Abstract is missing.
- EntomoModel: Understanding and Avoiding Performance Anomaly ManifestationsChristopher Stewart, Kai Shen, Arun Iyengar, Jian Yin. 3-13 [doi]
- Exploiting Concurrency to Improve Latency and throughput in a Hybrid Storage SystemXiaoJian Wu, A. L. Narasimha Reddy. 14-23 [doi]
- PAC: Pattern-driven Application Consolidation for Efficient Cloud ComputingZhenhuan Gong, Xiaohui Gu. 24-33 [doi]
- Predicting the Performance of Virtual Machine MigrationSherif Akoush, Ripduman Sohan, Andrew Rice, Andrew W. Moore, Andy Hopper. 37-46 [doi]
- Distributed Routing for Vehicular Ad Hoc Networks: Throughput-Delay TradeoffAli Abedi, Majid Ghaderi, Carey L. Williamson. 47-56 [doi]
- DiffECC: Improving SSD Read Performance Using Differentiated Error Correction Coding SchemesGuanying Wu, Xubin He, Ningde Xie, Tong Zhang. 57-66 [doi]
- PUD-LRU: An Erase-Efficient Write Buffer Management Algorithm for Flash Memory SSDJian Hu, Hong Jiang, Lei Tian, Lei Xu. 69-78 [doi]
- Effect of Replica Placement on the Reliability of Large-Scale Data Storage SystemsVinodh Venkatesan, Ilias Iliadis, Xiao-Yu Hu, Robert Haas, Christina Fragouli. 79-88 [doi]
- Sequential Prefetch Cache Sizing for Maximal Hit RateSwapnil Bhatia, Elizabeth Varki, Arif Merchant. 89-98 [doi]
- RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size StorageAntonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos. 101-110 [doi]
- Profit Allocation in Coalitional VoD ServiceNoriaki Kamiyama, Ryoichi Kawahara, Haruhisa Hasegawa. 111-120 [doi]
- Fair Allocation of Substrate Resources among Multiple Overlay NetworksMehmet Demirci, Mostafa H. Ammar. 121-130 [doi]
- On Predictability of System Anomalies in Real WorldYongmin Tan, Xiaohui Gu. 133-140 [doi]
- On the Relevance of Social Information to Opportunistic ForwardingAbderrahmen Mtibaa, Martin May, Mostafa H. Ammar. 141-150 [doi]
- Autonomic Provisioning with Self-Adaptive Neural Fuzzy Control for End-to-end Delay GuaranteePalden Lama, Xiaobo Zhou. 151-160 [doi]
- Cluster-Based Correlated Data Gathering in Wireless Sensor NetworksAli Dabirmoghaddam, Majid Ghaderi, Carey L. Williamson. 163-171 [doi]
- Expanding the Event Horizon in Parallelized Network SimulationsGeorg Kunz, Olaf Landsiedel, Stefan Götz, Klaus Wehrle, James Gross, Farshad Naghibi. 172-181 [doi]
- Analytical Modelling and Message Delay Performance Evaluation of the IEEE 802.16 MAC ProtocolLuis F. M. de Moraes, Danielle Lopes F. G. Vieira. 182-190 [doi]
- Efficient Discovery of Loop Nests in Execution TracesQiang Xu, Jaspal Subhlok, Nathaniel Hammen. 193-202 [doi]
- Timing Accurate Functional-Level Hardware Simulation with Pull Model Data FlowGeorge F. Riley, Elizabeth Whitaker Lynch. 203-210 [doi]
- A Simulation Framework for the Analysis of the TLB Behavior in Virtualized EnvironmentsGirish Venkatasubramanian, Renato J. O. Figueiredo, Ramesh Illikkal, Donald Newell. 211-221 [doi]
- A Case for Robust Semi-ExperimentsHimanshu Gupta, Vinay J. Ribeiro, Anirban Mahanti. 225-234 [doi]
- Performance of Quantized Congestion Notification in TCP Incast Scenarios of Data CentersPrajjwal Devkota, A. L. Narasimha Reddy. 235-243 [doi]
- Measurement-Based Analysis of Head-of-Line Blocking for SIP over TCPMarco Happenhofer, Peter Reichl. 244-253 [doi]
- Decision Model for Cloud Computing under SLA ConstraintsArtur Andrzejak, Derrick Kondo, Sangho Yi. 257-266 [doi]
- Clasas: A Key-Store for the CloudS. J. Thomas Schwarz, Darrell D. E. Long. 267-276 [doi]
- Profit-Aware Server Allocation for Green Internet ServicesMichele Mazzucco, Dmytro Dyachuk, Marios D. Dikaiakos. 277-284 [doi]
- Frequency Based Chunking for Data De-DuplicationGuanlin Lu, Yu Jin, David H. C. Du. 287-296 [doi]
- Examining Energy Use in Heterogeneous Archival Storage SystemsIan F. Adams, Ethan L. Miller, Mark W. Storer. 297-306 [doi]
- Modeling the Run-time Behavior of Transactional MemoryZhengyu He, Bo Hong. 307-315 [doi]
- Autonomic Log/Restore for Advanced Optimistic Simulation SystemsRoberto Vitali, Alessandro Pellegrini, Francesco Quaglia. 319-327 [doi]
- OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR DeploymentsPrasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok Krishnamurthy. 328-337 [doi]
