Table of contents for issues of Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)

Last update: Tue Aug 20 07:31:43 MDT 2024                Valid HTML 3.2!

Volume 1, Number 1, June, 2017
Volume 1, Number 2, December, 2017
Volume 2, Number 1, April, 2018
Volume 2, Number 2, June, 2018
Volume 2, Number 3, December, 2018
Volume 3, Number 1, March, 2019
Volume 3, Number 2, June, 2019
Volume 3, Number 3, December, 2019
Volume 4, Number 1, May, 2020
Volume 4, Number 2, June, 2020
Volume 4, Number 3, November, 2020
Volume 5, Number 1, February, 2021
Volume 5, Number 2, June, 2021
Volume 5, Number 3, December, 2021
Volume 6, Number 1, March, 2022
Volume 6, Number 2, June, 2022
Volume 6, Number 3, December, 2022
Volume 7, Number 1, March, 2023
Volume 7, Number 2, June, 2023
Volume 7, Number 3, December, 2023
Volume 8, Number 1, March, 2024
Volume 8, Number 2, June, 2024


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 1, Number 1, June, 2017

        Augustin Chaintreau and   
            Leana Golubchik and   
                   Zhi-Li Zhang   Editorial  . . . . . . . . . . . . . . . 1:1--1:??
            Mathias Gibbens and   
               Chris Gniady and   
                     Lei Ye and   
                 Beichuan Zhang   Hadoop on Named Data Networking:
                                  Experience and Results . . . . . . . . . 2:1--2:??
                  Long Gong and   
                  Paul Tune and   
                  Liang Liu and   
                   Sen Yang and   
                   Jun (Jim) Xu   Queue-Proportional Sampling: A Better
                                  Approach to Crossbar Scheduling for
                                  Input-Queued Switches  . . . . . . . . . 3:1--3:??
                 Alan Quach and   
              Zhongjie Wang and   
                    Zhiyun Qian   Investigation of the 2016 Linux TCP
                                  Stack Vulnerability at Scale . . . . . . 4:1--4:??
             Prateek Sharma and   
                David Irwin and   
                Prashant Shenoy   Portfolio-driven Resource Management for
                                  Transient Cloud Servers  . . . . . . . . 5:1--5:??
                     Yi Cao and   
               Javad Nejati and   
           Muhammad Wajahat and   
      Aruna Balasubramanian and   
                  Anshul Gandhi   Deconstructing the Energy Consumption of
                                  the Mobile Page Load . . . . . . . . . . 6:1--6:??
                   Xin Wang and   
           Richard T. B. Ma and   
                     Yinlong Xu   On Optimal Two-Sided Pricing of
                                  Congested Networks . . . . . . . . . . . 7:1--7:??
                Giuliano Casale   Accelerating Performance Inference over
                                  Closed Systems by Asymptotic Methods . . 8:1--8:??
                  Xiaoen Ju and   
               Hani Jamjoom and   
                   Kang G. Shin   Hieroglyph: Locally-Sufficient Graph
                                  Processing via Compute--Sync--Merge  . . 9:1--9:??
             Kevin K. Chang and   
 A. Giray Ya\ualikçi and   
              Saugata Ghose and   
             Aditya Agrawal and   
       Niladrish Chatterjee and   
           Abhijith Kashyap and   
               Donghyuk Lee and   
              Mike O'Connor and   
               Hasan Hassan and   
                     Onur Mutlu   Understanding Reduced-Voltage Operation
                                  in Modern DRAM Devices: Experimental
                                  Characterization, Analysis, and
                                  Mechanisms . . . . . . . . . . . . . . . 10:1--10:??
                 Cheng Wang and   
           Bhuvan Urgaonkar and   
             Neda Nasiriani and   
                 George Kesidis   Using Burstable Instances in the Public
                                  Cloud: Why, When and How?  . . . . . . . 11:1--11:??
                       Lei Ying   Stein's Method for Mean Field
                                  Approximations in Light and Heavy
                                  Traffic Regimes  . . . . . . . . . . . . 12:1--12:??
                Sinong Wang and   
                    Ness Shroff   Security Game with Non-additive
                                  Utilities and Multiple Attacker
                                  Resources  . . . . . . . . . . . . . . . 13:1--13:??
                  Lingda Li and   
                 Robel Geda and   
               Ari B. Hayes and   
                Yanhao Chen and   
           Pranav Chaudhari and   
              Eddy Z. Zhang and   
                  Mario Szegedy   A Simple Yet Effective Balanced Edge
                                  Partition Model for Parallel Computing   14:1--14:??
                   You Zhou and   
                  Yian Zhou and   
                   Min Chen and   
                   Shigang Chen   Persistent Spread Measurement for Big
                                  Network Data Based on Register
                                  Intersection . . . . . . . . . . . . . . 15:1--15:??
            Steffen Bondorf and   
              Paul Nikolaus and   
                Jens B. Schmitt   Quality and Cost of Deterministic
                                  Network Calculus: Design and Evaluation
                                  of an Accurate and Fast Analysis . . . . 16:1--16:??
                   Nicolas Gast   Expected Values Estimated via Mean-Field
                                  Approximation are $ 1 / N $-Accurate . . 17:1--17:??
               Brandon Wang and   
                  Xiaoye Li and   
       Leandro P. de Aguiar and   
         Daniel S. Menasche and   
                  Zubair Shafiq   Characterizing and Modeling Patching
                                  Practices of Industrial Control Systems  18:1--18:??
               David Formby and   
                Anwar Walid and   
                   Raheem Beyah   A Case Study in Power Substation Network
                                  Dynamics . . . . . . . . . . . . . . . . 19:1--19:??
             Hung T. Nguyen and   
              Tri P. Nguyen and   
                  Tam N. Vu and   
                  Thang N. Dinh   Outward Influence and Cascade Size
                                  Estimation in Billion-scale Networks . . 20:1--20:??
                 Wonil Choi and   
          Mohammad Arjomand and   
             Myoungsoo Jung and   
                Mahmut Kandemir   Exploiting Data Longevity for Enhancing
                                  the Lifetime of Flash-based Storage
                                  Class Memory . . . . . . . . . . . . . . 21:1--21:??
Shaileshh Bojja Venkatakrishnan and   
               Giulia Fanti and   
               Pramod Viswanath   Dandelion: Redesigning the Bitcoin
                                  Network for Anonymity  . . . . . . . . . 22:1--22:??
                Zijun Zhang and   
                Zongpeng Li and   
                       Chuan Wu   Optimal Posted Prices for Online Cloud
                                  Resource Allocation  . . . . . . . . . . 23:1--23:??
                    Wen Sun and   
            Veronique Simon and   
           Sebastien Monnet and   
            Philippe Robert and   
                    Pierre Sens   Analysis of a Stochastic Model of
                                  Replication in Large Distributed Storage
                                  Systems: A Mean-Field Approach . . . . . 24:1--24:??
         Debankur Mukherjee and   
               Souvik Dhara and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Optimal Service Elasticity in
                                  Large-Scale Distributed Systems  . . . . 25:1--25:??
               Donghyuk Lee and   
                Samira Khan and   
        Lavanya Subramanian and   
              Saugata Ghose and   
    Rachata Ausavarungnirun and   
         Gennady Pekhimenko and   
             Vivek Seshadri and   
                     Onur Mutlu   Design-Induced Latency Variation in
                                  Modern DRAM Chips: Characterization,
                                  Analysis, and Latency Reduction
                                  Mechanisms . . . . . . . . . . . . . . . 26:1--26:??
     Konstantin Avrachenkov and   
            Jasper Goseling and   
               Berksan Serbetci   A Low-Complexity Approach to Distributed
                                  Cooperative Caching with Geographic
                                  Constraints  . . . . . . . . . . . . . . 27:1--27:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 1, Number 2, December, 2017

