default search action
SIGMETRICS 2005: Banff, Alberta, Canada
- Derek L. Eager, Carey L. Williamson, Sem C. Borst, John C. S. Lui:
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada. ACM 2005, ISBN 1-59593-022-1 - Urs Hölzle:
Google: or how I learned to love terabytes. 1
Peer-to-peer networks
- Laurent Massoulié, Milan Vojnovic:
Coupon replication systems. 2-13 - Chunqiang Tang, Melissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, Christopher Ward:
Low traffic overlay networks with large routing tables. 14-25 - Derek Leonard, Vivek Rai, Dmitri Loguinov:
On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. 26-37 - Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel:
Denial-of-service resilience in peer-to-peer file sharing systems. 38-49
Traffic measurement & classification
- Andrew W. Moore, Denis Zuev:
Internet traffic classification using bayesian analysis techniques. 50-60 - Abhishek Kumar, Minho Sung, Jun (Jim) Xu, Ellen W. Zegura:
A data streaming algorithm for estimating subpopulation flow size distribution. 61-72 - Edith Cohen, Carsten Lund:
Packet classification in large ISPs: design and evaluation of decision tree classifiers. 73-84 - Ken Keys, David Moore, Cristian Estan:
A robust system for accurate real-time summaries of internet traffic. 85-96
Wireless
- Sunwoong Choi, Kihong Park, Chong-kwon Kim:
On the performance characteristics of WLANs: revisited. 97-108 - Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman:
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness, multistability and throughput differentiation. 109-120 - Christoph Lindemann, Oliver P. Waldhorst:
Modeling epidemic information dissemination on mobile devices with finite buffers. 121-132 - V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:
Algorithmic aspects of capacity in wireless networks. 133-144
Caching & file systems
- Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer:
Empirical evaluation of multi-level buffer cache collaboration for storage systems. 145-156 - Ali Raza Butt, Chris Gniady, Y. Charlie Hu:
The performance impact of kernel prefetching on buffer cache replacement algorithms. 157-168 - Erik Berg, Erik Hagersten:
Fast data-locality profiling of native execution. 169-180 - Kamen Yotov, Keshav Pingali, Paul Stodghill:
Automatic measurement of memory hierarchy parameters. 181-192
Bandwidth sharing & scheduling
- Matthieu Jonckheere, Jorma T. Virtamo:
Optimal insensitive routing and bandwidth sharing in simple data networks. 193-204 - Adam Wierman, Mor Harchol-Balter, Takayuki Osogami:
Nearly insensitive bounds on SMART scheduling. 205-216 - Abdesselem Kortebi, Luca Muscariello, Sara Oueslati, James W. Roberts:
Evaluating the number of active flows in a scheduler realizing fair statistical bandwidth sharing. 217-228 - Adam Wierman, Mor Harchol-Balter:
Classifying scheduling policies with respect to higher moments of conditional response time. 229-240
Network performance measurements
- Hao Jiang, Constantinos Dovrolis:
Why is the internet traffic bursty in short time scales? 241-252 - Matthew Roughan:
Fundamental bounds on the accuracy of network performance measurements. 253-264 - Manish Jain, Constantinos Dovrolis:
End-to-end estimation of the available bandwidth variation range. 265-276
Hot topic session
- Mung Chiang, Steven H. Low:
Optimization and Control of Communication Networks. 277 - Mung Chiang, Jang-Won Lee, A. Robert Calderbank, Daniel Pérez Palomar, Maryam Fazel:
Network utility maximization with nonconcave, coupled, and reliability-based uilities. 277 - Steven H. Low, John Doyle, Lun Li, Ao Tang, Jiantao Wang:
Optimization model of internet protocols. 277 - Debasis Mitra:
Joint pricing-network design and stochastic traffic engineering to manage demand uncertainty. 278 - Ness B. Shroff, Xiaojun Lin:
An optimization based approach for cross-layer design in wireless communication networks. 278 - John Musacchio, Jean C. Walrand:
Achieving fair rates with ingress policing. 278
Network & server performance evaluation
- Florin Ciucu, Almut Burchard, Jörg Liebeherr:
A network service curve approach for the stochastic analysis of networks. 279-290 - Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. Shenoy, Mike Spreitzer, Asser N. Tantawi:
An analytical model for multi-tier internet services and its applications. 291-302 - Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubramaniam, Qian Wang, Natarajan Gautam:
Managing server energy and operational costs in hosting centers. 303-314 - Yaoping Ruan, Vivek S. Pai, Erich M. Nahum, John M. Tracey:
Evaluating the impact of simultaneous multithreading on network servers using real hardware. 315-326
Traffic estimation & topology inference
- Benoit Donnet, Philippe Raoult, Timur Friedman, Mark Crovella:
Efficient algorithms for large-scale topology discovery. 327-338 - Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang:
On AS-level path inference. 339-349 - Qi Zhao, Abhishek Kumar, Jia Wang, Jun (Jim) Xu:
Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices. 350-361 - Augustin Soule, Anukool Lakhina, Nina Taft, Konstantina Papagiannaki, Kavé Salamatian, Antonio Nucci, Mark Crovella, Christophe Diot:
Traffic matrices: balancing measurements, inference and modeling. 362-373
Posters
- Saurabh Ganeriwal, Deepak Ganesan, Mark H. Hansen, Mani B. Srivastava, Deborah Estrin:
Rate-adaptive time synchronization for long-lived sensor networks. 374-375 - An-I Wang, Peter L. Reiher, Geoffrey H. Kuenning:
Introducing permuted states for analyzing conflict rates in optimistic replication. 376-377 - James W. Mickens, Brian D. Noble:
Predicting node availability in peer-to-peer networks. 378-379 - Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou:
Troubleshooting multihop wireless networks. 380-381 - David Raz, Benjamin Avi-Itzhak, Hanoch Levy:
Fair operation of multi-server and multi-queue systems. 382-383 - Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:
Deadline scheduling for animation rendering. 384-385 - Simin He, Shutao Sun, Wei Zhao, Yanfeng Zheng, Wen Gao:
Smooth switching problem in buffered crossbar switches. 386-387 - Qi He, Constantinos Dovrolis, Mostafa H. Ammar:
Prediction of TCP throughput: formula-based and history-based methods. 388-389 - David B. Chua, Eric D. Kolaczyk, Mark Crovella:
A statistical framework for efficient monitoring of end-to-end network properties. 390-391 - Ningning Zhu, Jiawu Chen, Tzi-cker Chiueh, Daniel Ellard:
TBBT: scalable and accurate trace replay for file server evaluation. 392-393 - Sandeep Sarat, Vasileios Pappas, Andreas Terzis:
On the use of anycast in DNS. 394-395 - Jayaram Mudigonda, Harrick M. Vin, Raj Yavatkar:
Managing memory access latency in packet processing. 396-397 - Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan:
Some observations on bitTorrent performance. 398-399 - Sridhar Machiraju, Darryl Veitch, François Baccelli, Antonio Nucci, Jean Bolot:
Theory and practice of cross-traffic estimation. 400-401 - Daniel Stutzbach, Reza Rejaie:
Characterizing the two-tier gnutella topology. 402-403 - Saurabh Tewari, Leonard Kleinrock:
Analysis of search and replication in unstructured peer-to-peer networks. 404-405 - Jianyong Zhang, Anand Sivasubramaniam, Alma Riska, Qian Wang, Erik Riedel:
An interposed 2-Level I/O scheduling framework for performance virtualization. 406-407 - Thomas F. Wenisch, Roland E. Wunderlich, Babak Falsafi, James C. Hoe:
TurboSMARTS: accurate microarchitecture simulation sampling in minutes. 408-409 - Chunyu Hu, Jennifer C. Hou:
A reactive channel model for expediting wireless network simulation. 410-411 - Robin Groenevelt, Philippe Nain, Ger Koole:
Message delay in MANET. 412-413
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.