Abstract is missing.
- Rumor source detection with multiple observations: fundamental limits and algorithmsZhaoxu Wang, Wenxiang Dong, Wenyi Zhang, Chee-Wei Tan. 1-13 [doi]
- Collecting, organizing, and sharing pins in pinterest: interest-driven or social-driven?Jinyoung Han, Daejin Choi, Byung-Gon Chun, Ted Taekyoung Kwon, Hyunchul Kim, Yanghee Choi. 15-27 [doi]
- Jointly clustering rows and columns of binary matrices: algorithms and trade-offsJiaming Xu, Rui Wu, Kai Zhu, Bruce Hajek, R. Srikant, Lei Ying. 29-41 [doi]
- Filter & follow: how social media foster content curationAvner May, Augustin Chaintreau, Nitish Korula, Silvio Lattanzi. 43-55 [doi]
- Privacy tradeoffs in predictive analyticsStratis Ioannidis, Andrea Montanari, Udi Weinsberg, Smriti Bhagat, Nadia Fawaz, Nina Taft. 57-69 [doi]
- An online auction framework for dynamic resource provisioning in cloud computingWeijie Shi, Linquan Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 71-83 [doi]
- Energy procurement strategies in the presence of intermittent sourcesJayakrishnan Nair, Sachin Adlakha, Adam Wierman. 85-97 [doi]
- Randomized auction design for electricity markets between grids and microgridsLinquan Zhang, Zongpeng Li, Chuan Wu. 99-110 [doi]
- Pricing data center demand responseZhenhua Liu, Iris Liu, Steven H. Low, Adam Wierman. 111-123 [doi]
- Index policies for a multi-class queue with convex holding cost and abandonmentsMaialen Larrañaga, Urtzi Ayesta, Ina Maria Verloop. 125-137 [doi]
- Concave switching in single and multihop networksNeil Stuart Walton. 139-151 [doi]
- The power of online learning in stochastic network optimizationLongbo Huang, Xin Liu, Xiaohong Hao. 153-165 [doi]
- Is sharing with retransmissions causing instabilities?Predrag R. Jelenkovic, Evangelia D. Skiani. 167-179 [doi]
- Non-work-conserving effects in MapReduce: diffusion limit and criticalityJian Tan, Yandong Wang, Weikuan Yu, Li Zhang 0002. 181-192 [doi]
- Conquering big data with spark and BDASIon Stoica. 193 [doi]
- Hershel: single-packet os fingerprintingZain Shamsi, Ankur Nandwani, Derek Leonard, Dmitri Loguinov. 195-206 [doi]
- Noise can help: accurate and efficient per-flow latency measurement without packet probing and time stampingMuhammad Shahzad, Alex X. Liu. 207-219 [doi]
- A measurement study of google playNicolas Viennot, Edward Garcia, Jason Nieh. 221-233 [doi]
- IntroPerf: transparent context-sensitive multi-layer performance inference using system stack tracesChung Hwan Kim, Junghwan Rhee, Hui Zhang 0002, Nipun Arora, Guofei Jiang, Xiangyu Zhang, Dongyan Xu. 235-247 [doi]
- Non-intrusive, out-of-band and out-of-the-box systems monitoring in the cloudSahil Suneja, Canturk Isci, Vasanth Bala, Eyal de Lara, Todd W. Mummert. 249-261 [doi]
- The behavior of epidemics under bounded susceptibilitySubhashini Krishnasamy, Siddhartha Banerjee, Sanjay Shakkottai. 263-275 [doi]
- Studying social networks at scale: macroscopic anatomy of the twitter social graphMaksym Gabielkov, Ashwin Rao, Arnaud Legout. 277-288 [doi]
- Stochastic bandits with side observations on networksSwapna Buccapatnam, Atilla Eryilmaz, Ness B. Shroff. 289-300 [doi]
- On maximizing diffusion speed in social networks: impact of random seeding and clusteringJungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi. 301-313 [doi]
- Tunable survivable spanning treesJose Yallouz, Ori Rottenstreich, Ariel Orda. 315-327 [doi]
- Balanced resource allocations across multiple dynamic MapReduce clustersBogdan Ghit, Nezih Yigitbasi, Alexandru Iosup, Dick H. J. Epema. 329-341 [doi]
- On the relevance of adversarial queueing theory in practiceDaniel S. Berger, Martin Karsten, Jens Schmitt. 343-354 [doi]
- GemDroid: a framework to evaluate mobile platformsNachiappan Chidambaram Nachiappan, Praveen Yedlapalli, Niranjan Soundararajan, Mahmut T. Kandemir, Anand Sivasubramaniam, Chita R. Das. 355-366 [doi]
- Understanding the impact of network dynamics on mobile video user engagementMuhammad Zubair Shafiq, Jeffrey Erman, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang. 367-379 [doi]
- Error estimating codes for insertion and deletion channelsJiwei Huang, Sen Yang, Ashwin Lall, Justin Romberg, Jun (Jim) Xu, Chuang Lin. 381-393 [doi]
- Data dissemination performance in large-scale sensor networksThomas M. M. Meyfroyt, Sem C. Borst, Onno J. Boxma, Dee Denteneer. 395-406 [doi]
- Movers and shakers: kinetic energy harvesting for the internet of thingsMaria Gorlatova, John Sarik, Guy Grebla, Mina Cong, Ioannis Kymissis, Gil Zussman. 407-419 [doi]
- Pricing link by timeChengdi Lai, Steven H. Low, Ka-Cheong Leung, Victor O. K. Li. 421-433 [doi]
- Serving content with unknown demand: the high-dimensional regimeSharayu Moharir, Javad Ghaderi, Sujay Sanghavi, Sanjay Shakkottai. 435-447 [doi]