                   Sen Yang and   
                   Bill Lin and   
                         Jun Xu   Safe Randomized Load-Balanced Switching
                                  By Diffusing Extra Loads . . . . . . . . 29:1--29:37
                   Sen Yang and   
                     Yan He and   
                   Zihui Ge and   
               Dongmei Wang and   
                         Jun Xu   Predictive Impact Analysis for Designing
                                  a Resilient Cellular Backhaul Network    30:1--30:33
          Muhammad J. Amjad and   
                  Devavrat Shah   Censored Demand Estimation in Retail . . 31:1--31:28
           Stefan Magureanu and   
        Alexandre Proutiere and   
            Marcus Isaksson and   
                    Boxun Zhang   Online Learning of Optimally Diverse
                                  Rankings . . . . . . . . . . . . . . . . 32:1--32:26
               Nicolas Gast and   
                Benny Van Houdt   A Refined Mean Field Approximation . . . 33:1--33:28
                Sinong Wang and   
                    Ness Shroff   Towards Fast-Convergence, Low-Delay and
                                  Low-Complexity Network Optimization  . . 34:1--34:32
       Konstantinos Psychas and   
                  Javad Ghaderi   On Non-Preemptive VM Scheduling in the
                                  Cloud  . . . . . . . . . . . . . . . . . 35:1--35:29
                   Lin Yang and   
            Wing Shing Wong and   
        Mohammad H. Hajiesmaili   An Optimal Randomized Online Algorithm
                                  for QoS Buffer Management  . . . . . . . 36:1--36:26
              Thinh T. Doan and   
            Carolyn L. Beck and   
                     R. Srikant   On the Convergence Rate of Distributed
                                  Gradient Methods for Finite-Sum
                                  Optimization under Communication Delays  37:1--37:27
              Reza Aghajani and   
                 Xingjie Li and   
                 Kavita Ramanan   The PDE Method for the Analysis of
                                  Randomized Load Balancing Networks . . . 38:1--38:28
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
                    Yin Sun and   
                    Ness Shroff   Designing Low-Complexity Heavy-Traffic
                                  Delay-Optimal Load Balancing Schemes:
                                  Theory to Algorithms . . . . . . . . . . 39:1--39:30
              Benjamin Berg and   
         Jan-Pieter Dorsman and   
             Mor Harchol-Balter   Towards Optimality in Parallel
                                  Scheduling . . . . . . . . . . . . . . . 40:1--40:30
              Thomas Bonald and   
        Céline Comte and   
                 Fabien Mathieu   Performance of Balanced Fairness in
                                  Resource Pools: a Recursive Approach . . 41:1--41:25
       Yvonne-Anne Pignolet and   
              Stefan Schmid and   
                  Gilles Tredan   Tomographic Node Placement Strategies
                                  and the Impact of the Routing Model  . . 42:1--42:23
             Tao B. Schardl and   
            Tyler Denniston and   
               Damon Doucet and   
        Bradley C. Kuszmaul and   
        I-Ting Angelina Lee and   
           Charles E. Leiserson   The CSI Framework for Compiler-Inserted
                                  Program Instrumentation  . . . . . . . . 43:1--43:25
                Yudong Chen and   
                    Lili Su and   
                     Jiaming Xu   Distributed Statistical Machine Learning
                                  in Adversarial Settings: Byzantine
                                  Gradient Descent . . . . . . . . . . . . 44:1--44:25
              Xiaomeng Chen and   
                 Jiayi Meng and   
              Y. Charlie Hu and   
               Maruti Gupta and   
           Ralph Hasholzner and   
Venkatesan Nallampatti Ekambaram and   
               Ashish Singh and   
    Srikathyayani Srikanteswara   A Fine-grained Event-based Modem Power
                                  Model for Enabling In-depth Modem Energy
                                  Drain Analysis . . . . . . . . . . . . . 45:1--45:28


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 1, April, 2018

             Shenglin Zhang and   
                   Ying Liu and   
                Weibin Meng and   
                Zhiling Luo and   
                  Jiahao Bu and   
                   Sen Yang and   
              Peixian Liang and   
                    Dan Pei and   
                     Jun Xu and   
                Yuzhi Zhang and   
                    Yu Chen and   
                   Hui Dong and   
                Xianping Qu and   
                       Lei Song   PreFix: Switch Failure Prediction in
                                  Datacenter Networks  . . . . . . . . . . 2:1--2:29
             Rupert Freeman and   
         Seyed Majid Zahedi and   
           Vincent Conitzer and   
                Benjamin C. Lee   Dynamic Proportional Sharing: a
                                  Game-Theoretic Approach  . . . . . . . . 3:1--3:36
                Alan Kuhnle and   
       Victoria G. Crawford and   
                     My T. Thai   Network Resilience and the
                                  Length-Bounded Multicut Problem:
                                  Reaching the Dynamic Billion-Scale with
                                  Guarantees . . . . . . . . . . . . . . . 4:1--4:26
                   Jian Tan and   
               Guocong Quan and   
                   Kaiyi Ji and   
                    Ness Shroff   On Resource Pooling and Separation for
                                  LRU Caching  . . . . . . . . . . . . . . 5:1--5:31
          Mohammad A. Islam and   
                Luting Yang and   
            Kiran Ranganath and   
                    Shaolei Ren   Why Some Like It Loud: Timing Power
                                  Attacks in Multi-tenant Data Centers
                                  Using an Acoustic Side Channel . . . . . 6:1--6:33
             Santiago Duran and   
              Ina Maria Verloop   Asymptotic Optimal Control of
                                  Markov-Modulated Restless Bandits  . . . 7:1--7:25
                Zhaowei Tan and   
                 Yuanjie Li and   
                  Qianru Li and   
               Zhehui Zhang and   
                  Zhehan Li and   
                      Songwu Lu   Supporting Mobile VR in LTE Networks:
                                  How Close Are We?  . . . . . . . . . . . 8:1--8:31
              Saba Ahmadian and   
                 Onur Mutlu and   
                  Hossein Asadi   ECI-Cache: a High-Endurance and
                                  Cost-Efficient I/O Caching Scheme for
                                  Virtualized Platforms  . . . . . . . . . 9:1--9:34
              Buchnik Eliav and   
                    Edith Cohen   Bootstrapped Graph Diffusions: Exposing
                                  the Power of Nonlinearity  . . . . . . . 10:1--10:19
              Qingkai Liang and   
                  Eytan Modiano   Minimizing Queue Length Regret Under
                                  Adversarial Network Models . . . . . . . 11:1--11:32
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Learning in Weakly Coupled Markov
                                  Decision Processes: a Convergence Time
                                  Study  . . . . . . . . . . . . . . . . . 12:1--12:38
                Donggyu Yun and   
        Alexandre Proutiere and   
               Sumyeong Ahn and   
                Jinwoo Shin and   
                        Yung Yi   Multi-armed Bandit with Additional
                                  Observations . . . . . . . . . . . . . . 13:1--13:22
         Debankur Mukherjee and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Asymptotically Optimal Load Balancing
                                  Topologies . . . . . . . . . . . . . . . 14:1--14:29
                Arjun Anand and   
             Gustavo de Veciana   A Whittle's Index Based Approach for QoE
                                  Optimization in Wireless Networks  . . . 15:1--15:39
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   SOAP: One Clean Analysis of All
                                  Age-Based Scheduling Policies  . . . . . 16:1--16:30
              Pengfei Zheng and   
                Benjamin C. Lee   Hound: Causal Learning for
                                  Datacenter-scale Straggler Diagnosis . . 17:1--17:36
                   Bo Jiang and   
              Philippe Nain and   
                Don Towsley and   
                    Saikat Guha   On a Class of Stochastic Multilayer
                                  Networks . . . . . . . . . . . . . . . . 18:1--18:25
                  Vlad Nitu and   
             Aram Kocharyan and   
                Hannas Yaya and   
               Alain Tchana and   
            Daniel Hagimont and   
             Hrachya Astsatryan   Working Set Size Estimation Techniques
                                  in Virtualized Environments: One Size
                                  Does not Fit All . . . . . . . . . . . . 19:1--19:22
                Xingyu Zhou and   
                     Fei Wu and   
                   Jian Tan and   
          Kannan Srinivasan and   
                    Ness Shroff   Degree of Queue Imbalance: Overcoming
                                  the Limitation of Heavy-traffic Delay
                                  Optimality in Load Balancing Systems . . 21:1--21:41
         Kausik Subramanian and   
             Loris D'Antoni and   
                  Aditya Akella   Synthesis of Fault-Tolerant Distributed
                                  Router Configurations  . . . . . . . . . 22:1--22:26

