


default search action
SIGMETRICS Performance Evaluation Review, Volume 46
Volume 46, Number 1, June 2018
- Konstantinos Psounis, Aditya Akella, Adam Wierman:

Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2018, Irvine, CA, USA, June 18-22, 2018. ACM 2018 [contents]
Volume 46, Number 2, September 2018
- Mark S. Squillante:

Special Issue on The Workshop on MAthematical performance Modeling and Analysis (MAMA 2018). 2 - Hong Xie, John C. S. Lui:

A Markov Decision Process Approach to Analyze Discount & Reputation Trade-offs in E-commerce Systems. 3-5 - Yudong Yang, Vishal Misra, Dan Rubenstein:

A Modeling Approach to Classifying Malicious Cloud Users via Shuffling. 6-8 - Isaac Grosof

, Ziv Scully, Mor Harchol-Balter
:
SRPT for Multiserver Systems. 9-11 - Yorie Nakahira, Andrés Ferragut, Adam Wierman:

Minimal-variance distributed scheduling under strict demands and deadlines. 12-14 - Xin Liu, Lei Ying:

A Simple Steady-State Analysis of Load Balancing Algorithms in the Sub-Halfin-Whitt Regime. 15-17 - Debankur Mukherjee, Alexander L. Stolyar:

Join-Idle-Queue with Service Elasticity. 18-20 - Xiao Sun, Tan N. Le, Mosharaf Chowdhury, Zhenhua Liu:

Fair Allocation of Heterogeneous and InterchangeableResources. 21-23 - Urtzi Ayesta:

On redundancy-d with cancel-on-start a.k.a Join-shortest-work (d). 24-26 - Nitish K. Panigrahy, Prithwish Basu, Don Towsley

, Ananthram Swami, Kevin S. Chan, Kin K. Leung:
A queueing-theoretic model for resource allocation in one-dimensional distributed analytics network? 27-29 - Nicolas Gast, Diego Latella

, Mieke Massink:
A Refined Mean Field Approximation for Synchronous Population Processes. 30-32 - Seva Shneer, Alexander L. Stolyar:

Stability of a standard decentralised medium access. 33-35 - Anirudh Sabnis, Ramesh K. Sitaraman

, Donald F. Towsley
:
OCCAM: An Optimization Based Approach to Network Inference. 36-38 - Junjie Qin, Ram Rajagopal, Shai Vardi, Adam Wierman:

Convex Prophet Inequalities. 39-41 - Gautam Goel:

Smoothed Online Convex Optimization via Online Balanced Descent. 42-44 - Soumyadip Ghosh, Mark S. Squillante, Ebisa D. Wollega:

On Min-Max Optimization Over Large Data Sets. 45-47
- My T. Thai, Arunabha Sen, Arun Das:

ACM SIGMETRICS International Workshop on Critical Infrastructure Network Security. 48-49 - Saleh Soltan, Mihalis Yannakakis, Gil Zussman:

REACT to Cyber-Physical Attacks on Power grids (Extended Abstract). 50-51 - Linan Huang

, Quanyan Zhu:
Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks. 52-56 - Linqi Guo, Chen Liang, Alessandro Zocca

, Steven H. Low, Adam Wierman:
Failure Localization in Power Systems via Tree Partitions. 57-61 - Jorik Oostenbrink, Fernando A. Kuipers, Poul E. Heegaard

, Bjarne E. Helvik
:
Evaluating Local Disaster Recovery Strategies. 62-66 - Hana Khamfroush, Samuel Lofumbwa Iloo, Mahshid Rahnamay-Naeini:

Vulnerability of Interdependent Infrastructures Under Random Attacks. 67-71 - Andjelka Kelic:

Cyber Risk in Critical Infrastructure. 72-75
- Zhenhua Liu, Ganesh Ananthanarayanan:

Special Issue on the Work-in-Progress (WIP) session at the ACM SIGMETRICS 2018 Conference. 76 - Tan N. Le, Xiao Sun, Mosharaf Chowdhury, Zhenhua Liu:

BoPF: Mitigating the Burstiness-Fairness Tradeoff in Multi-Resource Clusters. 77-78 - Linqi Guo, Chen Liang, Alessandro Zocca

, Steven H. Low, Adam Wierman:
Failure Localization in Power Systems via Tree Partitions. 79-80 - Daniela Hurtado-Lange

, Siva Theja Maguluri:
A Novel View of the Drift: Method for Heavy Traffic Limits of Queueing Systems. 81-82 - Yichen Ruan, Carlee Joe-Wong:

On the Economic Value of Vehicular Caching. 83-84 - Junjie Qin, Ram Rajagopal, Shai Vardi, Adam Wierman:

Convex Prophet Inequalities. 85-86 - Tan N. Le, Xiao Sun, Mosharaf Chowdhury, Zhenhua Liu:

AlloX: Allocation across Computing Resources for Hybrid CPU/GPU clusters. 87-88 - Jinhang Zuo, Xiaoxi Zhang, Carlee Joe-Wong:

Observe Before Play: Multi-armed Bandit with Pre-Observations. 89-90 - Justin Wang, Benjamin Berg, Daniel S. Berger, Siddhartha Sen:

Maximizing Page-Level Cache Hit Ratios in LargeWeb Services. 91-92 - Zhihui Shao, Mohammad A. Islam

, Shaolei Ren
:
A First Look at Thermal Attacks in Multi-Tenant Data Centers. 93-94 - Shan-Hsiang Shen:

An Efficient Network Monitor for SDN Networks. 95-96
Volume 46, Number 3, December 2018
- Leandros Tassiulas:

Optimizing the network edge for flexible service provisioning. 1
- Weina Wang, Mor Harchol-Balter

, Haotian Jiang, Alan Scheller-Wolf, R. Srikant:
Delay Asymptotics and Bounds for Multi-Task Parallel Jobs. 2-7 - Isaac Grosof

, Ziv Scully, Mor Harchol-Balter
:
SRPT for Multiserver Systems. 8-9 - Xingyu Zhou, Jian Tan, Ness B. Shroff:

Flexible Load Balancing with Multi-dimensional State-space Collapse: Throughput and Heavy-traffic Delay Optimality. 10-11
- Livia Elena Chatzieleftheriou

, George Darzanos, Merkourios Karaliopoulos, Iordanis Koutsopoulos:
Joint User Association, Content Caching and Recommendations in Wireless Edge Networks. 12-17 - Yung Fei Wong, Lachlan L. H. Andrew, Y. Ahmet Sekercioglu:

Hidden semi-Markov models for electricity load disaggregation. 18-23 - Arash Molavi Kakhki, Vijay Erramilli, Phillipa Gill, Augustin Chaintreau, Balachander Krishnamurthy:

Information Market for Web Browsing: Design, Usability and Incremental Adoption. 24
- Nicolas Gast, Luca Bortolussi

, Mirco Tribastone:
Size Expansions of Mean Field Approximation: Transient and Steady-State Analysis. 25-26 - Paola Bermolen

, Matthieu Jonckheere
, Federico Larroca, Manuel Sáenz:
Degree-Greedy Algorithms on Large Random Graphs. 27-32 - Moeko Yajima, Tuan Phung-Duc

:
A central limit theorem for a Markov-modulated infinite-server queue with batch Poisson arrivals and binomial catastrophes. 33-34
- Lianjie Shi, Xin Wang, Richard T. B. Ma

, Y. C. Tay:
Weighted Fair Caching: Occupancy-Centric Allocation for Space-Shared Resources. 35-36 - Niklas Carlsson, Derek L. Eager:

Worst-case Bounds and Optimized Cache on Mth Request Cache Insertion Policies under Elastic Conditions. 37-38 - Fan Ni, Xingbo Wu, Weijun Li, Lei Wang, Song Jiang:

WOJ: Enabling Write-Once Full-data Journaling in SSDs by Using Weak-Hashing-based Deduplication. 39-40
- Stéphane Durand, Federica Garin, Bruno Gaujal:

Efficiency of Best Response Dynamics with High Playing Rates in Potential Games. 41-42 - Ayman Chouayakh, Aurélien Bechler, Isabel Amigo, Loutfi Nuaymi, Patrick Maillé

:
Auction mechanisms for Licensed Shared Access: reserve prices and revenue-fairness trade offs. 43-48 - Mao Zou, Richard T. B. Ma

, Yinlong Xu:
Towards An Efficient Market Mediator for Divisible Resources. 49-50
- Patrick Thiran:

Locating the Source of Diffusion in Large-scale and Random Networks. 51
- Alessandro Zocca

:
Temporal starvation in multi-channel CSMA networks: an analytical framework. 52-53 - Thirupathaiah Vasantam, Arpan Mukhopadhyay, Ravi R. Mazumdar

:
The Mean-field Behavior of Processor Sharing Systems with General Job Lengths Under the SQ(d) Policy. 54-55 - Yorie Nakahira, Andrés Ferragut, Adam Wierman:

Minimal-Variance Distributed Deadline Scheduling in a Stationary Environment. 56-61
- Martin Zeballos, Andrés Ferragut, Fernando Paganini:

Achieving fairness for EV charging in overload: a fluid approach. 62-67 - Eduardo M. Hargreaves, Claudio Agosti, Daniel Sadoc Menasché, Giovanni Neglia, Alexandre Reiffers-Masson, Eitan Altman:

Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design. 68-69 - Julien Floquet, Richard Combes, Zwi Altman:

Hierarchical Beamforming: Resource Allocation, Fairness and Flow Level Performance. 70-71
- Youri Raaijmakers

, Sem C. Borst, Onno J. Boxma:
Delta probing policies for redundancy. 72-73 - Tim Hellemans, Benny Van Houdt:

Analysis of Redundancy(d) with Identical Replicas. 74-79 - Urtzi Ayesta, Tejas Bodas

, Ina Maria Verloop:
On a unifying product form framework for redundancy models. 80-81
- Catherine Rosenberg:

