berg and Erik Hagersten Fast data-locality profiling of native execution . . . . . . . . . . . . . . . 169--180 Kamen Yotov and Keshav Pingali and Paul Stodghill Automatic measurement of memory hierarchy parameters . . . . . . . . . . 181--192 M. Jonckheere and J. Virtamo Optimal insensitive routing and bandwidth sharing in simple data networks . . . . . . . . . . . . . . . . 193--204 Adam Wierman and Mor Harchol-Balter and Takayuki Osogami Nearly insensitive bounds on SMART scheduling . . . . . . . . . . . . . . . 205--216 A. Kortebi and L. Muscariello and S. Oueslati and J. Roberts Evaluating the number of active flows in a scheduler realizing fair statistical bandwidth sharing . . . . . . . . . . . 217--228 Adam Wierman and Mor Harchol-Balter Classifying scheduling policies with respect to higher moments of conditional response time . . . . . . . . . . . . . 229--240 Hao Jiang and Constantinos Dovrolis Why is the Internet traffic bursty in short time scales? . . . . . . . . . . . 241--252 Matthew Roughan Fundamental bounds on the accuracy of network performance measurements . . . . 253--264 Manish Jain and Constantinos Dovrolis End-to-end estimation of the available bandwidth variation range . . . . . . . 265--276 Mung Chiang and J. W. Lee and R. Calderbank and D. Palomar and M. Fazel Network utility maximization with nonconcave, coupled, and reliability-based utilities . . . . . . 277--277 Mung Chiang and Steven Low Optimization and Control of Communication Networks . . . . . . . . . 277--277 Steven Low and J. Doyle and L. Li and A. Tang and J. Wang Optimization model of Internet protocols 277--277 Debasis Mitra Joint pricing-network design and stochastic traffic engineering to manage demand uncertainty . . . . . . . . . . . 278--278 John Musacchio and Jean Walrand Achieving fair rates with ingress policing . . . . . . . . . . . . . . . . 278--278 Ness Shroff and Xiaojun Lin An optimization based approach for cross-layer design in wireless communication networks . . . . . . . . . 278--278 Florin Ciucu and Almut Burchard and Jörg Liebeherr A network service curve approach for the stochastic analysis of networks . . . . 279--290 Bhuvan Urgaonkar and Giovanni Pacifici and Prashant Shenoy and Mike Spreitzer and Asser Tantawi An analytical model for multi-tier Internet services and its applications 291--302 Yiyu Chen and Amitayu Das and Wubi Qin and Anand Sivasubramaniam and Qian Wang and Natarajan Gautam Managing server energy and operational costs in hosting centers . . . . . . . . 303--314 Yaoping Ruan and Vivek S. Pai and Erich Nahum and John M. Tracey Evaluating the impact of simultaneous multithreading on network servers using real hardware . . . . . . . . . . . . . 315--326 Benoit Donnet and Philippe Raoult and Timur Friedman and Mark Crovella Efficient algorithms for large-scale topology discovery . . . . . . . . . . . 327--338 Z. Morley Mao and Lili Qiu and Jia Wang and Yin Zhang On AS-level path inference . . . . . . . 339--349 Qi (George) Zhao and Abhishek Kumar and Jia Wang and Jun (Jim) Xu Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices . . . . . . . . . . . . . 350--361 Augustin Soule and Anukool Lakhina and Nina Taft and Konstantina Papagiannaki and Kave Salamatian and Antonio Nucci and Mark Crovella and Christophe Diot Traffic matrices: balancing measurements, inference and modeling . . 362--373 Saurabh Ganeriwal and Deepak Ganesanl and Mark Hansen and Mani B. Srivastava and Deborah Estrin Rate-adaptive time synchronization for long-lived sensor networks . . . . . . . 374--375 An-I A. Wang and Peter Reiher and Geoff Kuenning Introducing permuted states for analyzing conflict rates in optimistic replication . . . . . . . . . . . . . . 376--377 James W. Mickens and Brian D. Noble Predicting node availability in peer-to-peer networks . . . . . . . . . 378--379 Lili Qiu and Paramvir Bahl and Ananth Rao and Lidong Zhou Troubleshooting multihop wireless networks . . . . . . . . . . . . . . . . 380--381 David Raz and Benjamin Avi-Itzhak and Hanoch Levy Fair operation of multi-server and multi-queue systems . . . . . . . . . . 382--383 Eric Anderson and Dirk Beyer and Kamalika Chaudhuri and Terence Kelly and Norman Salazar and Cipriano Santos and Ram Swaminathan and Robert Tarjan and Janet Wiener and Yunhong Zhou Deadline scheduling for animation rendering . . . . . . . . . . . . . . . 384--385 Simin He and Shutao Sun and Wei Zhao and Yanfeng Zheng and Wen Gao Smooth switching problem in buffered crossbar switches . . . . . . . . . . . 386--387 Qi He and Constantinos Dovrolis and Mostafa Ammar Prediction of TCP throughput: formula-based and history-based methods 388--389 David Chua and Eric D. Kolaczyk and Mark Crovella A statistical framework for efficient monitoring of end-to-end network properties . . . . . . . . . . . . . . . 390--391 Ningning Zhu and Jiawu Chen and Tzi-cker Chiueh and Daniel Ellard TBBT: scalable and accurate trace replay for file server evaluation . . . . . . . 392--393 Sandeep Sarat and Vasileios Pappas and Andreas Terzis On the use of anycast in DNS . . . . . . 394--395 Jayaram Mudigonda and Harrick M. Vin and Raj Yavatkar Managing memory access latency in packet processing . . . . . . . . . . . . . . . 396--397 Ashwin R. Bharambe and Cormac Herley and Venkata N. Padmanabhan Some observations on BitTorrent performance . . . . . . . . . . . . . . 398--399 Sridhar Machiraju and Darryl Veitch and François Baccelli and Antonio Nucci and Jean C. Bolot Theory and practice of cross-traffic estimation . . . . . . . . . . . . . . . 400--401 Daniel Stutzbach and Reza Rejaie Characterizing the two-tier Gnutella topology . . . . . . . . . . . . . . . . 402--403 Saurabh Tewari and Leonard Kleinrock Analysis of search and replication in unstructured peer-to-peer networks . . . 404--405 Jianyong Zhang and Anand Sivasubramaniam and Alma Riska and Qian Wang and Erik Riedel An interposed 2-Level I/O scheduling framework for performance virtualization 406--407 Thomas F. Wenisch and Roland E. Wunderlich and Babak Falsafi and James C. Hoe TurboSMARTS: accurate microarchitecture simulation sampling in minutes . . . . . 408--409 Chunyu Hu and Jennifer C. Hou A reactive channel model for expediting wireless network simulation . . . . . . 410--411 Robin Groenevelt and Philippe Nain and Ger Koole Message delay in MANET . . . . . . . . . 412--413
Mark S. Squillante Special issue on the workshop on MAthematical performance Modeling And Analysis (MAMA 2005): Guest Editor's foreword . . . . . . . . . . . . . . . . 2--2 Giovanna Carofiglio and Rossano Gaeta and Michele Garetto and Paolo Giaccone and Emilio Leonardi and Matteo Sereno A statistical physics approach for modelling P2P systems . . . . . . . . . 3--5 Ananth I. Sundararaj and Manan Sanghi and John R. Lange and Peter A. Dinda An optimization problem in adaptive virtual environments . . . . . . . . . . 6--8 David M. Nicol Optimized pre-copy calibration of hard drives . . . . . . . . . . . . . . . . . 9--11 J. Kumaran and K. Mitchell and A. van de Liefvoort A spectral approach to compute performance measures in a correlated single server queue . . . . . . . . . . 12--14 Pierre M. Fiorini and Robert Sheahan and Lester Lipsky On unreliable computing systems when heavy-tails appear as a result of the recovery procedure . . . . . . . . . . . 15--17 Qi Zhang and Armin Heindl and Evgenia Smirni Models of the departure process of a BMAP/MAP/1 queue . . . . . . . . . . . . 18--20 Krishna K. Ramachandran and Biplab Sikdar A population based approach to model network lifetime in wireless sensor networks . . . . . . . . . . . . . . . . 21--23 Abhinav Kamra and Jon Feldman and Vishal Misra and Dan Rubenstein Data persistence in sensor networks: towards optimal encoding for data recovery in partial network failures . . 24--26 Wenjie Jiang and John C. S. Lui and Dah-Ming Chiu Interaction of overlay networks: properties and implications . . . . . . 27--29 Richard T. B. Ma and Vishal Misra and Dan Rubenstein Cooperative and non-cooperative models for slotted-Aloha type MAC protocols . . 30--32 Michele Covell and Sumit Roy and Beomjoo Seo Predictive modeling of streaming servers 33--35 Mor Harchol-Balter and Takayuki Osogami and Alan Scheller-Wolf Robustness of threshold policies in beneficiary-donor model . . . . . . . . 36--38 David Raz and Benjamin Avi-Itzhak and Hanoch Levy Locality of reference and the use of sojourn time variance for measuring queue unfairness: extended abstract . . 39--41 Yingdong Lu and Mark S. Squillante Dynamic scheduling to optimize utility functions of sojourn time moments in queueing systems . . . . . . . . . . . . 42--44
Konstantina Papagiannaki and Yin Zhang Guest Editor's foreword . . . . . . . . 2--2 Y. Chandramouli and Arnold Neidhardt Analysis of network congestion inference techniques . . . . . . . . . . . . . . . 3--9 Hal Burch and Chris Chase Monitoring link delays with one measurement host . . . . . . . . . . . . 10--17 Baek-Young Choi and Supratik Bhattacharyya Observations on Cisco sampled NetFlow 18--23 Augustin Soule and Kavé Salamatian and Antonio Nucci and Nina Taft Traffic matrix tracking using Kalman filters . . . . . . . . . . . . . . . . 24--31 Ryan Lance and Ian Frommer Round-trip time inference via passive monitoring . . . . . . . . . . . . . . . 32--38 Earl Lawrence and George Michailidis and Vijay N. Nair Local area network analysis using end-to-end delay tomography . . . . . . 39--45 Wenhong Tian The transient analysis of loss networks 46--50 Daniel Fiedler and Kristen Walcott and Thomas Richardson and Gregory M. Kapfhammer and Ahmed Amer and Panos K. Chrysanthis Towards the measurement of tuple space performance . . . . . . . . . . . . . . 51--62
Alma Riska and Erik Riedel Guest Editor's foreword: bigger and faster and smaller . . . . . . . . . . . 2--3 Kimberly Keeton and Arif Merchant Challenges in managing dependable data systems . . . . . . . . . . . . . . . . 4--10 Jianyong Zhang and Prasenjit Sarkar and Anand Sivasubramaniam Achieving completion time guarantees in an opportunistic data migration scheme 11--16 Alexander Thomasian Multi-level RAID for very large disk arrays . . . . . . . . . . . . . . . . . 17--22 Michael Mesnier and Matthew Wachs and Brandon Salmon and Gregory R. Ganger Relative fitness models for storage . . 23--28 Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau and Lakshmi N. Bairavasundaram and Timothy E. Denehy and Florentina I. Popovici and Vijayan Prabhakaran and Muthian Sivathanu Semantically-smart disk systems: past, present, and future . . . . . . . . . . 29--35 Eitan Bachmat and Vladimir Braverman Batched disk scheduling with delays . . 36--41 Saman Zarandioon and Alexander Thomasian Optimization of online disk scheduling algorithms . . . . . . . . . . . . . . . 42--46
Daniel A. Reed Performance and reliability: the ubiquitous challenge . . . . . . . . . . 1--2 Eno Thereska and Brandon Salmon and John Strunk and Matthew Wachs and Michael Abd-El-Malek and Julio Lopez and Gregory R. Ganger Stardust: tracking activity in a distributed storage system . . . . . . . 3--14 Eduardo Pinheiro and Ricardo Bianchini and Cezary Dubnicki Exploiting redundancy to conserve energy in storage systems . . . . . . . . . . . 15--26 Eytan Modiano and Devavrat Shah and Gil Zussman Maximizing throughput in wireless networks via gossiping . . . . . . . . . 27--38 Yan Gao and Dah-Ming Chiu and John C. S. Lui Determining the end-to-end throughput capacity in multi-hop networks: methodology and applications . . . . . . 39--50 Can Emre Koksal and Kyle Jamieson and Emre Telatar and Patrick Thiran Impacts of channel variability on link-level throughput in wireless networks . . . . . . . . . . . . . . . . 51--62 Arunesh Mishra and Vivek Shrivastava and Suman Banerjee and William Arbaugh Partially overlapped channels not considered harmful . . . . . . . . . . . 63--74 P. Lieshout and M. Mandjes and S. Borst GPS scheduling: selection of optimal weights and comparison with strict priorities . . . . . . . . . . . . . . . 75--86 H. Christian Gromoll and Philippe Robert and Bert Zwart and Richard Bakker The impact of reneging in processor sharing queues . . . . . . . . . . . . . 87--96 Chang-Woo Yang and Adam Wierman and Sanjay Shakkottai and Mor Harchol-Balter Tail asymptotics for policies favoring short jobs in a many-flows regime . . . 97--108 Thomas Bonald and Aleksi Penttinen and Jorma Virtamo On light and heavy traffic approximations of balanced fairness . . 109--120 Han Hee Song and Lili Qiu and Yin Zhang NetQuest: a flexible framework for large-scale network measurement . . . . 121--132 Qi Zhao and Zihui Ge and Jia Wang and Jun Xu Robust traffic matrix estimation with imperfect information: making use of multiple data sources . . . . . . . . . 133--144 Ashwin Lall and Vyas Sekar and Mitsunori Ogihara and Jun Xu and Hui Zhang Data streaming algorithms for estimating entropy of network traffic . . . . . . . 145--156 Sanghwan Lee and Zhi-Li Zhang and Sambit Sahu and Debanjan Saha On suitability of Euclidean embedding of Internet hosts . . . . . . . . . . . . . 157--168 Giuliano Casale An efficient algorithm for the exact analysis of multiclass queueing networks with large population sizes . . . . . . 169--180 J. Van Velthoven and B. Van Houdt and C. Blondia Transient analysis of tree-like processes and its application to random access systems . . . . . . . . . . . . . 181--190 Peter Buchholz Bounding stationary results of Tandem networks with MAP input and PH service time distributions . . . . . . . . . . . 191--202 Varun Gupta and Mor Harchol-Balter and Alan Scheller Wolf and Uri Yechiali Fundamental characteristics of queues with fluctuating load . . . . . . . . . 203--215 Satish Narayanasamy and Cristiano Pereira and Harish Patil and Robert Cohn and Brad Calder Automatic logging of operating system effects to guide application-level architecture simulation . . . . . . . . 216--227 Fei Guo and Yan Solihin An analytical model for cache replacement policy performance . . . . . 228--239 David Olshefski and Jason Nieh Understanding the management of client perceived response time . . . . . . . . 240--251 Mikkel Thorup Confidence intervals for priority sampling . . . . . . . . . . . . . . . . 252--263 Takayuki Osogami and Toshinari Itoko Finding probably better system configurations quickly . . . . . . . . . 264--275 Thomas Bonald The Erlang model with non-Poisson call arrivals . . . . . . . . . . . . . . . . 276--286 Markus Fidler and Jens B. Schmitt On the way to a distributed systems calculus: an end-to-end network calculus with data scaling . . . . . . . . . . . 287--298 Enoch Peserico and Larry Rudolph Robust network connectivity: when it's the big picture that matters . . . . . . 299--310 Qunfeng Dong and Suman Banerjee and Jia Wang and Dheeraj Agrawal and Ashutosh Shukla Packet classifiers in ternary CAMs can be smaller . . . . . . . . . . . . . . . 311--322 Qi Zhao and Jun Xu and Zhen Liu Design of a novel statistics counter architecture with optimal space and time efficiency . . . . . . . . . . . . . . . 323--334 Rakesh Kumar and David D. Yao and Amitabha Bagchi and Keith W. Ross and Dan Rubenstein Fluid modeling of pollution proliferation in P2P networks . . . . . 335--346 Kang Li and Zhenyu Zhong Fast statistical spam filter by approximate classifications . . . . . . 347--358 George Kola and Mary K. Vernon QuickProbe: available bandwidth estimation in two roundtrips . . . . . . 359--360 Neena R. Kaushik and Silvia M. Figueira and Stephen A. Chiappari Flexible time-windows for advance reservation in LambdaGrids . . . . . . . 361--362 Chad Verbowski and Emre Kiciman and Brad Daniels and Yi-Min Wang and Roussi Roussev and Shan Lu and Juhan Lee Analyzing persistent state interactions to improve state management . . . . . . 363--364 Maaike Verloop and Rudesindo Núñez-Queija and Sem Borst Delay-optimal scheduling in bandwidth-sharing networks . . . . . . . 365--366 Michael Menth and Robert Henjes and Christian Zepfel and Sebastian Gehrsitz Throughput performance of popular JMS servers . . . . . . . . . . . . . . . . 367--368 Rahul Garg and Yogish Sabharwal Optimizing the HPCC randomaccess benchmark on Blue Gene/L supercomputer 369--370 Tadeusz Piotrowski and Suman Banerjee and Sudeept Bhatnagar and Samrat Ganguly and Rauf Izmailov Peer-to-peer streaming of stored media: the indirect approach . . . . . . . . . 371--372 Ajay Dholakia and Evangelos Eleftheriou and Xiao-Yu Hu and Ilias Iliadis and Jai Menon and KK Rao Analysis of a new intra-disk redundancy scheme for high-reliability RAID storage systems in the presence of unrecoverable errors . . . . . . . . . . . . . . . . . 373--374 Fred A. Bower and Derek Hower and Mahmut Yilmaz and Daniel J. Sorin and Sule Ozev Applying architectural vulnerability Analysis to hard faults in the microprocessor . . . . . . . . . . . . . 375--376 James A. Broberg and Zhen Liu and Cathy H. Xia and Li Zhang A multicommodity flow model for distributed stream processing . . . . . 377--378
T. Bonald Guest Editor's foreword . . . . . . . . 2--2 Sophie Hautphenne and Kenji Leibnitz and Marie-Ange Remiche Extinction probability in peer-to-peer file diffusion . . . . . . . . . . . . . 3--4 J. Mundinger and R. R. Weber and G. Weiss Analysis of peer-to-peer file dissemination amongst users of different upload capacities . . . . . . . . . . . 5--6 Emmanuel Besson and Aline Gouget and Hervé Sibert The GAIA sensor: an early DDoS detection tool . . . . . . . . . . . . . . . . . . 7--8 G. Hardy and C. Lucet and N. Limnios Probability of connection in regular stochastic networks . . . . . . . . . . 9--10 Ana Bu\vsi\'c and Jean-Michel Fourneau Bounding transient and steady-state dependability measures through algorithmic stochastic comparison . . . 11--12 Craig Bossie and Pierre M. Fiorini On checkpointing and heavy-tails in unreliable computing environments . . . 13--15 James W. Mickens and Brian D. Noble Improving distributed system performance using machine availability prediction 16--18 Andrzej Chydzinski Buffer overflow calculations in a batch arrival queue . . . . . . . . . . . . . 19--21 Daniel A. Menascé and Vasudeva Akula Evaluating caching policies for online auctions . . . . . . . . . . . . . . . . 22--23 Jean-Marc Vincent and Jérôme Vienne Perfect simulation of index based routing queueing networks . . . . . . . 24--25 Cheng-Shang Chang and Yi-Ting Chen and Jay Cheng and Po-Kai Huang and Duan-Shin Lee From switching theory to `queueing' theory . . . . . . . . . . . . . . . . . 26--28 Anastasios Giannoulis and Konstantinos P. Tsoukatos and Leandros Tassiulas Cross-layer power control in wireless networks . . . . . . . . . . . . . . . . 29--31
Mark S. Squillante Foreword . . . . . . . . . . . . . . . . 2--2 Anastase Nakassis and Vladimir Marbukh Towards power and QoS aware wireless networks . . . . . . . . . . . . . . . . 3--5 Emine \cSule Yazici and Selda Küçükçifçi and Öznur Özkasap and Mine Ça\uglar Exact probability distributions for peer-to-peer epidemic information diffusion . . . . . . . . . . . . . . . 6--8 Hao Luan and Danny H. K. Tsang and Kin Wah Kwong Media overlay construction via a Markov chain Monte Carlo method . . . . . . . . 9--11 Jochen Mundinger and Richard Weber and Gideon Weiss Analysis of peer-to-peer file dissemination . . . . . . . . . . . . . 12--14 David Raz and Hanoch Levy and Benjamin Avi-Itzhak On the twin measure and system predictability and fairness . . . . . . 15--17 Patrick Brown Comparing FB and PS scheduling policies 18--20 Adam Wierman On the effect of inexact size information in size based policies . . . 21--23 Robert Sheahan and Lester Lipsky and Pierre M. Fiorini and Sòren Asmussen On the completion time distribution for tasks that must restart from the beginning if a failure occurs . . . . . 24--26 Fernando Silveira and Edmundo de Souza e Silva Modeling the short-term dynamics of packet losses . . . . . . . . . . . . . 27--29 Teunis J. Ott and Jason Swanson Stationarity of some processes in transport protocols . . . . . . . . . . 30--32 Yuliy Baryshnikov and Ed Coffman and Jing Feng and Vishal Misra Free-Drop TCP . . . . . . . . . . . . . 33--35 G. Carofiglio and C. Chiasserini and M. Garetto and E. Leonardi Analysis of route stability under the random direction mobility model . . . . 36--38 Takayuki Osogami Finding probably best system configurations quickly . . . . . . . . . 39--41 David D. Yao and Heng-Qing Ye Asymptotic optimality of threshold control in a stochastic network based on a fixed-point approximation . . . . . . 42--44 Mohsen Bayati and Mayank Sharma and Mark S. Squillante Optimal scheduling in a multiserver stochastic network . . . . . . . . . . . 45--47 Mahmoud Elhaddad and Rami Melhem and Taieb Znati Analysis of a transmission scheduling algorithm for supporting bandwidth guarantees in bufferless networks . . . 48--63
Mor Harchol-Balter Foreword . . . . . . . . . . . . . . . . 2--3 Adam Wierman Fairness and classifications . . . . . . 4--12 Onno Boxma and Bert Zwart Tails in scheduling . . . . . . . . . . 13--20 Ernst W. Biersack and Bianca Schroeder and Guillaume Urvoy-Keller Scheduling in practice . . . . . . . . . 21--28 Thomas Bonald and James Roberts Scheduling network traffic . . . . . . . 29--35 Samuli Aalto and Urtzi Ayesta and Sem Borst and Vishal Misra and Rudesindo Núñez-Queija Beyond processor sharing . . . . . . . . 36--43 Mark S. Squillante Stochastic analysis of multiserver systems . . . . . . . . . . . . . . . . 44--51 Kirk Pruhs Competitive online scheduling for server systems . . . . . . . . . . . . . . . . 52--58 Hui Li and Michael Muskulus Analysis and modeling of job arrivals in a production grid . . . . . . . . . . . 59--70
Ismail Kadayif and Mahmut Kandemir Modeling and improving data cache reliability: 1 . . . . . . . . . . . . . 12--12 Ajay Gulati and Arif Merchant and Peter J. Varman pClock: an arrival curve based approach for QoS guarantees in shared storage systems . . . . . . . . . . . . . . . . 13--24 Ravi Iyer and Li Zhao and Fei Guo and Ramesh Illikkal and Srihari Makineni and Don Newell and Yan Solihin and Lisa Hsu and Steve Reinhardt QoS policies and architecture for cache/memory in CMP platforms . . . . . 25--36 Michael P. Mesnier and Matthew Wachs and Raja R. Sambasivan and Alice X. Zheng and Gregory R. Ganger Modeling the relative fitness of storage 37--48 Zhihua Wen and Sipat Triukose and Michael Rabinovich Facilitating focused Internet measurements . . . . . . . . . . . . . . 49--60 Yiyi Huang and Nick Feamster and Anukool Lakhina and Jim (Jun) Xu Diagnosing network disruptions with network-wide analysis . . . . . . . . . 61--72 Himabindu Pucha and Ying Zhang and Z. Morley Mao and Y. Charlie Hu Understanding network delay changes caused by routing events . . . . . . . . 73--84 Abhishek Kashyap and Sudipta Sengupta and Randeep Bhatia and M. Kodialam Two-phase routing, scheduling and power control for wireless mesh networks with variable traffic . . . . . . . . . . . . 85--96 Mariyam Mirza and Joel Sommers and Paul Barford and Xiaojin Zhu A machine learning approach to TCP throughput prediction . . . . . . . . . 97--108 Haakon Ringberg and Augustin Soule and Jennifer Rexford and Christophe Diot Sensitivity of PCA for traffic anomaly detection . . . . . . . . . . . . . . . 109--120 Seungjoon Lee and Dave Levin and Vijay Gopalakrishnan and Bobby Bhattacharjee Backbone construction in selfish wireless networks . . . . . . . . . . . 121--132 Cathy H. Xia and Zhen Liu and Don Towsley and Marc Lelarge Scalability of fork/join queueing networks with blocking . . . . . . . . . 133--144 Takayuki Osogami and Sei Kato Optimizing system configurations quickly by guessing at the performance . . . . . 145--156 Zhe Wang and Wei Dong and William Josephson and Qin Lv and Moses Charikar and Kai Li Sizing sketches: a rank-based analysis for similarity search . . . . . . . . . 157--168 Soyeon Park and Weihang Jiang and Yuanyuan Zhou and Sarita Adve Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures . . . . . . 169--180 Andrej Cvetkovski An algorithm for approximate counting using limited memory resources . . . . . 181--190 Eric S. Lee and Thom Whalen Synthetic designs: a new form of true experimental design for use in information systems development . . . . 191--202 Hanhua Feng and Vishal Misra and Dan Rubenstein PBS: a unified priority-based scheduler 203--214 Predrag R. Jelenkovic and Xiaozhu Kang and Jian Tan Adaptive and scalable comparison scheduling . . . . . . . . . . . . . . . 215--226 Sandeep Bhadra and Yingdong Lu and Mark S. Squillante Optimal capacity planning in stochastic loss networks with time-varying workloads . . . . . . . . . . . . . . . 227--238 Jiaping Liu and Alexandre Prouti\`ere and Yung Yi and Mung Chiang and H. Vincent Poor Flow-level stability of data networks with non-convex and time-varying rate regions . . . . . . . . . . . . . . . . 239--250 Evgenia Smirni and Frederica Darema and Albert Greenberg and Adolfy Hoisie and Don Towsley Future directions in performance evaluation research . . . . . . . . . . 251--252 Qunfeng Dong and Suman Banerjee and Jia Wang and Dheeraj Agrawal Wire speed packet classification without TCAMs: a few more registers (and a bit of logic) are enough . . . . . . . . . . 253--264 Martin Hirzel Data layouts for object-oriented programs . . . . . . . . . . . . . . . . 265--276 Fang Hao and Murali Kodialam and T. V. Lakshman Building high accuracy Bloom filters using partitioned hashing . . . . . . . 277--288 Lakshmi N. Bairavasundaram and Garth R. Goodson and Shankar Pasupathy and Jiri Schindler An analysis of latent sector errors in disk drives . . . . . . . . . . . . . . 289--300 Arnaud Legout and Nikitas Liogkas and Eddie Kohler and Lixia Zhang Clustering and sharing incentives in BitTorrent systems . . . . . . . . . . . 301--312 Sujay Sanghavi and Loc Bui and R. Srikant Distributed link scheduling with constant overhead . . . . . . . . . . . 313--324 Raj Kumar Rajendran and Vishal Misra and Dan Rubenstein Theoretical bounds on control-plane self-monitoring in routing protocols . . 325--336 Xin Yuan and Wickus Nienaber and Zhenhai Duan and Rami Melhem Oblivious routing for fat-tree based system area networks with uncertain traffic demands . . . . . . . . . . . . 337--348 Erich M. Nahum and John Tracey and Charles P. Wright Evaluating SIP server performance . . . 349--350 Thomas R. Puzak and Allan Hartstein and Viji Srinivasan and Philip Emma and Arthur Nadas Pipeline spectroscopy . . . . . . . . . 351--352 Edith Cohen and Haim Kaplan Bottom-$k$ sketches: better and more efficient estimation of aggregates . . . 353--354 Yu Gu and Lee Breslau and Nick G. Duffield and Subhabrata Sen GRE encapsulated multicast probing: a scalable technique for measuring one-way loss . . . . . . . . . . . . . . . . . . 355--356 Jelena Mirkovic and Alefiya Hussain and Brett Willson and Sonia Fahmy and Wei-Min Yao and Peter Reiher and Stephen Schwab and Roshan Thomas When is service really denied?: a user-centric DoS metric . . . . . . . . 357--358 Lei Guo and Enhua Tan and Songqing Chen and Zhen Xiao and Xiaodong Zhang Does Internet media traffic really follow Zipf-like distribution? . . . . . 359--360 Gerolf F. Hoflehner and Darshan Desai and Daniel M. Lavery and Alexandru Nicolau and Alexander V. Veidenbaum Comparative characterization of SPEC CPU2000 and CPU2006 on Itanium\reg architecture . . . . . . . . . . . . . . 361--362 Bin Lin and Arindam Mallik and Peter A. Dinda and Gokhan Memik and Robert P. Dick Power reduction through measurement and modeling of users and CPUs: summary . . 363--364 Chong Wang and John W. Byers Generating representative ISP topologies from first-principles . . . . . . . . . 365--366 George Dean Bissias and Brian Neil Levine and Arnold Rosenberg Bounding damage from link destruction, with application to the Internet . . . . 367--368 Jeffrey Erman and Anirban Mahanti and Martin Arlitt and Ira Cohen and Carey Williamson Semi-supervised network traffic classification . . . . . . . . . . . . . 369--370 Ningfang Mi and Alma Riska and Qi Zhang and Evgenia Smirni and Erik Riedel Efficient management of idleness in systems . . . . . . . . . . . . . . . . 371--372 Douglas V. de Jager and Jeremy T. Bradley Asynchronous iterative solution for state-based performance metrics . . . . 373--374 Kenneth Hoste and Lieven Eeckhout and Hendrik Blockeel Analyzing commercial processor performance numbers for predicting performance of applications of interest 375--376 Jiayue He and Augustin Chaintreau BRADO: scalable streaming through reconfigurable trees . . . . . . . . . . 377--378 Daniel Charles Nurmi and John Brevik and Rich Wolski QBETS: queue bounds estimation from time series . . . . . . . . . . . . . . . . . 379--380 Leiwen Deng and Aleksandar Kuzmanovic Pong: diagnosing spatio-temporal Internet congestion properties . . . . . 381--382 Samuli Aalto and Urtzi Ayesta Mean delay optimization for the M/G/1 queue with Pareto type service times . . 383--384
Mark S. Squillante Foreword . . . . . . . . . . . . . . . . 2--2 Gabriele Gianini and Ernesto Damiani Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach 3--5 Vladimir Marbukh Fair bandwidth sharing under flow arrivals/departures: effect of retransmissions on stability and performance . . . . . . . . . . . . . . 6--8 Takayuki Osogami Accuracy of measured throughputs and mean response times . . . . . . . . . . 9--11 Varun Gupta and Jim Dai and Mor Harchol-Balter and Bert Zwart The effect of higher moments of job size distribution on the performance of an M/G/s queueing system . . . . . . . . . 12--14 Tobias Hoßfeld and Kenji Leibnitz and Marie-Ange Remiche Modeling of an online TV recording service . . . . . . . . . . . . . . . . 15--17 Peng Wang and Stephan Bohacek An overview of tractable computation of optimal scheduling and routing in mesh networks . . . . . . . . . . . . . . . . 18--20 Florin Ciucu Exponential supermartingales for evaluating end-to-end backlog bounds . . 21--23 Varun Gupta and Karl Sigman and Mor Harchol-Balter and Ward Whitt Insensitivity for PS server farms with JSQ routing . . . . . . . . . . . . . . 24--26 Giuliano Casale and Eddy Z. Zhang and Evgenia Smirni Characterization of moments and autocorrelation in MAPs . . . . . . . . 27--29 Tony Field and Peter Harrison Approximate analysis of a network of fluid queues . . . . . . . . . . . . . . 30--32 Joshua Reich and Vishal Misra and Dan Rubenstein The time-correlated update problem . . . 33--35 W. N. Kang and F. P. Kelly and N. H. Lee and R. J. Williams Product form stationary distributions for diffusion approximations to a flow-level model operating under a proportional fair sharing policy . . . . 36--38 Yingdong Lu and Ana Radovanovi\'c and Mark S. Squillante Optimal capacity planning in stochastic loss networks . . . . . . . . . . . . . 39--41 Ludmila Cherkasova and Diwaker Gupta and Amin Vahdat Comparison of the three CPU schedulers in Xen . . . . . . . . . . . . . . . . . 42--51
Marco Ajmone Marsan and Prashant Shenoy Foreword . . . . . . . . . . . . . . . . 2--3 M. Cesana and L. Campelli and F. Borgonovo Efficiency of physical carrier sensing in wireless access networks . . . . . . 4--6 Juan-Carlos Cano and José-Manuel Cano and Eva González and Carlos Calafate and Pietro Manzoni How does energy consumption impact performance in Bluetooth? . . . . . . . 7--9 Georg Lukas and André Herms and Daniel Mahrenholz Interval based off-line clock synchronization for wireless mesh networks . . . . . . . . . . . . . . . . 10--12 Andrzej Chydzinski Solving finite-buffer queues with Markovian arrivals . . . . . . . . . . . 13--15 Gianfranco Ciardo and Andrew S. Miner and Min Wan and Andy Jinqing Yu Approximating stationary measures of structured continuous-time Markov models using matrix diagrams . . . . . . . . . 16--18 Fernando Silveira and Edmundo de Souza e Silva Predicting packet loss statistics with hidden Markov models . . . . . . . . . . 19--21 Michael Menth and Andreas Binzenhöfer and Stefan Mühleck A note on source models for speech traffic . . . . . . . . . . . . . . . . 22--24 Lorenzo Bracciale and Francesca Lo Piccolo and Dario Luzzi and Stefano Salsano OPSS: an overlay peer-to-peer streaming simulator for large-scale networks . . . 25--27 Kai Engels and Ralf Heidger and Reinhold Kroeger and Morris Milekovic and Jan Schaefer and Markus Schmid and Marcus Thoss eMIVA: tool support for the instrumentation of critical distributed applications . . . . . . . . . . . . . . 28--30 Parijat Dube and Corinne Touati and Laura Wynter Capacity planning, quality of service and price wars . . . . . . . . . . . . . 31--33 Thomas Begin and Alexandre Brandwajn and Bruno Baynat and Bernd E. Wolfinger and Serge Fdida High-level approach to modeling of observed system behavior . . . . . . . . 34--36 Vishal Misra Foreword . . . . . . . . . . . . . . . . 37--37 Wenbin Zhu and Patrick G. Bridges and Arthur B. Maccabe Light-weight application monitoring and tuning with embedded gossip . . . . . . 38--39 Riadh M. Kortebi and Yvon Gourhant and Nazim Agoulmine Interference-aware SINR-based routing: algorithms and evaluation . . . . . . . 40--42 Loc Bui and R. Srikant and Alexander Stolyar Optimal resource allocation for multicast flows in multihop wireless networks . . . . . . . . . . . . . . . . 43--43 Ningfang Mi Performance impacts of autocorrelated flows in multi-tiered systems . . . . . 44--45 Neena Kaushik and Silvia Figueira and Stephen A. Chiappari Resource co-allocation using advance reservations with flexible time-windows 46--48 Maaike Verloop and Rudesindo Núñez-Queija Efficient resource allocation in bandwidth-sharing networks . . . . . . . 49--50 D. I. Miretskiy and W. R. W. Scheinhardt and M. R. H. Mandjes Tandem queue with server slow-down . . . 51--52 Y. Volkovich and D. Donato and N. Litvak Stochastic models for Web ranking . . . 53--53 Anthony Hylick and Andrew Rice and Brian Jones and Ripduman Sohan Hard drive power consumption uncovered 54--55 Ajay Gulati and Peter Varman and Arif Merchant and Mustafa Uysal Towards fairness and efficiency in storage systems . . . . . . . . . . . . 56--58 Simon Heimlicher and Pavan Nuggehalli and Martin May End-to-end vs. hop-by-hop transport . . 59--60 Sandoche Balakrichenan and Thomas Bugnazet and Monique Becker A simulation platform: for testing and optimization of ENUM architecture . . . 61--63 Kathryn Mohror and Karen L. Karavanic Scalable event-based performance measurement in high-end environments . . 64--65 Claudio Vicari and Chiara Petrioli and Francesco Lo Presti Dynamic replica placement and traffic redirection in content delivery networks 66--68 Fragkiskos Papadopoulos and Konstantinos Psounis Predicting the performance of Internet-like networks using scaled-down replicas . . . . . . . . . . . . . . . . 69--71 Jawwad Shamsi and Monica Brockmeyer PSON: predictable service overlay networks . . . . . . . . . . . . . . . . 72--74
Stephen Gilmore and Jane Hillston Foreword . . . . . . . . . . . . . . . . 2--2 Stephen Gilmore and Jane Hillston Performance evaluation comes to life: quantitative methods applied to biological systems . . . . . . . . . . . 3--13 Marta Kwiatkowska and Gethin Norman and David Parker Using probabilistic model checking in systems biology . . . . . . . . . . . . 14--21 Matthias Jeschke and Roland Ewald and Alfred Park and Richard Fujimoto and Adelinde M. Uhrmacher A parallel and distributed discrete event approach for spatial cell-biological simulations . . . . . . 22--31 Lorenzo Dematté and Corrado Priami and Alessandro Romanel Modelling and simulation of biological processes in BlenX . . . . . . . . . . . 32--39 Joel Sommers and Paul Barford and Albert Greenberg and Walter Willinger An SLA perspective on the router buffer sizing problem . . . . . . . . . . . . . 40--51 Dmitry Korzun and Andrei Gurtov A Diophantine model of routes in structured P2P overlays . . . . . . . . 52--61 Fadi N. Sibai Evaluating the performance of single and multiple core processors with PCMARK\reg05 and benchmark analysis . . 62--71
