


default search action
Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 4
Volume 4, Number 1, March 2020
- Vishwaraj Doshi, Do Young Eun:

Fiedler Vector Approximation via Interacting Random Walks. 01:1-01:28 - Martin Zubeldia:

Delay-optimal Policies in Partial Fork-Join Systems with Redundancy and Random Slowdowns. 02:1-02:49 - Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu:

Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating. 03:1-03:27 - Reza Alijani, Siddhartha Banerjee, Sreenivas Gollapudi, Kamesh Munagala, Kangning Wang:

Predict and Match: Prophet Inequalities with Uncertain Supply. 04:1-04:23 - Jinke Song, Qiang Li

, Haining Wang, Limin Sun:
Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild. 05:1-05:25 - Lei Zhang

, Reza Karimi, Irfan Ahmad, Ymir Vigfusson:
Optimal Data Placement for Heterogeneous Cache, Memory, and Storage Systems. 06:1-06:27 - Zhihui Shao, Mohammad A. Islam

, Shaolei Ren
:
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers. 07:1-07:39 - Ziv Scully

, Mor Harchol-Balter, Alan Scheller-Wolf:
Simple Near-Optimal Scheduling for the M/G/1. 11:1-11:29 - Yang Cai

, Federico Echenique, Hu Fu, Katrina Ligett, Adam Wierman, Juba Ziani:
Third-Party Data Providers Ruin Simple Mechanisms. 12:1-12:31 - Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:

Characterizing Transnational Internet Performance and the Great Bottleneck of China. 13:1-13:23 - Richard Combes, Alexandre Proutière, Alexandre Fauquette:

Unimodal Bandits with Continuous Arms: Order-optimal Regret without Smoothness. 14:1-14:28 - Lin Yang

, Mohammad Hassan Hajiesmaili, Ramesh K. Sitaraman
, Adam Wierman, Enrique Mallada
, Wing Shing Wong:
Online Linear Optimization with Inventory Management Constraints. 16:1-16:29 - Martin Karsten, Saman Barghi:

User-level Threading: Have Your Cake and Eat It Too. 17:1-17:30 - Yiheng Lin, Gautam Goel, Adam Wierman:

Online Optimization with Predictions and Non-convex Losses. 18:1-18:32 - Sungjin Im, Benjamin Moseley, Kamesh Munagala, Kirk Pruhs:

Dynamic Weighted Fairness with Minimal Disruptions. 19:1-19:18 - Chen Avin, Manya Ghobadi, Chen Griner, Stefan Schmid:

On the Complexity of Traffic Traces and Implications. 20:1-20:29
Volume 4, Number 2, June 2020
- Y. C. Tay, Athina Markopoulou:

Editorial. 21:1 - Shouqian Shi, Chen Qian:

Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems. 22:1-22:32 - Philippe Nain, Gayane Vardoyan

, Saikat Guha, Don Towsley:
On the Analysis of a Multipartite Entanglement Distribution Switch. 23:1-23:39 - Xiaoqi Tan, Bo Sun

, Alberto Leon-Garcia, Yuan Wu, Danny H. K. Tsang:
Mechanism Design for Online Resource Allocation: A Unified Approach. 24:1-24:46 - Rajarshi Bhattacharjee, Subhankar Banerjee, Abhishek Sinha:

Fundamental Limits on the Regret of Online Network-Caching. 25:1-25:31 - Peter Snyder, Antoine Vastel, Ben Livshits:

Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking. 26:1-26:24 - Ludovic Thomas

, Jean-Yves Le Boudec:
On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks. 27:1-27:41 - Chun-Yi Liu

, Jagadish Kotra, Myoungsoo Jung, Mahmut Taylan Kandemir:
Centaur: A Novel Architecture for Reliable, Low-Wear, High-Density 3D NAND Storage. 28:1-28:25 - Weizhao Tang, Weina Wang, Giulia Fanti, Sewoong Oh:

Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks. 29:1-29:39 - Ziv Scully

, Lucas van Kreveld, Onno J. Boxma, Jan-Pieter L. Dorsman, Adam Wierman:
Characterizing Policies with Optimal Response Time Tails under Heavy-Tailed Job Sizes. 30:1-30:33 - Fan Fred Lin, Keyur Muzumdar, Nikolay Pavlovich Laptev, Mihai-Valentin Curelea, Seunghak Lee, Sriram Sankar:

Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service Environment. 31:1-31:23 - Yibo Pi, Sugih Jamin, Peter B. Danzig, Feng Qian:

Latency Imbalance Among Internet Load-Balanced Paths: A Cloud-Centric View. 32:1-32:29 - Seyed Armin Vakil-Ghahani

, Mahmut Taylan Kandemir, Jagadish B. Kotra:
DSM: A Case for Hardware-Assisted Merging of DRAM Rows with Same Content. 33:1-33:26 - Erik Tillberg, Peter Marbach, Ravi Mazumdar

:
Optimal Bidding Strategies for Online Ad Auctions with Overlapping Targeting Criteria. 34:1-34:55 - Aditya Gopalan, Abishek Sankararaman, Anwar Walid, Sriram Vishwanath:

Stability and Scalability of Blockchain Systems. 35:1-35:35 - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:

Measuring Membership Privacy on Aggregate Location Time-Series. 36:1-36:28 - Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:

Understanding (Mis)Behavior on the EOSIO Blockchain. 37:1-37:28 - Atakan Aral

, Melike Erol-Kantarci, Ivona Brandic:
Staleness Control for Edge Data Analytics. 38:1-38:24 - Xiaohan Wei, Hao Yu, Michael J. Neely:

Online Primal-Dual Mirror Descent under Stochastic Constraints. 39:1-39:36 - Alexander Marder, Matthew Luckie

, Bradley Huffaker, Kimberly C. Claffy
:
vrfinder: Finding Outbound Addresses in Traceroute. 40:1-40:28
Volume 4, Number 3, December 2020
- Xin Wang, Richard T. B. Ma:

On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis. 41:1-41:32 - Wentao Weng, Weina Wang:

Achieving Zero Asymptotic Queueing Delay for Parallel Jobs. 42:1-42:36 - Ziv Scully

, Isaac Grosof
, Mor Harchol-Balter:
The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions. 43:1-43:29 - Luis Fernando Abanto-Leon

, Andreas Bäuml, Gek Hong (Allyson) Sim, Matthias Hollick
, Arash Asadi:
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints. 44:1-44:31 - Wentao Weng, Xingyu Zhou, R. Srikant:

Optimal Load Balancing with Locality Constraints. 45:1-45:37 - Youri Raaijmakers

, Sem C. Borst:
Achievable Stability in Redundancy Systems. 46:1-46:21 - Michael Fleder, Devavrat Shah:

I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem. 47:1-47:17 - Elene Anton, Urtzi Ayesta, Matthieu Jonckheere

, Ina Maria Verloop:
Improving the Performance of Heterogeneous Data Centers through Redundancy. 48:1-48:29 - Ahmad Hazimeh, Adrian Herrera

, Mathias Payer:
Magma: A Ground-Truth Fuzzing Benchmark. 49:1-49:29 - Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:

Tracking Counterfeit Cryptocurrency End-to-end. 50:1-50:28 - Bo Sun

, Ali Zeynali, Tongxin Li, Mohammad Hassan Hajiesmaili, Adam Wierman, Danny H. K. Tsang:
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging. 51:1-51:32 - Kamiar Asgari, Michael J. Neely:

Bregman-style Online Convex Optimization with EnergyHarvesting Constraints. 52:1-52:25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














