Last update:
Tue Aug 20 07:31:43 MDT 2024
Augustin Chaintreau and
Leana Golubchik and
Zhi-Li Zhang Editorial . . . . . . . . . . . . . . . 1:1--1:??
Mathias Gibbens and
Chris Gniady and
Lei Ye and
Beichuan Zhang Hadoop on Named Data Networking:
Experience and Results . . . . . . . . . 2:1--2:??
Long Gong and
Paul Tune and
Liang Liu and
Sen Yang and
Jun (Jim) Xu Queue-Proportional Sampling: A Better
Approach to Crossbar Scheduling for
Input-Queued Switches . . . . . . . . . 3:1--3:??
Alan Quach and
Zhongjie Wang and
Zhiyun Qian Investigation of the 2016 Linux TCP
Stack Vulnerability at Scale . . . . . . 4:1--4:??
Prateek Sharma and
David Irwin and
Prashant Shenoy Portfolio-driven Resource Management for
Transient Cloud Servers . . . . . . . . 5:1--5:??
Yi Cao and
Javad Nejati and
Muhammad Wajahat and
Aruna Balasubramanian and
Anshul Gandhi Deconstructing the Energy Consumption of
the Mobile Page Load . . . . . . . . . . 6:1--6:??
Xin Wang and
Richard T. B. Ma and
Yinlong Xu On Optimal Two-Sided Pricing of
Congested Networks . . . . . . . . . . . 7:1--7:??
Giuliano Casale Accelerating Performance Inference over
Closed Systems by Asymptotic Methods . . 8:1--8:??
Xiaoen Ju and
Hani Jamjoom and
Kang G. Shin Hieroglyph: Locally-Sufficient Graph
Processing via Compute--Sync--Merge . . 9:1--9:??
Kevin K. Chang and
A. Giray Ya\ualikçi and
Saugata Ghose and
Aditya Agrawal and
Niladrish Chatterjee and
Abhijith Kashyap and
Donghyuk Lee and
Mike O'Connor and
Hasan Hassan and
Onur Mutlu Understanding Reduced-Voltage Operation
in Modern DRAM Devices: Experimental
Characterization, Analysis, and
Mechanisms . . . . . . . . . . . . . . . 10:1--10:??
Cheng Wang and
Bhuvan Urgaonkar and
Neda Nasiriani and
George Kesidis Using Burstable Instances in the Public
Cloud: Why, When and How? . . . . . . . 11:1--11:??
Lei Ying Stein's Method for Mean Field
Approximations in Light and Heavy
Traffic Regimes . . . . . . . . . . . . 12:1--12:??
Sinong Wang and
Ness Shroff Security Game with Non-additive
Utilities and Multiple Attacker
Resources . . . . . . . . . . . . . . . 13:1--13:??
Lingda Li and
Robel Geda and
Ari B. Hayes and
Yanhao Chen and
Pranav Chaudhari and
Eddy Z. Zhang and
Mario Szegedy A Simple Yet Effective Balanced Edge
Partition Model for Parallel Computing 14:1--14:??
You Zhou and
Yian Zhou and
Min Chen and
Shigang Chen Persistent Spread Measurement for Big
Network Data Based on Register
Intersection . . . . . . . . . . . . . . 15:1--15:??
Steffen Bondorf and
Paul Nikolaus and
Jens B. Schmitt Quality and Cost of Deterministic
Network Calculus: Design and Evaluation
of an Accurate and Fast Analysis . . . . 16:1--16:??
Nicolas Gast Expected Values Estimated via Mean-Field
Approximation are $ 1 / N $-Accurate . . 17:1--17:??
Brandon Wang and
Xiaoye Li and
Leandro P. de Aguiar and
Daniel S. Menasche and
Zubair Shafiq Characterizing and Modeling Patching
Practices of Industrial Control Systems 18:1--18:??
David Formby and
Anwar Walid and
Raheem Beyah A Case Study in Power Substation Network
Dynamics . . . . . . . . . . . . . . . . 19:1--19:??
Hung T. Nguyen and
Tri P. Nguyen and
Tam N. Vu and
Thang N. Dinh Outward Influence and Cascade Size
Estimation in Billion-scale Networks . . 20:1--20:??
Wonil Choi and
Mohammad Arjomand and
Myoungsoo Jung and
Mahmut Kandemir Exploiting Data Longevity for Enhancing
the Lifetime of Flash-based Storage
Class Memory . . . . . . . . . . . . . . 21:1--21:??
Shaileshh Bojja Venkatakrishnan and
Giulia Fanti and
Pramod Viswanath Dandelion: Redesigning the Bitcoin
Network for Anonymity . . . . . . . . . 22:1--22:??
Zijun Zhang and
Zongpeng Li and
Chuan Wu Optimal Posted Prices for Online Cloud
Resource Allocation . . . . . . . . . . 23:1--23:??
Wen Sun and
Veronique Simon and
Sebastien Monnet and
Philippe Robert and
Pierre Sens Analysis of a Stochastic Model of
Replication in Large Distributed Storage
Systems: A Mean-Field Approach . . . . . 24:1--24:??
Debankur Mukherjee and
Souvik Dhara and
Sem C. Borst and
Johan S. H. van Leeuwaarden Optimal Service Elasticity in
Large-Scale Distributed Systems . . . . 25:1--25:??
Donghyuk Lee and
Samira Khan and
Lavanya Subramanian and
Saugata Ghose and
Rachata Ausavarungnirun and
Gennady Pekhimenko and
Vivek Seshadri and
Onur Mutlu Design-Induced Latency Variation in
Modern DRAM Chips: Characterization,
Analysis, and Latency Reduction
Mechanisms . . . . . . . . . . . . . . . 26:1--26:??
Konstantin Avrachenkov and
Jasper Goseling and
Berksan Serbetci A Low-Complexity Approach to Distributed
Cooperative Caching with Geographic
Constraints . . . . . . . . . . . . . . 27:1--27:??
Sen Yang and
Bill Lin and
Jun Xu Safe Randomized Load-Balanced Switching
By Diffusing Extra Loads . . . . . . . . 29:1--29:37
Sen Yang and
Yan He and
Zihui Ge and
Dongmei Wang and
Jun Xu Predictive Impact Analysis for Designing
a Resilient Cellular Backhaul Network 30:1--30:33
Muhammad J. Amjad and
Devavrat Shah Censored Demand Estimation in Retail . . 31:1--31:28
Stefan Magureanu and
Alexandre Proutiere and
Marcus Isaksson and
Boxun Zhang Online Learning of Optimally Diverse
Rankings . . . . . . . . . . . . . . . . 32:1--32:26
Nicolas Gast and
Benny Van Houdt A Refined Mean Field Approximation . . . 33:1--33:28
Sinong Wang and
Ness Shroff Towards Fast-Convergence, Low-Delay and
Low-Complexity Network Optimization . . 34:1--34:32
Konstantinos Psychas and
Javad Ghaderi On Non-Preemptive VM Scheduling in the
Cloud . . . . . . . . . . . . . . . . . 35:1--35:29
Lin Yang and
Wing Shing Wong and
Mohammad H. Hajiesmaili An Optimal Randomized Online Algorithm
for QoS Buffer Management . . . . . . . 36:1--36:26
Thinh T. Doan and
Carolyn L. Beck and
R. Srikant On the Convergence Rate of Distributed
Gradient Methods for Finite-Sum
Optimization under Communication Delays 37:1--37:27
Reza Aghajani and
Xingjie Li and
Kavita Ramanan The PDE Method for the Analysis of
Randomized Load Balancing Networks . . . 38:1--38:28
Xingyu Zhou and
Fei Wu and
Jian Tan and
Yin Sun and
Ness Shroff Designing Low-Complexity Heavy-Traffic
Delay-Optimal Load Balancing Schemes:
Theory to Algorithms . . . . . . . . . . 39:1--39:30
Benjamin Berg and
Jan-Pieter Dorsman and
Mor Harchol-Balter Towards Optimality in Parallel
Scheduling . . . . . . . . . . . . . . . 40:1--40:30
Thomas Bonald and
Céline Comte and
Fabien Mathieu Performance of Balanced Fairness in
Resource Pools: a Recursive Approach . . 41:1--41:25
Yvonne-Anne Pignolet and
Stefan Schmid and
Gilles Tredan Tomographic Node Placement Strategies
and the Impact of the Routing Model . . 42:1--42:23
Tao B. Schardl and
Tyler Denniston and
Damon Doucet and
Bradley C. Kuszmaul and
I-Ting Angelina Lee and
Charles E. Leiserson The CSI Framework for Compiler-Inserted
Program Instrumentation . . . . . . . . 43:1--43:25
Yudong Chen and
Lili Su and
Jiaming Xu Distributed Statistical Machine Learning
in Adversarial Settings: Byzantine
Gradient Descent . . . . . . . . . . . . 44:1--44:25
Xiaomeng Chen and
Jiayi Meng and
Y. Charlie Hu and
Maruti Gupta and
Ralph Hasholzner and
Venkatesan Nallampatti Ekambaram and
Ashish Singh and
Srikathyayani Srikanteswara A Fine-grained Event-based Modem Power
Model for Enabling In-depth Modem Energy
Drain Analysis . . . . . . . . . . . . . 45:1--45:28
Shenglin Zhang and
Ying Liu and
Weibin Meng and
Zhiling Luo and
Jiahao Bu and
Sen Yang and
Peixian Liang and
Dan Pei and
Jun Xu and
Yuzhi Zhang and
Yu Chen and
Hui Dong and
Xianping Qu and
Lei Song PreFix: Switch Failure Prediction in
Datacenter Networks . . . . . . . . . . 2:1--2:29
Rupert Freeman and
Seyed Majid Zahedi and
Vincent Conitzer and
Benjamin C. Lee Dynamic Proportional Sharing: a
Game-Theoretic Approach . . . . . . . . 3:1--3:36
Alan Kuhnle and
Victoria G. Crawford and
My T. Thai Network Resilience and the
Length-Bounded Multicut Problem:
Reaching the Dynamic Billion-Scale with