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 2, June, 2018

               Adam Wierman and   
                  Aditya Akella   Message from the Editors . . . . . . . . 23:1--23:1
                   Lin Yang and   
                   Lei Deng and   
    Mohammad H. Hajiesmaili and   
                  Cheng Tan and   
                Wing Shing Wong   An Optimal Algorithm for Online
                                  Non-Convex Learning  . . . . . . . . . . 25:1--25:25
                 Mowei Wang and   
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
                   Dan Yang and   
                   Kai Chen and   
                        Jun Zhu   Neural Network Meets DCN: Traffic-driven
                                  Topology Adaptation with Deep Learning   26:1--26:25
              Tim Hellemans and   
                Benny Van Houdt   On the Power-of-d-choices with Least
                                  Loaded Server Selection  . . . . . . . . 27:1--27:22
          Oleksii Oleksenko and   
          Dmitrii Kuvaiskii and   
            Pramod Bhatotia and   
              Pascal Felber and   
                Christof Fetzer   Intel MPX Explained: a Cross-layer
                                  Analysis of the Intel MPX System Stack   28:1--28:30
               Giulia Fanti and   
Shaileshh Bojja Venkatakrishnan and   
               Surya Bakshi and   
              Bradley Denby and   
            Shruti Bhargava and   
              Andrew Miller and   
               Pramod Viswanath   Dandelion++: Lightweight Cryptocurrency
                                  Networking with Formal Anonymity
                                  Guarantees . . . . . . . . . . . . . . . 29:1--29:35
 Thibault Séjourn\`e and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   The Price of Fragmentation in
                                  Mobility-on-Demand Services  . . . . . . 30:1--30:26
           Jessica Hoffmann and   
          Constantine Caramanis   The Cost of Uncertainty in Curing
                                  Epidemics  . . . . . . . . . . . . . . . 31:1--31:33
           Daniel S. Berger and   
            Nathan Beckmann and   
             Mor Harchol-Balter   Practical Bounds on Optimal Caching with
                                  Variable Object Sizes  . . . . . . . . . 32:1--32:38
          Christina Vlachou and   
        Ioannis Pefkianakis and   
                    Kyu-Han Kim   LTERadar: Towards LTE-Aware Wi-Fi Access
                                  Points . . . . . . . . . . . . . . . . . 33:1--33:31
                  Sem Borst and   
                Martin Zubeldia   Delay Scaling in Many-Sources Wireless
                                  Networks without Queue State Information 34:1--34:45
                Akshay Jain and   
             Mahmoud Khairy and   
              Timothy G. Rogers   A Quantitative Evaluation of
                                  Contemporary GPU Simulation Methodology  35:1--35:28
     Mohammad Sadegh Talebi and   
            Alexandre Proutiere   Learning Proportionally Fair Allocations
                                  with Low Regret  . . . . . . . . . . . . 36:1--36:31

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 2, Number 3, December, 2018

                  Yixin Luo and   
              Saugata Ghose and   
                     Yu Cai and   
          Erich F. Haratsch and   
                     Onur Mutlu   Improving $3$D NAND Flash Memory
                                  Lifetime by Tolerating Early Retention
                                  Loss and Process Variation . . . . . . . 37:1--37:48
              Saugata Ghose and   
Abdullah Giray Yaglikçi and   
               Raghav Gupta and   
               Donghyuk Lee and   
              Kais Kudrolli and   
             William X. Liu and   
               Hasan Hassan and   
             Kevin K. Chang and   
       Niladrish Chatterjee and   
             Aditya Agrawal and   
              Mike O'Connor and   
                     Onur Mutlu   What Your DRAM Power Models Are Not
                                  Telling You: Lessons from a Detailed
                                  Experimental Study . . . . . . . . . . . 38:1--38:41
                Xulong Tang and   
          Ashutosh Pattnaik and   
               Onur Kayiran and   
                 Adwait Jog and   
     Mahmut Taylan Kandemir and   
                      Chita Das   Quantifying Data Locality in Dynamic
                                  Parallelism in GPUs  . . . . . . . . . . 39:1--39:24
              Anish Agarwal and   
    Muhammad Jehangir Amjad and   
              Devavrat Shah and   
                    Dennis Shen   Model Agnostic Time Series Analysis via
                                  Matrix Estimation  . . . . . . . . . . . 40:1--40:39
                Xingyu Zhou and   
                   Jian Tan and   
                    Ness Shroff   Heavy-traffic Delay Optimality in
                                  Pull-based Load Balancing Systems:
                                  Necessary and Sufficient Conditions  . . 41:1--41:33
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                   Hui Zhao and   
             Myoungsoo Jung and   
                Mustafa Karakoy   Computing with Near Data . . . . . . . . 42:1--42:30
               Florin Ciucu and   
                 Felix Poloczek   Two Extensions of Kingman's GI/G/1 Bound 43:1--43:33


