Abstract is missing.
- Efficient control of epidemics over random networksMarc Lelarge. 1-12 [doi]
- Botnet spam campaigns can be long lasting: evidence, implications, and analysisAbhinav Pathak, Feng Qian, Y. Charlie Hu, Zhuoqing Morley Mao, Supranamaya Ranjan. 13-24 [doi]
- Inferring undesirable behavior from P2P traffic analysisRuben Torres, Mohammad Y. Hajjat, Sanjay G. Rao, Marco Mellia, Maurizio M. Munafò. 25-36 [doi]
- Redundancy in network traffic: findings and implicationsAshok Anand, Chitra Muthukrishnan, Aditya Akella, Ramachandran Ramjee. 37-48 [doi]
- Unveiling core network-wide communication patterns through application traffic activity graph decompositionYu Jin, Esam Sharafuddin, Zhi-Li Zhang. 49-60 [doi]
- On the treeness of internet latency and bandwidthVenugopalan Ramasubramanian, Dahlia Malkhi, Fabian Kuhn, Mahesh Balakrishnan, Archit Gupta, Aditya Akella. 61-72 [doi]
- Topological transformation approaches to optimizing TCAM-based packet classification systemsChad R. Meiners, Alex X. Liu, Eric Torng. 73-84 [doi]
- Reference-driven performance anomaly identificationKai Shen, Christopher Stewart, Chuanpeng Li, Xin Li. 85-96 [doi]
- Node weighted schedulingGagan Raj Gupta, Sujay Sanghavi, Ness B. Shroff. 97-108 [doi]
- The age of gossip: spatial mean field regimeAugustin Chaintreau, Jean-Yves Le Boudec, Nikodin Ristanovic. 109-120 [doi]
- Scheduling in multi-channel wireless networks: rate function optimality in the small-buffer regimeShreeshankar Bodas, Sanjay Shakkottai, Lei Ying, R. Srikant. 121-132 [doi]
- Network adiabatic theorem: an efficient randomized protocol for contention resolutionShreevatsa Rajagopalan, Devavrat Shah, Jinwoo Shin. 133-144 [doi]
- Dynamic data compression in multi-hop wireless networksAbhishek Sharma, Leana Golubchik, Ramesh Govindan, Michael J. Neely. 145-156 [doi]
- Optimal power allocation in server farmsAnshul Gandhi, Mor Harchol-Balter, Rajarshi Das, Charles Lefurgy. 157-168 [doi]
- Evaluating the impact of job scheduling and power management on processor lifetime for chip multiprocessorsAyse Kivilcim Coskun, Richard Strong, Dean M. Tullsen, Tajana Simunic Rosing. 169-180 [doi]
- Understanding intrinsic characteristics and system implications of flash memory based solid state drivesFeng Chen, David A. Koufaty, Xiaodong Zhang. 181-192 [doi]
- DRAM errors in the wild: a large-scale field studyBianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber. 193-204 [doi]
- Restrained utilization of idleness for transparent scheduling of background tasksNingfang Mi, Alma Riska, Xin Li, Evgenia Smirni, Erik Riedel. 205-216 [doi]
- Neighbor-specific BGP: more flexible routing policies while improving global stabilityYi Wang, Michael Schapira, Jennifer Rexford. 217-228 [doi]
- Delay tolerant bulk data transfers on the internetNikolaos Laoutaris, Georgios Smaragdakis, Pablo Rodriguez, Ravi Sundaram. 229-238 [doi]
- Cooperative content distribution and traffic engineering in an ISP networkWenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang. 239-250 [doi]
- Leveraging discarded samples for tighter estimation of multiple-set aggregatesEdith Cohen, Haim Kaplan. 251-262 [doi]
- Maximum likelihood estimation of the flow size distribution tail index from sampled packet dataPatrick Loiseau, Paulo Gonçalves, Stéphane Girard, Florence Forbes, Pascale Vicat-Blanc Primet. 263-274 [doi]
- Modeling channel popularity dynamics in a large IPTV systemTongqing Qiu, Zihui Ge, Seungjoon Lee, Jia Wang, Qi Zhao, Jun Xu. 275-286 [doi]
- Surprising results on task assignment in server farms with high-variability workloadsMor Harchol-Balter, Alan Scheller-Wolf, Andrew R. Young. 287-298 [doi]
- MapReduce optimization using regulated dynamic prioritizationThomas Sandholm, Kevin Lai. 299-310 [doi]
- Self-adaptive admission control policies for resource-sharing systemsVarun Gupta, Mor Harchol-Balter. 311-322 [doi]