Charles Bordenave and David McDonald and Alexandre Proutiere Performance of random medium access control, an asymptotic approach . . . . 1--12 Giuliano Casale and Ningfang Mi and Evgenia Smirni Bound analysis of closed queueing networks with workload burstiness . . . 13--24 Adam Wierman and Misja Nuyens Scheduling despite inexact job-size information . . . . . . . . . . . . . . 25--36 Marc Lelarge and Jean Bolot Network externalities and the deployment of security features and protocols in the Internet . . . . . . . . . . . . . . 37--48 Eli Brosh and Salman Abdul Baset and Dan Rubenstein and Henning Schulzrinne The delay-friendliness of TCP . . . . . 49--60 Changhoon Kim and Alexandre Gerber and Carsten Lund and Dan Pei and Subhabrata Sen Scalable VPN routing via relaying . . . 61--72 Dominique Tschopp and Suhas Diggavi and Matthias Grossglauser Hierarchical routing over dynamic wireless networks . . . . . . . . . . . 73--84 Shravan Rayanchu and Sayandeep Sen and Jianming Wu and Suman Banerjee and Sudipta Sengupta Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluation . . . . . . . . . . . . . . . 85--96 Thomas Schmid and Zainul Charbiwala and Jonathan Friedman and Young H. Cho and Mani B. Srivastava Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization . . . . . 97--108 Edith Cohen and Nick Duffield and Carsten Lund and Mikkel Thorup Confident estimation for multistage measurement sampling and aggregation . . 109--120 Yi Lu and Andrea Montanari and Balaji Prabhakar and Sarang Dharmapurikar and Abdul Kabbani Counter braids: a novel counter architecture for per-flow measurement 121--132 Animashree Anandkumar and Chatschik Bisdikian and Dakshi Agrawal Tracking in a spaghetti bowl: monitoring transactions using footprints . . . . . 133--144 Harsh Singhal and George Michailidis Optimal sampling in state space models with applications to network monitoring 145--156 Stratis Ioannidis and Peter Marbach On the design of hybrid peer-to-peer systems . . . . . . . . . . . . . . . . 157--168 Minghua Chen and Miroslav Ponec and Sudipta Sengupta and Jin Li and Philip A. Chou Utility maximization in peer-to-peer systems . . . . . . . . . . . . . . . . 169--180 Florian Simatos and Philippe Robert and Fabrice Guillemin A queueing system for modeling a file sharing principle . . . . . . . . . . . 181--192 Sharon Goldberg and David Xiao and Eran Tromer and Boaz Barak and Jennifer Rexford Path-quality monitoring in the presence of adversaries . . . . . . . . . . . . . 193--204 Pedram Pedarsani and Daniel R. Figueiredo and Matthias Grossglauser Densification arising from sampling fixed graphs . . . . . . . . . . . . . . 205--216 Ricardo V. Oliveira and Dan Pei and Walter Willinger and Beichuan Zhang and Lixia Zhang In search of the elusive ground truth: the Internet's as-level connectivity structure . . . . . . . . . . . . . . . 217--228 Yungang Bao and Mingyu Chen and Yuan Ruan and Li Liu and Jianping Fan and Qingbo Yuan and Bo Song and Jianwei Xu HMTT: a platform independent full-system memory trace monitoring system . . . . . 229--240 Ilias Iliadis and Robert Haas and Xiao-Yu Hu and Evangelos Eleftheriou Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems . . . . . . . . . . . . 241--252 Eno Thereska and Gregory R. Ganger Ironmodel: robust performance models in the wild . . . . . . . . . . . . . . . . 253--264 Alex X. Liu and Fei Chen and JeeHyun Hwang and Tao Xie Xengine: a fast and scalable XACML policy evaluation engine . . . . . . . . 265--276 Avishay Traeger and Ivan Deras and Erez Zadok DARC: dynamic analysis of root causes of latency distributions . . . . . . . . . 277--288 Shiva Chaitanya and Bhuvan Urgaonkar and Anand Sivasubramaniam QDSL: a queuing model for systems with differential service levels . . . . . . 289--300 Nadim Parvez and Carey Williamson and Anirban Mahanti and Niklas Carlsson Analysis of BitTorrent-like protocols for on-demand stored media streaming . . 301--312 Shao Liu and Rui Zhang-Shen and Wenjie Jiang and Jennifer Rexford and Mung Chiang Performance bounds for peer-assisted live streaming . . . . . . . . . . . . . 313--324 Thomas Bonald and Laurent Massoulié and Fabien Mathieu and Diego Perino and Andrew Twigg Epidemic live streaming: optimal performance trade-offs . . . . . . . . . 325--336 Jiang Lin and Hongzhong Zheng and Zhichun Zhu and Eugene Gorbatov and Howard David and Zhao Zhang Software thermal management of DRAM memory for multicore systems . . . . . . 337--348 Ishai Menache and Nahum Shimkin Noncooperative power control and transmission scheduling in wireless collision channels . . . . . . . . . . . 349--358 Mahmut Kandemir and Ozcan Ozturk Software-directed combined CPU/link voltage scaling for NoC-based CMPs . . . 359--370 Igor Crk and Mingsong Bi and Chris Gniady Interaction-aware energy management for wireless network cards . . . . . . . . . 371--382 Rade Stanojevi and Robert Shorten Fully decentralized emulation of best-effort and processor sharing queues 383--394 Srikanth Jagabathula and Devavrat Shah Optimal delay scheduling in networks with arbitrary constraints . . . . . . . 395--406 Kyomin Jung and Yingdong Lu and Devavrat Shah and Mayank Sharma and Mark S. Squillante Revisiting stochastic loss networks: structures and algorithms . . . . . . . 407--418 Thomas Bonald and Ali Ibrahim and James Roberts Traffic capacity of multi-cell WLANS . . 419--430 Jan Reineke and Daniel Grund Relative competitiveness of cache replacement policies . . . . . . . . . . 431--432 Zhihua Wen and Michael Rabinovich Network distance estimation with dynamic landmark triangles . . . . . . . . . . . 433--434 Murat Yuksel and Kadangode K. Ramakrishnan and Shivkumar Kalyanaraman and Joseph D. Houle and Rita Sadhvani Class-of-service in IP backbones: informing the network neutrality debate 435--436 Holger Dreger and Anja Feldmann and Vern Paxson and Robin Sommer Predicting the resource consumption of network intrusion detection systems . . 437--438 Bin Li and Lu Peng and Balachandran Ramadass Efficient MART-aided modeling for microarchitecture design space exploration and performance prediction 439--440 Simon Balon and Guy Leduc Combined intra- and inter-domain traffic engineering using hot-potato aware link weights optimization . . . . . . . . . . 441--442 Eric W. Anderson and Caleb T. Phillips and Kevin S. Bauer and Dirk C. Grunwald and Douglas C. Sicker Modeling directionality in wireless networks: extended abstract . . . . . . 443--444 Anat Bremler-Barr and David Hay and Danny Hendler and Boris Farber Layered interval codes for TCAM-based classification . . . . . . . . . . . . . 445--446 Sriram Ramabhadran and Joseph Pasquale Durability of replicated distributed storage systems . . . . . . . . . . . . 447--448 Feihui Li and Mahmut Kandemir and Mary J. Irwin Implementation and evaluation of a migration-based NUCA design for chip multiprocessors . . . . . . . . . . . . 449--450 Sara Alouf and Eitan Altman and Amar Prakash Azad M/G/1 queue with repeated inhomogeneous vacations applied to IEEE 802.16e power saving . . . . . . . . . . . . . . . . . 451--452 Srinivasan Seetharaman and Mostafa H. Ammar Managing inter-domain traffic in the presence of BitTorrent file-sharing . . 453--454 Edmar Mota-Garcia and Rogelio Hasimoto-Beltran Clock offset estimation using collaborative one-way transit time . . . 455--456 Gagan R. Gupta and Ness B. Shroff Scheduling with queue length guarantees for shared resource systems . . . . . . 457--458 Aiyou Chen and Li Li and Jin Cao Estimating cardinality distributions in network traffic: extended abstract . . . 459--460 Laura E. Grit and Jeffrey S. Chase Weighted fair sharing for dynamic virtual clusters . . . . . . . . . . . . 461--462 Vasumathi Sundaram and Abhishek Chandra and Jon Weissman Exploring the throughput-fairness tradeoff of deadline scheduling in heterogeneous computing environments . . 463--464 Gabor Papp and Chris GauthierDickey Characterizing multiparty voice communication for multiplayer games . . 465--466 Chad R. Meiners and Alex X. Liu and Eric Torng Algorithmic approaches to redesigning TCAM-based systems . . . . . . . . . . . 467--468 John R. Douceur Performance analysis in the real world 469--470
Tingxi Tan and Rob Simmonds and Bradley Arlt and Martin Arlitt and Bruce Walker Image management in a virtualized data center . . . . . . . . . . . . . . . . . 4--9 Abhishek Chandra and Rohini Prinja and Sourabh Jain and ZhiLi Zhang Co-designing the failure analysis and monitoring of large-scale systems . . . 10--15 Abhishek B. Sharma and Ranjita Bhagwan and Monojit Choudhury and Leana Golubchik and Ramesh Govindan and Geoffrey M. Voelker Automatic request categorization in Internet services . . . . . . . . . . . 16--25 Aman Kansal and Feng Zhao Fine-grained energy profiling for power-aware application design . . . . . 26--31 Nahur Fonseca and Mark Crovella and Kavé Salamatian Long range mutual information . . . . . 32--37 Giuliano Casale and Ningfang Mi and Ludmila Cherkasova and Evgenia Smirni How to parameterize models with bursty workloads . . . . . . . . . . . . . . . 38--44 Bill Lin and Jun (Jim) Xu DRAM is plenty fast for wirespeed statistics counting . . . . . . . . . . 45--51 Nitin Agrawal and Andrea C. Arpaci-Dusseau and Remzi H. Arpaci-Dusseau Towards realistic file-system benchmarks with CodeMRI . . . . . . . . . . . . . . 52--57 Elias Weingärtner and Florian Schmidt and Tobias Heer and Klaus Wehrle Synchronized network emulation: matching prototypes with complex simulations . . 58--63 Balachander Krishnamurthy and Walter Willinger What are our standards for validation of measurement-based networking research? 64--69 Roger Curry and Cameron Kiddle and Nayden Markatchev and Rob Simmonds and Tingxi Tan and Martin Arlitt and Bruce Walker Running applications efficiently in online social networks . . . . . . . . . 71--74 Eddy Zheng Zhang and Giuliano Casale and Evgenia Smirni KPC-Toolbox: best recipes toward automatization of workload fitting . . . 75--78 Daniel De Vera and Pablo Rodríguez-Bocca and Gerardo Rubino Automatic quality of experience measuring on video delivering networks 79--82 Dario Rossi and Silvio Valenti and Paolo Veglia and Dario Bonfiglio and Marco Mellia and Michela Meo Pictures from the Skype . . . . . . . . 83--86 Justin Ormont and Jordan Walker and Suman Banerjee Continuous monitoring of wide-area wireless networks: data collection and visualization . . . . . . . . . . . . . 87--89 Hicham Anouar and Christian Bonnet and Daniel Câmara and Fethi Filali and Raymond Knopp An overview of OpenAirInterface wireless network emulation methodology . . . . . 90--94 Xiaoyue Jiang New perspectives on network calculus . . 95--97 Chaitanya Garikiparthi and Appie van de Liefvoort and Ken Mitchell Busy period analysis of finite QBD processes . . . . . . . . . . . . . . . 98--100 Predrag R. Jelenkovi\'c and Xiaozhu Kang Is fair resource sharing responsible for spreading long delays? . . . . . . . . . 101--103 Varun Gupta Finding the optimal quantum size: Sensitivity analysis of the \em M/G/1 round-robin queue . . . . . . . . . . . 104--106 Eitan Bachmat and Hagit Sarfati Analysis of size interval task assignment policies . . . . . . . . . . 107--109 Ho-Lin Chen and Jason R. Marden and Adam Wierman The effect of local scheduling in load balancing designs . . . . . . . . . . . 110--112 Yuan Wu and Danny H. K. Tsang Joint rate-and-power allocation for multi-channel spectrum sharing networks 113--115 Pei Li and John C. S. Lui and Yinlong Xu A stochastic model for BitTorrent-like systems . . . . . . . . . . . . . . . . 116--118 Predrag R. Jelenkovi\'c and Xiaozhu Kang Characterizing the miss sequence of the LRU cache . . . . . . . . . . . . . . . 119--121 Florian Simatos and Danielle Tibi Study of a stochastic model for mobile networks . . . . . . . . . . . . . . . . 122--124 Petar Mom\vcilovi\'c and Mark S. Squillante On throughput in stochastic linear loss networks . . . . . . . . . . . . . . . . 125--127 Varun Gupta and Peter G. Harrison Fluid level in a reservoir with an on-off source . . . . . . . . . . . . . 128--130 K. J. Kwak and Y. M. Baryshnikov and E. G. Coffman Self-assembling sweep-and-sleep sensor systems . . . . . . . . . . . . . . . . 131--133 Giuliano Casale CoMoM: class-oriented evaluation of multiclass models . . . . . . . . . . . 134--136 A. B. Dieker and S. Ghosh and M. S. Squillante Capacity optimization in feedforward Brownian networks . . . . . . . . . . . 137--139
Boudewijn R. Haverkort and Markus Siegle and Maarten van Steen Quantitative analysis of gossiping protocols . . . . . . . . . . . . . . . 2--2 Joost-Pieter Katoen How to model and analyze gossiping protocols? . . . . . . . . . . . . . . . 3--6 Pepijn Crouzen and Jaco van de Pol and Arend Rensink Applying formal methods to gossiping networks with mCRL and groove . . . . . 7--16 Marta Kwiatkowska and Gethin Norman and David Parker Analysis of a gossip protocol in PRISM 17--22 Thomas Krieger and Martin Riedl and Johann Schuster and Markus Siegle A view-probability-matrix approach to the modelling of gossiping protocols . . 23--30 Rena Bakhshi and Lucia Cloth and Wan Fokkink and Boudewijn R. Haverkort MeanField analysis for the evaluation of gossip protocols . . . . . . . . . . . . 31--39 Trilce Estrada and Olac Fuentes and Michela Taufer A distributed evolutionary method to design scheduling policies for volunteer computing . . . . . . . . . . . . . . . 40--49 Wesley M. Eddy Basic properties of the IPv6 AS-level topology . . . . . . . . . . . . . . . . 50--57
Giuliano Casale and Richard R. Muntz and Giuseppe Serazzi Special issue on tools for computer performance modeling and reliability analysis . . . . . . . . . . . . . . . . 2--3 Soheib Baarir and Marco Beccuti and Davide Cerotti and Massimiliano De Pierro and Susanna Donatelli and Giuliana Franceschinis The GreatSPN tool: recent enhancements 4--9 Marco Bertoli and Giuliano Casale and Giuseppe Serazzi JMT: performance engineering tools for system modeling . . . . . . . . . . . . 10--15 Shravan Gaonkar and Ken Keefe and Ruth Lamprecht and Eric Rozier and Peter Kemper and William H. Sanders Performance and dependability modeling with Möbius . . . . . . . . . . . . . . . 16--21 Markus Arns and Peter Buchholz and Dennis Müller OPEDo: a tool for the optimization of performance and dependability models . . 22--27 Mirco Tribastone and Adam Duguid and Stephen Gilmore The PEPA Eclipse plugin . . . . . . . . 28--33 Nicholas J. Dingle and William J. Knottenbelt and Tamas Suto PIPE2: a tool for the performance evaluation of generalised stochastic Petri Nets . . . . . . . . . . . . . . . 34--39 Marta Kwiatkowska and Gethin Norman and David Parker PRISM: probabilistic model checking for performance and reliability analysis . . 40--45 Samuel Kounev and Christofer Dutz QPME: a performance modeling tool based on queueing Petri Nets . . . . . . . . . 46--51 Kisho S. Trivedi and Robin Sahner SHARPE at the age of twenty two . . . . 52--57 Gianfranco Ciardo and Andrew S. Miner and Min Wan Advanced features in SMART: the stochastic model checking analyzer for reliability and timing . . . . . . . . . 58--63 Edmundo de Souza e Silva and Daniel R. Figueiredo and Rosa M. M. Leão The TANGRAMII integrated modeling environment for computer systems and networks . . . . . . . . . . . . . . . . 64--69
Marc Lelarge Efficient control of epidemics over random networks . . . . . . . . . . . . 1--12 Abhinav Pathak and Feng Qian and Y. Charlie Hu and Z. Morley Mao and Supranamaya Ranjan Botnet spam campaigns can be long lasting: evidence, implications, and analysis . . . . . . . . . . . . . . . . 13--24 Ruben D. Torres and Mohammad Y. Hajjat and Sanjay G. Rao and Marco Mellia and Maurizio M. Munafo Inferring undesirable behavior from P2P traffic analysis . . . . . . . . . . . . 25--36 Ashok Anand and Chitra Muthukrishnan and Aditya Akella and Ramachandran Ramjee Redundancy in network traffic: findings and implications . . . . . . . . . . . . 37--48 Yu Jin and Esam Sharafuddin and Zhi-Li Zhang Unveiling core network-wide communication patterns through application traffic activity graph decomposition . . . . . . . . . . . . . 49--60 Venugopalan Ramasubramanian and Dahlia Malkhi and Fabian Kuhn and Mahesh Balakrishnan and Archit Gupta and Aditya Akella On the treeness of Internet latency and bandwidth . . . . . . . . . . . . . . . 61--72 Chad R. Meiners and Alex X. Liu and Eric Torng Topological transformation approaches to optimizing TCAM-based packet classification systems . . . . . . . . . 73--84 Kai Shen and Christopher Stewart and Chuanpeng Li and Xin Li Reference-driven performance anomaly identification . . . . . . . . . . . . . 85--96 Gagan R. Gupta and Sujay Sanghavi and Ness B. Shroff Node weighted scheduling . . . . . . . . 97--108 Augustin Chaintreau and Jean-Yves Le Boudec and Nikodin Ristanovic The age of gossip: spatial mean field regime . . . . . . . . . . . . . . . . . 109--120 Shreeshankar Bodas and Sanjay Shakkottai and Lei Ying and R. Srikant Scheduling in multi-channel wireless networks: rate function optimality in the small-buffer regime . . . . . . . . 121--132 Shreevatsa Rajagopalan and Devavrat Shah and Jinwoo Shin Network adiabatic theorem: an efficient randomized protocol for contention resolution . . . . . . . . . . . . . . . 133--144 Abhishek B. Sharma and Leana Golubchik and Ramesh Govindan and Michael J. Neely Dynamic data compression in multi-hop wireless networks . . . . . . . . . . . 145--156 Anshul Gandhi and Mor Harchol-Balter and Rajarshi Das and Charles Lefurgy Optimal power allocation in server farms 157--168 Ayse K. Coskun and Richard Strong and Dean M. Tullsen and Tajana Simunic Rosing Evaluating the impact of job scheduling and power management on processor lifetime for chip multiprocessors . . . 169--180 Feng Chen and David A. Koufaty and Xiaodong Zhang Understanding intrinsic characteristics and system implications of flash memory based solid state drives . . . . . . . . 181--192 Bianca Schroeder and Eduardo Pinheiro and Wolf-Dietrich Weber DRAM errors in the wild: a large-scale field study . . . . . . . . . . . . . . 193--204 Ningfang Mi and Alma Riska and Xin Li and Evgenia Smirni and Erik Riedel Restrained utilization of idleness for transparent scheduling of background tasks . . . . . . . . . . . . . . . . . 205--216 Yi Wang and Michael Schapira and Jennifer Rexford Neighbor-specific BGP: more flexible routing policies while improving global stability . . . . . . . . . . . . . . . 217--228 Nikolaos Laoutaris and Georgios Smaragdakis and Pablo Rodriguez and Ravi Sundaram Delay tolerant bulk data transfers on the Internet . . . . . . . . . . . . . . 229--238 Wenjie Jiang and Rui Zhang-Shen and Jennifer Rexford and Mung Chiang Cooperative content distribution and traffic engineering in an ISP network 239--250 Edith Cohen and Haim Kaplan Leveraging discarded samples for tighter estimation of multiple-set aggregates 251--262 Patrick Loiseau and Paulo Gonçalves and Stéphane Girard and Florence Forbes and Pascale Vicat-Blanc Primet Maximum likelihood estimation of the flow size distribution tail index from sampled packet data . . . . . . . . . . 263--274 Tongqing Qiu and Zihui Ge and Seungjoon Lee and Jia Wang and Qi Zhao and Jun Xu Modeling channel popularity dynamics in a large IPTV system . . . . . . . . . . 275--286 Mor Harchol-Balter and Alan Scheller-Wolf and Andrew R. Young Surprising results on task assignment in server farms with high-variability workloads . . . . . . . . . . . . . . . 287--298 Thomas Sandholm and Kevin Lai MapReduce optimization using regulated dynamic prioritization . . . . . . . . . 299--310 Varun Gupta and Mor Harchol-Balter Self-adaptive admission control policies for resource-sharing systems . . . . . . 311--322
Björn Scheuermann and Wolfgang Kiess Who said that?: the send-receive correlation problem in network log analysis . . . . . . . . . . . . . . . . 3--5 Animashree Anandkumar and Chatschik Bisdikian and Ting He and Dakshi Agrawal Selectively retrofitting monitoring in distributed systems . . . . . . . . . . 6--8 Abhishek Dubey and Rajat Mehrotra and Sherif Abdelwahed and Asser Tantawi Performance modeling of distributed multi-tier enterprise systems . . . . . 9--11 Chao Wang and Xiaoli Ma Deriving Cramér--Rao bounds and maximum likelihood estimators for traffic matrix inference . . . . . . . . . . . . . . . 12--14 Dmitri Krioukov and Fragkiskos Papadopoulos and Marián Boguñá and Amin Vahdat Greedy forwarding in scale-free networks embedded in hyperbolic metric spaces . . 15--17 Jeong-woo Cho and Yuming Jiang Basic theorems on the backoff process in 802.11 . . . . . . . . . . . . . . . . . 18--20 Jayakrishnan Nair and Steven H. Low Optimal job fragmentation . . . . . . . 21--23 Erlin Yao and Yungang Bao and Guangming Tan and Mingyu Chen Extending Amdahl's Law in the multicore era . . . . . . . . . . . . . . . . . . 24--26 Dmitry Korzun and Andrei Gurtov A local equilibrium model for P2P resource ranking . . . . . . . . . . . . 27--29 Daniel Sadoc Menasché and Antonio A. Aragão Rocha and Edmundo de Souza e Silva and Rosa M. Meri Leão and Don Towsley and Arun Venkataramani Modeling chunk availability in P2P swarming systems . . . . . . . . . . . . 30--32 Oliver Hohlfeld and Florin Ciucu Viewing impaired video transmissions from a modeling perspective . . . . . . 33--35 Gagan R. Gupta and Sujay Sanghavi and Ness B. Shroff Workload optimality in switches without arrivals . . . . . . . . . . . . . . . . 36--38 Lachlan L. H. Andrew and Adam Wierman and Ao Tang Optimal speed scaling under arbitrary power functions . . . . . . . . . . . . 39--41 I. M. Verloop and U. Ayesta and R. Núñez-Queija Heavy-traffic analysis of the M/PH/1 discriminatory processor sharing queue with phase-dependent weights . . . . . . 42--44 J. Anselmi and Y. Lu and M. Sharma and M. S. Squillante Improved Approximations for Stochastic Loss Networks . . . . . . . . . . . . . 45--47 Elias Weingärtner and Florian Schmidt and Tobias Heer and Klaus Wehrle Time accurate integration of software prototypes with event-based network simulations . . . . . . . . . . . . . . 49--50 Haifeng Chen and Wenxuan Zhang and Guofei Jiang Experience transfer for the configuration tuning in large scale computing systems . . . . . . . . . . . 51--52 Bill Lin and Jun (Jim) Xu and Nan Hua and Hao Wang and Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters . . . . . . . 53--54 Bridge Zhao and y. K. Li and John C. S. Lui and Dah-Ming Chiu On modeling product advertisement in social networks . . . . . . . . . . . . 55--56 Thomas Zahn and Greg O'Shea and Antony Rowstron An empirical study of flooding in mesh networks . . . . . . . . . . . . . . . . 57--58 Sipat Triukose and Zhihua Wen and Michael Rabinovich Content delivery networks: how big is big enough? . . . . . . . . . . . . . . 59--60 Zhibin Yu and Hai Jin Simple and fast micro-architecture simulation: a trisection Cantor fractal approach . . . . . . . . . . . . . . . . 61--62 Peter Key and Alexandre Proutiere Routing games with elastic traffic . . . 63--64 John R. Lange and J. Scott Miller and Peter A. Dinda EmNet: satisfying the individual user through empathic home networks: summary 65--66 Alma Riska and Erik Riedel Evaluation of disk-level workloads at different time scales . . . . . . . . . 67--68 Vinith Reddy and Younghoon Kim and Srinivas Shakkottai and A. L. Narasimha Reddy MultiTrack: a delay and cost aware P2P overlay architecture . . . . . . . . . . 69--70 Sem Borst and Varun Gupta and Anwar Walid Self-organizing algorithms for cache cooperation in content distribution networks . . . . . . . . . . . . . . . . 71--72 Benjamin I. P. Rubinstein and Blaine Nelson and Ling Huang and Anthony D. Joseph and Shing-hon Lau and Satish Rao and Nina Taft and J. D. Tygar Stealthy poisoning attacks on PCA-based anomaly detectors . . . . . . . . . . . 73--74 Douglas G. Down and H. Christian Gromoll and Amber L. Puha State-dependent response times via fluid limits in shortest remaining processing time queues . . . . . . . . . . . . . . 75--76 Jianwei Chen and Murali Annavaram and Michel Dubois SlackSim: a platform for parallel simulations of CMPs on CMPs . . . . . . 77--78 Ajay Gulati and Arif Merchant and Mustafa Uysal and Pradeep Padala and Peter Varman Efficient and adaptive proportional share I/O scheduling . . . . . . . . . . 79--80 Yang Liu and Linfeng Zhang and Yong Guan A distributed data streaming algorithm for network-wide traffic anomaly detection . . . . . . . . . . . . . . . 81--82 François Baccelli and Bruno Kauffmann and Darryl Veitch Towards multihop available bandwidth estimation . . . . . . . . . . . . . . . 83--84 Animesh Nandi and Bobby Bhattacharjee and Peter Druschel What a mesh: understanding the design tradeoffs for streaming multicast . . . 85--86 Daniel Sadoc Menasche and Antonio A. Aragao Rocha and Bin Li and Don Towsley and Arun Venkataramani Modeling content availability in peer-to-peer swarming systems . . . . . 87--88 Ravi Iyer and Ramesh Illikkal and Li Zhao and Don Newell and Jaideep Moses Virtual platform architectures for resource metering in datacenters . . . . 89--90
Krishna Kant Challenges in distributed energy adaptive computing . . . . . . . . . . . 3--7 Xinghao Pan and Jiaqi Tan and Soila Kavulya and Rajeev Gandhi and Priya Narasimhan Ganesha: black-box diagnosis of MapReduce systems . . . . . . . . . . . 8--13 Ashok Anand and Aditya Akella NetReplay: a new network primitive . . . 14--19 Daniele Crocey and Marco Melliay and Emilio Leonardiy The quest for bandwidth estimation techniques for large-scale distributed systems . . . . . . . . . . . . . . . . 20--25 Kimberly Keeton and Pankaj Mehra and John Wilkes Do you know your IQ?: a research agenda for information quality in systems . . . 26--31 Giuliano Casale and Amir Kalbasi and Diwakar Krishnamurthy and Jerry Rolia Automatically generating bursty benchmarks for multitier systems . . . . 32--37 Joseph L. Hellerstein and Vance Morrison and Eric Eilebrecht Applying control theory in the real world: experience with building a controller for the .NET thread pool . . 38--42 Alma Riska and Ningfang Mi and Evgenia Smirni and Giuliano Casale Feasibility regions: exploiting tradeoffs between power and performance in disk drives . . . . . . . . . . . . . 43--48 Walter Willinger and Reza Rejaie and Mojtaba Torkjazi and Masoud Valafar and Mauro Maggioni Research on online social networks: time to face the real challenges . . . . . . 49--54 Omesh Tickoo and Ravi Iyer and Ramesh Illikkal and Don Newell Modeling virtual machine performance: challenges and approaches . . . . . . . 55--60 Ajay Gulati and Chethan Kumar and Irfan Ahmad Modeling workloads and devices for IO load balancing in virtualized environments . . . . . . . . . . . . . . 61--66 Damien Fay and Hamed Haddadi and Andrew W. Moore and Richard Mortier and Steve Uhlig and Almerima Jamakovic A weighted spectrum metric for comparison of Internet topologies . . . 67--72
Ramesh Illikkal and Vineet Chadha and Andrew Herdrich and Ravi Iyer and Donald Newell PIRATE: QoS and performance management in CMP architectures . . . . . . . . . . 3--10 Parijat Dube and Li Zhang and David Daly and Alan Bivens Performance of large low-associativity caches . . . . . . . . . . . . . . . . . 11--18 Yaping Zhu and Jennifer Rexford and Subhabrata Sen and Aman Shaikh Route Oracle: where have all the packets gone? . . . . . . . . . . . . . . . . . 19--25 Bjoern Doebel and Peter Nobel and Eno Thereska and Alice Zheng Towards versatile performance models for complex, popular applications . . . . . 26--33 Asit K. Mishra and Joseph L. Hellerstein and Walfredo Cirne and Chita R. Das Towards characterizing cloud backend workloads: insights from Google compute clusters . . . . . . . . . . . . . . . . 34--41 Martin Arlitt and Keith Farkas and Subu Iyer and Preethi Kumaresan and Sandro Rafaeli Systematically improving the quality of IT utilization data . . . . . . . . . . 42--49 Jianying Hu and Yingdong Lu and Aleksandra Mojsilovi\'c and Mayank Sharma and Mark S. Squillante Performance management of IT services delivery . . . . . . . . . . . . . . . . 50--57 Shuyi Chen and Kaustubh R. Joshi and Matti A. Hiltunen and Richard D. Schlichting and William H. Sanders Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems . . . . . . . . . . . 59--63 Manish Marwah and Paulo Maciel and Amip Shah and Ratnesh Sharma and Tom Christian and Virgilio Almeida and Carlos Araújo and Erica Souza and Gustavo Callou and Bruno Silva and Sérgio Galdino and Jose Pires Quantifying the sustainability impact of data center availability . . . . . . . . 64--68 Marco Ajmone Marsan and Michela Meo Energy efficient management of two cellular access networks . . . . . . . . 69--73 Paschalis Tsiaflakis and Yung Yi and Mung Chiang and Marc Moonen Fair greening for DSL broadband access 74--78 Jason Ord and Ellen Chappell and Scott Canonico and Tim Strecker Product environmental metrics for printers . . . . . . . . . . . . . . . . 79--83 Steve Cayzer and Chris Preist The sustainability hub: an information management tool for analysis and decision making . . . . . . . . . . . . 84--88
Eno Thereska and Bjoern Doebel and Alice X. Zheng and Peter Nobel Practical performance models for complex, popular applications . . . . . 1--12 Nicolas Gast and Gaujal Bruno A mean field model of work stealing in large-scale systems . . . . . . . . . . 13--24 Simonetta Balsamo and Peter G. Harrison and Andrea Marin A unifying approach to product-forms in networks with finite capacity constraints . . . . . . . . . . . . . . 25--36 Lachlan L. H. Andrew and Minghong Lin and Adam Wierman Optimality, fairness, and robustness in speed scaling designs . . . . . . . . . 37--48 Wei Dong and Yunhao Liu and Xiaofan Wu and Lin Gu and Chun Chen Elon: enabling efficient and long-term reprogramming for wireless sensor networks . . . . . . . . . . . . . . . . 49--60 Amin Karbasi and Sewoong Oh Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm 61--70 Kuang Xu and Olivier Dousse and Patrick Thiran Self-synchronizing properties of CSMA wireless multi-hop networks . . . . . . 71--82 Ciamac Moallemi and Devavrat Shah On the flow-level dynamics of a packet-switched network . . . . . . . . 83--94 P. Brighten Godfrey and Michael Schapira and Aviv Zohar and Scott Shenker Incentive compatibility and dynamics of congestion control . . . . . . . . . . . 95--106 Devavrat Shah and Jinwoo Shin Dynamics in congestion games . . . . . . 107--118 Liping Xiang and Yinlong Xu and John C. S. Lui and Qian Chang Optimal recovery of single disk failure in RDP code storage systems . . . . . . 119--130 Saeed Ghanbari and Gokul Soundararajan and Cristiana Amza A query language and runtime tool for evaluating behavior of multi-tier servers . . . . . . . . . . . . . . . . 131--142 Ashish Goel and Pankaj Gupta Small subset queries and bloom filters using ternary associative memories, with applications . . . . . . . . . . . . . . 143--154 Oren Laadan and Nicolas Viennot and Jason Nieh Transparent, lightweight application execution replay on commodity multiprocessor operating systems . . . . 155--166 Jian Ni and R. Srikant and Xinzhou Wu Coloring spatial point processes with applications to peer discovery in large wireless networks . . . . . . . . . . . 167--178 Peter M. van de Ven and Augustus J. E. M. Janssen and Johan S. H. van Leeuwaarden Optimal tradeoff between exposed and hidden nodes in large wireless networks 179--190 Shihuan Liu and Lei Ying and R. Srikant Scheduling in multichannel wireless networks with flow-level dynamics . . . 191--202 Devavrat Shah and Tauhid Zaman Detecting sources of computer viruses in networks: theory and experiment . . . . 203--214 Vishal Misra and Stratis Ioannidis and Augustin Chaintreau and Laurent Massoulié Incentivizing peer-assisted services: a fluid Shapley value approach . . . . . . 215--226 Yadi Ma and Suman Banerjee and Shan Lu and Cristian Estan Leveraging parallelism for multi-dimensional packet classification on software routers . . . . . . . . . . 227--238 Devavrat Shah and John N. Tsitsiklis and Yuan Zhong Qualitative properties of $ \alpha $-weighted scheduling policies . . . . . 239--250 Giuliano Casale and Ningfang Mi and Evgenia Smirni CWS: a model-driven scheduling policy for correlated workloads . . . . . . . . 251--262 Haoqiang Zheng and Jason Nieh RSIO: automatic user interaction detection and scheduling . . . . . . . . 263--274 Maury Bramson and Yi Lu and Balaji Prabhakar Randomized load balancing with general service time distributions . . . . . . . 275--286 Ayalvadi Ganesh and Sarah Lilienthal and D. Manjunath and Alexandre Proutiere and Florian Simatos Load balancing via random local search in closed and open systems . . . . . . . 287--298 Haiquan (Chuck) Zhao and Cathy H. Xia and Zhen Liu and Don Towsley A unified modeling framework for distributed resource allocation of general fork and join processing networks . . . . . . . . . . . . . . . . 299--310 Stratis Ioannidis and Laurent Massoulie and Augustin Chaintreau Distributed caching over heterogeneous mobile networks . . . . . . . . . . . . 311--322 Nelson Antunes and Gonçalo Jacinto and António Pacheco An analytical framework to infer multihop path reliability in MANETs . . 323--332 Ed Coffman and Philippe Robert and Florian Simatos and Shuzo Tarumi and Gil Zussman Channel fragmentation in dynamic spectrum access systems: a theoretical study . . . . . . . . . . . . . . . . . 333--344 Jean-Claude Bermond and Dorian Mazauric and Vishal Misra and Philippe Nain A distributed scheduling algorithm for wireless networks with constant overhead and arbitrary binary interference . . . 345--346 Guillaume Sagnol and Mustapha Bouhtou and Stéphane Gaubert Successive $c$-optimal designs: a scalable technique to optimize the measurements on large networks . . . . . 347--348 Rubén Cuevas and Nikolaos Laoutaris and Xiaoyuan Yang and Georgos Siganos and Pablo Rodriguez Deep diving into BitTorrent locality . . 349--350 Yu Jin and Nick Duffield and Patrick Haffner and Subhabrata Sen and Zhi-Li Zhang Inferring applications at the network layer using collective traffic statistics . . . . . . . . . . . . . . . 351--352 Jonatha Anselmi and Bruno Gaujal The price of anarchy in parallel queues revisited . . . . . . . . . . . . . . . 353--354 M. H. R. Khouzani and Saswati Sarkar and Eitan Altman Optimal propagation of security patches in mobile wireless networks: extended abstract . . . . . . . . . . . . . . . . 355--356 Kien Le and Ozlem Bilgir and Ricardo Bianchini and Margaret Martonosi and Thu D. Nguyen Managing the cost, energy consumption, and carbon footprint of Internet services . . . . . . . . . . . . . . . . 357--358 Asit K. Mishra and Shekhar Srikantaiah and Mahmut Kandemir and Chita R. Das Coordinated power management of voltage islands in CMPs . . . . . . . . . . . . 359--360 Hung X. Nguyen and Matthew Roughan Rigorous statistical analysis of Internet loss measurements . . . . . . . 361--362 Takayuki Osogami and Rudy Raymond Semidefinite optimization for transient analysis of queues . . . . . . . . . . . 363--364 Dongchul Park and Biplob Debnath and David Du CFTL: a convertible flash translation layer adaptive to data access patterns 365--366 Feng Qian and Abhinav Pathak and Yu Charlie Hu and Zhuoqing Morley Mao and Yinglian Xie A case for unsupervised-learning-based spam filtering . . . . . . . . . . . . . 367--368 Shreevatsa Rajagopalan and Devavrat Shah Distributed averaging in dynamic networks . . . . . . . . . . . . . . . . 369--370 Ruhi Sarikaya and Canturk Isci and Alper Buyuktosunoglu Program behavior prediction using a statistical metric model . . . . . . . . 371--372 Devavrat Shah and Jinwoo Shin Delay optimal queue-based CSMA . . . . . 373--374 Alex Shye and Benjamin Scholbrock and Gokhan Memik and Peter A. Dinda Characterizing and modeling user activity on smartphones: summary . . . . 375--376 Fernando Silveira and Christophe Diot and Nina Taft and Ramesh Govindan Detecting traffic anomalies using an equilibrium property . . . . . . . . . . 377--378 Niranjan Soundararajan and Anand Sivasubramaniam and Vijay Narayanan Characterizing the soft error vulnerability of multicores running multithreaded applications . . . . . . . 379--380 Jian Tan and Wei Wei and Bo Jiang and Ness Shroff and Don Towsley Can multipath mitigate power law delays?: effects of parallelism on tail performance . . . . . . . . . . . . . . 381--382 Dan-Cristian Tomozei and Laurent Massoulié Distributed user profiling via spectral methods . . . . . . . . . . . . . . . . 383--384
David K. George and Cathy H. Xia Asymptotic analysis of closed queueing networks and its implications to achievable service levels . . . . . . . 3--5 Ana Buaic and Varun Gupta and Jean Mairesse Stability of the bipartite matching model . . . . . . . . . . . . . . . . . 6--8 Ali Tizghadam and Alberto Leon-Garcia On random walks in direction-aware network problems . . . . . . . . . . . . 9--11 Minghong Lin and Adam Wierman and Bert Zwart The average response time in a heavy-traffic SRPT queue . . . . . . . . 12--14 Karl Sigman and Ward Whitt Heavy-traffic limits for nearly deterministic queues . . . . . . . . . . 15--17 Heng-Qing Ye and David D. Yao Diffusion limit of a two-class network: stationary distributions and interchange of limits . . . . . . . . . . . . . . . 18--20 José Niño-Mora Index policies for admission and routing of soft real-time traffic to parallel queues . . . . . . . . . . . . . . . . . 21--23 Philippe Robert and Jim Roberts A mean field approximation for the capacity of server-limited, gate-limited multi-server polling systems . . . . . . 24--26 Yunan Liu and Ward Whitt A fluid approximation for large-scale service systems . . . . . . . . . . . . 27--29 Nicolas Gast and Bruno Gaujal Mean field limit of non-smooth systems and differential inclusions . . . . . . 30--32 Ana Radovanovi\'c and Assaf Zeevi Revenue maximization through ``smart'' inventory management in reservation-based online advertising . . 33--35 Jeong-woo Cho and Jean-Yves Le Boudec and Yuming Jiang On the validity of the fixed point equation and decoupling assumption for analyzing the 802.11 MAC protocol . . . 36--38 P. M. van de Ven and S. C. Borst and D. Denteneer and A. J. E. M. Janssen and J. S. H. van Leeuwaarden Equalizing throughputs in random-access networks . . . . . . . . . . . . . . . . 39--41 Michel Marot and Vincent Gauthier Reducing collision probability on a shared medium using a variational method 42--44 Yingdong Lu and Mark S. Squillante On approximations for multiple multidimensional stochastic knapsacks 45--47 Anshul Gandhi and Mor Harchol-Balter and Ivo Adan Decomposition results for an M/M/k with staggered setup . . . . . . . . . . . . 48--50 Ranjan Pal and Leana Golubchik On the economics of information security: the problem of designing optimal cyber-insurance contracts . . . 51--53 Parijat Dube and Li Zhang Resiliency of distributed clock synchronization networks . . . . . . . . 54--56
Xiaozhou Li and Mark Lillibridge and Mustafa Uysal Reliability analysis of deduplicated and erasure-coded storage . . . . . . . . . 4--9 Milind Kulkarni and Vijay Pai and Derek Schuff Towards architecture independent metrics for multicore performance analysis . . . 10--14 Clayton Shepard and Ahmad Rahmati and Chad Tossell and Lin Zhong and Phillip Kortum LiveLab: measuring wireless networks and smartphone users in the field . . . . . 15--20 Dongwoon Hahn and Ginnah Lee and Brenton Walker and Matt Beecher and Padma Mundur Using virtualization and live migration in a scalable mobile wireless testbed 21--25 Srinivas Shakkottai and Lei Ying and Sankalp Sah Targeted coupon distribution using social networks . . . . . . . . . . . . 26--30 Ragavendran Gopalakrishnan and Jason R. Marden and Adam Wierman An architectural view of game theoretic control . . . . . . . . . . . . . . . . 31--36 Zhongmei Yao and Daren B. H. Cline and Dmitri Loguinov In-degree dynamics of large-scale P2P systems . . . . . . . . . . . . . . . . 37--42 Diana Joumblatt and Renata Teixeira and Jaideep Chandrashekar and Nina Taft HostView: annotating end-host performance measurements with user feedback . . . . . . . . . . . . . . . . 43--48 Vijay Kumar Adhikari and Sourabh Jain and Zhi-Li Zhang From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP . . . . . . . . . . . . . . . 49--54 Martin Arlitt and Niklas Carlsson and Jerry Rolia Special issue on the 2010 GreenMetrics workshop . . . . . . . . . . . . . . . . ?? Bhavani Krishnan and Hrishikesh Amur and Ada Gavrilovska and Karsten Schwan VM power metering: feasibility and challenges . . . . . . . . . . . . . . . 56--60 Steven Phillips and Sheryl L. Woodward and Mark D. Feuer and Peter D. Magill A regression approach to infer electricity consumption of legacy telecom equipment . . . . . . . . . . . 61--65 Biplab Sikdar Environmental impact of IEEE 802.11 access points: a case study . . . . . . 66--70 Prabhakar T.V. and Akshay Uttama Nambi S.N. and Jamadagni H.S. and Krishna Swaroop and R. Venkatesha Prasad and I. G. M. M. Niemegeers A novel DTN based energy neutral transfer scheme for energy harvested WSN Gateways . . . . . . . . . . . . . . . . 71--75 Alfio Lombardo and Carla Panarello and Giovanni Schembra Achieving energy savings and QoS in Internet access routers . . . . . . . . 76--80 Aruna Prem Bianzino and Anand Kishore Raju and Dario Rossi Apples-to-apples: a framework analysis for energy-efficiency in networks . . . 81--85
