Table of contents for issues of Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)

Last update: Thu May 26 07:11:12 MDT 2022                Valid HTML 3.2!

Volume 1, Number 1, June, 2017
Volume 1, Number 2, December, 2017
Volume 2, Number 1, April, 2018
Volume 2, Number 2, June, 2018
Volume 2, Number 3, December, 2018
Volume 3, Number 1, March, 2019
Volume 3, Number 2, June, 2019
Volume 3, Number 3, December, 2019
Volume 4, Number 1, May, 2020
Volume 4, Number 2, June, 2020
Volume 4, Number 3, November, 2020
Volume 5, Number 1, February, 2021
Volume 5, Number 2, June, 2021
Volume 5, Number 3, December, 2021
Volume 6, Number 1, March, 2022


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 1, Number 1, June, 2017

        Augustin Chaintreau and   
            Leana Golubchik and   
                   Zhi-Li Zhang   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
            Mathias Gibbens and   
               Chris Gniady and   
                     Lei Ye and   
                 Beichuan Zhang   Hadoop on Named Data Networking:
                                  Experience and Results . . . . . . . . . 2:1--2:??
                  Long Gong and   
                  Paul Tune and   
                  Liang Liu and   
                   Sen Yang and   
                   Jun (Jim) Xu   Queue-Proportional Sampling: A Better
                                  Approach to Crossbar Scheduling for
                                  Input-Queued Switches  . . . . . . . . . 3:1--3:??
                 Alan Quach and   
              Zhongjie Wang and   
                    Zhiyun Qian   Investigation of the 2016 Linux TCP
                                  Stack Vulnerability at Scale . . . . . . 4:1--4:??
             Prateek Sharma and   
                David Irwin and   
                Prashant Shenoy   Portfolio-driven Resource Management for
                                  Transient Cloud Servers  . . . . . . . . 5:1--5:??
                     Yi Cao and   
               Javad Nejati and   
           Muhammad Wajahat and   
      Aruna Balasubramanian and   
                  Anshul Gandhi   Deconstructing the Energy Consumption of
                                  the Mobile Page Load . . . . . . . . . . 6:1--6:??
                   Xin Wang and   
           Richard T. B. Ma and   
                     Yinlong Xu   On Optimal Two-Sided Pricing of
                                  Congested Networks . . . . . . . . . . . 7:1--7:??
                Giuliano Casale   Accelerating Performance Inference over
                                  Closed Systems by Asymptotic Methods . . 8:1--8:??
                  Xiaoen Ju and   
               Hani Jamjoom and   
                   Kang G. Shin   Hieroglyph: Locally-Sufficient Graph
                                  Processing via Compute--Sync--Merge  . . 9:1--9:??
             Kevin K. Chang and   
 A. Giray Ya\ualikçi and   
              Saugata Ghose and   
             Aditya Agrawal and   
       Niladrish Chatterjee and   
           Abhijith Kashyap and   
               Donghyuk Lee and   
              Mike O'Connor and   
               Hasan Hassan and   
                     Onur Mutlu   Understanding Reduced-Voltage Operation
                                  in Modern DRAM Devices: Experimental
                                  Characterization, Analysis, and
                                  Mechanisms . . . . . . . . . . . . . . . 10:1--10:??
                 Cheng Wang and   
           Bhuvan Urgaonkar and   
             Neda Nasiriani and   
                 George Kesidis   Using Burstable Instances in the Public
                                  Cloud: Why, When and How?  . . . . . . . 11:1--11:??
                       Lei Ying   Stein's Method for Mean Field
                                  Approximations in Light and Heavy
                                  Traffic Regimes  . . . . . . . . . . . . 12:1--12:??
                Sinong Wang and   
                    Ness Shroff   Security Game with Non-additive
                                  Utilities and Multiple Attacker
                                  Resources  . . . . . . . . . . . . . . . 13:1--13:??
                  Lingda Li and   
                 Robel Geda and   
               Ari B. Hayes and   
                Yanhao Chen and   
           Pranav Chaudhari and   
              Eddy Z. Zhang and   
                  Mario Szegedy   A Simple Yet Effective Balanced Edge
                                  Partition Model for Parallel Computing   14:1--14:??
                   You Zhou and   
                  Yian Zhou and   
                   Min Chen and   
                   Shigang Chen   Persistent Spread Measurement for Big
                                  Network Data Based on Register
                                  Intersection . . . . . . . . . . . . . . 15:1--15:??
            Steffen Bondorf and   
              Paul Nikolaus and   
                Jens B. Schmitt   Quality and Cost of Deterministic
                                  Network Calculus: Design and Evaluation
                                  of an Accurate and Fast Analysis . . . . 16:1--16:??
                   Nicolas Gast   Expected Values Estimated via Mean-Field
                                  Approximation are $ 1 / N $-Accurate . . 17:1--17:??
               Brandon Wang and   
                  Xiaoye Li and   
       Leandro P. de Aguiar and   
         Daniel S. Menasche and   
                  Zubair Shafiq   Characterizing and Modeling Patching
                                  Practices of Industrial Control Systems  18:1--18:??
               David Formby and   
                Anwar Walid and   
                   Raheem Beyah   A Case Study in Power Substation Network
                                  Dynamics . . . . . . . . . . . . . . . . 19:1--19:??
             Hung T. Nguyen and   
              Tri P. Nguyen and   
                  Tam N. Vu and   
                  Thang N. Dinh   Outward Influence and Cascade Size
                                  Estimation in Billion-scale Networks . . 20:1--20:??
                 Wonil Choi and   
          Mohammad Arjomand and   
             Myoungsoo Jung and   
                Mahmut Kandemir   Exploiting Data Longevity for Enhancing
                                  the Lifetime of Flash-based Storage
                                  Class Memory . . . . . . . . . . . . . . 21:1--21:??
Shaileshh Bojja Venkatakrishnan and   
               Giulia Fanti and   
               Pramod Viswanath   Dandelion: Redesigning the Bitcoin
                                  Network for Anonymity  . . . . . . . . . 22:1--22:??
                Zijun Zhang and   
                Zongpeng Li and   
                       Chuan Wu   Optimal Posted Prices for Online Cloud
                                  Resource Allocation  . . . . . . . . . . 23:1--23:??
                    Wen Sun and   
            Veronique Simon and   
           Sebastien Monnet and   
            Philippe Robert and   
                    Pierre Sens   Analysis of a Stochastic Model of
                                  Replication in Large Distributed Storage
                                  Systems: A Mean-Field Approach . . . . . 24:1--24:??
         Debankur Mukherjee and   
               Souvik Dhara and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Optimal Service Elasticity in
                                  Large-Scale Distributed Systems  . . . . 25:1--25:??
               Donghyuk Lee and   
                Samira Khan and   
        Lavanya Subramanian and   
              Saugata Ghose and   
    Rachata Ausavarungnirun and   
         Gennady Pekhimenko and   
             Vivek Seshadri and   
                     Onur Mutlu   Design-Induced Latency Variation in
                                  Modern DRAM Chips: Characterization,
                                  Analysis, and Latency Reduction
                                  Mechanisms . . . . . . . . . . . . . . . 26:1--26:??
     Konstantin Avrachenkov and   
            Jasper Goseling and   
               Berksan Serbetci   A Low-Complexity Approach to Distributed
                                  Cooperative Caching with Geographic
                                  Constraints  . . . . . . . . . . . . . . 27:1--27:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 1, Number 2, December, 2017

