


default search action
SIGMETRICS 2013: Pittsburgh, PA, USA
- Mor Harchol-Balter, John R. Douceur, Jun Xu:

ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '13, Pittsburgh, PA, USA, June 17-21, 2013. ACM 2013, ISBN 978-1-4503-1900-3
Keynote addresses
- Balaji Prabhakar:

Designing large-scale nudge engines. 1-2 - David A. Maltz:

Challenges in cloud scale data centers. 3-4
WiFi and cellular networks
- Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao, Haitao Zheng:

Practical conflict graphs for dynamic spectrum distribution. 5-16 - Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang:

A first look at cellular network performance during crowded events. 17-28 - Ning Ding, Daniel T. Wagner, Xiaomeng Chen, Y. Charlie Hu, Andrew C. Rice:

Characterizing and modeling the impact of wireless signal strength on smartphone battery drain. 29-40
Resource allocation and generation
- Alexander L. Stolyar, Yuan Zhong:

A large-scale service system with packing constraints: minimizing the number of occupied servers. 41-52 - Lian Lu, Jinlong Tu, Chi-Kin Chau

, Minghua Chen
, Xiaojun Lin:
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation. 53-66 - Ganesha Shanmuganathan, Ajay Gulati, Peter J. Varman:

Defragmenting the cloud using demand-based resource allocation. 67-80
Applications of machine learning
- David R. Karger

, Sewoong Oh, Devavrat Shah:
Efficient crowdsourcing for multi-class labeling. 81-92 - Myunghwan Kim, Roshan Sumbaly, Sam Shah:

Root cause detection in a service-oriented architecture. 93-104 - Aaron D. Jaggard

, Swara Kopparty, Vijay Ramachandran, Rebecca N. Wright:
The design space of probing algorithms for network-performance measurement. 105-116
MAC and wireless access networks
- Niek Bouman, Sem C. Borst, Johan van Leeuwaarden:

Delays and mixing times in random-access networks. 117-128 - Fabio Cecchi

, Peter Jacko
:
Scheduling of users with markovian time-varying transmission rates. 129-140 - Florian Simatos, Niek Bouman, Sem C. Borst:

Lingering issues in distributed scheduling. 141-152
Queueing theory
- Anshul Gandhi, Sherwin Doroudi

, Mor Harchol-Balter
, Alan Scheller-Wolf:
Exact analysis of the M/M/k/setup class of Markov chains via recursive renewal reward. 153-166 - John N. Tsitsiklis, Kuang Xu:

Queueing system topologies with limited flexibility. 167-178
Nonvolatile memories
- Yongkun Li, Patrick P. C. Lee

, John C. S. Lui:
Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization. 179-190 - Benny Van Houdt:

A mean field model for a class of garbage collection algorithms in flash-based solid state drives. 191-202 - Myoungsoo Jung, Mahmut T. Kandemir:

Revisiting widely held SSD expectations and rethinking system-level implications. 203-216 - Marcelo Cintra, Niklas Linkewitsch:

Characterizing the impact of process variation on write endurance enhancing techniques for non-volatile memory systems. 217-228
On co-optimizing content placement and traffic routing
- Abhigyan Sharma, Arun Venkataramani, Ramesh K. Sitaraman

:
Distributing content simplifies ISP traffic engineering. 229-242 - Vytautas Valancius, Bharath Ravi, Nick Feamster, Alex C. Snoeren:

Quantifying the benefits of joint content and network routing. 243-254
Computer architectures and systems
- Dilip Nijagal Simha, Tzi-cker Chiueh, Ganesh Karuppur Rajagopalan, Pallav Bose:

High-throughput low-latency fine-grained disk logging. 255-266 - Bogdan Marius Tudor, Yong Meng Teo

:
On understanding the energy consumption of ARM-based multicore servers. 267-278 - Rathijit Sen, David A. Wood:

Reuse-based online models for caches. 279-292
Optimizing paths down a tree or a network
- Muhammad Shahzad, Alex X. Liu:

Probabilistic optimal tree hopping for RFID identification. 293-304 - Qiuyu Peng, Anwar Walid, Steven H. Low:

Multipath TCP algorithms: theory and design. 305-316 - Guang Tan, Zhimeng Yin, Hongbo Jiang:

Trap array: a unified model for scalability evaluation of geometric routing. 317-328
Poster session
- Lachlan L. H. Andrew, Siddharth Barman, Katrina Ligett, Minghong Lin, Adam Meyerson, Alan Roytman, Adam Wierman:

