Abstract is missing.
- Curvature-based Analysis of Network Connectivity in Private Backbone InfrastructuresLoqman Salamatian, Scott Anderson, Joshua Matthews, Paul Barford, Walter Willinger, Mark Crovella. 1-2 [doi]
- Automatic Inference of BGP Location CommunitiesBrivaldo A. da Silva Jr., Paulo Mol, Osvaldo L. H. M. Fonseca, Ítalo Cunha, Ronaldo A. Ferreira, Ethan Katz-Bassett. 3-4 [doi]
- Understanding I/O Direct Cache Access Performance for End Host NetworkingMinhu Wang, Mingwei Xu, Jianping Wu. 5-6 [doi]
- Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network TrafficFrancesco Bronzino, Paul Schmitt, Sara Ayoubi, HyoJoon Kim, Renata Teixeira, Nick Feamster. 7-8 [doi]
- Xatu: Richer Neural Network Based Prediction for Video StreamingYun Seong Nam, Jianfei Gao, Chandan Bothra, Ehab Ghabashneh, Sanjay Rao, Bruno Ribeiro 0001, Jibin Zhan, Hui Zhang. 9-10 [doi]
- End-to-end Characterization of Game Streaming Applications on Mobile PlatformsSandeepa Bhuyan, Shulin Zhao 0001, Ziyu Ying 0001, Mahmut T. Kandemir, Chita R. Das. 11-12 [doi]
- Dissecting Cloud Gaming Performance with DECAFHassan Iqbal, Ayesha Khalid, Muhammad Shahzad. 13-14 [doi]
- Toxicity in the Decentralized Web and the Potential for Model SharingHaris Bin Zia, Aravindh Raman, Ignacio Castro, Anaobi Ishaku Hassan, Emiliano De Cristofaro, Nishanth Sastry, Gareth Tyson. 15-16 [doi]
- Understanding the Practices of Global Censorship through Accurate, End-to-End MeasurementsLin Jin, Shuai Hao 0001, Haining Wang, Chase Cotton. 17-18 [doi]
- Monetizing Spare Bandwidth: The Case of Distributed VPNsYunming Xiao, Matteo Varvello, Aleksandar Kuzmanovic. 19-20 [doi]
- MalRadar: Demystifying Android Malware in the New EraLiu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu. 21-22 [doi]
- Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized ExchangePengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu. 23-24 [doi]
- A Detailed Look at MIMO Performance in 60 GHz WLANsShivang Aggarwal, Srisai Karthik Neelamraju, Ajit Bhat, Dimitrios Koutsonikolas. 25-26 [doi]
- NG-Scope: Fine-Grained Telemetry for NextG Cellular NetworksYaxiong Xie, Kyle Jamieson. 27-28 [doi]
- Argus: Predictable Millimeter-Wave Picocells with Vision and Learning AugmentationHem Regmi, Sanjib Sur. 29-30 [doi]
- The First 5G-LTE Comparative Study in Extreme MobilityYueyang Pan, Ruihan Li, Chenren Xu. 31-32 [doi]
- Towards Efficient Sparse Matrix Vector Multiplication on Real Processing-In-Memory ArchitecturesChristina Giannoula, Ivan Fernandez, Juan Gómez-Luna, Nectarios Koziris, Georgios I. Goumas, Onur Mutlu. 33-34 [doi]
- Memory Space RecyclingJihyun Ryoo, Mahmut Taylan Kandemir, Mustafa Karaköy. 35-36 [doi]
- Data Convection: A GPU-Driven Case Study for Thermal-Aware Data Placement in 3D DRAMsSoheil Khadirsharbiyani, Jagadish Kotra, Karthik Rao, Mahmut Taylan Kandemir. 37-38 [doi]
- NURA: A Framework for Supporting Non-Uniform Resource Accesses in GPUsSina Darabi, Negin Mahani, Hazhir Baxishi, Ehsan Yousefzadeh, Mohammad Sadrosadati, Hamid Sarbazi-Azad. 39-40 [doi]
- YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User PrivacyMichalis Pachilakis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, Nicolas Kourtellis. 41-42 [doi]
- Power of Bonus in Pricing for CrowdsourcingSuho Shin, Hoyong Choi, Yung Yi, Jungseul Ok. 43-44 [doi]
- Fusing Speed Index during Web Page LoadingWei Liu, Xinlei Yang, Hao Lin, Zhenhua Li, Feng Qian. 45-46 [doi]
- Data-Driven Network Path Simulation with iBoxSachin Ashok, Shubham Tiwari, Nagarajan Natarajan, Venkata N. Padmanabhan, Sundararajan Sellamanickam. 47-48 [doi]
- CachePerf: A Unified Cache Miss Classifier via Hybrid Hardware SamplingJin Zhou, Steven (Jiaxun) Tang, Hanmei Yang, Tongping Liu. 49-50 [doi]
- A Comprehensive Empirical Study of Query Performance Across GPU DBMSesYoung-Kyoon Suh, Jun Young An, Byungchul Tak, Gap-Joo Na. 51-52 [doi]
- A Formalism of DNN Accelerator FlexibilitySheng-Chun Kao, Hyoukjun Kwon, Michael Pellauer, Angshuman Parashar, Tushar Krishna. 53-54 [doi]
- One Proxy Device Is Enough for Hardware-Aware Neural Architecture SearchBingqian Lu, Jianyi Yang, Weiwen Jiang, Yiyu Shi, Shaolei Ren. 55-56 [doi]
- WISEFUSE: Workload Characterization and DAG Transformation for Serverless WorkflowsAshraf Mahgoub, Edgardo Barsallo Yi, Karthick Shankar, Eshaan Minocha, Sameh Elnikety, Saurabh Bagchi, Somali Chaterji. 57-58 [doi]