                   Sen Yang and   
                   Bill Lin and   
                         Jun Xu   Safe Randomized Load-Balanced Switching
                                  By Diffusing Extra Loads . . . . . . . . 29:1--29:37
                   Sen Yang and   
                     Yan He and   
                   Zihui Ge and   
               Dongmei Wang and   
                         Jun Xu   Predictive Impact Analysis for Designing
                                  a Resilient Cellular Backhaul Network    30:1--30:33
          Muhammad J. Amjad and   
                  Devavrat Shah   Censored Demand Estimation in Retail . . 31:1--31:28
           Stefan Magureanu and   
        Alexandre Proutiere and   
            Marcus Isaksson and   
                    Boxun Zhang   Online Learning of Optimally Diverse
                                  Rankings . . . . . . . . . . . . . . . . 32:1--32:26
               Nicolas Gast and   
                Benny Van Houdt   A Refined Mean Field Approximation . . . 33:1--33:28
                Sinong Wang and   
                    Ness Shroff   Towards Fast-Convergence, Low-Delay and
                                  Low-Complexity Network Optimization  . . 34:1--34:32
       Konstantinos Psychas and   
                  Javad Ghaderi   On Non-Preemptive VM Scheduling in the
                                  Cloud  . . . . . . . . . . . . . . . . . 35:1--35:29
                   Lin Yang and   
            Wing Shing Wong and   
        Mohammad H. Hajiesmaili   An Optimal Randomized Online Algorithm
                                  for QoS Buffer Management  . . . . . . . 36:1--36:26
              Thinh T. Doan and   
            Carolyn L. Beck and   
                     R. Srikant   On the Convergence Rate of Distributed
                                  Gradient Methods for Finite-Sum
                                  Optimization under Communication Delays  37:1--37:27
              Reza Aghajani and   
                 Xingjie Li and   
                 Kavita Ramanan   The PDE Method for the Analysis of
                                  Randomized Load Balancing Networks . . . 38:1--38:28
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
                    Yin Sun and   
                    Ness Shroff   Designing Low-Complexity Heavy-Traffic
                                  Delay-Optimal Load Balancing Schemes:
                                  Theory to Algorithms . . . . . . . . . . 39:1--39:30
              Benjamin Berg and   
         Jan-Pieter Dorsman and   
             Mor Harchol-Balter   Towards Optimality in Parallel
                                  Scheduling . . . . . . . . . . . . . . . 40:1--40:30
              Thomas Bonald and   
        Céline Comte and   
                 Fabien Mathieu   Performance of Balanced Fairness in
                                  Resource Pools: a Recursive Approach . . 41:1--41:25
       Yvonne-Anne Pignolet and   
              Stefan Schmid and   
                  Gilles Tredan   Tomographic Node Placement Strategies
                                  and the Impact of the Routing Model  . . 42:1--42:23
             Tao B. Schardl and   
            Tyler Denniston and   
               Damon Doucet and   
        Bradley C. Kuszmaul and   
        I-Ting Angelina Lee and   
           Charles E. Leiserson   The CSI Framework for Compiler-Inserted
                                  Program Instrumentation  . . . . . . . . 43:1--43:25
                Yudong Chen and   
                    Lili Su and   
                     Jiaming Xu   Distributed Statistical Machine Learning
                                  in Adversarial Settings: Byzantine
                                  Gradient Descent . . . . . . . . . . . . 44:1--44:25
              Xiaomeng Chen and   
                 Jiayi Meng and   
              Y. Charlie Hu and   
               Maruti Gupta and   
           Ralph Hasholzner and   
Venkatesan Nallampatti Ekambaram and   
               Ashish Singh and   
    Srikathyayani Srikanteswara   A Fine-grained Event-based Modem Power
                                  Model for Enabling In-depth Modem Energy
                                  Drain Analysis . . . . . . . . . . . . . 45:1--45:28


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 1, April, 2018

             Shenglin Zhang and   
                   Ying Liu and   
                Weibin Meng and   
                Zhiling Luo and   
                  Jiahao Bu and   
                   Sen Yang and   
              Peixian Liang and   
                    Dan Pei and   
                     Jun Xu and   
                Yuzhi Zhang and   
                    Yu Chen and   
                   Hui Dong and   
                Xianping Qu and   
                       Lei Song   PreFix: Switch Failure Prediction in
                                  Datacenter Networks  . . . . . . . . . . 2:1--2:29
             Rupert Freeman and   
         Seyed Majid Zahedi and   
           Vincent Conitzer and   
                Benjamin C. Lee   Dynamic Proportional Sharing: a
                                  Game-Theoretic Approach  . . . . . . . . 3:1--3:36
                Alan Kuhnle and   
       Victoria G. Crawford and   
                     My T. Thai   Network Resilience and the
                                  Length-Bounded Multicut Problem:
                                  Reaching the Dynamic Billion-Scale with
                                  Guarantees . . . . . . . . . . . . . . . 4:1--4:26
                   Jian Tan and   
               Guocong Quan and   
                   Kaiyi Ji and   
                    Ness Shroff   On Resource Pooling and Separation for
                                  LRU Caching  . . . . . . . . . . . . . . 5:1--5:31
          Mohammad A. Islam and   
                Luting Yang and   
            Kiran Ranganath and   
                    Shaolei Ren   Why Some Like It Loud: Timing Power
                                  Attacks in Multi-tenant Data Centers
                                  Using an Acoustic Side Channel . . . . . 6:1--6:33
             Santiago Duran and   
              Ina Maria Verloop   Asymptotic Optimal Control of
                                  Markov-Modulated Restless Bandits  . . . 7:1--7:25
                Zhaowei Tan and   
                 Yuanjie Li and   
                  Qianru Li and   
               Zhehui Zhang and   
                  Zhehan Li and   
                      Songwu Lu   Supporting Mobile VR in LTE Networks:
                                  How Close Are We?  . . . . . . . . . . . 8:1--8:31
              Saba Ahmadian and   
                 Onur Mutlu and   
                  Hossein Asadi   ECI-Cache: a High-Endurance and
                                  Cost-Efficient I/O Caching Scheme for
                                  Virtualized Platforms  . . . . . . . . . 9:1--9:34
              Buchnik Eliav and   
                    Edith Cohen   Bootstrapped Graph Diffusions: Exposing
                                  the Power of Nonlinearity  . . . . . . . 10:1--10:19
              Qingkai Liang and   
                  Eytan Modiano   Minimizing Queue Length Regret Under
                                  Adversarial Network Models . . . . . . . 11:1--11:32
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Learning in Weakly Coupled Markov
                                  Decision Processes: a Convergence Time
                                  Study  . . . . . . . . . . . . . . . . . 12:1--12:38
                Donggyu Yun and   
        Alexandre Proutiere and   
               Sumyeong Ahn and   
                Jinwoo Shin and   
                        Yung Yi   Multi-armed Bandit with Additional
                                  Observations . . . . . . . . . . . . . . 13:1--13:22
         Debankur Mukherjee and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Asymptotically Optimal Load Balancing
                                  Topologies . . . . . . . . . . . . . . . 14:1--14:29
                Arjun Anand and   
             Gustavo de Veciana   A Whittle's Index Based Approach for QoE
                                  Optimization in Wireless Networks  . . . 15:1--15:39
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   SOAP: One Clean Analysis of All
                                  Age-Based Scheduling Policies  . . . . . 16:1--16:30
              Pengfei Zheng and   
                Benjamin C. Lee   Hound: Causal Learning for
                                  Datacenter-scale Straggler Diagnosis . . 17:1--17:36
                   Bo Jiang and   
              Philippe Nain and   
                Don Towsley and   
                    Saikat Guha   On a Class of Stochastic Multilayer
                                  Networks . . . . . . . . . . . . . . . . 18:1--18:25
                  Vlad Nitu and   
             Aram Kocharyan and   
                Hannas Yaya and   
               Alain Tchana and   
            Daniel Hagimont and   
             Hrachya Astsatryan   Working Set Size Estimation Techniques
                                  in Virtualized Environments: One Size
                                  Does not Fit All . . . . . . . . . . . . 19:1--19:22
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
          Kannan Srinivasan and   
                    Ness Shroff   Degree of Queue Imbalance: Overcoming
                                  the Limitation of Heavy-traffic Delay
                                  Optimality in Load Balancing Systems . . 21:1--21:41
         Kausik Subramanian and   
             Loris D'Antoni and   
                  Aditya Akella   Synthesis of Fault-Tolerant Distributed
                                  Router Configurations  . . . . . . . . . 22:1--22:26