Curtis L. Janssen and Helgi Adalsteinsson and Joseph P. Kenny Using simulation to design extremescale applications and architectures: programming model exploration . . . . . 4--8 M. B. Giles and G. R. Mudalige and Z. Sharif and G. Markall and P. H. J. Kelly Performance analysis of the OP2 framework on many-core architectures . . 9--15 J. A. Herdman and W. P. Gaudin and D. Turland and S. D. Hammond Benchmarking and modelling of POWER7, Westmere, BG/P, and GPUs: an industry case study . . . . . . . . . . . . . . . 16--22 S. J. Pennycook and S. D. Hammond and S. A. Jarvis and G. R. Mudalige Performance analysis of a hybrid MPI/CUDA implementation of the NASLU benchmark . . . . . . . . . . . . . . . 23--29 Sandeep Budanur and Frank Mueller and Todd Gamblin Memory Trace Compression and Replay for SPMD Systems using Extended PRSDs? . . . 30--36 A. F. Rodrigues and K. S. Hemmert and B. W. Barrett and C. Kersey and R. Oldfield and M. Weston and R. Risen and J. Cook and P. Rosenfeld and E. CooperBalls and B. Jacob The Structural Simulation Toolkit . . . 37--42 Ian Karlin and Elizabeth Jessup and Geoffrey Belter and Jeremy G. Siek Parallel memory prediction for fused linear algebra kernels . . . . . . . . . 43--49 Naohito Nakasato A fast GEMM implementation on the Cypress GPU . . . . . . . . . . . . . . 50--55 Xingfu Wu and Valerie Taylor Performance characteristics of hybrid MPI/OpenMP implementations of NAS parallel benchmarks SP and BT on large-scale multicore supercomputers . . 56--62 Ming-yu Hsieh and Arun Rodrigues and Rolf Riesen and Kevin Thompson and William Song A framework for architecture-level power, area, and thermal simulation and its application to network-on-chip design exploration . . . . . . . . . . . 63--68 O. Perks and S. D. Hammond and S. J. Pennycook and S. A. Jarvis Should we worry about memory loss? . . . 69--74 Jeanine Cook and Jonathan Cook and Waleed Alkohlani A statistical performance model of the Opteron processor . . . . . . . . . . . 75--80 Alexandre Tabbal and Matthew Anderson and Maciej Brodowicz and Hartmut Kaiser and Thomas Sterling Preliminary design examination of the ParalleX system from a software and hardware perspective . . . . . . . . . . 81--87 Simon McIntosh-Smith and Terry Wilson and Jon Crisp and Amaurys Ávila Ibarra and Richard B. Sessions Energy-aware metrics for benchmarking heterogeneous systems . . . . . . . . . 88--94
Jian Chen and Lizy Kurian John and Dimitris Kaseridis Modeling program resource demand using inherent program characteristics . . . . 1--12 Akbar Sharifi and Shekhar Srikantaiah and Asit K. Mishra and Mahmut Kandemir and Chita R. Das METE: meeting end-to-end QoS in multicores through system-wide resource management . . . . . . . . . . . . . . . 13--24 Yuanrui Zhang and Mahmut Kandemir and Taylan Yemliha Studying inter-core data reuse in multicores . . . . . . . . . . . . . . . 25--36 Fang Liu and Yan Solihin Studying the impact of hardware prefetching and bandwidth partitioning in chip-multiprocessors . . . . . . . . 37--48 Mohammad Alizadeh and Abdul Kabbani and Berk Atikoglu and Balaji Prabhakar Stability analysis of QCN: the averaging principle . . . . . . . . . . . . . . . 49--60 Vinay Joseph and Gustavo de Veciana Stochastic networks with multipath flow control: impact of resource pools on flow-level performance and network congestion . . . . . . . . . . . . . . . 61--72 Mohammad Alizadeh and Adel Javanmard and Balaji Prabhakar Analysis of DCTCP: stability, convergence, and fairness . . . . . . . 73--84 Jinho Suh and Mehrtash Manoochehri and Murali Annavaram and Michel Dubois Soft error benchmarking of L2 caches with PARMA . . . . . . . . . . . . . . . 85--96 Martin Suchara and Dahai Xu and Robert Doverspike and David Johnson and Jennifer Rexford Network architecture for joint failure recovery and traffic engineering . . . . 97--108 Dinesh Subhraveti and Jason Nieh Record and transplay: partial checkpointing for replay debugging across heterogeneous systems . . . . . . 109--120 John N. Tsitsiklis and Kuang Xu On the power of (even a little) centralization in distributed processing 121--132 Thanh Nguyen and Milan Vojnovic Weighted proportional allocation . . . . 133--144 Samuli Aalto and Aleksi Penttinen and Pasi Lassila and Prajwal Osti On the optimal trade-off between SRPT and opportunistic scheduling . . . . . . 145--155 Edith Cohen and Graham Cormode and Nick Duffield Structure-aware sampling on data streams 157--168 Satish Babu Korada and Andrea Montanari and Sewoong Oh Gossip PCA . . . . . . . . . . . . . . . 169--180 Rahul Urgaonkar and Bhuvan Urgaonkar and Michael J. Neely and Anand Sivasubramaniam Optimal power cost management using stored energy in data centers . . . . . 181--192 Zhenhua Liu and Minghong Lin and Adam Wierman and Steven H. Low and Lachlan L. H. Andrew Greening geographical load balancing . . 193--204 Giang T. K. Nguyen and Rachit Agarwal and Junda Liu and Matthew Caesar and P. Brighten Godfrey and Scott Shenker Slick packets . . . . . . . . . . . . . 205--216 Simon S. Lam and Chen Qian Geographic routing in $d$-dimensional spaces with guaranteed delivery and low stretch . . . . . . . . . . . . . . . . 217--228 Eric Rozner and Mi Kyung Han and Lili Qiu and Yin Zhang Model-driven optimization of opportunistic routing . . . . . . . . . 229--240 Maciej Kurant and Minas Gjoka and Carter T. Butts and Athina Markopoulou Walking on a graph with a magnifying glass: stratified sampling via weighted random walks . . . . . . . . . . . . . . 241--252 Animashree Anandkumar and Avinatan Hassidim and Jonathan Kelner Topology discovery of sparse random graphs with few participants . . . . . . 253--264 M. Zubair Shafiq and Lusheng Ji and Alex X. Liu and Jia Wang Characterizing and modeling Internet traffic dynamics of cellular devices . . 265--276 Qiang Xu and Junxian Huang and Zhaoguang Wang and Feng Qian and Alexandre Gerber and Zhuoqing Morley Mao Cellular data network infrastructure characterization and implication on mobile content placement . . . . . . . . 277--288 Myungjin Lee and Sharon Goldberg and Ramana Rao Kompella and George Varghese Fine-grained latency and loss measurements in the presence of reordering . . . . . . . . . . . . . . . 289--300 Xia Zhou and Stratis Ioannidis and Laurent Massoulie On the stability and optimality of universal swarms . . . . . . . . . . . . 301--312 Patrick J. Eibl and Albert Meixner and Daniel J. Sorin An FPGA-based experimental evaluation of microprocessor core error detection with Argus-2 . . . . . . . . . . . . . . . . 313--314 Lele Zhang and Darryl Veitch and Kotagiri Ramamohanarao The role of KL divergence in anomaly detection . . . . . . . . . . . . . . . 315--316 Elie Krevat and Tomer Shiran and Eric Anderson and Joseph Tucek and Jay J. Wylie and Gregory R. Ganger Applying idealized lower-bound runtime models to understand inefficiencies in data-intensive computing . . . . . . . . 317--318 Jinyoung Han and Taejoong Chung and Seungbae Kim and Ted Taekyoung Kwon and Hyun-chul Kim and Yanghee Choi How prevalent is content bundling in BitTorrent? . . . . . . . . . . . . . . 319--320 Jia Rao and Xiangping Bu and Kun Wang and Cheng-Zhong Xu Self-adaptive provisioning of virtualized resources in cloud computing 321--322 Chao Li and Amer Qouneh and Tao Li Characterizing and analyzing renewable energy driven data centers . . . . . . . 323--324 Varun Gupta and Takayuki Osogami Tight moments-based bounds for queueing systems . . . . . . . . . . . . . . . . 325--326 Suk-Bok Lee and Dan Pei and MohammadTaghi Hajiaghayi and Ioannis Pefkianakis and Songwu Lu and He Yan and Zihui Ge and Jennifer Yates and Mario Kosseifi Scalable monitoring via threshold compression in a large operational $3$G network . . . . . . . . . . . . . . . . 327--328 Vijay Kumar Adhikari and Sourabh Jain and Yingying Chen and Zhi-Li Zhang How do you 'Tube'? . . . . . . . . . . . 329--330 Krishna Kant A control scheme for batching DRAM requests to improve power efficiency . . 331--332 Hao Zhang and Ziyu Shao and Minghua Chen and Kannan Ramchandran Optimal neighbor selection in BitTorrent-like peer-to-peer networks 333--334 Sunghwan Ihm and Vivek S. Pai Towards understanding modern Web traffic 335--336 Aditya Akella and Shuchi Chawla and Holly Esquivel and Chitra Muthukrishnan De-ossifying Internet routing through intrinsic support for end-network and ISP selfishness . . . . . . . . . . . . 337--338 Yu-Ju Hong and Jiachen Xue and Mithuna Thottethodi Dynamic server provisioning to minimize cost in an IaaS cloud . . . . . . . . . 339--340 Sadagopan Srinivasan and Ravishankar Iyer and Li Zhao and Ramesh Illikkal HeteroScouts: hardware assist for OS scheduling in heterogeneous CMPs . . . . 341--342 Bruno Ribeiro and Daniel Figueiredo and Edmundo de Souza e Silva and Don Towsley Characterizing continuous-time random walks on dynamic networks . . . . . . . 343--344 Jian Chen and Lizy Kurian John Autocorrelation analysis: a new and improved method for measuring branch predictability . . . . . . . . . . . . . 345--346 Satinder Pal Singh and Randolph Baden and Choon Lee and Bobby Bhattacharjee and Richard La and Mark Shayman IP geolocation in metropolitan areas . . 347--348 Jay Chen and Janardhan Iyengar and Lakshminarayanan Subramanian and Bryan Ford TCP behavior in sub packet regimes . . . 349--350 Rhys Alistair Bowden and Matthew Roughan and Nigel Bean Network link tomography and compressive sensing . . . . . . . . . . . . . . . . 351--352 Ajay Gulati and Irfan Ahmad Storage technologies, management and troubleshooting in virtualized datacenters . . . . . . . . . . . . . . 353--354 Sudipta Sengupta Cloud data center networks: technologies, trends, and challenges . . 355--356 Giuliano Casale Building accurate workload models using Markovian arrival processes . . . . . . 357--358 Florin Ciucu Non-asymptotic capacity and delay analysis of mobile wireless networks . . 359--360
Ahmed Elmokashfi and Amund Kvalbein and Constantine Dovrolis SIMROT: a scalable inter-domain routing toolbox . . . . . . . . . . . . . . . . 4--13 Aritra Sen and Ankit Garg and Akshat Verma and Tapan Nayak CloudBridge: on integrated hardware-software consolidation . . . . 14--25 Jayakrishnan Nair and Adam Wierman and Bert Zwart Exploiting network effects in the provisioning of large scale systems . . 26--28 James Nightingale and Qi Wang and Christos Grecos Performance evaluation of scalable video streaming in multihomed mobile networks 29--31 N. Bouman and S. C. Borst and J. S. H. van Leeuwaarden Delay performance of backlog based random access . . . . . . . . . . . . . 32--34 Seva Shneer and Peter M. van de Ven Comparing slotted and continuous CSMA: throughputs and fairness . . . . . . . . 35--37 Evgeny Shvets and Andrey Lyakhov and Alexander Safonov and Evgeny Khorov Analytical model of IEEE 802.11s MCCAbased streaming in the presence of noise . . . . . . . . . . . . . . . . . 38--40 U. Ayesta and A. Izagirre and I. M. Verloop Heavy traffic analysis of the discriminatory random-order-of-service discipline . . . . . . . . . . . . . . . 41--43 M. A. A. Boon and R. D. van der Mei and E. M. M. Winands Queueing networks with a single shared server: light and heavy traffic . . . . 44--46 Maria Frolkova and Josh Reed and Bert Zwart Fixed-point approximations of bandwidth sharing networks with rate constraints 47--49 Maria Dolores Cano Improving path failure detection in SCTP using adaptive heartbeat time intervals 50--52 Nuutti Varis and Jukka Manner In the network: Sandy Bridge versus Nehalem . . . . . . . . . . . . . . . . 53--55 Jonatha Anselmi Anselmi and Bruno Gaujal On the efficiency of perfect simulation in monotone queueing networks . . . . . 56--58 Y. M. Baryshnikov and E. G. Coffman and K. J. Kwak CAUCHY localization: a distributed computation of WSNs . . . . . . . . . . 59--61 Oana Goga and Patrick Loiseau and Paulo Gonçalves On the impact of the flow size distribution's tail index on network performance with TCP connections . . . . 62--64 B. Van Houdt Load balancing and the power of preventive probing . . . . . . . . . . . 65--67 Eitan Altman and Rachid El Azouzi and Daniel S. Menasché and Yuedong Xu Poster: Aging control for smartphones in hybrid networks . . . . . . . . . . . . 68--68 Hossein Kaffash Bokharaei and Yashar Ganjali and Ram Keralapura and Antonio Nucci Poster: Telephony network characterization for spammer identification . . . . . . . . . . . . . 69--69 Joost Bosman and Rob van der Mei and Gerard Hoekstra Poster: Optimal dispatching policies for parallel processor sharing nodes with partial information . . . . . . . . . . 70--70 Ke Dong and Diptanil DebBarma and R. Venkatesha and Prasad Cheng Guo Poster: Performance study of clustering of Zigbee devices in OPNET . . . . . . . 71--71 Ralf Lübben and Markus Fidler Poster: On the capacity delay error tradeoff of source coding . . . . . . . 72--72 Vladimir Marbukh Poster: Tcp effective bandwidth and Internet performance . . . . . . . . . . 73--73 William A. Massey and Jamol Pender Poster: Skewness variance approximation for dynamic rate MultiServer queues with abandonment . . . . . . . . . . . . . . 74--74 Ashikur Rahman and Carey Williamson Poster: $ \Delta $-Graphs: flexible topology control in wireless ad hoc networks . . . . . . . . . . . . . . . . 75--75 Ashikur Rahman and Hanan Shpungin and Carey Williamson Poster: On capacity maximization in wireless relay networks . . . . . . . . 76--76 Paolo Romano and Matteo Leonetti Poster: Selftuning batching in total order broadcast via analytical modelling and reinforcement learning . . . . . . . 77--77 Zhichao Yan and Dan Feng and Yujuan Tan Poster: Dissection the version management schemes in hardware transactional memory systems . . . . . . 78--78
Ricardo M. Czekster and Paulo Fernandes and Thais Webber Efficient vector-descriptor product exploiting time-memory trade-offs! . . . 2--9 David J. Lilja and Raffaela Mirandola and Kai Sachs Paper abstracts of the second international conference on performance engineering (ICPE 2011) . . . . . . . . 2--9 Mark S. Squillante Instrumentation-based tool for latency measurements (abstracts only) . . . . . 20--20 Dimitri Papadimitriou and Florin Coras and Albert Cabellos Path-vector routing stability analysis 22--24 Haotian Zhao and Yinlong Xu A deterministic algorithm of single failed node recovery in MSR-based distributed storage systems . . . . . . 25--27 Siddharth Garg and Shreyas Sundaram and Hiren D. Patel Robust heterogeneous data center design: a principled approach . . . . . . . . . 28--30 Ali Tizghadam and Alberto Leon-Garcia and Hassan Naser On robust wireless network optimization using network criticality . . . . . . . 31--33 Marc Lelarge Diffusion and cascading behavior in random networks . . . . . . . . . . . . 34--36 Omer H. Abdelrahman and Erol Gelenbe Search in non-homogeneous random environments? . . . . . . . . . . . . . 37--39 Hanhua Feng and Parijat Dube and Li Zhang On estimation problems for the $ G / G / \infty $ Queue . . . . . . . . . . . . . 40--42 Sherwin Doroudi and Ragavendran Gopalakrishnan and Adam Wierman Dispatching to incentivize fast service in multi-server queues . . . . . . . . . 43--45 Osman T. Akgun and Rhonda Righter and Ronald Wolff The power of partial power of two choices . . . . . . . . . . . . . . . . 46--48 Ranjan Pal and Sokol Kosta and Pan Hui Settling for less: a QoS compromise mechanism for opportunistic mobile networks . . . . . . . . . . . . . . . . 49--51 Zichao Yang and John C. S. Lui Investigating the effect of node heterogeneity and network externality on security adoption . . . . . . . . . . . 52--54 Daniel Sadoc Menasché and Antonio A. de A. Rocha and Edmundo A. de Souza e Silva and Don Towsley and Rosa M. Meri Leäo Implications of peer selection strategies by publishers on the performance of P2P swarming systems . . 55--57 Samuli Aalto and Pasi Lassila and Petri Savolainen and Sasu Tarkoma How impatience affects the performance and scalability of P2P video-on-demand systems . . . . . . . . . . . . . . . . 58--60 Martin Arlitt and Niklas Carlsson and Jerry Rolia Proceedings of the 2011 GreenMetrics workshop . . . . . . . . . . . . . . . . 58--60 Zhenhua Liu and Minghong Lin and Adam Wierman and Steven H. Low and Lachlan L. H. Andrew Geographical load balancing with renewables . . . . . . . . . . . . . . . 62--66 Eitan Altman and Manjesh K. Hanawal and Rachid ElAzouzi and Sholomo Shamai Tradeoffs in green cellular networks . . 67--71 Andrew Sucevic and Lachlan L. H. Andrew and Thuy T. T. Nguyen Powering down for energy efficient peer-to-peer file distribution . . . . . 72--76 Michael Brown and Jose Renau ReRack: power simulation for data centers with renewable energy generation 77--81 Feng Yan and Xenia Mountrouidou and Alma Riska and Evgenia Smirni Copy rate synchronization with performance guarantees for work consolidation in storage clusters . . . 82--86 Vishal Gupta and Ripal Nathuji and Karsten Schwan An analysis of power reduction in datacenters using heterogeneous chip multiprocessors . . . . . . . . . . . . 87--91 Giuliano Casale and Ioan Raicu HPDC/SIGMETRICS student research posters 92--96 Doron Chen and Ealan Henis and Ronen I. Kat and Dmitry Sotnikov and Cinzia Cappiello and Alexandre Mello Ferreira and Barbara Pernici and Monica Vitali and Tao Jiang and Jia Liu and Alexander Kipp Usage centric green performance indicators . . . . . . . . . . . . . . . 92--96 Yuanrui Zhang and Jun Liu and Sai Prashanth Muralidhara and Mahmut Kandemir BrickX: building hybrid systems for recursive computations . . . . . . . . . 98--100 Jeremy Blackburn and Ramanuja Simha and Clayton Long and Xiang Zuo and Nicolas Kourtellis and John Skvoretz and Adriana Iamnitchi Cheaters in a gaming social network . . 101--103 Anton Stefanek and Richard A. Hayden and Jeremy T. Bradley Fluid computation of the performance: energy tradeoff in large scale Markov models . . . . . . . . . . . . . . . . . 104--106 Shingyu Kim and Junghee Won and Hyuck Han and Hyeonsang Eom and Heon Y. Yeom Improving Hadoop performance in intercloud environments . . . . . . . . 107--109 Yong Oh Lee Improving performance and energy savings through alternative forwarding . . . . . 110--112 Seungmi Choi and Shingyu Kim and Hyuck Han and Heon Y. Yeom Improving performance of MapReduce framework on InterCloud by avoiding transmission of unnecessary data . . . . 113--115 Hrishikesh Gadre and Ivan Rodero and Manish Parashar Investigating MapReduce framework extensions for efficient processing of geographically scattered datasets . . . 116--118 Richard A. Hayden Mean-field approximations for performance models with generally-timed transitions . . . . . . . . . . . . . . 119--121 Rohan Gandhi and Dimitrios Koutsonikolas and Y. Charlie Hu Multicasting MDC videos to receivers with different screen resolution . . . . 122--124 Lina Sawalha and Monte P. Tull and Ronald D. Barnes Thread scheduling for heterogeneous multicore processors using phase identification . . . . . . . . . . . . . 125--127 Tonglin Li and Raman Verma and Xi Duan and Hui Jin and Ioan Raicu Exploring distributed hash tables in HighEnd computing . . . . . . . . . . . 128--130
Philip F. Burdette and William F. Jones and Brian C. Blose and Gregory M. Kapfhammer An empirical comparison of Java remote communication primitives for intra-node data transmission . . . . . . . . . . . 2--11 Sathish Gopalakrishnan Sharp utilization thresholds for some realtime scheduling problems . . . . . . 12--22 Edward G. Coffman Synthesis of local-rule processes: successes and challenges (abstract only) 24--24 Steven S. G. Kou First passage times and option pricing under a mixed-exponential jump diffusion model (abstract only) . . . . . . . . . 24--24 Marcel F. Neuts The algorithmization of mathematics: the story of stochastic models (abstract only) . . . . . . . . . . . . . . . . . 24--24 Devavrat Shah Product-form distributions and network algorithms (abstract only) . . . . . . . 24--24 Jung Woo Baek and Ho Woo Lee and Se Won Lee and Soohan Ahn Factorization properties for a MAP-modulated fluid flow model under server vacation policies (abstract only) 25--25 Mogens Bladt and Luz Judith R. Esparza and Bo Friis Nielsen Bilateral matrix-exponential distributions (abstract only) . . . . . 25--25 Mogens Bladt and Bo Friis Nielsen Moment distributions of phase-type (abstract only) . . . . . . . . . . . . 25--26 Steve Drekic and David Stanford and Douglas Woolford A self-promoting priority model for transplant queues (abstract only) . . . 26--26 Mark Fackrell Characterizing matrix-exponential distributions of order $4$ (abstract only) . . . . . . . . . . . . . . . . . 26--26 Sophie Hautphenne An EM algorithm for the model fitting of Markovian binary trees (abstract only) 26--27 Sophie Hautphenne and Guy Latouche and Giang T. Nguyen Markovian trees subject to catastrophes: would they survive forever? (abstract only) . . . . . . . . . . . . . . . . . 27--27 Qi-Ming He and Jiandong Ren On a discrete multi-variate phase-type distribution and its applications (abstract only) . . . . . . . . . . . . 27--27 Qi-Ming He and Hanqin Zhang and Juan Vera Majorization and Extremal PH-Distributions (abstract only) . . . . 27--27 Gábor Horváth and Miklós Telek Acceptance-rejection methods for generating random variates from matrix exponential distributions and rational arrival processes (abstract only) . . . 27--27 Masahiro Kobayashi and Yutaka Sakuma and Masakiyo Miyazawa Tail asymptotics of the stationary distribution for M/M-JSQ with $k$ parallel queues (abstract only) . . . . 28--28 A. Krishnamoorthy and Viswanath C. Narayanan Stochastic decomposition in production inventory with service time (abstract only) . . . . . . . . . . . . . . . . . 28--28 Guy Latouche and Giang T. Nguyen and Zbigniew Palmowski Two-dimensional fluid queues with temporary assistance (abstract only) . . 28--28 V. Ramaswami A fluid introduction to Brownian motion & stochastic integration (abstract only) 29--29 Nikki Sonenberg and Peter G. Taylor A network of fluid models and its application in MANETs (abstract only) 29--29 David Stanford and Peter G. Taylor and Ilze Ziedins A new paradigm for priority patient selection (abstract only) . . . . . . . 29--29 Hiroshi Toyoizumi and Jeremy Field Analysis of the dynamics of social queues by quasi-birth-and-death processes (abstract only) . . . . . . . 29--30 B. Van Houdt and J. F. Pérez The impact of dampening demand variability in a production/inventory system with multiple retailers (abstract only) . . . . . . . . . . . . . . . . . 30--30 Nigel G. Bean and Bo Friis Nielsen Analysis of queues with rational arrival process components: a general approach 31--31 Nigel G. Bean and Ma\lgorzata M. O'Reilly A stochastic fluid model driven by an uncountable-state process, which is a stochastic fluid model itself: the stochastic fluid-fluid model . . . . . . 32--32 Dario A. Bini and Paola Favati and Beatrice Meini A compressed cyclic reduction for QBDs with low rank upper and lower transitions . . . . . . . . . . . . . . 33--33 Mogens Bladt and Bo Friis Nielsen An overview of multivariate gamma distributions as seen from a (multivariate) matrix exponential perspective . . . . . . . . . . . . . . 34--34 Jose Blanchet and Jing Dong Rare-event simulation for multi-server queues in the Halfin--Whitt regime . . . 35--35 Giuliano Casale and Peter G. Harrison and Maria Grazia Vigliotti Product-form approximation of queueing networks with phase-type service . . . . 36--36 J. G. Dai and Shuangchi He Numerical analysis for diffusion models of GI/Ph/n $+$ GI queues . . . . . . . . 37--37 Eric V. Denardo and Eugene A. Feinberg and Uriel G. Rothblum Splitting in a finite Markov decision problem . . . . . . . . . . . . . . . . 38--38 Eric V. Denardo and Eugene A. Feinberg and Uriel G. Rothblum The multi-armed bandit, with constraints 39--39 S. Dendievel and G. Latouche and M-A. Remiche Stationary distribution of a perturbed QBD process . . . . . . . . . . . . . . 40--40 Maria Govorun and Guy Latouche and Marie-Ange Remiche Profits and risks of pension plans . . . 41--41 Masahiro Kobayashi and Masakiyo Miyazawa Revisit to the tail asymptotics of the double QBD process by the analytic function method . . . . . . . . . . . . 42--42 Yunan Liu and Ward Whitt A fluid model for many-server queues with time-varying arrivals and phase-type service distribution . . . . 43--43 Barbara Margolius Numerical study of Markovian arrival processes (MAP) with time-varying periodic arrival rates . . . . . . . . . 44--44 Ma\lgorzata M. O'Reilly and Nigel G. Bean Stochastic 2-dimensional fluid model . . 45--45 D. Bini and B. Meini and S. Steffé and J. F. Pérez and B. Van Houdt SMCSolver and Q-MAM: tools for matrix-analytic methods . . . . . . . . 46--46 Giuliano Casale and Evgenia Smirni KPC-toolbox: fitting Markovian arrival processes and phase-type distributions with MATLAB . . . . . . . . . . . . . . 47--47 Marco Cote and German Riano and Raha Akhavan-Tabatabaei and Juan Fernando Perez and Andres Sarmiento and Julio Goez jMarkov package: a stochastic modeling tool . . . . . . . . . . . . . . . . . . 48--48 Sara Casolari and Michele Colajanni and Stefania Tosi Selective resource characterization for evaluation of system dynamics . . . . . 51--60 Giuseppe Aceto and Antonio Pescap\`e On the recent use of email through traffic and network analysis: the impact of OSNs, new trends, and other communication platforms . . . . . . . . 61--70 Salvatore Distefano and Antonio Puliafito and Kishor S. Trivedi Dynamic aspects and behaviors of complex systems in performance and reliability assessment . . . . . . . . . . . . . . . 71--78 Nidhal Mahmud and Martin Walker and Yiannis Papadopoulos Compositional synthesis of temporal fault trees from state machines . . . . 79--88 Marco Abundo and Valeria Cardellini and Francesco Lo Presti Admission control policies for a multi-class QoS-aware service oriented architecture . . . . . . . . . . . . . . 89--98 Vittoria de Nitto Person\`a Heuristics for QoS maintenance: adaptive policies in differentiated services wireless networks . . . . . . . . . . . 99--107 Emmanuelle Anceaume and Romaric Ludinard and Bruno Sericola Performance evaluation of large-scale dynamic systems . . . . . . . . . . . . 108--117
Naresh M. Patel Performance implications of flash and storage class memories . . . . . . . . . 1--2 Zhen Liu High-performance computing in mobile services . . . . . . . . . . . . . . . . 3--4 Jian Tan and Xiaoqiao Meng and Li Zhang Delay tails in MapReduce scheduling . . 5--16 Devavrat Shah and Neil Walton and Yuan Zhong Optimal queue-size scaling in switched networks . . . . . . . . . . . . . . . . 17--28 Esa Hyytiä and Samuli Aalto and Aleksi Penttinen Minimizing slowdown in heterogeneous size-aware dispatching systems . . . . . 29--40 Mathieu Leconte and Marc Lelarge and Laurent Massoulié Bipartite graph structures for efficient balancing of heterogeneous loads . . . . 41--52 Berk Atikoglu and Yuehai Xu and Eitan Frachtenberg and Song Jiang and Mike Paleczny Workload analysis of a large-scale key-value store . . . . . . . . . . . . 53--64 Muhammad Zubair Shafiq and Lusheng Ji and Alex X. Liu and Jeffrey Pang and Jia Wang A first look at cellular machine-to-machine traffic: large scale measurement and characterization . . . . 65--76 Jinyoung Han and Seungbae Kim and Taejoong Chung and Ted Taekyoung Kwon and Hyun-chul Kim and Yanghee Choi Bundling practice in BitTorrent: what, how, and why . . . . . . . . . . . . . . 77--88 Lingwen Gan and Anwar Walid and Steven Low Energy-efficient congestion control . . 89--100 Predrag R. Jelenkovic and Evangelia D. Skiani Uniform approximation of the distribution for the number of retransmissions of bounded documents . . 101--112 Benny Van Houdt and Luca Bortolussi Fluid limit of an asynchronous optical packet switch with shared per link full range wavelength conversion . . . . . . 113--124 Nan Hua and Ashwin Lall and Baochun Li and Jun Xu Towards optimal error-estimating codes through the lens of Fisher information analysis . . . . . . . . . . . . . . . . 125--136 Ashish Vulimiri and Gul A. Agha and Philip Brighten Godfrey and Karthik Lakshminarayanan How well can congestion pricing neutralize denial of service attacks? 137--150 Di Niu and Chen Feng and Baochun Li Pricing cloud bandwidth reservations under demand uncertainty . . . . . . . . 151--162 Nosayba El-Sayed and Ioan A. Stefanovici and George Amvrosiadis and Andy A. Hwang and Bianca Schroeder Temperature management in data centers: why some (might) like it hot . . . . . . 163--174 Zhenhua Liu and Yuan Chen and Cullen Bash and Adam Wierman and Daniel Gmach and Zhikui Wang and Manish Marwah and Chris Hyser Renewable and cooling aware workload management for sustainable data centers 175--186 Di Wang and Chuangang Ren and Anand Sivasubramaniam and Bhuvan Urgaonkar and Hosam Fathy Energy storage in datacenters: what, where, and how much? . . . . . . . . . . 187--198 Devavrat Shah and Tauhid Zaman Rumor centrality: a universal source detector . . . . . . . . . . . . . . . . 199--210 Praneeth Netrapalli and Sujay Sanghavi Learning the graph of epidemic cascades 211--222 Chris Milling and Constantine Caramanis and Shie Mannor and Sanjay Shakkottai Network forensics: random infection vs spreading epidemic . . . . . . . . . . . 223--234 Hyojun Kim and Moonkyung Ryu and Umakishore Ramachandran What is a good buffer cache replacement scheme for mobile flash storage? . . . . 235--246 Mohammad Alizadeh and Adel Javanmard and Shang-Tse Chuang and Sundar Iyer and Yi Lu Versatile refresh: low complexity refresh scheduling for high-throughput multi-banked eDRAM . . . . . . . . . . . 247--258 Suparna Bhattacharya and Karthick Rajamani and K. Gopinath and Manish Gupta Does lean imply green?: a study of the power performance implications of Java runtime bloat . . . . . . . . . . . . . 259--270 Seung-Hwan Lim and Jae-Seok Huh and Youngjae Kim and Galen M. Shipman and Chita R. Das D-factor: a quantitative model of application slow-down in multi-resource shared systems . . . . . . . . . . . . . 271--282 Wucherl Yoo and Kevin Larson and Lee Baugh and Sangkyum Kim and Roy H. Campbell ADP: automated diagnosis of performance pathologies using hardware events . . . 283--294 Di Xu and Chenggang Wu and Pen-Chung Yew and Jianjun Li and Zhenjiang Wang Providing fairness on shared-memory multiprocessors via process scheduling 295--306 Daniel Figueiredo and Philippe Nain and Bruno Ribeiro and Edmundo de Souza e Silva and Don Towsley Characterizing continuous time random walks on time varying graphs . . . . . . 307--318 Chul-Ho Lee and Xin Xu and Do Young Eun Beyond random walk and Metropolis--Hastings samplers: why you should not backtrack for unbiased graph sampling . . . . . . . . . . . . . . . . 319--330 Han Hee Song and Berkant Savas and Tae Won Cho and Vacha Dave and Zhengdong Lu and Inderjit S. Dhillon and Yin Zhang and Lili Qiu Clustered embedding of massive social networks . . . . . . . . . . . . . . . . 331--342 Edith Cohen and Graham Cormode and Nick Duffield Don't let the negatives bring you down: sampling from streams of signed updates 343--354 Ammar Ammar and Devavrat Shah Efficient rank aggregation using partial data . . . . . . . . . . . . . . . . . . 355--366 Nick Duffield Fair sampling across network flow measurements . . . . . . . . . . . . . . 367--378 Kunyang Peng and Qunfeng Dong TCAM-based NFA implementation . . . . . 379--380 Elliot Anshelevich and Ameya Hate and Koushik Kar and Michael Usher Stable and efficient pricing for inter-domain traffic forwarding . . . . 381--382 Lucas DiCioccio and Renata Teixeira and Catherine Rosenberg Measuring and characterizing home networks . . . . . . . . . . . . . . . . 383--384 Joel Sommers and Paul Barford Comparing metro-area cellular and WiFi performance: extended abstract . . . . . 385--386 Gábor Németh and Gábor Rétvári Towards a statistical characterization of the competitiveness of oblivious routing . . . . . . . . . . . . . . . . 387--388 Sajjad Zarifzadeh and Madhwaraj G. K. and Constantine Dovrolis Range tomography . . . . . . . . . . . . 389--390 Myungjin Lee and Nick Duffield and Ramana Rao Kompella A scalable architecture for maintaining packet latency measurements . . . . . . 391--392 Markus Laner and Philipp Svoboda and Markus Rupp Modeling randomness in network traffic 393--394 Massimo Gallo and Bruno Kauffmann and Luca Muscariello and Alain Simonian and Christian Tanguy Performance evaluation of the random replacement policy for networks of caches . . . . . . . . . . . . . . . . . 395--396 Koyel Mukherjee and Samir Khuller and Amol Deshpande Saving on cooling: the thermal scheduling problem . . . . . . . . . . . 397--398 Shreeshankar Bodas and Devavrat Shah and Damon Wischik Congestion control meets medium access: throughput, delay, and complexity . . . 399--400 Asser N. Tantawi Optimized cloud placement of virtual clusters using biased importance sampling . . . . . . . . . . . . . . . . 401--402 Kai Shen and Arrvindh Shriraman and Sandhya Dwarkadas and Xiao Zhang Power and energy containers for multicore servers . . . . . . . . . . . 403--404 Kai Wang and Minghong Lin and Florin Ciucu and Adam Wierman and Chuang Lin Characterizing the impact of the workload on the value of dynamic resizing in data centers . . . . . . . . 405--406 Yue Tan and Yingdong Lu and Cathy H. Xia Provisioning for large scale cloud computing services . . . . . . . . . . . 407--408 Srinivas Narayana and Joe Wenjie Jiang and Jennifer Rexford and Mung Chiang Distributed wide-area traffic management for cloud services . . . . . . . . . . . 409--410 Advait Abhay Dixit and Pawan Prakash and Ramana Rao Kompella and Charlie Hu On the efficacy of fine-grained traffic splitting protocols in data center networks . . . . . . . . . . . . . . . . 411--412 Benjamin Frank and Ingmar Poese and Georgios Smaragdakis and Steve Uhlig and Anja Feldmann Content-aware traffic engineering . . . 413--414 Jian Hu and Hong Jiang and Prakash Manden Understanding performance anomalies of SSDs and their impact in enterprise application environment . . . . . . . . 415--416 Eduard Glatz and Xenofontas Dimitropoulos Classifying Internet one-way traffic . . 417--418 Manish Arora and Feng Wang and Bob Rychlik and Dean Tullsen Fast cost efficient designs by building upon the Plackett and Burman method . . 419--420 Matthias Keller and Jan Beutel and Lothar Thiele Multi-hop network tomography: path reconstruction and per-hop arrival time estimation from partial information . . 421--422 Ioannis Papapanagiotou and Erich M. Nahum and Vasileios Pappas Smartphones vs. laptops: comparing Web browsing behavior and the implications for caching . . . . . . . . . . . . . . 423--424 Philipp Reinecke and Miklós Telek and Katinka Wolter Micro and macro views of discrete-state Markov models and their application to efficient simulation with phase-type distributions . . . . . . . . . . . . . 425--426 Ramon Bertran and Marc Gonz\`alez and Xavier Martorell and Nacho Navarro and Eduard Ayguadé POTRA: a framework for building power models for next generation multicore architectures . . . . . . . . . . . . . 427--428 Richard A. Hayden Basic theory and some applications of martingales . . . . . . . . . . . . . . 429--430 Edmundo de Souza e Silva and Daniel Sadoc Menasche Applications of machine learning to performance evaluation . . . . . . . . . 431--432 Jay Aikat and Kevin Jeffay Introduction to network experiments using the GENI cyberinfrastructure . . . 433--434