Guarantees . . . . . . . . . . . . . . . 4:1--4:26
Jian Tan and
Guocong Quan and
Kaiyi Ji and
Ness Shroff On Resource Pooling and Separation for
LRU Caching . . . . . . . . . . . . . . 5:1--5:31
Mohammad A. Islam and
Luting Yang and
Kiran Ranganath and
Shaolei Ren Why Some Like It Loud: Timing Power
Attacks in Multi-tenant Data Centers
Using an Acoustic Side Channel . . . . . 6:1--6:33
Santiago Duran and
Ina Maria Verloop Asymptotic Optimal Control of
Markov-Modulated Restless Bandits . . . 7:1--7:25
Zhaowei Tan and
Yuanjie Li and
Qianru Li and
Zhehui Zhang and
Zhehan Li and
Songwu Lu Supporting Mobile VR in LTE Networks:
How Close Are We? . . . . . . . . . . . 8:1--8:31
Saba Ahmadian and
Onur Mutlu and
Hossein Asadi ECI-Cache: a High-Endurance and
Cost-Efficient I/O Caching Scheme for
Virtualized Platforms . . . . . . . . . 9:1--9:34
Buchnik Eliav and
Edith Cohen Bootstrapped Graph Diffusions: Exposing
the Power of Nonlinearity . . . . . . . 10:1--10:19
Qingkai Liang and
Eytan Modiano Minimizing Queue Length Regret Under
Adversarial Network Models . . . . . . . 11:1--11:32
Xiaohan Wei and
Hao Yu and
Michael J. Neely Online Learning in Weakly Coupled Markov
Decision Processes: a Convergence Time
Study . . . . . . . . . . . . . . . . . 12:1--12:38
Donggyu Yun and
Alexandre Proutiere and
Sumyeong Ahn and
Jinwoo Shin and
Yung Yi Multi-armed Bandit with Additional
Observations . . . . . . . . . . . . . . 13:1--13:22
Debankur Mukherjee and
Sem C. Borst and
Johan S. H. van Leeuwaarden Asymptotically Optimal Load Balancing
Topologies . . . . . . . . . . . . . . . 14:1--14:29
Arjun Anand and
Gustavo de Veciana A Whittle's Index Based Approach for QoE
Optimization in Wireless Networks . . . 15:1--15:39
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf SOAP: One Clean Analysis of All
Age-Based Scheduling Policies . . . . . 16:1--16:30
Pengfei Zheng and
Benjamin C. Lee Hound: Causal Learning for
Datacenter-scale Straggler Diagnosis . . 17:1--17:36
Bo Jiang and
Philippe Nain and
Don Towsley and
Saikat Guha On a Class of Stochastic Multilayer
Networks . . . . . . . . . . . . . . . . 18:1--18:25
Vlad Nitu and
Aram Kocharyan and
Hannas Yaya and
Alain Tchana and
Daniel Hagimont and
Hrachya Astsatryan Working Set Size Estimation Techniques
in Virtualized Environments: One Size
Does not Fit All . . . . . . . . . . . . 19:1--19:22
Xingyu Zhou and
Fei Wu and
Jian Tan and
Kannan Srinivasan and
Ness Shroff Degree of Queue Imbalance: Overcoming
the Limitation of Heavy-traffic Delay
Optimality in Load Balancing Systems . . 21:1--21:41
Kausik Subramanian and
Loris D'Antoni and
Aditya Akella Synthesis of Fault-Tolerant Distributed
Router Configurations . . . . . . . . . 22:1--22:26
Adam Wierman and
Aditya Akella Message from the Editors . . . . . . . . 23:1--23:1
Lin Yang and
Lei Deng and
Mohammad H. Hajiesmaili and
Cheng Tan and
Wing Shing Wong An Optimal Algorithm for Online
Non-Convex Learning . . . . . . . . . . 25:1--25:25
Mowei Wang and
Yong Cui and
Shihan Xiao and
Xin Wang and
Dan Yang and
Kai Chen and
Jun Zhu Neural Network Meets DCN: Traffic-driven
Topology Adaptation with Deep Learning 26:1--26:25
Tim Hellemans and
Benny Van Houdt On the Power-of-d-choices with Least
Loaded Server Selection . . . . . . . . 27:1--27:22
Oleksii Oleksenko and
Dmitrii Kuvaiskii and
Pramod Bhatotia and
Pascal Felber and
Christof Fetzer Intel MPX Explained: a Cross-layer
Analysis of the Intel MPX System Stack 28:1--28:30
Giulia Fanti and
Shaileshh Bojja Venkatakrishnan and
Surya Bakshi and
Bradley Denby and
Shruti Bhargava and
Andrew Miller and
Pramod Viswanath Dandelion++: Lightweight Cryptocurrency
Networking with Formal Anonymity
Guarantees . . . . . . . . . . . . . . . 29:1--29:35
Thibault Séjourn\`e and
Samitha Samaranayake and
Siddhartha Banerjee The Price of Fragmentation in
Mobility-on-Demand Services . . . . . . 30:1--30:26
Jessica Hoffmann and
Constantine Caramanis The Cost of Uncertainty in Curing
Epidemics . . . . . . . . . . . . . . . 31:1--31:33
Daniel S. Berger and
Nathan Beckmann and
Mor Harchol-Balter Practical Bounds on Optimal Caching with
Variable Object Sizes . . . . . . . . . 32:1--32:38
Christina Vlachou and
Ioannis Pefkianakis and
Kyu-Han Kim LTERadar: Towards LTE-Aware Wi-Fi Access
Points . . . . . . . . . . . . . . . . . 33:1--33:31
Sem Borst and
Martin Zubeldia Delay Scaling in Many-Sources Wireless
Networks without Queue State Information 34:1--34:45
Akshay Jain and
Mahmoud Khairy and
Timothy G. Rogers A Quantitative Evaluation of
Contemporary GPU Simulation Methodology 35:1--35:28
Mohammad Sadegh Talebi and
Alexandre Proutiere Learning Proportionally Fair Allocations
with Low Regret . . . . . . . . . . . . 36:1--36:31
Yixin Luo and
Saugata Ghose and
Yu Cai and
Erich F. Haratsch and
Onur Mutlu Improving $3$D NAND Flash Memory
Lifetime by Tolerating Early Retention
Loss and Process Variation . . . . . . . 37:1--37:48
Saugata Ghose and
Abdullah Giray Yaglikçi and
Raghav Gupta and
Donghyuk Lee and
Kais Kudrolli and
William X. Liu and
Hasan Hassan and
Kevin K. Chang and
Niladrish Chatterjee and
Aditya Agrawal and
Mike O'Connor and
Onur Mutlu What Your DRAM Power Models Are Not
Telling You: Lessons from a Detailed
Experimental Study . . . . . . . . . . . 38:1--38:41
Xulong Tang and
Ashutosh Pattnaik and
Onur Kayiran and
Adwait Jog and
Mahmut Taylan Kandemir and
Chita Das Quantifying Data Locality in Dynamic
Parallelism in GPUs . . . . . . . . . . 39:1--39:24
Anish Agarwal and
Muhammad Jehangir Amjad and
Devavrat Shah and
Dennis Shen Model Agnostic Time Series Analysis via
Matrix Estimation . . . . . . . . . . . 40:1--40:39
Xingyu Zhou and
Jian Tan and
Ness Shroff Heavy-traffic Delay Optimality in
Pull-based Load Balancing Systems:
Necessary and Sufficient Conditions . . 41:1--41:33
Xulong Tang and
Mahmut Taylan Kandemir and
Hui Zhao and
Myoungsoo Jung and
Mustafa Karakoy Computing with Near Data . . . . . . . . 42:1--42:30
Florin Ciucu and
Felix Poloczek Two Extensions of Kingman's GI/G/1 Bound 43:1--43:33
Lan N. Nguyen and
My T. Thai Network Resilience Assessment via QoS
Degradation Metrics: an Algorithmic
Approach . . . . . . . . . . . . . . . . 1:1--1:32
Ran Liu and
Edmund Yeh and
Atilla Eryilmaz Proactive Caching for Low Access-Delay
Services under Uncertain Predictions . . 2:1--2:46
Xiao Zhu and
Yihua Ethan Guo and
Ashkan Nikravesh and
Feng Qian and
Z. Morley Mao Understanding the Networking Performance
of Wear OS . . . . . . . . . . . . . . . 3:1--3:25
Mark van der Boor and
Sem Borst and
Johan van Leeuwaarden Hyper-Scalable JSQ with Sparse Feedback 4:1--4:37
Tu Dinh Ngoc and
Bao Bui and
Stella Bitchebe and
Alain Tchana and
Valerio Schiavoni and
Pascal Felber and
Daniel Hagimont Everything You Should Know About Intel
SGX Performance on Virtualized Systems 5:1--5:21
Haoran Yu and
Ermin Wei and
Randall A. Berry Analyzing Location-Based Advertising for
Vehicle Service Providers Using
Effective Resistances . . . . . . . . . 6:1--6:35
Richard Combes and
Mikael Touati Computationally Efficient Estimation of
the Spectral Gap of a Markov Chain . . . 7:1--7:21
Youil Han and
Bryan S. Kim and
Jeseong Yeon and
Sungjin Lee and
Eunji Lee TeksDB: Weaving Data Structures for a
High-Performance Key--Value Store . . . 8:1--8:23
Shoaib Akram and
Jennifer Sartor and
Kathryn McKinley and
Lieven Eeckhout Crystal Gazer: Profile-Driven
Write-Rationing Garbage Collection for
Hybrid Memories . . . . . . . . . . . . 9:1--9:27
Qiulin Lin and
Hanling Yi and
John Pang and
Minghua Chen and
Adam Wierman and
Michael Honig and
Yuanzhang Xiao Competitive Online Optimization under
Inventory Constraints . . . . . . . . . 10:1--10:28
Lili Su and
Martin Zubeldia and
Nancy Lynch Collaboratively Learning the Best Option
on Graphs, Using Bounded Local Memory 11:1--11:32
Lili Su and
Jiaming Xu Securing Distributed Gradient Descent in
High Dimensional Statistical Learning 12:1--12:41
