Abstract is missing.
- Performance of random medium access control, an asymptotic approachCharles Bordenave, David McDonald, Alexandre Proutiere. 1-12 [doi]
- Bound analysis of closed queueing networks with workload burstinessGiuliano Casale, Ningfang Mi, Evgenia Smirni. 13-24 [doi]
- Scheduling despite inexact job-size informationAdam Wierman, Misja Nuyens. 25-36 [doi]
- Network externalities and the deployment of security features and protocols in the internetMarc Lelarge, Jean Bolot. 37-48 [doi]
- The delay-friendliness of TCPEli Brosh, Salman Baset, Dan Rubenstein, Henning Schulzrinne. 49-60 [doi]
- Scalable VPN routing via relayingChanghoon Kim, Alexandre Gerber, Carsten Lund, Dan Pei, Subhabrata Sen. 61-72 [doi]
- Hierarchical routing over dynamic wireless networksDominique Tschopp, Suhas N. Diggavi, Matthias Grossglauser. 73-84 [doi]
- Loss-aware network coding for unicast wireless sessions: design, implementation, and performance evaluationShravan K. Rayanchu, Sayandeep Sen, Jianming Wu, Suman Banerjee, Sudipta Sengupta. 85-96 [doi]
- Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronizationThomas Schmid, Zainul Charbiwala, Jonathan Friedman, Young H. Cho, Mani B. Srivastava. 97-108 [doi]
- Confident estimation for multistage measurement sampling and aggregationEdith Cohen, Nick G. Duffield, Carsten Lund, Mikkel Thorup. 109-120 [doi]
- Counter braids: a novel counter architecture for per-flow measurementYi Lu, Andrea Montanari, Balaji Prabhakar, Sarang Dharmapurikar, Abdul Kabbani. 121-132 [doi]
- Tracking in a spaghetti bowl: monitoring transactions using footprintsAnimashree Anandkumar, Chatschik Bisdikian, Dakshi Agrawal. 133-144 [doi]
- Optimal sampling in state space models with applications to network monitoringHarsh Singhal, George Michailidis. 145-156 [doi]
- On the design of hybrid peer-to-peer systemsStratis Ioannidis, Peter Marbach. 157-168 [doi]
- Utility maximization in peer-to-peer systemsMinghua Chen, Miroslav Ponec, Sudipta Sengupta, Jin Li, Philip A. Chou. 169-180 [doi]
- A queueing system for modeling a file sharing principleFlorian Simatos, Philippe Robert, Fabrice Guillemin. 181-192 [doi]
- Path-quality monitoring in the presence of adversariesSharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford. 193-204 [doi]
- Densification arising from sampling fixed graphsPedram Pedarsani, Daniel R. Figueiredo, Matthias Grossglauser. 205-216 [doi]
- In search of the elusive ground truth: the internet s as-level connectivity structureRicardo V. Oliveira, Dan Pei, Walter Willinger, Beichuan Zhang, Lixia Zhang. 217-228 [doi]
- HMTT: a platform independent full-system memory trace monitoring systemYungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianping Fan, Qingbo Yuan, Bo Song, Jianwei Xu. 229-240 [doi]
- Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systemsIlias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos Eleftheriou. 241-252 [doi]
- Ironmodel: robust performance models in the wildEno Thereska, Gregory R. Ganger. 253-264 [doi]
- Xengine: a fast and scalable XACML policy evaluation engineAlex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie. 265-276 [doi]
- DARC: dynamic analysis of root causes of latency distributionsAvishay Traeger, Ivan Deras, Erez Zadok. 277-288 [doi]
- QDSL: a queuing model for systems with differential service levelsShiva Chaitanya, Bhuvan Urgaonkar, Anand Sivasubramaniam. 289-300 [doi]
- Analysis of bittorrent-like protocols for on-demand stored media streamingNadim Parvez, Carey L. Williamson, Anirban Mahanti, Niklas Carlsson. 301-312 [doi]
- Performance bounds for peer-assisted live streamingShao Liu, Rui Zhang-Shen, Wenjie Jiang, Jennifer Rexford, Mung Chiang. 313-324 [doi]
