Abstract is missing.
- Approximations to Study the Impact of the Service Discipline in Systems with RedundancyNicolas Gast, Benny Van Houdt. 1-2 [doi]
- Multi-dimensional State Space Collapse in Non-complete Resource Pooling ScenariosEllen Cardinaels, Sem C. Borst, Johan S. H. van Leeuwaarden. 3-4 [doi]
- Strongly Tail-Optimal Scheduling in the Light-Tailed M/G/1George Yu, Ziv Scully. 5-6 [doi]
- Heavy-Traffic Optimal Size- and State-Aware DispatchingRunhan Xie, Isaac Grosof, Ziv Scully. 7-8 [doi]
- Deep Dive into NTP Pool's Popularity and MappingGiovane C. M. Moura, Marco Davids, Caspar Schutijser, Cristian Hesselman, John S. Heidemann, Georgios Smaragdakis. 9-10 [doi]
- MetaVRadar: Measuring Metaverse Virtual Reality Network ActivityMinzhao Lyu, Rahul Dev Tripathi, Vijay Sivaraman. 11-12 [doi]
- SCADA World: An Exploration of the Diversity in Power Grid NetworksNeil Ortiz Ortiz, Alvaro A. Cárdenas, Avishai Wool. 13-14 [doi]
- Democratizing LEO Satellite Network MeasurementLiz Izhikevich, Manda Tran, Katherine Izhikevich, Gautam Akiwate, Zakir Durumeric. 15-16 [doi]
- Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)Kahlil Dozier, Loqman Salamatian, Dan Rubenstein. 17-18 [doi]
- Invertible Bloom Lookup Tables with Listing GuaranteesAvi Mizrahi, Daniella Bar-Lev, Eitan Yaakobi, Ori Rottenstreich. 19-20 [doi]
- Lightweight Acquisition and Ranging of Flows in the Data PlaneAndrea Monterubbiano, Jonatan Langlet, Stefan Walzer, Gianni Antichi, Pedro Reviriego, Salvatore Pontarelli. 21-22 [doi]
- TAO: Re-Thinking DL-based Microarchitecture SimulationSantosh Pandey, Amir Yazdanbakhsh, Hang Liu 0001. 23-24 [doi]
- Agents of Autonomy: A Systematic Study of Robotics on Modern HardwareMohammad Bakhshalipour, Phillip B. Gibbons. 25-26 [doi]
- Automated Backend Allocation for Multi-Model, On-Device AI InferenceVenkatraman Iyer, Sungho Lee, Semun Lee, Juitem Joonwoo Kim, Hyunjun Kim, Youngjae Shin. 27-28 [doi]
- Learning the Optimal Control for Evolving Systems with Converging DynamicsQingsong Liu, Zhixuan Fang. 29-30 [doi]
- Sampling for Remote Estimation of the Wiener Process over an Unreliable ChannelJiayu Pan, Yin Sun, Ness B. Shroff. 31-32 [doi]
- Near-Optimal Packet Scheduling in Multihop Networks with End-to-End Deadline ConstraintsChristos Tsanikidis, Javad Ghaderi. 33-34 [doi]
- Prelimit Coupling and Steady-State Convergence of Constant-stepsize Nonsmooth Contractive SAYixuan Zhang, Dongyan Lucy Huo, Yudong Chen 0001, Qiaomin Xie. 35-36 [doi]
- Machine Learning Systems are Bloated and VulnerableHuaifeng Zhang, Mohannad Alhanahnah, Fahmi Abdulqadir Ahmed, Dyako Fatih, Philipp Leitner 0001, Ahmed Ali-Eldin. 37-38 [doi]
- Thorough Characterization and Analysis of Large Transformer Model Training At-ScaleScott Cheng, Jun-Liang Lin, Murali Emani, Siddhisanket Raskar, Sam Foreman, Zhen Xie, Venkatram Vishwanath, Mahmut T. Kandemir. 39-40 [doi]
- HEAL: Performance Troubleshooting Deep inside Data Center HostsYicheng Pan 0002, Yang Zhang, Tingzhu Bi, Linlin Han, Yu Zhang, Meng Ma, Xiangzhuang Shen, Xinrui Jiang, Feng Wang, Xian Liu, Ping Wang 0003. 41-42 [doi]
- Kernel vs. User-Level Networking: Don't Throw Out the Stack with the InterruptsPeter Cai, Martin Karsten. 43-44 [doi]
- Online Conversion with Switching Costs: Robust and Learning-Augmented AlgorithmsAdam Lechowicz, Nicolas Christianson, Bo Sun 0004, Noman Bashir, Mohammad Hajiesmaili, Adam Wierman, Prashant J. Shenoy. 45-46 [doi]
- The Online Pause and Resume Problem: Optimal Algorithms and An Application to Carbon-Aware Load ShiftingAdam Lechowicz, Nicolas Christianson, Jinhang Zuo, Noman Bashir, Mohammad Hajiesmaili, Adam Wierman, Prashant J. Shenoy. 47-48 [doi]
- CarbonScaler: Leveraging Cloud Workload Elasticity for Optimizing Carbon-EfficiencyWalid A. Hanafy, Qianlin Liang, Noman Bashir, David E. Irwin, Prashant J. Shenoy. 49-50 [doi]
- Optimized Cross-Path Attacks via Adversarial ReconnaissanceYudi Huang, Yilei Lin, Ting He 0001. 51-52 [doi]
- Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH ServiceRadu Anghel, Yury Zhauniarovich, Carlos Gañán. 53-54 [doi]
- A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLsEuijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu 0001, Issa Khalil. 55-56 [doi]
- Online Allocation with Replenishable Budgets: Worst Case and BeyondJianyi Yang, Pengfei Li, Mohammad Jaminur Islam, Shaolei Ren. 57-58 [doi]
- Fair Resource Allocation in Virtualized O-RAN PlatformsFatih Aslan, George Iosifidis, Jose A. Ayala-Romero, Andres Garcia-Saavedra, Xavier Costa-Pérez. 59-60 [doi]
- BONES: Near-Optimal Neural-Enhanced Video StreamingLingdong Wang, Simran Singh, Jacob Chakareski, Mohammad Hajiesmaili, Ramesh K. Sitaraman. 61-62 [doi]
- Scalability Limitations of Processing-in-Memory using Real System EvaluationsGilbert Jonatan, Haeyoon Cho 0002, Hyojun Son, Xiangyu Wu, Neal Livesay, Evelio Mora, Kaustubh Shivdikar, José L. Abellán, Ajay Joshi, David R. Kaeli, John Kim. 63-64 [doi]
- GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection SupportStella Bitchebe, Yves Kone, Pierre Olivier, Jalil Boukhobza, Yérom-David Bromberg, Daniel Hagimont, Alain Tchana. 65-66 [doi]
- A High-bandwidth High-capacity Hybrid 3D Memory for GPUsNegar Akbarzadeh, Sina Darabi, Atiyeh Gheibi-Fetrat, Amir Mirzaei, Mohammad Sadrosadati, Hamid Sarbazi-Azad. 67-68 [doi]
- Strategyproof Decision-Making in Panel Data Settings and BeyondKeegan Harris, Anish Agarwal, Chara Podimata, Zhiwei Steven Wu. 69-70 [doi]
- When Should Prices Stay Fixed? On the Chances and Limitations of Spot Pricing in Larger MarketsLudwig Dierks, Makoto Yokoo. 71-72 [doi]
- Continuous Query-based Data TradingJin Cheng, Ningning Ding, John C. S. Lui, Jianwei Huang 0001. 73-74 [doi]
- Shrinking VOD Traffic via Rényi-Entropic Optimal TransportChi-Jen Roger Lo, Mahesh K. Marina, Nishanth Sastry, Kai Xu, Saeed Fadaei, Yong Li. 75-76 [doi]
- A Closer Look into IPFS: Accessibility, Content, and PerformanceRuizhe Shi, Ruizhi Cheng, Bo Han 0001, Yue Cheng 0001, Songqing Chen. 77-78 [doi]
- StarShip: Mitigating I/O Bottlenecks in Serverless Computing for Scientific WorkflowsRohan Basu Roy, Devesh Tiwari. 79-80 [doi]
- Network Fairness Ambivalence: When Does Social Network Capital Mitigate or Amplify Unfairness?Yiguang Zhang, Reetahan Mukhopadhyay, Augustin Chaintreau. 81-82 [doi]
- Change Point Detection with Adaptive Measurement Schedules for Network Performance VerificationSimon Lindståhl, Alexandre Proutière, Andreas Johnsson. 83-84 [doi]
- NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic GenerationXi Jiang 0007, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, Nick Feamster. 85-86 [doi]
- Miracle or Mirage? A Measurement Study of NFT Rug PullsJintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang. 87-88 [doi]
- Towards Understanding and Characterizing the Arbitrage Bot Scam In the WildKai Li 0017, Shixuan Guan, Darren Lee. 89-90 [doi]
- FedQV: Leveraging Quadratic Voting in Federated LearningTianyue Chu, Nikolaos Laoutaris. 91-92 [doi]
- Near-Optimal Stochastic Bin-Packing in Large Service Systems with Time-Varying Item SizesYige Hong, Qiaomin Xie, Weina Wang 0001. 93-94 [doi]
- Distributed Speed Scaling in Large-Scale Service SystemsDaan Rutten, Martin Zubeldia, Debankur Mukherjee. 95-96 [doi]
- Server Saturation in Skewed NetworksDiego Goldsztajn, Sem C. Borst, Johan S. H. van Leeuwaarden. 97-98 [doi]
- Xaminer: An Internet Cross-Layer Resilience Analysis ToolAlagappan Ramanathan, Rishika Sankaran, Sangeetha Abdu Jyothi. 99-100 [doi]
- Nautilus: A Framework for Cross-Layer Cartography of Submarine Cables and IP LinksAlagappan Ramanathan, Sangeetha Abdu Jyothi. 101-102 [doi]
- A Hop Away from Everywhere: A View of the Intercontinental Long-haul InfrastructureEsteban Carisimo, Caleb Wang, Mia Weaver, Fabián E. Bustamante, Paul Barford. 103-104 [doi]