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 1, March, 2019

              Lan N. Nguyen and   
                     My T. Thai   Network Resilience Assessment via QoS
                                  Degradation Metrics: an Algorithmic
                                  Approach . . . . . . . . . . . . . . . . 1:1--1:32
                    Ran Liu and   
                 Edmund Yeh and   
                Atilla Eryilmaz   Proactive Caching for Low Access-Delay
                                  Services under Uncertain Predictions . . 2:1--2:46
                   Xiao Zhu and   
            Yihua Ethan Guo and   
           Ashkan Nikravesh and   
                  Feng Qian and   
                  Z. Morley Mao   Understanding the Networking Performance
                                  of Wear OS . . . . . . . . . . . . . . . 3:1--3:25
          Mark van der Boor and   
                  Sem Borst and   
          Johan van Leeuwaarden   Hyper-Scalable JSQ with Sparse Feedback  4:1--4:37
               Tu Dinh Ngoc and   
                    Bao Bui and   
            Stella Bitchebe and   
               Alain Tchana and   
          Valerio Schiavoni and   
              Pascal Felber and   
                Daniel Hagimont   Everything You Should Know About Intel
                                  SGX Performance on Virtualized Systems   5:1--5:21
                  Haoran Yu and   
                  Ermin Wei and   
               Randall A. Berry   Analyzing Location-Based Advertising for
                                  Vehicle Service Providers Using
                                  Effective Resistances  . . . . . . . . . 6:1--6:35
             Richard Combes and   
                  Mikael Touati   Computationally Efficient Estimation of
                                  the Spectral Gap of a Markov Chain . . . 7:1--7:21
                  Youil Han and   
               Bryan S. Kim and   
               Jeseong Yeon and   
                Sungjin Lee and   
                      Eunji Lee   TeksDB: Weaving Data Structures for a
                                  High-Performance Key--Value Store  . . . 8:1--8:23
               Shoaib Akram and   
            Jennifer Sartor and   
           Kathryn McKinley and   
                Lieven Eeckhout   Crystal Gazer: Profile-Driven
                                  Write-Rationing Garbage Collection for
                                  Hybrid Memories  . . . . . . . . . . . . 9:1--9:27
                 Qiulin Lin and   
                 Hanling Yi and   
                  John Pang and   
               Minghua Chen and   
               Adam Wierman and   
              Michael Honig and   
                 Yuanzhang Xiao   Competitive Online Optimization under
                                  Inventory Constraints  . . . . . . . . . 10:1--10:28
                    Lili Su and   
            Martin Zubeldia and   
                    Nancy Lynch   Collaboratively Learning the Best Option
                                  on Graphs, Using Bounded Local Memory    11:1--11:32
                    Lili Su and   
                     Jiaming Xu   Securing Distributed Gradient Descent in
                                  High Dimensional Statistical Learning    12:1--12:41
           Monika Henzinger and   
             Stefan Neumann and   
                  Stefan Schmid   Efficient Distributed Workload
                                  (Re-)Embedding . . . . . . . . . . . . . 13:1--13:38
              Dengwang Tang and   
           Vijay G. Subramanian   Random Walk Based Sampling for Load
                                  Balancing in Multi-Server Systems  . . . 14:1--14:44
                Chul-Ho Lee and   
                   Min Kang and   
                   Do Young Eun   Non-Markovian Monte Carlo on Directed
                                  Graphs . . . . . . . . . . . . . . . . . 15:1--15:31
              Joshua Comden and   
                  Sijie Yao and   
              Niangjun Chen and   
               Haipeng Xing and   
                    Zhenhua Liu   Online Optimization in Cloud Resource
                                  Provisioning: Predictions, Regrets, and
                                  Algorithms . . . . . . . . . . . . . . . 16:1--16:30
                  Lei Zhang and   
                Zhemin Yang and   
                    Yuyu He and   
                  Mingqi Li and   
                   Sen Yang and   
                   Min Yang and   
                 Yuan Zhang and   
                    Zhiyun Qian   App in the Middle: Demystify Application
                                  Virtualization in Android and its
                                  Security Threats . . . . . . . . . . . . 17:1--17:24
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
             Kostas Kollias and   
                Kamesh Munagala   The Segmentation-Thickness Tradeoff in
                                  Online Marketplaces  . . . . . . . . . . 18:1--18:26
        Pavlos Nikolopoulos and   
            Christos Pappas and   
          Katerina Argyraki and   
                  Adrian Perrig   Retroactive Packet Sampling for Traffic
                                  Receipts . . . . . . . . . . . . . . . . 19:1--19:39

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 2, June, 2019

              Thomas Bonald and   
                  Nick Duffield   Editorial  . . . . . . . . . . . . . . . 20:1--20:2
               Lavanya Jose and   
             Stephen Ibanez and   
          Mohammad Alizadeh and   
                   Nick McKeown   A Distributed Algorithm to Calculate
                                  Max-Min Fair Rates Without Per-Flow
                                  State  . . . . . . . . . . . . . . . . . 21:1--21:42
                   Ming Shi and   
                Xiaojun Lin and   
                       Lei Jiao   On the Value of Look-Ahead in
                                  Competitive Online Convex Optimization   22:1--22:42
                Benny Van Houdt   Global Attraction of ODE-based Mean
                                  Field Models with Hyperexponential Job
                                  Sizes  . . . . . . . . . . . . . . . . . 23:1--23:23
                   Song Wei and   
                  Kun Zhang and   
                        Bibo Tu   HyperBench: a Benchmark Suite for
                                  Virtualization Capabilities  . . . . . . 24:1--24:22
                Daniel Vial and   
              Vijay Subramanian   A Structural Result for Personalized
                                  PageRank and its Algorithmic
                                  Consequences . . . . . . . . . . . . . . 25:1--25:88
        Behnam Pourghassemi and   
         Ardalan Amiri Sani and   
     Aparna Chandramowlishwaran   What-If Analysis of Page Load Time in
                                  Web Browsers Using Causal Profiling  . . 27:1--27:23
             Pradeep Ambati and   
                    David Irwin   Optimizing the Cost of Executing Mixed
                                  Interactive and Batch Workloads on
                                  Transient VMs  . . . . . . . . . . . . . 28:1--28:24
                Dhruv Kumar and   
                    Jian Li and   
           Abhishek Chandra and   
               Ramesh Sitaraman   A TTL-based Approach for Data
                                  Aggregation in Geo-distributed Streaming
                                  Analytics  . . . . . . . . . . . . . . . 29:1--29:27
           Pavlos Sermpezis and   
             Vasileios Kotronis   Inferring Catchment in Internet Routing  30:1--30:31
               Florin Ciucu and   
             Felix Poloczek and   
                       Amr Rizk   Queue and Loss Distributions in
                                  Finite-Buffer Queues . . . . . . . . . . 31:1--31:29
               Doron Zarchy and   
             Radhika Mittal and   
           Michael Schapira and   
                  Scott Shenker   Axiomatizing Congestion Control  . . . . 33:1--33:33
            Milan Radulovic and   
Rommel Sánchez Verdejo and   
             Paul Carpenter and   
         Petar Radojkovi\'c and   
                Bruce Jacob and   
          Eduard Ayguadé   PROFET: Modeling System Performance and
                                  Energy Without Simulating the CPU  . . . 34:1--34:33
              Tim Hellemans and   
                Tejas Bodas and   
                Benny Van Houdt   Performance Analysis of Workload
                                  Dependent Load Balancing Policies  . . . 35:1--35:35
             Osman Emre Dai and   
             Daniel Cullina and   
             Negar Kiyavash and   
          Matthias Grossglauser   Analysis of a Canonical Labeling
                                  Algorithm for the Alignment of
                                  Correlated Erd\Hos--Rényi Graphs  . . . . 36:1--36:25
             Muhammad Amjad and   
               Vishal Misra and   
              Devavrat Shah and   
                    Dennis Shen   mRSC: Multi-dimensional Robust Synthetic
                                  Control  . . . . . . . . . . . . . . . . 37:1--37:27
            Mustafa Karakoy and   
               Orhan Kislal and   
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
          Meenakshi Arunachalam   Architecture-Aware Approximate Computing 38:1--38:24
               Guocong Quan and   
                   Jian Tan and   
            Atilla Eryilmaz and   
                    Ness Shroff   A New Flexible Multi-flow LRU Cache
                                  Management Paradigm for Minimizing
                                  Misses . . . . . . . . . . . . . . . . . 39:1--39:30
           Jessica Hoffmann and   
          Constantine Caramanis   Learning Graphs from Noisy Epidemic
                                  Cascades . . . . . . . . . . . . . . . . 40:1--40:34
                Honghao Wei and   
               Xiaohan Kang and   
                 Weina Wang and   
                       Lei Ying   QuickStop: a Markov Optimal Stopping
                                  Approach for Quickest Misinformation
                                  Detection  . . . . . . . . . . . . . . . 41:1--41:25
               Isaac Grosof and   
                 Ziv Scully and   
             Mor Harchol-Balter   Load Balancing Guardrails: Keeping Your
                                  Heavy Traffic on the Road to Low
                                  Response Times . . . . . . . . . . . . . 42:1--42:31
                Semih Cayci and   
            Atilla Eryilmaz and   
                     R. Srikant   Learning to Control Renewal Processes
                                  with Bandit Feedback . . . . . . . . . . 43:1--43:32

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 3, Number 3, December, 2019

