Measurement and Analysis of Computing Systems (POMACS)


Search Issue
enter search term and/or author name


Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 1 Issue 1, June 2017

Augustin Chaintreau, Leana Golubchik, Zhi-Li Zhang
Article No.: 1
DOI: 10.1145/3105875

Hadoop on Named Data Networking: Experience and Results
Mathias Gibbens, Chris Gniady, Lei Ye, Beichuan Zhang
Article No.: 2
DOI: 10.1145/3084439

The Named Data Networking (NDN) architecture retrieves content by names rather than connecting to specific hosts. It provides benefits such as highly efficient and resilient content distribution, which fit well to data-intensive distributed...

Queue-Proportional Sampling: A Better Approach to Crossbar Scheduling for Input-Queued Switches
Long Gong, Paul Tune, Liang Liu, Sen Yang, Jun (Jim) Xu
Article No.: 3
DOI: 10.1145/3084440

Most present day switching systems, in Internet routers and data-center switches, employ a single input-queued crossbar to interconnect input ports with output ports. Such switches need to compute a matching, between input and output ports, for...

Investigation of the 2016 Linux TCP Stack Vulnerability at Scale
Alan Quach, Zhongjie Wang, Zhiyun Qian
Article No.: 4
DOI: 10.1145/3084441

To combat blind in-window attacks against TCP, changes proposed in RFC 5961 have been implemented by Linux since late 2012. While successfully eliminating the old vulnerabilities, the new TCP implementation was reported in August 2016 to have...

Portfolio-driven Resource Management for Transient Cloud Servers
Prateek Sharma, David Irwin, Prashant Shenoy
Article No.: 5
DOI: 10.1145/3084442

Cloud providers have begun to offer their surplus capacity in the form of low-cost transient servers, which can be revoked unilaterally at any time. While the low cost of transient servers makes them attractive for a wide range of applications,...

Deconstructing the Energy Consumption of the Mobile Page Load
Yi Cao, Javad Nejati, Muhammad Wajahat, Aruna Balasubramanian, Anshul Gandhi
Article No.: 6
DOI: 10.1145/3084443

Modeling the energy consumption of applications on mobile devices is an important topic that has received much attention in recent years. However, there has been very little research on modeling the energy consumption of the mobile Web. This is...

On Optimal Two-Sided Pricing of Congested Networks
Xin Wang, Richard T.B. Ma, Yinlong Xu
Article No.: 7
DOI: 10.1145/3084444

Traditionally, Internet Access Providers (APs) only charge end-users for Internet access services; however, to recoup infrastructure costs and increase revenues, some APs have recently adopted two-sided pricing schemes under which both end-users...

Accelerating Performance Inference over Closed Systems by Asymptotic Methods
Giuliano Casale
Article No.: 8
DOI: 10.1145/3084445

Recent years have seen a rapid growth of interest in exploiting monitoring data collected from enterprise applications for automated management and performance analysis. In spite of this trend, even simple performance inference problems involving...

Hieroglyph: Locally-Sufficient Graph Processing via Compute-Sync-Merge
Xiaoen Ju, Hani Jamjoom, Kang G. Shin
Article No.: 9
DOI: 10.1145/3084446

Despite their widespread adoption, large-scale graph processing systems do not fully decouple computation and communication, often yielding suboptimal performance. Locally-sufficient computation-computation that relies only on the graph state...

Understanding Reduced-Voltage Operation in Modern DRAM Devices: Experimental Characterization, Analysis, and Mechanisms
Kevin K. Chang, Onur Mutlu, A. Giray Yağlıkçı, Saugata Ghose, Aditya Agrawal, Niladrish Chatterjee, Abhijith Kashyap, Donghyuk Lee, Mike O'Connor, Hasan Hassan
Article No.: 10
DOI: 10.1145/3084447

The energy consumption of DRAM is a critical concern in modern computing systems. Improvements in manufacturing process technology have allowed DRAM vendors to lower the DRAM supply voltage conservatively, which reduces some of the DRAM energy...

Using Burstable Instances in the Public Cloud: Why, When and How?
Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis
Article No.: 11
DOI: 10.1145/3084448

Amazon EC2 and Google Compute Engine (GCE) have recently introduced a new class of virtual machines called "burstable" instances that are cheaper than even the smallest traditional/regular instances. These lower prices come with reduced average...

Stein's Method for Mean Field Approximations in Light and Heavy Traffic Regimes
Lei Ying
Article No.: 12
DOI: 10.1145/3084449

Mean-field analysis is an analytical method for understanding large-scale stochastic systems such as large-scale data centers and communication networks. The idea is to approximate the stationary distribution of a large-scale stochastic system...

Security Game with Non-additive Utilities and Multiple Attacker Resources
Sinong Wang, Ness Shroff
Article No.: 13
DOI: 10.1145/3084450

There has been significant interest in studying security games for modeling the interplay of attacks and defenses on various systems involving critical infrastructure, financial system security, political campaigns, and civil safeguarding....

A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing
Lingda Li, Robel Geda, Ari B. Hayes, Yanhao Chen, Pranav Chaudhari, Eddy Z. Zhang, Mario Szegedy
Article No.: 14
DOI: 10.1145/3084451

Graph edge partition models have recently become an appealing alternative to graph vertex partition models for distributed computing due to their flexibility in balancing loads and their performance in reducing communication cost [6,...

Persistent Spread Measurement for Big Network Data Based on Register Intersection
You Zhou, Yian Zhou, Min Chen, Shigang Chen
Article No.: 15
DOI: 10.1145/3084452

Persistent spread measurement is to count the number of distinct elements that persist in each network flow for predefined time periods. It has many practical applications, including detecting long-term stealthy network activities in the...

Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis
Steffen Bondorf, Paul Nikolaus, Jens B. Schmitt
Article No.: 16
DOI: 10.1145/3084453

Networks are integral parts of modern safety-critical systems and certification demands the provision of guarantees for data transmissions. Deterministic Network Calculus (DNC) can compute a worst-case bound on a data flow's end-to-end delay....

Expected Values Estimated via Mean-Field Approximation are 1/N-Accurate
Nicolas Gast
Article No.: 17
DOI: 10.1145/3084454

Mean-field approximation is a powerful tool to study large-scale stochastic systems such as data-centers -- one example being the famous power of two-choice paradigm. It is shown in the literature that under quite general conditions, the empirical...

Characterizing and Modeling Patching Practices of Industrial Control Systems
Brandon Wang, Xiaoye Li, Leandro P. de Aguiar, Daniel S. Menasche, Zubair Shafiq
Article No.: 18
DOI: 10.1145/3084455

Industrial Control Systems (ICS) are widely deployed in mission critical infrastructures such as manufacturing, energy, and transportation. The mission critical nature of ICS devices poses important security challenges for ICS vendors and asset...

A Case Study in Power Substation Network Dynamics
David Formby, Anwar Walid, Raheem Beyah
Article No.: 19
DOI: 10.1145/3084456

The modern world is becoming increasingly dependent on computing and communication technology to function, but unfortunately its application and impact on areas such as critical infrastructure and industrial control system (ICS) networks remains...

Outward Influence and Cascade Size Estimation in Billion-scale Networks
Hung T. Nguyen, Tri P. Nguyen, Tam N. Vu, Thang N. Dinh
Article No.: 20
DOI: 10.1145/3084457

Estimating cascade size and nodes' influence is a fundamental task in social, technological, and biological networks. Yet this task is extremely challenging due to the sheer size and the structural heterogeneity of networks. We investigate a new...