Monika Henzinger and
Stefan Neumann and
Stefan Schmid Efficient Distributed Workload
(Re-)Embedding . . . . . . . . . . . . . 13:1--13:38
Dengwang Tang and
Vijay G. Subramanian Random Walk Based Sampling for Load
Balancing in Multi-Server Systems . . . 14:1--14:44
Chul-Ho Lee and
Min Kang and
Do Young Eun Non-Markovian Monte Carlo on Directed
Graphs . . . . . . . . . . . . . . . . . 15:1--15:31
Joshua Comden and
Sijie Yao and
Niangjun Chen and
Haipeng Xing and
Zhenhua Liu Online Optimization in Cloud Resource
Provisioning: Predictions, Regrets, and
Algorithms . . . . . . . . . . . . . . . 16:1--16:30
Lei Zhang and
Zhemin Yang and
Yuyu He and
Mingqi Li and
Sen Yang and
Min Yang and
Yuan Zhang and
Zhiyun Qian App in the Middle: Demystify Application
Virtualization in Android and its
Security Threats . . . . . . . . . . . . 17:1--17:24
Reza Alijani and
Siddhartha Banerjee and
Sreenivas Gollapudi and
Kostas Kollias and
Kamesh Munagala The Segmentation-Thickness Tradeoff in
Online Marketplaces . . . . . . . . . . 18:1--18:26
Pavlos Nikolopoulos and
Christos Pappas and
Katerina Argyraki and
Adrian Perrig Retroactive Packet Sampling for Traffic
Receipts . . . . . . . . . . . . . . . . 19:1--19:39
Thomas Bonald and
Nick Duffield Editorial . . . . . . . . . . . . . . . 20:1--20:2
Lavanya Jose and
Stephen Ibanez and
Mohammad Alizadeh and
Nick McKeown A Distributed Algorithm to Calculate
Max-Min Fair Rates Without Per-Flow
State . . . . . . . . . . . . . . . . . 21:1--21:42
Ming Shi and
Xiaojun Lin and
Lei Jiao On the Value of Look-Ahead in
Competitive Online Convex Optimization 22:1--22:42
Benny Van Houdt Global Attraction of ODE-based Mean
Field Models with Hyperexponential Job
Sizes . . . . . . . . . . . . . . . . . 23:1--23:23
Song Wei and
Kun Zhang and
Bibo Tu HyperBench: a Benchmark Suite for
Virtualization Capabilities . . . . . . 24:1--24:22
Daniel Vial and
Vijay Subramanian A Structural Result for Personalized
PageRank and its Algorithmic
Consequences . . . . . . . . . . . . . . 25:1--25:88
Behnam Pourghassemi and
Ardalan Amiri Sani and
Aparna Chandramowlishwaran What-If Analysis of Page Load Time in
Web Browsers Using Causal Profiling . . 27:1--27:23
Pradeep Ambati and
David Irwin Optimizing the Cost of Executing Mixed
Interactive and Batch Workloads on
Transient VMs . . . . . . . . . . . . . 28:1--28:24
Dhruv Kumar and
Jian Li and
Abhishek Chandra and
Ramesh Sitaraman A TTL-based Approach for Data
Aggregation in Geo-distributed Streaming
Analytics . . . . . . . . . . . . . . . 29:1--29:27
Pavlos Sermpezis and
Vasileios Kotronis Inferring Catchment in Internet Routing 30:1--30:31
Florin Ciucu and
Felix Poloczek and
Amr Rizk Queue and Loss Distributions in
Finite-Buffer Queues . . . . . . . . . . 31:1--31:29
Doron Zarchy and
Radhika Mittal and
Michael Schapira and
Scott Shenker Axiomatizing Congestion Control . . . . 33:1--33:33
Milan Radulovic and
Rommel Sánchez Verdejo and
Paul Carpenter and
Petar Radojkovi\'c and
Bruce Jacob and
Eduard Ayguadé PROFET: Modeling System Performance and
Energy Without Simulating the CPU . . . 34:1--34:33
Tim Hellemans and
Tejas Bodas and
Benny Van Houdt Performance Analysis of Workload
Dependent Load Balancing Policies . . . 35:1--35:35
Osman Emre Dai and
Daniel Cullina and
Negar Kiyavash and
Matthias Grossglauser Analysis of a Canonical Labeling
Algorithm for the Alignment of
Correlated Erd\Hos--Rényi Graphs . . . . 36:1--36:25
Muhammad Amjad and
Vishal Misra and
Devavrat Shah and
Dennis Shen mRSC: Multi-dimensional Robust Synthetic
Control . . . . . . . . . . . . . . . . 37:1--37:27
Mustafa Karakoy and
Orhan Kislal and
Xulong Tang and
Mahmut Taylan Kandemir and
Meenakshi Arunachalam Architecture-Aware Approximate Computing 38:1--38:24
Guocong Quan and
Jian Tan and
Atilla Eryilmaz and
Ness Shroff A New Flexible Multi-flow LRU Cache
Management Paradigm for Minimizing
Misses . . . . . . . . . . . . . . . . . 39:1--39:30
Jessica Hoffmann and
Constantine Caramanis Learning Graphs from Noisy Epidemic
Cascades . . . . . . . . . . . . . . . . 40:1--40:34
Honghao Wei and
Xiaohan Kang and
Weina Wang and
Lei Ying QuickStop: a Markov Optimal Stopping
Approach for Quickest Misinformation
Detection . . . . . . . . . . . . . . . 41:1--41:25
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter Load Balancing Guardrails: Keeping Your
Heavy Traffic on the Road to Low
Response Times . . . . . . . . . . . . . 42:1--42:31
Semih Cayci and
Atilla Eryilmaz and
R. Srikant Learning to Control Renewal Processes
with Bandit Feedback . . . . . . . . . . 43:1--43:32
Ayush Mishra and
Xiangpeng Sun and
Atishya Jain and
Sameer Pande and
Raj Joshi and
Ben Leong The Great Internet TCP Congestion
Control Census . . . . . . . . . . . . . 45:1--45:24
Michael Fleder and
Devavrat Shah Forecasting with Alternative Data . . . 46:1--46:29
Zhenjie Yang and
Yong Cui and
Shihan Xiao and
Xin Wang and
Minming Li and
Chuming Li and
Yadong Liu Achieving Efficient Routing in
Reconfigurable DCNs . . . . . . . . . . 47:1--47:30
Palma London and
Shai Vardi and
Adam Wierman Logarithmic Communication for
Distributed Optimization in Multi-Agent
Systems . . . . . . . . . . . . . . . . 48:1--48:29
Yiyang Chang and
Chuan Jiang and
Ashish Chandra and
Sanjay Rao and
Mohit Tawarmalani Lancet: Better Network Resilience by
Designing for Pruned Failure Sets . . . 49:1--49:26
Xinzhe Fu and
Eytan Modiano Fundamental Limits of Volume-based
Network DoS Attacks . . . . . . . . . . 50:1--50:36
You Zhou and
Youlin Zhang and
Chaoyi Ma and
Shigang Chen and
Olufemi O. Odegbile Generalized Sketch Families for Network
Traffic Measurement . . . . . . . . . . 51:1--51:34
Sinong Wang and
Jiashang Liu and
Ness Shroff Fundamental Limits of Approximate
Gradient Coding . . . . . . . . . . . . 52:1--52:22
Abishek Sankararaman and
Ayalvadi Ganesh and
Sanjay Shakkottai Social Learning in Multi Agent Multi
Armed Bandits . . . . . . . . . . . . . 53:1--53:35
Daniel Cullina and
Negar Kiyavash and
Prateek Mittal and
H. Vincent Poor Partial Recovery of Erd\Hos--Rényi Graph
Alignment via $k$-Core Alignment . . . . 54:1--54:21
Sean R. Sinclair and
Siddhartha Banerjee and
Christina Lee Yu Adaptive Discretization for Episodic
Reinforcement Learning in Metric Spaces 55:1--55:44
Francesco Bronzino and
Paul Schmitt and
Sara Ayoubi and
Guilherme Martins and
Renata Teixeira and
Nick Feamster Inferring Streaming Video Quality from
Encrypted Traffic: Practical Models and
Deployment Experience . . . . . . . . . 56:1--56:25
Illés Antal Horváth and
Ziv Scully and
Benny Van Houdt Mean Field Analysis of
Join-Below-Threshold Load Balancing for
Resource Sharing Servers . . . . . . . . 57:1--57:21
Ankur Mallick and
Malhar Chaudhari and
Utsav Sheth and
Ganesh Palanikumar and
Gauri Joshi Rateless Codes for Near-Perfect Load
Balancing in Distributed Matrix--Vector
Multiplication . . . . . . . . . . . . . 58:1--58:40
Jordi Ros-Giralt and
Atul Bohara and
Sruthi Yellamraju and
M. Harper Langston and
Richard Lethin and
Yuang Jiang and
Leandros Tassiulas and
Josie Li and
Yuanlong Tan and
Malathi Veeraraghavan On the Bottleneck Structure of
Congestion-Controlled Networks . . . . . 59:1--59:31
Saugata Ghose and
Tianshi Li and
Nastaran Hajinazar and
Damla Senol Cali and
Onur Mutlu Demystifying Complex Workload-DRAM
Interactions: an Experimental Study . . 60:1--60:50
Nikita Ivkin and
Ran Ben Basat and
Zaoxing Liu and
Gil Einziger and
Roy Friedman and
Vladimir Braverman I Know What You Did Last Summer: Network
Monitoring using Interval Queries . . . 61:1--61:28
Vishwaraj Doshi and
Do Young Eun Fiedler Vector Approximation via
Interacting Random Walks . . . . . . . . 01:1--01:28
Martin Zubeldia Delay-optimal Policies in Partial
Fork-Join Systems with Redundancy and
Random Slowdowns . . . . . . . . . . . . 02:1--02:49
Hsuan-Chi Kuo and
Jianyan Chen and
Sibin Mohan and
Tianyin Xu Set the Configuration for the Heart of