Brian Eriksson and Paul Barford and Bruce Maggs and Robert Nowak Posit: a lightweight approach for IP geolocation . . . . . . . . . . . . . . 2--11 Pierre Coucheney and Patrick Maillé and Bruno Tuffin Comparison of search engines non-neutral and neutral behaviors . . . . . . . . . 14--17 Manjesh K. Hanawal and Eitan Altman and Rajesh Sundaresan Game theoretic analysis of collusions in nonneutral networks . . . . . . . . . . 18--21 Seung Min Yu and Seong-Lyun Kim Guaranteeing user welfare in network service: comparison of two subsidy schemes . . . . . . . . . . . . . . . . 22--25 R. Berry and M. Honig and T. Nguyen and V. Subramanian and H. Zhou and R. Vohra Newsvendor model of capacity sharing . . 26--29 Richard T. B. Ma and Dah Ming Chiu and John C. S. Lui and Vishal Misra and Dan Rubenstein Price differentiation in the Kelly mechanism . . . . . . . . . . . . . . . 30--33 Zied Ben Houidi and Helia Pouyllau The price of tussles: bankrupt in cyberspace? . . . . . . . . . . . . . . 34--37 Aemen Lodhi and Amogh Dhamdhere and Constantine Dovrolis Peering strategy adoption by transit providers in the Internet: a game theoretic approach? . . . . . . . . . . 38--41 Loretta Mastroeni and Maurizio Naldi Pricing of insurance policies against cloud storage price rises . . . . . . . 42--45 Dongmyung Lee and Jeonghoon Mo and Jinwoo Park ISP vs. ISP $+$ CDN: can ISPs in duopoly profit by introducing CDN services? . . 46--48 András Gulyás and Attila Korösi and Dávid Szabó and Gergely Biczók On greedy network formation . . . . . . 49--52 Lavanya Ramakrishnan and R. Shane Canon and Krishna Muriki and Iwona Sakrejda and Nicholas J. Wright Evaluating Interconnect and Virtualization Performance for High Performance Computing . . . . . . . . . 55--60 G. R. Mudalige and M. B. Giles and C. Bertolli and P. H. J. Kelly Predictive modeling and analysis of OP2 on distributed memory GPU clusters . . . 61--67 Gabriel Mateescu and Gregory H. Bauer and Robert A. Fiedler Optimizing matrix transposes using a POWER7 cache model and explicit prefetching . . . . . . . . . . . . . . 68--73 Anthony Danalis and Piotr Luszczek and Gabriel Marin and Jeffrey S. Vetter and Jack Dongarra BlackjackBench: portable hardware characterization . . . . . . . . . . . . 74--79 Adrian Tineo and Sadaf R. Alam and Thomas C. Schulthess Towards autotuning by alternating communication methods . . . . . . . . . 80--85 Roman Iakymchuk and Paolo Bientinesi Modeling performance through memory-stalls . . . . . . . . . . . . . 86--91 Hongzhang Shan and Nicholas J. Wright and John Shalf and Katherine Yelick and Marcus Wagner and Nathan Wichmann A preliminary evaluation of the hardware acceleration of the Cray Gemini interconnect for PGAS languages and comparison with MPI . . . . . . . . . . 92--98 Vivek Deshpande and Xing Wu and Frank Mueller Auto-generation of communication benchmark traces . . . . . . . . . . . . 99--105 ChunYi Su and Dong Li and Dimitrios S. Nikolopoulos and Matthew Grove and Kirk Cameron and Bronis R. de Supinski Critical path-based thread placement for NUMA systems . . . . . . . . . . . . . . 106--112 DongJin Lee and Michael O'Sullivan and Cameron Walker Benchmarking and modeling disk-based storage tiers for practical storage design . . . . . . . . . . . . . . . . . 113--118 Lingyuan Wang and Miaoqing Huang and Tarek El-Ghazawi Towards efficient GPU sharing on multicore processors . . . . . . . . . . 119--124 Xian-He Sun and Dawei Wang APC: a performance metric of memory systems . . . . . . . . . . . . . . . . 125--130
Roberto Vitali and Alessandro Pellegrini and Francesco Quaglia Load sharing for optimistic parallel simulations on multi core machines . . . 2--11 Marcus Hähnel and Björn Döbel and Marcus Völp and Hermann Härtig Measuring energy consumption for short code paths using RAPL . . . . . . . . . 13--17 Michele Mazzucco and Isi Mitrani Empirical evaluation of power saving policies for data centers . . . . . . . 18--22 Pooja Ghumre and Junwei Li and Mukil Kesavan and Ada Gavrilovska and Karsten Schwan Evaluating the need for complexity in energy-aware management for cloud platforms . . . . . . . . . . . . . . . 23--27 Nicolas Gast and Dan-Cristian Tomozei and Jean-Yves Le Boudec Optimal storage policies with wind forecast uncertainties . . . . . . . . . 28--32 Andrey Bernstein and Daniel Bienstock and David Hay and Meric Uzuno\uglu and Gil Zussman Sensitivity analysis of the power grid vulnerability to large-scale cascading failures . . . . . . . . . . . . . . . . 33--37 O. Ardakanian and C. Rosenberg and S. Keshav RealTime distributed congestion control for electrical vehicle charging . . . . 38--42 Omid Ardakanian and Catherine Rosenberg and S. Keshav On the impact of storage in residential power distribution systems . . . . . . . 43--47 David Chiu and Christopher Stewart and Bart McManus Electric grid balancing through low-cost workload migration . . . . . . . . . . . 48--52 Daniel S. Menasché and Rosa Maria Meri Leäo and Edmundo de Souza e Silva and Alberto Avritzer and Sindhu Suresh and Kishor Trivedi and Raymond A. Marie and Lucia Happe and Anne Koziolek Survivability analysis of power distribution in smart grids with active and reactive power modeling . . . . . . 53--57 E. G. Coffman, Jr. and Y. Kogan and W. Lai and V. Ramaswami Uptime and downtime analysis for hierarchical redundant systems in telecommunications . . . . . . . . . . . 59--61 K. Avrachenkov and U. Ayesta and J. Doncel and P. Jacko Optimal congestion control of TCP flows for Internet routers . . . . . . . . . . 62--64 Angela Schörgendorfer and Peter M. van de Ven and Bo Zhang Temporal load balancing for distributed backup scheduling . . . . . . . . . . . 65--67 Yuval Rochman and Hanoch Levy and Eli Brosh Efficient replication in multi-regional peer-supported VoD systems . . . . . . . 68--70 Christian Borgs and Jennifer T. Chayes and Sherwin Doroudi and Mor Harchol-Balter and Kuang Xu Pricing and queueing . . . . . . . . . . 71--73 Antonie S. Godtschalk and Florin Ciucu Stochastic bounds for randomized load balancing . . . . . . . . . . . . . . . 74--76 Daniel S. Myers and Mary K. Vernon Estimating queue length distributions for queues with random arrivals . . . . 77--79 Paolo Cremonesi and Andrea Sansottera Modeling response times in the Google ROADEF/EURO challenge . . . . . . . . . 80--82 Yue Tan and Yingdong Lu and Cathy H. Xia Provisioning for large scale loss network systems with applications in cloud computing . . . . . . . . . . . . 83--85 Ranjan Pal and Pan Hui CyberInsurance for cybersecurity a topological take on modulating insurance premiums . . . . . . . . . . . . . . . . 86--88 Maryam Elahi and Carey Williamson and Philipp Woelfel Meeting the fairness deadline in speed scaling systems: is turbocharging enough? . . . . . . . . . . . . . . . . 89--91 Eitan Bachmat and Assaf Natanzon Analysis of SITA queues with many servers and spacetime geometry . . . . . 92--94 Thomas Bonald and Davide Cuda RateOptimal scheduling schemes for asynchronous InputQueued packet switches 95--97 Minghong Lin and Adam Wierman and Alan Roytman and Adam Meyerson and Lachlan L. H. Andrew Online optimization with switching cost 98--100 B. Blaszczyszyn and K. Gaurav Farout vertices in weighted repeated configuration model . . . . . . . . . . 100--103 Fragkiskos Papadopoulos and Constantinos Psomas and Dmitri Krioukov Replaying the geometric growth of complex networks and application to the AS Internet . . . . . . . . . . . . . . 104--106 Ali Tizghadam and Weiwei Li and Alberto Leon-Garcia Network criticality in vehicular networks . . . . . . . . . . . . . . . . 107--109
John C. S. Lui and Li Zhang A study of pricing for cloud resources 3--12 Zhizhong Zhang and Chuan Wu and David W. L. Cheung A survey on cloud interoperability: taxonomies, standards, and practice . . 13--22 Lei Yang and Jiannong Cao and Yin Yuan and Tao Li and Andy Han and Alvin Chan A framework for partitioning and execution of data stream applications in mobile cloud computing . . . . . . . . . 23--32 Weina Wang and Kai Zhu and Lei Ying and Jian Tan and Li Zhang A throughput optimal algorithm for map task scheduling in MapReduce with data locality . . . . . . . . . . . . . . . . 33--42 Qun Huang and Patrick P. C. Lee An experimental study of cascading performance interference in a virtualized environment . . . . . . . . 43--52 Rahul Singh and Prashant Shenoy and Maitreya Natu and Vaishali Sadaphal and Harrick Vin Analytical modeling for what-if analysis in complex cloud computing applications 53--62 Jia Liu and Cathy H. Xia and Ness B. Shroff and Xiaodong Zhang On distributed computation rate optimization for deploying cloud computing programming frameworks . . . . 63--72 Giuliano Casale and Mirco Tribastone Modelling exogenous variability in cloud deployments . . . . . . . . . . . . . . 73--82 Shah Mahmood and Yvo Desmedt Two new economic models for privacy . . 84--89 Luke Hutton and Tristan Henderson An architecture for ethical and privacy-sensitive social network experiments . . . . . . . . . . . . . . 90--95 Minaxi Gupta and Yuqing (Melanie) Wu and Swapnil S. Joshi and Aparna Tiwari and Ashish Nair and Ezhilan Ilangovan On the linkability of complementary information from free versions of people databases . . . . . . . . . . . . . . . 96--100 Florian Tschorsch and Björn Scheuermann How (not) to build a transport layer for anonymity overlays . . . . . . . . . . . 101--106
Balaji Prabhakar Designing large-scale nudge engines . . 1--2 David A. Maltz Challenges in cloud scale data centers 3--4 Xia Zhou and Zengbin Zhang and Gang Wang and Xiaoxiao Yu and Ben Y. Zhao and Haitao Zheng Practical conflict graphs for dynamic spectrum distribution . . . . . . . . . 5--16 Muhammad Zubair Shafiq and Lusheng Ji and Alex X. Liu and Jeffrey Pang and Shobha Venkataraman and Jia Wang A first look at cellular network performance during crowded events . . . 17--28 Ning Ding and Daniel Wagner and Xiaomeng Chen and Abhinav Pathak and Y. Charlie Hu and Andrew Rice Characterizing and modeling the impact of wireless signal strength on smartphone battery drain . . . . . . . . 29--40 Alexander L. Stolyar and Yuan Zhong A large-scale service system with packing constraints: minimizing the number of occupied servers . . . . . . . 41--52 Lian Lu and Jinlong Tu and Chi-Kin Chau and Minghua Chen and Xiaojun Lin Online energy generation scheduling for microgrids with intermittent energy sources and co-generation . . . . . . . 53--66 Ganesha Shanmuganathan and Ajay Gulati and Peter Varman Defragmenting the cloud using demand-based resource allocation . . . . 67--80 David R. Karger and Sewoong Oh and Devavrat Shah Efficient crowdsourcing for multi-class labeling . . . . . . . . . . . . . . . . 81--92 Myunghwan Kim and Roshan Sumbaly and Sam Shah Root cause detection in a service-oriented architecture . . . . . 93--104 Aaron D. Jaggard and Swara Kopparty and Vijay Ramachandran and Rebecca N. Wright The design space of probing algorithms for network-performance measurement . . 105--116 Niek Bouman and Sem Borst and Johan van Leeuwaarden Delays and mixing times in random-access networks . . . . . . . . . . . . . . . . 117--128 Fabio Cecchi and Peter Jacko Scheduling of users with Markovian time-varying transmission rates . . . . 129--140 Florian Simatos and Niek Bouman and Sem Borst Lingering issues in distributed scheduling . . . . . . . . . . . . . . . 141--152 Anshul Gandhi and Sherwin Doroudi and Mor Harchol-Balter and Alan Scheller-Wolf Exact analysis of the M/M/k/setup class of Markov chains via recursive renewal reward . . . . . . . . . . . . . . . . . 153--166 John N. Tsitsiklis and Kuang Xu Queueing system topologies with limited flexibility . . . . . . . . . . . . . . 167--178 Yongkun Li and Patrick P. C. Lee and John C. S. Lui Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization . . . 179--190 Benny Van Houdt A mean field model for a class of garbage collection algorithms in flash-based solid state drives . . . . . 191--202 Myoungsoo Jung and Mahmut Kandemir Revisiting widely held SSD expectations and rethinking system-level implications 203--216 Marcelo Cintra and Niklas Linkewitsch Characterizing the impact of process variation on write endurance enhancing techniques for non-volatile memory systems . . . . . . . . . . . . . . . . 217--228 Abhigyan Sharma and Arun Venkataramani and Ramesh K. Sitaraman Distributing content simplifies ISP traffic engineering . . . . . . . . . . 229--242 Vytautas Valancius and Bharath Ravi and Nick Feamster and Alex C. Snoeren Quantifying the benefits of joint content and network routing . . . . . . 243--254 Dilip Nijagal Simha and Tzi-cker Chiueh and Ganesh Karuppur Rajagopalan and Pallav Bose High-throughput low-latency fine-grained disk logging . . . . . . . . . . . . . . 255--266 Bogdan Marius Tudor and Yong Meng Teo On understanding the energy consumption of ARM-based multicore servers . . . . . 267--278 Rathijit Sen and David A. Wood Reuse-based online models for caches . . 279--292 Muhammad Shahzad and Alex X. Liu Probabilistic optimal tree hopping for RFID identification . . . . . . . . . . 293--304 Qiuyu Peng and Anwar Walid and Steven H. Low Multipath TCP algorithms: theory and design . . . . . . . . . . . . . . . . . 305--316 Guang Tan and Zhimeng Yin and Hongbo Jiang Trap array: a unified model for scalability evaluation of geometric routing . . . . . . . . . . . . . . . . 317--328 Lachlan Andrew and Siddharth Barman and Katrina Ligett and Minghong Lin and Adam Meyerson and Alan Roytman and Adam Wierman A tale of two metrics: simultaneous bounds on competitiveness and regret . . 329--330 Zhibin Yu and Lieven Eeckhout and Nilanjan Goswami and Tao Li and Lizy John and Hai Jin and Chengzhong Xu Accelerating GPGPU architecture simulation . . . . . . . . . . . . . . . 331--332 Di Wang and Chuangang Ren and Sriram Govindan and Anand Sivasubramaniam and Bhuvan Urgaonkar and Aman Kansal and Kushagra Vaid ACE: abstracting, characterizing and exploiting peaks and valleys in datacenter power consumption . . . . . . 333--334 Rahul Potharaju and Navendu Jain An empirical analysis of intra- and inter-datacenter network failures for geo-distributed services . . . . . . . . 335--336 Dorian Mazauric and Saleh Soltan and Gil Zussman Computational analysis of cascading failures in power networks . . . . . . . 337--338 John C. Nelson and Jonathan Connell and Canturk Isci and Jonathan Lenchner Data center asset tracking using a mobile robot . . . . . . . . . . . . . . 339--340 Zhenhua Liu and Adam Wierman and Yuan Chen and Benjamin Razon and Niangjun Chen Data center demand response: avoiding the coincident peak via workload shifting and local generation . . . . . 341--342 Juan Carlos Sáez and Fernando Castro and Daniel Chaver and Manuel Prieto Delivering fairness and priority enforcement on asymmetric multicore systems via OS scheduling . . . . . . . 343--344 Ake Arvidsson and Ying Zhang Detecting user dissatisfaction and understanding the underlying reasons . . 345--346 Deguang Kong and Guanhua Yan Discriminant malware distance learning on structural information for automated malware classification . . . . . . . . . 347--348 Enoch Peserico Elastic paging . . . . . . . . . . . . . 349--350 Lingwen Gan and Na Li and Steven Low and Ufuk Topcu Exact convex relaxation for optimal power flow in distribution networks . . 351--352 Jaewook Kwak and Chul-Ho Lee and Do Young Eun Exploiting the past to reduce delay in CSMA scheduling: a high-order Markov chain approach . . . . . . . . . . . . . 353--354 Ignasi Paredes-Oliva and Pere Barlet-Ros and Xenofontas Dimitropoulos FaRNet: fast recognition of high multi-dimensional network traffic patterns . . . . . . . . . . . . . . . . 355--356 Yashar Ghiassi-Farrokhfal and Srinivasan Keshav and Catherine Rosenberg and Florin Ciucu Firming solar power . . . . . . . . . . 357--358 Yi Wang and Dongzhe Tai and Ting Zhang and Jianyuan Lu and Boyang Xu and Huichen Dai and Bin Liu Greedy name lookup for named data networking . . . . . . . . . . . . . . . 359--360 Mian Dong and Tian Lan and Lin Zhong How does energy accounting matter for energy management? . . . . . . . . . . . 361--362 Sharayu Moharir and Sujay Sanghavi and Sanjay Shakkottai Online load balancing under graph constraints . . . . . . . . . . . . . . 363--364 Melanie Kambadur and Kui Tang and Joshua Lopez and Martha A. Kim Parallel scaling properties from a basic block view . . . . . . . . . . . . . . . 365--366 Florin Ciucu and Felix Poloczek and Jens Schmitt Sharp bounds in stochastic network calculus . . . . . . . . . . . . . . . . 367--368 Ji Zhu and Stratis Ioannidis and Nidhi Hegde and Laurent Massoulie Stable and scalable universal swarms . . 369--370 Georgios S. Paschos and Leandros Tassiulas Sustainability of service provisioning systems under attack . . . . . . . . . . 371--372 Hong Xu and Chen Feng and Baochun Li Temperature aware workload management in geo-distributed datacenters . . . . . . 373--374 Ming Li and Andrey Lukyanenko and Sasu Tarkoma and Yong Cui and Antti Ylä-Jääski Tolerating path heterogeneity in multipath TCP with bounded receive buffers . . . . . . . . . . . . . . . . 375--376 Chen Dai and Chao Lv and Jiaxin Li and Weihua Zhang and Binyu Zang Understanding architectural characteristics of multimedia retrieval workloads . . . . . . . . . . . . . . . 377--378 Athula Balachandran and Vyas Sekar and Aditya Akella and Srinivasan Seshan Understanding Internet video viewing behavior in the wild . . . . . . . . . . 379--380 Nan Jiang and Yu Jin and Ann Skudlark and Zhi-Li Zhang Understanding SMS spam in a large cellular network . . . . . . . . . . . . 381--382 Srikanth Sundaresan and Nazanin Magharei and Nick Feamster and Renata Teixeira and Sam Crawford Web performance bottlenecks in broadband access networks . . . . . . . . . . . . 383--384 Marcos K. Aguilera Tutorial on geo-replication in data center applications . . . . . . . . . . 385--386 Jayakrishnan Nair and Adam Wierman and Bert Zwart The fundamentals of heavy-tails: properties, emergence, and identification . . . . . . . . . . . . . 387--388 Jiri Schindler Profiling and analyzing the I/O performance of NoSQL DBs . . . . . . . . 389--390
X. Gao and y. Lu and M. Sharma and M. S. Squillante and J. W. Bosman Stochastic optimal control for a general class of dynamic resource allocation problems . . . . . . . . . . . . . . . . 3--14 Predrag R. Jelenkovi\'c and Evangelia D. Skiani Retransmissions over correlated channels 15--25 A. Hasan Mahmud and Shaolei Ren Online capacity provisioning for carbon-neutral data center with demand-responsive electricity prices . . 26--37 Naser M. Asghari and Michel Mandjes and Anwar Walid Optimizing energy management in multi-core servers . . . . . . . . . . . 38--40 R. Bekker and J. L. Dorsman and R. D. van der Mei and P. Vis and E. M. M. Winands Scheduling in polling systems in heavy traffic . . . . . . . . . . . . . . . . 41--43 Pedro Casas and Michael Seufert and Raimund Schatz YOUQMON: a system for on-line monitoring of YouTube QoE in operational 3G networks . . . . . . . . . . . . . . . . 44--46 Jan-Pieter Dorsman and Maria Vlasiou and Bert Zwart Parallel queueing networks with Markov-modulated service speeds in heavy traffic . . . . . . . . . . . . . . . . 47--49 Dieter Fiems and Koen De Turck Spreading rumours in Euclidean space . . 50--52 Eleni Vatamidou and Ivo Adan and Maria Vlasiou and Bert Zwart Corrected phase-type approximations for the workload of the MAP/G/1 queue with heavy-tailed service times . . . . . . . 53--55
Heiko Koziolek and Steffen Becker and Jens Happe and Petr Tuma and Thijmen de Gooijer Towards software performance engineering for multicore and manycore systems . . . 2--11 Eitan Bachmat and Ilan Elhanan Analysis of the GSTF disk scheduling algorithm . . . . . . . . . . . . . . . 13--15 Minghong Lin and Li Zhang and Adam Wierman and Jian Tan Joint optimization of overlapping phases in MapReduce . . . . . . . . . . . . . . 16--18 Javad Ghaderi and Sem Borst and Phil Whiting Random access in wireless networks: how much aggressiveness can cause instability? . . . . . . . . . . . . . . 19--21 Ivo Adan and Marko Boon and Ana Busi\'c and Jean Mairesse and Gideon Weiss Queues with skill based parallel servers and a FCFS infinite matching model . . . 22--24 Eugene A. Feinber and Fenghsu Yang Dynamic price optimization for an M/M/k/N queue with several customer types . . . . . . . . . . . . . . . . . 25--27 Bhuvan Urgaonkar and George Kesidis and Uday V. Shanbhag and Cheng Wang Pricing of service in clouds: optimal response and strategic interactions . . 28--30 Sungsu Lim and Kyomin Jung and John C. S. Lui Phase transition of multi-state diffusion process in networks . . . . . 31--33 Nelson Antunes and Gonçalo Jacinto and António Pacheco Probing a M/G/1 queue with general input and service times . . . . . . . . . . . 34--36 Peter Harrison Sojourn time distributions in tandem batch-networks . . . . . . . . . . . . . 37--39 Joel Spencer and Madhu Sudan and Kuang Xu Queueing with future information . . . . 40--42 Felix Poloczek and Florin Ciucu A martingale-envelope and applications 43--45 Weining Kang and Hongyuan Lu and Guodong Pang Fluid approximations of many-server queues with delayed feedback and heterogeneous service and patience times 46--48 A. B. Dieker and T. Suk Diffusion approximations for large-scale buffered systems . . . . . . . . . . . . 49--51 Yingdong Lu and Mark S. Squillante and David D. Yao Asymptotics of a class of resource planning problems . . . . . . . . . . . 52--54 Heng-Qing Ye and David D. Yao Interchange of limits in heavy traffic analysis under a moment condition . . . 55--57 Edward G. Coffman and Petar Momcilovi\'c A particle process underlying SSD storage structures . . . . . . . . . . . 58--60 X. Gao and Y. Lu and M. Sharma and M. S. Squillante and J. W. Bosman Rewards, costs and flexibility in dynamic resource allocation: a stochastic optimal control approach . . 61--63 William G. Temple and Richard T. B. Ma Monotonic marginal pricing: demand response with price certainty . . . . . 65--70 Sahil Singla and Yashar Ghiassi-Farrokhfal and Srinivasan Keshav Battery provisioning and scheduling for a hybrid battery-diesel generator system 71--76 Lingwen Gan and Adam Wierman and Ufuk Topcu and Niangjun Chen and Steven H. Low Real-time deferrable load control: handling the uncertainties of renewable generation . . . . . . . . . . . . . . . 77--79 Kai Yang and Anwar Walid Outage-capacity tradeoff for smart grid with renewables . . . . . . . . . . . . 80--82 Christine S. Chan and Boxiang Pan and Kenny Gross and Kalyan Vaidyanathan and Tajana Simuni\'c Rosing Correcting vibration-induced performance degradation in enterprise servers . . . 83--88 Hao Wang and Jianwei Huang and Xiaojun Lin and Hamed Mohsenian-Rad Exploring smart grid and data center interactions for electric power load balancing . . . . . . . . . . . . . . . 89--94 Mikko Pervilä and Lassi Remes and Jussi Kangasharju Harvesting heat in an urban greenhouse 95--97 Indra Widjaja and Anwar Walid and Yanbin Luo and Yang Xu and H. Jonathan Chao Switch sizing for energy-efficient datacenter networks . . . . . . . . . . 98--100 Chenying Hou and Fa Zhang and Antonio Fernández Anta and Lin Wang and Zhiyong Liu A hop-by-hop energy efficient distributed routing scheme . . . . . . . 101--106 Lin Wang and Fa Zhang and Athanasios V. Vasilakos and Chenying Hou and Zhiyong Liu Joint virtual machine assignment and traffic engineering for green data center networks . . . . . . . . . . . . 107--112
Patrick Loiseau and David C. Parkes and Jean Walrand MultiDefender security games on networks 4--7 Aron Laszka and Assane Gueye Quantifying all-to-one network topology robustness under budget constraints . . 8--11 Lemonia Dritsoula and John Musacchio A game of clicks: economic incentives to fight click fraud in ad networks . . . . 12--15 Emir Kavurmacio\uglu and Murat Alanyali and David Starobinski Demand-insensitive price relationships in competitive private commons . . . . . 16--19 Costas Courcoubetis and Kostas Sdrolias and Richard Weber Revenue Models, Price Differentiation and Network Neutrality Implications in the Internet . . . . . . . . . . . . . . 20--23 Jiwon Park and Jeonghoon Mo ISP and CP revenue sharing and content piracy . . . . . . . . . . . . . . . . . 24--27 Bar Ifrach and Costis Maglaras and Marco Scarsini Bayesian social learning with consumer reviews . . . . . . . . . . . . . . . . 28--28 Munther Dahleh and Alireza TahbazSalehi and John N. Tsitsiklis and Spyros I. Zoumpoulis Coordination with local information . . 29--29 Zeinab Abbassi and Nidhi Hegde and Laurent Massoulié Distributed content curation on the Web 30--33 Jie Xu and Mihaela van der Schaar Incentive design for heterogeneous user-generated content networks . . . . 34--37 Chong Jiang and Carolyn L. Beck and R. Srikant Bidding with limited statistical knowledge in online auctions . . . . . . 38--41 Swati Rallapalli and Qiang Ma and Han Hee Song and Mario Baldi and S. Muthukrishnan and Lili Qiu Modeling the value of information granularity in targeted advertising . . 42--45 Mung Chiang SDP: Smart Data Pricing, from theorems to trials . . . . . . . . . . . . . . . 46--46 Jonatha Anselmi and Danilo Ardagna and John C. S. Lui and Adam Wierman and Yunjian Xu and Zichao Yang The economics of the cloud: price competition and congestion . . . . . . . 47--49 Gerardo Berbeglia and Peter Sloan and Adrian Vetta Pricing mechanisms for a durable good monopolist . . . . . . . . . . . . . . . 50--50 Bar Ifrach and Rameh Johari Pricing a bestseller: sales and visibility in the marketplace for mobile apps . . . . . . . . . . . . . . . . . . 51--51 Daniel T. Wagner and Andrew Rice and Alastair R. Beresford Device analyzer: largescale mobile data collection . . . . . . . . . . . . . . . 53--56 Eugene Feinberg and Xiaoxuan Zhang Optimizing cloud utilization via switching decisions . . . . . . . . . . 57--60 Onur Yilmaz and Mustafa U. Torun and Ali N. Akansu A fast derivation of Karhunen--Loeve transform kernel for first-order autoregressive discrete process . . . . 61--64 Bharat B. Madan and Manoj Banik Attack tolerant architecture for big data file systems . . . . . . . . . . . 65--69 Shan Suthaharan Big data classification: problems and challenges in network intrusion prediction with machine learning . . . . 70--73 Abhishek B. Sharma and Franjo Ivanci\'c and Alexandru Niculescu-Mizil and Haifeng Chen and Guofei Jiang Modeling and analytics for cyber-physical systems in the age of big data . . . . . . . . . . . . . . . . . . 74--77 Jie Hu and Kun Meng and Xiaomin Chen and Chuang Lin and Jiwei Huang Analysis of influence maximization in large-scale social networks . . . . . . 78--81 Jeff Whitworth and Shan Suthaharan Security problems and challenges in a machine learning-based hybrid big data processing network systems . . . . . . . 82--85 Onur Savas and Yalin Sagduyu and Julia Deng and Jason Li Tactical big data analytics: challenges, use cases, and solutions . . . . . . . . 86--89 Yu Zhang and Daby Sow and Deepak Turaga and Mihaela van der Schaar A fast online learning algorithm for distributed mining of BigData . . . . . 90--93 Benjamin Heintz and Abhishek Chandra Beyond graphs: toward scalable hypergraph analysis systems . . . . . . 94--97 Jameela Al-Jaroodi and Nader Mohamed and Abdulla Eid Dual direction big data download and analysis . . . . . . . . . . . . . . . . 98--101 Jacob Brock and Hao Luo and Chen Ding Locality analysis: a nonillion time window problem . . . . . . . . . . . . . 102--105
Zhaoxu Wang and Wenxiang Dong and Wenyi Zhang and Chee Wei Tan Rumor source detection with multiple observations: fundamental limits and algorithms . . . . . . . . . . . . . . . 1--13 Jinyoung Han and Daejin Choi and Byung-Gon Chun and Ted Kwon and Hyun-chul Kim and Yanghee Choi Collecting, organizing, and sharing pins in pinterest: interest-driven or social-driven? . . . . . . . . . . . . . 15--27 Jiaming Xu and Rui Wu and Kai Zhu and Bruce Hajek and R. Srikant and Lei Ying Jointly clustering rows and columns of binary matrices: algorithms and trade-offs . . . . . . . . . . . . . . . 29--41 Avner May and Augustin Chaintreau and Nitish Korula and Silvio Lattanzi Filter & follow: how social media foster content curation . . . . . . . . . . . . 43--55 Stratis Ioannidis and Andrea Montanari and Udi Weinsberg and Smriti Bhagat and Nadia Fawaz and Nina Taft Privacy tradeoffs in predictive analytics . . . . . . . . . . . . . . . 57--69 Weijie Shi and Linquan Zhang and Chuan Wu and Zongpeng Li and Francis C. M. Lau An online auction framework for dynamic resource provisioning in cloud computing 71--83 Jayakrishnan Nair and Sachin Adlakha and Adam Wierman Energy procurement strategies in the presence of intermittent sources . . . . 85--97 Linquan Zhang and Zongpeng Li and Chuan Wu Randomized auction design for electricity markets between grids and microgrids . . . . . . . . . . . . . . . 99--110 Zhenhua Liu and Iris Liu and Steven Low and Adam Wierman Pricing data center demand response . . 111--123 Maialen Larrañaga and Urtzi Ayesta and Ina Maria Verloop Index policies for a multi-class queue with convex holding cost and abandonments . . . . . . . . . . . . . . 125--137 Neil Stuart Walton Concave switching in single and multihop networks . . . . . . . . . . . . . . . . 139--151 Longbo Huang and Xin Liu and Xiaohong Hao The power of online learning in stochastic network optimization . . . . 153--165 Predrag R. Jelenkovic and Evangelia D. Skiani Is sharing with retransmissions causing instabilities? . . . . . . . . . . . . . 167--179 Jian Tan and Yandong Wang and Weikuan Yu and Li Zhang Non-work-conserving effects in MapReduce: diffusion limit and criticality . . . . . . . . . . . . . . 181--192 Ion Stoica Conquering big data with spark and BDAS 193--193 Zain Shamsi and Ankur Nandwani and Derek Leonard and Dmitri Loguinov Hershel: single-packet OS fingerprinting 195--206 Muhammad Shahzad and Alex X. Liu Noise can help: accurate and efficient per-flow latency measurement without packet probing and time stamping . . . . 207--219 Nicolas Viennot and Edward Garcia and Jason Nieh A measurement study of Google Play . . . 221--233 Chung Hwan Kim and Junghwan Rhee and Hui Zhang and Nipun Arora and Guofei Jiang and Xiangyu Zhang and Dongyan Xu IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces . . . . . . . . . . 235--247 Sahil Suneja and Canturk Isci and Vasanth Bala and Eyal de Lara and Todd Mummert Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloud . . . . . . . . . . . . . . . . . 249--261 Subhashini Krishnasamy and Siddhartha Banerjee and Sanjay Shakkottai The behavior of epidemics under bounded susceptibility . . . . . . . . . . . . . 263--275 Maksym Gabielkov and Ashwin Rao and Arnaud Legout Studying social networks at scale: macroscopic anatomy of the Twitter social graph . . . . . . . . . . . . . . 277--288 Swapna Buccapatnam and Atilla Eryilmaz and Ness B. Shroff Stochastic bandits with side observations on networks . . . . . . . . 289--300 Jungseul Ok and Youngmi Jin and Jinwoo Shin and Yung Yi On maximizing diffusion speed in social networks: impact of random seeding and clustering . . . . . . . . . . . . . . . 301--313 Jose Yallouz and Ori Rottenstreich and Ariel Orda Tunable survivable spanning trees . . . 315--327 Bogdan Ghit and Nezih Yigitbasi and Alexandru Iosup and Dick Epema Balanced resource allocations across multiple dynamic MapReduce clusters . . 329--341 Daniel S. Berger and Martin Karsten and Jens Schmitt On the relevance of adversarial queueing theory in practice . . . . . . . . . . . 343--354 Nachiappan Chidambaram Nachiappan and Praveen Yedlapalli and Niranjan Soundararajan and Mahmut Taylan Kandemir and Anand Sivasubramaniam and Chita R. Das GemDroid: a framework to evaluate mobile platforms . . . . . . . . . . . . . . . 355--366 Muhammad Zubair Shafiq and Jeffrey Erman and Lusheng Ji and Alex X. Liu and Jeffrey Pang and Jia Wang Understanding the impact of network dynamics on mobile video user engagement 367--379 Jiwei Huang and Sen Yang and Ashwin Lall and Justin Romberg and Jun Xu and Chuang Lin Error estimating codes for insertion and deletion channels . . . . . . . . . . . 381--393 Thomas M. M. Meyfroyt and Sem C. Borst and Onno J. Boxma and Dee Denteneer Data dissemination performance in large-scale sensor networks . . . . . . 395--406 Maria Gorlatova and John Sarik and Guy Grebla and Mina Cong and Ioannis Kymissis and Gil Zussman Movers and shakers: kinetic energy harvesting for the Internet of Things 407--419 Chengdi Lai and Steven H. Low and Ka-Cheong Leung and Victor O. K. Li Pricing link by time . . . . . . . . . . 421--433 Sharayu Moharir and Javad Ghaderi and Sujay Sanghavi and Sanjay Shakkottai Serving content with unknown demand: the high-dimensional regime . . . . . . . . 435--447 Paul Tune and Matthew Roughan Network-design sensitivity analysis . . 449--461 Lingqing Ai and Xian Wu and Lingxiao Huang and Longbo Huang and Pingzhong Tang and Jian Li The multi-shop ski rental problem . . . 463--475 Wei Ding and Mahmut Kandemir CApRI: CAche-conscious data reordering for irregular codes . . . . . . . . . . 477--489 Yu Cai and Gulay Yalcin and Onur Mutlu and Erich F. Haratsch and Osman Unsal and Adrian Cristal and Ken Mai Neighbor-cell assisted error correction for MLC NAND flash memories . . . . . . 491--504 Nagendra Gulur and Mahesh Mehendale and Raman Manikantan and Ramaswamy Govindarajan ANATOMY: an analytical model of memory system performance . . . . . . . . . . . 505--517 Samira Khan and Donghyuk Lee and Yoongu Kim and Alaa R. Alameldeen and Chris Wilkerson and Onur Mutlu The efficacy of error mitigation techniques for DRAM retention failures: a comparative experimental study . . . . 519--532 Kaibo Wang and Xiaoning Ding and Rubao Lee and Shinpei Kato and Xiaodong Zhang GDM: device memory management for GPGPU computing . . . . . . . . . . . . . . . 533--545 Nuno Diegues and Paolo Romano and Luís Rodrigues On the energy and performance of commodity hardware transactional memory 547--548 Qi Wang and Liang Liu and Jinbei Zhang and Xinyu Wang and Xinbing Wang and Songwu Lu Impact of correlated mobility and cluster scalability on connectivity of wireless networks . . . . . . . . . . . 549--550 Arash Tavakkol and Mohammad Arjomand and Hamid Sarbazi-Azad Unleashing the potentials of dynamism for page allocation strategies in SSDs 551--552 Chinmoy V. Mandayam and Balaji Prabhakar Traffic congestion: models, costs and optimal transport . . . . . . . . . . . 553--554 Arpan Mukhopadhyay and Ravi R. Mazumdar Randomized routing schemes for large processor sharing systems with multiple service rates . . . . . . . . . . . . . 555--556 Alexander Tarvo and Steven P. Reiss Automated analysis of multithreaded programs for performance modeling . . . 557--558 Manish Arora and Srilatha Manne and Yasuko Eckert and Indrani Paul and Nuwan Jayasena and Dean Tullsen A comparison of core power gating strategies implemented in modern hardware . . . . . . . . . . . . . . . . 559--560 Avik Ray and Sujay Sanghavi and Sanjay Shakkottai Topic modeling from network spread . . . 561--562 A. Hasan Mahmud and Yuxiong He and Shaolei Ren BATS: budget-constrained autoscaling for cloud performance optimization . . . . . 563--564 Ammar Ammar and Sewoong Oh and Devavrat Shah and Luis Filipe Voloch What's your choice?: learning the mixed multi-nomial . . . . . . . . . . . . . . 565--566 Muhammad Zubair Shafiq and Alex X. Liu and Amir R. Khakpour Revisiting caching in content delivery networks . . . . . . . . . . . . . . . . 567--568 Qiang Xu and Thomas Andrews and Yong Liao and Stanislav Miskovic and Z. Morley Mao and Mario Baldi and Antonio Nucci FLOWR: a self-learning system for classifying mobile-application traffic 569--570 Wei Dong and Xuefeng Zhang and Jiliang Wang and Yi Gao and Chun Chen and Jiajun Bu Accurate and robust time reconstruction for deployed sensor networks . . . . . . 571--572 Shaoquan Zhang and Longbo Huang and Minghua Chen and Xin Liu Effect of proactive serving on user delay reduction in service systems . . . 573--574 Fanxin Kong and Xue Liu and Lei Rao Optimal energy source selection and capacity planning for green datacenters 575--576 Jinwoo Shin and Tonghoon Suk Scheduling using interactive oracles: connection between iterative optimization and low-complexity scheduling . . . . . . . . . . . . . . . 577--578 Swati Rallapalli and Wei Dong and Lili Qiu and Yin Zhang Unified localization framework using trajectory signatures . . . . . . . . . 579--580 Dong Hyun Kang and Changwoo Min and Young Ik Eom TS-CLOCK: temporal and spatial locality aware buffer replacement algorithm for NAND flash storages . . . . . . . . . . 581--582 Juhoon Kim and Yung-Chih Chen and Ramin Khalili and Don Towsley and Anja Feldmann Multi-source multipath HTTP (mHTTP): a proposal . . . . . . . . . . . . . . . . 583--584 Christina Vlachou and Albert Banchs and Julien Herzen and Patrick Thiran Performance analysis of MAC for power-line communications . . . . . . . 585--586 Long Vu and Deepak Turaga and Srinivasan Parthasarathy Impact of DHCP churn on network characterization . . . . . . . . . . . . 587--588 Yang Guo and Alexander L. Stolyar and Anwar Walid Online algorithms for joint application-VM-physical-machine auto-scaling in a cloud . . . . . . . . 589--590 Jia Liu and Cathy H. Xia and Ness B. Shroff and Hanif D. Sherali Distributed optimal load shedding for disaster recovery in smart electric power grids: a second-order approach . . 591--592 Richard G. Clegg and Raul Landa and João Taveira Araújo and Eleni Mykoniati and David Griffin and Miguel Rio TARDIS: stably shifting traffic in space and time . . . . . . . . . . . . . . . . 593--594 Daniel S. Berger and Philipp Gland and Sahil Singla and Florin Ciucu Exact analysis of TTL cache networks: the case of caching policies driven by stopping times . . . . . . . . . . . . . 595--596 Sangeetha Abdu Jyothi and Ankit Singla and P. Brighten Godfrey and Alexandra Kolla Measuring throughput of data center network topologies . . . . . . . . . . . 597--598 Da Wang and Gauri Joshi and Gregory Wornell Efficient task replication for fast response times in parallel computation 599--600
Peter Buchholz and Benny Van Houdt Joint latency and cost optimization for erasure-coded data center storage . . . 3--14 Bo Zhang and Guodong Pang and Bert Zwart Refining piecewise stationary approximation for a Markov-regulated fluid queue . . . . . . . . . . . . . . 15--17 A. Izagirre and A. M. Makowski Light traffic performance under the power of two load balancing strategy: the case of server heterogeneity . . . . 18--20 Shigeo Shioda Random walk based biased sampling for data collection on communication networks . . . . . . . . . . . . . . . . 21--23 Majed Haddad and Oussama Habachi and Piotr Wiecek and Yezekael Hayel Spectral efficiency of energy efficient multicarrier systems . . . . . . . . . . 24--26 Tao Zhang and Guangshuo Chen and Wei Shu and Min-You Wu Microarchitectural characterization of irregular applications on GPGPUs . . . . 27--29 Jayakrishnan Nair and Vijay G. Subramanian and Adam Wierman On competitive provisioning of cloud services . . . . . . . . . . . . . . . . 30--32 Joost Bosman and Jayakrishnan Nair and Bert Zwart On the probability of current and temperature overloading in power grids: a large deviations approach . . . . . . 33--35 Erol Gelenbe A sensor node with energy harvesting . . 37--39 Thomas M. M. Meyfroyt A cooperative sequential adsorption model for wireless gossiping . . . . . . 40--42 Paul Tune and Matthew Roughan Maximum entropy traffic matrix synthesis 43--45 Milan Bradonji\'c and Iraj Saniee and Indra Widjaja Scaling of capacity and reliability in data center networks . . . . . . . . . . 46--48 Yuval Rochman and Hanoch Levy and Eli Brosh Efficient resource placement in cloud computing and network applications . . . 49--51 Hong Xie and John C. S. Lui Modeling crowdsourcing systems: design and analysis of incentive mechanism and rating system . . . . . . . . . . . . . 52--54 Arash Asadi and Peter Jacko and Vincenzo Mancuso Modeling D2D communications with LTE and WiFi . . . . . . . . . . . . . . . . . . 55--57 Liang Zheng and Chee Wei Tan Egalitarian fairness framework for joint rate and power optimization in wireless networks . . . . . . . . . . . . . . . . 58--60 D. A. Goldberg and D. A. Katz and Y. Lu and M. Sharma and M. S. Squillante Asymptotic optimality of constant capacity allocation policies for dynamic resource planning . . . . . . . . . . . 61--63 Javad Ghaderi and Yuan Zhong and R. Srikant Asymptotic optimality of BestFit for stochastic bin packing . . . . . . . . . 64--66 Ali Tizghadam and Alberto Leon-Garcia On the impact of subgraph insertion or removal on Moore--Penrose Laplacian and resistance distance . . . . . . . . . . 67--69 Masakiyo Miyazawa Tail asymptotics of the stationary distribution for a two-node generalized Jackson network . . . . . . . . . . . . 70--72 Mark S. Squillante and Don Towsley and Sean Barker Improving the scalability of search in networks through multiple random walks 73--75
