Journal: SIGMETRICS Performance Evaluation Review

Volume 46, Issue 4

2 -- 10Ranjan Pal, Aditya Ahuja, Sung-Han Lin, Abhishek Kumar, Leana Golubchik, Nachikethas A. Jagadeesan. On the Economic Sustainability of Cloud Sharing Systems Are Dynamic Single Resource Sharing Markets Stable?

Volume 46, Issue 3

1 -- 0Leandros Tassiulas. Optimizing the network edge for flexible service provisioning
2 -- 7Weina Wang, Mor Harchol-Balter, Haotian Jiang, Alan Scheller-Wolf, R. Srikant. Delay Asymptotics and Bounds for Multi-Task Parallel Jobs
8 -- 9Isaac Grosof, Ziv Scully, Mor Harchol-Balter. SRPT for Multiserver Systems
10 -- 11Xingyu Zhou, Jian Tan, Ness B. Shroff. Flexible Load Balancing with Multi-dimensional State-space Collapse: Throughput and Heavy-traffic Delay Optimality
12 -- 17Livia Elena Chatzieleftheriou, George Darzanos, Merkourios Karaliopoulos, Iordanis Koutsopoulos. Joint User Association, Content Caching and Recommendations in Wireless Edge Networks
18 -- 23Yung Fei Wong, Lachlan L. H. Andrew, Y. Ahmet Sekercioglu. Hidden semi-Markov models for electricity load disaggregation
24 -- 0Arash Molavi Kakhki, Vijay Erramilli, Phillipa Gill, Augustin Chaintreau, Balachander Krishnamurthy. Information Market for Web Browsing: Design, Usability and Incremental Adoption
25 -- 26Nicolas Gast, Luca Bortolussi, Mirco Tribastone. Size Expansions of Mean Field Approximation: Transient and Steady-State Analysis
27 -- 32Paola Bermolen, Matthieu Jonckheere, Federico Larroca, Manuel Saenz. Degree-Greedy Algorithms on Large Random Graphs
33 -- 34Moeko Yajima, Tuan Phung-Duc. A central limit theorem for a Markov-modulated infinite-server queue with batch Poisson arrivals and binomial catastrophes
35 -- 36Lianjie Shi, Xin Wang 0040, Richard T. B. Ma, Y. C. Tay. Weighted Fair Caching: Occupancy-Centric Allocation for Space-Shared Resources
37 -- 38Niklas Carlsson, Derek L. Eager. Worst-case Bounds and Optimized Cache on Mth Request Cache Insertion Policies under Elastic Conditions
39 -- 40Fan Ni, Xingbo Wu, Weijun Li, Lei Wang, Song Jiang. WOJ: Enabling Write-Once Full-data Journaling in SSDs by Using Weak-Hashing-based Deduplication
41 -- 42Stéphane Durand, Federica Garin, Bruno Gaujal. Efficiency of Best Response Dynamics with High Playing Rates in Potential Games
43 -- 48Ayman Chouayakh, Aurelien Bechler, Isabel Amigo, Loutfi Nuaymi, Patrick Maillé. Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness trade offs
49 -- 50Mao Zou, Richard T. B. Ma, Yinlong Xu. Towards An Efficient Market Mediator for Divisible Resources
51 -- 0Patrick Thiran. Locating the Source of Diffusion in Large-scale and Random Networks
52 -- 53Alessandro Zocca. Temporal starvation in multi-channel CSMA networks: an analytical framework
54 -- 55Thirupathaiah Vasantam, Arpan Mukhopadhyay, Ravi R. Mazumdar. The Mean-field Behavior of Processor Sharing Systems with General Job Lengths Under the SQ(d) Policy
56 -- 61Yorie Nakahira, Andrés Ferragut, Adam Wierman. Minimal-Variance Distributed Deadline Scheduling in a Stationary Environment
62 -- 67Martin Zeballos, Andrés Ferragut, Fernando Paganini. Achieving fairness for EV charging in overload: a fluid approach
68 -- 69Eduardo M. Hargreaves, Claudio Agosti, Daniel Sadoc Menasché, Giovanni Neglia, Alexandre Reiffers-Masson, Eitan Altman. Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design
70 -- 71Julien Floquet, Richard Combes, Zwi Altman. Hierarchical Beamforming: Resource Allocation, Fairness and Flow Level Performance
72 -- 73Youri Raaijmakers, Sem C. Borst, Onno J. Boxma. Delta probing policies for redundancy
74 -- 79T. Hellemans, B. Vanhoudt. Analysis of Redundancy(d) with Identical Replicas
80 -- 81Urtzi Ayesta, Tejas Bodas, Ina Maria Verloop. On a unifying product form framework for redundancy models