Highlight Talk on Battery Modeling: Trade-offs between Accuracy and Complexity. 82-83 - Omid Ardakanian

:
Leveraging Sparsity in Distribution Grids: System Identification and Harmonic State Estimation. 84-85 - Dominik Danner

, Hermann de Meer:
State Estimation in the Power Distribution System. 86-88 - Benoît Vinot

, Florent Cadoux, Nicolas Gast:
Congestion Avoidance in Low-Voltage Networks by using the Advanced Metering Infrastructure. 89-91 - Yujie Tang, Emiliano Dall'Anese, Andrey Bernstein, Steven H. Low:

A Primal-Dual Gradient Method for Time-Varying Optimization with Application to Power Systems. 92
- Nader Alagha:

Satellite Air Interface Evolutions in the 5G and IoT Era. 93-95 - Maria Rita Palattella

, Ridha Soua, André Stemper, Thomas Engel
:
Aggregation of MQTT Topics over Integrated Satellite-Terrestrial Networks. 96-97 - Doanh Kim Luong, Muhammad Ali, Fouad Benamrane, Ibrahim Ammar, Yim-Fun Hu:

Seamless handover for video streaming over an SDN-based Aeronautical Communications Network. 98-99 - Joan Bas

, Màrius Caus
, Ana Pérez, M. Reza Soleymani, Nazli Ahmad Khan Beigi:
Interference Management Schemes for High Spectral Efficiency Satellite Communications. 100-103 - Julio A. Medina-Caballero, M. Angeles Vazquez-Castro

:
Link Quality Optimization for Hybrid LEO-GSO Systems. 104-107 - Philip Michael Asuquo, Haitham S. Cruickshank, Chibueze P. Anyigor Ogah:

Securing Emergency Communications for the Next-Generation Networks: Performance Analysis of Distributed Trust Computing for Future Emergency Communications. 108-111 - Nicolas Kuhn:

Research trends in SATCOM. 112
- Aad van Moorsel:

Benchmarks and Models for Blockchain: Consensus Algorithms. 113 - Eitan Altman, Alexandre Reiffers, Daniel Sadoc Menasché, Mandar Datar, Swapnil Dhamal

, Corinne Touati:
Mining competition in a multi-cryptocurrency ecosystem at the network edge: a congestion game approach. 114-117 - Manuel Zander, Tom Waite, Dominik Harz:

DAGsim: Simulation of DAG-based distributed ledger protocols. 118-121 - Saulo Ricci, Eduardo Ferreira, Daniel Sadoc Menasché, Artur Ziviani, José Eduardo de Souza, Alex Borges Vieira:

Learning Blockchain Delays: A Queueing Theory Approach. 122-125 - Cyril Grunspan, Ricardo Pérez-Marco:

On profitability of block withholding strategies. 126 - Francesco Bruschi, Vincenzo Rana

, Lorenzo Gentile
, Donatella Sciuto:
Mine with it or sell it: the superhashing power dilemma. 127-130 - Nico Smuts:

What Drives Cryptocurrency Prices?: An Investigation of Google Trends and Telegram Sentiment. 131-134 - Maher Alharby

, Aad van Moorsel:
BlockSim: A Simulation Framework for Blockchain Systems. 135-138
- Vladyslav Fedchenko, Giovanni Neglia, Bruno Ribeiro

:
Feedforward Neural Networks for Caching: n Enough or Too Much? 139-142 - Martino Trevisan, Idilio Drago:

Robust URL Classification With Generative Adversarial Networks. 143-146 - Gonzalo Marín, Pedro Casas, Germán Capdehourat

:
DeepSec meets RawPower - Deep Learning for Detection of Network Attacks Using Raw Representations. 147-150 - Michal Piskozub, Riccardo Spolaor, Ivan Martinovic:

MalAlert: Detecting Malware in Large-Scale Network Traffic Using Statistical Features. 151-154 - Sarah Wassermann, Nikolas Wehner, Pedro Casas:

Machine Learning Models for YouTube QoE and User Engagement Prediction in Smartphones. 155-158 - Gaetano Manzo, Juan Sebastian Otálora Montenegro, Marco Ajmone Marsan, Gianluca Rizzo

:
A Deep Learning Strategy for Vehicular Floating Content Management. 159-162 - Rui Li, Chaoyun Zhang, Paul Patras

, Razvan Stanica, Fabrice Valois:
Learning Driven Mobility Control of Airborne Base Stations in Emergency Networks. 163-166 - Johan Garcia, Topi Korhonen:

On Runtime and Classification Performance of the Discretize-Optimize (DISCO) Classification Approach. 167-170 - Manjesh Kumar Hanawal, Sumit Jagdish Darak

:
Distributed Learning in Ad-Hoc Networks with Unknown Number of Players. 171-174
Volume 46, Number 4, March 2019
- Ranjan Pal, Aditya Ahuja, Sung-Han Lin, Abhishek Kumar

, Leana Golubchik, Nachikethas A. Jagadeesan:
On the Economic Sustainability of Cloud Sharing Systems Are Dynamic Single Resource Sharing Markets Stable? 2-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














