Abstract is missing.
- Uniform Loss Algorithms for Online Stochastic Decision-Making With Applications to Bin PackingSiddhartha Banerjee, Daniel Freund 0001. 1-2 [doi]
- Online Primal-Dual Mirror Descent under Stochastic ConstraintsXiaohan Wei, Hao Yu 0002, Michael J. Neely. 3-4 [doi]
- Dynamic Weighted Fairness with Minimal DisruptionsSungjin Im, Benjamin Moseley, Kamesh Munagala, Kirk Pruhs. 5-6 [doi]
- Online Linear Optimization with Inventory Management ConstraintsLin Yang, Mohammad Hassan Hajiesmaili, Ramesh K. Sitaraman, Adam Wierman, Enrique Mallada, Wing Shing Wong. 7 [doi]
- Online Optimization with Predictions and Non-convex LossesYiheng Lin, Gautam Goel, Adam Wierman. 9-10 [doi]
- Mechanism Design for Online Resource Allocation: A Unified ApproachXiaoqi Tan, Bo Sun 0004, Alberto Leon-Garcia, Yuan Wu, Danny H. K. Tsang. 11-12 [doi]
- Predict and Match: Prophet Inequalities with Uncertain SupplyReza Alijani, Siddhartha Banerjee, Sreenivas Gollapudi, Kamesh Munagala, Kangning Wang. 13-14 [doi]
- Fundamental Limits on the Regret of Online Network-CachingRajarshi Bhattacharjee, Subhankar Banerjee, Abhishek Sinha. 15-16 [doi]
- Adaptive Discretization for Episodic Reinforcement Learning in Metric SpacesSean R. Sinclair, Siddhartha Banerjee, Christina Lee Yu. 17-18 [doi]
- Staleness Control for Edge Data AnalyticsAtakan Aral, Melike Erol-Kantarci, Ivona Brandic. 19-20 [doi]
- Fundamental Limits of Approximate Gradient CodingSinong Wang, Jiashang Liu, Ness B. Shroff. 21-22 [doi]
- Forecasting with Alternative DataMichael Fleder, Devavrat Shah. 23-24 [doi]
- Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service EnvironmentFan Fred Lin, Keyur Muzumdar, Nikolay Pavlovich Laptev, Mihai-Valentin Curelea, Seunghak Lee, Sriram Sankar. 25-26 [doi]
- Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment ExperienceFrancesco Bronzino, Paul Schmitt, Sara Ayoubi, Guilherme Martins, Renata Teixeira, Nick Feamster. 27-28 [doi]
- Social Learning in Multi Agent Multi Armed BanditsAbishek Sankararaman, Ayalvadi Ganesh, Sanjay Shakkottai. 29-30 [doi]
- Non-Asymptotic Analysis of Monte Carlo Tree SearchDevavrat Shah, Qiaomin Xie, Zhi Xu. 31-32 [doi]
- Heavy-traffic Analysis of the Generalized Switch under Multidimensional State Space CollapseDaniela Hurtado-Lange, Siva Theja Maguluri. 33-34 [doi]
- Characterizing Policies with Optimal Response Time Tails under Heavy-Tailed Job SizesZiv Scully, Lucas van Kreveld, Onno J. Boxma, Jan-Pieter L. Dorsman, Adam Wierman. 35-36 [doi]
- Simple Near-Optimal Scheduling for the M/G/1Ziv Scully, Mor Harchol-Balter, Alan Scheller-Wolf. 37-38 [doi]
- Delay-Optimal Policies in Partial Fork-Join Systems with Redundancy and Random SlowdownsMartin Zubeldia. 39-40 [doi]
- Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing ServersIllés Antal Horváth, Ziv Scully, Benny Van Houdt. 41-42 [doi]
- Achieving Efficient Routing in Reconfigurable DCNsZhenjie Yang, Yong Cui 0001, Shihan Xiao, Xin Wang, Minming Li, Chuming Li, Yadong Liu. 43-44 [doi]
- Fundamental Limits of Volume-based Network DoS AttacksXinzhe Fu, Eytan Modiano. 45-46 [doi]
- On the Complexity of Traffic Traces and ImplicationsChen Avin, Manya Ghobadi, Chen Griner, Stefan Schmid 0001. 47-48 [doi]
- On the Analysis of a Multipartite Entanglement Distribution SwitchPhilippe Nain, Gayane Vardoyan, Saikat Guha, Don Towsley. 49-50 [doi]
- On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal ClocksLudovic Thomas, Jean-Yves Le Boudec. 51-52 [doi]
- Lancet: Better network resilience by designing for pruned failure setsYiyang Chang, Chuan Jiang, Ashish Chandra, Sanjay G. Rao, Mohit Tawarmalani. 53-54 [doi]
- vrfinder: Finding Outbound Addresses in TracerouteAlexander Marder, Matthew J. Luckie, Bradley Huffaker, kc claffy. 55-56 [doi]
- Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network SystemsShouqian Shi, Chen Qian 0001. 57-58 [doi]
- The Great Internet TCP Congestion Control CensusAyush Mishra, Xiangpeng Sun, Atishya Jain, Sameer Pande, Raj Joshi, Ben Leong. 59-60 [doi]
- I Know What You Did Last Summer: Network Monitoring using Interval QueriesNikita Ivkin, Ran Ben-Basat, Zaoxing Liu, Gil Einziger, Roy Friedman, Vladimir Braverman. 61-62 [doi]
- Generalized Sketch Families for Network Traffic MeasurementYou Zhou 0003, Youlin Zhang, Chaoyi Ma, Shigang Chen, Olufemi O. Odegbile. 63-64 [doi]
- Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric ViewYibo Pi, Sugih Jamin, Peter B. Danzig, Feng Qian. 65-66 [doi]
- On the Bottleneck Structure of Congestion-Controlled NetworksJordi Ros-Giralt, Atul Bohara, Sruthi Yellamraju, Harper Langston, Richard Lethin, Yuang Jiang, Leandros Tassiulas, Josie Li, Yuanlong Tan, Malathi Veeraraghavan. 67-68 [doi]
- Characterizing Transnational Internet Performance and the Great Bottleneck of ChinaPengxiong Zhu, Keyu Man, Zhongjie Wang 0002, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan. 69-70 [doi]
- Stability and Scalability of Blockchain SystemsAditya Gopalan, Abishek Sankararaman, Anwar Walid, Sriram Vishwanath. 71-72 [doi]
- Measuring Membership Privacy on Aggregate Location Time-SeriesApostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro. 73-74 [doi]
- Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad BlockingPeter Snyder, Antoine Vastel, Ben Livshits. 75-76 [doi]
- Under the Concealing Surface: Detecting and Understanding Live Webcams in the WildJinke Song, Qiang Li, Haining Wang, Limin Sun. 77-78 [doi]
- Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop ComputersZhihui Shao, Mohammad A. Islam 0001, Shaolei Ren. 79-80 [doi]
- Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel NetworksWeizhao Tang, Weina Wang, Giulia C. Fanti, Sewoong Oh. 81-82 [doi]
- Understanding (Mis)Behavior on the EOSIO BlockchainYuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang 0001, Xuxian Jiang. 83-84 [doi]
- Optimal Data Placement for Heterogeneous Cache, Memory, and Storage SystemsLei Zhang, Reza Karimi, Irfan Ahmad, Ymir Vigfusson. 85-86 [doi]
- Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel DebloatingHsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu. 87-88 [doi]
- User-level Threading: Have Your Cake and Eat It TooMartin Karsten, Saman Barghi. 89-90 [doi]
- DSM: A Case for Hardware-Assisted Merging of DRAM Rows with Same ContentSeyed Armin Vakil-Ghahani, Mahmut Taylan Kandemir, Jagadish B. Kotra. 91-92 [doi]
- Centaur: A Novel Architecture for Reliable, Low-Wear, High-Density 3D NAND StorageChun-Yi Liu, Jagadish Kotra, Myoungsoo Jung, Mahmut Taylan Kandemir. 93-94 [doi]
- Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector MultiplicationAnkur Mallick, Malhar Chaudhari, Utsav Sheth, Ganesh Palanikumar, Gauri Joshi. 95-96 [doi]
- Logarithmic Communication for Distributed Optimization in Multi-Agent SystemsPalma London, Shai Vardi, Adam Wierman. 97-98 [doi]
- Partial Recovery of Erdős-Rényi Graph Alignment via k-Core AlignmentDaniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor. 99-100 [doi]
- Fiedler Vector Approximation via Interacting Random WalksVishwaraj Doshi, Do Young Eun. 101-102 [doi]
- Third-Party Data Providers Ruin Simple MechanismsYang Cai, Federico Echenique, Hu Fu, Katrina Ligett, Adam Wierman, Juba Ziani. 103 [doi]
- Dynamic Pricing and Matching for Two-Sided QueuesSushil Mahavir Varma, Pornpawee Bumpensanti, Siva Theja Maguluri, He Wang. 105-106 [doi]
- Unimodal Bandits with Continuous Arms: Order-optimal Regret without SmoothnessRichard Combes, Alexandre Proutière, Alexandre Fauquette. 107-108 [doi]
- Optimal Bidding Strategies for Online Ad Auctions with Overlapping Targeting CriteriaErik Tillberg, Peter Marbach, Ravi Mazumdar. 109-110 [doi]