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 2, June, 2018

               Adam Wierman and   
                  Aditya Akella   Message from the Editors . . . . . . . . 23:1--23:1
                   Lin Yang and   
                   Lei Deng and   
    Mohammad H. Hajiesmaili and   
                  Cheng Tan and   
                Wing Shing Wong   An Optimal Algorithm for Online
                                  Non-Convex Learning  . . . . . . . . . . 25:1--25:25
                 Mowei Wang and   
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
                   Dan Yang and   
                   Kai Chen and   
                        Jun Zhu   Neural Network Meets DCN: Traffic-driven
                                  Topology Adaptation with Deep Learning   26:1--26:25
              Tim Hellemans and   
                Benny Van Houdt   On the Power-of-d-choices with Least
                                  Loaded Server Selection  . . . . . . . . 27:1--27:22
          Oleksii Oleksenko and   
          Dmitrii Kuvaiskii and   
            Pramod Bhatotia and   
              Pascal Felber and   
                Christof Fetzer   Intel MPX Explained: a Cross-layer
                                  Analysis of the Intel MPX System Stack   28:1--28:30
               Giulia Fanti and   
Shaileshh Bojja Venkatakrishnan and   
               Surya Bakshi and   
              Bradley Denby and   
            Shruti Bhargava and   
              Andrew Miller and   
               Pramod Viswanath   Dandelion++: Lightweight Cryptocurrency
                                  Networking with Formal Anonymity
                                  Guarantees . . . . . . . . . . . . . . . 29:1--29:35
 Thibault Séjourn\`e and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   The Price of Fragmentation in
                                  Mobility-on-Demand Services  . . . . . . 30:1--30:26
           Jessica Hoffmann and   
          Constantine Caramanis   The Cost of Uncertainty in Curing
                                  Epidemics  . . . . . . . . . . . . . . . 31:1--31:33
           Daniel S. Berger and   
            Nathan Beckmann and   
             Mor Harchol-Balter   Practical Bounds on Optimal Caching with
                                  Variable Object Sizes  . . . . . . . . . 32:1--32:38
          Christina Vlachou and   
        Ioannis Pefkianakis and   
                    Kyu-Han Kim   LTERadar: Towards LTE-Aware Wi-Fi Access
                                  Points . . . . . . . . . . . . . . . . . 33:1--33:31
                  Sem Borst and   
                Martin Zubeldia   Delay Scaling in Many-Sources Wireless
                                  Networks without Queue State Information 34:1--34:45
                Akshay Jain and   
             Mahmoud Khairy and   
              Timothy G. Rogers   A Quantitative Evaluation of
                                  Contemporary GPU Simulation Methodology  35:1--35:28
     Mohammad Sadegh Talebi and   
            Alexandre Proutiere   Learning Proportionally Fair Allocations
                                  with Low Regret  . . . . . . . . . . . . 36:1--36:31

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 3, December, 2018

                  Yixin Luo and   
              Saugata Ghose and   
                     Yu Cai and   
          Erich F. Haratsch and   
                     Onur Mutlu   Improving $3$D NAND Flash Memory
                                  Lifetime by Tolerating Early Retention
                                  Loss and Process Variation . . . . . . . 37:1--37:48
              Saugata Ghose and   
Abdullah Giray Yaglikçi and   
               Raghav Gupta and   
               Donghyuk Lee and   
              Kais Kudrolli and   
             William X. Liu and   
               Hasan Hassan and   
             Kevin K. Chang and   
       Niladrish Chatterjee and   
             Aditya Agrawal and   
              Mike O'Connor and   
                     Onur Mutlu   What Your DRAM Power Models Are Not
                                  Telling You: Lessons from a Detailed
                                  Experimental Study . . . . . . . . . . . 38:1--38:41
                Xulong Tang and   
          Ashutosh Pattnaik and   
               Onur Kayiran and   
                 Adwait Jog and   
     Mahmut Taylan Kandemir and   
                      Chita Das   Quantifying Data Locality in Dynamic
                                  Parallelism in GPUs  . . . . . . . . . . 39:1--39:24
              Anish Agarwal and   
    Muhammad Jehangir Amjad and   
              Devavrat Shah and   
                    Dennis Shen   Model Agnostic Time Series Analysis via
                                  Matrix Estimation  . . . . . . . . . . . 40:1--40:39
                Xingyu Zhou and   
                   Jian Tan and   
                    Ness Shroff   Heavy-traffic Delay Optimality in
                                  Pull-based Load Balancing Systems:
                                  Necessary and Sufficient Conditions  . . 41:1--41:33
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                   Hui Zhao and   
             Myoungsoo Jung and   
                Mustafa Karakoy   Computing with Near Data . . . . . . . . 42:1--42:30
               Florin Ciucu and   
                 Felix Poloczek   Two Extensions of Kingman's GI/G/1 Bound 43:1--43:33


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 1, March, 2019

              Lan N. Nguyen and   
                     My T. Thai   Network Resilience Assessment via QoS
                                  Degradation Metrics: an Algorithmic
                                  Approach . . . . . . . . . . . . . . . . 1:1--1:32
                    Ran Liu and   
                 Edmund Yeh and   
                Atilla Eryilmaz   Proactive Caching for Low Access-Delay
                                  Services under Uncertain Predictions . . 2:1--2:46
                   Xiao Zhu and   
            Yihua Ethan Guo and   
           Ashkan Nikravesh and   
                  Feng Qian and   
                  Z. Morley Mao   Understanding the Networking Performance
                                  of Wear OS . . . . . . . . . . . . . . . 3:1--3:25
          Mark van der Boor and   
                  Sem Borst and   
          Johan van Leeuwaarden   Hyper-Scalable JSQ with Sparse Feedback  4:1--4:37
               Tu Dinh Ngoc and   
                    Bao Bui and   
            Stella Bitchebe and   
               Alain Tchana and   
          Valerio Schiavoni and   
              Pascal Felber and   
                Daniel Hagimont   Everything You Should Know About Intel
                                  SGX Performance on Virtualized Systems   5:1--5:21
                  Haoran Yu and   
                  Ermin Wei and   
               Randall A. Berry   Analyzing Location-Based Advertising for
                                  Vehicle Service Providers Using
                                  Effective Resistances  . . . . . . . . . 6:1--6:35
             Richard Combes and   
                  Mikael Touati   Computationally Efficient Estimation of
                                  the Spectral Gap of a Markov Chain . . . 7:1--7:21
                  Youil Han and   
               Bryan S. Kim and   
               Jeseong Yeon and   
                Sungjin Lee and   
                      Eunji Lee   TeksDB: Weaving Data Structures for a
                                  High-Performance Key--Value Store  . . . 8:1--8:23
               Shoaib Akram and   
            Jennifer Sartor and   
           Kathryn McKinley and   
                Lieven Eeckhout   Crystal Gazer: Profile-Driven
                                  Write-Rationing Garbage Collection for
                                  Hybrid Memories  . . . . . . . . . . . . 9:1--9:27
                 Qiulin Lin and   
                 Hanling Yi and   
                  John Pang and   
               Minghua Chen and   
               Adam Wierman and   
              Michael Honig and   
                 Yuanzhang Xiao   Competitive Online Optimization under
                                  Inventory Constraints  . . . . . . . . . 10:1--10:28
                    Lili Su and   
            Martin Zubeldia and   
                    Nancy Lynch   Collaboratively Learning the Best Option
                                  on Graphs, Using Bounded Local Memory    11:1--11:32
                    Lili Su and   
                     Jiaming Xu   Securing Distributed Gradient Descent in
                                  High Dimensional Statistical Learning    12:1--12:41
           Monika Henzinger and   
             Stefan Neumann and   
                  Stefan Schmid   Efficient Distributed Workload
                                  (Re-)Embedding . . . . . . . . . . . . . 13:1--13:38
              Dengwang Tang and   
           Vijay G. Subramanian   Random Walk Based Sampling for Load
                                  Balancing in Multi-Server Systems  . . . 14:1--14:44
                Chul-Ho Lee and   
                   Min Kang and   
                   Do Young Eun   Non-Markovian Monte Carlo on Directed
                                  Graphs . . . . . . . . . . . . . . . . . 15:1--15:31
              Joshua Comden and   
                  Sijie Yao and   
              Niangjun Chen and   
               Haipeng Xing and   
                    Zhenhua Liu   Online Optimization in Cloud Resource
                                  Provisioning: Predictions, Regrets, and
                                  Algorithms . . . . . . . . . . . . . . . 16:1--16:30
                  Lei Zhang and   
                Zhemin Yang and   
                    Yuyu He and   
                  Mingqi Li and   
                   Sen Yang and   
                   Min Yang and   
                 Yuan Zhang and   
                    Zhiyun Qian   App in the Middle: Demystify Application
                                  Virtualization in Android and its
                                  Security Threats . . . . . . . . . . . . 17:1--17:24
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
             Kostas Kollias and   
                Kamesh Munagala   The Segmentation-Thickness Tradeoff in
                                  Online Marketplaces  . . . . . . . . . . 18:1--18:26
        Pavlos Nikolopoulos and   
            Christos Pappas and   
          Katerina Argyraki and   
                  Adrian Perrig   Retroactive Packet Sampling for Traffic
                                  Receipts . . . . . . . . . . . . . . . . 19:1--19:39