the OS: On the Practicality of Operating
System Kernel Debloating . . . . . . . . 03:1--03:27
Reza Alijani and
Siddhartha Banerjee and
Sreenivas Gollapudi and
Kamesh Munagala and
Kangning Wang Predict and Match: Prophet Inequalities
with Uncertain Supply . . . . . . . . . 04:1--04:23
JinKe Song and
Qiang Li and
Haining Wang and
Limin Sun Under the Concealing Surface: Detecting
and Understanding Live Webcams in the
Wild . . . . . . . . . . . . . . . . . . 05:1--05:25
Lei Zhang and
Reza Karimi and
Irfan Ahmad and
Ymir Vigfusson Optimal Data Placement for Heterogeneous
Cache, Memory, and Storage Systems . . . 06:1--06:27
Zhihui Shao and
Mohammad A. Islam and
Shaolei Ren Your Noise, My Signal: Exploiting
Switching Noise for Stealthy Data
Exfiltration from Desktop Computers . . 07:1--07:39
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf Simple Near-Optimal Scheduling for the
M/G/1 . . . . . . . . . . . . . . . . . 11:1--11:29
Yang Cai and
Federico Echenique and
Hu Fu and
Katrina Ligett and
Adam Wierman and
Juba Ziani Third-Party Data Providers Ruin Simple
Mechanisms . . . . . . . . . . . . . . . 12:1--12:31
Pengxiong Zhu and
Keyu Man and
Zhongjie Wang and
Zhiyun Qian and
Roya Ensafi and
J. Alex Halderman and
Haixin Duan Characterizing Transnational Internet
Performance and the Great Bottleneck of
China . . . . . . . . . . . . . . . . . 13:1--13:23
Richard Combes and
Alexandre Prouti\`ere and
Alexandre Fauquette Unimodal Bandits with Continuous Arms:
Order-optimal Regret without Smoothness 14:1--14:28
Lin Yang and
Mohammad H. Hajiesmaili and
Ramesh Sitaraman and
Adam Wierman and
Enrique Mallada and
Wing S. Wong Online Linear Optimization with
Inventory Management Constraints . . . . 16:1--16:29
Martin Karsten and
Saman Barghi User-level Threading: Have Your Cake and
Eat It Too . . . . . . . . . . . . . . . 17:1--17:30
Yiheng Lin and
Gautam Goel and
Adam Wierman Online Optimization with Predictions and
Non-convex Losses . . . . . . . . . . . 18:1--18:32
Sungjin Im and
Benjamin Moseley and
Kamesh Munagala and
Kirk Pruhs Dynamic Weighted Fairness with Minimal
Disruptions . . . . . . . . . . . . . . 19:1--19:18
Chen Avin and
Manya Ghobadi and
Chen Griner and
Stefan Schmid On the Complexity of Traffic Traces and
Implications . . . . . . . . . . . . . . 20:1--20:29
Y. C. Tay and
Athina Markopoulou Editorial . . . . . . . . . . . . . . . 21:1--21:1
Shouqian Shi and
Chen Qian Ludo Hashing: Compact, Fast, and Dynamic
Key-value Lookups for Practical Network
Systems . . . . . . . . . . . . . . . . 22:1--22:32
Philippe Nain and
Gayane Vardoyan and
Saikat Guha and
Don Towsley On the Analysis of a Multipartite
Entanglement Distribution Switch . . . . 23:1--23:39
Xiaoqi Tan and
Bo Sun and
Alberto Leon-Garcia and
Yuan Wu and
Danny H. K. Tsang Mechanism Design for Online Resource
Allocation: a Unified Approach . . . . . 24:1--24:46
Rajarshi Bhattacharjee and
Subhankar Banerjee and
Abhishek Sinha Fundamental Limits on the Regret of
Online Network-Caching . . . . . . . . . 25:1--25:31
Peter Snyder and
Antoine Vastel and
Ben Livshits Who Filters the Filters: Understanding
the Growth, Usefulness and Efficiency of
Crowdsourced Ad Blocking . . . . . . . . 26:1--26:24
Ludovic Thomas and
Jean-Yves Le Boudec On Time Synchronization Issues in
Time-Sensitive Networks with Regulators
and Nonideal Clocks . . . . . . . . . . 27:1--27:41
Chun-Yi Liu and
Jagadish Kotra and
Myoungsoo Jung and
Mahmut Taylan Kandemir Centaur: a Novel Architecture for
Reliable, Low-Wear, High-Density $3$D
NAND Storage . . . . . . . . . . . . . . 28:1--28:25
Weizhao Tang and
Weina Wang and
Giulia Fanti and
Sewoong Oh Privacy-Utility Tradeoffs in Routing
Cryptocurrency over Payment Channel
Networks . . . . . . . . . . . . . . . . 29:1--29:39
Ziv Scully and
Lucas van Kreveld and
Onno Boxma and
Jan-Pieter Dorsman and
Adam Wierman Characterizing Policies with Optimal
Response Time Tails under Heavy-Tailed
Job Sizes . . . . . . . . . . . . . . . 30:1--30:33
Fred Lin and
Keyur Muzumdar and
Nikolay Pavlovich Laptev and
Mihai-Valentin Curelea and
Seunghak Lee and
Sriram Sankar Fast Dimensional Analysis for Root Cause
Investigation in a Large-Scale Service
Environment . . . . . . . . . . . . . . 31:1--31:23
Yibo Pi and
Sugih Jamin and
Peter Danzig and
Feng Qian Latency Imbalance Among Internet
Load-Balanced Paths: a Cloud-Centric
View . . . . . . . . . . . . . . . . . . 32:1--32:29
Seyed Armin Vakil Ghahani and
Mahmut Taylan Kandemir and
Jagadish B. Kotra DSM: a Case for Hardware-Assisted
Merging of DRAM Rows with Same Content 33:1--33:26
Erik Tillberg and
Peter Marbach and
Ravi Mazumdar Optimal Bidding Strategies for Online Ad
Auctions with Overlapping Targeting
Criteria . . . . . . . . . . . . . . . . 34:1--34:55
Aditya Gopalan and
Abishek Sankararaman and
Anwar Walid and
Sriram Vishwanath Stability and Scalability of Blockchain
Systems . . . . . . . . . . . . . . . . 35:1--35:35
Apostolos Pyrgelis and
Carmela Troncoso and
Emiliano De Cristofaro Measuring Membership Privacy on
Aggregate Location Time-Series . . . . . 36:1--36:28
Yuheng Huang and
Haoyu Wang and
Lei Wu and
Gareth Tyson and
Xiapu Luo and
Run Zhang and
Xuanzhe Liu and
Gang Huang and
Xuxian Jiang Understanding (Mis)Behavior on the EOSIO
Blockchain . . . . . . . . . . . . . . . 37:1--37:28
Atakan Aral and
Melike Erol-Kantarci and
Ivona Brandi\'c Staleness Control for Edge Data
Analytics . . . . . . . . . . . . . . . 38:1--38:24
Xiaohan Wei and
Hao Yu and
Michael J. Neely Online Primal-Dual Mirror Descent under
Stochastic Constraints . . . . . . . . . 39:1--39:36
Alexander Marder and
Matthew Luckie and
Bradley Huffaker and
KC Claffy vrfinder: Finding Outbound Addresses in
Traceroute . . . . . . . . . . . . . . . 40:1--40:28
Xin Wang and
Richard T. B. Ma On Private Peering Agreements between
Content and Access Providers: a
Contractual Equilibrium Analysis . . . . 41:1--41:32
Wentao Weng and
Weina Wang Achieving Zero Asymptotic Queueing Delay
for Parallel Jobs . . . . . . . . . . . 42:1--42:36
Ziv Scully and
Isaac Grosof and
Mor Harchol-Balter The Gittins Policy is Nearly Optimal in
the M/G/$k$ under Extremely General
Conditions . . . . . . . . . . . . . . . 43:1--43:29
Luis Fernando Abanto-Leon and
Andreas Bäuml and
Gek Hong (Allyson) Sim and
Matthias Hollick and
Arash Asadi Stay Connected, Leave no Trace:
Enhancing Security and Privacy in WiFi
via Obfuscating Radiometric Fingerprints 44:1--44:31
Wentao Weng and
Xingyu Zhou and
R. Srikant Optimal Load Balancing with Locality
Constraints . . . . . . . . . . . . . . 45:1--45:37
Youri Raaijmakers and
Sem Borst Achievable Stability in Redundancy
Systems . . . . . . . . . . . . . . . . 46:1--46:21
Michael Fleder and
Devavrat Shah I Know What You Bought At Chipotle for
\$9.81 by Solving A Linear Inverse
Problem . . . . . . . . . . . . . . . . 47:1--47:17
Elene Anton and
Urtzi Ayesta and
Matthieu Jonckheere and
Ina Maria Verloop Improving the Performance of
Heterogeneous Data Centers through
Redundancy . . . . . . . . . . . . . . . 48:1--48:29
Ahmad Hazimeh and
Adrian Herrera and
Mathias Payer Magma: a Ground-Truth Fuzzing Benchmark 49:1--49:29
Bingyu Gao and
Haoyu Wang and
Pengcheng Xia and
Siwei Wu and
Yajin Zhou and
Xiapu Luo and
Gareth Tyson Tracking Counterfeit Cryptocurrency
End-to-end . . . . . . . . . . . . . . . 50:1--50:28
Bo Sun and
Ali Zeynali and
Tongxin Li and
Mohammad Hajiesmaili and
Adam Wierman and
Danny H. K. Tsang Competitive Algorithms for the Online
Multiple Knapsack Problem with
Application to Electric Vehicle Charging 51:1--51:32
Kamiar Asgari and
Michael J. Neely Bregman-style Online Convex Optimization
with Energy-Harvesting Constraints . . . 52:1--52:25
Lishan Yang and
Bin Nie and
Adwait Jog and
Evgenia Smirni SUGAR: Speeding Up GPGPU Application
Resilience Estimation with Input Sizing 01:1--01:29
Zhaowei Zhu and
Jingxuan Zhu and
Ji Liu and
