default search action
SIGMETRICS 2013: Pittsburgh, PA, USA
- Mor Harchol-Balter, John R. Douceur, Jun Xu:
ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '13, Pittsburgh, PA, USA, June 17-21, 2013. ACM 2013, ISBN 978-1-4503-1900-3
Keynote addresses
- Balaji Prabhakar:
Designing large-scale nudge engines. 1-2 - David A. Maltz:
Challenges in cloud scale data centers. 3-4
WiFi and cellular networks
- Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:
Practical conflict graphs for dynamic spectrum distribution. 5-16 - Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:
A first look at cellular network performance during crowded events. 17-28 - Ning Ding, Daniel T. Wagner, Xiaomeng Chen, Y. Charlie Hu, Andrew C. Rice:
Characterizing and modeling the impact of wireless signal strength on smartphone battery drain. 29-40
Resource allocation and generation
- Alexander L. Stolyar, Yuan Zhong:
A large-scale service system with packing constraints: minimizing the number of occupied servers. 41-52 - Lian Lu, Jinlong Tu, Chi-Kin Chau, Minghua Chen, Xiaojun Lin:
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation. 53-66 - Ganesha Shanmuganathan, Ajay Gulati, Peter J. Varman:
Defragmenting the cloud using demand-based resource allocation. 67-80
Applications of machine learning
- David R. Karger, Sewoong Oh, Devavrat Shah:
Efficient crowdsourcing for multi-class labeling. 81-92 - Myunghwan Kim, Roshan Sumbaly, Sam Shah:
Root cause detection in a service-oriented architecture. 93-104 - Aaron D. Jaggard, Swara Kopparty, Vijay Ramachandran, Rebecca N. Wright:
The design space of probing algorithms for network-performance measurement. 105-116
MAC and wireless access networks
- Niek Bouman, Sem C. Borst, Johan van Leeuwaarden:
Delays and mixing times in random-access networks. 117-128 - Fabio Cecchi, Peter Jacko:
Scheduling of users with markovian time-varying transmission rates. 129-140 - Florian Simatos, Niek Bouman, Sem C. Borst:
Lingering issues in distributed scheduling. 141-152
Queueing theory
- Anshul Gandhi, Sherwin Doroudi, Mor Harchol-Balter, Alan Scheller-Wolf:
Exact analysis of the M/M/k/setup class of Markov chains via recursive renewal reward. 153-166 - John N. Tsitsiklis, Kuang Xu:
Queueing system topologies with limited flexibility. 167-178
Nonvolatile memories
- Yongkun Li, Patrick P. C. Lee, John C. S. Lui:
Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization. 179-190 - Benny Van Houdt:
A mean field model for a class of garbage collection algorithms in flash-based solid state drives. 191-202 - Myoungsoo Jung, Mahmut T. Kandemir:
Revisiting widely held SSD expectations and rethinking system-level implications. 203-216 - Marcelo Cintra, Niklas Linkewitsch:
Characterizing the impact of process variation on write endurance enhancing techniques for non-volatile memory systems. 217-228
On co-optimizing content placement and traffic routing
- Abhigyan Sharma, Arun Venkataramani, Ramesh K. Sitaraman:
Distributing content simplifies ISP traffic engineering. 229-242 - Vytautas Valancius, Bharath Ravi, Nick Feamster, Alex C. Snoeren:
Quantifying the benefits of joint content and network routing. 243-254
Computer architectures and systems
- Dilip Nijagal Simha, Tzi-cker Chiueh, Ganesh Karuppur Rajagopalan, Pallav Bose:
High-throughput low-latency fine-grained disk logging. 255-266 - Bogdan Marius Tudor, Yong Meng Teo:
On understanding the energy consumption of ARM-based multicore servers. 267-278 - Rathijit Sen, David A. Wood:
Reuse-based online models for caches. 279-292
Optimizing paths down a tree or a network
- Muhammad Shahzad, Alex X. Liu:
Probabilistic optimal tree hopping for RFID identification. 293-304 - Qiuyu Peng, Anwar Walid, Steven H. Low:
Multipath TCP algorithms: theory and design. 305-316 - Guang Tan, Zhimeng Yin, Hongbo Jiang:
Trap array: a unified model for scalability evaluation of geometric routing. 317-328
Poster session
- Lachlan L. H. Andrew, Siddharth Barman, Katrina Ligett, Minghong Lin, Adam Meyerson, Alan Roytman, Adam Wierman:
A tale of two metrics: simultaneous bounds on competitiveness and regret. 329-330 - Zhibin Yu, Lieven Eeckhout, Nilanjan Goswami, Tao Li, Lizy Kurian John, Hai Jin, Cheng-Zhong Xu:
Accelerating GPGPU architecture simulation. 331-332 - Di Wang, Chuangang Ren, Sriram Govindan, Anand Sivasubramaniam, Bhuvan Urgaonkar, Aman Kansal, Kushagra Vaid:
ACE: abstracting, characterizing and exploiting peaks and valleys in datacenter power consumption. 333-334 - Rahul Potharaju, Navendu Jain:
An empirical analysis of intra- and inter-datacenter network failures for geo-distributed services. 335-336 - Dorian Mazauric, Saleh Soltan, Gil Zussman:
Computational analysis of cascading failures in power networks. 337-338 - John C. Nelson, Jonathan Connell, Canturk Isci, Jonathan Lenchner:
Data center asset tracking using a mobile robot. 339-340 - Zhenhua Liu, Adam Wierman, Yuan Chen, Benjamin Razon, Niangjun Chen:
Data center demand response: avoiding the coincident peak via workload shifting and local generation. 341-342 - Juan Carlos Saez, Fernando Castro, Daniel Chaver, Manuel Prieto:
Delivering fairness and priority enforcement on asymmetric multicore systems via OS scheduling. 343-344 - Åke Arvidsson, Ying Zhang:
Detecting user dissatisfaction and understanding the underlying reasons. 345-346 - Deguang Kong, Guanhua Yan:
Discriminant malware distance learning on structuralinformation for automated malware classification. 347-348 - Enoch Peserico:
Elastic paging. 349-350 - Lingwen Gan, Na Li, Steven H. Low, Ufuk Topcu:
Exact convex relaxation for optimal power flow in distribution networks. 351-352 - Jaewook Kwak, Chul-Ho Lee, Do Young Eun:
Exploiting the past to reduce delay in CSMA scheduling: a high-order markov chain approach. 353-354 - Ignasi Paredes-Oliva, Pere Barlet-Ros, Xenofontas A. Dimitropoulos:
FaRNet: fast recognition of high multi-dimensional network traffic patterns. 355-356 - Yashar Ghiassi-Farrokhfal, Srinivasan Keshav, Catherine Rosenberg, Florin Ciucu:
Firming solar power. 357-358 - Yi Wang, Dongzhe Tai, Ting Zhang, Jianyuan Lu, Boyang Xu, Huichen Dai, Bin Liu:
Greedy name lookup for named data networking. 359-360 - Mian Dong, Tian Lan, Lin Zhong:
How does energy accounting matter for energy management? 361-362 - Sharayu Moharir, Sujay Sanghavi, Sanjay Shakkottai:
Online load balancing under graph constraints. 363-364 - Melanie Kambadur, Kui Tang, Joshua Lopez, Martha A. Kim:
Parallel scaling properties from a basic block view. 365-366 - Florin Ciucu, Felix Poloczek, Jens B. Schmitt:
Sharp bounds in stochastic network calculus. 367-368 - Ji Zhu, Stratis Ioannidis, Nidhi Hegde, Laurent Massoulié:
Stable and scalable universal swarms. 369-370 - Georgios S. Paschos, Leandros Tassiulas:
Sustainability of service provisioning systems under attack. 371-372 - Hong Xu, Chen Feng, Baochun Li:
Temperature aware workload management in geo-distributed datacenters. 373-374 - Ming Li, Andrey Lukyanenko, Sasu Tarkoma, Yong Cui, Antti Ylä-Jääski:
Tolerating path heterogeneity in multipath TCP with bounded receive buffers. 375-376 - Chen Dai, Chao Lv, Jiaxin Li, Weihua Zhang, Binyu Zang:
Understanding architectural characteristics of multimedia retrieval workloads. 377-378 - Athula Balachandran, Vyas Sekar, Aditya Akella, Srinivasan Seshan:
Understanding internet video viewing behavior in the wild. 379-380 - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:
Understanding SMS spam in a large cellular network. 381-382 - Srikanth Sundaresan, Nazanin Magharei, Nick Feamster, Renata Teixeira, Sam Crawford:
Web performance bottlenecks in broadband access networks. 383-384
Tutorials
- Marcos K. Aguilera:
Tutorial on geo-replication in data center applications. 385-386 - Jayakrishnan Nair, Adam Wierman, Bert Zwart:
The fundamentals of heavy-tails: properties, emergence, and identification. 387-388 - Jiri Schindler:
Profiling and analyzing the I/O performance of NoSQL DBs. 389-390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.