82 -- 83Catherine Rosenberg. Highlight Talk on Battery Modeling: Trade-offs between Accuracy and Complexity
84 -- 85Omid Ardakanian. Leveraging Sparsity in Distribution Grids: System Identification and Harmonic State Estimation
86 -- 88Dominik Danner, Hermann de Meer. State Estimation in the Power Distribution System
89 -- 91Benoît Vinot, Florent Cadoux, Nicolas Gast. Congestion Avoidance in Low-Voltage Networks by using the Advanced Metering Infrastructure
92 -- 0Yujie Tang, Emiliano Dall'Anese, Andrey Bernstein, Steven H. Low. A Primal-Dual Gradient Method for Time-Varying Optimization with Application to Power Systems
93 -- 95Nader Alagha. Satellite Air Interface Evolutions in the 5G and IoT Era
96 -- 97Maria Rita Palattella, Ridha Soua, André Stemper, Thomas Engel 0001. Aggregation of MQTT Topics over Integrated Satellite-Terrestrial Networks
98 -- 99Doanh Kim Luong, Muhammad Ali, Fouad Benamrane, Ibrahim Ammar, Yim-Fun Hu. Seamless handover for video streaming over an SDN-based Aeronautical Communications Network
100 -- 103J. Bas, M. Caus, A. Perez, R. Soleymani, Nazli Ahmad Khan Beigi. Interference Management Schemes for High Spectral Efficiency Satellite Communications
104 -- 107Julio A. Medina-Caballero, M. Angeles Vazquez-Castro. Link Quality Optimization for Hybrid LEO-GSO Systems
108 -- 111Philip Michael Asuquo, Haitham S. Cruickshank, Chibueze P. Anyigor Ogah. Securing Emergency Communications for the Next-Generation Networks: Performance Analysis of Distributed Trust Computing for Future Emergency Communications
112 -- 0Nicolas Kuhn. Research trends in SATCOM
113 -- 0Aad van Moorsel. Benchmarks and Models for Blockchain: Consensus Algorithms
114 -- 117Eitan Altman, Alexandre Reiffers, Daniel Sadoc Menasché, Mandar Datar, Swapnil Dhamal, Corinne Touati. Mining competition in a multi-cryptocurrency ecosystem at the network edge: a congestion game approach
118 -- 121Manuel Zander, Tom Waite, Dominik Harz. DAGsim: Simulation of DAG-based distributed ledger protocols
122 -- 125Saulo Ricci, Eduardo Ferreira, Daniel Sadoc Menasche, Artur Ziviani, José Eduardo de Souza, Alex Borges Vieira. Learning Blockchain Delays: A Queueing Theory Approach
126 -- 0Cyril Grunspan, Ricardo Pérez-Marco. On profitability of block withholding strategies
127 -- 130Francesco Bruschi, Vincenzo Rana, Lorenzo Gentile, Donatella Sciuto. Mine with it or sell it: the superhashing power dilemma
131 -- 134Nico Smuts. What Drives Cryptocurrency Prices?: An Investigation of Google Trends and Telegram Sentiment
135 -- 138Maher Alharby, Aad van Moorsel. BlockSim: A Simulation Framework for Blockchain Systems
139 -- 142Vladyslav Fedchenko, Giovanni Neglia, Bruno Ribeiro 0001. Feedforward Neural Networks for Caching: n Enough or Too Much?
143 -- 146Martino Trevisan, Idilio Drago. Robust URL Classification With Generative Adversarial Networks
147 -- 150Gonzalo Marín, Pedro Casas, Germán Capdehourat. DeepSec meets RawPower - Deep Learning for Detection of Network Attacks Using Raw Representations
151 -- 154Michal Piskozub, Riccardo Spolaor, Ivan Martinovic. MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features
155 -- 158Sarah Wassermann, Nikolas Wehner, Pedro Casas. Machine Learning Models for YouTube QoE and User Engagement Prediction in Smartphones
159 -- 162Gaetano Manzo, Juan Sebastian Otálora Montenegro, Marco Ajmone Marsan, Gianluca Rizzo. A Deep Learning Strategy for Vehicular Floating Content Management
163 -- 166Rui Li, Chaoyun Zhang, Paul Patras, Razvan Stanica, Fabrice Valois. Learning Driven Mobility Control of Airborne Base Stations in Emergency Networks
167 -- 170Johan Garcia, Topi Korhonen. On Runtime and Classification Performance of the Discretize-Optimize (DISCO) Classification Approach
171 -- 174Manjesh K. Hanawal, Sumit Jagdish Darak. Distributed Learning in Ad-Hoc Networks with Unknown Number of Players