Yang Liu Federated Bandit: a Gossiping Approach 02:1--02:29
Behnam Pourghassemi and
Jordan Bonecutter and
Zhou Li and
Aparna Chandramowlishwaran adPerf: Characterizing the Performance
of Third-party Ads . . . . . . . . . . . 03:1--03:26
Iman Akbari and
Mohammad A. Salahuddin and
Leni Ven and
Noura Limam and
Raouf Boutaba and
Bertrand Mathieu and
Stephanie Moteau and
Stephane Tuffin A Look Behind the Curtain: Traffic
Classification in an Increasingly
Encrypted Web . . . . . . . . . . . . . 04:1--04:26
Kai Han and
Shuang Cui and
Tianshuai Zhu and
Enpei Zhang and
Benwei Wu and
Zhizhuo Yin and
Tong Xu and
Shaojie Tang and
He Huang Approximation Algorithms for Submodular
Data Summarization with a Knapsack
Constraint . . . . . . . . . . . . . . . 05:1--05:31
Klaus-Tycho Foerster and
Janne H. Korhonen and
Ami Paz and
Joel Rybicki and
Stefan Schmid Input-Dynamic Distributed Algorithms for
Communication Networks . . . . . . . . . 06:1--06:33
Weina Wang and
Qiaomin Xie and
Mor Harchol-Balter Zero Queueing for Multi-Server Jobs . . 07:1--07:25
Jing Tang and
Xueyan Tang and
Andrew Lim and
Kai Han and
Chongshou Li and
Junsong Yuan Revisiting Modified Greedy Algorithm for
Monotone Submodular Maximization with a
Knapsack Constraint . . . . . . . . . . 08:1--08:22
Thibaut Cuvelier and
Richard Combes and
Eric Gourdin Statistically Efficient, Polynomial-Time
Algorithms for Combinatorial
Semi-Bandits . . . . . . . . . . . . . . 09:1--09:31
Anshul Gandhi and
Negar Kiyavash and
Jia Wang Editorial . . . . . . . . . . . . . . . 13:1--13:1
Yue Zhang and
Bayan Turkistani and
Allen Yuqing Yang and
Chaoshun Zuo and
Zhiqiang Lin A Measurement Study of Wechat Mini-Apps 14:1--14:25
Qingzhao Zhang and
David Ke Hong and
Ze Zhang and
Qi Alfred Chen and
Scott Mahlke and
Z. Morley Mao A Systematic Framework to Identify
Violations of Scenario-dependent Driving
Rules in Autonomous Vehicle Software . . 15:1--15:25
Yiguang Zhang and
Jessy Xinyi Han and
Ilica Mahajan and
Priyanjana Bengani and
Augustin Chaintreau Chasm in Hegemony: Explaining and
Reproducing Disparities in Homophilous
Networks . . . . . . . . . . . . . . . . 16:1--16:38
Tongxin Li and
Yue Chen and
Bo Sun and
Adam Wierman and
Steven H. Low Information Aggregation for Constrained
Online Control . . . . . . . . . . . . . 18:1--18:35
Tim Hellemans and
Benny Van Houdt Mean Waiting Time in Large-Scale and
Critically Loaded Power of $d$ Load
Balancing Systems . . . . . . . . . . . 19:1--19:34
Xulong Tang and
Mahmut Taylan Kandemir and
Mustafa Karakoy Mix and Match: Reorganizing Tasks for
Enhancing Data Locality . . . . . . . . 20:1--20:24
Isaac Grosof and
Kunhe Yang and
Ziv Scully and
Mor Harchol-Balter \pkgNudge: Stochastically Improving upon
FCFS . . . . . . . . . . . . . . . . . . 21:1--21:29
Grzegorz Kielanski and
Benny Van Houdt On the Asymptotic Insensitivity of the
Supermarket Model in Processor Sharing
Systems . . . . . . . . . . . . . . . . 22:1--22:28
Rachee Singh and
David Tench and
Phillipa Gill and
Andrew McGregor \pkgPredictRoute: a Network Path
Prediction Toolkit . . . . . . . . . . . 23:1--23:24
Noémie Périvier and
Chamsi Hssaine and
Samitha Samaranayake and
Siddhartha Banerjee Real-time Approximate Routing for Smart
Transit Systems . . . . . . . . . . . . 24:1--24:30
Francesca Randone and
Luca Bortolussi and
Mirco Tribastone Refining Mean-field Approximations by
Dynamic State Truncation . . . . . . . . 25:1--25:30
Weimin Chen and
Xinran Li and
Yuting Sui and
Ningyu He and
Haoyu Wang and
Lei Wu and
Xiapu Luo \pkgSADPonzi: Detecting and
Characterizing Ponzi Schemes in Ethereum
Smart Contracts . . . . . . . . . . . . 26:1--26:30
Liren Yu and
Jiaming Xu and
Xiaojun Lin The Power of $D$-hops in Matching
Power-Law Graphs . . . . . . . . . . . . 27:1--27:43
Ashish Bijlani and
Umakishore Ramachandran and
Roy Campbell Where did my 256 GB go? A Measurement
Analysis of Storage Consumption on Smart
Mobile Devices . . . . . . . . . . . . . 28:1--28:28
Niklas Carlsson and
Edith Cohen and
Philippe Robert POMACS V5, N3, December 2021 Editorial 29:1--29:1
Lin Yang and
Ali Zeynali and
Mohammad H. Hajiesmaili and
Ramesh K. Sitaraman and
Don Towsley Competitive Algorithms for Online
Multidimensional Knapsack Problems . . . 30:1--30:30
Hassan Iqbal and
Ayesha Khalid and
Muhammad Shahzad Dissecting Cloud Gaming Performance with
\pkgDECAF . . . . . . . . . . . . . . . 31:1--31:27
Michalis Pachilakis and
Panagiotis Papadopoulos and
Nikolaos Laoutaris and
Evangelos P. Markatos and
Nicolas Kourtellis \pkgYourAdvalue: Measuring Advertising
Price Dynamics without Bankrupting User
Privacy . . . . . . . . . . . . . . . . 32:1--32:26
Tomer Lange and
Joseph (Seffi) Naor and
Gala Yadgar Offline and Online Algorithms for SSD
Management . . . . . . . . . . . . . . . 33:1--33:28
Bingqian Lu and
Jianyi Yang and
Weiwen Jiang and
Yiyu Shi and
Shaolei Ren One Proxy Device Is Enough for
Hardware-Aware Neural Architecture
Search . . . . . . . . . . . . . . . . . 34:1--34:34
Yuanyuan Li and
Tareq Si Salem and
Giovanni Neglia and
Stratis Ioannidis Online Caching Networks with Adversarial
Guarantees . . . . . . . . . . . . . . . 35:1--35:39
Suho Shin and
Hoyong Choi and
Yung Yi and
Jungseul Ok Power of Bonus in Pricing for
Crowdsourcing . . . . . . . . . . . . . 36:1--36:25
Ryan J. Kinnear and
Ravi R. Mazumdar and
Peter Marbach Real-time Bidding for Time Constrained
Impression Contracts in First and Second
Price Auctions --- Theory and Algorithms 37:1--37:37
Chen Griner and
Johannes Zerwas and
Andreas Blenk and
Manya Ghobadi and
Stefan Schmid and
Chen Avin \pkgCerberus: The Power of Choices in
Datacenter Topology Design --- a
Throughput Perspective . . . . . . . . . 38:1--38:33
Pengcheng Xia and
Haoyu Wang and
Bingyu Gao and
Weihang Su and
Zhou Yu and
Xiapu Luo and
Chao Zhang and
Xusheng Xiao and
Guoai Xu Trade or Trick?: Detecting and
Characterizing Scam Tokens on Uniswap
Decentralized Exchange . . . . . . . . . 39:1--39:26
Francesco Bronzino and
Paul Schmitt and
Sara Ayoubi and
Hyojoon Kim and
Renata Teixeira and
Nick Feamster Traffic Refinery: Cost-Aware Data
Representation for Machine Learning on
Network Traffic . . . . . . . . . . . . 40:1--40:24
Sourav Das and
Nitin Awathare and
Ling Ren and
Vinay J. Ribeiro and
Umesh Bellur \pkgTuxedo: Maximizing Smart Contract
Computation in PoW Blockchains . . . . . 41:1--41:30
Shizhen Zhao and
Peirui Cao and
Xinbing Wang Understanding the Performance Guarantee
of Physical Topology Design for Optical
Circuit Switched Data Centers . . . . . 42:1--42:24
Lin Jin and
Shuai Hao and
Haining Wang and
Chase Cotton Understanding the Practices of Global
Censorship through Accurate, End-to-End
Measurements . . . . . . . . . . . . . . 43:1--43:25
Yun Seong Nam and
Jianfei Gao and
Chandan Bothra and
Ehab Ghabashneh and
Sanjay Rao and
Bruno Ribeiro and
Jibin Zhan and
Hui Zhang \pkgXatu: Richer Neural Network Based
Prediction for Video Streaming . . . . . 44:1--44:26
Niklas Carlsson and
Edith Cohen and
Philippe Robert POMACS V6, N1, March 2022 Editorial . . 1:1--1:1
Hem Regmi and
Sanjib Sur Argus: Predictable Millimeter-Wave
Picocells with Vision and Learning
Augmentation . . . . . . . . . . . . . . 2:1--2:26
Brivaldo A. Silva and
Paulo Mol and
Osvaldo Fonseca and
Italo Cunha and
Ronaldo A. Ferreira and
Ethan Katz-Bassett Automatic Inference of BGP Location
Communities . . . . . . . . . . . . . . 3:1--3:23
Young-Kyoon Suh and
Junyoung An and
Byungchul Tak and
Gap-Joo Na A Comprehensive Empirical Study of Query
Performance Across GPU DBMSes . . . . . 4:1--4:29
Loqman Salamatian and
Scott Anderson and
Joshua Matthews and
Paul Barford and
Walter Willinger and
Mark Crovella Curvature-based Analysis of Network
Connectivity in Private Backbone
Infrastructures . . . . . . . . . . . . 5:1--5:32
Sachin Ashok and
Shubham Tiwari and
Nagarajan Natarajan and
Venkata N. Padmanabhan and
