


default search action
SIGMETRICS 2005: Banff, Alberta, Canada
- Derek L. Eager, Carey L. Williamson, Sem C. Borst, John C. S. Lui:

Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada. ACM 2005, ISBN 1-59593-022-1 - Urs Hölzle:

Google: or how I learned to love terabytes. 1
Peer-to-peer networks
- Laurent Massoulié, Milan Vojnovic:

Coupon replication systems. 2-13 - Chunqiang Tang, Melissa J. Buco, Rong N. Chang

, Sandhya Dwarkadas
, Laura Z. Luan, Edward So, Christopher Ward:
Low traffic overlay networks with large routing tables. 14-25 - Derek Leonard, Vivek Rai, Dmitri Loguinov:

On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. 26-37 - Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel:

Denial-of-service resilience in peer-to-peer file sharing systems. 38-49
Traffic measurement & classification
- Andrew W. Moore

, Denis Zuev:
Internet traffic classification using bayesian analysis techniques. 50-60 - Abhishek Kumar

, Minho Sung, Jun (Jim) Xu, Ellen W. Zegura:
A data streaming algorithm for estimating subpopulation flow size distribution. 61-72 - Edith Cohen, Carsten Lund:

Packet classification in large ISPs: design and evaluation of decision tree classifiers. 73-84 - Ken Keys, David Moore, Cristian Estan:

A robust system for accurate real-time summaries of internet traffic. 85-96
Wireless
- Sunwoong Choi

, Kihong Park, Chong-kwon Kim:
On the performance characteristics of WLANs: revisited. 97-108 - Venkatesh Ramaiyan

, Anurag Kumar
, Eitan Altman:
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness, multistability and throughput differentiation. 109-120 - Christoph Lindemann, Oliver P. Waldhorst

:
Modeling epidemic information dissemination on mobile devices with finite buffers. 121-132 - V. S. Anil Kumar, Madhav V. Marathe, Srinivasan Parthasarathy, Aravind Srinivasan:

Algorithmic aspects of capacity in wireless networks. 133-144
Caching & file systems
- Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer:

Empirical evaluation of multi-level buffer cache collaboration for storage systems. 145-156 - Ali Raza Butt

, Chris Gniady, Y. Charlie Hu:
The performance impact of kernel prefetching on buffer cache replacement algorithms. 157-168 - Erik Berg, Erik Hagersten:

Fast data-locality profiling of native execution. 169-180 - Kamen Yotov, Keshav Pingali, Paul Stodghill:

Automatic measurement of memory hierarchy parameters. 181-192
Bandwidth sharing & scheduling
- Matthieu Jonckheere

, Jorma T. Virtamo:
Optimal insensitive routing and bandwidth sharing in simple data networks. 193-204 - Adam Wierman, Mor Harchol-Balter

, Takayuki Osogami:
Nearly insensitive bounds on SMART scheduling. 205-216 - Abdesselem Kortebi, Luca Muscariello, Sara Oueslati, James W. Roberts:

Evaluating the number of active flows in a scheduler realizing fair statistical bandwidth sharing. 217-228 - Adam Wierman, Mor Harchol-Balter

:
Classifying scheduling policies with respect to higher moments of conditional response time. 229-240
Network performance measurements
- Hao Jiang, Constantinos Dovrolis:

Why is the internet traffic bursty in short time scales? 241-252 - Matthew Roughan

:
Fundamental bounds on the accuracy of network performance measurements. 253-264 - Manish Jain, Constantinos Dovrolis:

End-to-end estimation of the available bandwidth variation range. 265-276
Hot topic session
- Mung Chiang, Steven H. Low:

Optimization and Control of Communication Networks. 277 - Mung Chiang, Jang-Won Lee, A. Robert Calderbank, Daniel Pérez Palomar, Maryam Fazel:

Network utility maximization with nonconcave, coupled, and reliability-based uilities. 277 - Steven H. Low, John Doyle, Lun Li, Ao Tang, Jiantao Wang:

Optimization model of internet protocols. 277 - Debasis Mitra:

Joint pricing-network design and stochastic traffic engineering to manage demand uncertainty. 278 - Ness B. Shroff, Xiaojun Lin:

An optimization based approach for cross-layer design in wireless communication networks. 278 - John Musacchio, Jean C. Walrand:

Achieving fair rates with ingress policing. 278
Network & server performance evaluation
- Florin Ciucu, Almut Burchard, Jörg Liebeherr:

A network service curve approach for the stochastic analysis of networks. 279-290 - Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. Shenoy

, Mike Spreitzer, Asser N. Tantawi
:
An analytical model for multi-tier internet services and its applications. 291-302 - Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubramaniam, Qian Wang, Natarajan Gautam:

Managing server energy and operational costs in hosting centers. 303-314 - Yaoping Ruan, Vivek S. Pai, Erich M. Nahum, John M. Tracey:

Evaluating the impact of simultaneous multithreading on network servers using real hardware. 315-326
Traffic estimation & topology inference
- Benoit Donnet

, Philippe Raoult, Timur Friedman
, Mark Crovella:
Efficient algorithms for large-scale topology discovery. 327-338 - Zhuoqing Morley Mao, Lili Qiu, Jia Wang, Yin Zhang:

On AS-level path inference. 339-349 - Qi Zhao, Abhishek Kumar

, Jia Wang, Jun (Jim) Xu:
Data streaming algorithms for accurate and efficient measurement of traffic and flow matrices. 350-361 - Augustin Soule, Anukool Lakhina

, Nina Taft, Konstantina Papagiannaki, Kavé Salamatian
, Antonio Nucci, Mark Crovella, Christophe Diot:
Traffic matrices: balancing measurements, inference and modeling. 362-373
Posters
- Saurabh Ganeriwal, Deepak Ganesan, Mark H. Hansen, Mani B. Srivastava, Deborah Estrin:

Rate-adaptive time synchronization for long-lived sensor networks. 374-375 - An-I Wang

, Peter L. Reiher, Geoffrey H. Kuenning:
Introducing permuted states for analyzing conflict rates in optimistic replication. 376-377 - James W. Mickens, Brian D. Noble:

Predicting node availability in peer-to-peer networks. 378-379 - Lili Qiu, Paramvir Bahl, Ananth Rao, Lidong Zhou:

Troubleshooting multihop wireless networks. 380-381 - David Raz

, Benjamin Avi-Itzhak, Hanoch Levy:
Fair operation of multi-server and multi-queue systems. 382-383 - Eric Anderson, Dirk Beyer, Kamalika Chaudhuri, Terence Kelly, Norman Salazar, Cipriano A. Santos, Ram Swaminathan, Robert Endre Tarjan, Janet L. Wiener, Yunhong Zhou:

Deadline scheduling for animation rendering. 384-385 - Simin He, Shutao Sun, Wei Zhao, Yanfeng Zheng, Wen Gao:

Smooth switching problem in buffered crossbar switches. 386-387 - Qi He, Constantinos Dovrolis, Mostafa H. Ammar:

Prediction of TCP throughput: formula-based and history-based methods. 388-389 - David B. Chua, Eric D. Kolaczyk, Mark Crovella:

A statistical framework for efficient monitoring of end-to-end network properties. 390-391 - Ningning Zhu, Jiawu Chen, Tzi-cker Chiueh, Daniel Ellard:

TBBT: scalable and accurate trace replay for file server evaluation. 392-393 - Sandeep Sarat, Vasileios Pappas, Andreas Terzis:

On the use of anycast in DNS. 394-395 - Jayaram Mudigonda, Harrick M. Vin, Raj Yavatkar:

Managing memory access latency in packet processing. 396-397 - Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan:

Some observations on bitTorrent performance. 398-399 - Sridhar Machiraju, Darryl Veitch, François Baccelli, Antonio Nucci, Jean Bolot:

Theory and practice of cross-traffic estimation. 400-401 - Daniel Stutzbach, Reza Rejaie:

Characterizing the two-tier gnutella topology. 402-403 - Saurabh Tewari, Leonard Kleinrock:

Analysis of search and replication in unstructured peer-to-peer networks. 404-405 - Jianyong Zhang, Anand Sivasubramaniam, Alma Riska, Qian Wang, Erik Riedel:

An interposed 2-Level I/O scheduling framework for performance virtualization. 406-407 - Thomas F. Wenisch, Roland E. Wunderlich, Babak Falsafi, James C. Hoe:

TurboSMARTS: accurate microarchitecture simulation sampling in minutes. 408-409 - Chunyu Hu, Jennifer C. Hou:

A reactive channel model for expediting wireless network simulation. 410-411 - Robin Groenevelt, Philippe Nain, Ger Koole

:
Message delay in MANET. 412-413

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