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 2, June, 2019

              Thomas Bonald and   
                  Nick Duffield   Editorial  . . . . . . . . . . . . . . . 20:1--20:2
               Lavanya Jose and   
             Stephen Ibanez and   
          Mohammad Alizadeh and   
                   Nick McKeown   A Distributed Algorithm to Calculate
                                  Max-Min Fair Rates Without Per-Flow
                                  State  . . . . . . . . . . . . . . . . . 21:1--21:42
                   Ming Shi and   
                Xiaojun Lin and   
                       Lei Jiao   On the Value of Look-Ahead in
                                  Competitive Online Convex Optimization   22:1--22:42
                Benny Van Houdt   Global Attraction of ODE-based Mean
                                  Field Models with Hyperexponential Job
                                  Sizes  . . . . . . . . . . . . . . . . . 23:1--23:23
                   Song Wei and   
                  Kun Zhang and   
                        Bibo Tu   HyperBench: a Benchmark Suite for
                                  Virtualization Capabilities  . . . . . . 24:1--24:22
                Daniel Vial and   
              Vijay Subramanian   A Structural Result for Personalized
                                  PageRank and its Algorithmic
                                  Consequences . . . . . . . . . . . . . . 25:1--25:88
        Behnam Pourghassemi and   
         Ardalan Amiri Sani and   
     Aparna Chandramowlishwaran   What-If Analysis of Page Load Time in
                                  Web Browsers Using Causal Profiling  . . 27:1--27:23
             Pradeep Ambati and   
                    David Irwin   Optimizing the Cost of Executing Mixed
                                  Interactive and Batch Workloads on
                                  Transient VMs  . . . . . . . . . . . . . 28:1--28:24
                Dhruv Kumar and   
                    Jian Li and   
           Abhishek Chandra and   
               Ramesh Sitaraman   A TTL-based Approach for Data
                                  Aggregation in Geo-distributed Streaming
                                  Analytics  . . . . . . . . . . . . . . . 29:1--29:27
           Pavlos Sermpezis and   
             Vasileios Kotronis   Inferring Catchment in Internet Routing  30:1--30:31
               Florin Ciucu and   
             Felix Poloczek and   
                       Amr Rizk   Queue and Loss Distributions in
                                  Finite-Buffer Queues . . . . . . . . . . 31:1--31:29
               Doron Zarchy and   
             Radhika Mittal and   
           Michael Schapira and   
                  Scott Shenker   Axiomatizing Congestion Control  . . . . 33:1--33:33
            Milan Radulovic and   
Rommel Sánchez Verdejo and   
             Paul Carpenter and   
         Petar Radojkovi\'c and   
                Bruce Jacob and   
          Eduard Ayguadé   PROFET: Modeling System Performance and
                                  Energy Without Simulating the CPU  . . . 34:1--34:33
              Tim Hellemans and   
                Tejas Bodas and   
                Benny Van Houdt   Performance Analysis of Workload
                                  Dependent Load Balancing Policies  . . . 35:1--35:35
             Osman Emre Dai and   
             Daniel Cullina and   
             Negar Kiyavash and   
          Matthias Grossglauser   Analysis of a Canonical Labeling
                                  Algorithm for the Alignment of
                                  Correlated Erd\Hos--Rényi Graphs  . . . . 36:1--36:25
             Muhammad Amjad and   
               Vishal Misra and   
              Devavrat Shah and   
                    Dennis Shen   mRSC: Multi-dimensional Robust Synthetic
                                  Control  . . . . . . . . . . . . . . . . 37:1--37:27
            Mustafa Karakoy and   
               Orhan Kislal and   
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
          Meenakshi Arunachalam   Architecture-Aware Approximate Computing 38:1--38:24
               Guocong Quan and   
                   Jian Tan and   
            Atilla Eryilmaz and   
                    Ness Shroff   A New Flexible Multi-flow LRU Cache
                                  Management Paradigm for Minimizing
                                  Misses . . . . . . . . . . . . . . . . . 39:1--39:30
           Jessica Hoffmann and   
          Constantine Caramanis   Learning Graphs from Noisy Epidemic
                                  Cascades . . . . . . . . . . . . . . . . 40:1--40:34
                Honghao Wei and   
               Xiaohan Kang and   
                 Weina Wang and   
                       Lei Ying   QuickStop: a Markov Optimal Stopping
                                  Approach for Quickest Misinformation
                                  Detection  . . . . . . . . . . . . . . . 41:1--41:25
               Isaac Grosof and   
                 Ziv Scully and   
             Mor Harchol-Balter   Load Balancing Guardrails: Keeping Your
                                  Heavy Traffic on the Road to Low
                                  Response Times . . . . . . . . . . . . . 42:1--42:31
                Semih Cayci and   
            Atilla Eryilmaz and   
                     R. Srikant   Learning to Control Renewal Processes
                                  with Bandit Feedback . . . . . . . . . . 43:1--43:32