- Content Delivery Using Replicated Digital FountainsNiklas Carlsson, Derek L. Eager. 338-348 [doi]
- Barra: A Parallel Functional Simulator for GPGPUSylvain Collange, Marc Daumas, David Defour, David Parello. 351-360 [doi]
- Automatic Derivation of Performance Prediction Models for Load-balancing Properties Based on Goal-oriented MeasurementsMichael Hauck, Jens Happe, Ralf H. Reussner. 361-369 [doi]
- CantorSim: Simplifying Acceleration of Micro-architecture SimulationsZhibin Yu, Hai Jin, Jian Chen, Lizy K. John. 370-377 [doi]
- An Adaptive and Energy-efficient Routing Protocol Based on Machine Learning for Underwater Delay Tolerant NetworksTiansi Hu, Yunsi Fei. 381-384 [doi]
- An Analytical Model with Improved Accuracy of IEEE 802.11 Protocol Under Unsaturated ConditionsKumaran Vijayasankar, Azar Taufique, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli. 385-387 [doi]
- aSHIIP: Autonomous Generator of Random Internet-like Topologies with Inter-domain HierarchyJoanna Tomasik, Marc-Antoine Weisser. 388-390 [doi]
- Black-Box Performance Modeling for Solid-State DrivesShan Li, H. Howie Huang. 391-393 [doi]
- Composite Pseudo-Associative Cache for Mobile ProcessorsLakshmi Deepika Bobbala, Javier Salvatierra, Byeong Kil Lee. 394-396 [doi]
- Content Retrieval Delay Driven by Caching Policy and Source SelectionMathias Björkqvist, Lydia Y. Chen. 397-399 [doi]
- Design of New Aggregation Techniques for Wireless Sensor NetworksDavid Fotue, Foued Melakessou, Thomas Engel, Houda Labiod. 400-402 [doi]
- Dynamic Load Balancing Multipathing in Data Center EthernetYang Yu, Khin Mi Mi Aung, Edmund Kheng Kiat Tong, Chuan Heng Foh. 403-406 [doi]
- Efficient Storage Management for Object-based Flash MemoryYangwook Kang, Jingpei Yang, Ethan L. Miller. 407-409 [doi]
- Efficient Web Requests Scheduling Considering Resources SharingSimon Duquennoy, Gilles Grimaud. 410-412 [doi]
- Element Based Semantics in Multi Formalism Performance ModelsMauro Iacono, Marco Gribaudo. 413-416 [doi]
- Fountains vs Torrents: The P2P ToroVerde ProtocolA. Magnetto, Salvatore Spoto, Rossano Gaeta, Marco Grangetto, Matteo Sereno. 417-420 [doi]
- Impact of Deployment Point Arrangement on Intrusion Detection in Wireless Sensor NetworksYun Wang, Zhengdong Lun. 421-423 [doi]
- Integrated Monitoring and Control for Performance Management of Distributed Enterprise SystemsRajat Mehrotra, Abhishek Dubey, Sherif Abdelwahed, Asser N. Tantawi. 424-426 [doi]
- A Model-Driven Tool for Telecom Service Development ProcessAnkit Ahuja, Jacques Simonin, Rémi Nedelec. 427-429 [doi]
- Modeling and Evaluation of Control Flow Vulnerability in the Embedded SystemMohammad Abdur Rouf, Soontae Kim. 430-433 [doi]
- Multi-level Crypto Disk: Secondary Storage with Flexible Performance Versus Security Trade-offsShiva Chaitanya, Bhuvan Urgaonkar, Anand Sivasubramaniam. 434-436 [doi]
- New Algorithms for File System Cooperative CachingEric Anderson, Christopher Hoover, Xiaozhou Li. 437-440 [doi]
- Impediments to Analytical Modeling of Multi-Tiered Web ApplicationsNilabja Roy, Aniruddha S. Gokhale, Larry W. Dowdy. 441-443 [doi]
- On the Universal Generation of Mobility ModelsAlberto Medina, Gonca Gursun, Prithwish Basu, Ibrahim Matta. 444-446 [doi]
- Performance Analysis of Selected Error Control Protocols in Wireless Multimedia Sensor NetworksM. Yousof Naderi, Hamid R. Rabiee, Mohammad Khansari. 447-450 [doi]
- Effective Quality of Service Differentiation for Real-world Storage SystemsRui Zhang, David D. Chambliss, Prashant Pandey, William Shearman, Juan Ruiz, Yan Xu, Joseph Hyde. 451-454 [doi]
- Reinventing Lock Modeling for Multi-Core SystemsYan Cui, Weiyi Wu, Yingxin Wang, Xufeng Guo, Yu Chen, Yuanchun Shi. 455-457 [doi]
- A Symbolic Reachability Graph and Associated Markov Process for a Class of Dynamic Petri NetsLorenzo Capra. 458-461 [doi]
- Towards Collaborative Research and Education in Computer Architecture with the Archer SystemGirish Venkatasubramanian, David Isaac Wolinsky, Renato J. O. Figueiredo. 462-464 [doi]
- Trust Mechanisms for Efficiency Improvement in Collaborative Working EnvironmentsXingyu Zheng, Patrick Maillé, Cam Tu Phan Le, Stephane Morucci Swid. 465-467 [doi]