3 | -- | 5 | Björn Scheuermann, Wolfgang Kieß. Who said that?: the send-receive correlation problem in network log analysis |
6 | -- | 8 | Animashree Anandkumar, Chatschik Bisdikian, Ting He, Dakshi Agrawal. Selectively retrofitting monitoring in distributed systems |
9 | -- | 11 | Abhishek Dubey, Rajat Mehrotra, Sherif Abdelwahed, Asser N. Tantawi. Performance modeling of distributed multi-tier enterprise systems |
12 | -- | 14 | Chao Wang, Xiaoli Ma. Deriving cramér-rao bounds and maximum likelihood estimators for traffic matrix inference |
15 | -- | 17 | Dmitri V. Krioukov, Fragkiskos Papadopoulos, Marián Boguñá, Amin Vahdat. Greedy forwarding in scale-free networks embedded in hyperbolic metric spaces |
18 | -- | 20 | Jeong-woo Cho, Yuming Jiang. Basic theorems on the backoff process in 802.11 |
21 | -- | 23 | Jayakrishnan Nair, Steven H. Low. Optimal job fragmentation |
24 | -- | 26 | Erlin Yao, Yungang Bao, Guangming Tan, Mingyu Chen. Extending Amdahl s law in the multicore era |
27 | -- | 29 | Dmitry Korzun, Andrei Gurtov. A local equilibrium model for P2P resource ranking |
30 | -- | 32 | Daniel Sadoc Menasché, Antonio Augusto de Aragão Rocha, Edmundo de Souza e Silva, Rosa Maria Meri Leão, Donald F. Towsley, Arun Venkataramani. Modeling chunk availability in P2P swarming systems |
33 | -- | 35 | Oliver Hohlfeld, Florin Ciucu. Viewing impaired video transmissions from a modeling perspective |
36 | -- | 38 | Gagan Raj Gupta, Sujay Sanghavi, Ness B. Shroff. Workload optimality in switches without arrivals |
39 | -- | 41 | Lachlan L. H. Andrew, Adam Wierman, Ao Tang. Optimal speed scaling under arbitrary power functions |
42 | -- | 44 | Ina Maria Verloop, Urtzi Ayesta, Rudesindo Núñez-Queija. Heavy-traffic analysis of the M/PH/1 discriminatory processor sharing queue with phase-dependent weights |
45 | -- | 47 | Jonatha Anselmi, Yingdong Lu, Mayank Sharma, Mark S. Squillante. Improved Approximations for Stochastic Loss Networks |
49 | -- | 50 | Elias Weingärtner, Florian Schmidt, Tobias Heer, Klaus Wehrle. Time accurate integration of software prototypes with event-based network simulations |
51 | -- | 52 | Haifeng Chen, Wenxuan Zhang, Guofei Jiang. Experience transfer for the configuration tuning in large scale computing systems |
53 | -- | 54 | Bill Lin, Jun (Jim) Xu, Nan Hua, Hao Wang, Haiquan (Chuck) Zhao. A randomized interleaved DRAM architecture for the maintenance of exact statistics counters |
55 | -- | 56 | Bridge Q. Zhao, Y. K. Li, John C. S. Lui, Dah-Ming Chiu. On modeling product advertisement in social networks |
57 | -- | 58 | Thomas Zahn, Greg O Shea, Antony I. T. Rowstron. An empirical study of flooding in mesh networks |
59 | -- | 60 | Sipat Triukose, Zhihua Wen, Michael Rabinovich. Content delivery networks: how big is big enough? |
61 | -- | 62 | Zhibin Yu, Hai Jin. Simple and fast micro-architecture simulation: a trisection cantor fractal approach |
63 | -- | 64 | Peter Key, Alexandre Proutiere. Routing games with elastic traffic |
65 | -- | 66 | John R. Lange, J. Scott Miller, Peter A. Dinda. EmNet: satisfying the individual user through empathic home networks: summary |
67 | -- | 68 | Alma Riska, Erik Riedel. Evaluation of disk-level workloads at different time scales |
69 | -- | 70 | Vinith Reddy, Younghoon Kim, Srinivas Shakkottai, A. L. Narasimha Reddy. MultiTrack: a delay and cost aware P2P overlay architecture |
71 | -- | 72 | Sem C. Borst, Varun Gupta, Anwar Walid. Self-organizing algorithms for cache cooperation in content distribution networks |
73 | -- | 74 | Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. Stealthy poisoning attacks on PCA-based anomaly detectors |
75 | -- | 76 | Douglas G. Down, H. Christian Gromoll, Amber L. Puha. State-dependent response times via fluid limits in shortest remaining processing time queues |
77 | -- | 78 | Jianwei Chen, Murali Annavaram, Michel Dubois. SlackSim: a platform for parallel simulations of CMPs on CMPs |
79 | -- | 80 | Ajay Gulati, Arif Merchant, Mustafa Uysal, Pradeep Padala, Peter J. Varman. Efficient and adaptive proportional share I/O scheduling |
81 | -- | 82 | Yang Liu, Linfeng Zhang, Yong Guan. A distributed data streaming algorithm for network-wide traffic anomaly detection |
83 | -- | 84 | François Baccelli, Bruno Kauffmann, Darryl Veitch. Towards multihop available bandwidth estimation |
85 | -- | 86 | Animesh Nandi, Bobby Bhattacharjee, Peter Druschel. What a mesh: understanding the design tradeoffs for streaming multicast |
87 | -- | 88 | Daniel Sadoc Menasché, Antonio Augusto de Aragão Rocha, Bin Li, Donald F. Towsley, Arun Venkataramani. Modeling content availability in peer-to-peer swarming systems |
89 | -- | 90 | Ravi Iyer, Ramesh Illikkal, Li Zhao, Don Newell, Jaideep Moses. Virtual platform architectures for resource metering in datacenters |