default search action
Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 4
Volume 4, Number 1, March 2020
- Vishwaraj Doshi, Do Young Eun:
Fiedler Vector Approximation via Interacting Random Walks. 01:1-01:28 - Martin Zubeldia:
Delay-optimal Policies in Partial Fork-Join Systems with Redundancy and Random Slowdowns. 02:1-02:49 - Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu:
Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating. 03:1-03:27 - Reza Alijani, Siddhartha Banerjee, Sreenivas Gollapudi, Kamesh Munagala, Kangning Wang:
Predict and Match: Prophet Inequalities with Uncertain Supply. 04:1-04:23 - Jinke Song, Qiang Li, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. 05:1-05:25 - Lei Zhang, Reza Karimi, Irfan Ahmad, Ymir Vigfusson:
Optimal Data Placement for Heterogeneous Cache, Memory, and Storage Systems. 06:1-06:27 - Zhihui Shao, Mohammad A. Islam, Shaolei Ren:
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers. 07:1-07:39 - Ziv Scully, Mor Harchol-Balter, Alan Scheller-Wolf:
Simple Near-Optimal Scheduling for the M/G/1. 11:1-11:29 - Yang Cai, Federico Echenique, Hu Fu, Katrina Ligett, Adam Wierman, Juba Ziani:
Third-Party Data Providers Ruin Simple Mechanisms. 12:1-12:31 - Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. 13:1-13:23 - Richard Combes, Alexandre Proutière, Alexandre Fauquette:
Unimodal Bandits with Continuous Arms: Order-optimal Regret without Smoothness. 14:1-14:28 - Lin Yang, Mohammad Hassan Hajiesmaili, Ramesh K. Sitaraman, Adam Wierman, Enrique Mallada, Wing Shing Wong:
Online Linear Optimization with Inventory Management Constraints. 16:1-16:29 - Martin Karsten, Saman Barghi:
User-level Threading: Have Your Cake and Eat It Too. 17:1-17:30 - Yiheng Lin, Gautam Goel, Adam Wierman:
Online Optimization with Predictions and Non-convex Losses. 18:1-18:32 - Sungjin Im, Benjamin Moseley, Kamesh Munagala, Kirk Pruhs:
Dynamic Weighted Fairness with Minimal Disruptions. 19:1-19:18 - Chen Avin, Manya Ghobadi, Chen Griner, Stefan Schmid:
On the Complexity of Traffic Traces and Implications. 20:1-20:29
Volume 4, Number 2, June 2020
- Y. C. Tay, Athina Markopoulou:
Editorial. 21:1 - Shouqian Shi, Chen Qian:
Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems. 22:1-22:32 - Philippe Nain, Gayane Vardoyan, Saikat Guha, Don Towsley:
On the Analysis of a Multipartite Entanglement Distribution Switch. 23:1-23:39 - Xiaoqi Tan, Bo Sun, Alberto Leon-Garcia, Yuan Wu, Danny H. K. Tsang:
Mechanism Design for Online Resource Allocation: A Unified Approach. 24:1-24:46 - Rajarshi Bhattacharjee, Subhankar Banerjee, Abhishek Sinha:
Fundamental Limits on the Regret of Online Network-Caching. 25:1-25:31 - Peter Snyder, Antoine Vastel, Ben Livshits:
Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. 26:1-26:24 - Ludovic Thomas, Jean-Yves Le Boudec:
On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks. 27:1-27:41 - Chun-Yi Liu, Jagadish Kotra, Myoungsoo Jung, Mahmut Taylan Kandemir:
Centaur: A Novel Architecture for Reliable, Low-Wear, High-Density 3D NAND Storage. 28:1-28:25 - Weizhao Tang, Weina Wang, Giulia Fanti, Sewoong Oh:
Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks. 29:1-29:39 - Ziv Scully, Lucas van Kreveld, Onno J. Boxma, Jan-Pieter L. Dorsman, Adam Wierman:
Characterizing Policies with Optimal Response Time Tails under Heavy-Tailed Job Sizes. 30:1-30:33 - Fan Fred Lin, Keyur Muzumdar, Nikolay Pavlovich Laptev, Mihai-Valentin Curelea, Seunghak Lee, Sriram Sankar:
Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service Environment. 31:1-31:23 - Yibo Pi, Sugih Jamin, Peter B. Danzig, Feng Qian:
Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View. 32:1-32:29 - Seyed Armin Vakil-Ghahani, Mahmut Taylan Kandemir, Jagadish B. Kotra:
DSM: A Case for Hardware-Assisted Merging of DRAM Rows with Same Content. 33:1-33:26 - Erik Tillberg, Peter Marbach, Ravi Mazumdar:
Optimal Bidding Strategies for Online Ad Auctions with Overlapping Targeting Criteria. 34:1-34:55 - Aditya Gopalan, Abishek Sankararaman, Anwar Walid, Sriram Vishwanath:
Stability and Scalability of Blockchain Systems. 35:1-35:35 - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:
Measuring Membership Privacy on Aggregate Location Time-Series. 36:1-36:28 - Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. 37:1-37:28 - Atakan Aral, Melike Erol-Kantarci, Ivona Brandic:
Staleness Control for Edge Data Analytics. 38:1-38:24 - Xiaohan Wei, Hao Yu, Michael J. Neely:
Online Primal-Dual Mirror Descent under Stochastic Constraints. 39:1-39:36 - Alexander Marder, Matthew Luckie, Bradley Huffaker, Kimberly C. Claffy:
vrfinder: Finding Outbound Addresses in Traceroute. 40:1-40:28
Volume 4, Number 3, December 2020
- Xin Wang, Richard T. B. Ma:
On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis. 41:1-41:32 - Wentao Weng, Weina Wang:
Achieving Zero Asymptotic Queueing Delay for Parallel Jobs. 42:1-42:36 - Ziv Scully, Isaac Grosof, Mor Harchol-Balter:
The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions. 43:1-43:29 - Luis Fernando Abanto-Leon, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. 44:1-44:31 - Wentao Weng, Xingyu Zhou, R. Srikant:
Optimal Load Balancing with Locality Constraints. 45:1-45:37 - Youri Raaijmakers, Sem C. Borst:
Achievable Stability in Redundancy Systems. 46:1-46:21 - Michael Fleder, Devavrat Shah:
I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem. 47:1-47:17 - Elene Anton, Urtzi Ayesta, Matthieu Jonckheere, Ina Maria Verloop:
Improving the Performance of Heterogeneous Data Centers through Redundancy. 48:1-48:29 - Ahmad Hazimeh, Adrian Herrera, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. 49:1-49:29 - Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. 50:1-50:28 - Bo Sun, Ali Zeynali, Tongxin Li, Mohammad Hassan Hajiesmaili, Adam Wierman, Danny H. K. Tsang:
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging. 51:1-51:32 - Kamiar Asgari, Michael J. Neely:
Bregman-style Online Convex Optimization with EnergyHarvesting Constraints. 52:1-52:25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.