Abstract is missing.
- Performance implications of flash and storage class memoriesNaresh M. Patel. 1-2 [doi]
- High-performance computing in mobile servicesZhen Liu. 3-4 [doi]
- Delay tails in MapReduce schedulingJian Tan, Xiaoqiao Meng, Li Zhang. 5-16 [doi]
- Optimal queue-size scaling in switched networksDevavrat Shah, Neil Walton, Yuan Zhong. 17-28 [doi]
- Minimizing slowdown in heterogeneous size-aware dispatching systemsEsa Hyytiä, Samuli Aalto, Aleksi Penttinen. 29-40 [doi]
- Bipartite graph structures for efficient balancing of heterogeneous loadsMathieu Leconte, Marc Lelarge, Laurent Massoulié. 41-52 [doi]
- Workload analysis of a large-scale key-value storeBerk Atikoglu, Yuehai Xu, Eitan Frachtenberg, Song Jiang, Mike Paleczny. 53-64 [doi]
- A first look at cellular machine-to-machine traffic: large scale measurement and characterizationMuhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang. 65-76 [doi]
- Bundling practice in BitTorrent: what, how, and whyJinyoung Han, Seungbae Kim, Taejoong Chung, Ted Taekyoung Kwon, Hyunchul Kim, Yanghee Choi. 77-88 [doi]
- Energy-efficient congestion controlLingwen Gan, Anwar Walid, Steven H. Low. 89-100 [doi]
- Uniform approximation of the distribution for the number of retransmissions of bounded documentsPredrag R. Jelenkovic, Evangelia D. Skiani. 101-112 [doi]
- Fluid limit of an asynchronous optical packet switch with shared per link full range wavelength conversionBenny Van Houdt, Luca Bortolussi. 113-124 [doi]
- Towards optimal error-estimating codes through the lens of Fisher information analysisNan Hua, Ashwin Lall, Baochun Li, Jun (Jim) Xu. 125-136 [doi]
- How well can congestion pricing neutralize denial of service attacks?Ashish Vulimiri, Gul A. Agha, Philip Brighten Godfrey, Karthik Lakshminarayanan. 137-150 [doi]
- Pricing cloud bandwidth reservations under demand uncertaintyDi Niu, Chen Feng, Baochun Li. 151-162 [doi]
- Temperature management in data centers: why some (might) like it hotNosayba El-Sayed, Ioan A. Stefanovici, George Amvrosiadis, Andy A. Hwang, Bianca Schroeder. 163-174 [doi]
- Renewable and cooling aware workload management for sustainable data centersZhenhua Liu, Yuan Chen, Cullen Bash, Adam Wierman, Daniel Gmach, Zhikui Wang, Manish Marwah, Chris Hyser. 175-186 [doi]
- Energy storage in datacenters: what, where, and how much?Di Wang, Chuangang Ren, Anand Sivasubramaniam, Bhuvan Urgaonkar, Hosam Fathy. 187-198 [doi]
- Rumor centrality: a universal source detectorDevavrat Shah, Tauhid Zaman. 199-210 [doi]
- Learning the graph of epidemic cascadesPraneeth Netrapalli, Sujay Sanghavi. 211-222 [doi]
- Network forensics: random infection vs spreading epidemicChris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai. 223-234 [doi]
- What is a good buffer cache replacement scheme for mobile flash storage?Hyojun Kim, Moonkyung Ryu, Umakishore Ramachandran. 235-246 [doi]
- Versatile refresh: low complexity refresh scheduling for high-throughput multi-banked eDRAMMohammad Alizadeh, Adel Javanmard, Shang-Tse Chuang, Sundar Iyer, Yi Lu. 247-258 [doi]
- Does lean imply green?: a study of the power performance implications of Java runtime bloatSuparna Bhattacharya, Karthick Rajamani, K. Gopinath, Manish Gupta. 259-270 [doi]
- D-factor: a quantitative model of application slow-down in multi-resource shared systemsSeung-Hwan Lim, Jae-Seok Huh, Youngjae Kim, Galen M. Shipman, Chita R. Das. 271-282 [doi]
- ADP: automated diagnosis of performance pathologies using hardware eventsWucherl Yoo, Kevin Larson, Lee Baugh, Sangkyum Kim, Roy H. Campbell. 283-294 [doi]
- Providing fairness on shared-memory multiprocessors via process schedulingDi Xu, Chenggang Wu, Pen-Chung Yew, Jianjun Li, Zhenjiang Wang. 295-306 [doi]
- Characterizing continuous time random walks on time varying graphsDaniel R. Figueiredo, Philippe Nain, Bruno F. Ribeiro, Edmundo de Souza e Silva, Don Towsley. 307-318 [doi]
- Beyond random walk and metropolis-hastings samplers: why you should not backtrack for unbiased graph samplingChul-Ho Lee, Xin Xu, Do Young Eun. 319-330 [doi]
