Abstract is missing.
- Performance and reliability: the ubiquitous challengeDaniel A. Reed. 1-2 [doi]
- Stardust: tracking activity in a distributed storage systemEno Thereska, Brandon Salmon, John D. Strunk, Matthew Wachs, Michael Abd-El-Malek, Julio Lopez, Gregory R. Ganger. 3-14 [doi]
- Exploiting redundancy to conserve energy in storage systemsEduardo Pinheiro, Ricardo Bianchini, Cezary Dubnicki. 15-26 [doi]
- Maximizing throughput in wireless networks via gossipingEytan Modiano, Devavrat Shah, Gil Zussman. 27-38 [doi]
- Determining the end-to-end throughput capacity in multi-hop networks: methodology and applicationsYan Gao, Dah-Ming Chiu, John C. S. Lui. 39-50 [doi]
- Impacts of channel variability on link-level throughput in wireless networksCan Emre Koksal, Kyle Jamieson, Emre Telatar, Patrick Thiran. 51-62 [doi]
- Partially overlapped channels not considered harmfulArunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh. 63-74 [doi]
- GPS scheduling: selection of optimal weights and comparison with strict prioritiesP. Lieshout, Michel Mandjes, Sem C. Borst. 75-86 [doi]
- The impact of reneging in processor sharing queuesH. Christian Gromoll, Philippe Robert, Bert Zwart, Richard Bakker. 87-96 [doi]
- Tail asymptotics for policies favoring short jobs in a many-flows regimeChang-Woo Yang, Adam Wierman, Sanjay Shakkottai, Mor Harchol-Balter. 97-108 [doi]
- On light and heavy traffic approximations of balanced fairnessThomas Bonald, Aleksi Penttinen, Jorma T. Virtamo. 109-120 [doi]
- NetQuest: a flexible framework for large-scale network measurementHan Hee Song, Lili Qiu, Yin Zhang. 121-132 [doi]
- Robust traffic matrix estimation with imperfect information: making use of multiple data sourcesQi Zhao, Zihui Ge, Jia Wang, Jun Xu. 133-144 [doi]
- Data streaming algorithms for estimating entropy of network trafficAshwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, Hui Zhang. 145-156 [doi]
- On suitability of Euclidean embedding of internet hostsSanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan Saha. 157-168 [doi]
- An efficient algorithm for the exact analysis of multiclass queueing networks with large population sizesGiuliano Casale. 169-180 [doi]
- Transient analysis of tree-Like processes and its application to random access systemsJeroen Van Velthoven, Benny Van Houdt, Chris Blondia. 181-190 [doi]
- Bounding stationary results of Tandem networks with MAP input and PH service time distributionsPeter Buchholz. 191-202 [doi]
- Fundamental characteristics of queues with fluctuating loadVarun Gupta, Mor Harchol-Balter, Alan Scheller-Wolf, Uri Yechiali. 203-215 [doi]
- Automatic logging of operating system effects to guide application-level architecture simulationSatish Narayanasamy, Cristiano Pereira, Harish Patil, Robert Cohn, Brad Calder. 216-227 [doi]
- An analytical model for cache replacement policy performanceFei Guo, Yan Solihin. 228-239 [doi]
- Understanding the management of client perceived response timeDavid P. Olshefski, Jason Nieh. 240-251 [doi]
- Confidence intervals for priority samplingMikkel Thorup. 252-263 [doi]
- Finding probably better system configurations quicklyTakayuki Osogami, Toshinari Itoko. 264-275 [doi]
- The Erlang model with non-poisson call arrivalsThomas Bonald. 276-286 [doi]
- On the way to a distributed systems calculus: an end-to-end network calculus with data scalingMarkus Fidler, Jens B. Schmitt. 287-298 [doi]
- Robust network connectivity: when it s the big picture that mattersEnoch Peserico, Larry Rudolph. 299-310 [doi]
- Packet classifiers in ternary CAMs can be smallerQunfeng Dong, Suman Banerjee, Jia Wang, Dheeraj Agrawal, Ashutosh Shukla. 311-322 [doi]
- Design of a novel statistics counter architecture with optimal space and time efficiencyQi Zhao, Jun Xu, Zhen Liu. 323-334 [doi]
- Fluid modeling of pollution proliferation in P2P networksRakesh Kumar, David D. Yao, Amitabha Bagchi, Keith W. Ross, Dan Rubenstein. 335-346 [doi]
- Fast statistical spam filter by approximate classificationsKang Li, Zhenyu Zhong. 347-358 [doi]
- QuickProbe: available bandwidth estimation in two roundtripsGeorge Kola, Mary K. Vernon. 359-360 [doi]
- Flexible time-windows for advance reservation in LambdaGridsNeena R. Kaushik, Silvia M. Figueira, Stephen A. Chiappari. 361-362 [doi]
- Analyzing persistent state interactions to improve state managementChad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee. 363-364 [doi]
- Delay-optimal scheduling in bandwidth-sharing networksMaaike Verloop, Rudesindo Núñez-Queija, Sem C. Borst. 365-366 [doi]
- Throughput performance of popular JMS serversMichael Menth, Robert Henjes, Christian Zepfel, Sebastian Gehrsitz. 367-368 [doi]
- Optimizing the HPCC randomaccess benchmark on blue Gene/L SupercomputerRahul Garg, Yogish Sabharwal. 369-370 [doi]
- Peer-to-peer streaming of stored media: the indirect approachTadeusz Piotrowski, Suman Banerjee, Sudeept Bhatnagar, Samrat Ganguly, Rauf Izmailov. 371-372 [doi]
- Analysis of a new intra-disk redundancy scheme for high-reliability RAID storage systems in the presence of unrecoverable errorsAjay Dholakia, Evangelos Eleftheriou, Xiao-Yu Hu, Ilias Iliadis, Jai Menon, K. K. Rao. 373-374 [doi]
- Applying architectural vulnerability Analysis to hard faults in the microprocessorFred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel J. Sorin, Sule Ozev. 375-376 [doi]
- A multicommodity flow model for distributed stream processingJames Broberg, Zhen Liu, Cathy H. Xia, Li Zhang. 377-378 [doi]
- A characterization of a java-based commercial workload on a high-end enterprise serverIan M. Steiner, Yefim Shuf. 379-380 [doi]
- Optimizing transmission rate in wireless channels using adaptive probesSudipto Guha, Kamesh Munagala, Saswati Sarkar. 381-382 [doi]
- Consolidating clients on back-end servers with co-location and frequency controlYiyu Chen, Amitayu Das, Anand Sivasubramaniam, Qian Wang, Robert Harper, M. Bland. 383-384 [doi]
- Congestion responsiveness of internet traffic: (a fresh look at an old problem)Ravi S. Prasad, Constantine Dovrolis. 385-386 [doi]
- Towards deterministic network diagnosisYao Zhao, Yan Chen, David Bindel. 387-388 [doi]
- Modeling adoptability of secure BGP protocolsHaowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang. 389-390 [doi]