A tale of two metrics: simultaneous bounds on competitiveness and regret. 329-330 - Zhibin Yu, Lieven Eeckhout, Nilanjan Goswami, Tao Li, Lizy Kurian John, Hai Jin, Cheng-Zhong Xu

:
Accelerating GPGPU architecture simulation. 331-332 - Di Wang, Chuangang Ren, Sriram Govindan, Anand Sivasubramaniam, Bhuvan Urgaonkar, Aman Kansal, Kushagra Vaid:

ACE: abstracting, characterizing and exploiting peaks and valleys in datacenter power consumption. 333-334 - Rahul Potharaju, Navendu Jain:

An empirical analysis of intra- and inter-datacenter network failures for geo-distributed services. 335-336 - Dorian Mazauric, Saleh Soltan, Gil Zussman:

Computational analysis of cascading failures in power networks. 337-338 - John C. Nelson, Jonathan Connell, Canturk Isci, Jonathan Lenchner:

Data center asset tracking using a mobile robot. 339-340 - Zhenhua Liu, Adam Wierman, Yuan Chen, Benjamin Razon, Niangjun Chen:

Data center demand response: avoiding the coincident peak via workload shifting and local generation. 341-342 - Juan Carlos Saez

, Fernando Castro
, Daniel Chaver
, Manuel Prieto
:
Delivering fairness and priority enforcement on asymmetric multicore systems via OS scheduling. 343-344 - Åke Arvidsson, Ying Zhang:

Detecting user dissatisfaction and understanding the underlying reasons. 345-346 - Deguang Kong, Guanhua Yan:

Discriminant malware distance learning on structuralinformation for automated malware classification. 347-348 - Enoch Peserico:

Elastic paging. 349-350 - Lingwen Gan, Na Li, Steven H. Low, Ufuk Topcu

:
Exact convex relaxation for optimal power flow in distribution networks. 351-352 - Jaewook Kwak, Chul-Ho Lee, Do Young Eun

:
Exploiting the past to reduce delay in CSMA scheduling: a high-order markov chain approach. 353-354 - Ignasi Paredes-Oliva, Pere Barlet-Ros

, Xenofontas A. Dimitropoulos:
FaRNet: fast recognition of high multi-dimensional network traffic patterns. 355-356 - Yashar Ghiassi-Farrokhfal, Srinivasan Keshav

, Catherine Rosenberg, Florin Ciucu:
Firming solar power. 357-358 - Yi Wang, Dongzhe Tai, Ting Zhang, Jianyuan Lu, Boyang Xu, Huichen Dai, Bin Liu:

Greedy name lookup for named data networking. 359-360 - Mian Dong, Tian Lan, Lin Zhong:

How does energy accounting matter for energy management? 361-362 - Sharayu Moharir, Sujay Sanghavi, Sanjay Shakkottai:

Online load balancing under graph constraints. 363-364 - Melanie Kambadur, Kui Tang, Joshua Lopez, Martha A. Kim

:
Parallel scaling properties from a basic block view. 365-366 - Florin Ciucu, Felix Poloczek, Jens B. Schmitt:

Sharp bounds in stochastic network calculus. 367-368 - Ji Zhu, Stratis Ioannidis

, Nidhi Hegde, Laurent Massoulié:
Stable and scalable universal swarms. 369-370 - Georgios S. Paschos, Leandros Tassiulas:

Sustainability of service provisioning systems under attack. 371-372 - Hong Xu

, Chen Feng
, Baochun Li:
Temperature aware workload management in geo-distributed datacenters. 373-374 - Ming Li, Andrey Lukyanenko, Sasu Tarkoma

, Yong Cui, Antti Ylä-Jääski:
Tolerating path heterogeneity in multipath TCP with bounded receive buffers. 375-376 - Chen Dai, Chao Lv, Jiaxin Li, Weihua Zhang, Binyu Zang:

Understanding architectural characteristics of multimedia retrieval workloads. 377-378 - Athula Balachandran, Vyas Sekar, Aditya Akella, Srinivasan Seshan

:
Understanding internet video viewing behavior in the wild. 379-380 - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:

Understanding SMS spam in a large cellular network. 381-382 - Srikanth Sundaresan, Nazanin Magharei, Nick Feamster, Renata Teixeira, Sam Crawford:

Web performance bottlenecks in broadband access networks. 383-384
Tutorials
- Marcos K. Aguilera:

Tutorial on geo-replication in data center applications. 385-386 - Jayakrishnan Nair, Adam Wierman, Bert Zwart:

The fundamentals of heavy-tails: properties, emergence, and identification. 387-388 - Jiri Schindler:

Profiling and analyzing the I/O performance of NoSQL DBs. 389-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














