


default search action
SIGMETRICS 2020: Boston, MA, USA
- Edmund Yeh, Athina Markopoulou, Y. C. Tay:

Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, Boston, MA, USA, June, 8-12, 2020. ACM 2020, ISBN 978-1-4503-7985-4
Online Optimization
- Siddhartha Banerjee, Daniel Freund

:
Uniform Loss Algorithms for Online Stochastic Decision-Making With Applications to Bin Packing. 1-2 - Xiaohan Wei, Hao Yu, Michael J. Neely:

Online Primal-Dual Mirror Descent under Stochastic Constraints. 3-4 - Sungjin Im, Benjamin Moseley, Kamesh Munagala, Kirk Pruhs:

Dynamic Weighted Fairness with Minimal Disruptions. 5-6 - Lin Yang, Mohammad Hassan Hajiesmaili, Ramesh K. Sitaraman

, Adam Wierman, Enrique Mallada
, Wing Shing Wong:
Online Linear Optimization with Inventory Management Constraints. 7 - Yiheng Lin

, Gautam Goel, Adam Wierman:
Online Optimization with Predictions and Non-convex Losses. 9-10 - Xiaoqi Tan, Bo Sun

, Alberto Leon-Garcia, Yuan Wu, Danny H. K. Tsang:
Mechanism Design for Online Resource Allocation: A Unified Approach. 11-12 - Reza Alijani, Siddhartha Banerjee, Sreenivas Gollapudi, Kamesh Munagala, Kangning Wang

:
Predict and Match: Prophet Inequalities with Uncertain Supply. 13-14 - Rajarshi Bhattacharjee, Subhankar Banerjee, Abhishek Sinha:

Fundamental Limits on the Regret of Online Network-Caching. 15-16
Learning
- Sean R. Sinclair

, Siddhartha Banerjee, Christina Lee Yu:
Adaptive Discretization for Episodic Reinforcement Learning in Metric Spaces. 17-18 - Atakan Aral

, Melike Erol-Kantarci, Ivona Brandic:
Staleness Control for Edge Data Analytics. 19-20 - Sinong Wang, Jiashang Liu, Ness B. Shroff:

Fundamental Limits of Approximate Gradient Coding. 21-22 - Michael Fleder, Devavrat Shah:

Forecasting with Alternative Data. 23-24 - Fan Fred Lin, Keyur Muzumdar, Nikolay Pavlovich Laptev, Mihai-Valentin Curelea, Seunghak Lee, Sriram Sankar:

Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service Environment. 25-26 - Francesco Bronzino

, Paul Schmitt, Sara Ayoubi, Guilherme Martins, Renata Teixeira, Nick Feamster:
Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience. 27-28 - Abishek Sankararaman, Ayalvadi Ganesh, Sanjay Shakkottai:

Social Learning in Multi Agent Multi Armed Bandits. 29-30 - Devavrat Shah, Qiaomin Xie, Zhi Xu:

Non-Asymptotic Analysis of Monte Carlo Tree Search. 31-32
Scheduling +
- Daniela Hurtado-Lange

, Siva Theja Maguluri:
Heavy-traffic Analysis of the Generalized Switch under Multidimensional State Space Collapse. 33-34 - Ziv Scully, Lucas van Kreveld, Onno J. Boxma, Jan-Pieter L. Dorsman, Adam Wierman:

Characterizing Policies with Optimal Response Time Tails under Heavy-Tailed Job Sizes. 35-36 - Ziv Scully, Mor Harchol-Balter

, Alan Scheller-Wolf:
Simple Near-Optimal Scheduling for the M/G/1. 37-38 - Martin Zubeldia:

Delay-Optimal Policies in Partial Fork-Join Systems with Redundancy and Random Slowdowns. 39-40 - Illés Antal Horváth, Ziv Scully, Benny Van Houdt:

Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing Servers. 41-42 - Zhenjie Yang, Yong Cui, Shihan Xiao, Xin Wang, Minming Li

, Chuming Li, Yadong Liu:
Achieving Efficient Routing in Reconfigurable DCNs. 43-44
Networking
- Xinzhe Fu, Eytan H. Modiano:

Fundamental Limits of Volume-based Network DoS Attacks. 45-46 - Chen Avin, Manya Ghobadi, Chen Griner, Stefan Schmid

:
On the Complexity of Traffic Traces and Implications. 47-48 - Philippe Nain, Gayane Vardoyan

, Saikat Guha, Don Towsley
:
On the Analysis of a Multipartite Entanglement Distribution Switch. 49-50 - Ludovic Thomas, Jean-Yves Le Boudec:

On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks. 51-52 - Yiyang Chang, Chuan Jiang, Ashish Chandra

, Sanjay G. Rao, Mohit Tawarmalani
:
Lancet: Better network resilience by designing for pruned failure sets. 53-54 - Alexander Marder, Matthew J. Luckie, Bradley Huffaker, K. C. Claffy

:
vrfinder: Finding Outbound Addresses in Traceroute. 55-56 - Shouqian Shi, Chen Qian:

Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems. 57-58
Network Measurement
- Ayush Mishra, Xiangpeng Sun, Atishya Jain, Sameer Pande, Raj Joshi, Ben Leong

:
The Great Internet TCP Congestion Control Census. 59-60 - Nikita Ivkin, Ran Ben Basat, Zaoxing Liu, Gil Einziger, Roy Friedman, Vladimir Braverman:

I Know What You Did Last Summer: Network Monitoring using Interval Queries. 61-62 - You Zhou, Youlin Zhang, Chaoyi Ma, Shigang Chen, Olufemi O. Odegbile:

Generalized Sketch Families for Network Traffic Measurement. 63-64 - Yibo Pi, Sugih Jamin, Peter B. Danzig, Feng Qian:

Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View. 65-66 - Jordi Ros-Giralt, Atul Bohara, Sruthi Yellamraju, Harper Langston, Richard Lethin, Yuang Jiang, Leandros Tassiulas, Josie Li, Yuanlong Tan, Malathi Veeraraghavan:

On the Bottleneck Structure of Congestion-Controlled Networks. 67-68 - Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:

Characterizing Transnational Internet Performance and the Great Bottleneck of China. 69-70
Privacy&Blockchain
- Aditya Gopalan, Abishek Sankararaman, Anwar Walid, Sriram Vishwanath:

Stability and Scalability of Blockchain Systems. 71-72 - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:

Measuring Membership Privacy on Aggregate Location Time-Series. 73-74 - Peter Snyder, Antoine Vastel, Ben Livshits:

Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. 75-76 - Jinke Song, Qiang Li, Haining Wang, Limin Sun:

Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. 77-78 - Zhihui Shao, Mohammad A. Islam

, Shaolei Ren:
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers. 79-80 - Weizhao Tang, Weina Wang, Giulia Fanti, Sewoong Oh:

Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks. 81-82 - Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu

, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. 83-84
Systems - Various Topics
- Lei Zhang, Reza Karimi

, Irfan Ahmad, Ymir Vigfusson:
Optimal Data Placement for Heterogeneous Cache, Memory, and Storage Systems. 85-86 - Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu:

Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating. 87-88 - Martin Karsten, Saman Barghi:

User-level Threading: Have Your Cake and Eat It Too. 89-90 - Seyed Armin Vakil-Ghahani

, Mahmut Taylan Kandemir, Jagadish B. Kotra:
DSM: A Case for Hardware-Assisted Merging of DRAM Rows with Same Content. 91-92 - Chun-Yi Liu, Jagadish Kotra, Myoungsoo Jung, Mahmut Taylan Kandemir:

Centaur: A Novel Architecture for Reliable, Low-Wear, High-Density 3D NAND Storage. 93-94
Theory - Various Topics
- Ankur Mallick, Malhar Chaudhari, Utsav Sheth, Ganesh Palanikumar, Gauri Joshi:

Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector Multiplication. 95-96 - Palma London, Shai Vardi, Adam Wierman:

Logarithmic Communication for Distributed Optimization in Multi-Agent Systems. 97-98 - Daniel Cullina

, Negar Kiyavash, Prateek Mittal, H. Vincent Poor:
Partial Recovery of Erdős-Rényi Graph Alignment via k-Core Alignment. 99-100 - Vishwaraj Doshi, Do Young Eun

:
Fiedler Vector Approximation via Interacting Random Walks. 101-102 - Yang Cai

, Federico Echenique, Hu Fu, Katrina Ligett, Adam Wierman, Juba Ziani:
Third-Party Data Providers Ruin Simple Mechanisms. 103 - Sushil Mahavir Varma, Pornpawee Bumpensanti, Siva Theja Maguluri, He Wang:

Dynamic Pricing and Matching for Two-Sided Queues. 105-106 - Richard Combes, Alexandre Proutière, Alexandre Fauquette:

Unimodal Bandits with Continuous Arms: Order-optimal Regret without Smoothness. 107-108 - Erik Tillberg, Peter Marbach, Ravi Mazumdar:

Optimal Bidding Strategies for Online Ad Auctions with Overlapping Targeting Criteria. 109-110

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














