Journal: SIGMETRICS Performance Evaluation Review

Volume 37, Issue 2

3 -- 5Björn Scheuermann, Wolfgang Kieß. Who said that?: the send-receive correlation problem in network log analysis
6 -- 8Animashree Anandkumar, Chatschik Bisdikian, Ting He, Dakshi Agrawal. Selectively retrofitting monitoring in distributed systems
9 -- 11Abhishek Dubey, Rajat Mehrotra, Sherif Abdelwahed, Asser N. Tantawi. Performance modeling of distributed multi-tier enterprise systems
12 -- 14Chao Wang, Xiaoli Ma. Deriving cramér-rao bounds and maximum likelihood estimators for traffic matrix inference
15 -- 17Dmitri V. Krioukov, Fragkiskos Papadopoulos, Marián Boguñá, Amin Vahdat. Greedy forwarding in scale-free networks embedded in hyperbolic metric spaces
18 -- 20Jeong-woo Cho, Yuming Jiang. Basic theorems on the backoff process in 802.11
21 -- 23Jayakrishnan Nair, Steven H. Low. Optimal job fragmentation
24 -- 26Erlin Yao, Yungang Bao, Guangming Tan, Mingyu Chen. Extending Amdahl s law in the multicore era
27 -- 29Dmitry Korzun, Andrei Gurtov. A local equilibrium model for P2P resource ranking
30 -- 32Daniel Sadoc Menasché, Antonio Augusto de Aragão Rocha, Edmundo de Souza e Silva, Rosa Maria Meri Leão, Donald F. Towsley, Arun Venkataramani. Modeling chunk availability in P2P swarming systems
33 -- 35Oliver Hohlfeld, Florin Ciucu. Viewing impaired video transmissions from a modeling perspective
36 -- 38Gagan Raj Gupta, Sujay Sanghavi, Ness B. Shroff. Workload optimality in switches without arrivals
39 -- 41Lachlan L. H. Andrew, Adam Wierman, Ao Tang. Optimal speed scaling under arbitrary power functions
42 -- 44Ina Maria Verloop, Urtzi Ayesta, Rudesindo Núñez-Queija. Heavy-traffic analysis of the M/PH/1 discriminatory processor sharing queue with phase-dependent weights
45 -- 47Jonatha Anselmi, Yingdong Lu, Mayank Sharma, Mark S. Squillante. Improved Approximations for Stochastic Loss Networks
49 -- 50Elias Weingärtner, Florian Schmidt, Tobias Heer, Klaus Wehrle. Time accurate integration of software prototypes with event-based network simulations
51 -- 52Haifeng Chen, Wenxuan Zhang, Guofei Jiang. Experience transfer for the configuration tuning in large scale computing systems
53 -- 54Bill Lin, Jun (Jim) Xu, Nan Hua, Hao Wang, Haiquan (Chuck) Zhao. A randomized interleaved DRAM architecture for the maintenance of exact statistics counters
55 -- 56Bridge Q. Zhao, Y. K. Li, John C. S. Lui, Dah-Ming Chiu. On modeling product advertisement in social networks
57 -- 58Thomas Zahn, Greg O Shea, Antony I. T. Rowstron. An empirical study of flooding in mesh networks
59 -- 60Sipat Triukose, Zhihua Wen, Michael Rabinovich. Content delivery networks: how big is big enough?
61 -- 62Zhibin Yu, Hai Jin. Simple and fast micro-architecture simulation: a trisection cantor fractal approach
63 -- 64Peter Key, Alexandre Proutiere. Routing games with elastic traffic
65 -- 66John R. Lange, J. Scott Miller, Peter A. Dinda. EmNet: satisfying the individual user through empathic home networks: summary
67 -- 68Alma Riska, Erik Riedel. Evaluation of disk-level workloads at different time scales
69 -- 70Vinith Reddy, Younghoon Kim, Srinivas Shakkottai, A. L. Narasimha Reddy. MultiTrack: a delay and cost aware P2P overlay architecture
71 -- 72Sem C. Borst, Varun Gupta, Anwar Walid. Self-organizing algorithms for cache cooperation in content distribution networks
73 -- 74Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. Stealthy poisoning attacks on PCA-based anomaly detectors
75 -- 76Douglas G. Down, H. Christian Gromoll, Amber L. Puha. State-dependent response times via fluid limits in shortest remaining processing time queues
77 -- 78Jianwei Chen, Murali Annavaram, Michel Dubois. SlackSim: a platform for parallel simulations of CMPs on CMPs
79 -- 80Ajay Gulati, Arif Merchant, Mustafa Uysal, Pradeep Padala, Peter J. Varman. Efficient and adaptive proportional share I/O scheduling
81 -- 82Yang Liu, Linfeng Zhang, Yong Guan. A distributed data streaming algorithm for network-wide traffic anomaly detection
83 -- 84François Baccelli, Bruno Kauffmann, Darryl Veitch. Towards multihop available bandwidth estimation
85 -- 86Animesh Nandi, Bobby Bhattacharjee, Peter Druschel. What a mesh: understanding the design tradeoffs for streaming multicast
87 -- 88Daniel Sadoc Menasché, Antonio Augusto de Aragão Rocha, Bin Li, Donald F. Towsley, Arun Venkataramani. Modeling content availability in peer-to-peer swarming systems
89 -- 90Ravi Iyer, Ramesh Illikkal, Li Zhao, Don Newell, Jaideep Moses. Virtual platform architectures for resource metering in datacenters