![](https://dblp1.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
SIGMETRICS 2021: Virtual Event, China
- Longbo Huang, Anshul Gandhi, Negar Kiyavash, Jia Wang:
SIGMETRICS '21: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Virtual Event, China, June 14-18, 2021. ACM 2021, ISBN 978-1-4503-8072-0
Keynote Talk 1
- Sanjeev Arora:
Opening the Black Box of Deep Learning: Some Lessons and Take-aways. 1
Session: Bandits and Friends
- Zhaowei Zhu, Jingxuan Zhu, Ji Liu, Yang Liu:
Federated Bandit: A Gossiping Approach. 3-4 - Thibaut Cuvelier, Richard Combes, Eric Gourdin:
Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits. 5-6 - Tongxin Li, Yue Chen, Bo Sun
, Adam Wierman, Steven H. Low:
Information Aggregation for Constrained Online Control. 7-8
Session: To Schedule or Not to Schedule
- Niv Buchbinder, Yaron Fairstein, Konstantina Mellou, Ishai Menache, Joseph (Seffi) Naor:
Online Virtual Machine Allocation with Lifetime and Load Predictions. 9-10 - Isaac Grosof, Kunhe Yang, Ziv Scully, Mor Harchol-Balter
:
Nudge: Stochastically Improving upon FCFS. 11-12 - Weina Wang, Qiaomin Xie, Mor Harchol-Balter
:
Zero Queueing for Multi-Server Jobs. 13-14 - Ziv Scully, Isaac Grosof, Mor Harchol-Balter
:
The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions. 15-16
Session: Where are You Going?
- Ashish Bijlani, Umakishore Ramachandran, Roy H. Campbell:
Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices. 17-18 - Yue Zhang
, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. 19-20 - Rachee Singh, David Tench, Phillipa Gill, Andrew McGregor:
PredictRoute: A Network Path Prediction Toolkit. 21-22 - Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin
:
A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web. 23-24
Session: Sharing is Caring
- Wentao Weng, Weina Wang:
Achieving Zero Asymptotic Queueing Delay for Parallel Jobs. 25-26 - Youri Raaijmakers
, Sem C. Borst:
Achievable Stability in Redundancy Systems. 27-28 - Grzegorz Kielanski, Benny Van Houdt:
On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems. 29-30 - Francesca Randone, Luca Bortolussi, Mirco Tribastone:
Refining Mean-field Approximations by Dynamic State Truncation. 31-32
Session: Follow the Money
- Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. 33-34 - Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. 35-36 - Behnam Pourghassemi, Jordan Bonecutter, Zhou Li, Aparna Chandramowlishwaran
:
adPerf: Characterizing the Performance of Third-party Ads. 37-38
Keynote Talk 2
- Hsiao-Wuen Hon:
AI for System - Infusing AI into Cloud Computing Systems. 39-40
Session: All Systems Go
- Qingzhao Zhang, David Ke Hong, Ze Zhang, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao:
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software. 43-44 - Lishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni:
SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input Sizing. 45-46 - Xulong Tang
, Mahmut Taylan Kandemir, Mustafa Karaköy:
Mix and Match: Reorganizing Tasks for Enhancing Data Locality. 47-48
Session: The Load Balacing Act
- Wentao Weng, Xingyu Zhou, R. Srikant:
Optimal Load Balancing with Locality Constraints. 49-50 - Daan Rutten, Debankur Mukherjee:
Load Balancing Under Strict Compatibility Constraints. 51-52 - Tim Hellemans, Benny Van Houdt:
Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing Systems. 53-54 - Elene Anton, Urtzi Ayesta, Matthieu Jonckheere
, Ina Maria Verloop:
Improving the Performance of Heterogeneous Data Centers through Redundancy. 55-56
Session: The Price is Right
- Xin Wang, Richard T. B. Ma:
On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis. 57-58 - Michael Fleder, Devavrat Shah:
I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem. 59-60 - Sushil Mahavir Varma, Francisco Castro, Siva Theja Maguluri:
Dynamic Pricing and Matching for Two-Sided Markets with Strategic Servers. 61-62
Session: Mixed Knapsack
- Jing Tang
, Xueyan Tang, Andrew Lim, Kai Han, Chongshou Li
, Junsong Yuan
:
Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint. 63-64 - Kai Han, Shuang Cui
, Tianshuai Zhu, Enpei Zhang, Benwei Wu, Zhizhuo Yin, Tong Xu, Shaojie Tang, He Huang:
Approximation Algorithms for Submodular Data Summarization with a Knapsack Constraint. 65-66 - Bo Sun
, Ali Zeynali, Tongxin Li, Mohammad Hassan Hajiesmaili, Adam Wierman, Danny H. K. Tsang:
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging. 67-68
Keynote Talks 3
- Leandros Tassiulas:
Enabling Intelligent Services at the Network Edge. 69-70
Session: Various Theorists
- Klaus-Tycho Foerster, Janne H. Korhonen, Ami Paz
, Joel Rybicki, Stefan Schmid
:
Input-Dynamic Distributed Algorithms for Communication Networks. 71-72 - Noémie Périvier, Chamsi Hssaine, Samitha Samaranayake, Siddhartha Banerjee:
Real-time Approximate Routing for Smart Transit Systems. 73-74 - Kamiar Asgari
, Michael J. Neely:
Bregman-style Online Convex Optimization with Energy Harvesting Constraints. 75-76 - Liren Yu, Jiaming Xu, Xiaojun Lin
:
The Power of D-hops in Matching Power-Law Graphs. 77-78
Session: The Truth is Out There
- Yiguang Zhang, Jessy Xinyi Han, Ilica Mahajan, Priyanjana Bengani, Augustin Chaintreau
:
Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks. 79-80 - Ahmad Hazimeh, Adrian Herrera
, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. 81-82 - Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. 83-84
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.