Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 8, Issue 1March 2024POMACS
Reflects downloads up to 19 Nov 2024Bibliometrics
Skip Table Of Content Section
editorial
Free
POMACS V8, N1, March 2024 Editorial
Article No.: 1, Page 1https://doi.org/10.1145/3639027

The Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS) focuses on the measurement and performance evaluation of computer systems and operates in close collaboration with the ACM Special Interest Group SIGMETRICS. All papers ...

research-article
Open Access
StarShip: Mitigating I/O Bottlenecks in Serverless Computing for Scientific Workflows
Article No.: 2, Pages 1–29https://doi.org/10.1145/3639028

This work highlights the significance of I/O bottlenecks that data-intensive HPC workflows face in serverless environments - an issue that has been largely overlooked by prior works. To address this challenge, we propose a novel framework, StarShip, ...

research-article
Open Access
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service
Article No.: 3, Pages 1–25https://doi.org/10.1145/3639029

Distributed Denial-of-Service (DDoS) attacks continue to threaten the availability of Internet-based services. While countermeasures exist to decrease the impact of these attacks, not all operators have the resources or knowledge to deploy them. ...

research-article
Open Access
Online Allocation with Replenishable Budgets: Worst Case and Beyond
Article No.: 4, Pages 1–34https://doi.org/10.1145/3639030

This paper studies online resource allocation with replenishable budgets, where budgets can be replenished on top of the initial budget and an agent sequentially chooses online allocation decisions without violating the available budget constraint at ...

research-article
Open Access
Scalability Limitations of Processing-in-Memory using Real System Evaluations
Article No.: 5, Pages 1–28https://doi.org/10.1145/3639046

Processing-in-memory (PIM), where the compute is moved closer to the memory or the data, has been widely explored to accelerate emerging workloads. Recently, different PIM-based systems have been announced by memory vendors to minimize data movement and ...

research-article
Open Access
Machine Learning Systems are Bloated and Vulnerable
Article No.: 6, Pages 1–30https://doi.org/10.1145/3639032

Today's software is bloated with both code and features that are not used by most users. This bloat is prevalent across the entire software stack, from operating systems and applications to containers. Containers are lightweight virtualization ...

research-article
Open Access
Shrinking VOD Traffic via Rényi-Entropic Optimal Transport
Article No.: 7, Pages 1–34https://doi.org/10.1145/3639033

In response to the exponential surge in Internet Video on Demand (VOD) traffic, numerous research endeavors have concentrated on optimizing and enhancing infrastructure efficiency. In contrast, this paper explores whether users' demand patterns can be ...

research-article
Thorough Characterization and Analysis of Large Transformer Model Training At-Scale
Article No.: 8, Pages 1–25https://doi.org/10.1145/3639034

Large transformer models have recently achieved great success across various domains. With a growing number of model parameters, a large transformer model training today typically involves model sharding, data parallelism, and model parallelism. Thus, ...

research-article
Open Access
Heavy-Traffic Optimal Size- and State-Aware Dispatching
Article No.: 9, Pages 1–36https://doi.org/10.1145/3639035

Dispatching systems, where arriving jobs are immediately assigned to one of multiple queues, are ubiquitous in computer systems and service systems. A natural and practically relevant model is one in which each queue serves jobs in FCFS (First-Come First-...

research-article
Open Access
SCADA World: An Exploration of the Diversity in Power Grid Networks
Article No.: 10, Pages 1–32https://doi.org/10.1145/3639036

Despite a growing interest in understanding the industrial control networks that monitor and control our critical infrastructures (such as the power grid), to date, SCADA networks have been analyzed in isolation from each other. They have been treated as ...

research-article
Open Access
NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation
Article No.: 11, Pages 1–32https://doi.org/10.1145/3639037

Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network ...

research-article
H3DM: A High-bandwidth High-capacity Hybrid 3D Memory Design for GPUs
Article No.: 12, Pages 1–28https://doi.org/10.1145/3639038

Graphics Processing Units (GPUs) are widely used for modern applications with huge data sizes. However, the performance benefit of GPUs is limited by their memory capacity and bandwidth. Although GPU vendors improve memory capacity and bandwidth using 3D ...

research-article
Democratizing LEO Satellite Network Measurement
Article No.: 13, Pages 1–26https://doi.org/10.1145/3639039

Low Earth Orbit (LEO) satellite networks are quickly gaining traction with promises of impressively low latency, high bandwidth, and global reach. However, the research community knows relatively little about their operation and performance in practice. ...

research-article
Approximations to Study the Impact of the Service Discipline in Systems with Redundancy
Article No.: 14, Pages 1–33https://doi.org/10.1145/3639040

As job redundancy has been recognized as an effective means to improve performance of large-scale computer systems, queueing systems with redundancy have been studied by various authors. Existing results include methods to compute the queue length ...

research-article
Open Access
Deep Dive into NTP Pool's Popularity and Mapping
Article No.: 15, Pages 1–30https://doi.org/10.1145/3639041

Time synchronization is of paramount importance on the Internet, with the Network Time Protocol (NTP) serving as the primary synchronization protocol. The NTP Pool, a volunteer-driven initiative launched two decades ago, facilitates connections between ...

research-article
Open Access
Xaminer: An Internet Cross-Layer Resilience Analysis Tool
Article No.: 16, Pages 1–37https://doi.org/10.1145/3639042

A resilient Internet infrastructure is critical in our highly interconnected society. However, the Internet faces several vulnerabilities, ranging from natural disasters to human activities, that can impact the physical layer and, in turn, the higher ...

research-article
Open Access
Fair Resource Allocation in Virtualized O-RAN Platforms
Article No.: 17, Pages 1–34https://doi.org/10.1145/3639043

O-RAN systems and their deployment in virtualized general-purpose computing platforms (O-Cloud) constitute a paradigm shift expected to bring unprecedented performance gains. However, these architectures raise new implementation challenges and threaten ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.