               Ayush Mishra and   
              Xiangpeng Sun and   
               Atishya Jain and   
               Sameer Pande and   
                  Raj Joshi and   
                      Ben Leong   The Great Internet TCP Congestion
                                  Control Census . . . . . . . . . . . . . 45:1--45:24
             Michael Fleder and   
                  Devavrat Shah   Forecasting with Alternative Data  . . . 46:1--46:29
               Zhenjie Yang and   
                   Yong Cui and   
                Shihan Xiao and   
                   Xin Wang and   
                 Minming Li and   
                 Chuming Li and   
                     Yadong Liu   Achieving Efficient Routing in
                                  Reconfigurable DCNs  . . . . . . . . . . 47:1--47:30
               Palma London and   
                 Shai Vardi and   
                   Adam Wierman   Logarithmic Communication for
                                  Distributed Optimization in Multi-Agent
                                  Systems  . . . . . . . . . . . . . . . . 48:1--48:29
               Yiyang Chang and   
                Chuan Jiang and   
             Ashish Chandra and   
                 Sanjay Rao and   
              Mohit Tawarmalani   Lancet: Better Network Resilience by
                                  Designing for Pruned Failure Sets  . . . 49:1--49:26
                  Xinzhe Fu and   
                  Eytan Modiano   Fundamental Limits of Volume-based
                                  Network DoS Attacks  . . . . . . . . . . 50:1--50:36
                   You Zhou and   
               Youlin Zhang and   
                  Chaoyi Ma and   
               Shigang Chen and   
            Olufemi O. Odegbile   Generalized Sketch Families for Network
                                  Traffic Measurement  . . . . . . . . . . 51:1--51:34
                Sinong Wang and   
               Jiashang Liu and   
                    Ness Shroff   Fundamental Limits of Approximate
                                  Gradient Coding  . . . . . . . . . . . . 52:1--52:22
       Abishek Sankararaman and   
            Ayalvadi Ganesh and   
              Sanjay Shakkottai   Social Learning in Multi Agent Multi
                                  Armed Bandits  . . . . . . . . . . . . . 53:1--53:35
             Daniel Cullina and   
             Negar Kiyavash and   
             Prateek Mittal and   
                H. Vincent Poor   Partial Recovery of Erd\Hos--Rényi Graph
                                  Alignment via $k$-Core Alignment . . . . 54:1--54:21
           Sean R. Sinclair and   
        Siddhartha Banerjee and   
               Christina Lee Yu   Adaptive Discretization for Episodic
                                  Reinforcement Learning in Metric Spaces  55:1--55:44
         Francesco Bronzino and   
               Paul Schmitt and   
                Sara Ayoubi and   
          Guilherme Martins and   
            Renata Teixeira and   
                  Nick Feamster   Inferring Streaming Video Quality from
                                  Encrypted Traffic: Practical Models and
                                  Deployment Experience  . . . . . . . . . 56:1--56:25
Illés Antal Horváth and   
                 Ziv Scully and   
                Benny Van Houdt   Mean Field Analysis of
                                  Join-Below-Threshold Load Balancing for
                                  Resource Sharing Servers . . . . . . . . 57:1--57:21
              Ankur Mallick and   
           Malhar Chaudhari and   
                Utsav Sheth and   
         Ganesh Palanikumar and   
                    Gauri Joshi   Rateless Codes for Near-Perfect Load
                                  Balancing in Distributed Matrix--Vector
                                  Multiplication . . . . . . . . . . . . . 58:1--58:40
           Jordi Ros-Giralt and   
                Atul Bohara and   
          Sruthi Yellamraju and   
         M. Harper Langston and   
             Richard Lethin and   
                Yuang Jiang and   
         Leandros Tassiulas and   
                   Josie Li and   
               Yuanlong Tan and   
          Malathi Veeraraghavan   On the Bottleneck Structure of
                                  Congestion-Controlled Networks . . . . . 59:1--59:31
              Saugata Ghose and   
                 Tianshi Li and   
         Nastaran Hajinazar and   
           Damla Senol Cali and   
                     Onur Mutlu   Demystifying Complex Workload-DRAM
                                  Interactions: an Experimental Study  . . 60:1--60:50
               Nikita Ivkin and   
              Ran Ben Basat and   
                Zaoxing Liu and   
               Gil Einziger and   
               Roy Friedman and   
             Vladimir Braverman   I Know What You Did Last Summer: Network
                                  Monitoring using Interval Queries  . . . 61:1--61:28


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 1, May, 2020

            Vishwaraj Doshi and   
                   Do Young Eun   Fiedler Vector Approximation via
                                  Interacting Random Walks . . . . . . . . 01:1--01:28
                Martin Zubeldia   Delay-optimal Policies in Partial
                                  Fork-Join Systems with Redundancy and
                                  Random Slowdowns . . . . . . . . . . . . 02:1--02:49
              Hsuan-Chi Kuo and   
               Jianyan Chen and   
                Sibin Mohan and   
                     Tianyin Xu   Set the Configuration for the Heart of
                                  the OS: On the Practicality of Operating
                                  System Kernel Debloating . . . . . . . . 03:1--03:27
               Reza Alijani and   
        Siddhartha Banerjee and   
        Sreenivas Gollapudi and   
            Kamesh Munagala and   
                  Kangning Wang   Predict and Match: Prophet Inequalities
                                  with Uncertain Supply  . . . . . . . . . 04:1--04:23
                 JinKe Song and   
                   Qiang Li and   
               Haining Wang and   
                      Limin Sun   Under the Concealing Surface: Detecting
                                  and Understanding Live Webcams in the
                                  Wild . . . . . . . . . . . . . . . . . . 05:1--05:25
                  Lei Zhang and   
                Reza Karimi and   
                Irfan Ahmad and   
                 Ymir Vigfusson   Optimal Data Placement for Heterogeneous
                                  Cache, Memory, and Storage Systems . . . 06:1--06:27
                Zhihui Shao and   
          Mohammad A. Islam and   
                    Shaolei Ren   Your Noise, My Signal: Exploiting
                                  Switching Noise for Stealthy Data
                                  Exfiltration from Desktop Computers  . . 07:1--07:39
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Simple Near-Optimal Scheduling for the
                                  M/G/1  . . . . . . . . . . . . . . . . . 11:1--11:29
                   Yang Cai and   
         Federico Echenique and   
                      Hu Fu and   
             Katrina Ligett and   
               Adam Wierman and   
                     Juba Ziani   Third-Party Data Providers Ruin Simple
                                  Mechanisms . . . . . . . . . . . . . . . 12:1--12:31
              Pengxiong Zhu and   
                   Keyu Man and   
              Zhongjie Wang and   
                Zhiyun Qian and   
                Roya Ensafi and   
          J. Alex Halderman and   
                    Haixin Duan   Characterizing Transnational Internet
                                  Performance and the Great Bottleneck of
                                  China  . . . . . . . . . . . . . . . . . 13:1--13:23
             Richard Combes and   
      Alexandre Prouti\`ere and   
            Alexandre Fauquette   Unimodal Bandits with Continuous Arms:
                                  Order-optimal Regret without Smoothness  14:1--14:28
                   Lin Yang and   
    Mohammad H. Hajiesmaili and   
           Ramesh Sitaraman and   
               Adam Wierman and   
            Enrique Mallada and   
                   Wing S. Wong   Online Linear Optimization with
                                  Inventory Management Constraints . . . . 16:1--16:29
             Martin Karsten and   
                   Saman Barghi   User-level Threading: Have Your Cake and
                                  Eat It Too . . . . . . . . . . . . . . . 17:1--17:30
                 Yiheng Lin and   
                Gautam Goel and   
                   Adam Wierman   Online Optimization with Predictions and
                                  Non-convex Losses  . . . . . . . . . . . 18:1--18:32
                 Sungjin Im and   
           Benjamin Moseley and   
            Kamesh Munagala and   
                     Kirk Pruhs   Dynamic Weighted Fairness with Minimal
                                  Disruptions  . . . . . . . . . . . . . . 19:1--19:18
                  Chen Avin and   
              Manya Ghobadi and   
                Chen Griner and   
                  Stefan Schmid   On the Complexity of Traffic Traces and
                                  Implications . . . . . . . . . . . . . . 20:1--20:29

