


default search action
SIGMETRICS 2021: Virtual Event, China
- Longbo Huang, Anshul Gandhi, Negar Kiyavash, Jia Wang:

SIGMETRICS '21: ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Virtual Event, China, June 14-18, 2021. ACM 2021, ISBN 978-1-4503-8072-0
Keynote Talk 1
- Sanjeev Arora:

Opening the Black Box of Deep Learning: Some Lessons and Take-aways. 1
Session: Bandits and Friends
- Zhaowei Zhu, Jingxuan Zhu, Ji Liu, Yang Liu:

Federated Bandit: A Gossiping Approach. 3-4 - Thibaut Cuvelier, Richard Combes, Eric Gourdin:

Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits. 5-6 - Tongxin Li, Yue Chen, Bo Sun

, Adam Wierman, Steven H. Low:
Information Aggregation for Constrained Online Control. 7-8
Session: To Schedule or Not to Schedule
- Niv Buchbinder, Yaron Fairstein, Konstantina Mellou, Ishai Menache, Joseph (Seffi) Naor:

Online Virtual Machine Allocation with Lifetime and Load Predictions. 9-10 - Isaac Grosof, Kunhe Yang, Ziv Scully, Mor Harchol-Balter

:
Nudge: Stochastically Improving upon FCFS. 11-12 - Weina Wang, Qiaomin Xie, Mor Harchol-Balter

:
Zero Queueing for Multi-Server Jobs. 13-14 - Ziv Scully, Isaac Grosof, Mor Harchol-Balter

:
The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions. 15-16
Session: Where are You Going?
- Ashish Bijlani, Umakishore Ramachandran, Roy H. Campbell:

Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices. 17-18 - Yue Zhang

, Bayan Turkistani, Allen Yuqing Yang, Chaoshun Zuo, Zhiqiang Lin:
A Measurement Study of Wechat Mini-Apps. 19-20 - Rachee Singh, David Tench, Phillipa Gill, Andrew McGregor:

PredictRoute: A Network Path Prediction Toolkit. 21-22 - Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin

:
A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web. 23-24
Session: Sharing is Caring
- Wentao Weng, Weina Wang:

Achieving Zero Asymptotic Queueing Delay for Parallel Jobs. 25-26 - Youri Raaijmakers

, Sem C. Borst:
Achievable Stability in Redundancy Systems. 27-28 - Grzegorz Kielanski, Benny Van Houdt:

On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems. 29-30 - Francesca Randone

, Luca Bortolussi, Mirco Tribastone:
Refining Mean-field Approximations by Dynamic State Truncation. 31-32
Session: Follow the Money
- Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:

Tracking Counterfeit Cryptocurrency End-to-end. 33-34 - Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:

SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. 35-36 - Behnam Pourghassemi, Jordan Bonecutter, Zhou Li, Aparna Chandramowlishwaran

:
adPerf: Characterizing the Performance of Third-party Ads. 37-38
Keynote Talk 2
- Hsiao-Wuen Hon:

AI for System - Infusing AI into Cloud Computing Systems. 39-40
Session: All Systems Go
- Qingzhao Zhang, David Ke Hong, Ze Zhang, Qi Alfred Chen, Scott A. Mahlke, Z. Morley Mao:

A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software. 43-44 - Lishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni:

SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input Sizing. 45-46 - Xulong Tang

, Mahmut Taylan Kandemir, Mustafa Karaköy:
Mix and Match: Reorganizing Tasks for Enhancing Data Locality. 47-48
Session: The Load Balacing Act
- Wentao Weng, Xingyu Zhou, R. Srikant:

Optimal Load Balancing with Locality Constraints. 49-50 - Daan Rutten, Debankur Mukherjee:

Load Balancing Under Strict Compatibility Constraints. 51-52 - Tim Hellemans, Benny Van Houdt:

Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing Systems. 53-54 - Elene Anton, Urtzi Ayesta, Matthieu Jonckheere

, Ina Maria Verloop:
Improving the Performance of Heterogeneous Data Centers through Redundancy. 55-56
Session: The Price is Right
- Xin Wang, Richard T. B. Ma:

On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis. 57-58 - Michael Fleder, Devavrat Shah:

I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem. 59-60 - Sushil Mahavir Varma, Francisco Castro, Siva Theja Maguluri:

Dynamic Pricing and Matching for Two-Sided Markets with Strategic Servers. 61-62
Session: Mixed Knapsack
- Jing Tang

, Xueyan Tang, Andrew Lim
, Kai Han, Chongshou Li
, Junsong Yuan
:
Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint. 63-64 - Kai Han, Shuang Cui

, Tianshuai Zhu, Enpei Zhang, Benwei Wu, Zhizhuo Yin, Tong Xu, Shaojie Tang, He Huang:
Approximation Algorithms for Submodular Data Summarization with a Knapsack Constraint. 65-66 - Bo Sun

, Ali Zeynali, Tongxin Li, Mohammad Hassan Hajiesmaili, Adam Wierman, Danny H. K. Tsang:
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging. 67-68
Keynote Talks 3
- Leandros Tassiulas:

Enabling Intelligent Services at the Network Edge. 69-70
Session: Various Theorists
- Klaus-Tycho Foerster, Janne H. Korhonen, Ami Paz

, Joel Rybicki, Stefan Schmid
:
Input-Dynamic Distributed Algorithms for Communication Networks. 71-72 - Noémie Périvier, Chamsi Hssaine, Samitha Samaranayake, Siddhartha Banerjee:

Real-time Approximate Routing for Smart Transit Systems. 73-74 - Kamiar Asgari

, Michael J. Neely:
Bregman-style Online Convex Optimization with Energy Harvesting Constraints. 75-76 - Liren Yu, Jiaming Xu, Xiaojun Lin

:
The Power of D-hops in Matching Power-Law Graphs. 77-78
Session: The Truth is Out There
- Yiguang Zhang, Jessy Xinyi Han, Ilica Mahajan, Priyanjana Bengani, Augustin Chaintreau

:
Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks. 79-80 - Ahmad Hazimeh, Adrian Herrera

, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. 81-82 - Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick

, Arash Asadi
:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. 83-84

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














