Abstract is missing.
- Opening the Black Box of Deep Learning: Some Lessons and Take-awaysSanjeev Arora. 1 [doi]
- Federated Bandit: A Gossiping ApproachZhaowei Zhu, Jingxuan Zhu, Ji Liu 0001, Yang Liu 0018. 3-4 [doi]
- Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-BanditsThibaut Cuvelier, Richard Combes, Eric Gourdin. 5-6 [doi]
- Information Aggregation for Constrained Online ControlTongxin Li, Yue Chen, Bo Sun 0004, Adam Wierman, Steven H. Low. 7-8 [doi]
- Online Virtual Machine Allocation with Lifetime and Load PredictionsNiv Buchbinder, Yaron Fairstein, Konstantina Mellou, Ishai Menache, Joseph (Seffi) Naor. 9-10 [doi]
- Nudge: Stochastically Improving upon FCFSIsaac Grosof, Kunhe Yang, Ziv Scully, Mor Harchol-Balter. 11-12 [doi]
- Zero Queueing for Multi-Server JobsWeina Wang, Qiaomin Xie, Mor Harchol-Balter. 13-14 [doi]
- The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General ConditionsZiv Scully, Isaac Grosof, Mor Harchol-Balter. 15-16 [doi]
- Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile DevicesAshish Bijlani, Umakishore Ramachandran, Roy Campbell. 17-18 [doi]
- A Measurement Study of Wechat Mini-AppsYue Zhang 0025, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin. 19-20 [doi]
- PredictRoute: A Network Path Prediction ToolkitRachee Singh, David Tench, Phillipa Gill, Andrew McGregor 0001. 21-22 [doi]
- A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted WebIman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin. 23-24 [doi]
- Achieving Zero Asymptotic Queueing Delay for Parallel JobsWentao Weng, Weina Wang. 25-26 [doi]
- Achievable Stability in Redundancy SystemsYouri Raaijmakers, Sem C. Borst. 27-28 [doi]
- On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing SystemsGrzegorz Kielanski, Benny Van Houdt. 29-30 [doi]
- Refining Mean-field Approximations by Dynamic State TruncationFrancesca Randone, Luca Bortolussi, Mirco Tribastone. 31-32 [doi]
- Tracking Counterfeit Cryptocurrency End-to-endBingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson. 33-34 [doi]
- SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart ContractsWeimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo. 35-36 [doi]
- adPerf: Characterizing the Performance of Third-party AdsBehnam Pourghassemi, Jordan Bonecutter, Zhou Li 0001, Aparna Chandramowlishwaran. 37-38 [doi]
- AI for System - Infusing AI into Cloud Computing SystemsHsiao-Wuen Hon. 39-40 [doi]
- A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle SoftwareQingzhao Zhang, David Ke Hong, Ze Zhang, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao. 43-44 [doi]
- SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input SizingLishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni. 45-46 [doi]
- Mix and Match: Reorganizing Tasks for Enhancing Data LocalityXulong Tang, Mahmut Taylan Kandemir, Mustafa Karaköy. 47-48 [doi]
- Optimal Load Balancing with Locality ConstraintsWentao Weng, Xingyu Zhou, R. Srikant 0001. 49-50 [doi]
- Load Balancing Under Strict Compatibility ConstraintsDaan Rutten, Debankur Mukherjee. 51-52 [doi]
- Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing SystemsTim Hellemans, Benny Van Houdt. 53-54 [doi]
- Improving the Performance of Heterogeneous Data Centers through RedundancyElene Anton, Urtzi Ayesta, Matthieu Jonckheere, Ina Maria Verloop. 55-56 [doi]
- On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium AnalysisXin Wang, Richard T. B. Ma. 57-58 [doi]
- I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse ProblemMichael Fleder, Devavrat Shah. 59-60 [doi]
- Dynamic Pricing and Matching for Two-Sided Markets with Strategic ServersSushil Mahavir Varma, Francisco Castro, Siva Theja Maguluri. 61-62 [doi]
- Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack ConstraintJing Tang, Xueyan Tang, Andrew Lim, Kai Han 0003, Chongshou Li, Junsong Yuan. 63-64 [doi]
- Approximation Algorithms for Submodular Data Summarization with a Knapsack ConstraintKai Han 0003, Shuang Cui, Tianshuai Zhu, Enpei Zhang, Benwei Wu, Zhizhuo Yin, Tong Xu, ShaoJie Tang, He Huang 0001. 65-66 [doi]
- Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle ChargingBo Sun 0004, Ali Zeynali, Tongxin Li, Mohammad Hassan Hajiesmaili, Adam Wierman, Danny H. K. Tsang. 67-68 [doi]
- Enabling Intelligent Services at the Network EdgeLeandros Tassiulas. 69-70 [doi]
- Input-Dynamic Distributed Algorithms for Communication NetworksKlaus-Tycho Foerster, Janne H. Korhonen, Ami Paz, Joel Rybicki, Stefan Schmid 0001. 71-72 [doi]
- Real-time Approximate Routing for Smart Transit SystemsNoémie Périvier, Chamsi Hssaine, Samitha Samaranayake, Siddhartha Banerjee. 73-74 [doi]
- Bregman-style Online Convex Optimization with Energy Harvesting ConstraintsKamiar Asgari, Michael J. Neely. 75-76 [doi]
- The Power of D-hops in Matching Power-Law GraphsLiren Yu, Jiaming Xu, Xiaojun Lin. 77-78 [doi]
- Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous NetworksYiguang Zhang, Jessy Xinyi Han, Ilica Mahajan, Priyanjana Bengani, Augustin Chaintreau. 79-80 [doi]
- Magma: A Ground-Truth Fuzzing BenchmarkAhmad Hazimeh, Adrian Herrera, Mathias Payer. 81-82 [doi]
- Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric FingerprintsLuis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick, Arash Asadi. 83-84 [doi]