


default search action
SIGMETRICS Performance Evaluation Review, Volume 40
Volume 40, Number 1, June 2012
- Peter G. Harrison, Martin F. Arlitt, Giuliano Casale:

ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '12, London, United Kingdom, June 11-15, 2012. ACM 2012, ISBN 978-1-4503-1097-0 [contents]
Volume 40, Number 2, September 2012
- Brian Eriksson, Paul Barford, Bruce M. Maggs, Robert D. Nowak:

Posit: a lightweight approach for IP geolocation. 2-11
- Pierre Coucheney, Patrick Maillé, Bruno Tuffin:

Comparison of search engines non-neutral and neutral behaviors. 14-17 - Manjesh Kumar Hanawal, Eitan Altman, Rajesh Sundaresan:

Game theoretic analysis of collusions in nonneutral networks. 18-21 - Seung Min Yu, Seong-Lyun Kim:

Guaranteeing user welfare in network service: comparison of two subsidy schemes. 22-25 - Randall Berry, Michael L. Honig, Thành Nguyen, Vijay G. Subramanian, Hang Zhou, Rakesh Vohra:

Newsvendor model of capacity sharing. 26-29 - Richard T. B. Ma, Dah Ming Chiu, John C. S. Lui, Vishal Misra, Dan Rubenstein:

Price differentiation in the kelly mechanism. 30-33 - Zied Ben-Houidi, Hélia Pouyllau:

The price of tussles: bankrupt in cyberspace? 34-37 - Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis:

Peering strategy adoption by transit providers in the internet: a game theoretic approach? 38-41 - Loretta Mastroeni

, Maurizio Naldi
:
Pricing of insurance policies against cloud storage price rises. 42-45 - Dongmyung Lee, Jeonghoon Mo, Jinwoo Park:

ISP vs. ISP+CDN: can ISPs in duopoly profit by introducing CDN services? 46-48 - András Gulyás, Attila Korösi, Dávid Szabó, Gergely Biczók

:
On greedy network formation. 49-52
- Lavanya Ramakrishnan, Shane Richard Canon, Krishna Muriki, Iwona Sakrejda, Nicholas J. Wright

:
Evaluating Interconnect and Virtualization Performance forHigh Performance Computing. 55-60 - Gihan R. Mudalige

, Mike B. Giles, Carlo Bertolli, Paul H. J. Kelly:
Predictive modeling and analysis of OP2 on distributed memory GPU clusters. 61-67 - Gabriel Mateescu

, Gregory H. Bauer, Robert A. Fiedler:
Optimizing matrix transposes using a POWER7 cache model and explicit prefetching. 68-73 - Anthony Danalis, Piotr Luszczek, Gabriel Marin, Jeffrey S. Vetter, Jack J. Dongarra:

BlackjackBench: portable hardware characterization. 74-79 - Adrian Tineo, Sadaf R. Alam, Thomas C. Schulthess:

Towards autotuning by alternating communication methods. 80-85 - Roman Iakymchuk, Paolo Bientinesi:

Modeling performance through memory-stalls. 86-91 - Hongzhang Shan, Nicholas J. Wright

, John Shalf
, Katherine A. Yelick, Marcus Wagner, Nathan Wichmann:
A preliminary evaluation of the hardware acceleration of the Cray Gemini interconnect for PGAS languages and comparison with MPI. 92-98 - Vivek Deshpande, Xing Wu, Frank Mueller:

Auto-generation of communication benchmark traces. 99-105 - Chun-Yi Su, Dong Li, Dimitrios S. Nikolopoulos, Matthew Grove, Kirk W. Cameron, Bronis R. de Supinski:

Critical path-based thread placement for NUMA systems. 106-112 - DongJin Lee, Michael J. O'Sullivan

, Cameron G. Walker:
Benchmarking and modeling disk-based storage tiers for practical storage design. 113-118 - Lingyuan Wang, Miaoqing Huang, Tarek A. El-Ghazawi:

Towards efficient GPU sharing on multicore processors. 119-124 - Xian-He Sun, Dawei Wang:

APC: a performance metric of memory systems. 125-130
Volume 40, Number 3, December 2012
- Roberto Vitali, Alessandro Pellegrini

, Francesco Quaglia:
Load sharing for optimistic parallel simulations on multi core machines. 2-11
- Marcus Hähnel

, Björn Döbel, Marcus Völp
, Hermann Härtig:
Measuring energy consumption for short code paths using RAPL. 13-17 - Michele Mazzucco, Isi Mitrani:

Empirical evaluation of power saving policies for data centers. 18-22 - Pooja Ghumre, Junwei Li, Mukil Kesavan, Ada Gavrilovska, Karsten Schwan:

Evaluating the need for complexity in energy-aware management for cloud platforms. 23-27 - Nicolas Gast, Dan-Cristian Tomozei, Jean-Yves Le Boudec:

Optimal storage policies with wind forecast uncertainties. 28-32 - Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman:

Sensitivity analysis of the power grid vulnerability to large-scale cascading failures. 33-37 - Omid Ardakanian