Volume 46, Issue 2

2 -- 0Mark S. Squillante. Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2018)
3 -- 5Hong Xie 0004, John C. S. Lui. A Markov Decision Process Approach to Analyze Discount & Reputation Trade-offs in E-commerce Systems
6 -- 8Yudong Yang, Vishal Misra, Dan Rubenstein. A Modeling Approach to Classifying Malicious Cloud Users via Shuffling
9 -- 11Isaac Grosof, Ziv Scully, Mor Harchol-Balter. SRPT for Multiserver Systems
12 -- 14Yorie Nakahira, Andrés Ferragut, Adam Wierman. Minimal-variance distributed scheduling under strict demands and deadlines
15 -- 17Xin Liu, Lei Ying. A Simple Steady-State Analysis of Load Balancing Algorithms in the Sub-Halfin-Whitt Regime
18 -- 20Debankur Mukherjee, Alexander L. Stolyar. Join-Idle-Queue with Service Elasticity
21 -- 23Xiao Sun, Tan N. Le, Mosharaf Chowdhury, Zhenhua Liu. Fair Allocation of Heterogeneous and InterchangeableResources
24 -- 26Urtzi Ayesta. On redundancy-d with cancel-on-start a.k.a Join-shortest-work (d)
27 -- 29Nitish K. Panigrahy, Prithwish Basu, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung. A queueing-theoretic model for resource allocation in one-dimensional distributed analytics network?
30 -- 32Nicolas Gast, Diego Latella, Mieke Massink. A Refined Mean Field Approximation for Synchronous Population Processes
33 -- 35Seva Shneer, Alexander L. Stolyar. Stability of a standard decentralised medium access
36 -- 38Anirudh Sabnis, Ramesh K. Sitaraman, Donald F. Towsley. OCCAM: An Optimization Based Approach to Network Inference
39 -- 41Junjie Qin, Ram Rajagopal, Shai Vardi, Adam Wierman. Convex Prophet Inequalities
42 -- 44Gautam Goel. Smoothed Online Convex Optimization via Online Balanced Descent
45 -- 47Soumyadip Ghosh, Mark S. Squillante, Ebisa D. Wollega. On Min-Max Optimization Over Large Data Sets
48 -- 49My T. Thai, Arunabha Sen, Arun Das. ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security
50 -- 51Saleh Soltan, Mihalis Yannakakis, Gil Zussman. REACT to Cyber-Physical Attacks on Power grids (Extended Abstract)
52 -- 56Linan Huang, Quanyan Zhu. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks
57 -- 61Linqi Guo, Chen Liang, Alessandro Zocca, Steven H. Low, Adam Wierman. Failure Localization in Power Systems via Tree Partitions
62 -- 66Jorik Oostenbrink, Fernando A. Kuipers, Poul E. Heegaard, Bjarne E. Helvik. Evaluating Local Disaster Recovery Strategies
67 -- 71Hana Khamfroush, Samuel Lofumbwa Iloo, Mahshid Rahnamay-Naeini. Vulnerability of Interdependent Infrastructures Under Random Attacks
72 -- 75Andjelka Kelic. Cyber Risk in Critical Infrastructure
76 -- 0Zhenhua Liu, Ganesh Ananthanarayanan. Special Issue on the Work-in-Progress (WIP) session at the ACM SIGMETRICS 2018 Conference
77 -- 78Tan N. Le, Xiao Sun, Mosharaf Chowdhury, Zhenhua Liu. BoPF: Mitigating the Burstiness-Fairness Tradeoff in Multi-Resource Clusters
79 -- 80Linqi Guo, Chen Liang, Alessandro Zocca, Steven H. Low, Adam Wierman. Failure Localization in Power Systems via Tree Partitions
81 -- 82Daniela Hurtado-Lange, Siva Theja Maguluri. A Novel View of the Drift: Method for Heavy Traffic Limits of Queueing Systems
83 -- 84Yichen Ruan, Carlee Joe-Wong. On the Economic Value of Vehicular Caching
85 -- 86Junjie Qin, Ram Rajagopal, Shai Vardi, Adam Wierman. Convex Prophet Inequalities
87 -- 88Tan N. Le, Xiao Sun, Mosharaf Chowdhury, Zhenhua Liu. AlloX: Allocation across Computing Resources for Hybrid CPU/GPU clusters
89 -- 90Jinhang Zuo, Xiaoxi Zhang, Carlee Joe-Wong. Observe Before Play: Multi-armed Bandit with Pre-Observations
91 -- 92Justin Wang, Benjamin Berg, Daniel S. Berger, Siddhartha Sen 0001. Maximizing Page-Level Cache Hit Ratios in LargeWeb Services
93 -- 94Zhihui Shao, Mohammad A. Islam 0001, Shaolei Ren. A First Look at Thermal Attacks in Multi-Tenant Data Centers
95 -- 96Shan-Hsiang Shen. An Efficient Network Monitor for SDN Networks