Abstract is missing.
- Practical performance models for complex, popular applicationsEno Thereska, Bjoern Doebel, Alice X. Zheng, Peter Nobel. 1-12 [doi]
- A mean field model of work stealing in large-scale systemsNicolas Gast, Bruno Gaujal. 13-24 [doi]
- A unifying approach to product-forms in networks with finite capacity constraintsSimonetta Balsamo, Peter G. Harrison, Andrea Marin. 25-36 [doi]
- Optimality, fairness, and robustness in speed scaling designsLachlan L. H. Andrew, Minghong Lin, Adam Wierman. 37-48 [doi]
- Elon: enabling efficient and long-term reprogramming for wireless sensor networksWei Dong, Yunhao Liu, Xiaofan Wu, Lin Gu, Chun Chen. 49-60 [doi]
- Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithmAmin Karbasi, Sewoong Oh. 61-70 [doi]
- Self-synchronizing properties of CSMA wireless multi-hop networksKuang Xu, Olivier Dousse, Patrick Thiran. 71-82 [doi]
- On the flow-level dynamics of a packet-switched networkCiamac Cyrus Moallemi, Devavrat Shah. 83-94 [doi]
- Incentive compatibility and dynamics of congestion controlBrighten Godfrey, Michael Schapira, Aviv Zohar, Scott Shenker. 95-106 [doi]
- Dynamics in congestion gamesDevavrat Shah, Jinwoo Shin. 107-118 [doi]
- Optimal recovery of single disk failure in RDP code storage systemsLiping Xiang, Yinlong Xu, John C. S. Lui, Qian Chang. 119-130 [doi]
- A query language and runtime tool for evaluating behavior of multi-tier serversSaeed Ghanbari, Gokul Soundararajan, Cristiana Amza. 131-142 [doi]
- Small subset queries and bloom filters using ternary associative memories, with applicationsAshish Goel, Pankaj Gupta. 143-154 [doi]
- Transparent, lightweight application execution replay on commodity multiprocessor operating systemsOren Laadan, Nicolas Viennot, Jason Nieh. 155-166 [doi]
- Coloring spatial point processes with applications to peer discovery in large wireless networksJian Ni, R. Srikant, Xinzhou Wu. 167-178 [doi]
- Optimal tradeoff between exposed and hidden nodes in large wireless networksPeter M. van de Ven, Augustus J. E. M. Janssen, Johan van Leeuwaarden. 179-190 [doi]
- Scheduling in multichannel wireless networks with flow-level dynamicsShihuan Liu, Lei Ying, R. Srikant. 191-202 [doi]
- Detecting sources of computer viruses in networks: theory and experimentDevavrat Shah, Tauhid Zaman. 203-214 [doi]
- Incentivizing peer-assisted services: a fluid shapley value approachVishal Misra, Stratis Ioannidis, Augustin Chaintreau, Laurent Massoulié. 215-226 [doi]
- Leveraging parallelism for multi-dimensional packetclassification on software routersYadi Ma, Suman Banerjee, Shan Lu, Cristian Estan. 227-238 [doi]
- Qualitative properties of alpha-weighted scheduling policiesDevavrat Shah, John N. Tsitsiklis, Yuan Zhong. 239-250 [doi]
- CWS: a model-driven scheduling policy for correlated workloadsGiuliano Casale, Ningfang Mi, Evgenia Smirni. 251-262 [doi]
- RSIO: automatic user interaction detection and schedulingHaoqiang Zheng, Jason Nieh. 263-274 [doi]
- Randomized load balancing with general service time distributionsMaury Bramson, Yi Lu, Balaji Prabhakar. 275-286 [doi]
- Load balancing via random local search in closed and open systemsAyalvadi Ganesh, Sarah Lilienthal, D. Manjunath, Alexandre Proutiere, Florian Simatos. 287-298 [doi]
- A unified modeling framework for distributed resource allocation of general fork and join processing networksHaiquan (Chuck) Zhao, Cathy H. Xia, Zhen Liu, Donald F. Towsley. 299-310 [doi]
- Distributed caching over heterogeneous mobile networksStratis Ioannidis, Laurent Massoulié, Augustin Chaintreau. 311-322 [doi]
- An analytical framework to infer multihop path reliability in MANETsNelson Antunes, Gonçalo Jacinto, António Pacheco. 323-332 [doi]
- Channel fragmentation in dynamic spectrum access systems: a theoretical studyEdward G. Coffman Jr., Philippe Robert, Florian Simatos, Shuzo Tarumi, Gil Zussman. 333-344 [doi]
- A distributed scheduling algorithm for wireless networks with constant overhead and arbitrary binary interferenceJean-Claude Bermond, Dorian Mazauric, Vishal Misra, Philippe Nain. 345-346 [doi]
- Successive c-optimal designs: a scalable technique to optimize the measurements on large networksGuillaume Sagnol, Mustapha Bouhtou, Stéphane Gaubert. 347-348 [doi]
- Deep diving into BitTorrent localityRuben Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez. 349-350 [doi]
- Inferring applications at the network layer using collective traffic statisticsYu Jin, Nick G. Duffield, Patrick Haffner, Subhabrata Sen, Zhi-Li Zhang. 351-352 [doi]
- The price of anarchy in parallel queues revisitedJonatha Anselmi, Bruno Gaujal. 353-354 [doi]
- Optimal propagation of security patches in mobile wireless networks: extended abstractM. H. R. Khouzani, Saswati Sarkar, Eitan Altman. 355-356 [doi]
- Managing the cost, energy consumption, and carbon footprint of internet servicesKien Le, Ozlem Bilgir, Ricardo Bianchini, Margaret Martonosi, Thu D. Nguyen. 357-358 [doi]
- Coordinated power management of voltage islands in CMPsAsit K. Mishra, Shekhar Srikantaiah, Mahmut T. Kandemir, Chita R. Das. 359-360 [doi]
- Rigorous statistical analysis of internet loss measurementsHung X. Nguyen, Matthew Roughan. 361-362 [doi]
- Semidefinite optimization for transient analysis of queuesTakayuki Osogami, Rudy Raymond. 363-364 [doi]
- CFTL: a convertible flash translation layer adaptive to data access patternsDongchul Park, Biplob Debnath, David Du. 365-366 [doi]
- A case for unsupervised-learning-based spam filteringFeng Qian, Abhinav Pathak, Yu Charlie Hu, Zhuoqing Morley Mao, Yinglian Xie. 367-368 [doi]
- Distributed averaging in dynamic networksShreevatsa Rajagopalan, Devavrat Shah. 369-370 [doi]
- Program behavior prediction using a statistical metric modelRuhi Sarikaya, Canturk Isci, Alper Buyuktosunoglu. 371-372 [doi]
- Delay optimal queue-based CSMADevavrat Shah, Jinwoo Shin. 373-374 [doi]
- Characterizing and modeling user activity on smartphones: summaryAlex Shye, Benjamin Scholbrock, Gokhan Memik, Peter A. Dinda. 375-376 [doi]
- Detecting traffic anomalies using an equilibrium propertyFernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan. 377-378 [doi]
- Characterizing the soft error vulnerability of multicores running multithreaded applicationsNiranjan Soundararajan, Anand Sivasubramaniam, Vijay Narayanan. 379-380 [doi]
- Can multipath mitigate power law delays?: effects of parallelism on tail performanceJian Tan, Wei Wei, Bo Jiang, Ness B. Shroff, Donald F. Towsley. 381-382 [doi]
- Distributed user profiling via spectral methodsDan-Cristian Tomozei, Laurent Massoulié. 383-384 [doi]