NSDI '23 | DChannel: Accelerating Mobile Applications With Parallel High-bandwidth and Low-latency Channels | |
NSDI '23 | A High-Speed Stateful Packet Processing Approach for Tbps Programmable Switches | |
NSDI '23 | xBGP: Faster Innovation in Routing Protocols | |
NSDI '23 | RECL: Responsive Resource-Efficient Continuous Learning for Video Analytics | |
NSDI '23 | SRNIC: A Scalable Architecture for RDMA NICs | |
NSDI '23 | LeakyScatter: A Frequency-Agile Directional Backscatter Network Above 100 GHz | |
NSDI '23 | Boggart: Towards General-Purpose Acceleration of Retrospective Video Analytics | |
NSDI '23 | Gemel: Model Merging for Memory-Efficient, Real-Time Video Analytics at the Edge | |
NSDI '23 | The Benefit of Hindsight: Tracing Edge-Cases in Distributed Systems | |
NSDI '23 | TopoOpt: Co-optimizing Network Topology and Parallelization Strategy for Distributed Training Jobs | |
NSDI '23 | ModelKeeper: Accelerating DNN Training via Automated Training Warmup | |
NSDI '23 | Doing More with Less: Orchestrating Serverless Applications without an Orchestrator | |
NSDI '23 | SHEPHERD: Serving DNNs in the Wild | |
NSDI '23 | Synthesizing Runtime Programmable Switch Updates | |
NSDI '23 | Protego: Overload Control for Applications with Unpredictable Lock Contention | |
NSDI '23 | Formal Methods for Network Performance Analysis | |
NSDI '23 | Poseidon: Efficient, Robust, and Practical Datacenter CC via Deployable INT | |
NSDI '23 | SECRECY: Secure collaborative analytics in untrusted clouds | |
NSDI '23 | Hostping: Diagnosing Intra-host Network Bottlenecks in RDMA Servers | |
NSDI '23 | Understanding RDMA Microarchitecture Resources for Performance Isolation | |
NSDI '23 | Hydra: Serialization-Free Network Ordering for Strongly Consistent Distributed Applications | |
NSDI '23 | SelfTune: Tuning Cluster Managers | |
NSDI '23 | Better Together: Jointly Optimizing ML Collective Scheduling and Execution Planning using SYNDICATE | |
NSDI '23 | Scalable Tail Latency Estimation for Data Center Networks | |
NSDI '23 | Enabling Users to Control their Internet | |