Issue Downloads
POMACS V8, N3, December 2024 Editorial
The Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS) focuses on the measurement and performance evaluation of computer systems and operates in close collaboration with the ACM Special Interest Group SIGMETRICS. All papers ...
A Global Perspective on the Past, Present, and Future of Video Streaming over Starlink
This study presents the first global analysis of on-demand video streaming over Low Earth Orbit (LEO) satellite networks, using data from over one million households across 85 countries. We highlight Starlink's role as a major LEO provider, enhancing ...
Adversarial Network Optimization under Bandit Feedback: Maximizing Utility in Non-Stationary Multi-Hop Networks
Stochastic Network Optimization (SNO) concerns scheduling in stochastic queueing systems and has been widely studied in network theory. Classical SNO algorithms require network conditions to be stationary w.r.t. time, which fails to capture the non-...
Beaver: A High-Performance and Crash-Consistent File System Cache via PM-DRAM Collaborative Memory Tiering
The in-memory cache layer is crucial in building a file system. Crash-consistency is highly desirable for applications running on the file system, ensuring that data is written in an all-or-none fashion during unexpected system failures or crashes. ...
Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
The thriving mobile app ecosystem encompasses a wide range of functionalities. However, within this ecosystem, a subset of apps provides illicit services such as gambling and pornography to pursue economic gains, collectively referred to as "underground ...
Beyond Data Points: Regionalizing Crowdsourced Latency Measurements
Despite significant investments in access network infrastructure, universal access to high-quality Internet connectivity remains a challenge. Policymakers often rely on large-scale, crowdsourced measurement datasets to assess the distribution of access ...
Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX
Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the ...
INT-MC: Low-Overhead In-Band Network-Wide Telemetry Based on Matrix Completion
In-band Network Telemetry (INT) enhances real-time, high-resolution network monitoring capabilities by incorporating fine-grained internal state information into packets. Utilizing INT for network-wide visualization can significantly bolster network ...
Learning-Augmented Decentralized Online Convex Optimization in Networks
This paper studies learning-augmented decentralized online convex optimization in a networked multi-agent system, a challenging setting that has remained under-explored. We first consider a linear learning-augmented decentralized online algorithm (LADO-...
Modeling and Simulating Rydberg Atom Quantum Computers for Hardware-Software Co-design with PachinQo
Quantum computing has the potential to accelerate various domains: scientific computation, machine learning, and optimization. Recently, Rydberg atom quantum computing has emerged as a promising quantum computing technology, especially with the ...
MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering
- Rui Wang,
- Xingkai Wang,
- Huanhuan Chen,
- Jérémie Decouchant,
- Stjepan Picek,
- Nikolaos Laoutaris,
- Kaitai Liang
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. ...
Optimal Aggregation via Overlay Trees: Delay-MSE Tradeoffs under Failures
Many applications, e.g., federated learning, require the aggregation of information across a large number of distributed nodes. In this paper, we explore efficient schemes to do this at scale leveraging aggregation at intermediate nodes across overlay ...
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
The Web3 ecosystem is increasingly evolving to multi-chain, with decentralized applications (dApps) distributing across different blockchains, which drives the need for cross-chain bridges for blockchain interoperability. However, it further opens new ...
PyGim : An Efficient Graph Neural Network Library for Real Processing-In-Memory Architectures
- Christina Giannoula,
- Peiming Yang,
- Ivan Fernandez,
- Jiacheng Yang,
- Sankeerth Durvasula,
- Yu Xin Li,
- Mohammad Sadrosadati,
- Juan Gomez Luna,
- Onur Mutlu,
- Gennady Pekhimenko
Graph Neural Networks (GNNs) are emerging models to analyze graph-structure data. GNN execution involves both compute-intensive and memory-intensive kernels. The latter kernels dominate execution time, because they are significantly bottlenecked by data ...
ScaleOPT: A Scalable Optimal Page Replacement Policy Simulator
This paper proposes a scalable optimal page replacement policy (OPT) simulator called ScaleOPT to scale the OPT simulation by leveraging multi-core parallelism. Specifically, we first propose AccessMap which collects the future references of pages in ...
The Power of Migrations in Dynamic Bin Packing
In the Dynamic Bin Packing problem, n items arrive and depart the system in an online manner, and the goal is to maintain a good packing throughout. We consider the objective of minimizing the total active time, i.e., the sum of the number of open bins ...
The Tale of Errors in Microservices
Microservice architecture is the computing paradigm of choice for large, service-oriented software catering to real-time requests. Individual programs in such a system perform Remote Procedure Calls (RPCs) to other microservices to accomplish sub-tasks. ...
Tight Bounds for Dynamic Bin Packing with Predictions
MinUsageTime DBP is a variant of the Dynamic Bin Packing (DBP) problem that seeks to minimize the accumulated length of time for which bins are used in packing a sequence of items. This DBP variant models job dispatching for optimizing the busy time of ...
Towards Understanding and Analyzing Instant Cryptocurrency Exchanges
In this paper, we examine a novel category of services in the blockchain ecosystem termed Instant Cryptocurrency Exchange (ICE) services. Originally conceived to facilitate cross-chain asset transfers, ICE services have, unfortunately, been abused for ...
Uncovering BGP Action Communities and Community Squatters in the Wild
- Brivaldo Alves da Silva,
- Adriano Bastos de Carvalho,
- Italo Cunha,
- Timur Friedman,
- Ethan Katz-Bassett,
- Ronaldo Alves Ferreira
The Border Gateway Protocol (BGP) offers several "knobs" to control routing decisions, but they are coarse-grained and only affect routes received from neighboring Autonomous Systems (AS). To enhance policy expressiveness, BGP was extended with the ...