enter search term and/or author name
Message from the Editors
Adam Wierman, Aditya Akella
Article No.: 23
This issue marks the completion of the first year of the Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS). POMACS was among the first three journals joining the recently launched Proceedings of the ACM (PACM)...
An Optimal Algorithm for Online Non-Convex Learning
Lin Yang, Lei Deng, Mohammad H. Hajiesmaili, Cheng Tan, Wing Shing Wong
Article No.: 25
In many online learning paradigms, convexity plays a central role in the derivation and analysis of online learning algorithms. The results, however, fail to be extended to the non-convex settings, while non-convexity is necessitated by a large...
Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning
Mowei Wang, Yong Cui, Shihan Xiao, Xin Wang, Dan Yang, Kai Chen, Jun Zhu
Article No.: 26
The emerging optical/wireless topology reconfiguration technologies have shown great potential in improving the performance of data center networks. However, it also poses a big challenge on how to find the best topology configurations to support...
On the Power-of-d-choices with Least Loaded Server Selection
Tim Hellemans, Benny Van Houdt
Article No.: 27
Motivated by distributed schedulers that combine the power-of-d-choices with late binding and systems that use replication with cancellation-on-start, we study the performance of the LL(d) policy which assigns a job to a server that currently has...
Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack
Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Pascal Felber, Christof Fetzer
Article No.: 28
Memory-safety violations are the primary cause of security and reliability issues in software systems written in unsafe languages. Given the limited adoption of decades-long research in software-based memory safety approaches, as an alternative,...
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees
Giulia Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, Pramod Viswanath
Article No.: 29
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that...
The Price of Fragmentation in Mobility-on-Demand Services
Thibault Séjournè, Samitha Samaranayake, Siddhartha Banerjee
Article No.: 30
Mobility-on-Demand platforms are a fast growing component of the urban transit ecosystem. Though a growing literature addresses the question of how to make individual MoD platforms more efficient, much less is known about the cost of market...
The Cost of Uncertainty in Curing Epidemics
Jessica Hoffmann, Constantine Caramanis
Article No.: 31
Motivated by the study of controlling (curing) epidemics, we consider the spread of an SI process on a known graph, where we have a limited budget to use to transition infected nodes back to the susceptible state (i.e., to cure nodes). Recent work...
Practical Bounds on Optimal Caching with Variable Object Sizes
Daniel S. Berger, Nathan Beckmann, Mor Harchol-Balter
Article No.: 32
Many recent caching systems aim to improve miss ratios, but there is no good sense among practitioners of how much further miss ratios can be improved. In other words, should the systems community continue working on this problem? Currently, there...
LTERadar: Towards LTE-Aware Wi-Fi Access Points
Christina Vlachou, Ioannis Pefkianakis, Kyu-Han Kim
Article No.: 33
Major cellular hardware vendors (e.g. Qualcomm, Ericsson), mobile service providers (e.g. Verizon, T-Mobile) and standardization bodies (LTE-U forum, 3GPP) are seeking to extend LTE networks into unlicensed bands to boost LTE speeds and coverage....
Delay Scaling in Many-Sources Wireless Networks without Queue State Information
Sem Borst, Martin Zubeldia
Article No.: 34
We examine a canonical scenario where several wireless data sources generate sporadic delay-sensitive messages that need to be transmitted to a common access point. The access point operates in a time-slotted fashion, and can instruct the various...
A Quantitative Evaluation of Contemporary GPU Simulation Methodology
Akshay Jain, Mahmoud Khairy, Timothy G. Rogers
Article No.: 35
Contemporary Graphics Processing Units (GPUs) are used to accelerate highly parallel compute workloads. For the last decade, researchers in academia and industry have used cycle-level GPU architecture simulators to evaluate future designs. This...
Learning Proportionally Fair Allocations with Low Regret
Mohammad Sadegh Talebi, Alexandre Proutiere
Article No.: 36
This paper addresses a generic sequential resource allocation problem, where in each round a decision maker selects an allocation of resources (servers) to a set of tasks consisting of a large number of jobs. A job of task i assigned to server j...