John Chuang and Patrick Loiseau The Joint Workshop on Pricing and Incentives in Networks and Systems (WPIN+NetEcon 2014) . . . . . . . . . . 2--3 Vijay Kamble and Jean Walrand Strategy-proof Mechanisms for Purchasing a Shared Resource . . . . . . . . . . . 4--7 Saravana Manickam and Mahesh K. Marina and Sofia Pediaditaki and Maziar Nekovee An Iterative and Truthful Multi-Unit Auction Scheme for Coordinated Sharing of Spectrum White Spaces . . . . . . . . 8--11 Abhinav Sinha and Achilleas Anastasopoulos A General Mechanism Design Methodology for Social Utility Maximization with Linear Constraints . . . . . . . . . . . 12--15 Steven Weber and Roch Guérin Facilitating Adoption of Services with Positive Externalities via Subsidies . . 16--19 Amir Ajorlou and Ali Jadbabaie and Ali Kakhbod Strategic Information Diffusion: Spread vs. Exploit . . . . . . . . . . . . . . 20--23 Daron Acemoglu and Giacomo Como and Fabio Fagnani and Asuman Ozdaglar Harmonic Influence in Largescale Networks . . . . . . . . . . . . . . . . 24--24 Vamseedhar Reddyvari Raja and Srinivas Shakkottai and Amogh Dhamdhere and kc claffy Fair, Flexible and Feasible ISP Billing 25--28 Laszlo Gyarmati and Nikolaos Laoutaris and Kostas Sdrolias and Pablo Rodriguez and Costas Courcoubetis From advertising profits to bandwidth prices: a quantitative methodology for negotiating premium peering . . . . . . 29--32 Eran Simhon and David Starobinski Advance Reservation Games and the Price of Conservatism . . . . . . . . . . . . 33--33 Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y . . . . . . . . . . 34--37 Daron Acemoglu and Azarakhsh Malekian and Asu Ozdaglar Network Security and Contagion . . . . . 38--38 Aaron Roth Differential Privacy as a Tool for Mechanism Design in Large Systems . . . 39--39 Leonidas Georgiadis and George Iosifidis and Leandros Tassiulas Dynamic Exchange of Communication Services . . . . . . . . . . . . . . . . 40--40 Eiichiro Kazumori Generalizing Deferred Acceptance Auctions to Allow Multiple Relinquishment Options . . . . . . . . . 41--41 Ashraf Al Daoud and George Kesidis and Jörg Liebeherr A Game of Uncoordinated Sharing of Private Spectrum Commons . . . . . . . . 42--42 Konstantinos Poularakis and Ioannis Pefkianakis and Jaideep Chandrashekar and Leandros Tassiulas Quid Pro Quo: Reducing Peak Traffic Costs with (Subscriber) Price Incentives 43--43 Mohammad Hassan Lotfi and George Kesidis and Saswati Sarkar Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model . . . . . . . . . . . . . 44--44 Siny Joseph and Vinod Namboodiri and Vishnu C. Dev A Market-Driven Framework Towards Environmentally Sustainable Mobile Computing . . . . . . . . . . . . . . . 46--48 Fatemeh Jalali and Rob Ayre and Arun Vishwanath and Kerry Hinton and Tansu Alpcan and Rod Tucker Energy Consumption of Content Distribution from Nano Data Centers versus Centralized Data Centers . . . . 49--54 Shinobu Miwa and Charles R. Lefurgy Evaluation of Core Hopping on POWER7 . . 55--60 Fikru Getachew Debele and Nanfang Li and Michela Meo and Marco Ricca and Yi Zhang Experimenting Resource-on-Demand Strategies for Green WLANs . . . . . . . 61--66 Qing Yi and Suresh Singh Minimizing Energy Consumption of FatTree Data Center Networks . . . . . . . . . . 67--72 Shaolei Ren and Mohammad A. Islam A First Look at Colocation Demand Response . . . . . . . . . . . . . . . . 73--75 Derya Çavdar and Andrea Ros\`a and Lydia Y. Chen and Walter Binder and Fatih Alagöz Quantifying the Brown Side of Priority Schedulers: Lessons from Big Clusters 76--81
Danilo Ardagna and Mark S. Squillante Special Issue on Performance and Resource Management in Big Data Applications . . . . . . . . . . . . . . 2--2 Yue Tan and Cathy H. Xia An Adaptive Learning Approach for Efficient Resource Provisioning in Cloud Services . . . . . . . . . . . . . . . . 3--11 Andrea Ros\`a and Lydia Y. Chen and Robert Birke and Walter Binder Demystifying Casualties of Evictions in Big Data Priority Scheduling . . . . . . 12--21 Yijun Ying and Robert Birke and Cheng Wang and Lydia Y. Chen and Gautam Natarajan On Energyaware Allocation and Execution for Batch and Interactive MapReduce . . 22--30 Jian Tan and Li Zhang and Min Li and Yandong Wang Multi-resource Fair Sharing for Multiclass Workflows . . . . . . . . . . 31--37 Zhuoyao Zhang and Ludmila Cherkasova and Boon Thau Loo Exploiting Cloud Heterogeneity to Optimize Performance and Cost of MapReduce Processing . . . . . . . . . . 38--50 Marzieh Malekimajd and Danilo Ardagna and Michele Ciavotta and Alessandro Maria Rizzi and Mauro Passacantando Optimal Map Reduce Job Capacity Allocation in Cloud Systems . . . . . . 51--61 Wei Zhang and Sundaresan Rajasekaran and Shaohua Duan and Timothy Wood and Mingfa Zhuy Minimizing Interference and Maximizing Progress for Hadoop Virtual Machines . . 62--71
Bruce Hajek Bounds Implied by Drift with Applications . . . . . . . . . . . . . . 1--1 Xiaoxi Zhang and Zhiyi Huang and Chuan Wu and Zongpeng Li and Francis C. M. Lau Online Auctions in IaaS Clouds: Welfare and Profit Maximization with Server Costs . . . . . . . . . . . . . . . . . 3--15 Se-Young Yun and Alexandre Proutiere Distributed Proportional Fair Load Balancing in Heterogeneous Systems . . . 17--30 Thomas Bonald and James Roberts Multi-Resource Fairness: Objectives, Algorithms and Performance . . . . . . . 31--42 Leonidas Georgiadis and George Iosifidis and Leandros Tassiulas Exchange of Services in Networks: Competition, Cooperation, and Fairness 43--56 Samuli Aalto and Pasi Lassila and Prajwal Osti Whittle Index Approach to Size-aware Scheduling with Time-varying Channels 57--69 Sanjib Sur and Vignesh Venkateswaran and Xinyu Zhang and Parmesh Ramanathan 60 GHz Indoor Networking through Flexible Beams: a Link-Level Profiling 71--84 Liang Zhang and Weijie Wu and Dan Wang Sponsored Data Plan: a Two-Class Service Model in Wireless Data Networks . . . . 85--96 Bin Li and Rayadurgam Srikant Queue-Proportional Rate Allocation with Per-Link Information in Multihop Networks . . . . . . . . . . . . . . . . 97--108 Jelena Marasevic and Jin Zhou and Harish Krishnaswamy and Yuan Zhong and Gil Zussman Resource Allocation and Rate Gains in Practical Full-Duplex Systems . . . . . 109--122 Nicolas Gast and Benny Van Houdt Transient and Steady-state Regime of a Family of List-based Cache Replacement Algorithms . . . . . . . . . . . . . . . 123--136 Mahmut Kandemir and Hui Zhao and Xulong Tang and Mustafa Karakoy Memory Row Reuse Distance and its Role in Optimizing Application Performance 137--149 Xiaomeng Chen and Ning Ding and Abhilash Jindal and Y. Charlie Hu and Maruti Gupta and Rath Vannithamby Smartphone Energy Drain in the Wild: Analysis and Implications . . . . . . . 151--164 Ming Chen and Dean Hildebrand and Geoff Kuenning and Soujanya Shankaranarayana and Bharat Singh and Erez Zadok Newer Is Sometimes Better: an Evaluation of NFSv4.1 . . . . . . . . . . . . . . . 165--176 Justin Meza and Qiang Wu and Sanjev Kumar and Onur Mutlu A Large-Scale Study of Flash Memory Failures in the Field . . . . . . . . . 177--190 Niangjun Chen and Anish Agarwal and Adam Wierman and Siddharth Barman and Lachlan L. H. Andrew Online Convex Optimization Using Predictions . . . . . . . . . . . . . . 191--204 Donghyeon Lee and Joonyoung Kim and Hyunmin Lee and Kyomin Jung Reliable Multiple-choice Iterative Algorithm for Crowdsourcing Systems . . 205--216 Yang Liu and Mingyan Liu An Online Learning Approach to Improving the Quality of Crowd-Sourcing . . . . . 217--230 Richard Combes and Stefan Magureanu and Alexandre Proutiere and Cyrille Laroche Learning to Rank: Regret Lower Bounds and Efficient Algorithms . . . . . . . . 231--244 Richard Combes and Chong Jiang and Rayadurgam Srikant Bandits with Budgets: Regret Lower Bounds and Optimal Algorithms . . . . . 245--257 Parinya Chalermsook and Atish Das Sarma and Ashwin Lall and Danupon Nanongkai Social Network Monetization via Sponsored Viral Marketing . . . . . . . 259--270 Giulia Fanti and Peter Kairouz and Sewoong Oh and Pramod Viswanath Spy vs. Spy: Rumor Source Obfuscation 271--284 Laurent Massoulié and Mesrob I. Ohannessian and Alexandre Prouti\`ere Greedy-Bayes for Targeted News Dissemination . . . . . . . . . . . . . 285--296 Mojtaba Tarihi and Hossein Asadi and Hamid Sarbazi-Azad DiskAccel: Accelerating Disk-Based Experiments by Representative Sampling 297--308 Ye Jin and Xiaosong Ma and Mingliang Liu and Qing Liu and Jeremy Logan and Norbert Podhorszki and Jong Youl Choi and Scott Klasky Combining Phase Identification and Statistic Modeling for Automated Parallel Benchmark Generation . . . . . 309--320 Qiaomin Xie and Xiaobo Dong and Yi Lu and Rayadurgam Srikant Power of $d$ Choices for Large-Scale Bin Packing: a Loss Model . . . . . . . . . 321--334 Amr Rizk and Felix Poloczek and Florin Ciucu Computable Bounds in Fork-Join Queueing Systems . . . . . . . . . . . . . . . . 335--346 Kristen Gardner and Samuel Zbarsky and Sherwin Doroudi and Mor Harchol-Balter and Esa Hyytia Reducing Latency via Redundant Requests: Exact Analysis . . . . . . . . . . . . . 347--360 Saleh Soltan and Mihalis Yannakakis and Gil Zussman Joint Cyber and Physical Attacks on Power Grids: Graph Theoretical Approaches for Information Recovery . . 361--374 Virag Shah and Gustavo de Veciana Impact of Fairness and Heterogeneity on Delays in Large-scale Content Delivery Networks . . . . . . . . . . . . . . . . 375--387 Ting He and Chang Liu and Ananthram Swami and Don Towsley and Theodoros Salonidis and Andrei Iu. Bejan and Paul Yu Fisher Information-based Experiment Design for Network Tomography . . . . . 389--402 Robert Birke and Mathias Björkqvist and Cyriel Minkenberg and Martin Schmatz and Lydia Y. Chen When Virtual Meets Physical at the Edge: a Field Study on Datacenters' Virtual Traffic . . . . . . . . . . . . . . . . 403--415 Qingjun Xiao and Shigang Chen and Min Chen and Yibei Ling Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing 417--428 Vasileios Kotronis and Rowan Klöti and Matthias Rost and Panagiotis Georgopoulos and Bernhard Ager and Stefan Schmid and Xenofontas Dimitropoulos Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services . . . . . . . . . . . . . . . . 429--430 Rahul Singh and Alexander Stolyar MaxWeight Scheduling: Asymptotic Behavior of Unscaled Queue-Differentials in Heavy Traffic . . . . . . . . . . . . 431--432 Carlo Fuerst and Stefan Schmid and Lalith Suresh and Paolo Costa Kraken: Towards Elastic Performance Guarantees in Multi-tenant Data Centers 433--434 Keqiang He and Junaid Khalid and Sourav Das and Aaron Gember-Jacobson and Chaithan Prakash and Aditya Akella and Li Erran Li and Marina Thottan Latency in Software Defined Networks: Measurements and Mitigation Techniques 435--436 Yongquan Fu and Ernst Biersack Tree-structured Bloom Filters for Joint Optimization of False Positive Probability and Transmission Bandwidth 437--438 Javad Ghaderi and Sanjay Shakkottai and Rayadurgam Srikant Scheduling Storms and Streams in the Cloud . . . . . . . . . . . . . . . . . 439--440 Eli A. Meirom and Chris Milling and Constantine Caramanis and Shie Mannor and Sanjay Shakkottai and Ariel Orda Localized Epidemic Detection in Networks with Overwhelming Noise . . . . . . . . 441--442 Zhi Zhou and Fangming Liu and Zongpeng Li Pricing Bilateral Electricity Trade between Smart Grids and Hybrid Green Datacenters . . . . . . . . . . . . . . 443--444 Subhashini Krishnasamy and Rajat Sen and Sewoong Oh and Sanjay Shakkottai Detecting Sponsored Recommendations . . 445--446 Yong Zhao and Jia Rao and Xiaobo Zhou and Qing Yi Understanding Parallel Performance Under Interferences in Multi-tenant Clouds . . 447--448 Rui Wu and Jiaming Xu and Rayadurgam Srikant and Laurent Massoulie and Marc Lelarge and Bruce Hajek Clustering and Inference From Pairwise Comparisons . . . . . . . . . . . . . . 449--450 Shaileshh Bojja Venkatakrishnan and Pramod Viswanath Deterministic Near-Optimal P2P Streaming 451--452 Azalia Mirhoseini and Ebrahim M. Songhori and Bita Darvish Rouhani and Farinaz Koushanfar Flexible Transformations For Learning Big Data . . . . . . . . . . . . . . . . 453--454 Jian Li and Bainan Xia and Xinbo Geng and Hao Ming and Srinivas Shakkottai and Vijay Subramanian and Le Xie Energy Coupon: a Mean Field Game Perspective on Demand Response in Smart Grids . . . . . . . . . . . . . . . . . 455--456 Ibrahim Umar and Otto Johan Anshus and Phuong Hoai Ha DeltaTree: a Locality-aware Concurrent Search Tree . . . . . . . . . . . . . . 457--458 Faraz Ahmed and Jeffrey Erman and Zihui Ge and Alex X. Liu and Jia Wang and He Yan Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services . . . . . . . . . . . . . 459--460 Rémi Varloot and Ana Busíü'c and Anne Bouillard Speeding up Glauber Dynamics for Random Generation of Independent Sets . . . . . 461--462 Linquan Zhang and Zongpeng Li and Chuan Wu and Shaolei Ren Online Electricity Cost Saving Algorithms for Co-Location Data Centers 463--464 Guillaume Ducoffe and Mathias Lécuyer and Augustin Chaintreau and Roxana Geambasu Web Transparency for Complex Targeting: Algorithms, Limits, and Tradeoffs . . . 465--466 Varun Gupta and Ana Radovanovic Lagrangian-based Online Stochastic Bin Packing . . . . . . . . . . . . . . . . 467--468 Vani Gupta and Stephen Lee and Prashant Shenoy and Ramesh Sitaraman and Rahul Urgaonkar Towards Cooling Internet-Scale Distributed Networks on the Cheap . . . 469--470 Russell Clapp and Martin Dimitrov and Karthik Kumar and Vish Viswanathan and Thomas Willhalm A Simple Model to Quantify the Impact of Memory Latency and Bandwidth on Performance . . . . . . . . . . . . . . 471--472 Qiumin Xu and Huzefa Siyamwala and Mrinmoy Ghosh and Manu Awasthi and Tameesh Suri and Zvika Guz and Anahita Shayesteh and Vijay Balakrishnan Performance Characterization of Hyperscale Applicationson on NVMe SSDs 473--474
Leana Golubchik and Bert Zwart Spatial Loss Systems: Exact Simulation and Rare Event Behavior . . . . . . . . 3--6 Martijn Onderwater and Sandjai Bhulai and Rob van der Mei Learning Optimal Policies in Markov Decision Processes with Value Function Discovery? . . . . . . . . . . . . . . . 7--9 Johan S. H. van Leeuwaarden and Britt W. J. Mathijsen and Fiona Sloothaak Delayed workload shifting in many-server systems . . . . . . . . . . . . . . . . 10--12 F. Cecchi and S. C. Borst and J. S. H. van Leeuwaardena Mean-Field Analysis of Ultra-Dense CSMA Networks . . . . . . . . . . . . . . . . 13--15 Brendan Patch and Thomas Taimre and Yoni Nazarathy Performance of Faulty Loss Systems with Persistent Connections . . . . . . . . . 16--18 Seva Shneer and Peter M. van de Ven Stability and instability of individual nodes in multi-hop wireless CSMA/CA networks . . . . . . . . . . . . . . . . 19--21 O. Brun and H. Ben Cheikh and B. J. Prabhu A Fluid model based Heuristic for Optimal Speed-scaling of Multi-class Single Server Queues . . . . . . . . . . 22--23 Matthieu Jonckheere and Seva Shneer Gradient bandwidth allocations . . . . . 24--25 Jan Willem Kleinrouweler and Sergio Cabrero and Rob van der Mei and Pablo Cesar Modeling the Effect of Sharing Policies for Network-assisted HTTP Adaptive Video Streaming . . . . . . . . . . . . . . . 26--27 Naresh M. Patel Half-Latency Rule for Finding the Knee of the Latency Curve . . . . . . . . . . 28--29 Mikael Touati and Rachid Elazouzi and Marceau Coupechoux and Eitan Altman and Jean-Marc Kelif About Joint Stable User Association and Resource Allocation in Multi-Rate IEEE 802.11 WLANs . . . . . . . . . . . . . . 30--31 Huaming Wu and Yi Sun and Katinka Wolter Analysis of the Energy-Response Time Tradeoff for Delayed Mobile Cloud Offloading . . . . . . . . . . . . . . . 33--35 Niangjun Chen and Xiaoqi Ren and Shaolei Ren and Adam Wierman Greening Multi-Tenant Data Center Demand Response . . . . . . . . . . . . . . . . 36--38 Shaoquan Zhang and Longbo Huang and Minghua Chen and Xin Liu Proactive Serving Decreases User Delay Exponentially . . . . . . . . . . . . . 39--41 Xiaoqi Ren and Ganesh Ananthanarayanan and Adam Wierman and Minlan Yu Speculation-aware Cluster Scheduling . . 42--44 Weikun Wang and Giuliano Casale Maximum Likelihood Estimation of Closed Queueing Network Demands from Queue Length Data . . . . . . . . . . . . . . 45--47 G. Kesidis and Y. Shan and B. Urgaonkar and J. Liebeherr Network calculus for parallel processing 48--50 Pierre M. Fiorini and Lester Lipsky Exact Analysis of Some Split-Merge Queues . . . . . . . . . . . . . . . . . 51--53 Gauri Joshi and Emina Soljanin and Gregory Wornell Queues with Redundancy: Latency-Cost Analysis . . . . . . . . . . . . . . . . 54--56 Daniel S. Berger and Sebastian Henningsen and Florin Ciucu and Jens B. Schmitt Maximizing Cache Hit Ratios by Variance Reduction . . . . . . . . . . . . . . . 57--59 Jian Tan and Li Zhang and Yandong Wang Miss behavior for caching with lease . . 60--62 Yudong Yang and Vishal Misra and Dan Rubenstein On the Optimality of Greedy Garbage Collection for SSDs . . . . . . . . . . 63--65 Sam Spencer and R. Srikant On the Impossibility of Localizing Multiple Rumor Sources in a Line Graph 66--68 Nicolas Gast The Power of Two Choices on Graphs: the Pair-Approximation is Accurate? . . . . 69--71 Siva Theja Maguluri and R. Srikant Heavy-Traffic Behavior of the MaxWeight Algorithm in a Switch with Uniform Traffic . . . . . . . . . . . . . . . . 72--74 Ana Bu\vsi\'c and Sean Meyn Approximate optimality with bounded regret in dynamic matching models . . . 75--77 Yingdong Lu and Mark S. Squillante and Chai Wah Wu and Bo Zhang On the Control of Epidemic-Like Stochastic Processes with Time-Varying Behavior? . . . . . . . . . . . . . . . 78--80
Marco Canini and James Kempf and Stefan Schmid How many planet-wide leaders should there be? . . . . . . . . . . . . . . . 3--6 Da Wang and Gauri Joshi and Gregory Wornell Using Straggler Replication to Reduce Latency in Large-scale Parallel Computing . . . . . . . . . . . . . . . 7--11 Anshul Gandhi and Justin Chan Analyzing the Network for AWS Distributed Cloud Computing . . . . . . 12--15 Rui Jia and Sherif Abdelwahed and Abdelkarim Erradi A Predictive Control Approach for Fault Management of Computing Systems . . . . 16--20 Hylson Vescovi Netto and Lau Cheuk Lung and Tulio Alberton Ribeiro and Miguel Correia and Aldelir Fernando Luiz Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage . . . . . . . . . . . . . . . . 21--24 Nadav Lavi and Hanoch Levy Admit or Reject? Preserve or Drop?: Operational Dilemmas upon Server Failures on the Cloud . . . . . . . . . 25--29 Tianrong Zhang and Yufeng Xin Towards Designing a Truthful Online Auction Framework for Deadline-aware Cloud Resource Allocation . . . . . . . 30--33 Nguyen H. Tran and Cuong T. Do and Choong Seon Hong and Shaolei Ren and Zhu Han Coordinated Colocation Datacenters for Economic Demand Responce . . . . . . . . 34--37 Arne Ludwig and Stefan Schmid Distributed Cloud Market: Who Benefits from Specification Flexibilities? . . . 38--41 Bo Mao and Suzhen Wu Deduplication-Assisted Data Reduction and Distribution in Cloud-of-Clouds . . 42--42 Anshul Gandhi and Naman Mittal and Xi Zhang Optimal Load-Balancing for Heterogeneous Clusters . . . . . . . . . . . . . . . . 43--43 Tan N. Le and Bong Jun Choi and Pradipta De Energy Cost Aware Scheduling of MapReduce Jobs across Geographically Distributed Nodes . . . . . . . . . . . 44--44 Sushil Bhojwani and Matt Hemmings and Dan Ingalls and Jens Lincke and Robert Krahn and David Lary and Rick McGeer and Glenn Ricart and Marko Roder and Yvonne Coady and Ulrike Stege The Ignite Distributed Collaborative Visualization System . . . . . . . . . . 45--46 Patrick Maillé and Bruno Tuffin Impact of Content Delivery Networks on Service and Content Innovation . . . . . 49--52 Kartik Ahuja and Simpson Zhang and Mihaela van der Schaar The Population Dynamics of Websites: [Extended Abstract] . . . . . . . . . . 53--56 Yuan Luo and Nihar B. Shah and Jianwei Huang and Jean Walrand Parametric Prediction from Parametric Agents? . . . . . . . . . . . . . . . . 57--57 Daron Acemoglu and Ali Makhdoumi and Azarakhsh Malekian and Asu Ozdaglar Privacy-Constrained Network Formation 58--58 Arthi Ramachandran and Augustin Chaintreau The Network Effect of Privacy Choices 59--62 M. H. Afrasiabi and R. Guérin Choice-based Pricing for User-Provided Connectivity? . . . . . . . . . . . . . 63--66 Reshef Meir and David Parkes Playing the Wrong Game: Smoothness Bounds for Congestion Games with Behavioral Biases . . . . . . . . . . . 67--70 Michal Feldman and Ophir Friedler Convergence to Strong Equilibrium in Network Design Games . . . . . . . . . . 71--71 Mikael Touati and Rachid El-Azouzi and Marceau Coupechoux and Eitan Altman and Jean-Marc Kelif Core Stable Algorithms for Coalition Games with Complementarities and Peer Effects . . . . . . . . . . . . . . . . 72--75 Cinar Kilcioglu and Costis Maglaras Revenue Maximization for Cloud Computing Services . . . . . . . . . . . . . . . . 76--76 Janardhan Kulkarni and Vahab Mirrokni Dynamic Coordination Mechanisms: [Extended Abstract] . . . . . . . . . . 77--77 Hamidreza Tavafoghi and Demosthenis Teneketzis Sequential Contracts for Uncertain Electricity Resources . . . . . . . . . 78--81 Eran Simhon and David Starobinski On the Impact of Sharing Information in Advance Reservation Systems . . . . . . 82--82 Sofia Ceppi and Ian Kash Personalized Payments for Storage-as-a-Service . . . . . . . . . . 83--86 Saif Benjaafar and Guangwen Kong and Xiang Li Modeling and Analysis of Collaborative Consumption in Peer-to-Peer Car Sharing 87--90
Diwakar Krishnamurthy and Anne Koziolek Performance Challenges, Current Bad Practices, and Hints in PaaS Cloud Application Design . . . . . . . . . . . 3--12 Robert Heinrich Architectural Run-time Models for Performance and Privacy Analysis in Dynamic Cloud Applications? . . . . . . 13--22 Zheng Li and Liam O'Brien and Maria Kihl DoKnowMe: Towards a Domain Knowledge-driven Methodology for Performance Evaluation . . . . . . . . . 23--32 Michael Grottke and Alberto Avritzer and Daniel S. Menasché and Leandro P. de Aguiar and Eitan Altman On the Efficiency of Sampling and Countermeasures to Critical-Infrastructure-Targeted Malware Campaigns . . . . . . . . . . . . . . . 33--42 Kim-Thomas Rehmann and Changyun Seo and Dongwon Hwang and Binh Than Truong and Alexander Boehm and Dong Hun Lee Performance Monitoring in SAP HANA's Continuous Integration Process . . . . . 43--52 Manoj Nambiar and Ajay Kattepur and Gopal Bhaskaran and Rekha Singhal and Subhasri Duttagupta Model Driven Software Performance Engineering: Current Challenges and Way Ahead . . . . . . . . . . . . . . . . . 53--62
David Gamarnik and John N. Tsitsiklis and Martin Zubeldia Delay, Memory, and Messaging Tradeoffs in Distributed Service Systems . . . . . 1--12 Siva Theja Maguluri and Sai Kiran Burle and R. Srikant Optimal Heavy-Traffic Queue Length Scaling in an Incompletely Saturated Switch . . . . . . . . . . . . . . . . . 13--24 Yun Zeng and Augustin Chaintreau and Don Towsley and Cathy H. Xia A Necessary and Sufficient Condition for Throughput Scalability of Fork and Join Networks with Blocking . . . . . . . . . 25--36 Michele Garetto and Emilio Leonardi and Giovanni Luca Torrisi Generalized Threshold-Based Epidemics in Random Graphs: The Power of Extreme Values . . . . . . . . . . . . . . . . . 37--50 Eliav Buchnik and Edith Cohen Reverse Ranking by Graph Structure: Model and Scalable Algorithms . . . . . 51--62 Daniel Cullina and Negar Kiyavash Improved Achievability and Converse Bounds for Erd\Hos--Rényi Graph Matching 63--72 Mor Harchol-Balter A Better Model for Task Assignment in Server Farms: How Replication can Help 73--73 Shaileshh Bojja Venkatakrishnan and Mohammad Alizadeh and Pramod Viswanath Costly Circuits, Submodular Schedules and Approximate Carathéodory Theorems . . 75--88 Shankaranarayanan Puzhavakath Narayanan and Yun Seong Nam and Ashiwan Sivakumar and Balakrishnan Chandrasekaran and Bruce Maggs and Sanjay Rao Reducing Latency Through Page-aware Management of Web Objects by Content Delivery Networks . . . . . . . . . . . 89--100 Andrés Ferragut and Ismael Rodriguez and Fernando Paganini Optimizing TTL Caches under Heavy-Tailed Demands . . . . . . . . . . . . . . . . 101--112 Stratis Ioannidis and Edmund Yeh Adaptive Caching Networks with Optimality Guarantees . . . . . . . . . 113--124 Philippe Jacquet Breathing Mankind Thoughts . . . . . . . 125--125 Zain Shamsi and Dmitri Loguinov Unsupervised Clustering Under Temporal Feature Volatility in Network Stack Fingerprinting . . . . . . . . . . . . . 127--138 Haipeng Dai and Yuankun Zhong and Alex X. Liu and Wei Wang and Meng Li Noisy Bloom Filters for Multi-Set Membership Testing . . . . . . . . . . . 139--151 Giulia Fanti and Peter Kairouz and Sewoong Oh and Kannan Ramchandran and Pramod Viswanath Rumor Source Obfuscation on Irregular Trees . . . . . . . . . . . . . . . . . 153--164 Konstantin Avrachenkov and Bruno Ribeiro and Jithin K. Sreedharan Inference in OSNs via Lightweight Partial Crawls . . . . . . . . . . . . . 165--177 Maksym Gabielkov and Arthi Ramachandran and Augustin Chaintreau and Arnaud Legout Social Clicks: What and Who Gets Read on Twitter? . . . . . . . . . . . . . . . . 179--192 Niangjun Chen and Joshua Comden and Zhenhua Liu and Anshul Gandhi and Adam Wierman Using Predictions in Online Optimization: Looking Forward with an Eye on the Past . . . . . . . . . . . . 193--206 Guy Bresler and Devavrat Shah and Luis Filipe Voloch Collaborative Filtering with Low Regret 207--220 Jia Liu Achieving Low-Delay and Fast-Convergence in Stochastic Network Optimization: a Nesterovian Approach . . . . . . . . . . 221--234 Liang Zheng and Carlee Joe-Wong and Christopher G. Brinton and Chee Wei Tan and Sangtae Ha and Mung Chiang On the Viability of a Cloud Virtual Service Provider . . . . . . . . . . . . 235--248 Weina Wang and Lei Ying and Junshan Zhang The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits . . . . . . . . . . . 249--260 Yuanjie Li and Haotian Deng and Jiayao Li and Chunyi Peng and Songwu Lu Instability in Distributed Mobility Management: Revisiting Configuration Management in 3G/4G Mobile Networks . . 261--272 Arne Ludwig and Szymon Dudyzc and Matthias Rost and Stefan Schmid Transiently Secure Network Updates . . . 273--284 Lei Ying On the Approximation Error of Mean-Field Models . . . . . . . . . . . . . . . . . 285--297 Bo Jiang and Daniel R. Figueiredo and Bruno Ribeiro and Don Towsley On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness . . . . . . . . . 299--310 Matthieu Jonckheere and Balakrishna J. Prabhu Asymptotics of Insensitive Load Balancing and Blocking Phases . . . . . 311--322 Kevin K. Chang and Abhijith Kashyap and Hasan Hassan and Saugata Ghose and Kevin Hsieh and Donghyuk Lee and Tianshi Li and Gennady Pekhimenko and Samira Khan and Onur Mutlu Understanding Latency Variation in Modern DRAM Chips: Experimental Characterization, Analysis, and Optimization . . . . . . . . . . . . . . 323--336 Idan Yaniv and Dan Tsafrir Hash, Don't Cache (the Page Table) . . . 337--350 Adwait Jog and Onur Kayiran and Ashutosh Pattnaik and Mahmut T. Kandemir and Onur Mutlu and Ravishankar Iyer and Chita R. Das Exploiting Core Criticality for Enhanced GPU Performance . . . . . . . . . . . . 351--363 Lam M. Nguyen and Alexander L. Stolyar A Service System with Randomly Behaving On-demand Agents . . . . . . . . . . . . 365--366 Stanko Novakovic and Alexandros Daglis and Edouard Bugnion and Babak Falsafi and Boris Grot An Analysis of Load Imbalance in Scale-out Data Serving . . . . . . . . . 367--368 Yi Cao and Javad Nejati and Pavan Maguluri and Aruna Balasubramanian and Anshul Gandhi Analyzing the Power Consumption of the Mobile Page Load . . . . . . . . . . . . 369--370 Mubashir Adnan Qureshi and Ajay Mahimkar and Lili Qiu and Zihui Ge and Sarat Puthenpura and Nabeel Mir and Sanjeev Ahuja Automated Test Location Selection For Cellular Network Upgrades . . . . . . . 371--372 Wenjie Liu and Ping Huang and Kun Tang and Ke Zhou and Xubin He CAR: a Compression-Aware Refresh Approach to Improve Memory Performance and Energy Efficiency . . . . . . . . . 373--374 Felix Poloczek and Florin Ciucu Contrasting Effects of Replication in Parallel Systems: From Overload to Underload and Back . . . . . . . . . . . 375--376 Benny Van Houdt Explicit Back-off Rates for Achieving Target Throughputs in CSMA/CA Networks 377--379 Liang Liu and Yating Wang and Lance Fortnow and Jin Li and Jun Xu Freestyle Dancing: Randomized Algorithms for Dynamic Storage Load-Balancing . . . 381--382 Xiaoqi Ren and Palma London and Juba Ziani and Adam Wierman Joint Data Purchasing and Data Placement in a Geo-Distributed Data Market . . . . 383--384 Arpan Mukhopadhyay and Ravi R. Mazumdar and Rahul Roy Majority Rule Based Opinion Dynamics with Biased and Stubborn Agents . . . . 385--386 Vamseedhar Reddyvari Raja and Vinod Ramaswamy and Srinivas Shakkottai and Vijay Subramanian Mean Field Equilibria of Pricing Games in Internet Marketplaces . . . . . . . . 387--388 Mansour Shafaei and Mohammad Hossein Hajkazemi and Peter Desnoyers and Abutalib Aghayev Modeling SMR Drive Performance . . . . . 389--390 Richard Combes and Habib Sidi and Salah Elayoubi Multipath Streaming: Fundamental Limits and Efficient Algorithms . . . . . . . . 391--392 Alireza Shekaramiz and Jorg Liebeherr and Almut Burchard Network Calculus Analysis of a Feedback System with Random Service . . . . . . . 393--394 Adnan Ahmed and Zubair Shafiq and Amir Khakpour QoE Analysis of a Large-Scale Live Video Streaming Event . . . . . . . . . . . . 395--396 Sen Yang and Bill Lin and Jun Xu Safe Randomized Load-Balanced Switching by Diffusing Extra Loads . . . . . . . . 397--398 Avik Ray and Sujay Sanghavi and Sanjay Shakkottai Searching For A Single Community in a Graph . . . . . . . . . . . . . . . . . 399--400 Daiping Liu and Xing Gao and Mingwei Zhang and Haining Wang Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games . . . . . . . . 401--402 Anastasios Giovanidis and Apostolos Avranas Spatial Multi-LRU Caching for Wireless Networks with Coverage Overlaps . . . . 403--405 Iyswarya Narayanan and Di Wang and Myeongjae Jeon and Bikash Sharma and Laura Caulfield and Anand Sivasubramaniam and Ben Cutler and Jie Liu and Badriddine Khessib and Kushagra Vaid SSD Failures in Datacenters: What, When and Why? . . . . . . . . . . . . . . . . 407--408 Kristen Gardner and Samuel Zbarsky and Mor Harchol-Balter and Alan Scheller-Wolf The Power of $d$ Choices for Redundancy 409--410 Hui Wang and Peter Varman Time-Based Bandwidth Allocation for Heterogeneous Storage . . . . . . . . . 411--413 Wei Wang and Baochun Li and Ben Liang and Jun Li Towards Multi-Resource Fair Allocation with Placement Constraints . . . . . . . 415--416 Hong Xie and Richard T. B. Ma and John C. S. Lui Trading Discount for Reputation?: On the Design and Analysis of E-Commerce Discount Mechanisms . . . . . . . . . . 417--418
Mark S. Squillante Estimation of the traffic intensity in a piecewise-stationary Mt/Gt/1 queue with probing . . . . . . . . . . . . . . . . 3--5 Nicolas Gast Construction of Lyapunov Functions via Relative Entropy with Application to Caching . . . . . . . . . . . . . . . . 6--8 Guilherme Domingues and Edmundo de Souza e Silva and Rosa Leão and Daniel Menasché and Don Towsley Search and Placement in Tiered Cache Networks . . . . . . . . . . . . . . . . 9--11 Kechao Cai and Hong Xie and John C. S. Lui Generalization of Information Spreading Forensics via Sequential Dependent Snapshots . . . . . . . . . . . . . . . 12--14 Erol Gelenbe Agreement in Spins and Social Networks 15--17 Josu Doncel and Nicolas Gast and Bruno Gaujal Are Mean-field Games the Limits of Finite Stochastic Games? . . . . . . . . 18--20 Eugene A. Feinberg and Yan Liang Structure of Optimal Solutions to Periodic-Review Total-Cost Stochastic Inventory Control Problems . . . . . . . 21--23 Christine Fricker and Fabrice Guillemin and Philippe Robert Analysis of Downgrading for Resource Allocation . . . . . . . . . . . . . . . 24--26 Yingdong Lu and Siva Theja Maguluri and Mark S. Squillante and Chai Wah Wu Risk-Based Dynamic Allocation of Computing Resources . . . . . . . . . . 27--29 Pavlos Sermpezis and Xenofontas Dimitropoulos Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time . . . . . . . . . . . . 30--32 Kristen Gardner and Samuel Zbarsky and Mark Velednitsky and Mor Harchol-Balter and Alan Scheller-Wolf Understanding Response Time in the Redundancy-$d$ System . . . . . . . . . 33--35 Debankur Mukherjee and Sem Borst and Johan van Leeuwaarden and Phil Whiting Universality of Power-of-$d$ Load Balancing Schemes . . . . . . . . . . . 36--38 S. Juneja and D. Manjunath To Lounge or to Queue Up . . . . . . . . 39--41 Alexander L. Stolyar Large-scale Service Systems with Packing Constraints and Heterogeneous Servers 42--44 Y. Lu and S. T. Maguluri and M. S. Squillante and T. Suk Delay-Optimal Scheduling for Some Input-Queued Switches . . . . . . . . . 45--47 Navid Azizan Ruhi and Niangjun Chen and Krishnamurthy Dvijotham and Adam Wierman Opportunities for Price Manipulation by Aggregators in Electricity Markets . . . 49--51 Joshua Comden and Zhenhua Liu and Yue Zhao Optimizing the Level of Commitment in Demand Response . . . . . . . . . . . . 52--67 Ruiting Zhou and Zongpeng Li and Chuan Wu An Emergency Demand Response Mechanism for Cloud Computing . . . . . . . . . . 58--63 Giovanni Neglia and Matteo Sereno and Giuseppe Bianchi Geographical Load Balancing across Green Datacenters: a Mean Field Analysis . . . 64--69 Alessandro Facchini and Cristina Rottondi and Giacomo Verticale Emergence of Shared Behaviour in Distributed Scheduling Systems for Domestic Appliances . . . . . . . . . . 70--75 Claudio Rossi and Manuel Gaetani and Antonio Defina AURORA: an Energy Efficient Public Lighting IoT System for Smart Cities . . 76--81 Mattia Dalmasso and Michela Meo and Daniela Renga Radio Resource Management for Improving Energy Self-sufficiency of Green Mobile Networks . . . . . . . . . . . . . . . . 82--87 Xiaoyi Fan and Feng Wang and Jiangchuan Liu Boosting Service Availability for Base Stations of Cellular Networks by Event-driven Battery Profiling . . . . . 88--93 Jianyuan Lu and Liang Liu and Jun ``Jim'' Xu and Bin Liu Toward Power-Efficient Backbone Routers 94--99
Rahul Vaze and Marceau Coupechoux Online Budgeted Truthful Matching . . . 3--6 Yongwhan Lim and Asuman Ozdaglar and Alexander Teytelboym Competitive Rumor Spread in Social Networks . . . . . . . . . . . . . . . . 7--14 Arpit Goel and Vijay Kamble and Siddhartha Banerjee and Ashish Goel Network Formation of Coalition Loyalty Programs . . . . . . . . . . . . . . . . 15--20 Reed Harder and Vikrant Vaze Two-Stage Game Theoretic Modelling of Airline Frequency and Fare Competition 21--21 Ashish R. Hota and Harsha Honnappa and Shreyas Sundaram The Superposition-Traffic Game . . . . . 22--25 Alexandre Reiffers-Masson and Eduardo Hargreaves and Eitan Altman and Wouter Caarls and Daniel S. Menasché Timelines are Publisher-Driven Caches: Analyzing and Shaping Timeline Networks 26--29 Y. Shan and C. Lo Prete and G. Kesidis and D. J. Miller A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk . . . . . . . . . . 30--30 Pierre L'Ecuyer and Patrick Maillé and Nicolás Stier-Moses and Bruno Tuffin Search (Non-)Neutrality and Impact on Innovation: Short talk . . . . . . . . . 31--31 Qian Ma and Jianwei Huang and Tamer Basar and Ji Liu and Xudong Chen Pricing for Sharing Economy with Reputation . . . . . . . . . . . . . . . 32--32 J.-Ch. Grégoire and Ang\`ele M. Hamel and D. Marc Kilgour Pricing for a Hybrid Delivery Model of Video Streaming . . . . . . . . . . . . 33--36 Angelos Antonopoulos and Chiara Perillo and Christos Verikoukis Internet Service Providers vs. Over-the-Top Companies: Friends or Foes? --- Short talk . . . . . . . . . . . . . 37--37 Chaolun Xia and Saikat Guha and S. Muthukrishnan How Much is Your Attention Worth?: Analysis of Prices in LinkedIn Advertising Network --- Short talk . . . 38--38 Thi Thu Han Nguyen and Olivier Brun and Balakrishna J. Prabhu Performance of a fixed reward incentive scheme for two-hop DTNs with competing relays: Short talk . . . . . . . . . . . 39--39