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 3, December, 2019

               Ayush Mishra and   
              Xiangpeng Sun and   
               Atishya Jain and   
               Sameer Pande and   
                  Raj Joshi and   
                      Ben Leong   The Great Internet TCP Congestion
                                  Control Census . . . . . . . . . . . . . 45:1--45:24
             Michael Fleder and   
                  Devavrat Shah   Forecasting with Alternative Data  . . . 46:1--46:29
               Zhenjie Yang and   
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
                 Minming Li and   
                 Chuming Li and   
                     Yadong Liu   Achieving Efficient Routing in
                                  Reconfigurable DCNs  . . . . . . . . . . 47:1--47:30
               Palma London and   
                 Shai Vardi and   
                   Adam Wierman   Logarithmic Communication for
                                  Distributed Optimization in Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 48:1--48:29
               Yiyang Chang and   
                Chuan Jiang and   
             Ashish Chandra and   
                 Sanjay Rao and   
              Mohit Tawarmalani   Lancet: Better Network Resilience by
                                  Designing for Pruned Failure Sets  . . . 49:1--49:26
                  Xinzhe Fu and   
                  Eytan Modiano   Fundamental Limits of Volume-based
                                  Network DoS Attacks  . . . . . . . . . . 50:1--50:36
                   You Zhou and   
               Youlin Zhang and   
                  Chaoyi Ma and   
               Shigang Chen and   
            Olufemi O. Odegbile   Generalized Sketch Families for Network
                                  Traffic Measurement  . . . . . . . . . . 51:1--51:34
                Sinong Wang and   
               Jiashang Liu and   
                    Ness Shroff   Fundamental Limits of Approximate
                                  Gradient Coding  . . . . . . . . . . . . 52:1--52:22
       Abishek Sankararaman and   
            Ayalvadi Ganesh and   
              Sanjay Shakkottai   Social Learning in Multi Agent Multi
                                  Armed Bandits  . . . . . . . . . . . . . 53:1--53:35
             Daniel Cullina and   
             Negar Kiyavash and   
             Prateek Mittal and   
                H. Vincent Poor   Partial Recovery of Erd\Hos--Rényi Graph
                                  Alignment via $k$-Core Alignment . . . . 54:1--54:21
           Sean R. Sinclair and   
        Siddhartha Banerjee and   
               Christina Lee Yu   Adaptive Discretization for Episodic
                                  Reinforcement Learning in Metric Spaces  55:1--55:44
         Francesco Bronzino and   
               Paul Schmitt and   
                Sara Ayoubi and   
          Guilherme Martins and   
            Renata Teixeira and   
                  Nick Feamster   Inferring Streaming Video Quality from
                                  Encrypted Traffic: Practical Models and
                                  Deployment Experience  . . . . . . . . . 56:1--56:25
Illés Antal Horváth and   
                 Ziv Scully and   
                Benny Van Houdt   Mean Field Analysis of
                                  Join-Below-Threshold Load Balancing for
                                  Resource Sharing Servers . . . . . . . . 57:1--57:21
              Ankur Mallick and   
           Malhar Chaudhari and   
                Utsav Sheth and   
         Ganesh Palanikumar and   
                    Gauri Joshi   Rateless Codes for Near-Perfect Load
                                  Balancing in Distributed Matrix--Vector
                                  Multiplication . . . . . . . . . . . . . 58:1--58:40
           Jordi Ros-Giralt and   
                Atul Bohara and   
          Sruthi Yellamraju and   
         M. Harper Langston and   
             Richard Lethin and   
                Yuang Jiang and   
         Leandros Tassiulas and   
                   Josie Li and   
               Yuanlong Tan and   
          Malathi Veeraraghavan   On the Bottleneck Structure of
                                  Congestion-Controlled Networks . . . . . 59:1--59:31
              Saugata Ghose and   
                 Tianshi Li and   
         Nastaran Hajinazar and   
           Damla Senol Cali and   
                     Onur Mutlu   Demystifying Complex Workload-DRAM
                                  Interactions: an Experimental Study  . . 60:1--60:50
               Nikita Ivkin and   
              Ran Ben Basat and   
                Zaoxing Liu and   
               Gil Einziger and   
               Roy Friedman and   
             Vladimir Braverman   I Know What You Did Last Summer: Network
                                  Monitoring using Interval Queries  . . . 61:1--61:28


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 1, May, 2020

            Vishwaraj Doshi and   
                   Do Young Eun   Fiedler Vector Approximation via
                                  Interacting Random Walks . . . . . . . . 01:1--01:28
                Martin Zubeldia   Delay-optimal Policies in Partial
                                  Fork-Join Systems with Redundancy and
                                  Random Slowdowns . . . . . . . . . . . . 02:1--02:49
              Hsuan-Chi Kuo and   
               Jianyan Chen and   
                Sibin Mohan and   
                     Tianyin Xu   Set the Configuration for the Heart of
                                  the OS: On the Practicality of Operating
                                  System Kernel Debloating . . . . . . . . 03:1--03:27
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
            Kamesh Munagala and   
                  Kangning Wang   Predict and Match: Prophet Inequalities
                                  with Uncertain Supply  . . . . . . . . . 04:1--04:23
                 JinKe Song and   
                   Qiang Li and   
               Haining Wang and   
                      Limin Sun   Under the Concealing Surface: Detecting
                                  and Understanding Live Webcams in the
                                  Wild . . . . . . . . . . . . . . . . . . 05:1--05:25
                  Lei Zhang and   
                Reza Karimi and   
                Irfan Ahmad and   
                 Ymir Vigfusson   Optimal Data Placement for Heterogeneous
                                  Cache, Memory, and Storage Systems . . . 06:1--06:27
                Zhihui Shao and   
          Mohammad A. Islam and   
                    Shaolei Ren   Your Noise, My Signal: Exploiting
                                  Switching Noise for Stealthy Data
                                  Exfiltration from Desktop Computers  . . 07:1--07:39
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Simple Near-Optimal Scheduling for the
                                  M/G/1  . . . . . . . . . . . . . . . . . 11:1--11:29
                   Yang Cai and   
         Federico Echenique and   
                      Hu Fu and   
             Katrina Ligett and   
               Adam Wierman and   
                     Juba Ziani   Third-Party Data Providers Ruin Simple
                                  Mechanisms . . . . . . . . . . . . . . . 12:1--12:31
              Pengxiong Zhu and   
                   Keyu Man and   
              Zhongjie Wang and   
                Zhiyun Qian and   
                Roya Ensafi and   
          J. Alex Halderman and   
                    Haixin Duan   Characterizing Transnational Internet
                                  Performance and the Great Bottleneck of
                                  China  . . . . . . . . . . . . . . . . . 13:1--13:23
             Richard Combes and   
      Alexandre Prouti\`ere and   
            Alexandre Fauquette   Unimodal Bandits with Continuous Arms:
                                  Order-optimal Regret without Smoothness  14:1--14:28
                   Lin Yang and   
    Mohammad H. Hajiesmaili and   
           Ramesh Sitaraman and   
               Adam Wierman and   
            Enrique Mallada and   
                   Wing S. Wong   Online Linear Optimization with
                                  Inventory Management Constraints . . . . 16:1--16:29
             Martin Karsten and   
                   Saman Barghi   User-level Threading: Have Your Cake and
                                  Eat It Too . . . . . . . . . . . . . . . 17:1--17:30
                 Yiheng Lin and   
                Gautam Goel and   
                   Adam Wierman   Online Optimization with Predictions and
                                  Non-convex Losses  . . . . . . . . . . . 18:1--18:32
                 Sungjin Im and   
           Benjamin Moseley and   
            Kamesh Munagala and   
                     Kirk Pruhs   Dynamic Weighted Fairness with Minimal
                                  Disruptions  . . . . . . . . . . . . . . 19:1--19:18
                  Chen Avin and   
              Manya Ghobadi and   
                Chen Griner and   
                  Stefan Schmid   On the Complexity of Traffic Traces and
                                  Implications . . . . . . . . . . . . . . 20:1--20:29