- Epidemic live streaming: optimal performance trade-offsThomas Bonald, Laurent Massoulié, Fabien Mathieu, Diego Perino, Andrew Twigg. 325-336 [doi]
- Software thermal management of dram memory for multicore systemsJiang Lin, Hongzhong Zheng, Zhichun Zhu, Eugene Gorbatov, Howard David, Zhao Zhang. 337-348 [doi]
- Noncooperative power control and transmission scheduling in wireless collision channelsIshai Menache, Nahum Shimkin. 349-358 [doi]
- Software-directed combined cpu/link voltage scaling fornoc-based cmpsMahmut T. Kandemir, Ozcan Ozturk. 359-370 [doi]
- Interaction-aware energy management for wireless network cardsIgor Crk, Mingsong Bi, Chris Gniady. 371-382 [doi]
- Fully decentralized emulation of best-effort and processor sharing queuesRade Stanojevic, Robert Shorten. 383-394 [doi]
- Optimal delay scheduling in networks with arbitrary constraintsSrikanth Jagabathula, Devavrat Shah. 395-406 [doi]
- Revisiting stochastic loss networks: structures and algorithmsKyomin Jung, Yingdong Lu, Devavrat Shah, Mayank Sharma, Mark S. Squillante. 407-418 [doi]
- Traffic capacity of multi-cell WLANSThomas Bonald, Ali Ibrahim, James Roberts. 419-430 [doi]
- Relative competitiveness of cache replacement policiesJan Reineke, Daniel Grund. 431-432 [doi]
- Network distance estimation with dynamic landmark trianglesZhihua Wen, Michael Rabinovich. 433-434 [doi]
- Class-of-service in ip backbones: informing the network neutrality debateMurat Yuksel, Kadangode K. Ramakrishnan, Shivkumar Kalyanaraman, Joseph D. Houle, Rita Sadhvani. 435-436 [doi]
- Predicting the resource consumption of network intrusion detection systemsHolger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer. 437-438 [doi]
- Efficient mart-aided modeling for microarchitecture design space exploration and performance predictionBin Li, Lu Peng, Balachandran Ramadass. 439-440 [doi]
- Combined intra- and inter-domain traffic engineering using hot-potato aware link weights optimizationSimon Balon, Guy Leduc. 441-442 [doi]
- Modeling directionality in wireless networks: extended abstractEric W. Anderson, Caleb T. Phillips, Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker. 443-444 [doi]
- Layered interval codes for tcam-based classificationAnat Bremler-Barr, David Hay, Danny Hendler, Boris Farber. 445-446 [doi]
- Durability of replicated distributed storage systemsSriram Ramabhadran, Joseph Pasquale. 447-448 [doi]
- Implementation and evaluation of a migration-based NUCA design for chip multiprocessorsFeihui Li, Mahmut T. Kandemir, Mary Jane Irwin. 449-450 [doi]
- M/G/1 queue with repeated inhomogeneous vacations applied to ieee 802.16e power savingSara Alouf, Eitan Altman, Amar Prakash Azad. 451-452 [doi]
- Managing inter-domain traffic in the presence of bittorrent file-sharingSrinivasan Seetharaman, Mostafa H. Ammar. 453-454 [doi]
- Clock offset estimation using collaborative one-way transit timeEdmar Mota-Garcia, Rogelio Hasimoto-Beltran. 455-456 [doi]
- Scheduling with queue length guarantees for shared resource systemsGagan Raj Gupta, Ness B. Shroff. 457-458 [doi]
- Estimating cardinality distributions in network traffic: extended abstractAiyou Chen, Li Li, Jin Cao. 459-460 [doi]
- Weighted fair sharing for dynamic virtual clustersLaura E. Grit, Jeffrey S. Chase. 461-462 [doi]
- Exploring the throughput-fairness tradeoff of deadline scheduling in heterogeneous computing environmentsVasumathi Sundaram, Abhishek Chandra, Jon B. Weissman. 463-464 [doi]
- Characterizing multiparty voice communication for multiplayer gamesGabor Papp, Chris GauthierDickey. 465-466 [doi]
- Algorithmic approaches to redesigning tcam-based systemsChad R. Meiners, Alex X. Liu, Eric Torng. 467-468 [doi]
- Performance analysis in the real worldJohn R. Douceur. 469-470 [doi]