Martijn Onderwater and Gerard Hoekstra and Rob van der Mei Throughput Modeling of the IEEE MAC for Sensor Networks . . . . . . . . . . . . 2--9 Valeria Cardellini and Vincenzo Grassi and Francesco Lo Presti and Matteo Nardelli Optimal Operator Replication and Placement for Distributed Stream Processing Systems . . . . . . . . . . . 11--22 Eugenio Gianniti and Alessandro Maria Rizzi and Enrico Barbierato and Marco Gribaudo and Danilo Ardagna Fluid Petri Nets for the Performance Evaluation of MapReduce and Spark Applications . . . . . . . . . . . . . . 23--36 Francesco Longo and Rahul Ghosh and Vijay K. Naik and Andrew J. Rindos and Kishor S. Trivedi An Approach for Resiliency Quantification of Large Scale Systems 37--48 Claudia Canali and Riccardo Lancellotti Identifying Communication Patterns between Virtual Machines in Software-Defined Data Centers . . . . . 49--56 Francesco Bianchi and Francesco Lo Presti A Markov Reward based Resource-Latency Aware Heuristic for the Virtual Network Embedding Problem . . . . . . . . . . . 57--68 Lorenzo Donatiello and Gustavo Marfia Analyzing and shaping the lifetime and the performance of barrier coverage sensor networks . . . . . . . . . . . . 69--79 Riccardo Pinciroli and Salvatore Distefano Characterization and Evaluation of Mobile Crowdsensing Performance and Energy Indicators . . . . . . . . . . . 80--90 Niccoló Totis and Laura Follia and Chiara Riganti and Francesco Novelli and Francesca Cordero and Marco Beccuti Overcoming the lack of kinetic information in biochemical reactions networks . . . . . . . . . . . . . . . . 91--102
Leana Golubchik Delay Scalings and Mean-Field Limits in Networked Systems . . . . . . . . . . . 1--1 Konstantin Avrachenkov and Jasper Goseling and Berksan Serbetci A Low-Complexity Approach to Distributed Cooperative Caching with Geographic Constraints . . . . . . . . . . . . . . 2--2 Debankur Mukherjee and Souvik Dhara and Sem C. Borst and Johan S. H. van Leeuwaarden Optimal Service Elasticity in Large-Scale Distributed Systems . . . . 3--3 Long Gong and Paul Tune and Liang Liu and Sen Yang and Jun (Jim) Xu Queue-Proportional Sampling: a Better Approach to Crossbar Scheduling for Input-Queued Switches . . . . . . . . . 4--4 Xiaoen Ju and Hani Jamjoom and Kang G. Shin Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge . . . 5--5 Lingda Li and Robel Geda and Ari B. Hayes and Yanhao Chen and Pranav Chaudhari and Eddy Z. Zhang and Mario Szegedy A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing 6--6 Maxime C. Cohen and Philipp Keller and Vahab Mirrokni and Morteza Zadimoghadddam Overcommitment in Cloud Services Bin packing with Chance Constraints . . . . 7--7 Alan Quach and Zhongjie Wang and Zhiyun Qian Investigation of the 2016 Linux TCP Stack Vulnerability at Scale . . . . . . 8--8 Brandon Wang and Xiaoye Li and Leandro P. de Aguiar and Daniel S. Menasche and Zubair Shafiq Characterizing and Modeling Patching Practices of Industrial Control Systems 9--9 Sinong Wang and Ness Shroff Security Game with Non-additive Utilities and Multiple Attacker Resources . . . . . . . . . . . . . . . 10--10 Anton Braverman and J. G. Dai and Xin Liu and Lei Ying Fluid-Model-Based Car Routing for Modern Ridesharing Systems . . . . . . . . . . 11--12 Alan Kuhnle and Tianyi Pan and Victoria G. Crawford and Md Abdul Alim and My T. Thai Pseudo-Separation for Assessment of Structural Vulnerability of a Network 13--14 Han Deng and I-Hong Hou On the Capacity Requirement for Arbitrary End-to-End Deadline and Reliability Guarantees in Multi-hop Networks . . . . . . . . . . . . . . . . 15--16 Maotong Xu and Sultan Alamro and Tian Lan and Suresh Subramaniam Optimizing Speculative Execution of Deadline-Sensitive Jobs in Cloud . . . . 17--18 Mohammad A. Islam and Xiaoqi Ren and Shaolei Ren and Adam Wierman A Spot Capacity Market to Increase Power Infrastructure Utilization in Multi-Tenant Data Centers . . . . . . . 19--20 Lin Yang and Mohammad H. Hajiesmaili and Hanling Yi and Minghua Chen Hour-Ahead Offering Strategies in Electricity Market for Power Producers with Storage and Intermittent Supply . . 21--22 Xing Gao and Zhang Xu and Haining Wang and Li Li and Xiaorui Wang Why ``Some'' Like It Hot Too: Thermal Attack on Data Centers . . . . . . . . . 23--24 Joshua Comden and Zhenhua Liu and Yue Zhao Incentivizing Reliable Demand Response with Customers' Uncertainties and Capacity Planning . . . . . . . . . . . 25--26 Amin Jadidi and Mohammad Arjomand and Mahmut Kandemir and Chita Das A Study on Performance and Power Efficiency of Dense Non-Volatile Caches in Multi-Core Systems . . . . . . . . . 27--28 Mehrnoosh Shafiee and Javad Ghaderi Scheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time . . . . . . . . 29--30 Qin Xiong and Fei Wu and Zhonghai Lu and Yue Zhu and You Zhou and Yibing Chu and Changsheng Xie and Ping Huang Characterizing $3$D Floating Gate NAND Flash . . . . . . . . . . . . . . . . . 31--32 Yeon-sup Lim and Erich M. Nahum and Don Towsley and Richard J. Gibbens ECF: an MPTCP Path Scheduler to Manage Heterogeneous Paths . . . . . . . . . . 33--34 Mehmet Fatih Aktas and Elie Najm and Emina Soljanin Simplex Queues for Hot-Data Download . . 35--36 Siddharth Singh and Vedant Nanda and Rijurekha Sen and Sohaib Ahmad and Satadal Sengupta and Amreesh Phokeer and Zaid Ahmed Farooq and Taslim Arefin Khan and Ponnurangam Kumaragaguru and Ihsan Ayyub Qazi and David Choffnes and Krishna P. Gummadi An Empirical Analysis of Facebook's Free Basics . . . . . . . . . . . . . . . . . 37--38 Jorge Mena and Peter Bankole and Mario Gerla Multipath TCP on a VANET: a Performance Study . . . . . . . . . . . . . . . . . 39--40 Ye Yu and Djamal Belazzougui and Chen Qian and Qin Zhang A Fast, Small, and Dynamic Forwarding Information Base . . . . . . . . . . . . 41--42 Ning Wu and Yingjie Bi and Nithin Michael and Ao Tang and John Doyle and Nikolai Matni HFTraC: High-Frequency Traffic Control 43--44 Soumya Basu and Aditya Sundarrajan and Javad Ghaderi and Sanjay Shakkottai and Ramesh Sitaraman Adaptive TTL-Based Caching for Content Delivery . . . . . . . . . . . . . . . . 45--46 Vahab Mirrokni Online Optimization for Markets and the Cloud: Theory and Practice . . . . . . . 47--48 Lei Ying Stein's Method for Mean-Field Approximations in Light and Heavy Traffic Regimes . . . . . . . . . . . . 49--49 Nicolas Gast Expected Values Estimated via Mean-Field Approximation are $ 1 / N $-Accurate: Extended Abstract . . . . . . . . . . . 50--50 Wen Sun and Véronique Simon and Sébastien Monnet and Philippe Robert and Pierre Sens Analysis of a Stochastic Model of Replication in Large Distributed Storage Systems: a Mean-Field Approach . . . . . 51--51 Kevin K. Chang and Abdullah Giray Yaglikçi and Saugata Ghose and Aditya Agrawal and Niladrish Chatterjee and Abhijith Kashyap and Donghyuk Lee and Mike O'Connor and Hasan Hassan and Onur Mutlu Understanding Reduced-Voltage Operation in Modern DRAM Devices: Experimental Characterization, Analysis, and Mechanisms . . . . . . . . . . . . . . . 52--52 Wonil Choi and Mohammad Arjomand and Myoungsoo Jung and Mahmut T. Kandemir Exploiting Data Longevity for Enhancing the Lifetime of Flash-based Storage Class Memory . . . . . . . . . . . . . . 53--53 Donghyuk Lee and Samira Khan and Lavanya Subramanian and Saugata Ghose and Rachata Ausavarungnirun and Gennady Pekhimenko and Vivek Seshadri and Onur Mutlu Design-Induced Latency Variation in Modern DRAM Chips: Characterization, Analysis, and Latency Reduction Mechanisms . . . . . . . . . . . . . . . 54--54 Mathias Gibbens and Chris Gniady and Lei Ye and Beichuan Zhang Hadoop on Named Data Networking: Experience and Results . . . . . . . . . 55--55 Cheng Wang and Bhuvan Urgaonkar and Neda Nasiriani and George Kesidis Using Burstable Instances in the Public Cloud: Why, When and How? . . . . . . . 56--56 Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath Dandelion: Redesigning the Bitcoin Network for Anonymity . . . . . . . . . 57--57 Michael Jordan On Gradient-Based Optimization: Accelerated, Distributed, Asynchronous and Stochastic . . . . . . . . . . . . . 58--58 Prateek Sharma and David Irwin and Prashant Shenoy Portfolio-driven Resource Management for Transient Cloud Servers . . . . . . . . 59--59 Zijun Zhang and Zongpeng Li and Chuan Wu Optimal Posted Prices for Online Cloud Resource Allocation . . . . . . . . . . 60--60 Xin Wang and Richard T. B. Ma and Yinlong Xu On Optimal Two-Sided Pricing of Congested Networks . . . . . . . . . . . 61--61 Sewoong Oh Matrix Factorization at the Frontier of Non-convex Optimizations: Abstract for SIGMETRICS 2017 Rising Star Award Talk 62--62 Hung T. Nguyen and Tri P. Nguyen and Tam N. Vu and Thang N. Dinh Outward Influence and Cascade Size Estimation in Billion-scale Networks . . 63--63 Giuliano Casale Accelerating Performance Inference over Closed Systems by Asymptotic Methods . . 64--64 Steffen Bondorf and Paul Nikolaus and Jens B. Schmitt Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis . . . . 65--65 David Formby and Anwar Walid and Raheem Beyah A Case Study in Power Substation Network Dynamics . . . . . . . . . . . . . . . . 66--66 You Zhou and Yian Zhou and Min Chen and Shigang Chen Persistent Spread Measurement for Big Network Data Based on Register Intersection . . . . . . . . . . . . . . 67--67 Yi Cao and Javad Nejati and Muhammad Wajahat and Aruna Balasubramanian and Anshul Gandhi Deconstructing the Energy Consumption of the Mobile Page Load . . . . . . . . . . 68--68 Richard T. B. Ma and Vishal Misra Routing Money, Not Packets: a Tutorial on Internet Economics . . . . . . . . . 69--70
Mark S. Squillante On the Optimality of Reflection Control, with Production-Inventory Applications 3--5 Eugene A. Feinberg and Jefferson Huang Strongly Polynomial Algorithms for Transient and Average-Cost MDPs . . . . 6--8 Gauri Joshi Boosting Service Capacity via Adaptive Task Replication . . . . . . . . . . . . 9--11 Mehmet Fatih Aktas and Pei Peng and Emina Soljanin Effective Straggler Mitigation: Which Clones Should Attack and When? . . . . . 12--14 Weixuan Lin and John Z. F. Pang and Eilyan Bitar and Adam Wierman Networked Cournot Competition in Platform Markets: Access Control and Efficiency Loss . . . . . . . . . . . . 15--17 Tyler Maxey and Hakjin Chung and Hyun-Soo Ahn and Rhonda Righter When is Anarchy Beneficial? . . . . . . 18--20 Nitish K. Panigrahy and Jian Li and Don Towsley Hit Rate vs. Hit Probability Based Cache Utility Maximization . . . . . . . . . . 21--23 Bo Jiang and Philippe Nain and Don Towsley LRU Cache under Stationary Requests . . 24--26 Gautam Goel and Niangjun Chen and Adam Wierman Thinking Fast and Slow: Optimization Decomposition Across Timescales . . . . 27--29 Palma London and Niangjun Chen and Shai Vardi and Adam Wierman Distributed Optimization via Local Computation Algorithms . . . . . . . . . 30--32 Angelos Aveklouris and Yorie Nakahira and Maria Vlasiou and Bert Zwart Electric vehicle charging: a queueing approach . . . . . . . . . . . . . . . . 33--35 Ziv Scully and Guy Blelloch and Mor Harchol-Balter and Alan Scheller-Wolf Optimally Scheduling Jobs with Multiple Tasks . . . . . . . . . . . . . . . . . 36--38 Yuliy Baryshnikov and Abram Magner Large Deviations for Increasing Subsequences of Permutations and a Concurrency Application . . . . . . . . 39--41 Arnab Ganguly and Kavita Ramanan and Philippe Robert and Wen Sun A Large-Scale Network with Moving Servers . . . . . . . . . . . . . . . . 42--44 Sergey Foss and Alexander L. Stolyar Join-Idle-Queue system with general service times: Large-scale limit of stationary distributions . . . . . . . . 45--47 Yingdong Lu and Mark S. Squillante and Chai Wah Wu Nearly Completely Decomposable Epidemic-Like Stochastic Processes with Time-Varying Behavior . . . . . . . . . 48--50 Joshua Comden and Zhenhua Liu and Yue Zhao Distributed Algorithm Design for Probabilistic Demand Response . . . . . 52--54 Mohammad H. Hajiesmaili and Minghua Chen and Enrique Mallada and Chi-Kin Chau Summary of Recent Results: Crowd-Sourced Storage-Assisted Demand Response in Microgrids . . . . . . . . . . . . . . . 55--57 Tan N. Le and Jie Liang and Zhenhua Liu and Ramesh K. Sitaraman and Jayakrishnan Nair and Bong Jun Choi Optimal Energy Procurement for Geo-distributed Data Centers in Multi-timescale Electricity Markets . . 58--63 Wei Wang and Nanpeng Yu Phase Balancing in Power Distribution Network with Data Center . . . . . . . . 64--69 Hitoshi Oi A Case Study of Energy Efficiency on a Heterogeneous Multi-Processor . . . . . 70--72 Qiang Wang and Xiaowen Chu GPGPU Power Estimation with Core and Memory Frequency Scaling . . . . . . . . 73--78 Dong Chen and David Irwin Black-box Solar Performance Modeling: Comparing Physical, Machine Learning, and Hybrid Approaches . . . . . . . . . 79--84 Pengcheng You and Youxian Sun and John Pang and Steven Low and Minghua Chen Battery Swapping Assignment for Electric Vehicles: a Bipartite Matching Approach 85--87 Thinh T. Doan and Subhonmesh Bose and Carolyn L. Beck Distributed Lagrangian Method for Tie-Line Scheduling in Power Grids under Uncertainty . . . . . . . . . . . . . . 88--90 Mohammad A. Islam and Shaolei Ren and Adam Wierman A First Look at Power Attacks in Multi-Tenant Data Centers . . . . . . . 91--93 John Z. F. Pang and Linqi Guo and Steven H. Low Load-side Frequency Regulation with Limited Control Coverage . . . . . . . . 94--96 Andjelka Kelic Interdependencies in Critical Infrastructure Modeling . . . . . . . . 99--102 Linqi Guo and Chen Liang and Steven H. Low Monotonicity Properties and Spectral Characterization of Power Redistribution in Cascading Failures . . . . . . . . . 103--106 Jorik Oostenbrink and Fernando Kuipers Computing the Impact of Disasters on Networks . . . . . . . . . . . . . . . . 107--110 Saleh Soltan and Gil Zussman Algorithms for Power Grid State Estimation after Cyber-Physical Attacks 111--114 Daniel Bienstock and Mauro Escobar Computing undetectable attacks on power grids . . . . . . . . . . . . . . . . . 115--118 George Stergiopoulos and Evangelos Valvis and Foivos Anagnou-Misyris and Nick Bozovic and Dimitris Gritzalis Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures . . . . . 119--124 Juntao Chen and Corinne Touati and Quanyan Zhu A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 . . . . . . . . . . . . . 128 Jianguo Ding and Yacine Atif and Sten F. Andler and Birgitta Lindström and Manfred Jeusfeld CPS-based Threat Modeling for Critical Infrastructure Protection . . . . . . . 129--132
Xunyu Zhou Who Are I: Intrapersonal Conflicts in Performance Measure and Control . . . . 1--1 Ali Yekkehkhany and Avesta Hojjati and Mohammad H. Hajiesmaili GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling . . . . . . . . . . . . . . . 2--14 Diego Goldsztajn and Andres Ferragut and Fernando Paganini and Matthieu Jonckheere Controlling the number of active instances in a cloud environment . . . . 15--20 Gauri Joshi Synergy via Redundancy: Boosting Service Capacity with Adaptive Replication . . . 21--28 Ting He Distributed Link Anomaly Detection via Partial Network Tomography . . . . . . . 29--42 Diman Zad Tootaghaj and Ting He and Thomas La Porta Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring . . . . 43--55 Bart Jansen and Timothy Goodwin and Varun Gupta and Fernando Kuipers and Gil Zussman Performance Evaluation of WebRTC-based Video Conferencing . . . . . . . . . . . 56--68 S. B. Moka and S. Juneja and M. R. H. Mandjes Analysis of Perfect Sampling Methods for Hard-sphere Models . . . . . . . . . . . 69--75 Alexandre Hollocou and Thomas Bonald and Marc Lelarge Multiple Local Community Detection . . . 76--83 Yuli Baryshnikov and Abram Magner Large Deviations for Increasing Subsequences of Permutations and a Concurrency Application . . . . . . . . 84--89 Sujay Bhatt and Vikram Krishnamurthy Incentivized Information Fusion with Social Sensors . . . . . . . . . . . . . 90--95 Emmanuel Abbe Learning from graphical data . . . . . . 96--96 Fengyou Sun and Yuming Jiang A Statistical Property of Wireless Channel Capacity: Theory and Application 97--108 F. Cecchi and P. M. Van de Ven and S. Shneer Mean-field limits for multi-hop random-access networks . . . . . . . . . 109--122 F. Cecchi and S. C. Borst and J. S. H. van Leeuwaarden and P. A. Whiting Spatial Mean-Field Limits for Ultra-Dense Random-Access Networks . . . 123--136 S. Juneja and N. Shimkin On the Computation of Dynamic User Equilibrium in the Multiclass Transient Fluid Queue . . . . . . . . . . . . . . 137--142 Miklos Telek and Benny Van Houdt Response Time Distribution of a Class of Limited Processor Sharing Queues . . . . 143--155 Y. C. Tay A technique to estimate a system's asymptotic delay and throughput . . . . 156--159 Yingdong Lu and Mark S. Squillante and Chai Wah Wu Epidemic-Like Stochastic Processes with Time-Varying Behavior: Structural Properties and Asymptotic Limits . . . . 160--166 Zaid Allybokus and Konstantin Avrachenkov and Jérémie Leguay and Lorenzo Maggi Lower Bounds for the Fair Resource Allocation Problem . . . . . . . . . . . 167--173 Ruidi Chen and Ioannis Paschalidis Outlier Detection Using Robust Optimization with Uncertainty Sets Constructed from Risk Measures . . . . . 174--179 Jiankui Yang and David D. Yao and Heng-Qing Ye On the Optimality of Reflection Control, with Production-Inventory Applications 180--183 Albert Greenberg Azure Networking . . . . . . . . . . . . 184--184 Tan N. Le and Jie Liang and Zhenhua Liu and Ramesh K. Sitaraman and Jayakrishnan Nair and Bong Jun Choi Optimal Energy Procurement for Geo-distributed Data Centers in Multi-timescale Electricity Markets . . 185--197 Hale Cetinay and Saleh Soltan and Fernando A. Kuipers and Gil Zussman and Piet Van Mieghem Analyzing Cascading Failures in Power Grids under the AC and DC Power Flow Models . . . . . . . . . . . . . . . . . 198--203 Eleonora Deiana and Guy Latouche and Marie-Ange Remiche Fluid flow model for energy-aware server performance evaluation . . . . . . . . . 204--209 Debasis Mitra and Qiong Wang Management Strategies for Industrial Laboratories with Knowledge Memory . . . 210--216 Y. Lu and S. T. Maguluri and M. S. Squillante and T. Suk and X. Wu Optimal Energy Procurement for Geo-distributed Data Centers in Multi-timescale Electricity Markets . . 217--223 Mehmet Fatih Aktas and Pei Peng and Emina Soljanin Straggler Mitigation by Delayed Relaunch of Tasks . . . . . . . . . . . . . . . . 224--231 Weina Wang and Siva Theja Maguluri and R. Srikant and Lei Ying Heavy-Traffic Delay Insensitivity in Connection-Level Models of Data Transfer with Proportionally Fair Bandwidth Sharing . . . . . . . . . . . . . . . . 232--245 Giuliano Casale and Giuseppe Serazzi and Lulai Zhu Performance Evaluation with Java Modelling Tools: a Hands-on Introduction 246--247 Giacomo Nannicini Straggler Mitigation by Delayed Relaunch of Tasks . . . . . . . . . . . . . . . . 248--248 Siva Theja Maguluri and R. Srikant and Weina Wang The Drift Method for Heavy Traffic Limits, with Applications in Data Centers and Networks . . . . . . . . . . 249--249 Anton Braverman and Jim Dai Stein's Method for Steady-State Approximations: Error Bounds and Engineering Solutions . . . . . . . . . 250--250
Konstantin Avrachenkov and Tejas Bodas On the equivalence between multiclass processor sharing and random order scheduling policies . . . . . . . . . . 2--6 Ranjan Pal and Leana Golubchik and Konstantinos Psounis and Pan Hui Improving Cyber-Security via Profitable Insurance Markets . . . . . . . . . . . 7--15 Vishal Misra Session details: Performance Evaluation Review . . . . . . . . . . . . . . . . .
Jim Dai Steady-state Approximations: Achievement Lecture . . . . . . . . . . . . . . . . 1--1 Siddhartha Banerjee and Yash Kanoria and Pengyu Qian State Dependent Control of Closed Queueing Networks . . . . . . . . . . . 2--4 Giulia Fanti and Shaileshh Bojja Venkatakrishnan and Surya Bakshi and Bradley Denby and Shruti Bhargava and Andrew Miller and Pramod Viswanath Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees . . . . . . . . . . . . . . . 5--7 Eliav Buchnik and Edith Cohen Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity . . . . . . . 8--10 Jessica Hoffmann and Constantine Caramanis The Cost of Uncertainty in Curing Epidemics . . . . . . . . . . . . . . . 11--13 Thibault Séjourné and Samitha Samaranayake and Siddhartha Banerjee The Price of Fragmentation in Mobility-on-Demand Services . . . . . . 14--16 Muhammad J. Amjad and Devavrat Shah Censored Demand Estimation in Retail . . 17--19 Margaret Martonosi New Metrics and Models for a Post-ISA Era: Managing Complexity and Scaling Performance in Heterogeneous Parallelism and Internet-of-Things . . . . . . . . . 20--20 Sem Borst and Martin Zubeldia Delay Scaling in Many-Sources Wireless Networks without Queue State Information 21--23 Daniel S. Berger and Nathan Beckmann and Mor Harchol-Balter Practical Bounds on Optimal Caching with Variable Object Sizes . . . . . . . . . 24--26 Jian Tan and Guocong Quan and Kaiyi Ji and Ness Shroff On Resource Pooling and Separation for LRU Caching . . . . . . . . . . . . . . 27--27 Lin Yang and Wing Shing Wong and Mohammad H. Hajiesmaili An Optimal Randomized Online Algorithm for QoS Buffer Management . . . . . . . 28--30 Qingkai Liang and Eytan Modiano Minimizing Queue Length Regret Under Adversarial Network Models . . . . . . . 31--32 Rupert Freeman and Seyed Majid Zahedi and Vincent Conitzer and Benjamin C. Lee Dynamic Proportional Sharing: a Game-Theoretic Approach . . . . . . . . 33--35 Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf SOAP: One Clean Analysis of All Age-Based Scheduling Policies . . . . . 36--38 Arjun Anand and Gustavo de Veciana A Whittle's Index Based Approach for QoE Optimization in Wireless Networks . . . 39--39 Jon Kleinberg Inherent Trade-Offs in Algorithmic Fairness . . . . . . . . . . . . . . . . 40--40 Lin Yang and Lei Deng and Mohammad H. Hajiesmaili and Cheng Tan and Wing Shing Wong An Optimal Algorithm for Online Non-Convex Learning . . . . . . . . . . 41--43 Santiago Duran and Ina Maria Verloop Asymptotic Optimal Control of Markov-Modulated Restless Bandits . . . 44--46 Stefan Magureanu and Alexandre Proutiere and Marcus Isaksson and Boxun Zhang Online Learning of Optimally Diverse Rankings . . . . . . . . . . . . . . . . 47--49 Mohammad Sadegh Talebi and Alexandre Proutiere Learning Proportionally Fair Allocations with Low Regret . . . . . . . . . . . . 50--52 Donggyu Yun and Sumyeong Ahn and Alexandre Proutiere and Jinwoo Shin and Yung Yi Multi-armed Bandit with Additional Observations . . . . . . . . . . . . . . 53--55 Xiaohan Wei and Hao Yu and Michael J. Neely Online Learning in Weakly Coupled Markov Decision Processes: a Convergence Time Study . . . . . . . . . . . . . . . . . 56--58 Pengfei Zheng and Benjamin C. Lee Hound: Causal Learning for Datacenter-scale Straggler Diagnosis . . 59--61 Vlad Nitu and Aram Kocharyan and Hannas Yaya and Alain Tchana and Daniel Hagimont and Hrachya Astsatryan Working Set Size Estimation Techniques in Virtualized Environments: One Size Does not Fit All . . . . . . . . . . . . 62--63 Shenglin Zhang and Ying Liu and Weibin Meng and Zhiling Luo and Jiahao Bu and Sen Yang and Peixian Liang and Dan Pei and Jun Xu and Yuzhi Zhang and Yu Chen and Hui Dong and Xianping Qu and Lei Song PreFix: Switch Failure Prediction in Datacenter Networks . . . . . . . . . . 64--66 Konstantinos Psychas and Javad Ghaderi On Non-Preemptive VM Scheduling in the Cloud . . . . . . . . . . . . . . . . . 67--69 Mohammad A. Islam and Luting Yang and Kiran Ranganath and Shaolei Ren Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel . . . . . 70--72 Saba Ahmadian and Onur Mutlu and Hossein Asadi ECI-Cache: a High-Endurance and Cost-Efficient I/O Caching Scheme for Virtualized Platforms . . . . . . . . . 73--73 Zhaowei Tan and Yuanjie Li and Qianru Li and Zhehui Zhang and Zhehan Li and Songwu Lu Supporting Mobile VR in LTE Networks: How Close Are We? . . . . . . . . . . . 74--74 Yvonne-Anne Pignolet and Stefan Schmid and Gilles Tredan Tomographic Node Placement Strategies and the Impact of the Routing Model . . 75--77 Christina Vlachou and Ioannis Pefkianakis and Kyu-Han Kim LTERadar: Towards LTE-Aware Wi-Fi Access Points . . . . . . . . . . . . . . . . . 78--80 Alan Kuhnle and Victoria G. Crawford and My T. Thai Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees . . . . . . . . . . . . . . . 81--83 Sen Yang and He Yan and Zihui Ge and Dongmei Wang and Jun Xu Predictive Impact Analysis for Designing a Resilient Cellular Backhaul Network 84--86 Kausik Subramanian and Loris D'Antoni and Aditya Akella Synthesis of Fault-Tolerant Distributed Router Configurations . . . . . . . . . 87--89 Kuang Xu and Se-Young Yun Reinforcement with Fading Memories . . . 90--92 Thinh T. Doan and Carolyn L. Beck and R. Srikant On the Convergence Rate of Distributed Gradient Methods for Finite-Sum Optimization under Communication Delays 93--95 Yudong Chen and Lili Su and Jiaming Xu Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent . . . . . . . . . . . . 96--96 Mowei Wang and Yong Cui and Shihan Xiao and Xin Wang and Dan Yang and Kai Chen and Jun Zhu Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning 97--99 Tao B. Schardl and Tyler Denniston and Damon Doucet and Bradley C. Kuszmaul and I-Ting Angelina Lee and Charles E. Leiserson The CSI Framework for Compiler-Inserted Program Instrumentation . . . . . . . . 100--102 Akshay Jain and Mahmoud Khairy and Timothy G. Rogers A Quantitative Evaluation of Contemporary GPU Simulation Methodology 103--105 Yixin Luo and Saugata Ghose and Yu Cai and Erich F. Haratsch and Onur Mutlu Improving $3$D NAND Flash Memory Lifetime by Tolerating Early Retention Loss and Process Variation . . . . . . . 106--106 Xiaomeng Chen and Jiayi Meng and Y. Charlie Hu and Maruti Gupta and Ralph Hasholzner and Venkatesan Nallampatti Ekambaram and Ashish Singh and Srikathyayani Srikanteswara A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis . . . . . . . . . . . . . 107--109 Saugata Ghose and Abdullah Giray Yaglikçi and Raghav Gupta and Donghyuk Lee and Kais Kudrolli and William X. Liu and Hasan Hassan and Kevin K. Chang and Niladrish Chatterjee and Aditya Agrawal and Mike O'Connor and Onur Mutlu What Your DRAM Power Models Are Not Telling You: Lessons from a Detailed Experimental Study . . . . . . . . . . . 110--110 Oleksii Oleksenko and Dmitrii Kuvaiskii and Pramod Bhatotia and Pascal Felber and Christof Fetzer Intel MPX Explained: a Cross-layer Analysis of the Intel MPX System Stack 111--112 Nicolas Gast and Benny Van Houdt A Refined Mean Field Approximation . . . 113--113 Tim Hellemans and Benny Van Houdt On the Power-of-d-choices with Least Loaded Server Selection . . . . . . . . 114--114 Xingyu Zhou and Fei Wu and Jian Tan and Kannan Srinivasan and Ness Shroff Degree of Queue Imbalance: Overcoming the Limitation of Heavy-traffic Delay Optimality in Load Balancing Systems . . 115--115 Benjamin Berg and Jan-Pieter Dorsman and Mor Harchol-Balter Towards Optimality in Parallel Job Scheduling . . . . . . . . . . . . . . . 116--118 Bo Jiang and Philippe Nain and Don Towsley and Saikat Guha On a Class of Stochastic Multilayer Networks . . . . . . . . . . . . . . . . 119--121 Yun Zeng and Jian Tan and Cathy Honghui Xia Fork and Join Queueing Networks with Heavy Tails: Scaling Dimension and Throughput Limit . . . . . . . . . . . . 122--124 Thomas Bonald and Céline Comte and Fabien Mathieu Performance of Balanced Fairness in Resource Pools: a Recursive Approach . . 125--127 Xingyu Zhou and Fei Wu and Jian Tan and Yin Sun and Ness Shroff Designing Low-Complexity Heavy-Traffic Delay-Optimal Load Balancing Schemes: Theory to Algorithms . . . . . . . . . . 128--128 Sinong Wang and Ness Shroff Towards Fast-Convergence, Low-Delay and Low-Complexity Network Optimization . . 129--131 Reza Aghajani and Xingjie Li and Kavita Ramanan The PDE Method for the Analysis of Randomized Load Balancing Networks . . . 132--134 Sen Yang and Bill Lin and Jun Xu Safe Randomized Load-Balanced Switching by Diffusing Extra Loads . . . . . . . . 135--137 Debankur Mukherjee and Sem Borst and Johan S. H. van Leeuwaarden Asymptotically Optimal Load Balancing Topologies . . . . . . . . . . . . . . . 138--138 Nidhi Hegde ACM Sigmetrics Performance Evaluation Review: a New Series on Diversity . . . 139--139 Leana Golubchik and Mallory Redel Diversity in Faculty Recruiting: a WiSE Approach . . . . . . . . . . . . . . . . 140--142 Giulia Fanti Session details: Load Balancing . . . . Nicolas Gast Session details: Resource Management II Leana Golubchik Session details: Learning I . . . . . . Mor Harchol-Balter Session details: Scheduling I . . . . . Benny Van Houdt Session details: Networking . . . . . . Siva Theja Maguluri Session details: Emerging Areas . . . . Vishal Misra Session details: Resource Management I Shaolei Ren Session details: Systems . . . . . . . . Devavrat Shah Session details: Learning II . . . . . .
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2018) . . . . . . . . . . 2--2 Hong Xie and John C. S Lui A Markov Decision Process Approach to Analyze Discount & Reputation Trade-offs in E-commerce Systems . . . . . . . . . 3--5 Yudong Yang and Vishal Misra and Dan Rubenstein A Modeling Approach to Classifying Malicious Cloud Users via Shuffling . . 6--8 Isaac Grosof and Ziv Scully and Mor Harchol-Balter SRPT for Multiserver Systems . . . . . . 9--11 Yorie Nakahira and Andres Ferragut and Adam Wierman Minimal-variance distributed scheduling under strict demands and deadlines . . . 12--14 Xin Liu and Lei Ying A Simple Steady-State Analysis of Load Balancing Algorithms in the Sub-Halfin--Whitt Regime . . . . . . . . 15--17 Debankur Mukherjee and Alexander Stolyar Join-Idle-Queue with Service Elasticity 18--20 Xiao Sun and Tan N. Le and Mosharaf Chowdhury and Zhenhua Liu Fair Allocation of Heterogeneous and Interchangeable Resources . . . . . . . 21--23 Urtzi Ayesta On redundancy-$d$ with cancel-on-start a.k.a Join-shortest-work ($d$) . . . . . 24--26 Nitish K. Panigrahy and Prithwish Basu and Don Towsley and Ananthram Swami and Kevin S. Chan and Kin K. Leung A queueing-theoretic model for resource allocation in one-dimensional distributed analytics network? . . . . . 27--29 Nicolas Gast and Diego Latella and Mieke Massink A Refined Mean Field Approximation for Synchronous Population Processes . . . . 30--32 Seva Shneer and Alexander Stolyar Stability of a standard decentralised medium access . . . . . . . . . . . . . 33--35 Anirudh Anirudh Sabnis and Ramesh K. Sitaraman and Donald Towsley OCCAM: an Optimization Based Approach to Network Inference . . . . . . . . . . . 36--38 Junjie Qin and Ram Rajagopal and Shai Vardi and Adam Wierman Convex Prophet Inequalities . . . . . . 39--41 Gautam Goel Smoothed Online Convex Optimization via Online Balanced Descent . . . . . . . . 42--44 Soumyadip Ghosh and Mark S. Squillante and Ebisa D. Wollega On Min-Max Optimization Over Large Data Sets . . . . . . . . . . . . . . . . . . 45--47 My T. Thai and Arun Sen and Arun Das ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security 48--49 Saleh Soltan and Mihalis Yannakakis and Gil Zussman REACT to Cyber-Physical Attacks on Power grids (Extended Abstract) . . . . . . . 50--51 Linan Huang and Quanyan Zhu Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks . . . . . . . . 52--56 Linqi Guo and Chen Liang and Alessandro Zocca and Steven H. Low and Adam Wierman Failure Localization in Power Systems via Tree Partitions . . . . . . . . . . 57--61 Jorik Oostenbrink and Fernando A. Kuipers and Poul E. Heegaard and Bjarne E. Helvik Evaluating Local Disaster Recovery Strategies . . . . . . . . . . . . . . . 62--66 Hana Khamfroush and Samuel Lofumbwa Iloo and Mahshid Rahnamay-Naeini Vulnerability of Interdependent Infrastructures Under Random Attacks . . 67--71 Andjelka Kelic Cyber Risk in Critical Infrastructure 72--75 Zhenhua Liu and Ganesh Ananthanarayanan Special Issue on the Work-in-Progress (WIP) session at the ACM SIGMETRICS 2018 Conference . . . . . . . . . . . . . . . 76--76 Tan N. Le and Xiao Sun and Mosharaf Chowdhury and Zhenhua Liu BoPF: Mitigating the Burstiness-Fairness Tradeoff in Multi-Resource Clusters . . 77--78 Linqi Guo and Chen Liang and Alessandro Zocca and Steven H. Low and Adam Wierman Failure Localization in Power Systems via Tree Partitions . . . . . . . . . . 79--80 Daniela Hurtado-Lange and Siva Theja Maguluri A Novel View of the Drift: Method for Heavy Traffic Limits of Queueing Systems 81--82 Yichen Ruan and Carlee Joe-Wong On the Economic Value of Vehicular Caching . . . . . . . . . . . . . . . . 83--84 Junjie Qin and Ram Rajagopal and Shai Vardi and Adam Wierman Convex Prophet Inequalities . . . . . . 85--86 Tan N. Le and Xiao Sun and Mosharaf Chowdhury and Zhenhua Liu AlloX: Allocation across Computing Resources for Hybrid CPU/GPU clusters 87--88 Jinhang Zuo and Xiaoxi Zhang and Carlee Joe-Wong Observe Before Play: Multi-armed Bandit with Pre-Observations . . . . . . . . . 89--90 Justin Wang and Benjamin Berg and Daniel S. Berger and Siddhartha Sen Maximizing Page-Level Cache Hit Ratios in LargeWeb Services . . . . . . . . . . 91--92 Zhihui Shao and Mohammad A. Islam and Shaolei Ren A First Look at Thermal Attacks in Multi-Tenant Data Centers . . . . . . . 93--94 Shan-Hsiang Shen An Efficient Network Monitor for SDN Networks . . . . . . . . . . . . . . . . 95--96
Leandros Tassiulas Optimizing the network edge for flexible service provisioning . . . . . . . . . . 1--1 Weina Wang and Mor Harchol-Balter and Haotian Jiang and Alan Scheller-Wolf and R. Srikant Delay Asymptotics and Bounds for Multi-Task Parallel Jobs . . . . . . . . 2--7 Isaac Grosof and Ziv Scully and Mor Harchol-Balter SRPT for Multiserver Systems . . . . . . 8--9 Xingyu Zhou and Jian Tan and Ness Shroff Flexible Load Balancing with Multi-dimensional State-space Collapse: Throughput and Heavy-traffic Delay Optimality . . . . . . . . . . . . . . . 10--11 L. E. Chatzieleftheriou and G. Darzanos and M. Karaliopoulos and I. Koutsopoulos Joint User Association, Content Caching and Recommendations in Wireless Edge Networks . . . . . . . . . . . . . . . . 12--17 Yung Fei Wong and Lachlan L. H. Andrew and Y. Ahmet Sekercioglu Hidden semi-Markov models for electricity load disaggregation . . . . 18--23 Arash Molavi Kakhki and Vijay Erramilli and Phillipa Gill and Augustin Chaintreau and Balachander Krishnamurthy Information Market for Web Browsing: Design, Usability and Incremental Adoption . . . . . . . . . . . . . . . . 24--24 Nicolas Gast and Luca Bortolussi and Mirco Tribastone Size Expansions of Mean Field Approximation: Transient and Steady-State Analysis . . . . . . . . . 25--26 Paola Bermolen and Matthieu Jonckheere and Federico Larroca and Manuel Saenz Degree-Greedy Algorithms on Large Random Graphs . . . . . . . . . . . . . . . . . 27--32 M. Yajima and T. Phung-Duc A central limit theorem for a Markov-modulated infinite-server queue with batch Poisson arrivals and binomial catastrophes . . . . . . . . . . . . . . 33--34 Lianjie Shi and Xin Wang and Richard T. B. Ma and Y. C. Tay Weighted Fair Caching: Occupancy-Centric Allocation for Space-Shared Resources 35--36 Niklas Carlsson and Derek Eager Worst-case Bounds and Optimized Cache on $M$-th Request Cache Insertion Policies under Elastic Conditions . . . . . . . . 37--38 Fan Ni and Xingbo Wu and Weijun Li and Lei Wang and Song Jiang WOJ: Enabling Write-Once Full-data Journaling in SSDs by Using Weak-Hashing-based Deduplication . . . . 39--40 Stephane Durand and Federica Garin and Bruno Gaujal Efficiency of Best Response Dynamics with High Playing Rates in Potential Games . . . . . . . . . . . . . . . . . 41--42 Ayman Chouayakh and Aurelien Bechler and Isabel Amigo and Loutfi Nuaymi and Patrick Maillé Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness trade offs . . . . . . 43--48 Mao Zou and Richard T. B. Ma and Yinlong Xu Towards An Efficient Market Mediator for Divisible Resources . . . . . . . . . . 49--50 Patrick Thiran Locating the Source of Diffusion in Large-scale and Random Networks. . . . . 51--51 Alessandro Zocca Temporal starvation in multi-channel CSMA networks: an analytical framework 52--53 Thirupathaiah Vasantam and Arpan Mukhopadhyay and Ravi R. Mazumdar The Mean-field Behavior of Processor Sharing Systems with General Job Lengths Under the SQ(d) Policy . . . . . . . . . 54--55 Yorie Nakahira and Andres Ferragut and Adam Wierman Minimal-Variance Distributed Deadline Scheduling in a Stationary Environment 56--61 Martin Zeballos and Andres Ferragut and Fernando Paganini Achieving fairness for EV charging in overload: a fluid approach . . . . . . . 62--67 Eduardo Hargreaves and Claudio Agosti and Daniel Menasche and Giovanni Neglia and Alexandre Reiffers-Masson and Eitan Altman Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design . . . . . . . . . . . . 68--69 Julien Floquet and Richard Combes and Zwi Altman Hierarchical Beamforming: Resource Allocation, Fairness and Flow Level Performance . . . . . . . . . . . . . . 70--71 Y. Raaijmakers and S. C. Borst and O. J. Boxma Delta probing policies for redundancy 72--73 T. Hellemans and B. Vanhoudt Analysis of Redundancy(d) with Identical Replicas . . . . . . . . . . . . . . . . 74--79 Urtzi Ayesta and Tejas Bodas and Ina Maria Verloop On a unifying product form framework for redundancy models . . . . . . . . . . . 80--81 Catherine Rosenberg Highlight Talk on Battery Modeling: Trade-offs between Accuracy and Complexity . . . . . . . . . . . . . . . 82--83 Omid Ardakanian Leveraging Sparsity in Distribution Grids: System Identification and Harmonic State Estimation . . . . . . . 84--85 Dominik Danner and Hermann de Meer State Estimation in the Power Distribution System . . . . . . . . . . 86--88 Benoit Vinot and Florent Cadoux and Nicolas Gast Congestion Avoidance in Low-Voltage Networks by using the Advanced Metering Infrastructure . . . . . . . . . . . . . 89--91 Yujie Tang and Emiliano Dall'Anese and Andrey Bernstein and S. H. Low A Primal-Dual Gradient Method for Time-Varying Optimization with Application to Power Systems . . . . . . 92--92 Nader Alagha Satellite Air Interface Evolutions in the $5$G and IoT Era . . . . . . . . . . 93--95 Maria Rita Palattella and Ridha Soua and André Stemper and Thomas Engel Aggregation of MQTT Topics over Integrated Satellite-Terrestrial Networks . . . . . . . . . . . . . . . . 96--97 Doanh Kim Luong and Muhammad Ali and Fouad Benamrane and Ibrahim Ammar and Yim-Fun Hu Seamless handover for video streaming over an SDN-based Aeronautical Communications Network . . . . . . . . . 98--99 J. Bas and M. Caus and A. Perez and R. Soleymani and N. A. K. Beigi Interference Management Schemes for High Spectral Efficiency Satellite Communications . . . . . . . . . . . . . 100--103 Julio A. Medina-Caballero and M. Angeles Vazquez-Castro Link Quality Optimization for Hybrid LEO--GSO Systems . . . . . . . . . . . . 104--107 P. Asuquo and H. Cruickshank and C. P. A. Ogah Securing Emergency Communications for the Next-Generation Networks: Performance Analysis of Distributed Trust Computing for Future Emergency Communications . . . . . . . . . . . . . 108--111 Nicolas Kuhn Research trends in SATCOM . . . . . . . 112--112 Aad van Moorsel Benchmarks and Models for Blockchain: Consensus Algorithms . . . . . . . . . . 113--113 Tim Hellemans and Benny Van Houdt and Daniel S. Menasche and Mandar Datar and Swapnil Dhamal and Corinne Touati Mining competition in a multi-cryptocurrency ecosystem at the network edge: a congestion game approach 114--117 Manuel Zander and Tom Waite and Dominik Harz DAGsim: Simulation of DAG-based distributed ledger protocols . . . . . . 118--121 Saulo Ricci and Eduardo Ferreira and Daniel Sadoc Menasche and Artur Ziviani and Jose Eduardo Souza and Alex Borges Vieira Learning Blockchain Delays: a Queueing Theory Approach . . . . . . . . . . . . 122--125 C. Grunspan and R. Perez-Marco On profitability of block withholding strategies . . . . . . . . . . . . . . . 126--126 Francesco Bruschi and Vincenzo Rana and Lorenzo Gentile and Donatella Sciuto Mine with it or sell it: the superhashing power dilemma . . . . . . . 127--130 Nico Smuts What Drives Cryptocurrency Prices?: an Investigation of Google Trends and Telegram Sentiment . . . . . . . . . . . 131--134 Maher Alharby and Aad van Moorsel BlockSim: a Simulation Framework for Blockchain Systems . . . . . . . . . . . 135--138 Vladyslav Fedchenko and Giovanni Neglia and Bruno Ribeiro Feedforward Neural Networks for Caching: Enough or Too Much? . . . . . . . . . . 139--142 Martino Trevisan and Idilio Drago Robust URL Classification With Generative Adversarial Networks . . . . 143--146 Gonzalo Marín and Pedro Casas and Germán Capdehourat DeepSec meets RawPower --- Deep Learning for Detection of Network Attacks Using Raw Representations . . . . . . . . . . 147--150 Michal Piskozub and Riccardo Spolaor and Ivan Martinovic MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features . . . . . . . . . . 151--154 Sarah Wassermann and Nikolas Wehner and Pedro Casas Machine Learning Models for YouTube QoE and User Engagement Prediction in Smartphones . . . . . . . . . . . . . . 155--158 Gaetano Manzo and Juan Sebastian Otalora and Marco Ajmone Marsan and Gianluca Rizzo A Deep Learning Strategy for Vehicular Floating Content Management . . . . . . 159--162 Rui Li and Chaoyun Zhang and Paul Patras and Razvan Stanica and Fabrice Valois Learning Driven Mobility Control of Airborne Base Stations in Emergency Networks . . . . . . . . . . . . . . . . 163--166 Johan Garcia and Topi Korhonen On Runtime and Classification Performance of the Discretize--Optimize (DISCO) Classification Approach . . . . 167--170 Manjesh K. Hanawal and Sumit J. Darak Distributed Learning in Ad-Hoc Networks with Unknown Number of Players . . . . . 171--174
