The proceedings contain 45 papers. The topics discussed include: state dependent control of closed queueing networks;Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees: extended abstra...
ISBN:
(纸本)9781450358460
The proceedings contain 45 papers. The topics discussed include: state dependent control of closed queueing networks;Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees: extended abstract;bootstrapped graph diffusions: exposing the power of nonlinearity;the cost of uncertainty in curing epidemics;the price of fragmentation in mobility-on-demand services;new metrics and models for a post-ISA era: managing complexity;delay scaling in many-sources wireless networks without queue state information;practical bounds on optimal caching with variable object sizes;on resource pooling and separation for LRU caching;an optimal randomized online algorithm for QoS buffer management;minimizing queue length regret under adversarial network models;dynamic proportional sharing: a game-theoretic approach;SOAP: one clean analysis of all age-based scheduling policies;a Whittle's index based approach for QoE optimization in wireless networks;an optimal algorithm for online non-convex learning;asymptotic optimal control of Markov-modulated restless bandits;online learning of optimally diverse rankings;learning proportionally fair allocations with low regret;multi-armed bandit with additional observations;online learning in weakly coupled Markov decision processes: a convergence time study;working set size estimation techniques in virtualized environments: one size does not fit all;PreFix: switch failure prediction in datacenter networks;on non-preemptive VM scheduling in the cloud;and why some like it loud: timing power attacks in multi-tenant data centers using an acoustic side channel.
The proceedings contain 52 papers. The topics discussed include: approximations to study the impact of the service discipline in systems with redundancy;multi-dimensional state space collapse in non-complete resource ...
ISBN:
(纸本)9798400706240
The proceedings contain 52 papers. The topics discussed include: approximations to study the impact of the service discipline in systems with redundancy;multi-dimensional state space collapse in non-complete resource pooling scenarios;strongly tail-optimal scheduling in the light-tailed M/G/1;heavy-traffic optimal size- and state-aware dispatching;MetaVRadar: measuring metaverse virtual reality network activity;analysis of false negative rates for recycling bloom filters (yes, they happen!);invertible bloom lookup tables with listing guarantees;lightweight acquisition and ranging of flows in the data plane;agents of autonomy: a systematic study of robotics on modern hardware;automated backend allocation for multi-model, on-device ai inference;and learning the optimal control for evolving systems with converging dynamics.
The proceedings contain 54 papers. The topics discussed include: Memtrade: marketplace for disaggregated memory clouds;mars: near-optimal throughput with shallow buffers in reconfigurable datacenter networks;architect...
ISBN:
(纸本)9798400700743
The proceedings contain 54 papers. The topics discussed include: Memtrade: marketplace for disaggregated memory clouds;mars: near-optimal throughput with shallow buffers in reconfigurable datacenter networks;architectural support for efficient data movement in fully disaggregated systems;duo: a high-throughput reconfigurable datacenter network using local routing and control;DiffForward: on balancing forwarding traffic for modern cloud block services via differentiated forwarding;go-to-controller is better: efficient and optimal LPM caching with splicing;noise in the clouds: influence of network performance variability on application scalability;smash: flexible, fast, and resource-efficient placement and lookup of distributed storage;enabling long-term fairness in dynamic resource allocation;PEACH: proactive and environment aware channel state information prediction with depth images;and characterizing the performance of accelerated jetson edge devices for training deep learning models.
The proceedings contain 59 papers. The topics discussed include: understanding I/O direct cache access performance for end host networking;traffic refinery: cost-aware data representation for machine learning on netwo...
ISBN:
(纸本)9781450391412
The proceedings contain 59 papers. The topics discussed include: understanding I/O direct cache access performance for end host networking;traffic refinery: cost-aware data representation for machine learning on network traffic;end-to-end characterization of game streaming applications on mobile platforms;toxicity in the decentralized web and the potential for model sharing;understanding the practices of global censorship through accurate, end-to-end measurements;trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange;argus: predictable millimeter-wave picocells with vision and learning augmentation;towards efficient sparse matrix vector multiplication on real processing-in-memory architectures;and YourAdvalue: measuring advertising price dynamics without bankrupting user privacy.
The proceedings contain 38 papers. The topics discussed include: federated bandit: a gossiping approach;statistically efficient, polynomial-time algorithms for combinatorial semi-bandits;information aggregation for co...
ISBN:
(纸本)9781450380720
The proceedings contain 38 papers. The topics discussed include: federated bandit: a gossiping approach;statistically efficient, polynomial-time algorithms for combinatorial semi-bandits;information aggregation for constrained online control;online virtual machine allocation with lifetime and load predictions;zero queueing for multi-server jobs;the Gittins policy is nearly optimal in the M/G/k under extremely general conditions;where did my 256 GB go? a measurement analysis of storage consumption on smart mobile devices;a measurement study of Wechat mini-apps;a look behind the curtain: traffic classification in an increasingly encrypted web;achieving zero asymptotic queueing delay for parallel jobs;and on the asymptotic insensitivity of the supermarket model in processor sharing systems.
We use bipartite graphs to model compatibility constraints that arise between tasks and servers in data centers, cloud computing systems and content delivery networks. We prove that servers with skewed graph neighborh...
详细信息
In this paper we develop the first methods to approximate the queue length distribution in a queueing system with redundancy under various service disciplines. We focus on a system with exponential job sizes, i.i.d. c...
详细信息
In response to the exponential surge in Video on Demand (VOD) traffic, numerous research endeavors have concentrated on optimizing and enhancing infrastructure efficiency. In contrast, this paper explores whether user...
详细信息
The proceedings contain 53 papers. The topics discussed include: uniform loss algorithms for online stochastic decision-making with applications to bin packing;online primal-dual mirror descent under stochastic constr...
ISBN:
(纸本)9781450379854
The proceedings contain 53 papers. The topics discussed include: uniform loss algorithms for online stochastic decision-making with applications to bin packing;online primal-dual mirror descent under stochastic constraints;dynamic weighted fairness with minimal disruptions;online linear optimization with inventory management constraints;online optimization with predictions and non-convex losses;mechanism design for online resource allocation: a unified approach;predict and match: prophet inequalities with uncertain supply;fundamental limits on the regret of online network-caching;adaptive discretization for episodic reinforcement learning in metric spaces;fundamental limits of approximate gradient coding;and fast dimensional analysis for root cause investigation in a large-scale service environment.
When verifying that a communications network fulfills its specified performance, it is critical to note sudden shifts in network behavior as quickly as possible. Change point detection methods can be useful in this en...
详细信息
暂无评论