[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 8, Issue 3December 2024POMACSCurrent Issue
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
EISSN:2476-1249
Reflects downloads up to 31 Dec 2024Bibliometrics
Skip Table Of Content Section
editorial
Free
POMACS V8, N3, December 2024 Editorial
Article No.: 29, Page 1https://doi.org/10.1145/3700411

The Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS) focuses on the measurement and performance evaluation of computer systems and operates in close collaboration with the ACM Special Interest Group SIGMETRICS. All papers ...

research-article
Open Access
A Global Perspective on the Past, Present, and Future of Video Streaming over Starlink
Article No.: 30, Pages 1–22https://doi.org/10.1145/3700412

This study presents the first global analysis of on-demand video streaming over Low Earth Orbit (LEO) satellite networks, using data from over one million households across 85 countries. We highlight Starlink's role as a major LEO provider, enhancing ...

research-article
Open Access
Adversarial Network Optimization under Bandit Feedback: Maximizing Utility in Non-Stationary Multi-Hop Networks
Article No.: 31, Pages 1–48https://doi.org/10.1145/3700413

Stochastic Network Optimization (SNO) concerns scheduling in stochastic queueing systems and has been widely studied in network theory. Classical SNO algorithms require network conditions to be stationary w.r.t. time, which fails to capture the non-...

research-article
Open Access
Beaver: A High-Performance and Crash-Consistent File System Cache via PM-DRAM Collaborative Memory Tiering
Article No.: 32, Pages 1–24https://doi.org/10.1145/3700414

The in-memory cache layer is crucial in building a file system. Crash-consistency is highly desirable for applications running on the file system, ensuring that data is written in an all-or-none fashion during unexpected system failures or crashes. ...

research-article
Free
Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram
Article No.: 33, Pages 1–25https://doi.org/10.1145/3700432

The thriving mobile app ecosystem encompasses a wide range of functionalities. However, within this ecosystem, a subset of apps provides illicit services such as gambling and pornography to pursue economic gains, collectively referred to as "underground ...

research-article
Open Access
Beyond Data Points: Regionalizing Crowdsourced Latency Measurements
Article No.: 34, Pages 1–24https://doi.org/10.1145/3700416

Despite significant investments in access network infrastructure, universal access to high-quality Internet connectivity remains a challenge. Policymakers often rely on large-scale, crowdsourced measurement datasets to assess the distribution of access ...

research-article
Open Access
Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX
Article No.: 36, Pages 1–42https://doi.org/10.1145/3700418

Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the ...

research-article
Free
INT-MC: Low-Overhead In-Band Network-Wide Telemetry Based on Matrix Completion
Article No.: 37, Pages 1–30https://doi.org/10.1145/3700433

In-band Network Telemetry (INT) enhances real-time, high-resolution network monitoring capabilities by incorporating fine-grained internal state information into packets. Utilizing INT for network-wide visualization can significantly bolster network ...

research-article
Open Access
Learning-Augmented Decentralized Online Convex Optimization in Networks
Article No.: 38, Pages 1–42https://doi.org/10.1145/3700420

This paper studies learning-augmented decentralized online convex optimization in a networked multi-agent system, a challenging setting that has remained under-explored. We first consider a linear learning-augmented decentralized online algorithm (LADO-...

research-article
Free
Modeling and Simulating Rydberg Atom Quantum Computers for Hardware-Software Co-design with PachinQo
Article No.: 39, Pages 1–25https://doi.org/10.1145/3700421

Quantum computing has the potential to accelerate various domains: scientific computation, machine learning, and optimization. Recently, Rydberg atom quantum computing has emerged as a promising quantum computing technology, especially with the ...

research-article
Open Access
MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering
Article No.: 40, Pages 1–41https://doi.org/10.1145/3700422

Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. ...

research-article
Open Access
Optimal Aggregation via Overlay Trees: Delay-MSE Tradeoffs under Failures
Article No.: 41, Pages 1–37https://doi.org/10.1145/3700423

Many applications, e.g., federated learning, require the aggregation of information across a large number of distributed nodes. In this paper, we explore efficient schemes to do this at scale leveraging aggregation at intermediate nodes across overlay ...

research-article
Free
Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks
Article No.: 42, Pages 1–27https://doi.org/10.1145/3700424

The Web3 ecosystem is increasingly evolving to multi-chain, with decentralized applications (dApps) distributing across different blockchains, which drives the need for cross-chain bridges for blockchain interoperability. However, it further opens new ...

research-article
Free
PyGim : An Efficient Graph Neural Network Library for Real Processing-In-Memory Architectures
Article No.: 43, Pages 1–36https://doi.org/10.1145/3700434

Graph Neural Networks (GNNs) are emerging models to analyze graph-structure data. GNN execution involves both compute-intensive and memory-intensive kernels. The latter kernels dominate execution time, because they are significantly bottlenecked by data ...

research-article
Open Access
ScaleOPT: A Scalable Optimal Page Replacement Policy Simulator
Article No.: 44, Pages 1–25https://doi.org/10.1145/3700426

This paper proposes a scalable optimal page replacement policy (OPT) simulator called ScaleOPT to scale the OPT simulation by leveraging multi-core parallelism. Specifically, we first propose AccessMap which collects the future references of pages in ...

research-article
Open Access
The Power of Migrations in Dynamic Bin Packing
Article No.: 45, Pages 1–28https://doi.org/10.1145/3700435

In the Dynamic Bin Packing problem, n items arrive and depart the system in an online manner, and the goal is to maintain a good packing throughout. We consider the objective of minimizing the total active time, i.e., the sum of the number of open bins ...

research-article
Open Access
The Tale of Errors in Microservices
Article No.: 46, Pages 1–36https://doi.org/10.1145/3700436

Microservice architecture is the computing paradigm of choice for large, service-oriented software catering to real-time requests. Individual programs in such a system perform Remote Procedure Calls (RPCs) to other microservices to accomplish sub-tasks. ...

research-article
Open Access
Tight Bounds for Dynamic Bin Packing with Predictions
Article No.: 47, Pages 1–28https://doi.org/10.1145/3700437

MinUsageTime DBP is a variant of the Dynamic Bin Packing (DBP) problem that seeks to minimize the accumulated length of time for which bins are used in packing a sequence of items. This DBP variant models job dispatching for optimizing the busy time of ...

research-article
Free
Towards Understanding and Analyzing Instant Cryptocurrency Exchanges
Article No.: 48, Pages 1–24https://doi.org/10.1145/3700430

In this paper, we examine a novel category of services in the blockchain ecosystem termed Instant Cryptocurrency Exchange (ICE) services. Originally conceived to facilitate cross-chain asset transfers, ICE services have, unfortunately, been abused for ...

research-article
Free
Uncovering BGP Action Communities and Community Squatters in the Wild
Article No.: 49, Pages 1–23https://doi.org/10.1145/3700431

The Border Gateway Protocol (BGP) offers several "knobs" to control routing decisions, but they are coarse-grained and only affect routes received from neighboring Autonomous Systems (AS). To enhance policy expressiveness, BGP was extended with the ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.