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 2, June, 2020

                  Y. C. Tay and   
             Athina Markopoulou   Editorial  . . . . . . . . . . . . . . . 21:1--21:1
               Shouqian Shi and   
                      Chen Qian   Ludo Hashing: Compact, Fast, and Dynamic
                                  Key-value Lookups for Practical Network
                                  Systems  . . . . . . . . . . . . . . . . 22:1--22:32
              Philippe Nain and   
            Gayane Vardoyan and   
                Saikat Guha and   
                    Don Towsley   On the Analysis of a Multipartite
                                  Entanglement Distribution Switch . . . . 23:1--23:39
                 Xiaoqi Tan and   
                     Bo Sun and   
        Alberto Leon-Garcia and   
                    Yuan Wu and   
              Danny H. K. Tsang   Mechanism Design for Online Resource
                                  Allocation: a Unified Approach . . . . . 24:1--24:46
     Rajarshi Bhattacharjee and   
         Subhankar Banerjee and   
                 Abhishek Sinha   Fundamental Limits on the Regret of
                                  Online Network-Caching . . . . . . . . . 25:1--25:31
               Peter Snyder and   
             Antoine Vastel and   
                   Ben Livshits   Who Filters the Filters: Understanding
                                  the Growth, Usefulness and Efficiency of
                                  Crowdsourced Ad Blocking . . . . . . . . 26:1--26:24
             Ludovic Thomas and   
            Jean-Yves Le Boudec   On Time Synchronization Issues in
                                  Time-Sensitive Networks with Regulators
                                  and Nonideal Clocks  . . . . . . . . . . 27:1--27:41
                Chun-Yi Liu and   
             Jagadish Kotra and   
             Myoungsoo Jung and   
         Mahmut Taylan Kandemir   Centaur: a Novel Architecture for
                                  Reliable, Low-Wear, High-Density $3$D
                                  NAND Storage . . . . . . . . . . . . . . 28:1--28:25
               Weizhao Tang and   
                 Weina Wang and   
               Giulia Fanti and   
                     Sewoong Oh   Privacy-Utility Tradeoffs in Routing
                                  Cryptocurrency over Payment Channel
                                  Networks . . . . . . . . . . . . . . . . 29:1--29:39
                 Ziv Scully and   
          Lucas van Kreveld and   
                 Onno Boxma and   
         Jan-Pieter Dorsman and   
                   Adam Wierman   Characterizing Policies with Optimal
                                  Response Time Tails under Heavy-Tailed
                                  Job Sizes  . . . . . . . . . . . . . . . 30:1--30:33
                   Fred Lin and   
             Keyur Muzumdar and   
   Nikolay Pavlovich Laptev and   
     Mihai-Valentin Curelea and   
               Seunghak Lee and   
                  Sriram Sankar   Fast Dimensional Analysis for Root Cause
                                  Investigation in a Large-Scale Service
                                  Environment  . . . . . . . . . . . . . . 31:1--31:23
                    Yibo Pi and   
                Sugih Jamin and   
               Peter Danzig and   
                      Feng Qian   Latency Imbalance Among Internet
                                  Load-Balanced Paths: a Cloud-Centric
                                  View . . . . . . . . . . . . . . . . . . 32:1--32:29
  Seyed Armin Vakil Ghahani and   
     Mahmut Taylan Kandemir and   
              Jagadish B. Kotra   DSM: a Case for Hardware-Assisted
                                  Merging of DRAM Rows with Same Content   33:1--33:26
              Erik Tillberg and   
              Peter Marbach and   
                  Ravi Mazumdar   Optimal Bidding Strategies for Online Ad
                                  Auctions with Overlapping Targeting
                                  Criteria . . . . . . . . . . . . . . . . 34:1--34:55
             Aditya Gopalan and   
       Abishek Sankararaman and   
                Anwar Walid and   
              Sriram Vishwanath   Stability and Scalability of Blockchain
                                  Systems  . . . . . . . . . . . . . . . . 35:1--35:35
         Apostolos Pyrgelis and   
           Carmela Troncoso and   
         Emiliano De Cristofaro   Measuring Membership Privacy on
                                  Aggregate Location Time-Series . . . . . 36:1--36:28
               Yuheng Huang and   
                 Haoyu Wang and   
                     Lei Wu and   
               Gareth Tyson and   
                  Xiapu Luo and   
                  Run Zhang and   
                Xuanzhe Liu and   
                 Gang Huang and   
                   Xuxian Jiang   Understanding (Mis)Behavior on the EOSIO
                                  Blockchain . . . . . . . . . . . . . . . 37:1--37:28
                Atakan Aral and   
       Melike Erol-Kantarci and   
                Ivona Brandi\'c   Staleness Control for Edge Data
                                  Analytics  . . . . . . . . . . . . . . . 38:1--38:24
                Xiaohan Wei and   
                     Hao Yu and   
               Michael J. Neely   Online Primal-Dual Mirror Descent under
                                  Stochastic Constraints . . . . . . . . . 39:1--39:36
           Alexander Marder and   
             Matthew Luckie and   
           Bradley Huffaker and   
                      KC Claffy   vrfinder: Finding Outbound Addresses in
                                  Traceroute . . . . . . . . . . . . . . . 40:1--40:28

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 4, Number 3, November, 2020

                   Xin Wang and   
               Richard T. B. Ma   On Private Peering Agreements between
                                  Content and Access Providers: a
                                  Contractual Equilibrium Analysis . . . . 41:1--41:32
                Wentao Weng and   
                     Weina Wang   Achieving Zero Asymptotic Queueing Delay
                                  for Parallel Jobs  . . . . . . . . . . . 42:1--42:36
                 Ziv Scully and   
               Isaac Grosof and   
             Mor Harchol-Balter   The Gittins Policy is Nearly Optimal in
                                  the M/G/$k$ under Extremely General
                                  Conditions . . . . . . . . . . . . . . . 43:1--43:29
  Luis Fernando Abanto-Leon and   
         Andreas Bäuml and   
     Gek Hong (Allyson) Sim and   
           Matthias Hollick and   
                    Arash Asadi   Stay Connected, Leave no Trace:
                                  Enhancing Security and Privacy in WiFi
                                  via Obfuscating Radiometric Fingerprints 44:1--44:31
                Wentao Weng and   
                Xingyu Zhou and   
                     R. Srikant   Optimal Load Balancing with Locality
                                  Constraints  . . . . . . . . . . . . . . 45:1--45:37
          Youri Raaijmakers and   
                      Sem Borst   Achievable Stability in Redundancy
                                  Systems  . . . . . . . . . . . . . . . . 46:1--46:21
             Michael Fleder and   
                  Devavrat Shah   I Know What You Bought At Chipotle for
                                  \$9.81 by Solving A Linear Inverse
                                  Problem  . . . . . . . . . . . . . . . . 47:1--47:17
                Elene Anton and   
               Urtzi Ayesta and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Improving the Performance of
                                  Heterogeneous Data Centers through
                                  Redundancy . . . . . . . . . . . . . . . 48:1--48:29
              Ahmad Hazimeh and   
             Adrian Herrera and   
                  Mathias Payer   Magma: a Ground-Truth Fuzzing Benchmark  49:1--49:29
                 Bingyu Gao and   
                 Haoyu Wang and   
              Pengcheng Xia and   
                   Siwei Wu and   
                 Yajin Zhou and   
                  Xiapu Luo and   
                   Gareth Tyson   Tracking Counterfeit Cryptocurrency
                                  End-to-end . . . . . . . . . . . . . . . 50:1--50:28
                     Bo Sun and   
                Ali Zeynali and   
                 Tongxin Li and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
              Danny H. K. Tsang   Competitive Algorithms for the Online
                                  Multiple Knapsack Problem with
                                  Application to Electric Vehicle Charging 51:1--51:32
              Kamiar Asgari and   
               Michael J. Neely   Bregman-style Online Convex Optimization
                                  with Energy-Harvesting Constraints . . . 52:1--52:25