Ranjan Pal and Aditya Ahuja and Sung-Han Lin and Abhishek Kumar and Leana Golubchik and Nachikethas A. Jagadeesan On the Economic Sustainability of Cloud Sharing Systems Are Dynamic Single Resource Sharing Markets Stable? . . . . 2--10
Lili Su and Martin Zubeldia and Nancy Lynch Collaboratively Learning the Best Option on Graphs, Using Bounded Local Memory 1--2 Jessica Hoffmann and Constantine Caramanis Learning Graphs from Noisy Epidemic Cascades . . . . . . . . . . . . . . . . 3--4 Xingyu Zhou and Jian Tan and Ness Shroff Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions . . 5--6 Tim Hellemans and Tejas Bodas and Benny Van Houdt Performance Analysis of Workload Dependent Load Balancing Policies . . . 7--8 Isaac Grosof and Ziv Scully and Mor Harchol-Balter Load Balancing Guardrails: Keeping Your Heavy Traffic on the Road to Low Response Times . . . . . . . . . . . . . 9--10 Dengwang Tang and Vijay G. Subramanian Random Walk Based Sampling for Load Balancing in Multi-Server Systems . . . 11--12 Lan N. Nguyen and My T. Thai Network Resilience Assessment via QoS Degradation Metrics: an Algorithmic Approach . . . . . . . . . . . . . . . . 13--14 Dhruv Kumar and Jian Li and Ramesh Sitaraman and Abhishek Chandra A TTL-based Approach for Data Aggregation in Geo-distributed Streaming Analytics . . . . . . . . . . . . . . . 15--16 Pavlos Nikolopoulos and Christos Pappas and Katerina Argyraki and Adrian Perrig Retroactive Packet Sampling for Traffic Receipts . . . . . . . . . . . . . . . . 17--18 Pavlos Sermpezis and Vasileios Kotronis Inferring Catchment in Internet Routing 19--20 Shoaib Akram and Jennifer B. Sartor and Kathryn S. McKinley and Lieven Eeckhout Crystal Gazer: Profile-Driven Write-Rationing Garbage Collection for Hybrid Memories . . . . . . . . . . . . 21--22 Mustafa Karakoy and Orhan Kislal and Xulong Tang and Mahmut Taylan Kandemir and Meenakshi Arunachalam Architecture-Aware Approximate Computing 23--24 Xulong Tang and Ashutosh Pattnaik and Onur Kayiran and Adwait Jog and Mahmut Taylan Kandemir and Chita Das Quantifying Data Locality in Dynamic Parallelism in GPUs . . . . . . . . . . 25--26 Xulong Tang and Mahmut Taylan Kandemir and Hui Zhao and Myoungsoo Jung and Mustafa Karakoy Computing with Near Data . . . . . . . . 27--28 Santiago R. Balseiro and David B. Brown and Chen Chen Dynamic Pricing of Relocating Resources in Large Networks . . . . . . . . . . . 29--30 Reza Alijani and Siddhartha Banerjee and Sreenivas Gollapudi and Kostas Kollias and Kamesh Munagala The Segmentation-Thickness Tradeoff in Online Marketplaces . . . . . . . . . . 31--32 Ming Shi and Xiaojun Lin and Lei Jiao On the Value of Look-Ahead in Competitive Online Convex Optimization 33--34 Qiulin Lin and Hanling Yi and John Pang and Minghua Chen and Adam Wierman and Michael Honig and Yuanzhang Xiao Competitive Online Optimization under Inventory Constraints . . . . . . . . . 35--36 Haoran Yu and Ermin Wei and Randall A. Berry Analyzing Location-Based Advertising for Vehicle Service Providers Using Effective Resistances . . . . . . . . . 37--38 Daniel Vial and Vijay Subramanian A Structural Result for Personalized PageRank and its Algorithmic Consequences . . . . . . . . . . . . . . 39--40 Semih Cayci and Atilla Eryilmaz and R. Srikant Learning to Control Renewal Processes with Bandit Feedback . . . . . . . . . . 41--42 Monika Henzinger and Stefan Neumann and Stefan Schmid Efficient Distributed Workload (Re-)Embedding . . . . . . . . . . . . . 43--44 Pradeep Ambati and David Irwin Optimizing the Cost of Executing Mixed Interactive and Batch Workloads on Transient VMs . . . . . . . . . . . . . 45--46 Joshua Comden and Sijie Yao and Niangjun Chen and Haipeng Xing and Zhenhua Liu Online Optimization in Cloud Resource Provisioning: Predictions, Regrets, and Algorithms . . . . . . . . . . . . . . . 47--48 Guocong Quan and Jian Tan and Atilla Eryilmaz and Ness Shroff A New Flexible Multi-flow LRU Cache Management Paradigm for Minimizing Misses . . . . . . . . . . . . . . . . . 49--50 Doron Zarchy and Radhika Mittal and Michael Schapira and Scott Shenker Axiomatizing Congestion Control . . . . 51--52 Kuang Xu and Yuan Zhong Information, Memory and Capacity in Dynamic Resource Allocation . . . . . . 53--54 Muhammad Jehangir Amjad and Vishal Misra and Devavrat Shah and Dennis Shen mRSC: Multi-dimensional Robust Synthetic Control . . . . . . . . . . . . . . . . 55--56 Lavanya Jose and Stephen Ibanez and Mohammad Alizadeh and Nick McKeown A Distributed Algorithm to Calculate Max-Min Fair Rates Without Per-Flow State . . . . . . . . . . . . . . . . . 57--58 Benny Van Houdt Global Attraction of ODE-based Mean Field Models with Hyperexponential Job Sizes . . . . . . . . . . . . . . . . . 59--60 Mark van der Boor and Sem Borst and Johan van Leeuwaarden Hyper-Scalable JSQ with Sparse Feedback 61--62 Florin Ciucu and Felix Poloczek Two Extensions of Kingman's GI/G/1 Bound 63--64 Florin Ciucu and Felix Poloczek and Amr Rizk Queue and Loss Distributions in Finite-Buffer Queues . . . . . . . . . . 65--66 Jiaming Xu and Yuan Zhong Improved Queue-Size Scaling for Input-Queued Switches via Graph Factorization . . . . . . . . . . . . . 67--68 Youil Han and Bryan S. Kim and Jeseong Yeon and Sungjin Lee and Eunji Lee TeksDB: Weaving Data Structures for a High-Performance Key--Value Store . . . 69--70 Milan Radulovic and Rommel Sánchez Verdejo and Paul Carpenter and Petar Radojkovi\'c and Bruce Jacob and Eduard Ayguadé PROFET: Modeling System Performance and Energy Without Simulating the CPU . . . 71--72 Song Wei and Kun Zhang and Bibo Tu HyperBench: a Benchmark Suite for Virtualization Capabilities . . . . . . 73--74 Lei Zhang and Zhemin Yang and Yuyu He and Mingqi Li and Sen Yang and Min Yang and Yuan Zhang and Zhiyun Qian App in the Middle: Demystify Application Virtualization in Android and its Security Threats . . . . . . . . . . . . 75--76 Tu Dinh Ngoc and Bao Bui and Stella Bitchebe and Alain Tchana and Valerio Schiavoni and Pascal Felber and Daniel Hagimont Everything You Should Know About Intel SGX Performance on Virtualized Systems 77--78 Honghao Wei and Xiaohan Kang and Weina Wang and Lei Ying QuickStop: a Markov Optimal Stopping Approach for Quickest Misinformation Detection . . . . . . . . . . . . . . . 79--80 Alberto Vera and Siddhartha Banerjee The Bayesian Prophet: a Low-Regret Framework for Online Decision Making . . 81--82 Lili Su and Jiaming Xu Securing Distributed Gradient Descent in High Dimensional Statistical Learning 83--84 Anish Agarwal and Muhammad Jehangir Amjad and Devavrat Shah and Dennis Shen Model Agnostic Time Series Analysis via Matrix Estimation . . . . . . . . . . . 85--86 Behnam Pourghassemi and Ardalan Amiri Sani and Aparna Chandramowlishwaran What-If Analysis of Page Load Time in Web Browsers Using Causal Profiling . . 87--88 Ran Liu and Edmund Yeh and Atilla Eryilmaz Proactive Caching for Low Access-Delay Services under Uncertain Predictions . . 89--90 Xiao Zhu and Yihua Ethan Guo and Ashkan Nikravesh and Feng Qian and Z. Morley Mao Understanding the Networking Performance of Wear OS . . . . . . . . . . . . . . . 91--92 Saugata Ghose and Tianshi Li and Nastaran Hajinazar and Damla Senol Cali and Onur Mutlu Demystifying Complex Workload-DRAM Interactions: an Experimental Study . . 93--93 Chul-Ho Lee and Min Kang and Do Young Eun Non-Markovian Monte Carlo on Directed Graphs . . . . . . . . . . . . . . . . . 94--95 Osman Emre Dai and Daniel Cullina and Negar Kiyavash and Matthias Grossglauser Analysis of a Canonical Labeling Algorithm for the Alignment of Correlated Erd\Hos--Rényi Graphs . . . . 96--97 Richard Combes and Mikael Touati Computationally Efficient Estimation of the Spectral Gap of a Markov Chain . . . 98--100
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2019) . . . . . . . . . . 2--2 Abuthahir and Gaurav Raina and Thomas Voice Do we need two forms of feedback in the Rate Control Protocol (RCP)? . . . . . . 3--5 Gautam Goel and Adam Wierman An Online Algorithm for Smoothed Online Convex Optimization . . . . . . . . . . 6--8 Xiaoqi Tan and Alberto Leon-Garcia and Danny H. K. Tsang Optimal Posted Prices for Online Resource Allocation with Supply Costs 9--11 Kristen Gardner and Cole Stephens Smart Dispatching in Heterogeneous Systems . . . . . . . . . . . . . . . . 12--14 Elene Anton and Urtzi Ayesta and Matthieu Jonckheere and Ina Maria Verloop Redundancy with Processor Sharing servers . . . . . . . . . . . . . . . . 15--17 Benjamin Berg and Rein Vesilo and Mor Harchol-Balter heSRPT: Optimal Scheduling of Parallel Jobs with Known Sizes . . . . . . . . . 18--20 Yu Su and Xiaoqi Ren and Shai Vardi and Adam Wierman and Yuxiong He Communication-Aware Scheduling of Precedence-Constrained Tasks . . . . . . 21--23 Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf Simple Near-Optimal Scheduling for the M/G/1 . . . . . . . . . . . . . . . . . 24--26 Gayane Vardoyan and Saikat Guha and Philippe Nain and Don Towsley On the Stochastic Analysis of a Quantum Entanglement Switch . . . . . . . . . . 27--29 Giuliano Casale and Peter G. Harrison and Ong Wai Hong Novel Solutions for Closed Queueing Networks with Load-Dependent Stations 30--32 Gagan Somashekar and Mohammad Delasay and Anshul Gandhi Tighter Lyapunov Truncation for Multi-Dimensional Continuous Time Markov Chains with Known Moments . . . . . . . 33--35 Daniela Hurtado Lange and Siva Theja Maguluri Heavy-traffic Analysis of the Generalized Switch under Multidimensional State Space Collapse 36--38
Navid Azizan Optimization Algorithms for Large-Scale Systems: From Deep Learning to Energy Markets . . . . . . . . . . . . . . . . 2--5 Joshua Comden Algorithms for Online and Distributed Optimization and their Applications . . 6--9 Salvatore Dipietro Performance Modelling and Optimisation of NoSQL Database Systems . . . . . . . 10--13 Seyyed Ahmad Javadi Analytical Approaches for Dynamic Scheduling in Cloud Environments . . . . 14--16 Qian Li Vision-based Sensor Coverage in Uncertain Geometric Domains . . . . . . 17--19 Behnam Pourghassemi Scalable Dynamic Analysis of Browsers for Privacy and Performance . . . . . . 20--23 Lili Su Defending Distributed Systems Against Adversarial Attacks: Consensus, Consensus-based Learning, and Statistical Learning . . . . . . . . . . 24--27 Muhammad Wajahat Cost-Efficient Dynamic Management of Cloud Resources through Supervised Learning . . . . . . . . . . . . . . . . 28--30 Pei-Duo YU Network Centralities as Statistical Inference for Large Networks: Combinatorics, Probability and Efficient Graph Algorithms . . . . . . . . . . . . 31--33 Xingyu Zhou Asymptotically Optimal Load Balancing: Theory and Algorithms . . . . . . . . . 34--37
Kartik Palani and David M. Nicol Optimal Monitoring Strategies for Critical Infrastructure Networks . . . . 4--7 Malhar Padhee and Reetam Sen Biswas and Anamitra Pal and Kaustav Basu and Arunabha Sen Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets . . . . 8--11 Jorik Oostenbrink and Fernando A. Kuipers A Moment of Weakness: Protecting Against Targeted Attacks Following a Natural Disaster . . . . . . . . . . . . . . . . 12--15 Evangelos Pournaras and Riccardo Taormina and Manish Thapa and Stefano Galelli and Venkata Palleti and Robert Kooij Cascading Failures in Interconnected Power-to-Water Networks . . . . . . . . 16--20 Yushi Tan and Arindam K. Das and Mareldi Ahumada-Paras and Payman Arabshahi and Daniel S. Kirschen Scheduling Post-disaster Repairs in Electricity Distribution Networks with Uncertain Repair Times . . . . . . . . . 21--24 Krishna Kant Advanced Persistent Threats in Autonomous Driving . . . . . . . . . . . 25--28
Siddhartha Banerjee and Daniel Freund Uniform Loss Algorithms for Online Stochastic Decision-Making With Applications to Bin Packing . . . . . . 1--2 Xiaohan Wei and Hao Yu and Michael J. Neely Online Primal-Dual Mirror Descent under Stochastic Constraints . . . . . . . . . 3--4 Sungjin Im and Benjamin Moseley and Kamesh Munagala and Kirk Pruhs Dynamic Weighted Fairness with Minimal Disruptions . . . . . . . . . . . . . . 5--6 Lin Yang and Mohammad H. Hajiesmaili and Ramesh Sitaraman and Adam Wierman and Enrique Mallada and Wing S. Wong Online Linear Optimization with Inventory Management Constraints . . . . 7--8 Yiheng Lin and Gautam Goel and Adam Wierman Online Optimization with Predictions and Non-convex Losses . . . . . . . . . . . 9--10 Xiaoqi Tan and Bo Sun and Alberto Leon-Garcia and Yuan Wu and Danny H. K. Tsang Mechanism Design for Online Resource Allocation: a Unified Approach . . . . . 11--12 Reza Alijani and Siddhartha Banerjee and Sreenivas Gollapudi and Kamesh Munagala and Kangning Wang Predict and Match: Prophet Inequalities with Uncertain Supply . . . . . . . . . 13--14 Rajarshi Bhattacharjee and Subhankar Banerjee and Abhishek Sinha Fundamental Limits on the Regret of Online Network-Caching . . . . . . . . . 15--16
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2020) . . . . . . . . . . 2--2 Ping-En Lu and Cheng-Shang Chang Using Graph Convolutional Networks to Compute Approximations of Dominant Eigenvectors . . . . . . . . . . . . . . 3--5 Rajarshi Bhattacharjee and Abhishek Sinha Competitive Algorithms for Minimizing the Maximum Age-of-Information . . . . . 6--8 Hanoch Levy and Jhonatan Tavori Worst Case Attacks on Distributed Resources Systems . . . . . . . . . . . 9--11 Eitan Bachmat and Sveinung Erland Performance analysis, Optimization and Optics . . . . . . . . . . . . . . . . . 12--14 Mandar Datar and Eitan Altman and Ghilas Ferrat Routing into parallel collision channels 15--17 Christine Fricker and Hanene Mohamed and Cedric Bourdais A mean field analysis of a stochastic model for reservation in car-sharing systems . . . . . . . . . . . . . . . . 18--20 Boudewijn R. Haverkort and Felix Finkbeiner and Pieter-Tjerk de Boer Machine Learning Data Center Workloads Using Generative Adversarial Networks 21--23 Daniel S. Menasché and Mark Shifrin and Eduardo Hargreaves Caches and Timelines Operate Under Heavy Traffic . . . . . . . . . . . . . . . . 24--26 George Kesidis and Takis Konstantopoulos TB/GI/1 queues with arrival traffic envelopes . . . . . . . . . . . . . . . 27--29 Jazeem Abdul Jaleel and Alexander Wickeham and Sherwin Doroudi and Kristen Gardner A General ``Power-of-$d$'' Dispatching Framework for Heterogeneous Systems . . 30--32 Ziv Scully and Isaac Grosof and Mor Harchol-Balter Optimal Multiserver Scheduling with Unknown Job Sizes in Heavy Traffic . . . 33--35 Yingdong Lu and Mark S. Squillante and Tonghoon Suk Optimal Delay-Cost Scheduling Control in Fluid Models of General $ n \times n $ Input-Queued Switches . . . . . . . . . 36--38 Andrea Araldo and Ivona Brandic and Stefan Schmid ACM SIGMETRICS International Workshop on Distributed Cloud Computing (DCC) . . . 39--40 Daniel Balouek-Thomert and Ivan Rodero and Manish Parashar Harnessing the Computing Continuum for Urgent Science . . . . . . . . . . . . . 41--46
Lianjie Shi and Xin Wang and Richard T. B. Ma On Multi-Resource Procurement in Internet Access Markets: Optimal Strategies and Market Equilibrium . . . 4--5 Mohammad A. Hoque and Ashwin Rao and Sasu Tarkoma Network and Application Performance Measurement Challenges on Android Devices . . . . . . . . . . . . . . . . 6--11 Simon Scherrer and Markus Legner and Adrian Perrig and Stefan Schmid Incentivizing Stable Path Selection in Future Internet Architectures . . . . . 12--13 Niels Christensen and Mark Glavind and Stefan Schmid and Jir' Srba Latte: Improving the Latency of Transiently Consistent Network Update Schedules . . . . . . . . . . . . . . . 14--26 Francesco Bronzino and Paul Schmitt and Sara Ayoubi and Guilherme Martins and Renata Teixeira and Nick Feamster Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience . . . . . . . . . 27--32 Daniela Hurtado-Lange and Siva Theja Maguluri Heavy-traffic Analysis of the Generalized Switch under Multidimensional State Space Collapse 33--34 Benjamin Berg and Rein Vesilo and Mor Harchol-Balter heSRPT: Parallel Scheduling to Minimize Mean Slowdown . . . . . . . . . . . . . 35--36 Kristen Gardner and Jazeem Abdul Jaleel and Alexander Wickeham and Sherwin Doroudi Scalable Load Balancing in the Presence of Heterogeneous Servers . . . . . . . . 37--38 Wenkai Dai and Klaus-Tycho Foerster and David Fuchssteiner and Stefan Schmid Load-Optimization in Reconfigurable Networks: Algorithms and Complexity of Flow Routing . . . . . . . . . . . . . . 39--44 Gayane Vardoyan and Saikat Guha and Philippe Nain and Don Towsley On the Capacity Region of Bipartite and Tripartite Entanglement Switching . . . 45--50 Nitish K. Panigrahy and Prithwish Basu and Don Towsley and Ananthram Swami and Kin K. Leung On the Analysis of Spatially Constrained Power of Two Choice Policies . . . . . . 51--56 Xingyu Zhou and Ness Shroff and Adam Wierman Asymptotically Optimal Load Balancing in Large-scale Heterogeneous Systems with Multiple Dispatchers . . . . . . . . . . 57--58 Jianyu Niu and Ziyu Wang and Fangyu Gai and Chen Feng Incentive Analysis of Bitcoin-NG, Revisited . . . . . . . . . . . . . . . 59--60 Rahul Vaze and Jayakrishnan Nair Network Speed Scaling . . . . . . . . . 61--62 Shiva Raj Pokhrel and Carey Williamson A Rent-Seeking Framework for Multipath TCP . . . . . . . . . . . . . . . . . . 63--70 Jingfan Meng and Long Gong and Jun (Jim) Xu Sliding-Window QPS (SW-QPS): a Perfect Parallel Iterative Switching Algorithm for Input-Queued Switches . . . . . . . 71--76 Guocong Quan and Atilla Eryilmaz and Jian Tan and Ness Shroff Prefetching and Caching for Minimizing Service Costs: Optimal and Approximation Strategies . . . . . . . . . . . . . . . 77--78 Gayane Vardoyan and Saikat Guha and Philippe Nain and Don Towsley On the Exact Analysis of an Idealized Quantum Switch . . . . . . . . . . . . . 79--80 Guin Gilman and Samuel S. Ogden and Tian Guo and Robert J. Walls Demystifying the Placement Policies of the NVIDIA GPU Thread Block Scheduler for Concurrent Kernels . . . . . . . . . 81--88 Yuezhou Liu and Yuanyuan Li and Qian Ma and Stratis Ioannidis and Edmund Yeh Fair Caching Networks . . . . . . . . . 89--90 Shigeo Shioda Distribution of Consensus in a Broadcasting-based Consensus-forming Algorithm . . . . . . . . . . . . . . . 91--96 Maryam Elahi and Andrea Marin and Sabina Rossi and Carey Williamson Frequency scaling in multilevel queues 97--98 Marcin Bienkowski and David Fuchssteiner and Jan Marcinkowski and Stefan Schmid Online Dynamic B-Matching: With Applications to Reconfigurable Datacenter Networks . . . . . . . . . . 99--108 Yu Huang and Longbo Huang Heavy Traffic Analysis of Approximate Max-Weight Matching Algorithms for Input-Queued Switches . . . . . . . . . 109--110 Fehmina Malik and Manjesh K. Hanawal and Yezekael Hayel and Jayakrishnan Nair Revenue sharing on the Internet: a Case for Going Soft on Neutrality Regulations 111--112 Behnam Pourghassemi and Ardalan Amiri Sani and Aparna Chandramowlishwaran Only Relative Speed Matters: Virtual Causal Profiling . . . . . . . . . . . . 113--119 Myungsuk Kim and Myoungjun Chun and Duwon Hong and Yoona Kim and Geonhee Cho and Dusol Lee and Jihong Kim RealWear: Improving Performance and Lifetime of SSDs Using a NAND Aging Marker . . . . . . . . . . . . . . . . . 120--121 Yingdong Lu and Mark S. Squillante and Tonghoon Suk Optimal Control in Fluid Models of $ n \times n $ Input-Queued Switches under Linear Fluid-Flow Costs . . . . . . . . 122--127 Sounak Kar and Robin Rehrmann and Arpan Mukhopadhyay and Bastian Alt and Florin Ciucu and Heinz Koeppl and Carsten Binnig and Amr Rizk On the Throughput Optimization in Large-Scale Batch-Processing Systems . . 128--129 Niloofar Bayat and Richard Ma and Vishal Misra and Dan Rubenstein Zero-Rating and Net Neutrality: Who Wins, Who Loses? . . . . . . . . . . . . 130--135
William Knottenbelt and Katinka Wolter Message from the Chairs . . . . . . . . 2--2 Ingo Weber Keynote: Analysing Data from Blockchains 3--3 Felipe Ribas Coutinho and Victor Pires and Claudio Miceli and Daniel S. Menasche Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures . . . . . . . . . . . . 4--7 Jefferson E. Simoes and Eduardo Ferreira and Daniel S. Menasché and Carlos A. V. Campos Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result . . 8--11 Vinicius C. Oliveira and Julia Almeida Valadares and Jose Eduardo A. Sousa and Alex Borges Vieira and Heder Soares Bernardino and Saulo Moraes Villela and Glauber Dias Goncalves Analyzing Transaction Confirmation in Ethereum Using Machine Learning Techniques . . . . . . . . . . . . . . . 12--15 Rowel Gundlach and Martijn Gijsbers and David Koops and Jacques Resing Predicting confirmation times of Bitcoin transactions . . . . . . . . . . . . . . 16--19 Ivo Stoepker and Rowel Gundlach and Stella Kapodistria Robustness analysis of Bitcoin confirmation times . . . . . . . . . . . 20--23 Jose Eduardo A. Sousa and Vinicius C. Oliveira and Julia Almeida Valadares and Alex Borges Vieira and Heder S. Bernardino and Saulo Moraes Villela and Glauber Dias Goncalves Fighting Under-price DoS Attack in Ethereum with Machine Learning Techniques . . . . . . . . . . . . . . . 24--27 Luca Vassio and Zhi-Li Zhang and Danilo Giordano and Abhishek Chandra Message from the organizers of WAIN . . 28--28 Md Rajib Hossen and Mohammad A. Islam Mobile Task Offloading Under Unreliable Edge Performance . . . . . . . . . . . . 29--32 Özge Celenk and Thomas Bauschert and Marcus Eckert Machine Learning based KPI Monitoring of Video Streaming Traffic for QoE Estimation . . . . . . . . . . . . . . . 33--36 Nikolas Wehner and Michael Seufert and Joshua Schuler and Sarah Wassermann and Pedro Casas and Tobias Hossfeld Improving Web QoE Monitoring for Encrypted Network Traffic through Time Series Modeling . . . . . . . . . . . . 37--40 Dena Markudova and Martino Trevisan and Paolo Garza and Michela Meo and Maurizio M. Munafo and Giovanna Carofiglio What's my App?: ML-based classification of RTC applications . . . . . . . . . . 41--44 Shunsuke Higuchi and Junji Takemasa and Yuki Koizumi and Atsushi Tagami and Toru Hasegawa Feasibility of Longest Prefix Matching using Learned Index Structures . . . . . 45--48 Gastón García González and Pedro Casas and Alicia Fernández and Gabriel Gómez On the Usage of Generative Models for Network Anomaly Detection in Multivariate Time-Series . . . . . . . . 49--52 Andrea Marin and Carey Williamson Cheating at Craps: a Quantitative Analysis . . . . . . . . . . . . . . . . 53--61 Giulio Masetti and Silvano Chiaradonna and Felicita Di Giandomenico and William H. Sanders and Brett Feddersen Extending the Möbius Modeling Environment with the Advanced Replication Operator 62--67
Sanjeev Arora Opening the Black Box of Deep Learning: Some Lessons and Take-aways . . . . . . 1--1 Zhaowei Zhu and Jingxuan Zhu and Ji Liu and Yang Liu Federated Bandit: a Gossiping Approach 3--4 Thibaut Cuvelier and Richard Combes and Eric Gourdin Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits . . . . . . . . . . . . . . 5--6 Tongxin Li and Yue Chen and Bo Sun and Adam Wierman and Steven Low Information Aggregation for Constrained Online Control . . . . . . . . . . . . . 7--8 Niv Buchbinder and Yaron Fairstein and Konstantina Mellou and Ishai Menache and Joseph (Seffi) Naor Online Virtual Machine Allocation with Lifetime and Load Predictions . . . . . 9--10 Isaac Grosof and Kunhe Yang and Ziv Scully and Mor Harchol-Balter Nudge: Stochastically Improving upon FCFS . . . . . . . . . . . . . . . . . . 11--12 Weina Wang and Qiaomin Xie and Mor Harchol-Balter Zero Queueing for Multi-Server Jobs . . 13--14 Ziv Scully and Isaac Grosof and Mor Harchol-Balter The Gittins Policy is Nearly Optimal in the M/G/$k$ under Extremely General Conditions . . . . . . . . . . . . . . . 15--16 Ashish Bijlani and Umakishore Ramachandran and Roy Campbell Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices . . . . . . . . . . . . . 17--18 Yue Zhang and Bayan Turkistani and Allen Yuqing Yang and Chaoshun Zuo and Zhiqiang Lin A Measurement Study of Wechat Mini-Apps 19--20 Rachee Singh and David Tench and Phillipa Gill and Andrew McGregor PredictRoute: a Network Path Prediction Toolkit . . . . . . . . . . . . . . . . 21--22 Iman Akbari and Mohammad A. Salahuddin and Leni Ven and Noura Limam and Raouf Boutaba and Bertrand Mathieu and Stephanie Moteau and Stephane Tuffin A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web . . . . . . . . . . . . . 23--24 Wentao Weng and Weina Wang Achieving Zero Asymptotic Queueing Delay for Parallel Jobs . . . . . . . . . . . 25--26 Youri Raaijmakers and Sem Borst Achievable Stability in Redundancy Systems . . . . . . . . . . . . . . . . 27--28 Grzegorz Kielanski and Benny Van Houdt On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems . . . . . . . . . . . . . . . . 29--30 Francesca Randone and Luca Bortolussi and Mirco Tribastone Refining Mean-field Approximations by Dynamic State Truncation . . . . . . . . 31--32 Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson Tracking Counterfeit Cryptocurrency End-to-end . . . . . . . . . . . . . . . 33--34 Weimin Chen and Xinran Li and Yuting Sui and Ningyu He and Haoyu Wang and Lei Wu and Xiapu Luo SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts . . . . . . . . . . . . . . . 35--36 Behnam Pourghassemi and Jordan Bonecutter and Zhou Li and Aparna Chandramowlishwaran adPerf: Characterizing the Performance of Third-party Ads . . . . . . . . . . . 37--38 Hsiao-Wuen Hon AI for System --- Infusing AI into Cloud Computing Systems . . . . . . . . . . . 39--40 Qingzhao Zhang and David Ke Hong and Ze Zhang and Qi Alfred Chen and Scott Mahlke and Z. Morley Mao A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software . . 43--44 Lishan Yang and Bin Nie and Adwait Jog and Evgenia Smirni SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input Sizing 45--46 Xulong Tang and Mahmut Taylan Kandemir and Mustafa Karakoy Mix and Match: Reorganizing Tasks for Enhancing Data Locality . . . . . . . . 47--48 Wentao Weng and Xingyu Zhou and R. Srikant Optimal Load Balancing with Locality Constraints . . . . . . . . . . . . . . 49--50 Daan Rutten and Debankur Mukherjee Load Balancing Under Strict Compatibility Constraints . . . . . . . 51--52 Tim Hellemans and Benny Van Houdt Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing Systems . . . . . . . . . . . 53--54 Elene Anton and Urtzi Ayesta and Matthieu Jonckheere and Ina Maria Verloop Improving the Performance of Heterogeneous Data Centers through Redundancy . . . . . . . . . . . . . . . 55--56 Xin Wang and Richard T. B. Ma On Private Peering Agreements between Content and Access Providers: a Contractual Equilibrium Analysis . . . . 57--58 Michael Fleder and Devavrat Shah I Know What You Bought At Chipotle for \$9.81 by Solving a Linear Inverse Problem . . . . . . . . . . . . . . . . 59--60 Sushil Mahavir Varma and Francisco Castro and Siva Theja Maguluri Dynamic Pricing and Matching for Two-Sided Markets with Strategic Servers 61--62 Jing Tang and Xueyan Tang and Andrew Lim and Kai Han and Chongshou Li and Junsong Yuan Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint . . . . . . . . . . 63--64 Kai Han and Shuang Cui and Tianshuai Zhu and Enpei Zhang and Benwei Wu and Zhizhuo Yin and Tong Xu and Shaojie Tang and He Huang Approximation Algorithms for Submodular Data Summarization with a Knapsack Constraint . . . . . . . . . . . . . . . 65--66 Bo Sun and Ali Zeynali and Tongxin Li and Mohammad Hajiesmaili and Adam Wierman and Danny H. K. Tsang Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging 67--68 Leandros Tassiulas Enabling Intelligent Services at the Network Edge . . . . . . . . . . . . . . 69--70 Klaus-Tycho Foerster and Janne H. Korhonen and Ami Paz and Joel Rybicki and Stefan Schmid Input-Dynamic Distributed Algorithms for Communication Networks . . . . . . . . . 71--72 Noémie Périvier and Chamsi Hssaine and Samitha Samaranayake and Siddhartha Banerjee Real-time Approximate Routing for Smart Transit Systems . . . . . . . . . . . . 73--74 Kamiar Asgari and Michael J. Neely Bregman-style Online Convex Optimization with Energy Harvesting Constraints . . . 75--76 Liren Yu and Jiaming Xu and Xiaojun Lin The Power of D-hops in Matching Power-Law Graphs . . . . . . . . . . . . 77--78 Yiguang Zhang and Jessy Xinyi Han and Ilica Mahajan and Priyanjana Bengani and Augustin Chaintreau Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks . . . . . . . . . . . . . . . . 79--80 Ahmad Hazimeh and Adrian Herrera and Mathias Payer Magma: a Ground-Truth Fuzzing Benchmark 81--82 Luis F. Abanto-Leon and Andreas Bäuml and Gek Hong (Allyson) Sim and Matthias Hollick and Arash Asadi Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints 83--84
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2021) . . . . . . . . . . 2--2 Yu Su and Jannie Yu and Vivek Anand and Adam Wierman Learning-Augmented Energy-Aware Scheduling of Precedence-Constrained Tasks . . . . . . . . . . . . . . . . . 3--5 Guocheng Liao and Yu Su and Juba Ziani and Adam Wierman and Jianwei Huang The Privacy Paradox and Optimal Bias-Variance Trade-offs in Data Acquisition . . . . . . . . . . . . . . 6--8 Jhonatan Tavori and Hanoch Levy Continual Versus Occasional Spreading In Networks: Modeling Spreading Thresholds In Epidemic Processes . . . . . . . . . 9--11 Julien Ancel and Christine Fricker and Hanene Mohamed Mean field analysis for bike and e-bike sharing systems . . . . . . . . . . . . 12--14 Fernando Miguélez and Josu Doncel and Urtzi Ayesta A Resource Sharing Game for the Freshness of Status Updates . . . . . . 15--17 Ziv Scully and Lucas van Kreveld When Does the Gittins Policy Have Asymptotically Optimal Response Time Tail? . . . . . . . . . . . . . . . . . 18--20 Yingdong Lu Performance Analysis of A Queueing System with Server Arrival and Departure 21--23 Daan Rutten and Debankur Mukherjee Capacity Scaling Augmented With Unreliable Machine Learning Predictions 24--26 Andres Ferragut and Lucas Narbondo and Fernando Paganini EDF vehicle charging under deadline uncertainty . . . . . . . . . . . . . . 27--29 Niloofar Bayat and Cody Morrin and Yuheng Wang and Vishal Misra Rank estimation for (approximately) low-rank matrices . . . . . . . . . . . 30--32 Amir Reza Ramtin and Don Towsley and Philippe Nain and Edmundo de Souza e Silva and Daniel S. Menasche Are Covert DDoS Attacks Facing Multi-Feature Detectors Feasible? . . . 33--35 Ziv Scully Bounding Mean Slowdown in Multiserver Systems . . . . . . . . . . . . . . . . 36--38 Soumyadip Ghosh and Mark S. Squillante Unbiased Gradient Estimation for Robust Optimization . . . . . . . . . . . . . . 39--41 Nicolas Gast and Neil Walton Special Issue on the Workshop about Reinforcement Learning in Networks and Queues (RLNQ 2021) . . . . . . . . . . . 42--42 Chen Tessler and Yuval Shpigelman and Gal Dalal and Amit Mandelbaum and Doron Haritan Kazakov and Benjamin Fuhrer and Gal Chechik and Shie Mannor Reinforcement Learning for Datacenter Congestion Control . . . . . . . . . . . 43--46 Francisco Robledo and Vivek Borkar and Urtzi Ayesta and Konstantin Avrachenkov QWI: Q-learning with Whittle Index . . . 47--50 Conor Newton and Ayalvadi Ganesh and Henry Reeve Asymptotic Optimality for Decentralised Bandits . . . . . . . . . . . . . . . . 51--53 Xin Liu and Bin Li and Pengyi Shi and Lei Ying A Constrained Bandit Approach for Online Dispatching . . . . . . . . . . . . . . 54--56 Christopher Archer and Siddhartha Banerjee and Mayleen Cortez and Carrie Rucker and Sean R. Sinclair and Max Solberg and Qiaomin Xie and Christina Lee Yu ORSuite: Benchmarking Suite for Sequential Operations Models . . . . . . 57--61 Giulia Fanti ACM SIGMETRICS 2021 Student Research Competition . . . . . . . . . . . . . . 62--62 Shreshth Tuli SplitPlace: Intelligent Placement of Split Neural Nets in Mobile Edge Environments . . . . . . . . . . . . . . 63--65 Yige Hong Sharp Zero-Queueing Bounds for Multi-Server Jobs . . . . . . . . . . . 66--68 Mahshid Ghasemi Auto-SDA: Automated Video-based Social Distancing Analyzer . . . . . . . . . . 69--71 Edwin Peng Exact Response Time Analysis of Preemptive Priority Scheduling with Switching Overhead . . . . . . . . . . . 72--74
Qingsong Liu and Wenfei Wu and Longbo Huang and Zhixuan Fang Simultaneously Achieving Sublinear Regret and Constraint Violations for Online Convex Optimization with Time-varying Constraints . . . . . . . . 4--5 Russell Lee and Yutao Zhou and Lin Yang and Mohammad Hajiesmaili and Ramesh Sitaraman Competitive Bidding Strategies for Online Linear Optimization with Inventory Management Constraints . . . . 6--7 Jianhan Song and Gustavo de Veciana and Sanjay Shakkottai Online Learning for Hierarchical Scheduling to Support Network Slicing in Cellular Networks . . . . . . . . . . . 8--9 Andres Ferragut and Lucas Narbondo and Fernando Paganini Scheduling EV charging with uncertain departure times . . . . . . . . . . . . 10--15 Simon Scherrer and Markus Legner and Adrian Perrig and Stefan Schmid An Axiomatic Perspective on the Performance Effects of End-Host Path Selection . . . . . . . . . . . . . . . 16--17 Bai Liu and Eytan Modiano Optimal Control for Networks with Unobservable Malicious Nodes . . . . . . 18--19 Amir Reza Ramtin and Philippe Nain and Daniel S. Menasche and Don Towsley and Edmundo de Souza e Silva Fundamental Scaling Laws of Covert DDoS Attacks . . . . . . . . . . . . . . . . 20--21 Anya Chaturvedi and Chandra Chekuri and Andréa W. Richa and Matthias Rost and Stefan Schmid and Jamison Weber Improved Throughput for All-or-Nothing Multicommodity Flows with Arbitrary Demands . . . . . . . . . . . . . . . . 22--27 Xiandong Huang and Qinglin Wang and Shuyu Lu and Ruochen Hao and Songzhu Mei and Jie Liu Evaluating FFT-based Algorithms for Strided Convolutions on ARMv8 Architectures? . . . . . . . . . . . . . 28--29 Gayane Vardoyan and Matthew Skrzypczyk and Stephanie Wehner On the Quantum Performance Evaluation of Two Distributed Quantum Architectures 30--31 Guin Gilman and Robert J. Walls Characterizing Concurrency Mechanisms for NVIDIA GPUs under Deep Learning Workloads (Extended Abstract) . . . . . 32--34 Maciej Pacut and Wenkai Dai and Alexandre Labbe and Klaus-Tycho Foerster and Stefan Schmid Improved Scalability of Demand-Aware Datacenter Topologies With Minimal Route Lengths and Congestion . . . . . . . . . 35--36 Arnaud Cadas and Josu Doncel and Jean-Michel Fourneau and Ana Busic Flexibility can Hurt Dynamic Matching System Performance . . . . . . . . . . . 37--42 Sushil Mahavir Varma and Siva Theja Maguluri A Heavy Traffic Theory of Two-Sided Queues . . . . . . . . . . . . . . . . . 43--44 Rahul Vaze and Jayakrishnan Nair Speed Scaling with Multiple Servers under a Sum--Power Constraint . . . . . 45--50 Giuliano Casale and Peter G. Harrison and Wai Hong Ong Facilitating Load-Dependent Queueing Analysis Through Factorization (Extended Abstract) . . . . . . . . . . . . . . . 51--52 Martin Zubeldia and Michel Mandjes Learning traffic correlations in multi-class queueing systems by sampling queue lengths, with routing applications 53--54 Bruce Spang Updating the Theory of Buffer Sizing . . 55--56 Shiksha Singhal and Veeraruna Kavitha Coalition Formation Resource Sharing Games in Networks . . . . . . . . . . . 57--58 Vibhaalakshmi Sivaraman and Weizhao Tang and Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Mohammad Alizadeh The Effect of Network Topology on Credit Network Throughput . . . . . . . . . . . 59--60 Xusheng Chen and Shixiong Zhao and Ji Qi and Jianyu Jiang and Haoze Song and Cheng Wang and Tsz On Li and T-H. Hubert Chan and Fengwei Zhang and Xiapu Luo and Sen Wang and Gong Zhang and Heming Cuih Efficient and DoS-resistant Consensus for Permissioned Blockchains . . . . . . 61--62 Shubham Anand Jain and Shreyas Goenka and Divyam Bapna and Nikhil Karamchandani and Jayakrishnan Nair Sequential community mode estimation . . 63--64 Benjamin Berg and Justin Whitehouse and Benjamin Moseley and Weina Wang and Mor Harchol-Balter The Case for Phase-Aware Scheduling of Parallelizable Jobs . . . . . . . . . . 65--66 Xinzhe Fu and Eytan Modiano Elastic Job Scheduling with Unknown Utility Functions . . . . . . . . . . . 67--68 Johan Ruuskanen and Tommi Berner and Karl-Erik Arzen and Anton Cervin Improving the Mean-Field Fluid Model of Processor Sharing Queueing Networks for Dynamic Performance Models in Cloud Computing . . . . . . . . . . . . . . . 69--70 Jonatha Anselmi and Bruno Gaujal and Louis-Sébastien Rebuffi Optimal Speed Profile of a DVFS Processor under Soft Deadlines . . . . . 71--72 Peter Buchholz On the Representation of Correlated Exponential Distributions by Phase Type Distributions . . . . . . . . . . . . . 73--78 Gayane Vardoyan and Saikat Guha and Philippe Nain and Don Towsley On the Capacity Region of Bipartite and Tripartite Entanglement Switching: Erratum . . . . . . . . . . . . . . . . 79--80