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 2, June, 2020

                  Y. C. Tay and   
             Athina Markopoulou   Editorial  . . . . . . . . . . . . . . . 21:1--21:1
               Shouqian Shi and   
                      Chen Qian   Ludo Hashing: Compact, Fast, and Dynamic
                                  Key-value Lookups for Practical Network
                                  Systems  . . . . . . . . . . . . . . . . 22:1--22:32
              Philippe Nain and   
            Gayane Vardoyan and   
                Saikat Guha and   
                    Don Towsley   On the Analysis of a Multipartite
                                  Entanglement Distribution Switch . . . . 23:1--23:39
                 Xiaoqi Tan and   
                     Bo Sun and   
        Alberto Leon-Garcia and   
                    Yuan Wu and   
              Danny H. K. Tsang   Mechanism Design for Online Resource
                                  Allocation: a Unified Approach . . . . . 24:1--24:46
     Rajarshi Bhattacharjee and   
         Subhankar Banerjee and   
                 Abhishek Sinha   Fundamental Limits on the Regret of
                                  Online Network-Caching . . . . . . . . . 25:1--25:31
               Peter Snyder and   
             Antoine Vastel and   
                   Ben Livshits   Who Filters the Filters: Understanding
                                  the Growth, Usefulness and Efficiency of
                                  Crowdsourced Ad Blocking . . . . . . . . 26:1--26:24
             Ludovic Thomas and   
            Jean-Yves Le Boudec   On Time Synchronization Issues in
                                  Time-Sensitive Networks with Regulators
                                  and Nonideal Clocks  . . . . . . . . . . 27:1--27:41
                Chun-Yi Liu and   
             Jagadish Kotra and   
             Myoungsoo Jung and   
         Mahmut Taylan Kandemir   Centaur: a Novel Architecture for
                                  Reliable, Low-Wear, High-Density $3$D
                                  NAND Storage . . . . . . . . . . . . . . 28:1--28:25
               Weizhao Tang and   
                 Weina Wang and   
               Giulia Fanti and   
                     Sewoong Oh   Privacy-Utility Tradeoffs in Routing
                                  Cryptocurrency over Payment Channel
                                  Networks . . . . . . . . . . . . . . . . 29:1--29:39
                 Ziv Scully and   
          Lucas van Kreveld and   
                 Onno Boxma and   
         Jan-Pieter Dorsman and   
                   Adam Wierman   Characterizing Policies with Optimal
                                  Response Time Tails under Heavy-Tailed
                                  Job Sizes  . . . . . . . . . . . . . . . 30:1--30:33
                   Fred Lin and   
             Keyur Muzumdar and   
   Nikolay Pavlovich Laptev and   
     Mihai-Valentin Curelea and   
               Seunghak Lee and   
                  Sriram Sankar   Fast Dimensional Analysis for Root Cause
                                  Investigation in a Large-Scale Service
                                  Environment  . . . . . . . . . . . . . . 31:1--31:23
                    Yibo Pi and   
                Sugih Jamin and   
               Peter Danzig and   
                      Feng Qian   Latency Imbalance Among Internet
                                  Load-Balanced Paths: a Cloud-Centric
                                  View . . . . . . . . . . . . . . . . . . 32:1--32:29
  Seyed Armin Vakil Ghahani and   
     Mahmut Taylan Kandemir and   
              Jagadish B. Kotra   DSM: a Case for Hardware-Assisted
                                  Merging of DRAM Rows with Same Content   33:1--33:26
              Erik Tillberg and   
              Peter Marbach and   
                  Ravi Mazumdar   Optimal Bidding Strategies for Online Ad
                                  Auctions with Overlapping Targeting
                                  Criteria . . . . . . . . . . . . . . . . 34:1--34:55
             Aditya Gopalan and   
       Abishek Sankararaman and   
                Anwar Walid and   
              Sriram Vishwanath   Stability and Scalability of Blockchain
                                  Systems  . . . . . . . . . . . . . . . . 35:1--35:35
         Apostolos Pyrgelis and   
           Carmela Troncoso and   
         Emiliano De Cristofaro   Measuring Membership Privacy on
                                  Aggregate Location Time-Series . . . . . 36:1--36:28
               Yuheng Huang and   
                 Haoyu Wang and   
                     Lei Wu and   
               Gareth Tyson and   
                  Xiapu Luo and   
                  Run Zhang and   
                Xuanzhe Liu and   
                 Gang Huang and   
                   Xuxian Jiang   Understanding (Mis)Behavior on the EOSIO
                                  Blockchain . . . . . . . . . . . . . . . 37:1--37:28
                Atakan Aral and   
       Melike Erol-Kantarci and   
                Ivona Brandi\'c   Staleness Control for Edge Data
                                  Analytics  . . . . . . . . . . . . . . . 38:1--38:24
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Primal-Dual Mirror Descent under
                                  Stochastic Constraints . . . . . . . . . 39:1--39:36
           Alexander Marder and   
             Matthew Luckie and   
           Bradley Huffaker and   
                      KC Claffy   vrfinder: Finding Outbound Addresses in
                                  Traceroute . . . . . . . . . . . . . . . 40:1--40:28

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 3, November, 2020

                   Xin Wang and   
               Richard T. B. Ma   On Private Peering Agreements between
                                  Content and Access Providers: a
                                  Contractual Equilibrium Analysis . . . . 41:1--41:32
                Wentao Weng and   
                     Weina Wang   Achieving Zero Asymptotic Queueing Delay
                                  for Parallel Jobs  . . . . . . . . . . . 42:1--42:36
                 Ziv Scully and   
               Isaac Grosof and   
             Mor Harchol-Balter   The Gittins Policy is Nearly Optimal in
                                  the M/G/$k$ under Extremely General
                                  Conditions . . . . . . . . . . . . . . . 43:1--43:29
  Luis Fernando Abanto-Leon and   
         Andreas Bäuml and   
     Gek Hong (Allyson) Sim and   
           Matthias Hollick and   
                    Arash Asadi   Stay Connected, Leave no Trace:
                                  Enhancing Security and Privacy in WiFi
                                  via Obfuscating Radiometric Fingerprints 44:1--44:31
                Wentao Weng and   
                Xingyu Zhou and   
                     R. Srikant   Optimal Load Balancing with Locality
                                  Constraints  . . . . . . . . . . . . . . 45:1--45:37
          Youri Raaijmakers and   
                      Sem Borst   Achievable Stability in Redundancy
                                  Systems  . . . . . . . . . . . . . . . . 46:1--46:21
             Michael Fleder and   
                  Devavrat Shah   I Know What You Bought At Chipotle for
                                  \$9.81 by Solving A Linear Inverse
                                  Problem  . . . . . . . . . . . . . . . . 47:1--47:17
                Elene Anton and   
               Urtzi Ayesta and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Improving the Performance of
                                  Heterogeneous Data Centers through
                                  Redundancy . . . . . . . . . . . . . . . 48:1--48:29
              Ahmad Hazimeh and   
             Adrian Herrera and   
                  Mathias Payer   Magma: a Ground-Truth Fuzzing Benchmark  49:1--49:29
                 Bingyu Gao and   
                 Haoyu Wang and   
              Pengcheng Xia and   
                   Siwei Wu and   
                 Yajin Zhou and   
                  Xiapu Luo and   
                   Gareth Tyson   Tracking Counterfeit Cryptocurrency
                                  End-to-end . . . . . . . . . . . . . . . 50:1--50:28
                     Bo Sun and   
                Ali Zeynali and   
                 Tongxin Li and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
              Danny H. K. Tsang   Competitive Algorithms for the Online
                                  Multiple Knapsack Problem with
                                  Application to Electric Vehicle Charging 51:1--51:32
              Kamiar Asgari and   
               Michael J. Neely   Bregman-style Online Convex Optimization
                                  with Energy-Harvesting Constraints . . . 52:1--52:25


