Abstract is missing.
- Volley: Violation Likelihood Based State Monitoring for DatacentersShicong Meng, Arun Iyengar, Isabelle Rouvellou, Ling Liu. 1-10 [doi]
- Diagnosing Data Center Behavior Flow by FlowAhsan Arefin, Vishal K. Singh, Guofei Jiang, Yueping Zhang, Cristian Lumezanu. 11-20 [doi]
- FChain: Toward Black-Box Online Fault Localization for Cloud SystemsHiep Nguyen, Zhiming Shen, Yongmin Tan, Xiaohui Gu. 21-30 [doi]
- Detecting Transient Bottlenecks in n-Tier Applications through Fine-Grained AnalysisQingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Toshihiro Shimizu, Masazumi Matsubara, Motoyuki Kawaba, Calton Pu. 31-40 [doi]
- Cache Privacy in Named-Data NetworkingGergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik. 41-51 [doi]
- Cache Topology Aware Mapping of Stream Processing Applications onto CMPsFang Zheng, Chitra Venkatramani, Rohit Wagle, Karsten Schwan. 52-61 [doi]
- Coordinating In-Network Caching in Content-Centric Networks: Model and AnalysisYanhua Li, Haiyong Xie, Yonggang Wen, Zhi-Li Zhang. 62-72 [doi]
- Proteus: Power Proportional Memory Cache Cluster in Data CentersShen Li, ShiGuang Wang, Fan Yang, Shaohan Hu, Fatemeh Saremi, Tarek F. Abdelzaher. 73-82 [doi]
- Dynamic Energy Estimation of Query Plans in Database SystemsZichen Xu, Yi-Cheng Tu, Xiaorui Wang. 83-92 [doi]
- Content-Based Scheduling of Virtual Machines (VMs) in the CloudSobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting. 93-101 [doi]
- HybridMR: A Hierarchical MapReduce Scheduler for Hybrid Data CentersBikash Sharma, Timothy Wood, Chita R. Das. 102-111 [doi]
- AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware ImmunizationZhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin. 112-123 [doi]
- Storing Shared Data on the Cloud via Security-MediatorBoyang Wang, Sherman S. M. Chow, Ming Li, Hui Li. 124-133 [doi]
- Watchmen: Scalable Cheat-Resistant Support for Distributed Multi-player Online GamesAmir Yahyavi, Kévin Huguenin, Julien Gascon-Samson, Jörg Kienzle, Bettina Kemme. 134-144 [doi]
- pVOCL: Power-Aware Dynamic Placement and Migration in Virtualized GPU EnvironmentsPalden Lama, Yan Li, Ashwin M. Aji, Pavan Balaji, James Dinan, Shucai Xiao, Yunquan Zhang, Wu-chun Feng, Rajeev Thakur, Xiaobo Zhou. 145-154 [doi]
- Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social NetworksWenjie Hu, Guohong Cao, Srikanth V. Krishnamurthy, Prasant Mohapatra. 155-164 [doi]
- Energy-Aware Web Browsing in 3G Based SmartphonesBo Zhao, Qiang Zheng, Guohong Cao, Sateesh Addepalli. 165-175 [doi]
- Datacenters as Controllable Load Resources in the Electricity MarketRui Wang, Nagarajan Kandasamy, Chika Nwankpa, David R. Kaeli. 176-185 [doi]
- A Scalable Conflict-Free Replicated Set Data TypeAndrei Deftu, Jan Griebsch. 186-195 [doi]
- No Hot Spot Non-blocking Skip ListTyler Crain, Vincent Gramoli, Michel Raynal. 196-205 [doi]
- Mindicators: A Scalable Approach to QuiescenceYujie Liu, Victor Luchangco, Michael F. Spear. 206-215 [doi]
- Non-blocking Patricia Tries with Replace OperationsNiloufar Shafiei. 216-225 [doi]
- MoLoc: On Distinguishing Fingerprint TwinsWei Sun, Junliang Liu, Chenshu Wu, Zheng Yang, Xinglin Zhang, Yunhao Liu. 226-235 [doi]
- Pilot: Passive Device-Free Indoor Localization Using Channel State InformationJiang Xiao, Kaishun Wu, Youwen Yi, Lu Wang, Lionel M. Ni. 236-245 [doi]
- Harnessing Mobile Multiple Access Efficiency with Location InputWan Du, Mo Li. 246-255 [doi]
- Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio NetworkSheng Liu, Haojin Zhu, Rong Du, Cailian Chen, Xinping Guan. 256-265 [doi]
- Achieving High-Throughput State Machine Replication in Multi-core SystemsNuno Santos, André Schiper. 266-275 [doi]
- Order-Preserving Renaming in Synchronous Systems with Byzantine FaultsOksana Denysyuk, Luís Rodrigues. 276-285 [doi]
- Hybrid Replication: State-Machine-Based and Deferred-Update Replication Schemes CombinedTadeusz Kobus, Maciej Kokocinski, Pawel T. Wojciechowski. 286-296 [doi]
- RBFT: Redundant Byzantine Fault TolerancePierre-Louis Aublin, Sonia Ben Mokhtar, Vivien Quéma. 297-306 [doi]
