


default search action
SIGMETRICS/Performance 2006: Saint-Malo, France
- Raymond A. Marie, Peter B. Key, Evgenia Smirni:
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS/Performance 2006, Saint Malo, France, June 26-30, 2006. ACM 2006, ISBN 1-59593-319-0 - Daniel A. Reed:
Performance and reliability: the ubiquitous challenge. 1-2
Storage systems
- Eno Thereska, Brandon Salmon, John D. Strunk, Matthew Wachs, Michael Abd-El-Malek, Julio López, Gregory R. Ganger:
Stardust: tracking activity in a distributed storage system. 3-14 - Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnicki:
Exploiting redundancy to conserve energy in storage systems. 15-26
Wireless networks
- Eytan H. Modiano, Devavrat Shah, Gil Zussman:
Maximizing throughput in wireless networks via gossiping. 27-38 - Yan Gao, Dah-Ming Chiu, John C. S. Lui:
Determining the end-to-end throughput capacity in multi-hop networks: methodology and applications. 39-50 - Can Emre Koksal, Kyle Jamieson
, Emre Telatar, Patrick Thiran:
Impacts of channel variability on link-level throughput in wireless networks. 51-62 - Arunesh Mishra, Vivek Shrivastava, Suman Banerjee, William A. Arbaugh:
Partially overlapped channels not considered harmful. 63-74
Scheduling and fairness
- Pascal Lieshout, Michel Mandjes, Sem C. Borst:
GPS scheduling: selection of optimal weights and comparison with strict priorities. 75-86 - H. Christian Gromoll, Philippe Robert, Bert Zwart, Richard Bakker:
The impact of reneging in processor sharing queues. 87-96 - Chang-Woo Yang, Adam Wierman, Sanjay Shakkottai, Mor Harchol-Balter
:
Tail asymptotics for policies favoring short jobs in a many-flows regime. 97-108 - Thomas Bonald, Aleksi Penttinen, Jorma T. Virtamo:
On light and heavy traffic approximations of balanced fairness. 109-120
Network studies
- Han Hee Song, Lili Qiu, Yin Zhang:
NetQuest: a flexible framework for large-scale network measurement. 121-132 - Qi Zhao, Zihui Ge, Jia Wang, Jun (Jim) Xu:
Robust traffic matrix estimation with imperfect information: making use of multiple data sources. 133-144 - Ashwin Lall, Vyas Sekar, Mitsunori Ogihara
, Jun (Jim) Xu, Hui Zhang:
Data streaming algorithms for estimating entropy of network traffic. 145-156 - Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan Saha:
On suitability of Euclidean embedding of internet hosts. 157-168
Queueing systems and Markov chains
- Giuliano Casale
:
An efficient algorithm for the exact analysis of multiclass queueing networks with large population sizes. 169-180 - Jeroen Van Velthoven, Benny Van Houdt, Chris Blondia:
Transient analysis of tree-Like processes and its application to random access systems. 181-190 - Peter Buchholz:
Bounding stationary results of Tandem networks with MAP input and PH service time distributions. 191-202 - Varun Gupta, Mor Harchol-Balter
, Alan Scheller-Wolf, Uri Yechiali:
Fundamental characteristics of queues with fluctuating load. 203-215
Systems and architecture
- Satish Narayanasamy
, Cristiano Pereira, Harish Patil, Robert Cohn, Brad Calder:
Automatic logging of operating system effects to guide application-level architecture simulation. 216-227 - Fei Guo, Yan Solihin:
An analytical model for cache replacement policy performance. 228-239 - David P. Olshefski, Jason Nieh:
Understanding the management of client perceived response time. 240-251
Statistics and analysis of systems and networks
- Mikkel Thorup:
Confidence intervals for priority sampling. 252-263 - Takayuki Osogami, Toshinari Itoko:
Finding probably better system configurations quickly. 264-275 - Thomas Bonald:
The Erlang model with non-poisson call arrivals. 276-286 - Markus Fidler, Jens B. Schmitt:
On the way to a distributed systems calculus: an end-to-end network calculus with data scaling. 287-298
Communication architecture and metrics
- Enoch Peserico, Larry Rudolph:
Robust network connectivity: when it's the big picture that matters. 299-310 - Qunfeng Dong, Suman Banerjee, Jia Wang, Dheeraj Agrawal, Ashutosh Shukla:
Packet classifiers in ternary CAMs can be smaller. 311-322 - Qi Zhao, Jun (Jim) Xu, Zhen Liu:
Design of a novel statistics counter architecture with optimal space and time efficiency. 323-334
Security
- Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith W. Ross, Dan Rubenstein:
Fluid modeling of pollution proliferation in P2P networks. 335-346 - Kang Li, Zhenyu Zhong:
Fast statistical spam filter by approximate classifications. 347-358
Posters
- George Kola, Mary K. Vernon:
QuickProbe: available bandwidth estimation in two roundtrips. 359-360 - Neena R. Kaushik, Silvia M. Figueira, Stephen A. Chiappari:
Flexible time-windows for advance reservation in LambdaGrids. 361-362 - Chad Verbowski, Emre Kiciman, Brad Daniels, Yi-Min Wang, Roussi Roussev, Shan Lu, Juhan Lee:
Analyzing persistent state interactions to improve state management. 363-364 - Maaike Verloop, Rudesindo Núñez-Queija, Sem C. Borst:
Delay-optimal scheduling in bandwidth-sharing networks. 365-366 - Michael Menth, Robert Henjes, Christian Zepfel, Sebastian Gehrsitz:
Throughput performance of popular JMS servers. 367-368 - Rahul Garg, Yogish Sabharwal:
Optimizing the HPCC randomaccess benchmark on blue Gene/L Supercomputer. 369-370 - Tadeusz Piotrowski, Suman Banerjee, Sudeept Bhatnagar, Samrat Ganguly, Rauf Izmailov
:
Peer-to-peer streaming of stored media: the indirect approach. 371-372 - Ajay Dholakia, Evangelos Eleftheriou, Xiao-Yu Hu, Ilias Iliadis
, Jai Menon, K. K. Rao:
Analysis of a new intra-disk redundancy scheme for high-reliability RAID storage systems in the presence of unrecoverable errors. 373-374 - Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel J. Sorin, Sule Ozev:
Applying architectural vulnerability Analysis to hard faults in the microprocessor. 375-376 - James Broberg, Zhen Liu, Cathy H. Xia, Li Zhang:
A multicommodity flow model for distributed stream processing. 377-378 - Ian M. Steiner, Yefim Shuf:
A characterization of a java-based commercial workload on a high-end enterprise server. 379-380 - Sudipto Guha, Kamesh Munagala, Saswati Sarkar:
Optimizing transmission rate in wireless channels using adaptive probes. 381-382 - Yiyu Chen, Amitayu Das, Anand Sivasubramaniam, Qian Wang, Rick Harper, M. Bland:
Consolidating clients on back-end servers with co-location and frequency control. 383-384 - Ravi S. Prasad, Constantine Dovrolis:
Congestion responsiveness of internet traffic: (a fresh look at an old problem). 385-386 - Yao Zhao, Yan Chen, David Bindel
:
Towards deterministic network diagnosis. 387-388 - Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zhang:
Modeling adoptability of secure BGP protocols. 389-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.