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 1, February, 2021

                Lishan Yang and   
                    Bin Nie and   
                 Adwait Jog and   
                 Evgenia Smirni   SUGAR: Speeding Up GPGPU Application
                                  Resilience Estimation with Input Sizing  01:1--01:29
                Zhaowei Zhu and   
               Jingxuan Zhu and   
                     Ji Liu and   
                       Yang Liu   Federated Bandit: a Gossiping Approach   02:1--02:29
        Behnam Pourghassemi and   
          Jordan Bonecutter and   
                    Zhou Li and   
     Aparna Chandramowlishwaran   adPerf: Characterizing the Performance
                                  of Third-party Ads . . . . . . . . . . . 03:1--03:26
                Iman Akbari and   
     Mohammad A. Salahuddin and   
                   Leni Ven and   
                Noura Limam and   
              Raouf Boutaba and   
           Bertrand Mathieu and   
           Stephanie Moteau and   
                Stephane Tuffin   A Look Behind the Curtain: Traffic
                                  Classification in an Increasingly
                                  Encrypted Web  . . . . . . . . . . . . . 04:1--04:26
                    Kai Han and   
                 Shuang Cui and   
              Tianshuai Zhu and   
                Enpei Zhang and   
                  Benwei Wu and   
                Zhizhuo Yin and   
                    Tong Xu and   
               Shaojie Tang and   
                       He Huang   Approximation Algorithms for Submodular
                                  Data Summarization with a Knapsack
                                  Constraint . . . . . . . . . . . . . . . 05:1--05:31
       Klaus-Tycho Foerster and   
          Janne H. Korhonen and   
                    Ami Paz and   
               Joel Rybicki and   
                  Stefan Schmid   Input-Dynamic Distributed Algorithms for
                                  Communication Networks . . . . . . . . . 06:1--06:33
                 Weina Wang and   
                Qiaomin Xie and   
             Mor Harchol-Balter   Zero Queueing for Multi-Server Jobs  . . 07:1--07:25
                  Jing Tang and   
                Xueyan Tang and   
                 Andrew Lim and   
                    Kai Han and   
               Chongshou Li and   
                   Junsong Yuan   Revisiting Modified Greedy Algorithm for
                                  Monotone Submodular Maximization with a
                                  Knapsack Constraint  . . . . . . . . . . 08:1--08:22
           Thibaut Cuvelier and   
             Richard Combes and   
                   Eric Gourdin   Statistically Efficient, Polynomial-Time
                                  Algorithms for Combinatorial
                                  Semi-Bandits . . . . . . . . . . . . . . 09:1--09:31

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 2, June, 2021

              Anshul Gandhi and   
             Negar Kiyavash and   
                       Jia Wang   Editorial  . . . . . . . . . . . . . . . 13:1--13:1
                  Yue Zhang and   
           Bayan Turkistani and   
          Allen Yuqing Yang and   
               Chaoshun Zuo and   
                   Zhiqiang Lin   A Measurement Study of Wechat Mini-Apps  14:1--14:25
             Qingzhao Zhang and   
              David Ke Hong and   
                   Ze Zhang and   
             Qi Alfred Chen and   
               Scott Mahlke and   
                  Z. Morley Mao   A Systematic Framework to Identify
                                  Violations of Scenario-dependent Driving
                                  Rules in Autonomous Vehicle Software . . 15:1--15:25
              Yiguang Zhang and   
            Jessy Xinyi Han and   
              Ilica Mahajan and   
         Priyanjana Bengani and   
            Augustin Chaintreau   Chasm in Hegemony: Explaining and
                                  Reproducing Disparities in Homophilous
                                  Networks . . . . . . . . . . . . . . . . 16:1--16:38
                 Tongxin Li and   
                   Yue Chen and   
                     Bo Sun and   
               Adam Wierman and   
                  Steven H. Low   Information Aggregation for Constrained
                                  Online Control . . . . . . . . . . . . . 18:1--18:35
              Tim Hellemans and   
                Benny Van Houdt   Mean Waiting Time in Large-Scale and
                                  Critically Loaded Power of $d$ Load
                                  Balancing Systems  . . . . . . . . . . . 19:1--19:34
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                Mustafa Karakoy   Mix and Match: Reorganizing Tasks for
                                  Enhancing Data Locality  . . . . . . . . 20:1--20:24
               Isaac Grosof and   
                 Kunhe Yang and   
                 Ziv Scully and   
             Mor Harchol-Balter   \pkgNudge: Stochastically Improving upon
                                  FCFS . . . . . . . . . . . . . . . . . . 21:1--21:29
         Grzegorz Kielanski and   
                Benny Van Houdt   On the Asymptotic Insensitivity of the
                                  Supermarket Model in Processor Sharing
                                  Systems  . . . . . . . . . . . . . . . . 22:1--22:28
               Rachee Singh and   
                David Tench and   
              Phillipa Gill and   
                Andrew McGregor   \pkgPredictRoute: a Network Path
                                  Prediction Toolkit . . . . . . . . . . . 23:1--23:24
Noémie Périvier and   
             Chamsi Hssaine and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   Real-time Approximate Routing for Smart
                                  Transit Systems  . . . . . . . . . . . . 24:1--24:30
          Francesca Randone and   
            Luca Bortolussi and   
               Mirco Tribastone   Refining Mean-field Approximations by
                                  Dynamic State Truncation . . . . . . . . 25:1--25:30
                Weimin Chen and   
                  Xinran Li and   
                 Yuting Sui and   
                  Ningyu He and   
                 Haoyu Wang and   
                     Lei Wu and   
                      Xiapu Luo   \pkgSADPonzi: Detecting and
                                  Characterizing Ponzi Schemes in Ethereum
                                  Smart Contracts  . . . . . . . . . . . . 26:1--26:30
                   Liren Yu and   
                 Jiaming Xu and   
                    Xiaojun Lin   The Power of $D$-hops in Matching
                                  Power-Law Graphs . . . . . . . . . . . . 27:1--27:43
             Ashish Bijlani and   
    Umakishore Ramachandran and   
                   Roy Campbell   Where did my 256 GB go? A Measurement
                                  Analysis of Storage Consumption on Smart
                                  Mobile Devices . . . . . . . . . . . . . 28:1--28:28

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 3, December, 2021

            Niklas Carlsson and   
                Edith Cohen and   
                Philippe Robert   POMACS V5, N3, December 2021 Editorial   29:1--29:1
                   Lin Yang and   
                Ali Zeynali and   
    Mohammad H. Hajiesmaili and   
        Ramesh K. Sitaraman and   
                    Don Towsley   Competitive Algorithms for Online
                                  Multidimensional Knapsack Problems . . . 30:1--30:30
               Hassan Iqbal and   
              Ayesha Khalid and   
               Muhammad Shahzad   Dissecting Cloud Gaming Performance with
                                  \pkgDECAF  . . . . . . . . . . . . . . . 31:1--31:27
        Michalis Pachilakis and   
    Panagiotis Papadopoulos and   
         Nikolaos Laoutaris and   
      Evangelos P. Markatos and   
             Nicolas Kourtellis   \pkgYourAdvalue: Measuring Advertising
                                  Price Dynamics without Bankrupting User
                                  Privacy  . . . . . . . . . . . . . . . . 32:1--32:26
                Tomer Lange and   
        Joseph (Seffi) Naor and   
                    Gala Yadgar   Offline and Online Algorithms for SSD
                                  Management . . . . . . . . . . . . . . . 33:1--33:28
                Bingqian Lu and   
                Jianyi Yang and   
               Weiwen Jiang and   
                   Yiyu Shi and   
                    Shaolei Ren   One Proxy Device Is Enough for
                                  Hardware-Aware Neural Architecture
                                  Search . . . . . . . . . . . . . . . . . 34:1--34:34
                Yuanyuan Li and   
             Tareq Si Salem and   
            Giovanni Neglia and   
              Stratis Ioannidis   Online Caching Networks with Adversarial
                                  Guarantees . . . . . . . . . . . . . . . 35:1--35:39
                  Suho Shin and   
                Hoyong Choi and   
                    Yung Yi and   
                    Jungseul Ok   Power of Bonus in Pricing for
                                  Crowdsourcing  . . . . . . . . . . . . . 36:1--36:25
            Ryan J. Kinnear and   
           Ravi R. Mazumdar and   
                  Peter Marbach   Real-time Bidding for Time Constrained
                                  Impression Contracts in First and Second
                                  Price Auctions --- Theory and Algorithms 37:1--37:37
                Chen Griner and   
            Johannes Zerwas and   
              Andreas Blenk and   
              Manya Ghobadi and   
              Stefan Schmid and   
                      Chen Avin   \pkgCerberus: The Power of Choices in
                                  Datacenter Topology Design --- a
                                  Throughput Perspective . . . . . . . . . 38:1--38:33
              Pengcheng Xia and   
                 Haoyu Wang and   
                 Bingyu Gao and   
                 Weihang Su and   
                    Zhou Yu and   
                  Xiapu Luo and   
                 Chao Zhang and   
               Xusheng Xiao and   
                       Guoai Xu   Trade or Trick?: Detecting and
                                  Characterizing Scam Tokens on Uniswap
                                  Decentralized Exchange . . . . . . . . . 39:1--39:26
         Francesco Bronzino and   
               Paul Schmitt and   
                Sara Ayoubi and   
                Hyojoon Kim and   
            Renata Teixeira and   
                  Nick Feamster   Traffic Refinery: Cost-Aware Data
                                  Representation for Machine Learning on
                                  Network Traffic  . . . . . . . . . . . . 40:1--40:24
                 Sourav Das and   
             Nitin Awathare and   
                   Ling Ren and   
           Vinay J. Ribeiro and   
                   Umesh Bellur   \pkgTuxedo: Maximizing Smart Contract
                                  Computation in PoW Blockchains . . . . . 41:1--41:30
               Shizhen Zhao and   
                 Peirui Cao and   
                   Xinbing Wang   Understanding the Performance Guarantee
                                  of Physical Topology Design for Optical
                                  Circuit Switched Data Centers  . . . . . 42:1--42:24
                    Lin Jin and   
                  Shuai Hao and   
               Haining Wang and   
                   Chase Cotton   Understanding the Practices of Global
                                  Censorship through Accurate, End-to-End
                                  Measurements . . . . . . . . . . . . . . 43:1--43:25
              Yun Seong Nam and   
                Jianfei Gao and   
             Chandan Bothra and   
            Ehab Ghabashneh and   
                 Sanjay Rao and   
              Bruno Ribeiro and   
                 Jibin Zhan and   
                      Hui Zhang   \pkgXatu: Richer Neural Network Based
                                  Prediction for Video Streaming . . . . . 44:1--44:26