, Catherine Rosenberg, Srinivasan Keshav
:
RealTime distributed congestion control for electrical vehicle charging. 38-42 - Omid Ardakanian

, Catherine Rosenberg, Srinivasan Keshav
:
On the impact of storage in residential power distribution systems. 43-47 - David Chiu, Christopher Stewart

, Bart McManus:
Electric grid balancing through lowcost workload migration. 48-52 - Daniel S. Menasché, Rosa Maria Meri Leão, Edmundo de Souza e Silva, Alberto Avritzer, Sindhu Suresh, Kishor S. Trivedi, Raymond A. Marie, Lucia Happe

, Anne Koziolek:
Survivability analysis of power distribution in smart grids with active and reactive power modeling. 53-57
- Edward G. Coffman Jr., Yakov A. Kogan, Wai Sum Lai, V. Ramaswami:

Uptime and downtime analysis for hierarchical redundant systems in telecommunications. 59-61 - Konstantin Avrachenkov

, Urtzi Ayesta, Josu Doncel
, Peter Jacko
:
Optimal congestion control of TCP flows for internet routers. 62-64 - Angela Schörgendorfer, Peter M. van de Ven, Bo Zhang:

Temporal load balancing for distributed backup scheduling. 65-67 - Yuval Rochman, Hanoch Levy, Eli Brosh:

Efficient replication in multi-regional peer-supported VoD systems. 68-70 - Christian Borgs

, Jennifer T. Chayes
, Sherwin Doroudi
, Mor Harchol-Balter
, Kuang Xu:
Pricing and queueing. 71-73 - Antonie S. Godtschalk, Florin Ciucu:

Stochastic bounds for randomized load balancing. 74-76 - Daniel S. Myers, Mary K. Vernon:

Estimating queue length distributions for queues with random arrivals. 77-79 - Paolo Cremonesi

, Andrea Sansottera:
Modeling response times in the Google ROADEF/EURO challenge. 80-82 - Yue Tan, Yingdong Lu

, Cathy H. Xia:
Provisioning for large scale loss network systems with applications in cloud computing. 83-85 - Ranjan Pal, Pan Hui:

CyberInsurance for cybersecurity a topological take on modulating insurance premiums. 86-88 - B. Maryam Elahi

, Carey Williamson, Philipp Woelfel:
Meeting the fairness deadline in speed scaling systems: is turbocharging enough? 89-91 - Eitan Bachmat

, Assaf Natanzon:
Analysis of SITA queues with many servers and spacetime geometry. 92-94 - Thomas Bonald, Davide Cuda:

RateOptimal scheduling schemes for asynchronous InputQueued packet switches. 95-97 - Minghong Lin, Adam Wierman, Alan Roytman, Adam Meyerson, Lachlan L. H. Andrew:

Online optimization with switching cost. 98-100 - Bartlomiej Blaszczyszyn, Kumar Gaurav

:
Farout vertices in weighted repeated configuration model. 100-103 - Fragkiskos Papadopoulos

, Constantinos Psomas, Dmitri V. Krioukov:
Replaying the geometric growth of complex networks and application to the AS internet. 104-106 - Ali Tizghadam, Weiwei Li, Alberto Leon-Garcia:

Network criticality in vehicular networks. 107-109
Volume 40, Number 4, March 2013
- Hong Xu

, Baochun Li:
A study of pricing for cloud resources. 3-12 - Zhizhong Zhang, Chuan Wu, David Wai-Lok Cheung:

A survey on cloud interoperability: taxonomies, standards, and practice. 13-22 - Lei Yang, Jiannong Cao

, Yin Yuan, Tao Li, Andy Han, Alvin T. S. Chan:
A framework for partitioning and execution of data stream applications in mobile cloud computing. 23-32 - Weina Wang, Kai Zhu, Lei Ying

, Jian Tan, Li Zhang:
A throughput optimal algorithm for map task scheduling in mapreduce with data locality. 33-42 - Qun Huang, Patrick P. C. Lee

:
An experimental study of cascading performance interference in a virtualized environment. 43-52 - Rahul Singh, Prashant J. Shenoy

, Maitreya Natu, Vaishali P. Sadaphal, Harrick M. Vin:
Analytical modeling for what-if analysis in complex cloud computing applications. 53-62 - Jia Liu, Cathy H. Xia, Ness B. Shroff, Xiaodong Zhang:

On distributed computation rate optimization for deploying cloud computing programming frameworks. 63-72 - Giuliano Casale

, Mirco Tribastone
:
Modelling exogenous variability in cloud deployments. 73-82
- Shah Mahmood

, Yvo Desmedt:
Two new economic models for privacy. 84-89 - Luke Hutton

, Tristan Henderson
:
An architecture for ethical and privacy-sensitive social network experiments. 90-95 - Minaxi Gupta, Yuqing Melanie Wu, Swapnil S. Joshi, Aparna Tiwari, Ashish Nair, Ezhilan Ilangovan:

On the linkability of complementary information from free versions of people databases. 96-100 - Florian Tschorsch, Björn Scheuermann:

How (not) to build a transport layer for anonymity overlays. 101-106

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