Sundararajan Sellamanickam Data-Driven Network Path Simulation with
iBox . . . . . . . . . . . . . . . . . . 6:1--6:26
Soheil Khadirsharbiyani and
Jagadish Kotra and
Karthik Rao and
Mahmut Kandemir Data Convection: a GPU-Driven Case Study
for Thermal-Aware Data Placement in $3$D
DRAMs . . . . . . . . . . . . . . . . . 7:1--7:25
Xingyu Zhou Differentially Private Reinforcement
Learning with Linear Function
Approximation . . . . . . . . . . . . . 8:1--8:27
Yuwei Luo and
Varun Gupta and
Mladen Kolar Dynamic Regret Minimization for Control
of Non-stationary Linear Dynamical
Systems . . . . . . . . . . . . . . . . 9:1--9:72
Sandeepa Bhuyan and
Shulin Zhao and
Ziyu Ying and
Mahmut T. Kandemir and
Chita R. Das End-to-end Characterization of Game
Streaming Applications on Mobile
Platforms . . . . . . . . . . . . . . . 10:1--10:25
Ranvir Rana and
Sreeram Kannan and
David Tse and
Pramod Viswanath Free2Shard: Adversary-resistant
Distributed Resource Allocation for
Blockchains . . . . . . . . . . . . . . 11:1--11:38
Yaxiong Xie and
Kyle Jamieson NG-Scope: Fine-Grained Telemetry for
NextG Cellular Networks . . . . . . . . 12:1--12:26
Sebastian Allmeier and
Nicolas Gast Mean Field and Refined Mean Field
Approximations for Heterogeneous
Systems: It Works! . . . . . . . . . . . 13:1--13:43
Jihyun Ryoo and
Mahmut Taylan Kandemir and
Mustafa Karakoy Memory Space Recycling . . . . . . . . . 14:1--14:24
Dongwei Xiao and
Zhibo LIU and
Yuanyuan Yuan and
Qi Pang and
Shuai Wang Metamorphic Testing of Deep Learning
Compilers . . . . . . . . . . . . . . . 15:1--15:28
Sina Darabi and
Negin Mahani and
Hazhir Baxishi and
Ehsan Yousefzadeh-Asl-Miandoab and
Mohammad Sadrosadati and
Hamid Sarbazi-Azad NURA: a Framework for Supporting
Non-Uniform Resource Accesses in GPUs 16:1--16:27
Weici Pan and
Guanya Shi and
Yiheng Lin and
Adam Wierman Online Optimization with Feedback Delay
and Nonlinear Switching Cost . . . . . . 17:1--17:34
Tongxin Li and
Ruixiao Yang and
Guannan Qu and
Guanya Shi and
Chenkai Yu and
Adam Wierman and
Steven Low Robustness and Consistency in Linear
Quadratic Control with Untrusted
Predictions . . . . . . . . . . . . . . 18:1--18:35
Zaiwei Chen and
Shancong Mou and
Siva Theja Maguluri Stationary Behavior of Constant Stepsize
SGD Type Algorithms: an Asymptotic
Characterization . . . . . . . . . . . . 19:1--19:24
Yueyang Pan and
Ruihan Li and
Chenren Xu The First 5G-LTE Comparative Study in
Extreme Mobility . . . . . . . . . . . . 20:1--20:22
Christina Giannoula and
Ivan Fernandez and
Juan Gómez Luna and
Nectarios Koziris and
Georgios Goumas and
Onur Mutlu SparseP: Towards Efficient Sparse Matrix
Vector Multiplication on Real
Processing-In-Memory Architectures . . . 21:1--21:49
Minhu Wang and
Mingwei Xu and
Jianping Wu Understanding I/O Direct Cache Access
Performance for End Host Networking . . 22:1--22:37
Wei Liu and
Xinlei Yang and
Hao Lin and
Zhenhua Li and
Feng Qian Fusing Speed Index during Web Page
Loading . . . . . . . . . . . . . . . . 23:1--23:23
Niklas Carlsson and
Edith Cohen and
Philippe Robert POMACS V6, N2, June 2022 Editorial . . . 24:1--24:??
Lingda Li and
Santosh Pandey and
Thomas Flynn and
Hang Liu and
Noel Wheeler and
Adolfy Hoisie SimNet: Accurate and High-Performance
Computer Architecture Simulation using
Deep Learning . . . . . . . . . . . . . 25:1--25:??
Ashraf Mahgoub and
Edgardo Barsallo Yi and
Karthick Shankar and
Eshaan Minocha and
Sameh Elnikety and
Saurabh Bagchi and
Somali Chaterji WISEFUSE: Workload Characterization and
DAG Transformation for Serverless
Workflows . . . . . . . . . . . . . . . 26:1--26:??
Matthew Faw and
Orestis Papadigenopoulos and
Constantine Caramanis and
Sanjay Shakkottai Learning To Maximize Welfare with a
Reusable Resource . . . . . . . . . . . 27:1--27:??
Pengfei Li and
Jianyi Yang and
Shaolei Ren Expert-Calibrated Learning for Online
Optimization with Switching Costs . . . 28:1--28:??
Gyeongsik Yang and
Changyong Shin and
Jeunghwan Lee and
Yeonho Yoo and
Chuck Yoo Prediction of the Resource Consumption
of Distributed Deep Learning Systems . . 29:1--29:??
Mohammadamin Ajdari and
Patrick Raaf and
Mostafa Kishani and
Reza Salkhordeh and
Hossein Asadi and
André Brinkmann An Enterprise-Grade Open-Source Data
Reduction Architecture for All-Flash
Storage Systems . . . . . . . . . . . . 30:1--30:??
Anne Bouillard and
Paul Nikolaus and
Jens Schmitt Unleashing the Power of Paying
Multiplexing Only Once in Stochastic
Network Calculus . . . . . . . . . . . . 31:1--31:??
Albert Senen-Cerda and
Jaron Sanders Asymptotic Convergence Rate of Dropout
on Shallow Linear Neural Networks . . . 32:1--32:??
Yunming Xiao and
Matteo Varvello and
Aleksandar Kuzmanovic Monetizing Spare Bandwidth: The Case of
Distributed VPNs . . . . . . . . . . . . 33:1--33:??
Lin Yang and
Yu-Zhen Janice Chen and
Mohammad H. Hajiesmaili and
Mark Herbster and
Don Towsley Hierarchical Learning Algorithms for
Multi-scale Expert Problems . . . . . . 34:1--34:??
Haris Bin Zia and
Aravindh Raman and
Ignacio Castro and
Ishaku Hassan Anaobi and
Emiliano De Cristofaro and
Nishanth Sastry and
Gareth Tyson Toxicity in the Decentralized Web and
the Potential for Model Sharing . . . . 35:1--35:??
Qiulin Lin and
Yanfang Mo and
Junyan Su and
Minghua Chen Competitive Online Optimization with
Multiple Inventories: a
Divide-and-Conquer Approach . . . . . . 36:1--36:??
Chenxingyu Zhao and
Tapan Chugh and
Jaehong Min and
Ming Liu and
Arvind Krishnamurthy Dremel: Adaptive Configuration Tuning of
RocksDB KV-Store . . . . . . . . . . . . 37:1--37:??
Shivang Aggarwal and
Srisai Karthik Neelamraju and
Ajit Bhat and
Dimitrios Koutsonikolas A Detailed Look at MIMO Performance in
60 GHz WLANs . . . . . . . . . . . . . . 38:1--38:??
Christina Lee Yu and
Xumei Xi Tensor Completion with Nearly Linear
Samples Given Weak Side Information . . 39:1--39:??
Liu Wang and
Haoyu Wang and
Ren He and
Ran Tao and
Guozhu Meng and
Xiapu Luo and
Xuanzhe Liu MalRadar: Demystifying Android Malware
in the New Era . . . . . . . . . . . . . 40:1--40:??
Sheng-Chun Kao and
Hyoukjun Kwon and
Michael Pellauer and
Angshuman Parashar and
Tushar Krishna A Formalism of DNN Accelerator
Flexibility . . . . . . . . . . . . . . 41:1--41:??
Konstantin Avrachenkov and
Phillipa Gill and
Bhuvan Urgaonkar POMACS V6, N3 December 2022 Editorial 42:1--42:??
Kailong Wang and
Yuxi Ling and
Yanjun Zhang and
Zhou Yu and
Haoyu Wang and
Guangdong Bai and
Beng Chin Ooi and
Jin Song Dong Characterizing Cryptocurrency-themed
Malicious Browser Extensions . . . . . . 43:1--43:??
Prashanthi S. K and
Sai Anuroop Kesanapalli and
Yogesh Simmhan Characterizing the Performance of
Accelerated Jetson Edge Devices for
Training Deep Learning Models . . . . . 44:1--44:??
Mozhengfu Liu and
Xueyan Tang Dynamic Bin Packing with Predictions . . 45:1--45:??
Tareq Si Salem and
Georgios Iosifidis and
Giovanni Neglia Enabling Long-term Fairness in Dynamic
Resource Allocation . . . . . . . . . . 46:1--46:??
Yunzhuo Liu and
Bo Jiang and
Tian Guo and
Zimeng Huang and
Wenhao Ma and
Xinbing Wang and
Chenghu Zhou FuncPipe: a Pipelined Serverless
Framework for Fast and Cost-Efficient
Training of Deep Learning Models . . . . 47:1--47:??
Naram Mhaisen and
Abhishek Sinha and
Georgios Paschos and
George Iosifidis Optimistic No-regret Algorithms for
Discrete Caching . . . . . . . . . . . . 48:1--48:??
Daniele De Sensi and
Tiziano De Matteis and
Konstantin Taranov and
Salvatore Di Girolamo and
Tobias Rahn and
Torsten Hoefler Noise in the Clouds: Influence of
Network Performance Variability on
Application Scalability . . . . . . . . 49:1--49:??
Benny Van Houdt On the Stochastic and Asymptotic
Improvement of First-Come First-Served
and Nudge Scheduling . . . . . . . . . . 50:1--50:??
Isaac Grosof and
Ziv Scully and
Mor Harchol-Balter and
Alan Scheller-Wolf Optimal Scheduling in the
Multiserver-job Model under Heavy
Traffic . . . . . . . . . . . . . . . . 51:1--51:??