- Characterizing Information Diffusion in Online Social Networks with Linear Diffusive ModelFeng Wang, Haiyan Wang, Kuai Xu, Jianhong Wu, Xiaohua Jia. 307-316 [doi]
- Maximizing the Spread of Positive Influence in Online Social NetworksHuiyuan Zhang, Thang N. Dinh, My T. Thai. 317-326 [doi]
- Message in a Sealed Bottle: Privacy Preserving Friending in Social NetworksLan Zhang, Xiang-Yang Li, Yunhao Liu. 327-336 [doi]
- Gathering of Mobile Robots Tolerating Multiple Crash FaultsZohir Bouzid, Shantanu Das 0001, Sébastien Tixeuil. 337-346 [doi]
- Ring Exploration by Oblivious Agents with Local VisionAjoy Kumar Datta, Anissa Lamani, Lawrence L. Larmore, Franck Petit. 347-356 [doi]
- Zigzag: Local-Information-Based Self-Optimizing Routing in Virtual Grid NetworksShusuke Takatsu, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. 357-368 [doi]
- Distributed Ranked Data Dissemination in Social NetworksKaiwen Zhang, Mohammad Sadoghi, Vinod Muthusamy, Hans-Arno Jacobsen. 369-379 [doi]
- Optimistic Atomic MulticastCarlos Eduardo Benevides Bezerra, Fernando Pedone, Benoît Garbinato, Cláudio F. R. Geyer. 380-389 [doi]
- ImageElves: Rapid and Reliable System Updates in the CloudDeepak Jeswani, Akshat Verma, Praveen Jayachandran, Kamal Bhattacharya. 390-399 [doi]
- Dynamic Cloud Resource Reservation via Cloud BrokerageWei Wang, Di Niu, Baochun Li, Ben Liang. 400-409 [doi]
- Present or Future: Optimal Pricing for Spot InstancesPeijian Wang, Yong Qi, Dou Hui, Lei Rao, Xue Liu. 410-419 [doi]
- SmartDPSS: Cost-Minimizing Multi-source Power Supply for Datacenters with Arbitrary DemandWei Deng, Fangming Liu, Hai Jin, Chuan Wu. 420-429 [doi]
- Longer Is Better: Exploiting Path Diversity in Data Center NetworksFung Po Tso, Gregg Hamilton, Rene Weber, Colin Perkins, Dimitrios P. Pezaros. 430-439 [doi]
- Signal-Aware Green Wireless Relay Network DesignChenfei Gao, Jian Tang, Xiang-Sheng, Weiyi Zhang, Chonggang Wang. 440-449 [doi]
- Ease the Queue Oscillation: Analysis and Enhancement of DCTCPWen Chen, Peng Cheng, Fengyuan Ren, Ran Shu, Chuang Lin. 450-459 [doi]
- Ripple: Improved Architecture and Programming Model for Bulk Synchronous Parallel Style of AnalyticsMike Spreitzer, Malgorzata Steinder, Ian Whalley. 460-469 [doi]
- Efficient Geo-distributed Data Processing with RoutChamikara Jayalath, Patrick Eugster. 470-480 [doi]
- Towards an Efficient Online Causal-Event-Pattern-Matching FrameworkSukanta Pramanik, David Taylor, Bernard Wong. 481-490 [doi]
- S3: Characterizing Sociality for User-Friendly Steady Load Balancing in Enterprise WLANsChaoqun Yue, Guangtao Xue, Hongzi Zhu, Jiadi Yu, Minglu Li. 491-499 [doi]
- On Server Provisioning for Distributed Interactive ApplicationsHanying Zheng, Xueyan Tang. 500-509 [doi]
- Harmony: Dynamic Heterogeneity-Aware Resource Provisioning in the CloudQi Zhang, Mohamed Faten Zhani, Raouf Boutaba, Joseph L. Hellerstein. 510-519 [doi]
- RAC: A Freerider-Resilient, Scalable, Anonymous Communication ProtocolSonia Ben Mokhtar, Gautier Berthou, Amadou Diarra, Vivien Quéma, Ali Shoker. 520-529 [doi]
- Recursive Fact-Finding: A Streaming Approach to Truth Estimation in Crowdsourcing ApplicationsDong Wang, Tarek F. Abdelzaher, Lance M. Kaplan, Charu C. Aggarwal. 530-539 [doi]
- Least Cost Rumor Blocking in Social NetworksLidan Fan, Zaixin Lu, Weili Wu, Bhavani M. Thuraisingham, Huan Ma, Yuanjun Bi. 540-549 [doi]
- Identifying and Addressing Protocol Manipulation Attacks in "Secure" BGPYang Song, Arun Venkataramani, Lixin Gao. 550-559 [doi]
- A Formal Framework for Network Security Design SynthesisMohammad Ashiqur Rahman, Ehab Al-Shaer. 560-570 [doi]
- Peer Pressure: Exerting Malicious Influence on Routers at a DistanceMax Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim. 571-580 [doi]
- Efficient Identification of Additive Link Metrics via Network TomographyLiang Ma, Ting He, Kin K. Leung, Don Towsley, Ananthram Swami. 581-590 [doi]
- On the k-Atomicity-Verification ProblemWojciech M. Golab, Jeremy Hurwitz, Xiaozhou Li. 591-600 [doi]
- Safety of Deferred Update in Transactional MemoryHagit Attiya, Sandeep Hans, Petr Kuznetsov, Srivatsan Ravi. 601-610 [doi]
- Parallel Consensus is Harder than Set Agreement in Message PassingZohir Bouzid, Corentin Travers. 611-620 [doi]