- Clustered embedding of massive social networksHan Hee Song, Berkant Savas, Tae Won Cho, Vacha Dave, Zhengdong Lu, Inderjit S. Dhillon, Yin Zhang, Lili Qiu. 331-342 [doi]
- Don't let the negatives bring you down: sampling from streams of signed updatesEdith Cohen, Graham Cormode, Nick G. Duffield. 343-354 [doi]
- Efficient rank aggregation using partial dataAmmar Ammar, Devavrat Shah. 355-366 [doi]
- Fair sampling across network flow measurementsNick G. Duffield. 367-378 [doi]
- TCAM-based NFA implementationKunyang Peng, Qunfeng Dong. 379-380 [doi]
- Stable and efficient pricing for inter-domain traffic forwardingElliot Anshelevich, Ameya Hate, Koushik Kar, Michael Usher. 381-382 [doi]
- Measuring and characterizing home networksLucas DiCioccio, Renata Teixeira, Catherine Rosenberg. 383-384 [doi]
- Comparing metro-area cellular and WiFi performance: extended abstractJoel Sommers, Paul Barford. 385-386 [doi]
- Towards a statistical characterization of the competitiveness of oblivious routingGábor Németh, Gábor Rétvári. 387-388 [doi]
- Range tomographySajjad Zarifzadeh, Madhwaraj G. K., Constantine Dovrolis. 389-390 [doi]
- A scalable architecture for maintaining packet latency measurementsMyungjin Lee, Nick G. Duffield, Ramana Rao Kompella. 391-392 [doi]
- Modeling randomness in network trafficMarkus Laner, Philipp Svoboda, Markus Rupp. 393-394 [doi]
- Performance evaluation of the random replacement policy for networks of cachesMassimo Gallo, Bruno Kauffmann, Luca Muscariello, Alain Simonian, Christian Tanguy. 395-396 [doi]
- Saving on cooling: the thermal scheduling problemKoyel Mukherjee, Samir Khuller, Amol Deshpande. 397-398 [doi]
- Congestion control meets medium access: throughput, delay, and complexityShreeshankar Bodas, Devavrat Shah, Damon Wischik. 399-400 [doi]
- Optimized cloud placement of virtual clusters using biased importance samplingAsser N. Tantawi. 401-402 [doi]
- Power and energy containers for multicore serversKai Shen, Arrvindh Shriraman, Sandhya Dwarkadas, Xiao Zhang. 403-404 [doi]
- Characterizing the impact of the workload on the value of dynamic resizing in data centersKai Wang, Minghong Lin, Florin Ciucu, Adam Wierman, Chuang Lin. 405-406 [doi]
- Provisioning for large scale cloud computing servicesYue Tan, Yingdong Lu, Cathy H. Xia. 407-408 [doi]
- Distributed wide-area traffic management for cloud servicesSrinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang. 409-410 [doi]
- On the efficacy of fine-grained traffic splitting protocols in data center networksAdvait Abhay Dixit, Pawan Prakash, Ramana Rao Kompella, Y. Charlie Hu. 411-412 [doi]
- Content-aware traffic engineeringBenjamin Frank, Ingmar Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann. 413-414 [doi]
- Understanding performance anomalies of SSDs and their impact in enterprise application environmentJian Hu, Hong Jiang, Prakash Manden. 415-416 [doi]
- Classifying internet one-way trafficEduard Glatz, Xenofontas Dimitropoulos. 417-418 [doi]
- Fast cost efficient designs by building upon the plackett and burman methodManish Arora, Feng Wang, Bob Rychlik, Dean M. Tullsen. 419-420 [doi]
- Multi-hop network tomography: path reconstruction and per-hop arrival time estimation from partial informationMatthias Keller, Jan Beutel, Lothar Thiele. 421-422 [doi]
- Smartphones vs. laptops: comparing web browsing behavior and the implications for cachingIoannis Papapanagiotou, Erich M. Nahum, Vasileios Pappas. 423-424 [doi]
- Micro and macro views of discrete-state markov models and their application to efficient simulation with phase-type distributionsPhilipp Reinecke, Miklós Telek, Katinka Wolter. 425-426 [doi]
- POTRA: a framework for building power models for next generation multicore architecturesRamon Bertran, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé. 427-428 [doi]
- Basic theory and some applications of martingalesRichard A. Hayden. 429-430 [doi]
- Applications of machine learning to performance evaluationEdmundo de Souza e Silva, Daniel Sadoc Menasché. 431-432 [doi]
- Introduction to network experiments using the GENI cyberinfrastructureJay Aikat, Kevin Jeffay. 433-434 [doi]