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 1, February, 2021

                Lishan Yang and   
                    Bin Nie and   
                 Adwait Jog and   
                 Evgenia Smirni   SUGAR: Speeding Up GPGPU Application
                                  Resilience Estimation with Input Sizing  01:1--01:29
                Zhaowei Zhu and   
               Jingxuan Zhu and   
                     Ji Liu and   
                       Yang Liu   Federated Bandit: a Gossiping Approach   02:1--02:29
        Behnam Pourghassemi and   
          Jordan Bonecutter and   
                    Zhou Li and   
     Aparna Chandramowlishwaran   adPerf: Characterizing the Performance
                                  of Third-party Ads . . . . . . . . . . . 03:1--03:26
                Iman Akbari and   
     Mohammad A. Salahuddin and   
                   Leni Ven and   
                Noura Limam and   
              Raouf Boutaba and   
           Bertrand Mathieu and   
           Stephanie Moteau and   
                Stephane Tuffin   A Look Behind the Curtain: Traffic
                                  Classification in an Increasingly
                                  Encrypted Web  . . . . . . . . . . . . . 04:1--04:26
                    Kai Han and   
                 Shuang Cui and   
              Tianshuai Zhu and   
                Enpei Zhang and   
                  Benwei Wu and   
                Zhizhuo Yin and   
                    Tong Xu and   
               Shaojie Tang and   
                       He Huang   Approximation Algorithms for Submodular
                                  Data Summarization with a Knapsack
                                  Constraint . . . . . . . . . . . . . . . 05:1--05:31
       Klaus-Tycho Foerster and   
          Janne H. Korhonen and   
                    Ami Paz and   
               Joel Rybicki and   
                  Stefan Schmid   Input-Dynamic Distributed Algorithms for
                                  Communication Networks . . . . . . . . . 06:1--06:33
                 Weina Wang and   
                Qiaomin Xie and   
             Mor Harchol-Balter   Zero Queueing for Multi-Server Jobs  . . 07:1--07:25
                  Jing Tang and   
                Xueyan Tang and   
                 Andrew Lim and   
                    Kai Han and   
               Chongshou Li and   
                   Junsong Yuan   Revisiting Modified Greedy Algorithm for
                                  Monotone Submodular Maximization with a
                                  Knapsack Constraint  . . . . . . . . . . 08:1--08:22
           Thibaut Cuvelier and   
             Richard Combes and   
                   Eric Gourdin   Statistically Efficient, Polynomial-Time
                                  Algorithms for Combinatorial
                                  Semi-Bandits . . . . . . . . . . . . . . 09:1--09:31

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 2, June, 2021

              Anshul Gandhi and   
             Negar Kiyavash and   
                       Jia Wang   Editorial  . . . . . . . . . . . . . . . 13:1--13:1
                  Yue Zhang and   
           Bayan Turkistani and   
          Allen Yuqing Yang and   
               Chaoshun Zuo and   
                   Zhiqiang Lin   A Measurement Study of Wechat Mini-Apps  14:1--14:25
             Qingzhao Zhang and   
              David Ke Hong and   
                   Ze Zhang and   
             Qi Alfred Chen and   
               Scott Mahlke and   
                  Z. Morley Mao   A Systematic Framework to Identify
                                  Violations of Scenario-dependent Driving
                                  Rules in Autonomous Vehicle Software . . 15:1--15:25
              Yiguang Zhang and   
            Jessy Xinyi Han and   
              Ilica Mahajan and   
         Priyanjana Bengani and   
            Augustin Chaintreau   Chasm in Hegemony: Explaining and
                                  Reproducing Disparities in Homophilous
                                  Networks . . . . . . . . . . . . . . . . 16:1--16:38
                 Tongxin Li and   
                   Yue Chen and   
                     Bo Sun and   
               Adam Wierman and   
                  Steven H. Low   Information Aggregation for Constrained
                                  Online Control . . . . . . . . . . . . . 18:1--18:35
              Tim Hellemans and   
                Benny Van Houdt   Mean Waiting Time in Large-Scale and
                                  Critically Loaded Power of $d$ Load
                                  Balancing Systems  . . . . . . . . . . . 19:1--19:34
                Xulong Tang and   
     Mahmut Taylan Kandemir and   
                Mustafa Karakoy   Mix and Match: Reorganizing Tasks for
                                  Enhancing Data Locality  . . . . . . . . 20:1--20:24
               Isaac Grosof and   
                 Kunhe Yang and   
                 Ziv Scully and   
             Mor Harchol-Balter   \pkgNudge: Stochastically Improving upon
                                  FCFS . . . . . . . . . . . . . . . . . . 21:1--21:29
         Grzegorz Kielanski and   
                Benny Van Houdt   On the Asymptotic Insensitivity of the
                                  Supermarket Model in Processor Sharing
                                  Systems  . . . . . . . . . . . . . . . . 22:1--22:28
               Rachee Singh and   
                David Tench and   
              Phillipa Gill and   
                Andrew McGregor   \pkgPredictRoute: a Network Path
                                  Prediction Toolkit . . . . . . . . . . . 23:1--23:24
Noémie Périvier and   
             Chamsi Hssaine and   
       Samitha Samaranayake and   
            Siddhartha Banerjee   Real-time Approximate Routing for Smart
                                  Transit Systems  . . . . . . . . . . . . 24:1--24:30
          Francesca Randone and   
            Luca Bortolussi and   
               Mirco Tribastone   Refining Mean-field Approximations by
                                  Dynamic State Truncation . . . . . . . . 25:1--25:30
                Weimin Chen and   
                  Xinran Li and   
                 Yuting Sui and   
                  Ningyu He and   
                 Haoyu Wang and   
                     Lei Wu and   
                      Xiapu Luo   \pkgSADPonzi: Detecting and
                                  Characterizing Ponzi Schemes in Ethereum
                                  Smart Contracts  . . . . . . . . . . . . 26:1--26:30
                   Liren Yu and   
                 Jiaming Xu and   
                    Xiaojun Lin   The Power of $D$-hops in Matching
                                  Power-Law Graphs . . . . . . . . . . . . 27:1--27:43
             Ashish Bijlani and   
    Umakishore Ramachandran and   
                   Roy Campbell   Where did my 256 GB go? A Measurement
                                  Analysis of Storage Consumption on Smart
                                  Mobile Devices . . . . . . . . . . . . . 28:1--28:28

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 5, Number 3, December, 2021