Yilin Liu and
Shijia Zhang and
Mahanth Gowda and
Srihari Nelakuditi Leveraging the Properties of mmWave
Signals for $3$D Finger Motion Tracking
for Interactive IoT Applications . . . . 52:1--52:??
Daniel Vial and
Sanjay Shakkottai and
R. Srikant Robust Multi-Agent Bandits Over
Undirected Graphs . . . . . . . . . . . 53:1--53:??
Shuang Cui and
Kai Han and
Jing Tang and
He Huang and
Xueying Li and
Zhiyu Li Streaming Algorithms for Constrained
Submodular Maximization . . . . . . . . 54:1--54:??
Igor Kadota and
Dror Jacoby and
Hagit Messer and
Gil Zussman and
Jonatan Ostrometzky Switching in the Rain: Predictive
Wireless x-haul Network Reconfiguration 55:1--55:??
Jalani K. Williams and
Mor Harchol-Balter and
Weina Wang The M/M/$k$ with Deterministic Setup
Times . . . . . . . . . . . . . . . . . 56:1--56:??
Bo Sun and
Lin Yang and
Mohammad Hajiesmaili and
Adam Wierman and
John C. S. Lui and
Don Towsley and
Danny H. K. Tsang The Online Knapsack Problem with
Departures . . . . . . . . . . . . . . . 57:1--57:??
Xinzhe Fu and
Eytan Modiano Joint Learning and Control in Stochastic
Queueing Networks with Unknown Utilities 58:1--58:??
Ali Hossein Abbasi Abyaneh and
Maizi Liao and
Seyed Majid Zahedi Malcolm: Multi-agent Learning for
Cooperative Load Management at Rack
Scale . . . . . . . . . . . . . . . . . 59:1--59:??
Konstantin Avrachenkov and
Phillipa Gill and
Bhuvan Urgaonkar POMACS V7, N1, March 2023 Editorial . . 1:1--1:??
Vamsi Addanki and
Chen Avin and
Stefan Schmid Mars: Near-Optimal Throughput with
Shallow Buffers in Reconfigurable
Datacenter Networks . . . . . . . . . . 2:1--2:??
Wangkai Jin and
Xiangjun Peng SLITS: Sparsity-Lightened Intelligent
Thread Scheduling . . . . . . . . . . . 3:1--3:??
Rashna Kumar and
Sana Asif and
Elise Lee and
Fabian E. Bustamante Each at its Own Pace: Third-Party
Dependency and Centralization Around the
World . . . . . . . . . . . . . . . . . 4:1--4:??
Fengjiao Li and
Xingyu Zhou and
Bo Ji (Private) Kernelized Bandits with
Distributed Biased Feedback . . . . . . 5:1--5:??
Canhui Chen and
Zhixuan Fang Gacha Game Analysis and Design . . . . . 6:1--6:??
Marco Chiesa and
Fábio L. Verdi Network Monitoring on Multi-Pipe
Switches . . . . . . . . . . . . . . . . 8:1--8:??
Mingming Zhang and
Xiang Li and
Baojun Liu and
Jianyu Lu and
Yiming Zhang and
Jianjun Chen and
Haixin Duan and
Shuang Hao and
Xiaofeng Zheng Detecting and Measuring Security Risks
of Hosting-Based Dangling Domains . . . 9:1--9:??
Itamar Gozlan and
Chen Avin and
Gil Einziger and
Gabriel Scalosub Go-to-Controller is Better: Efficient
and Optimal LPM Caching with Splicing 10:1--10:??
Daan Rutten and
Nicolas Christianson and
Debankur Mukherjee and
Adam Wierman Smoothed Online Optimization with
Unreliable Predictions . . . . . . . . . 12:1--12:??
Yizhou Zhang and
Guannan Qu and
Pan Xu and
Yiheng Lin and
Zaiwei Chen and
Adam Wierman Global Convergence of Localized Policy
Iteration in Networked Multi-Agent
Reinforcement Learning . . . . . . . . . 13:1--13:??
Usama Naseer and
Theophilus A. Benson JS Capsules: a Framework for Capturing
Fine-grained JavaScript Memory
Measurements for the Mobile Web . . . . 14:1--14:??
Wenzhe Zhu and
Yongkun Li and
Erci Xu and
Fei Li and
Yinlong Xu and
John C. S. Lui DiffForward: On Balancing Forwarding
Traffic for Modern Cloud Block Services
via Differentiated Forwarding . . . . . 15:1--15:??
Christina Giannoula and
Kailong Huang and
Jonathan Tang and
Nectarios Koziris and
Georgios Goumas and
Zeshan Chishti and
Nandita Vijaykumar DaeMon: Architectural Support for
Efficient Data Movement in Fully
Disaggregated Systems . . . . . . . . . 16:1--16:??
Haoran Lu and
Qingchuan Zhao and
Yongliang Chen and
Xiaojing Liao and
Zhiqiang Lin Detecting and Measuring Aggressive
Location Harvesting in Mobile Apps via
Data-flow Path Embedding . . . . . . . . 18:1--18:??
Kyle MacMillan and
Tarun Mangla and
James Saxon and
Nicole P. Marwell and
Nick Feamster A Comparative Analysis of Ookla
Speedtest and Measurement Labs Network
Diagnostic Test (NDT7) . . . . . . . . . 19:1--19:??
Johannes Zerwas and
Csaba Györgyi and
Andreas Blenk and
Stefan Schmid and
Chen Avin Duo: a High-Throughput Reconfigurable
Datacenter Network Using Local Routing
and Control . . . . . . . . . . . . . . 20:1--20:??
Amanda Hsu and
Frank Li and
Paul Pearce Fiat Lux: Illuminating IPv6
Apportionment with Different Datasets 21:1--21:??
Alexander Goldberg and
Giulia Fanti and
Nihar B. Shah Batching of Tasks by Users of
Pseudonymous Forums: Anonymity
Compromise and Protection . . . . . . . 22:1--22:??
Sebastian Allmeier and
Nicolas Gast Bias and Refinement of Multiscale Mean
Field Models . . . . . . . . . . . . . . 23:1--23:??
Serkut Ayvasik and
Fidan Mehmeti and
Edwin Babaians and
Wolfgang Kellerer PEACH: Proactive and Environment-Aware
Channel State Information Prediction
with Depth Images . . . . . . . . . . . 24:1--24:??
Ruofeng Liu and
Nakjung Choi A First Look at Wi-Fi 6 in Action:
Throughput, Latency, Energy Efficiency,
and Security . . . . . . . . . . . . . . 25:1--25:??
Jing Yu and
Dimitar Ho and
Adam Wierman Online Adversarial Stabilization of
Unknown Networked Systems . . . . . . . 26:1--26:??
Hongyuan Liu and
Sreepathi Pai and
Adwait Jog Asynchronous Automata Processing on GPUs 27:1--27:??
Konstantin Avrachenkov and
Phillipa Gill and
Bhuvan Urgaonkar POMACS V7, N2, June 2023 Editorial . . . 28:1--28:??
Tyler Sam and
Yudong Chen and
Christina Lee Yu Overcoming the Long Horizon Barrier for
Sample-Efficient Reinforcement Learning
with Latent Low-Rank Structure . . . . . 29:1--29:??
Adithya Kumar and
Anand Sivasubramaniam and
Timothy Zhu SplitRPC: a Control + Data Path
Splitting RPC Stack for ML Inference
Serving . . . . . . . . . . . . . . . . 30:1--30:??
Ding Zhang and
Panneer Selvam Santhalingam and
Parth Pathak and
Zizhan Zheng CoBF: Coordinated Beamforming in Dense
mmWave Networks . . . . . . . . . . . . 31:1--31:??
Weizhao Tang and
Lucianna Kiffer and
Giulia Fanti and
Ari Juels Strategic Latency Reduction in
Blockchain Peer-to-Peer Networks . . . . 32:1--32:??
Yi Liu and
Shouqian Shi and
Minghao Xie and
Heiner Litz and
Chen Qian Smash: Flexible, Fast, and
Resource-efficient Placement and Lookup
of Distributed Storage . . . . . . . . . 33:1--33:??
Haibo Wang and
Dimitrios Melissourgos and
Chaoyi Ma and
Shigang Chen Real-time Spread Burst Detection in Data
Streaming . . . . . . . . . . . . . . . 35:1--35:??
Jiaxin Lin and
Tao Ji and
Xiangpeng Hao and
Hokeun Cha and
Yanfang Le and
Xiangyao Yu and
Aditya Akella Towards Accelerating Data Intensive
Application's Shuffle Process Using
SmartNICs . . . . . . . . . . . . . . . 36:1--36:??
Hasan Al Maruf and
Yuhong Zhong and
Hongyi Wang and
Mosharaf Chowdhury and
Asaf Cidon and
Carl Waldspurger Memtrade: Marketplace for Disaggregated
Memory Clouds . . . . . . . . . . . . . 41:1--41:??
Florin Ciucu and
Giulia Fanti and
Rhonda Righter POMACS V7, N3, December 2023 Editorial 42:1--42:??
Mohammad Bakhshalipour and
Phillip B. Gibbons Agents of Autonomy: a Systematic Study
of Robotics on Modern Hardware . . . . . 43:1--43:??
Andrea Monterubbiano and
Jonatan Langlet and
Stefan Walzer and
Gianni Antichi and
Pedro Reviriego and
Salvatore Pontarelli Lightweight Acquisition and Ranging of
Flows in the Data Plane . . . . . . . . 44:1--44:??
Adam Lechowicz and
Nicolas Christianson and
Jinhang Zuo and
Noman Bashir and
Mohammad Hajiesmaili and
Adam Wierman and
Prashant Shenoy The Online Pause and Resume Problem:
Optimal Algorithms and An Application to
Carbon-Aware Load Shifting . . . . . . . 45:1--45:??
Alagappan Ramanathan and
Sangeetha Abdu Jyothi Nautilus: a Framework for Cross-Layer
Cartography of Submarine Cables and IP
Links . . . . . . . . . . . . . . . . . 46:1--46:??