- An Enterprise-Grade Open-Source Data Reduction Architecture for All-Flash Storage SystemsMohammadamin Ajdari, Patrick Raaf, Mostafa Kishani, Reza Salkhordeh, Hossein Asadi 0001, André Brinkmann. 59-60 [doi]
- Dremel: Adaptive Configuration Tuning of RocksDB KV-StoreChenxingyu Zhao, Tapan Chugh, Jaehong Min, Ming Liu, Arvind Krishnamurthy. 61-62 [doi]
- Tuxedo: Maximizing Smart Contract Computation in PoW BlockchainsSourav Das, Nitin Awathare, Ling Ren 0001, Vinay J. Ribeiro, Umesh Bellur. 63-64 [doi]
- Metamorphic Testing of Deep Learning CompilersDongwei Xiao, Zhibo Liu, Yuanyuan Yuan, Qi Pang, Shuai Wang. 65-66 [doi]
- SimNet: Accurate and High-Performance Computer Architecture Simulation using Deep LearningLingda Li, Santosh Pandey, Thomas Flynn, Hang Liu, Noel Wheeler, Adolfy Hoisie. 67-68 [doi]
- Prediction of the Resource Consumption of Distributed Deep Learning SystemsGyeongsik Yang, Changyong Shin, Jeunghwan Lee, Yeonho Yoo, Chuck Yoo. 69-70 [doi]
- Hierarchical Learning Algorithms for Multi-scale Expert ProblemsLin Yang, Yu-Zhen Janice Chen, Mohammad H. Hajiesmaili, Mark Herbster, Don Towsley. 71-72 [doi]
- Tensor Completion with Nearly Linear Samples Given Weak Side InformationChristina Lee Yu, Xumei Xi. 73-74 [doi]
- Dynamic Regret Minimization for Control of Non-stationary Linear Dynamical SystemsYuwei Luo, Varun Gupta, Mladen Kolar. 75-76 [doi]
- Differentially Private Reinforcement Learning with Linear Function ApproximationXingyu Zhou. 77-78 [doi]
- On Multivariate Singular Spectrum Analysis and Its VariantsAnish Agarwal, Abdullah Alomar, Devavrat Shah. 79-80 [doi]
- Online Optimization with Feedback Delay and Nonlinear Switching CostWeici Pan, Guanya Shi, Yiheng Lin, Adam Wierman. 81-82 [doi]
- Competitive Online Optimization with Multiple Inventories: A Divide-and-Conquer ApproachQiulin Lin, Yanfang Mo, Junyan Su, Minghua Chen. 83-84 [doi]
- Expert-Calibrated Learning for Online Optimization with Switching CostsPengfei Li, Jianyi Yang, Shaolei Ren. 85-86 [doi]
- Competitive Algorithms for Online Multidimensional Knapsack ProblemsLin Yang, Ali Zeynali, Mohammad H. Hajiesmaili, Ramesh K. Sitaraman, Don Towsley. 87-88 [doi]
- Offline and Online Algorithms for SSD ManagementTomer Lange, Joseph (Seffi) Naor, Gala Yadgar. 89-90 [doi]
- Online Caching Networks with Adversarial GuaranteesYuanyuan Li, Tareq Si Salem, Giovanni Neglia, Stratis Ioannidis. 91-92 [doi]
- Real-time Bidding for Time Constrained Impression Contracts in First and Second Price Auctions - Theory and AlgorithmsRyan J. Kinnear, Ravi R. Mazumdar, Peter Marbach. 93-94 [doi]
- Sequential Fair Allocation: Achieving the Optimal Envy-Efficiency Tradeoff CurveSean R. Sinclair, Siddhartha Banerjee, Christina Lee Yu. 95-96 [doi]
- Understanding the Performance Guarantee of Physical Topology Design for Optical Circuit Switched Data CentersShizhen Zhao, Peirui Cao, Xinbing Wang. 97-98 [doi]
- Cerberus: The Power of Choices in Datacenter Topology Design - A Throughput PerspectiveChen Griner, Johannes Zerwas, Andreas Blenk, Manya Ghobadi, Stefan Schmid 0001, Chen Avin. 99-100 [doi]
- Large-System Insensitivity of Zero-Waiting Load Balancing AlgorithmsXin Liu, Kang Gong, Lei Ying. 101-102 [doi]
- Mean Field and Refined Mean Field Approximations for Heterogeneous Systems: It Works!Sebastian Allmeier, Nicolas Gast. 103-104 [doi]
- Asymptotic Convergence Rate of Dropout on Shallow Linear Neural NetworksAlbert Senen-Cerda, Jaron Sanders. 105-106 [doi]
- Robustness and Consistency in Linear Quadratic Control with Untrusted PredictionsTongxin Li, Ruixiao Yang, Guannan Qu, Guanya Shi, Chenkai Yu, Adam Wierman, Steven H. Low. 107-108 [doi]
- Stationary Behavior of Constant Stepsize SGD Type Algorithms: An Asymptotic CharacterizationZaiwei Chen, Shancong Mou, Siva Theja Maguluri. 109-110 [doi]
- Learning To Maximize Welfare with a Reusable ResourceMatthew Faw, Orestis Papadigenopoulos, Constantine Caramanis, Sanjay Shakkottai. 111-112 [doi]
- Free2Shard: Adversary-resistant Distributed Resource Allocation for BlockchainsRanvir Rana, Sreeram Kannan, David Tse, Pramod Viswanath. 113-114 [doi]
- Age-Dependent Differential PrivacyMeng Zhang, Ermin Wei, Randall Berry, Jianwei Huang. 115-116 [doi]
- Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network CalculusAnne Bouillard, Paul Nikolaus, Jens B. Schmitt. 117-118 [doi]