Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Optimizing Speculative Execution of Deadline-Sensitive Jobs in Cloud Maotong Xu, Sultan Alamro, Tian Lan, Suresh Subramaniam |
Optimizing Speculative Execution of Deadline-Sensitive Jobs in Cloud Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Overcommitment in Cloud Services Bin packing with Chance Constraints Maxime C. Cohen, Philipp W. Keller, Vahab S. Mirrokni, Morteza Zadimoghaddam |
Overcommitment in Cloud Services Bin packing with Chance Constraints Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Delay Scalings and Mean-Field Limits in Networked Systems Sem C. Borst |
Delay Scalings and Mean-Field Limits in Networked Systems Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A Case Study in Power Substation Network Dynamics David Formby, Anwar I. Walid, Raheem A. Beyah |
A Case Study in Power Substation Network Dynamics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Simplex Queues for Hot-Data Download Mehmet Fatih Aktas, Elie Najm, Emina Soljanin |
Simplex Queues for Hot-Data Download Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Routing Money, Not Packets: A Tutorial on Internet Economics Richard T. B. Ma, Vishal Misra |
Routing Money, Not Packets: A Tutorial on Internet Economics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Portfolio-driven Resource Management for Transient Cloud Servers Prateek Sharma, David E. Irwin, Prashant J. Shenoy |
Portfolio-driven Resource Management for Transient Cloud Servers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Study on Performance and Power Efficiency of Dense Non-Volatile Caches in Multi-Core Systems Amin Jadidi, Mohammad Arjomand, Mahmut T. Kandemir, Chita R. Das |
A Study on Performance and Power Efficiency of Dense Non-Volatile Caches in Multi-Core Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Fast, Small, and Dynamic Forwarding Information Base Ye Yu, Djamal Belazzougui, Chen Qian, Qin Zhang |
A Fast, Small, and Dynamic Forwarding Information Base Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fluid-Model-Based Car Routing for Modern Ridesharing Systems Anton Braverman, J. G. Dai, Xin Liu, Lei Ying |
Fluid-Model-Based Car Routing for Modern Ridesharing Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting Data Longevity for Enhancing the Lifetime of Flash-based Storage Class Memory Wonil Choi, Mohammad Arjomand, Myoungsoo Jung, Mahmut T. Kandemir |
Exploiting Data Longevity for Enhancing the Lifetime of Flash-based Storage Class Memory Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Posted Prices for Online Cloud Resource Allocation Zijun Zhang, Zongpeng Li, Chuan Wu |
Optimal Posted Prices for Online Cloud Resource Allocation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Accelerating Performance Inference over Closed Systems by Asymptotic Methods Giuliano Casale |
Accelerating Performance Inference over Closed Systems by Asymptotic Methods Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
HFTraC: High-Frequency Traffic Control Ning Wu, Yingjie Bi, Nithin Michael, Ao Tang, John Doyle, Nikolai Matni |
HFTraC: High-Frequency Traffic Control Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Low-Complexity Approach to Distributed Cooperative Caching with Geographic Constraints Konstantin Avrachenkov, Jasper Goseling, Berksan Serbetci |
A Low-Complexity Approach to Distributed Cooperative Caching with Geographic Constraints Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive TTL-Based Caching for Content Delivery Soumya Basu, Aditya Sundarrajan, Javad Ghaderi, Sanjay Shakkottai, Ramesh K. Sitaraman |
Adaptive TTL-Based Caching for Content Delivery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Expected Values Estimated via Mean-Field Approximation are 1/N-Accurate: Extended Abstract Nicolas Gast |
Expected Values Estimated via Mean-Field Approximation are 1/N-Accurate: Extended Abstract Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Persistent Spread Measurement for Big Network Data Based on Register Intersection You Zhou, Yian Zhou, Min Chen, Shigang Chen |
Persistent Spread Measurement for Big Network Data Based on Register Intersection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing 3D Floating Gate NAND Flash Qin Xiong, Fei Wu, Zhonghai Lu, Yue Zhu, You Zhou, Yibing Chu, Changsheng Xie, Ping Huang |
Characterizing 3D Floating Gate NAND Flash Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Queue-Proportional Sampling: A Better Approach to Crossbar Scheduling for Input-Queued Switches Long Gong, Paul Tune, Liang Liu, Sen Yang, Jun (Jim) Xu |
Queue-Proportional Sampling: A Better Approach to Crossbar Scheduling for Input-Queued Switches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Service Elasticity in Large-Scale Distributed Systems Debankur Mukherjee, Souvik Dhara, Sem C. Borst, Johan S. H. van Leeuwaarden |
Optimal Service Elasticity in Large-Scale Distributed Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dandelion: Redesigning the Bitcoin Network for Anonymity Shaileshh Bojja Venkatakrishnan, Giulia C. Fanti, Pramod Viswanath |
Dandelion: Redesigning the Bitcoin Network for Anonymity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wen Sun, Véronique Simon, Sébastien Monnet, Philippe Robert, Pierre Sens |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lin Yang, Mohammad Hassan Hajiesmaili, Hanling Yi, Minghua Chen |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge Xiaoen Ju, Hani Jamjoom, Kang G. Shin |
Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Why "Some" Like It Hot Too: Thermal Attack on Data Centers Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang |
Why "Some" Like It Hot Too: Thermal Attack on Data Centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Donghyuk Lee, Samira Manabi Khan, Lavanya Subramanian, Saugata Ghose, Rachata Ausavarungnirun, Gennady Pekhimenko, Vivek Seshadri, Onur Mutlu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pseudo-Separation for Assessment of Structural Vulnerability of a Network Alan Kuhnle, Tianyi Pan, Victoria G. Crawford, Md Abdul Alim, My T. Thai |
Pseudo-Separation for Assessment of Structural Vulnerability of a Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multipath TCP on a VANET: A Performance Study Jorge Mena, Peter Bankole, Mario Gerla |
Multipath TCP on a VANET: A Performance Study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sewoong Oh |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Incentivizing Reliable Demand Response with Customers' Uncertainties and Capacity Planning Joshua Comden, Zhenhua Liu, Yue Zhao |
Incentivizing Reliable Demand Response with Customers' Uncertainties and Capacity Planning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Steffen Bondorf, Paul Nikolaus, Jens B. Schmitt |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing Lingda Li, Robel Geda, Ari B. Hayes, Yan-Hao Chen, Pranav Chaudhari, Eddy Z. Zhang, Mario Szegedy |
A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Han Deng, I-Hong Hou |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Online Optimization for Markets and the Cloud: Theory and Practice Vahab S. Mirrokni |
Online Optimization for Markets and the Cloud: Theory and Practice Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Hadoop on Named Data Networking: Experience and Results Mathias Gibbens, Chris Gniady, Lei Ye, Beichuan Zhang |
Hadoop on Named Data Networking: Experience and Results Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using Burstable Instances in the Public Cloud: Why, When and How? Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis |
Using Burstable Instances in the Public Cloud: Why, When and How? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time Mehrnoosh Shafiee, Javad Ghaderi |
Scheduling Coflows in Datacenter Networks: Improved Bound for Total Weighted Completion Time Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths Yeon-sup Lim, Erich M. Nahum, Don Towsley, Richard J. Gibbens |
ECF: An MPTCP Path Scheduler to Manage Heterogeneous Paths Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Outward Influence and Cascade Size Estimation in Billion-scale Networks Hung T. Nguyen, Tri P. Nguyen, Tam N. Vu, Thang N. Dinh |
Outward Influence and Cascade Size Estimation in Billion-scale Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Gradient-Based Optimization: Accelerated, Distributed, Asynchronous and Stochastic Michael I. Jordan |
On Gradient-Based Optimization: Accelerated, Distributed, Asynchronous and Stochastic Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Deconstructing the Energy Consumption of the Mobile Page Load Yi Cao, Javad Nejati, Muhammad Wajahat, Aruna Balasubramanian, Anshul Gandhi |
Deconstructing the Energy Consumption of the Mobile Page Load Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Spot Capacity Market to Increase Power Infrastructure Utilization in Multi-Tenant Data Centers Mohammad A. Islam, Xiaoqi Ren, Shaolei Ren, Adam Wierman |
A Spot Capacity Market to Increase Power Infrastructure Utilization in Multi-Tenant Data Centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Analysis of Facebook's Free Basics Siddharth Singh, Vedant Nanda, Rijurekha Sen, Sohaib Ahmad, Satadal Sengupta, Amreesh Phokeer, Zaid Ahmed Farooq, Taslim Arefin Khan, Ponnurangam Kumaraguru, Ihsan Ayyub Qazi, David R. Choffnes, Krishna P. Gummadi |
An Empirical Analysis of Facebook's Free Basics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Kevin K. Chang, Abdullah Giray Yaglikçi, Saugata Ghose, Aditya Agrawal, Niladrish Chatterjee, Abhijith Kashyap, Donghyuk Lee, Mike O'Connor, Hasan Hassan, Onur Mutlu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale Alan Quach, Zhongjie Wang, Zhiyun Qian |
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Security Game with Non-additive Utilities and Multiple Attacker Resources Sinong Wang, Ness B. Shroff |
Security Game with Non-additive Utilities and Multiple Attacker Resources Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stein's Method for Mean-Field Approximations in Light and Heavy Traffic Regimes Lei Ying |
Stein's Method for Mean-Field Approximations in Light and Heavy Traffic Regimes Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
On Optimal Two-Sided Pricing of Congested Networks Xin Wang, Richard T. B. Ma, Yinlong Xu |
On Optimal Two-Sided Pricing of Congested Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing and Modeling Patching Practices of Industrial Control Systems Brandon Wang, Xiaoye Li, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché, Zubair Shafiq |
Characterizing and Modeling Patching Practices of Industrial Control Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|