Mor Harchol-Balter and Ziv Scully The most common queueing theory questions asked by computer systems practitioners . . . . . . . . . . . . . 3--7 Chee Wei Tan The Value of Cooperation: From AIMD to Flipped Classroom Teaching . . . . . . . 8--13 Cathy H. Xia and Nanshan Chen and Priya Natarajan Teaching Performance Modeling via Software and Instructional Technology 14--19 Jean-Yves Le Boudec Performance Evaluation: a Preparation for Statistics and Data Science? . . . . 20--23 Giuseppe Serazzi Updating the Content of Performance Analysis Textbooks . . . . . . . . . . . 24--27 Susanna Donatelli and Giuliana Franceschinis Special issue on the Workshop on TOols for Stochastic Modeling and Evaluation (TOSME 2021) . . . . . . . . . . . . . . 28--28 Salah Al-Deen Almousa and G\textasciiacuteabor Horv\textasciiacuteath and Ill \textasciiacutees Horv\textasciiacuteath and Andr\textasciiacuteas M\textasciiacuteesz\textasciiacutearos and Mikl \textasciiacuteos Telek The CME method: Efficient numerical inverse Laplace transformation with Concentrated Matrix Exponential distribution . . . . . . . . . . . . . . 29--34 Sebastian Allmeier and Nicolas Gast rmf tool --- A library to Compute (Refined) Mean Field Approximation(s) 35--40 Giulio Masetti and Leonardo Robol and Silvano Chiaradonna and Felicita Di Giandomenico TAPAS: a Tool for Stochastic Evaluation of Large Interdependent Composed Models with Absorbing States . . . . . . . . . 41--46 Moreno Marzolla Queueing Networks and Markov Chains Analysis with the Octave queueing package . . . . . . . . . . . . . . . . 47--52 Vittorio Cortellessa and Daniele Di Pompeo and Vincenzo Stoico and Michele Tucci Software Model Refactoring Driven by Performance Antipattern Detection . . . 53--58 Carlos E. Budde FIG: the Finite Improbability Generator v1.3 . . . . . . . . . . . . . . . . . . 59--64 Paolo Ballarini and Beno\^\it Barbot Cosmos: Evolution of a Statistical Model Checking Platform . . . . . . . . . . . 65--69 Matthew Sheldon and Giuliano Casale TauSSA: Simulating Markovian Queueing Networks with Tau Leaping . . . . . . . 70--75 Catalina M. Llado PIPE 2.7 overview: a Petri net tool for performance modeling and evaluation . . 76--80 Laura Carnevali and Marco Paolieri and Enrico Vicario The ORIS tool: app, library, and toolkit for quantitative evaluation of non-Markovian systems . . . . . . . . . 81--86 Elvio G. Amparore Stochastic modelling and evaluation using GreatSPN . . . . . . . . . . . . . 87--91 Luca Vassio and Danilo Giordano and Jinoh Kim and Jon Crowcroft Message from the organizers of WAIN . . 92--92 Shimin Tao and Weibin Meng and Yimeng Cheng and Yichen Zhu and Ying Liu and Chunning Du and Tao Han and Yongpeng Zhao and Xiangguang Wang and Hao Yang LogStamp: Automatic Online Log Parsing Based on Sequence Labelling . . . . . . 93--98 Wenwen Hao and Ben Niu and Yin Luo and Kangkang Liu and Na Liu Improving accuracy and adaptability of SSD failure prediction in hyper-scale data centers . . . . . . . . . . . . . . 99--104 Shiva Ketabi and Matthew Buckley and Parsa Pazhooheshy and Faraz Farahvash and Yashar Ganjali Correlation-Aware Flow Consolidation for Load Balancing and Beyond . . . . . . . 105--110 David Pujol-Perich and Jose Suarez-Varela and Albert Cabellos-Aparicio and Pere Barlet-Ros Unveiling the potential of Graph Neural Networks for robust Intrusion Detection 111--117 Gustavo de Carvalho Bertoli and Lourenço Alves Pereira Júnior and Osamu Saotome Improving detection of scanning attacks on heterogeneous networks with Federated Learning . . . . . . . . . . . . . . . . 118--123 Matheus F. C. Barros and Carlos H. G. Ferreira and Lourenco A. P. Junior and Marco Mellia and Jussara M. Almeida and Bruno Pereira dos Santos Understanding mobility in networks: a node embedding approach . . . . . . . . 124--130
James Roberts and Dario Rossi Size-based scheduling vs fairness for datacenter flows: a queuing perspective 2--10 Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2022) . . . . . . . . . . 11--11 Shigeo Shioda and Kenta Takehara Ergodicity of Time Reversal Process of Stochastic Consensus Formation and Its Application . . . . . . . . . . . . . . 12--14 Jhonatan Tavori and Hanoch Levy Queueing-Network Based Applications Under Worst-case Attacks . . . . . . . . 15--17 Anand Kalvit and Assaf Zeevi Dynamic Learning in Large Matching Markets . . . . . . . . . . . . . . . . 18--20 Harry Jiang and Xiaoxi Zhang and Carlee Joe-Wong DOLL: Distributed OnLine Learning Using Preemptible Cloud Instances . . . . . . 21--23 Yuan Yao and Marco Paolieri and Leana Golubchik Sojourn Time Minimization of Successful Jobs . . . . . . . . . . . . . . . . . . 24--26 Heng-Qing Ye Optimal Round-Robin Routing to Parallel Servers in Heavy Traffic . . . . . . . . 27--29 E. Anton and R. Righter and I. M. Verloop Scheduling under redundancy . . . . . . 30--32 Xiaoqi Tan and Siyuan Yu and Raouf Boutaba Online Selection with Convex Costs . . . 33--35 Illes Horvath and Andras Meszaros and Miklos Telek Optimized numerical inverse Laplace transformation . . . . . . . . . . . . . 36--38 Rui Ding and Eugene Feinberg CVaR Optimization for MDPs: Existence and Computation of Optimal Policies . . 39--41 Vasileios Kalantzis and Mark S. Squillante and Shashanka Ubaru and Lior Horesh On Quantum Algorithms for Random Walks in the Nonnegative Quarter Plane . . . . 42--44 Pravein Govindan Kannan and Priyanka Naik and Praveen Tammana and Mythili Vutukuru Special Issue on The Workshop on Performance of host-based Network Applications (PerfNA 2022) . . . . . . . 45--45 Ziyan Wu and Tianming Cui and Arvind Narayanan and Yang Zhang and Kangjie Lu and Antonia Zhai and Zhi-Li Zhang GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond . . . . . . . . . . . . . . . . . 46--51
Ziv Scully A New Toolbox for Scheduling Theory . . 3--6 Anish Agarwal Causal Inference for Social and Engineering Systems . . . . . . . . . . 7--11 Zaiwei Chen A Unified Lyapunov Framework for Finite-Sample Analysis of Reinforcement Learning Algorithms . . . . . . . . . . 12--15 Shreshth Tuli AI and Co-Simulation Driven Resource Management in Fog Computing Environments 16--19 Tareq Si Salem Online Learning for Network Resource Allocation . . . . . . . . . . . . . . . 20--23 Jessica Maghakian Online Resource Allocation with Noisy Predictions . . . . . . . . . . . . . . 24--27 Alim Ul Gias Model-based Resource Management for Fine-grained Services . . . . . . . . . 28--31 Xiao Sun Resource Allocation and Scheduling in Modern Cloud Computing . . . . . . . . . 32--35 Xiaojun Shang Enabling Data-intensive Workflows in Heterogeneous Edge-cloud Networks . . . 36--38
Andrea Marin and Sabina Rossi and Diletta Olliaro A product-form network for systems with job stealing policies . . . . . . . . . 2--4 Nitesh Kumar and Gaurav S. Kasbekar and D. Manjunath Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm . . . . . . 5--7 Rooji Jinan and Gaurav Gautam and Parimal Parag and Vaneet Aggarwal Asymptotic Analysis of Probabilistic Scheduling for Erasure-Coded Heterogeneous Systems . . . . . . . . . 8--10 Wonjun Hwang and Yoora Kim and Kyunghan Lee Augmenting Epidemic Models with Graph Neural Networks . . . . . . . . . . . . 11--13 Sudeshna Biswas and Himanshu and Sushmita Ghosh and Payali Das and Kaushik Saha and Swades De Efficient Data Transfer Mechanism for DLMS/COSEM Enabled Smart Energy Metering Platform . . . . . . . . . . . . . . . . 14--16 Abhishek K. Umrawal and Vaneet Aggarwal Leveraging the Community Structure of a Social Network for Maximizing the Spread of Influence . . . . . . . . . . . . . . 17--19 Samarth Gupta and Jinhang Zuo and Carlee Joe-Wong and Gauri Joshi and Osman Yagan Correlated Combinatorial Bandits for Online Resource Allocation . . . . . . . 20--22 Zahidur Talukder and Mohammad A. Islam Efficient Federated Learning with Self-Regulating Clients . . . . . . . . 23--25 Prakirt Raj Jhunjhunwala and Siva Theja Maguluri Heavy Traffic Queue Length Distribution without Resource Pooling in an Input-Queued Switch . . . . . . . . . . 26--28 Shreshth Tuli and Giuliano Casale and Nicholas R. Jennings Learning to Dynamically Select Cost Optimal Schedulers in Cloud Computing Environments . . . . . . . . . . . . . . 29--31 Kumar Saurav and Rahul Vaze Minimizing Age of Information under Arbitrary Arrival Model with Arbitrary Packet Size . . . . . . . . . . . . . . 32--34 R Sri Prakash and Nikhil Karamchandani and Sharayu Moharir On the Regret of Online Edge Service Hosting . . . . . . . . . . . . . . . . 35--37 Alexandre Reiffers-Masson and Isabel Amigo Online Multi-Agent Decentralized Byzantine-robust Gradient Estimation . . 38--40 Tyler Sam and Yudong Chen and Christina Lee Yu Overcoming the Long Horizon Barrier for Sample-Efficient Reinforcement Learning with Latent Low-Rank Structure . . . . . 41--43 Qi Li and Dong Chen Peer to Peer Distributed Solar Energy Trading . . . . . . . . . . . . . . . . 44--46 Wenxin Li Performance Analysis of Modified SRPT in Multiple-Processor Multitask Scheduling 47--49 Md Rajib Hossen and Mohammad A. Islam Practical Efficient Microservice Autoscaling . . . . . . . . . . . . . . 50--52 Yinan Zhu and Chunhui Duan and Xuan Ding RoSense . . . . . . . . . . . . . . . . 53--55 Daksh Mittal and Sandeep Juneja and Shubhada Agrawal Shift, scale and restart smaller models to estimate larger ones: Agent based simulators in epidemiology . . . . . . . 56--58 Tuhinangshu Choudhury and Weina Wang and Gauri Joshi Tackling Heterogeneous Traffic in Multi-access Systems via Erasure Coded Servers . . . . . . . . . . . . . . . . 59--61 Hem Regmi and Sanjib Sur Towards Deep Learning Augmented Robust D-Band Millimeter-Wave Picocell Deployment . . . . . . . . . . . . . . . 62--64
Hasan Al Maruf and Yuhong Zhong and Hongyi Wang and Mosharaf Chowdhury and Asaf Cidon and Carl Waldspurger Memtrade: Marketplace for Disaggregated Memory Clouds . . . . . . . . . . . . . 1--2 Vamsi Addanki and Chen Avin and Stefan Schmid Mars: Near-Optimal Throughput with Shallow Buffers in Reconfigurable Datacenter Networks . . . . . . . . . . 3--4 Christina Giannoula and Kailong Huang and Jonathan Tang and Nectarios Koziris and Georgios Goumas and Zeshan Chishti and Nandita Vijaykumar Architectural Support for Efficient Data Movement in Fully Disaggregated Systems 5--6 Johannes Zerwas and Csaba Györgyi and Andreas Blenk and Stefan Schmid and Chen Avin Duo: a High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control . . . . . . . . . . . . . . 7--8 Jiaxin Lin and Tao Ji and Xiangpeng Hao and Hokeun Cha and Yanfang Le and Xiangyao Yu and Aditya Akella Towards Accelerating Data Intensive Application's Shuffle Process Using SmartNICs . . . . . . . . . . . . . . . 9--10 Wenzhe Zhu and Yongkun Li and Erci Xu and Fei Li and Yinlong Xu and John C. S. Lui DiffForward: On Balancing Forwarding Traffic for Modern Cloud Block Services via Differentiated Forwarding . . . . . 11--12 Adithya Kumar and Anand Sivasubramaniam and Timothy Zhu SplitRPC: a Control + Data Path Splitting RPC Stack for ML Inference Serving . . . . . . . . . . . . . . . . 13--14 Itamar Gozlan and Chen Avin and Gil Einziger and Gabriel Scalosub Go-to-Controller is Better: Efficient and Optimal LPM Caching with Splicing 15--16 Daniele De Sensi and Tiziano De Matteis and Konstantin Taranov and Salvatore Di Girolamo and Tobias Rahn and Torsten Hoefler Noise in the Clouds: Influence of Network Performance Variability on Application Scalability . . . . . . . . 17--18 Yi Liu and Shouqian Shi and Minghao Xie and Heiner Litz and Chen Qian Smash: Flexible, Fast, and Resource-efficient Placement and Lookup of Distributed Storage . . . . . . . . . 19--20 Wangkai Jin and Xiangjun Peng SLITS: Sparsity-Lightened Intelligent Thread Scheduling . . . . . . . . . . . 21--22 Hongyuan Liu and Sreepathi Pai and Adwait Jog Asynchronous Automata Processing on GPUs 23--24 Canhui Chen and Zhixuan Fang Gacha Game Analysis and Design . . . . . 25--26 Daan Rutten and Debankur Mukherjee Mean-field Analysis for Load Balancing on Spatial Graphs . . . . . . . . . . . 27--28 Sebastian Allmeier and Nicolas Gast Bias and Refinement of Multiscale Mean Field Models . . . . . . . . . . . . . . 29--30 Tareq Si Salem and Georgios Iosifidis and Giovanni Neglia Enabling Long-term Fairness in Dynamic Resource Allocation . . . . . . . . . . 31--32 Serkut Ayvasik and Fidan Mehmeti and Edwin Babaians and Wolfgang Kellerer PEACH: Proactive and Environment Aware Channel State Information Prediction with Depth Images . . . . . . . . . . . 33--34 Yunzhuo Liu and Bo Jiang and Tian Guo and Zimeng Huang and Wenhao Ma and Xinbing Wang and Chenghu Zhou FuncPipe: a Pipelined Serverless Framework for Fast and Cost-efficient Training of Deep Learning Models . . . . 35--36 Prashanthi S. K and Sai Anuroop Kesanapalli and Yogesh Simmhan Characterizing the Performance of Accelerated Jetson Edge Devices for Training Deep Learning Models . . . . . 37--38 Ali Hossein Abbasi Abyaneh and Maizi Liao and Seyed Majid Zahedi Malcolm: Multi-agent Learning for Cooperative Load Management at Rack Scale . . . . . . . . . . . . . . . . . 39--40 Kyle MacMillan and Tarun Mangla and James Saxon and Nicole P. Marwell and Nick Feamster A Comparative Analysis of Ookla Speedtest and Measurement Labs Network Diagnostic Test (NDT7) . . . . . . . . . 41--42 Rashna Kumar and Sana Asif and Elise Lee and Fabián E. Bustamante Each at its Own Pace: Third-Party Dependency and Centralization Around the World . . . . . . . . . . . . . . . . . 43--44 Haoran Lu and Qingchuan Zhao and Yongliang Chen and Xiaojing Liao and Zhiqiang Lin Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding . . . . . . . . 45--46 Amanda Hsu and Frank Li and Paul Pearce Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets 47--48 Marco Chiesa and Fábio L. Verdi Network Monitoring on Multi-Pipe Switches . . . . . . . . . . . . . . . . 49--50 Haibo Wang and Dimitrios Melissourgos and Chaoyi Ma and Shigang Chen Real-time Spread Burst Detection in Data Streaming . . . . . . . . . . . . . . . 51--52 Usama Naseer and Theophilus A. Benson JS Capsules: a Framework for Capturing Fine-grained JavaScript Memory Measurements for the Mobile Web. . . . . 53--54 Siddhartha Banerjee and Chamsi Hssaine and Sean R. Sinclair Online Fair Allocation of Perishable Resources . . . . . . . . . . . . . . . 55--56 Mozhengfu Liu and Xueyan Tang Dynamic Bin Packing with Predictions . . 57--58 Bo Sun and Lin Yang and Mohammad Hajiesmaili and Adam Wierman and John C. S. Lui and Don Towsley and Danny H. K. Tsang The Online Knapsack Problem with Departures . . . . . . . . . . . . . . . 59--60 Fengjiao Li and Xingyu Zhou and Bo Ji (Private) Kernelized Bandits with Distributed Biased Feedback . . . . . . 61--62 Santiago Balseiro and Christian Kroer and Rachitesh Kumar Online Resource Allocation under Horizon Uncertainty . . . . . . . . . . . . . . 63--64 Shuang Cui and Kai Han and Jing Tang and He Huang and Xueying Li and Zhiyu Li Streaming Algorithms for Constrained Submodular Maximization . . . . . . . . 65--66 Daniel Vial and Sanjay Shakkottai and R. Srikant Robust Multi-Agent Bandits Over Undirected Graphs . . . . . . . . . . . 67--68 Naram Mhaisen and Abhishek Sinha and Georgios Paschos and George Iosifidis Optimistic No-regret Algorithms for Discrete Caching . . . . . . . . . . . . 69--70 Daan Rutten and Nicolas Christianson and Debankur Mukherjee and Adam Wierman Smoothed Online Optimization with Unreliable Predictions . . . . . . . . . 71--72 Jing Yu and Dimitar Ho and Adam Wierman Online Adversarial Stabilization of Unknown Networked Systems . . . . . . . 73--74 Jalani K. Williams and Mor Harchol-Balter and Weina Wang The M/M/$k$ with Deterministic Setup Times . . . . . . . . . . . . . . . . . 75--76 Xinzhe Fu and Eytan Modiano Joint Learning and Control in Stochastic Queueing Networks with Unknown Utilities 77--78 Yehua Wei and Jiaming Xu and Sophie H. Yu Constant Regret Primal-Dual Policy for Multi-way Dynamic Matching . . . . . . . 79--80 Dongyan (Lucy) Huo and Yudong Chen and Qiaomin Xie Bias and Extrapolation in Markovian Linear Stochastic Approximation with Constant Stepsizes . . . . . . . . . . . 81--82 Yizhou Zhang and Guannan Qu and Pan Xu and Yiheng Lin and Zaiwei Chen and Adam Wierman Global Convergence of Localized Policy Iteration in Networked Multi-Agent Reinforcement Learning . . . . . . . . . 83--84 Tyler Sam and Yudong Chen and Christina Lee Yu Overcoming the Long Horizon Barrier for Sample-Efficient Reinforcement Learning with Latent Low-Rank Structure . . . . . 85--86 Mingming Zhang and Xiang Li and Baojun Liu and JianYu Lu and Yiming Zhang and Jianjun Chen and Haixin Duan and Shuang Hao and Xiaofeng Zheng Detecting and Measuring Security Risks of Hosting-Based Dangling Domains . . . 87--88 Alexander Goldberg and Giulia Fanti and Nihar B. Shah Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection . . . . . . . 89--90 Kailong Wang and Yuxi Ling and Yanjun Zhang and Zhou Yu and Haoyu Wang and Guangdong Bai and Beng Chin Ooi and Jin Song Dong Characterizing Cryptocurrency-themed Malicious Browser Extensions . . . . . . 91--92 Weizhao Tang and Lucianna Kiffer and Giulia Fanti and Ari Juels Strategic Latency Reduction in Blockchain Peer-to-Peer Networks . . . . 93--94 Sushil Mahavir Varma and Francisco Castro and Siva Theja Maguluri Power-of-d Choices Load Balancing in the Sub-Halfin Whitt Regime . . . . . . . . 95--96 Benny Van Houdt On the Stochastic and Asymptotic Improvement of First-Come First-Served and Nudge Scheduling . . . . . . . . . . 97--98 Isaac Grosof and Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf Optimal Scheduling in the Multiserver-job Model under Heavy Traffic . . . . . . . . . . . . . . . . 99--100 Igor Kadota and Dror Jacoby and Hagit Messer and Gil Zussman and Jonatan Ostrometzky Switching in the Rain: Predictive Wireless x-haul Network Reconfiguration 101--102 Ruofeng Liu and Nakjung Choi A First Look at Wi-Fi 6 in Action: Throughput, Latency, Energy Efficiency, and Security . . . . . . . . . . . . . . 103--104 Ding Zhang and Panneer Selvam Santhalingam and Parth Pathak and Zizhan Zheng CoBF: Coordinated Beamforming in Dense mmWave Networks . . . . . . . . . . . . 105--106 Yilin Liu and Shijia Zhang and Mahanth Gowda and Srihari Nelakuditi Leveraging the Properties of mmWave Signals for $3$D Finger Motion Tracking for Interactive IoT Applications . . . . 107--108
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2023) . . . . . . . . . . 2 Weici Pan and Zhenhua Liu Switching Constrained Online Convex Optimization with Predictions and Feedback Delays . . . . . . . . . . . . 3--5 Isaac Grosof and Mor Harchol-Balter and Alan Scheller-Wolf New Stability Results for Multiserver-job Models via Product-form Saturated Systems . . . . . . . . . . . 6--8 E. Anton and K. Gardner The stationary distribution of the redundancy-$d$ model with random order of service . . . . . . . . . . . . . . . 9--11 Runhan Xie and Kristen Gardner and Rhonda Righter Insensitivity for Loss Systems with Compatibilities . . . . . . . . . . . . 12--14 Julianna Bor and Giuliano Casale and William Knottenbelt and Evgenia Smirni and Andreas Stathopoulos Fitting with matrix exponential mixtures generated by discrete probabilistic scaling . . . . . . . . . . . . . . . . 15--17 Zhisheng Zhao and Debankur Mukherjee Optimal Rate-Matrix Pruning For Heterogeneous Systems . . . . . . . . . 18--20 Daan Rutten and Martin Zubeldia and Debankur Mukherjee Distributed Rate Scaling in Large-Scale Service Systems . . . . . . . . . . . . 21--23 Prakirt Jhunjhunwala and Daniela Hurtado-Lange and Siva Theja Maguluri Exponential Tail Bounds on Queues . . . 24--26 Florin Ciucu and Sima Mehri and Amr Rizk On Ultra-Sharp Queueing Bounds . . . . . 27--29 Nicolas Gast and Bruno Gaujal and Kimang Khun What is an Optimal Policy in Time-Average MDP? . . . . . . . . . . . 30--32 Yige Hong and Ziv Scully Performance of the Gittins Policy in the G/G/1 and G/G/$k$, With and Without Setup Times . . . . . . . . . . . . . . 33--35 Runhan Xie and Ziv Scully Reducing Heavy-Traffic Response Time with Asymmetric Dispatching . . . . . . 36--38 Yingdong Lu and Mark S. Squillante and Chai Wah Wu Markov Decision Process Framework for Control-Based Reinforcement Learning . . 39--41
Sara Alouf ACM SIGMETRICS 2023 Student Research Competition . . . . . . . . . . . . . . 2--2 Amanda Camacho Novaes de Oliveira Learning the Optimal Representation Dimension for Restricted Boltzmann Machines . . . . . . . . . . . . . . . . 3--5 Zifeng Niu Graph Learning based Performance Analysis for Queueing Networks . . . . . 6--7 Isaac Grosof The RESET Technique for Multiserver-Job Analysis . . . . . . . . . . . . . . . . 8--9 Md Rajib Hossen PEMA+: a Comprehensive Resource Manager for Microservices . . . . . . . . . . . 10--12 Yuanyuan Li Distributed Experimental Design Networks 13--15 Xiangan He Zephyr: a Cost-Effective, Zero-Knowledge Light Client for Enhanced Blockchain Interoperability . . . . . . . . . . . . 16--18 Beatriz Pereira de Souza and Marcio Nunes de Miranda and Luiz Maltar Castello Branco An Energy-efficient Wireless Sensor Network Applied to Greenhouse Cultivation . . . . . . . . . . . . . . 19--21 Nishat Ahmed and Amaan Rahman and Lucia Rhode Best Practices for Exoskeleton Evaluation Using DeepLabCut . . . . . . 22--24 Tianhao Huang and Xiaozhi Zhu and Mo Niu An End-to-End Benchmarking Tool for Analyzing the Hardware-Software Implications of Multi-modal DNNs . . . . 25--27 Urtzi Ayesta Foreword from Chair of 2023 ACM SIGMETRICS Doctoral Dissertation Award Committee . . . . . . . . . . . . . . . 28--28 Isaac Grosof Optimal Scheduling in Multiserver Queues 29--32 Prakirt Raj Jhunjhunwala Design and Analysis of Stochastic Processing and Matching Networks . . . . 33--37 Sean R. Sinclair Adaptivity, Structure, and Objectives in Sequential Decision-Making . . . . . . . 38--41 Matthew Corbett Enhancing Security and Privacy in Head-Mounted Augmented Reality Systems Using Eye Gaze . . . . . . . . . . . . . 42--45 Zhongdong Liu Data Freshness in Information-update Systems: Modeling, Scheduling, and Tradeoffs . . . . . . . . . . . . . . . 46--49 Tasmeen Zaman Ornee Theory of Timely Remote Estimation and Application to Situational Awareness . . 50--53 Abhin Shah Data-Rich Causal Inference . . . . . . . 54--57 Md Kamran Chowdhury Shisher Timely Inference over Networks . . . . . 58--61 Vishrant Tripathi Information Freshness for Monitoring and Control over Wireless Networks . . . . . 62--65 Jinhang Zuo Learning-enabled Networked Systems . . . 66--69
Anton Braverman and Varun Gupta Foreword from the general chairs . . . . 2 Paul Barford and Maria Vlasiou and Lei Ying Message from the Technical Program Committee Chairs . . . . . . . . . . . . 3 Simon Scherrer and Seyedali Tabaeiaghdaei and Adrian Perrig Quality Competition Among Internet Service Providers . . . . . . . . . . . 4--5 Isaac Grosof and Yige Hong and Mor Harchol-Balter and Alan Scheller-Wolf The RESET and MARC Techniques, with Application to Multiserver-Job Analysis 6--7 Meera Pai and Nikhil Karamchandani and Jayakrishnan Nair Fixed confidence community mode estimation . . . . . . . . . . . . . . . 8--9 Kumar Saurav and Rahul Vaze Minimizing Age of Information under Arbitrary Arrival Model with Arbitrary Packet Size . . . . . . . . . . . . . . 10--11 Yige Hong and Ziv Scully Performance of the Gittins Policy in the G/G/1 and G/G/$k$, With and Without Setup Times . . . . . . . . . . . . . . 12--13 Yaron Yeger and Onno Boxma and Jacques Resing and Maria Vlasiou ASIP tandem queues with consumption . . 14--15 Prakirt Raj Jhunjhunwala and Siva Theja Maguluri Heavy Traffic Joint Queue Length Distribution without Resource Pooling 16--17 Prakirt Raj Jhunjhunwala and Daniela Hurtado-Lange and Siva Theja Maguluri Exponential Tail Bounds on Queues: a Confluence of Non- Asymptotic Heavy Traffic and Large Deviations . . . . . . 18--19 Hengquan Guo and Hongchen Cao and Jingzhu He and Xin Liu and Yuanming Shi POBO: Safe and Optimal Resource Management for Cloud Microservices . . . 20--21 Spandan Senapati and Rahul Vaze Online Convex Optimization with Switching Cost and Delayed Gradients . . 22--23 Xiaoding Guan and Noman Bashir and David Irwin and Prashant Shenoy WattScope: Non-intrusive Application-level Power Disaggregation in Datacenters . . . . . . . . . . . . . 24--25 Zhisheng Zhao and Debankur Mukherjee Optimal Rate-Matrix Pruning For Heterogeneous Systems . . . . . . . . . 26--27 Diletta Olliaro and Marco Ajmone Marsan and Simonetta Balsamo and Andrea Marin The Saturated Multiserver Job Queuing Model with Two Classes of Jobs: Exact and Approximate Results . . . . . . . . 28--29 Khushboo Agarwal and Veeraruna Kavitha Robust fake-post detection against real-coloring adversaries . . . . . . . 30--31 Boyang Zhou and Isaac Howenstine and Liang Cheng and Steffen Bondorf Breaking Cyclic Dependencies for Network Calculus using Service Partitioning . . 32--42 Andres Ferragut and Fernando Paganini Queueing analysis of imbalance between multiple server pools with an application to 3-phase EV charging . . . 43--53 Hai Duc Nguyen and Andrew A. Chien A Foundation for Real-time Applications on Function-as-a-Service . . . . . . . . 54--65 Ying Cao and Siyuan Yu and Xiaoqi Tan and Danny H. K. Tsang Competitive Online Path-Aware Path Selection . . . . . . . . . . . . . . . 66--72
Nicolas Gast and Benny Van Houdt Approximations to Study the Impact of the Service Discipline in Systems with Redundancy . . . . . . . . . . . . . . . 1--2 Ellen Cardinaels and Sem Borst and Johan S. H. van Leeuwaarden Multi-dimensional State Space Collapse in Non-complete Resource Pooling Scenarios . . . . . . . . . . . . . . . 3--4 George Yu and Ziv Scully Strongly Tail-Optimal Scheduling in the Light-Tailed M/G/1 . . . . . . . . . . . 5--6 Runhan Xie and Isaac Grosof and Ziv Scully Heavy-Traffic Optimal Size- and State-Aware Dispatching . . . . . . . . 7--8 Giovane C. M. Moura and Marco Davids and Caspar Schutijser and Cristian Hesselman and John Heidemann and Georgios Smaragdakis Deep Dive into NTP Pool's Popularity and Mapping . . . . . . . . . . . . . . . . 9--10 Minzhao Lyu and Rahul Dev Tripathi and Vijay Sivaraman MetaVRadar: Measuring Metaverse Virtual Reality Network Activity . . . . . . . . 11--12 Neil Ortiz and Alvaro A. Cardenas and Avishai Wool SCADA World: an Exploration of the Diversity in Power Grid Networks . . . . 13--14 Liz Izhikevich and Manda Tran and Katherine Izhikevich and Gautam Akiwate and Zakir Durumeric Democratizing LEO Satellite Network Measurement . . . . . . . . . . . . . . 15--16 Kahlil Dozier and Loqman Salamatian and Dan Rubenstein Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!) . . . . . . . . . . . . . . . . 17--18 Avi Mizrahi and Daniella Bar-Lev and Eitan Yaakobi and Ori Rottenstreich Invertible Bloom Lookup Tables with Listing Guarantees . . . . . . . . . . . 19--20 Andrea Monterubbiano and Jonatan Langlet and Stefan Walzer and Gianni Antichi and Pedro Reviriego and Salvatore Pontarelli Lightweight Acquisition and Ranging of Flows in the Data Plane . . . . . . . . 21--22 Santosh Pandey and Amir Yazdanbakhsh and Hang Liu TAO: Re-Thinking DL-based Microarchitecture Simulation . . . . . . 23--24 Mohammad Bakhshalipour and Phillip B. Gibbons Agents of Autonomy: a Systematic Study of Robotics on Modern Hardware . . . . . 25--26 Venkatraman Iyer and Sungho Lee and Semun Lee and Juitem Joonwoo Kim and Hyunjun Kim and Youngjae Shin Automated Backend Allocation for Multi-Model, On-Device AI Inference . . 27--28 Qingsong Liu and Zhixuan Fang Learning the Optimal Control for Evolving Systems with Converging Dynamics . . . . . . . . . . . . . . . . 29--30 Jiayu Pan and Yin Sun and Ness B. Shroff Sampling for Remote Estimation of the Wiener Process over an Unreliable Channel . . . . . . . . . . . . . . . . 31--32 Christos Tsanikidis and Javad Ghaderi Near-Optimal Packet Scheduling in Multihop Networks with End-to-End Deadline Constraints . . . . . . . . . . 33--34 Yixuan Zhang and Dongyan (Lucy) Huo and Yudong Chen and Qiaomin Xie Prelimit Coupling and Steady-State Convergence of Constant-stepsize Nonsmooth Contractive SA . . . . . . . . 35--36 Huaifeng Zhang and Mohannad Alhanahnah and Fahmi Abdulqadir Ahmed and Dyako Fatih and Philipp Leitner and Ahmed Ali-Eldin Machine Learning Systems are Bloated and Vulnerable . . . . . . . . . . . . . . . 37--38 Scott Cheng and Jun-Liang Lin and Murali Emani and Siddhisanket Raskar and Sam Foreman and Zhen Xie and Venkatram Vishwanath and Mahmut T. Kandemir Thorough Characterization and Analysis of Large Transformer Model Training At-Scale . . . . . . . . . . . . . . . . 39--40 Yicheng Pan and Yang Zhang and Tingzhu Bi and Linlin Han and Yu Zhang and Meng Ma and Xiangzhuang Shen and Xinrui Jiang and Feng Wang and Xian Liu and Ping Wang HEAL: Performance Troubleshooting Deep inside Data Center Hosts . . . . . . . . 41--42 Peter Cai and Martin Karsten Kernel vs. User-Level Networking: Don't Throw Out the Stack with the Interrupts 43--44 Adam Lechowicz and Nicolas Christianson and Bo Sun and Noman Bashir and Mohammad Hajiesmaili and Adam Wierman and Prashant Shenoy Online Conversion with Switching Costs: Robust and Learning-Augmented Algorithms 45--46 Adam Lechowicz and Nicolas Christianson and Jinhang Zuo and Noman Bashir and Mohammad Hajiesmaili and Adam Wierman and Prashant Shenoy The Online Pause and Resume Problem: Optimal Algorithms and An Application to Carbon-Aware Load Shifting . . . . . . . 47--48 Walid A. Hanafy and Qianlin Liang and Noman Bashir and David Irwin and Prashant Shenoy CarbonScaler: Leveraging Cloud Workload Elasticity for Optimizing Carbon-Efficiency . . . . . . . . . . . 49--50 Yudi Huang and Yilei Lin and Ting He Optimized Cross-Path Attacks via Adversarial Reconnaissance . . . . . . . 51--52 Radu Anghel and Yury Zhauniarovich and Carlos Gañán Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service . . . . . . . . . . . . . . . . 53--54 Euijin Choo and Mohamed Nabeel and Doowon Kim and Ravindu De Silva and Ting Yu and Issa Khalil A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs . . . . . . . . . . . . . . 55--56 Jianyi Yang and Pengfei Li and Mohammad J. Islam and Shaolei Ren Online Allocation with Replenishable Budgets: Worst Case and Beyond . . . . . 57--58 Fatih Aslan and George Iosifidis and Jose A. Ayala-Romero and Andres Garcia-Saavedra and Xavier Costa-Perez Fair Resource Allocation in Virtualized O-RAN Platforms . . . . . . . . . . . . 59--60 Lingdong Wang and Simran Singh and Jacob Chakareski and Mohammad Hajiesmaili and Ramesh K. Sitaraman BONES: Near-Optimal Neural-Enhanced Video Streaming . . . . . . . . . . . . 61--62 Gilbert Jonatan and Haeyoon Cho and Hyojun Son and Xiangyu Wu and Neal Livesay and Evelio Mora and Kaustubh Shivdikar and José L. Abellán and Ajay Joshi and David Kaeli and John Kim Scalability Limitations of Processing-in-Memory using Real System Evaluations . . . . . . . . . . . . . . 63--64 Stella Bitchebe and Yves Kone and Pierre Olivier and Jalil Boukhobza and Yérom-David Bromberg and Daniel Hagimont and Alain Tchana GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection Support . . . . . . . . . . . 65--66 Negar Akbarzadeh and Sina Darabi and Atiyeh Gheibi-Fetrat and Amir Mirzaei and Mohammad Sadrosadati and Hamid Sarbazi-Azad A High-bandwidth High-capacity Hybrid $3$D Memory for GPUs . . . . . . . . . . 67--68 Keegan Harris and Anish Agarwal and Chara Podimata and Zhiwei Steven Wu Strategyproof Decision-Making in Panel Data Settings and Beyond . . . . . . . . 69--70 Ludwig Dierks and Makoto Yokoo When Should Prices Stay Fixed? On the Chances and Limitations of Spot Pricing in Larger Markets . . . . . . . . . . . 71--72 Jin Cheng and Ningning Ding and John C. S. Lui and Jianwei Huang Continuous Query-based Data Trading . . 73--74 Lo, Chi-Jen (Roger) and Mahesh K. Marina and Nishanth Sastry and Kai Xu and Saeed Fadaei and Yong Li Shrinking VOD Traffic via Rényi--Entropic Optimal Transport . . . . . . . . . . . 75--76 Ruizhe Shi and Ruizhi Cheng and Bo Han and Yue Cheng and Songqing Chen A Closer Look into IPFS: Accessibility, Content, and Performance . . . . . . . . 77--78 Rohan Basu Roy and Devesh Tiwari StarShip: Mitigating I/O Bottlenecks in Serverless Computing for Scientific Workflows . . . . . . . . . . . . . . . 79--80 Yiguang Zhang and Reetahan Mukhopadhyay and Augustin Chaintreau Network Fairness Ambivalence: When Does Social Network Capital Mitigate or Amplify Unfairness? . . . . . . . . . . 81--82 Simon Lindståhl and Alexandre Proutiere and Andreas Johnsson Change Point Detection with Adaptive Measurement Schedules for Network Performance Verification . . . . . . . . 83--84 Xi Jiang and Shinan Liu and Aaron Gember-Jacobson and Arjun Nitin Bhagoji and Paul Schmitt and Francesco Bronzino and Nick Feamster NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation . . . . . . . . . . . . . . . 85--86 Jintao Huang and Ningyu He and Kai Ma and Jiang Xiao and Haoyu Wang Miracle or Mirage? A Measurement Study of NFT Rug Pulls . . . . . . . . . . . . 87--88 Kai Li and Shixuan Guan and Darren Lee Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild . . . 89--90 Tianyue Chu and Nikolaos Laoutaris FedQV: Leveraging Quadratic Voting in Federated Learning . . . . . . . . . . . 91--92 Yige Hong and Qiaomin Xie and Weina Wang Near-Optimal Stochastic Bin-Packing in Large Service Systems with Time-Varying Item Sizes . . . . . . . . . . . . . . . 93--94 Daan Rutten and Martin Zubeldia and Debankur Mukherjee Distributed Speed Scaling in Large-Scale Service Systems . . . . . . . . . . . . 95--96 Diego Goldsztajn and Sem C. Borst and Johan S. H. van Leeuwaarden Server Saturation in Skewed Networks . . 97--98 Alagappan Ramanathan and Rishika Sankaran and Sangeetha Abdu Jyothi Xaminer: an Internet Cross-Layer Resilience Analysis Tool . . . . . . . . 99--100 Alagappan Ramanathan and Sangeetha Abdu Jyothi Nautilus: a Framework for Cross-Layer Cartography of Submarine Cables and IP Links . . . . . . . . . . . . . . . . . 101--102 Esteban Carisimo and Caleb J. Wang and Mia Weaver and Fabián Bustamante and Paul Barford A Hop Away from Everywhere: a View of the Intercontinental Long-haul Infrastructure . . . . . . . . . . . . . 103--104
Mark S. Squillante Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2024) . . . . . . . . . . 2--2 Hossein Nekouyan Jazi and Faraz Zargari Online Conversion with Group Fairness Constraints . . . . . . . . . . . . . . 3--5 Nicolas Christianson and Bo Sun and Steven Low and Adam Wierman Risk-Sensitive Online Algorithms . . . . 6--8 Andres Ferragut and Matias Carrasco and Fernando Paganini Timer-based pre-fetching for increasing hazard rates . . . . . . . . . . . . . . 9--11 Zhouzi Li and Mor Harchol-Balter and Alan Scheller-Wolf Hybrid Priority Queue and its Applications . . . . . . . . . . . . . . 12--14 Amit Harlev and George Yu and Ziv Scully A Gittins Policy for Optimizing Tail Latency . . . . . . . . . . . . . . . . 15--17 Shefali Ramakrishna and Ziv Scully Transform Analysis of Preemption Overhead in the M/G/1 . . . . . . . . . 18--20 Nils Charlet and Benny Van Houdt Tail Optimality of the Nudge-$M$ Scheduling Algorithm . . . . . . . . . . 21--23 Isaac Grosof and Ziyuan Wang Bounds on M/G/$k$ Scheduling Under Moderate Load Improving on SRPT-$k$ and Tightening Lower Bounds . . . . . . . . 24--26 Zhongrui Chen and Isaac Grosof and Benjamin Berg Simple Policies for Multiresource Job Scheduling . . . . . . . . . . . . . . . 27--29 Larkin Liu and Shiqi Liu and Matej Jusup Optimizing Stochastic Control through State Transition Separability and Resource-Utility Exchange . . . . . . . 30--32 Weici Pan and Zhenhua Liu Non-stationary Bandits with Heavy Tail 33--35 Suryanarayana Sankagiri and Bruce Hajek Pricing for Routing and Flow-Control in Payment Channel Networks . . . . . . . . 36--38 J. G. Dai and Jin Guang and Yaosheng Xu Steady-State Convergence of the Continuous-Time JSQ System with General Distributions in Heavy Traffic . . . . . 39--41 Vasileios Kalantzis and Mark S. Squillante and Shashanka Ubaru On Quantum Algorithms for Efficient Solutions of General Classes of Structured Markov Processes . . . . . . 42--44 Vittoria de Nitto Persone and Y. C. Tay Report on the Third International Workshop on Teaching Performance Analysis of Computer Systems 2024 . . . 45--48 Dieter Fiems Teaching performance analysis: essential skills andlearning outcomes . . . . . . 49--52 Michela Meo Why Should I Teach Performance Evaluation to Students in Networking? 53--57 Cristina L. Abad How can we Teach Workload Modeling in CS Systems Classes? . . . . . . . . . . . . 58--62