[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 5, Issue 2June 2021POMACS
Reflects downloads up to 15 Jan 2025Bibliometrics
Skip Table Of Content Section
editorial
Free
Editorial
Article No.: 13, Page 1https://doi.org/10.1145/3466793

The ACM Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS) focuses on the measurement and performance evaluation of computer systems and operates in close collaboration with the ACM Special Interest Group SIGMETRICS. All ...

research-article
A Measurement Study of Wechat Mini-Apps
Article No.: 14, Pages 1–25https://doi.org/10.1145/3460081

A new mobile computing paradigm, dubbed mini-app, has been growing rapidly over the past few years since being introduced by WeChat in 2017. In this paradigm, a host app allows its end-users to install and run mini-apps inside itself, enabling the host ...

research-article
Public Access
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software
Article No.: 15, Pages 1–25https://doi.org/10.1145/3460082

Safety compliance is paramount to the safe deployment of autonomous vehicle (AV) technologies in real-world transportation systems. As AVs will share road infrastructures with human drivers and pedestrians, it is an important requirement for AVs to obey ...

research-article
Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks
Article No.: 16, Pages 1–38https://doi.org/10.1145/3460083

In networks with a minority and a majority community, it is well-studied that minorities are under-represented at the top of the social hierarchy. However, researchers are less clear about the representation of minorities from the lower levels of the ...

research-article
Open Access
Information Aggregation for Constrained Online Control
Article No.: 18, Pages 1–35https://doi.org/10.1145/3460085

This paper considers an online control problem involving two controllers. A central controller chooses an action from a feasible set that is determined by time-varying and coupling constraints, which depend on all past actions and states. The central ...

research-article
Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing Systems
Article No.: 19, Pages 1–34https://doi.org/10.1145/3460086

Mean field models are a popular tool used to analyse load balancing policies. In some exceptional cases the waiting time distribution of the mean field limit has an explicit form. In other cases it can be computed as the solution of a set of ...

research-article
Public Access
Mix and Match: Reorganizing Tasks for Enhancing Data Locality
Article No.: 20, Pages 1–24https://doi.org/10.1145/3460087

Application programs that exhibit strong locality of reference lead to minimized cache misses and better performance in different architectures. However, to maximize the performance of multithreaded applications running on emerging manycore systems, ...

research-article
Open Access
Nudge: Stochastically Improving upon FCFS
Article No.: 21, Pages 1–29https://doi.org/10.1145/3460088

The First-Come First-Served (FCFS) scheduling policy is the most popular scheduling algorithm used in practice. Furthermore, its usage is theoretically validated: for light-tailed job size distributions, FCFS has weakly optimal asymptotic tail of ...

research-article
On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems
Article No.: 22, Pages 1–28https://doi.org/10.1145/3460089

The supermarket model is a popular load balancing model where each incoming job is assigned to a server with the least number of jobs among d randomly selected servers. Several authors have shown that the large scale limit in case of processor sharing ...

research-article
PredictRoute: A Network Path Prediction Toolkit
Article No.: 23, Pages 1–24https://doi.org/10.1145/3460090

Accurate prediction of network paths between arbitrary hosts on the Internet is of vital importance for network operators, cloud providers, and academic researchers. We present PredictRoute, a system that predicts network paths between hosts on the ...

research-article
Public Access
Real-time Approximate Routing for Smart Transit Systems
Article No.: 24, Pages 1–30https://doi.org/10.1145/3460091

We study real-time routing policies in smart transit systems, where the platform has a combination of cars and high-capacity vehicles (e.g., buses or shuttles) and seeks to serve a set of incoming trip requests. The platform can use its fleet of cars as ...

research-article
Refining Mean-field Approximations by Dynamic State Truncation
Article No.: 25, Pages 1–30https://doi.org/10.1145/3460092

Mean-field models are an established method to analyze large stochastic systems with N interacting objects by means of simple deterministic equations that are asymptotically correct when N tends to infinity. For finite N, mean-field equations provide an ...

research-article
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts
Article No.: 26, Pages 1–30https://doi.org/10.1145/3460093

Ponzi schemes are financial scams that lure users under the promise of high profits. With the prosperity of Bitcoin and blockchain technologies, there has been growing anecdotal evidence that this classic fraud has emerged in the blockchain ecosystem. ...

research-article
Open Access
The Power of D-hops in Matching Power-Law Graphs
Article No.: 27, Pages 1–43https://doi.org/10.1145/3460094

This paper studies seeded graph matching for power-law graphs. Assume that two edge-correlated graphs are independently edge-sampled from a common parent graph with a power-law degree distribution. A set of correctly matched vertex-pairs is chosen at ...

research-article
Public Access
Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices
Article No.: 28, Pages 1–28https://doi.org/10.1145/3460095

This work presents the first-ever detailed and large-scale measurement analysis of storage consumption behavior of applications (apps) on smart mobile devices. We start by carrying out a five-year longitudinal static analysis of millions of Android apps ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.