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 6, Number 1, March, 2022

            Niklas Carlsson and   
                Edith Cohen and   
                Philippe Robert   POMACS V6, N1, March 2022 Editorial  . . 1:1--1:1
                  Hem Regmi and   
                     Sanjib Sur   Argus: Predictable Millimeter-Wave
                                  Picocells with Vision and Learning
                                  Augmentation . . . . . . . . . . . . . . 2:1--2:26
          Brivaldo A. Silva and   
                  Paulo Mol and   
            Osvaldo Fonseca and   
                Italo Cunha and   
        Ronaldo A. Ferreira and   
             Ethan Katz-Bassett   Automatic Inference of BGP Location
                                  Communities  . . . . . . . . . . . . . . 3:1--3:23
            Young-Kyoon Suh and   
                Junyoung An and   
              Byungchul Tak and   
                     Gap-Joo Na   A Comprehensive Empirical Study of Query
                                  Performance Across GPU DBMSes  . . . . . 4:1--4:29
          Loqman Salamatian and   
             Scott Anderson and   
            Joshua Matthews and   
               Paul Barford and   
           Walter Willinger and   
                  Mark Crovella   Curvature-based Analysis of Network
                                  Connectivity in Private Backbone
                                  Infrastructures  . . . . . . . . . . . . 5:1--5:32
               Sachin Ashok and   
             Shubham Tiwari and   
        Nagarajan Natarajan and   
     Venkata N. Padmanabhan and   
     Sundararajan Sellamanickam   Data-Driven Network Path Simulation with
                                  iBox . . . . . . . . . . . . . . . . . . 6:1--6:26
    Soheil Khadirsharbiyani and   
             Jagadish Kotra and   
                Karthik Rao and   
                Mahmut Kandemir   Data Convection: a GPU-Driven Case Study
                                  for Thermal-Aware Data Placement in $3$D
                                  DRAMs  . . . . . . . . . . . . . . . . . 7:1--7:25
                    Xingyu Zhou   Differentially Private Reinforcement
                                  Learning with Linear Function
                                  Approximation  . . . . . . . . . . . . . 8:1--8:27
                  Yuwei Luo and   
                Varun Gupta and   
                   Mladen Kolar   Dynamic Regret Minimization for Control
                                  of Non-stationary Linear Dynamical
                                  Systems  . . . . . . . . . . . . . . . . 9:1--9:72
            Sandeepa Bhuyan and   
                Shulin Zhao and   
                  Ziyu Ying and   
         Mahmut T. Kandemir and   
                   Chita R. Das   End-to-end Characterization of Game
                                  Streaming Applications on Mobile
                                  Platforms  . . . . . . . . . . . . . . . 10:1--10:25
                Ranvir Rana and   
             Sreeram Kannan and   
                  David Tse and   
               Pramod Viswanath   Free2Shard: Adversary-resistant
                                  Distributed Resource Allocation for
                                  Blockchains  . . . . . . . . . . . . . . 11:1--11:38
                Yaxiong Xie and   
                  Kyle Jamieson   NG-Scope: Fine-Grained Telemetry for
                                  NextG Cellular Networks  . . . . . . . . 12:1--12:26
         Sebastian Allmeier and   
                   Nicolas Gast   Mean Field and Refined Mean Field
                                  Approximations for Heterogeneous
                                  Systems: It Works! . . . . . . . . . . . 13:1--13:43
                Jihyun Ryoo and   
     Mahmut Taylan Kandemir and   
                Mustafa Karakoy   Memory Space Recycling . . . . . . . . . 14:1--14:24
               Dongwei Xiao and   
                  Zhibo LIU and   
              Yuanyuan Yuan and   
                    Qi Pang and   
                     Shuai Wang   Metamorphic Testing of Deep Learning
                                  Compilers  . . . . . . . . . . . . . . . 15:1--15:28
                Sina Darabi and   
               Negin Mahani and   
             Hazhir Baxishi and   
Ehsan Yousefzadeh-Asl-Miandoab and   
       Mohammad Sadrosadati and   
             Hamid Sarbazi-Azad   NURA: a Framework for Supporting
                                  Non-Uniform Resource Accesses in GPUs    16:1--16:27
                  Weici Pan and   
                 Guanya Shi and   
                 Yiheng Lin and   
                   Adam Wierman   Online Optimization with Feedback Delay
                                  and Nonlinear Switching Cost . . . . . . 17:1--17:34
                 Tongxin Li and   
               Ruixiao Yang and   
                 Guannan Qu and   
                 Guanya Shi and   
                 Chenkai Yu and   
               Adam Wierman and   
                     Steven Low   Robustness and Consistency in Linear
                                  Quadratic Control with Untrusted
                                  Predictions  . . . . . . . . . . . . . . 18:1--18:35
                Zaiwei Chen and   
               Shancong Mou and   
            Siva Theja Maguluri   Stationary Behavior of Constant Stepsize
                                  SGD Type Algorithms: an Asymptotic
                                  Characterization . . . . . . . . . . . . 19:1--19:24
                Yueyang Pan and   
                  Ruihan Li and   
                     Chenren Xu   The First 5G-LTE Comparative Study in
                                  Extreme Mobility . . . . . . . . . . . . 20:1--20:22
        Christina Giannoula and   
             Ivan Fernandez and   
     Juan Gómez Luna and   
          Nectarios Koziris and   
            Georgios Goumas and   
                     Onur Mutlu   SparseP: Towards Efficient Sparse Matrix
                                  Vector Multiplication on Real
                                  Processing-In-Memory Architectures . . . 21:1--21:49
                 Minhu Wang and   
                 Mingwei Xu and   
                    Jianping Wu   Understanding I/O Direct Cache Access
                                  Performance for End Host Networking  . . 22:1--22:37
                    Wei Liu and   
                Xinlei Yang and   
                    Hao Lin and   
                 Zhenhua Li and   
                      Feng Qian   Fusing Speed Index during Web Page
                                  Loading  . . . . . . . . . . . . . . . . 23:1--23:23