Esteban Carisimo and
Caleb J. Wang and
Mia Weaver and
Fabián E. Bustamante and
Paul Barford A Hop Away from Everywhere: a View of
the Intercontinental Long-haul
Infrastructure . . . . . . . . . . . . . 47:1--47:??
Yige Hong and
Qiaomin Xie and
Weina Wang Near-Optimal Stochastic Bin-Packing in
Large Service Systems with Time-Varying
Item Sizes . . . . . . . . . . . . . . . 48:1--48:??
Peter Cai and
Martin Karsten Kernel vs. User-Level Networking: Don't
Throw Out the Stack with the Interrupts 49:1--49:??
Christos Tsanikidis and
Javad Ghaderi Near-Optimal Packet Scheduling in
Multihop Networks with End-to-End
Deadline Constraints . . . . . . . . . . 50:1--50:??
Jintao Huang and
Ningyu He and
Kai Ma and
Jiang Xiao and
Haoyu Wang Miracle or Mirage? A Measurement Study
of NFT Rug Pulls . . . . . . . . . . . . 51:1--51:??
Kai Li and
Shixuan Guan and
Darren Lee Towards Understanding and Characterizing
the Arbitrage Bot Scam In the Wild . . . 52:1--52:??
Simon Lindståhl and
Alexandre Proutiere and
Andreas Johnsson Change Point Detection with Adaptive
Measurement Schedules for Network
Performance Verification . . . . . . . . 53:1--53:??
Yicheng Pan and
Yang Zhang and
Tingzhu Bi and
Linlin Han and
Yu Zhang and
Meng Ma and
Xiangzhuang Shen and
Xinrui Jiang and
Feng Wang and
Xian Liu and
Ping Wang HEAL: Performance Troubleshooting Deep
inside Data Center Hosts . . . . . . . . 54:1--54:??
Minzhao Lyu and
Rahul Dev Tripathi and
Vijay Sivaraman MetaVRadar: Measuring Metaverse Virtual
Reality Network Activity . . . . . . . . 55:1--55:??
Stella Bitchebe and
Yves Kone and
Pierre Olivier and
Jalil Boukhobza and
Yérom-David Bromberg and
Daniel Hagimont and
Alain Tchana GuaNary: Efficient Buffer Overflow
Detection In Virtualized Clouds Using
Intel EPT-based Sub-Page Write
Protection Support . . . . . . . . . . . 56:1--56:??
Walid A. Hanafy and
Qianlin Liang and
Noman Bashir and
David Irwin and
Prashant Shenoy CarbonScaler: Leveraging Cloud Workload
Elasticity for Optimizing
Carbon-Efficiency . . . . . . . . . . . 57:1--57:??
Yudi Huang and
Yilei Lin and
Ting He Optimized Cross-Path Attacks via
Adversarial Reconnaissance . . . . . . . 58:1--58:??
Euijin Choo and
Mohamed Nabeel and
Doowon Kim and
Ravindu De Silva and
Ting Yu and
Issa Khalil A Large Scale Study and Classification
of VirusTotal Reports on Phishing and
Malware URLs . . . . . . . . . . . . . . 59:1--59:??
Jiayu Pan and
Yin Sun and
Ness B. Shroff Sampling for Remote Estimation of the
Wiener Process over an Unreliable
Channel . . . . . . . . . . . . . . . . 60:1--60:??
Avi Mizrahi and
Daniella Bar-Lev and
Eitan Yaakobi and
Ori Rottenstreich Invertible Bloom Lookup Tables with
Listing Guarantees . . . . . . . . . . . 61:1--61:??
Venkatraman Iyer and
Sungho Lee and
Semun Lee and
Juitem Joonwoo Kim and
Hyunjun Kim and
Youngjae Shin Automated Backend Allocation for
Multi-Model, On-Device AI Inference . . 62:1--62:??
Florin Ciucu and
Giulia Fanti and
Rhonda Righter POMACS V8, N1, March 2024 Editorial . . 1:1--1:??
Rohan Basu Roy and
Devesh Tiwari StarShip: Mitigating I/O Bottlenecks in
Serverless Computing for Scientific
Workflows . . . . . . . . . . . . . . . 2:1--2:??
Radu Anghel and
Yury Zhauniarovich and
Carlos Gañán Who's Got My Back? Measuring the
Adoption of an Internet-wide BGP RTBH
Service . . . . . . . . . . . . . . . . 3:1--3:??
Jianyi Yang and
Pengfei Li and
Mohammad Jaminur Islam and
Shaolei Ren Online Allocation with Replenishable
Budgets: Worst Case and Beyond . . . . . 4:1--4:??
Gilbert Jonatan and
Haeyoon Cho and
Hyojun Son and
Xiangyu Wu and
Neal Livesay and
Evelio Mora and
Kaustubh Shivdikar and
José L. Abellán and
Ajay Joshi and
David Kaeli and
John Kim Scalability Limitations of
Processing-in-Memory using Real System
Evaluations . . . . . . . . . . . . . . 5:1--5:??
Huaifeng Zhang and
Mohannad Alhanahnah and
Fahmi Abdulqadir Ahmed and
Dyako Fatih and
Philipp Leitner and
Ahmed Ali-Eldin Machine Learning Systems are Bloated and
Vulnerable . . . . . . . . . . . . . . . 6:1--6:??
Chi-Jen (Roger) Lo and
Mahesh K. Marina and
Nishanth Sastry and
Kai Xu and
Saeed Fadaei and
Yong Li Shrinking VOD Traffic via Rényi--Entropic
Optimal Transport . . . . . . . . . . . 7:1--7:??
Scott Cheng and
Jun-Liang Lin and
Murali Emani and
Siddhisanket Raskar and
Sam Foreman and
Zhen Xie and
Venkatram Vishwanath and
Mahmut Taylan Kandemir Thorough Characterization and Analysis
of Large Transformer Model Training
At-Scale . . . . . . . . . . . . . . . . 8:1--8:??
Runhan Xie and
Isaac Grosof and
Ziv Scully Heavy-Traffic Optimal Size- and
State-Aware Dispatching . . . . . . . . 9:1--9:??
Neil Ortiz and
Alvaro A. Cardenas and
Avishai Wool SCADA World: an Exploration of the
Diversity in Power Grid Networks . . . . 10:1--10:??
Xi Jiang and
Shinan Liu and
Aaron Gember-Jacobson and
Arjun Nitin Bhagoji and
Paul Schmitt and
Francesco Bronzino and
Nick Feamster NetDiffusion: Network Data Augmentation
Through Protocol-Constrained Traffic
Generation . . . . . . . . . . . . . . . 11:1--11:??
Negar Akbarzadeh and
Sina Darabi and
Atiyeh Gheibi-Fetrat and
Amir Mirzaei and
Mohammad Sadrosadati and
Hamid Sarbazi-Azad H$3$DM: a High-bandwidth High-capacity
Hybrid $3$D Memory Design for GPUs . . . 12:1--12:??
Liz Izhikevich and
Manda Tran and
Katherine Izhikevich and
Gautam Akiwate and
Zakir Durumeric Democratizing LEO Satellite Network
Measurement . . . . . . . . . . . . . . 13:1--13:??
Nicolas Gast and
Benny Van Houdt Approximations to Study the Impact of
the Service Discipline in Systems with
Redundancy . . . . . . . . . . . . . . . 14:1--14:??
Giovane C. M. Moura and
Marco Davids and
Caspar Schutijser and
Cristian Hesselman and
John Heidemann and
Georgios Smaragdakis Deep Dive into NTP Pool's Popularity and
Mapping . . . . . . . . . . . . . . . . 15:1--15:??
Alagappan Ramanathan and
Rishika Sankaran and
Sangeetha Abdu Jyothi Xaminer: an Internet Cross-Layer
Resilience Analysis Tool . . . . . . . . 16:1--16:??
Fatih Aslan and
George Iosifidis and
Jose A. Ayala-Romero and
Andres Garcia-Saavedra and
Xavier Costa-Perez Fair Resource Allocation in Virtualized
O-RAN Platforms . . . . . . . . . . . . 17:1--17:??
Florin Ciucu and
Giulia Fanti and
Rhonda Righter POMACS V8, N2, June 2024 Editorial . . . 18:1--18:??
Lingdong Wang and
Simran Singh and
Jacob Chakareski and
Mohammad Hajiesmaili and
Ramesh K. Sitaraman BONES: Near-Optimal Neural-Enhanced
Video Streaming . . . . . . . . . . . . 19:1--19:??
Ruizhe Shi and
Ruizhi Cheng and
Bo Han and
Yue Cheng and
Songqing Chen A Closer Look into IPFS: Accessibility,
Content, and Performance . . . . . . . . 20:1--20:??
Kahlil Dozier and
Loqman Salamatian and
Dan Rubenstein Analysis of False Negative Rates for
Recycling Bloom Filters (Yes, They
Happen!) . . . . . . . . . . . . . . . . 21:1--21:??
Tianyue Chu and
Nikolaos Laoutaris FedQV: Leveraging Quadratic Voting in
Federated Learning . . . . . . . . . . . 22:1--22:??
Qingsong Liu and
Zhixuan Fang Learning the Optimal Control for
Evolving Systems with Converging
Dynamics . . . . . . . . . . . . . . . . 23:1--23:??
Ellen Cardinaels and
Sem Borst and
Johan S. H. van Leeuwaarden Multi-dimensional State Space Collapse
in Non-complete Resource Pooling
Scenarios . . . . . . . . . . . . . . . 24:1--24:??
Yiguang Zhang and
Reetahan Mukhopadhyay and
Augustin Chaintreau Network Fairness Ambivalence: When does
social network capital mitigate or
amplify unfairness? . . . . . . . . . . 25:1--25:??
Diego Goldsztajn and
Sem C. Borst and
Johan S. H. van Leeuwaarden Server Saturation in Skewed Networks . . 26:1--26:??
George Yu and
Ziv Scully Strongly Tail-Optimal Scheduling in the
Light-Tailed M/G/1 . . . . . . . . . . . 27:1--27:??
Santosh Pandey and
Amir Yazdanbakhsh and
Hang Liu TAO: Re-Thinking DL-based
Microarchitecture Simulation . . . . . . 28:1--28:??