- Network-design sensitivity analysisPaul Tune, Matthew Roughan. 449-461 [doi]
- The multi-shop ski rental problemLingqing Ai, Xian Wu, Lingxiao Huang, Longbo Huang, Pingzhong Tang, Jian Li. 463-475 [doi]
- CApRI: CAche-conscious data reordering for irregular codesWei Ding, Mahmut T. Kandemir. 477-489 [doi]
- Neighbor-cell assisted error correction for MLC NAND flash memoriesYu Cai, Gulay Yalcin, Onur Mutlu, Erich F. Haratsch, Osman S. Unsal, Adrián Cristal, Ken Mai. 491-504 [doi]
- ANATOMY: an analytical model of memory system performanceNagendra Gulur, Mahesh Mehendale, Raman Manikantan, Ramaswamy Govindarajan. 505-517 [doi]
- The efficacy of error mitigation techniques for DRAM retention failures: a comparative experimental studySamira Manabi Khan, Donghyuk Lee, Yoongu Kim, Alaa R. Alameldeen, Chris Wilkerson, Onur Mutlu. 519-532 [doi]
- GDM: device memory management for gpgpu computingKaibo Wang, Xiaoning Ding, Rubao Lee, Shinpei Kato, Xiaodong Zhang 0001. 533-545 [doi]
- On the energy and performance of commodity hardware transactional memoryNuno Lourenco Diegues, Paolo Romano, Luís Rodrigues. 547-548 [doi]
- Impact of correlated mobility and cluster scalability on connectivity of wireless networksQi Wang, Liang Liu, Jinbei Zhang, Xinyu Wang, Xinbing Wang, Songwu Lu. 549-550 [doi]
- Unleashing the potentials of dynamism for page allocation strategies in SSDsArash Tavakkol, Mohammad Arjomand, Hamid Sarbazi-Azad. 551-552 [doi]
- Traffic congestion: models, costs and optimal transportChinmoy Mandayam, Balaji Prabhakar. 553-554 [doi]
- Randomized routing schemes for large processor sharing systems with multiple service ratesArpan Mukhopadhyay, Ravi R. Mazumdar. 555-556 [doi]
- Automated analysis of multithreaded programs for performance modelingAlexander Tarvo, Steven P. Reiss. 557-558 [doi]
- A comparison of core power gating strategies implemented in modern hardwareManish Arora, Srilatha Manne, Yasuko Eckert, Indrani Paul, Nuwan Jayasena, Dean M. Tullsen. 559-560 [doi]
- Topic modeling from network spreadAvik Ray, Sujay Sanghavi, Sanjay Shakkottai. 561-562 [doi]
- BATS: budget-constrained autoscaling for cloud performance optimizationA. Hasan Mahmud, Yuxiong He, Shaolei Ren. 563-564 [doi]
- What's your choice?: learning the mixed multi-nomialAmmar Ammar, Sewoong Oh, Devavrat Shah, Luis Filipe Voloch. 565-566 [doi]
- Revisiting caching in content delivery networksMuhammad Zubair Shafiq, Alex X. Liu, Amir R. Khakpour. 567-568 [doi]
- FLOWR: a self-learning system for classifying mobileapplication trafficQiang Xu, Thomas Andrews, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci. 569-570 [doi]
- Accurate and robust time reconstruction for deployed sensor networksWei Dong, Xuefeng Zhang, Jiliang Wang, Yi Gao, Chun Chen, Jiajun Bu. 571-572 [doi]
- Effect of proactive serving on user delay reduction in service systemsShaoquan Zhang, Longbo Huang, Minghua Chen, Xin Liu. 573-574 [doi]
- Optimal energy source selection and capacity planning for green datacentersFanxin Kong, Xue Liu, Lei Rao. 575-576 [doi]
- Scheduling using interactive oracles: connection between iterative optimization and low-complexity schedulingJinwoo Shin, Tonghoon Suk. 577-578 [doi]
- Unified localization framework using trajectory signaturesSwati Rallapalli, Wei Dong, Lili Qiu, Yin Zhang. 579-580 [doi]
- TS-CLOCK: temporal and spatial locality aware buffer replacement algorithm for NAND flash storagesDonghyun Kang, Changwoo Min, Young Ik Eom. 581-582 [doi]
- Multi-source multipath HTTP (mHTTP): a proposalJuhoon Kim, Yung-Chih Chen, Ramin Khalili, Don Towsley, Anja Feldmann. 583-584 [doi]
- Performance analysis of MAC for power-line communicationsChristina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran. 585-586 [doi]
- Impact of DHCP churn on network characterizationLong Vu, Deepak S. Turaga, Srinivasan Parthasarathy. 587-588 [doi]
- Online algorithms for joint application-VM-physical-machine auto-scaling in a cloudYang Guo, Alexander L. Stolyar, Anwar Walid. 589-590 [doi]
- Distributed optimal load shedding for disaster recovery in smart electric power grids: a second-order approachJia Liu, Cathy H. Xia, Ness B. Shroff, Hanif D. Sherali. 591-592 [doi]
- TARDIS: stably shifting traffic in space and timeRichard G. Clegg, Raul Landa, João Taveira Araújo, Eleni Mykoniati, David Griffin, Miguel Rio. 593-594 [doi]
- Exact analysis of TTL cache networks: the case of caching policies driven by stopping timesDaniel S. Berger, Philipp Gland, Sahil Singla, Florin Ciucu. 595-596 [doi]
- Measuring throughput of data center network topologiesSangeetha Abdu Jyothi, Ankit Singla, Brighten Godfrey, Alexandra Kolla. 597-598 [doi]
- Efficient task replication for fast response times in parallel computationDa Wang, Gauri Joshi, Gregory W. Wornell. 599-600 [doi]