            Niklas Carlsson and   
                Edith Cohen and   
                Philippe Robert   POMACS V5, N3, December 2021 Editorial   29:1--29:1
                   Lin Yang and   
                Ali Zeynali and   
    Mohammad H. Hajiesmaili and   
        Ramesh K. Sitaraman and   
                    Don Towsley   Competitive Algorithms for Online
                                  Multidimensional Knapsack Problems . . . 30:1--30:30
               Hassan Iqbal and   
              Ayesha Khalid and   
               Muhammad Shahzad   Dissecting Cloud Gaming Performance with
                                  \pkgDECAF  . . . . . . . . . . . . . . . 31:1--31:27
        Michalis Pachilakis and   
    Panagiotis Papadopoulos and   
         Nikolaos Laoutaris and   
      Evangelos P. Markatos and   
             Nicolas Kourtellis   \pkgYourAdvalue: Measuring Advertising
                                  Price Dynamics without Bankrupting User
                                  Privacy  . . . . . . . . . . . . . . . . 32:1--32:26
                Tomer Lange and   
        Joseph (Seffi) Naor and   
                    Gala Yadgar   Offline and Online Algorithms for SSD
                                  Management . . . . . . . . . . . . . . . 33:1--33:28
                Bingqian Lu and   
                Jianyi Yang and   
               Weiwen Jiang and   
                   Yiyu Shi and   
                    Shaolei Ren   One Proxy Device Is Enough for
                                  Hardware-Aware Neural Architecture
                                  Search . . . . . . . . . . . . . . . . . 34:1--34:34
                Yuanyuan Li and   
             Tareq Si Salem and   
            Giovanni Neglia and   
              Stratis Ioannidis   Online Caching Networks with Adversarial
                                  Guarantees . . . . . . . . . . . . . . . 35:1--35:39
                  Suho Shin and   
                Hoyong Choi and   
                    Yung Yi and   
                    Jungseul Ok   Power of Bonus in Pricing for
                                  Crowdsourcing  . . . . . . . . . . . . . 36:1--36:25
            Ryan J. Kinnear and   
           Ravi R. Mazumdar and   
                  Peter Marbach   Real-time Bidding for Time Constrained
                                  Impression Contracts in First and Second
                                  Price Auctions --- Theory and Algorithms 37:1--37:37
                Chen Griner and   
            Johannes Zerwas and   
              Andreas Blenk and   
              Manya Ghobadi and   
              Stefan Schmid and   
                      Chen Avin   \pkgCerberus: The Power of Choices in
                                  Datacenter Topology Design --- a
                                  Throughput Perspective . . . . . . . . . 38:1--38:33
              Pengcheng Xia and   
                 Haoyu Wang and   
                 Bingyu Gao and   
                 Weihang Su and   
                    Zhou Yu and   
                  Xiapu Luo and   
                 Chao Zhang and   
               Xusheng Xiao and   
                       Guoai Xu   Trade or Trick?: Detecting and
                                  Characterizing Scam Tokens on Uniswap
                                  Decentralized Exchange . . . . . . . . . 39:1--39:26
         Francesco Bronzino and   
               Paul Schmitt and   
                Sara Ayoubi and   
                Hyojoon Kim and   
            Renata Teixeira and   
                  Nick Feamster   Traffic Refinery: Cost-Aware Data
                                  Representation for Machine Learning on
                                  Network Traffic  . . . . . . . . . . . . 40:1--40:24
                 Sourav Das and   
             Nitin Awathare and   
                   Ling Ren and   
           Vinay J. Ribeiro and   
                   Umesh Bellur   \pkgTuxedo: Maximizing Smart Contract
                                  Computation in PoW Blockchains . . . . . 41:1--41:30
               Shizhen Zhao and   
                 Peirui Cao and   
                   Xinbing Wang   Understanding the Performance Guarantee
                                  of Physical Topology Design for Optical
                                  Circuit Switched Data Centers  . . . . . 42:1--42:24
                    Lin Jin and   
                  Shuai Hao and   
               Haining Wang and   
                   Chase Cotton   Understanding the Practices of Global
                                  Censorship through Accurate, End-to-End
                                  Measurements . . . . . . . . . . . . . . 43:1--43:25
              Yun Seong Nam and   
                Jianfei Gao and   
             Chandan Bothra and   
            Ehab Ghabashneh and   
                 Sanjay Rao and   
              Bruno Ribeiro and   
                 Jibin Zhan and   
                      Hui Zhang   \pkgXatu: Richer Neural Network Based
                                  Prediction for Video Streaming . . . . . 44:1--44:26


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 6, Number 1, March, 2022

            Niklas Carlsson and   
                Edith Cohen and   
                Philippe Robert   POMACS V6, N1, March 2022 Editorial  . . 1:1--1:1
                  Hem Regmi and   
                     Sanjib Sur   Argus: Predictable Millimeter-Wave
                                  Picocells with Vision and Learning
                                  Augmentation . . . . . . . . . . . . . . 2:1--2:26
          Brivaldo A. Silva and   
                  Paulo Mol and   
            Osvaldo Fonseca and   
                Italo Cunha and   
        Ronaldo A. Ferreira and   
             Ethan Katz-Bassett   Automatic Inference of BGP Location
                                  Communities  . . . . . . . . . . . . . . 3:1--3:23
            Young-Kyoon Suh and   
                Junyoung An and   
              Byungchul Tak and   
                     Gap-Joo Na   A Comprehensive Empirical Study of Query
                                  Performance Across GPU DBMSes  . . . . . 4:1--4:29
          Loqman Salamatian and   
             Scott Anderson and   
            Joshua Matthews and   
               Paul Barford and   
           Walter Willinger and   
                  Mark Crovella   Curvature-based Analysis of Network
                                  Connectivity in Private Backbone
                                  Infrastructures  . . . . . . . . . . . . 5:1--5:32
               Sachin Ashok and   
             Shubham Tiwari and   
        Nagarajan Natarajan and   
     Venkata N. Padmanabhan and   
     Sundararajan Sellamanickam   Data-Driven Network Path Simulation with
                                  iBox . . . . . . . . . . . . . . . . . . 6:1--6:26
    Soheil Khadirsharbiyani and   
             Jagadish Kotra and   
                Karthik Rao and   
                Mahmut Kandemir   Data Convection: a GPU-Driven Case Study
                                  for Thermal-Aware Data Placement in $3$D
                                  DRAMs  . . . . . . . . . . . . . . . . . 7:1--7:25
                    Xingyu Zhou   Differentially Private Reinforcement
                                  Learning with Linear Function
                                  Approximation  . . . . . . . . . . . . . 8:1--8:27
                  Yuwei Luo and   
                Varun Gupta and   
                   Mladen Kolar   Dynamic Regret Minimization for Control
                                  of Non-stationary Linear Dynamical
                                  Systems  . . . . . . . . . . . . . . . . 9:1--9:72
            Sandeepa Bhuyan and   
                Shulin Zhao and   
                  Ziyu Ying and   
         Mahmut T. Kandemir and   
                   Chita R. Das   End-to-end Characterization of Game
                                  Streaming Applications on Mobile
                                  Platforms  . . . . . . . . . . . . . . . 10:1--10:25
                Ranvir Rana and   
             Sreeram Kannan and   
                  David Tse and   
               Pramod Viswanath   Free2Shard: Adversary-resistant
                                  Distributed Resource Allocation for
                                  Blockchains  . . . . . . . . . . . . . . 11:1--11:38
                Yaxiong Xie and   
                  Kyle Jamieson   NG-Scope: Fine-Grained Telemetry for
                                  NextG Cellular Networks  . . . . . . . . 12:1--12:26
         Sebastian Allmeier and   
                   Nicolas Gast   Mean Field and Refined Mean Field
                                  Approximations for Heterogeneous
                                  Systems: It Works! . . . . . . . . . . . 13:1--13:43
                Jihyun Ryoo and   
     Mahmut Taylan Kandemir and   
                Mustafa Karakoy   Memory Space Recycling . . . . . . . . . 14:1--14:24
               Dongwei Xiao and   
                  Zhibo LIU and   
              Yuanyuan Yuan and   
                    Qi Pang and   
                     Shuai Wang   Metamorphic Testing of Deep Learning
                                  Compilers  . . . . . . . . . . . . . . . 15:1--15:28
                Sina Darabi and   
               Negin Mahani and   
             Hazhir Baxishi and   
Ehsan Yousefzadeh-Asl-Miandoab and   
       Mohammad Sadrosadati and   
             Hamid Sarbazi-Azad   NURA: a Framework for Supporting
                                  Non-Uniform Resource Accesses in GPUs    16:1--16:27
                  Weici Pan and   
                 Guanya Shi and   
                 Yiheng Lin and   
                   Adam Wierman   Online Optimization with Feedback Delay
                                  and Nonlinear Switching Cost . . . . . . 17:1--17:34
                 Tongxin Li and   
               Ruixiao Yang and   
                 Guannan Qu and   
                 Guanya Shi and   
                 Chenkai Yu and   
               Adam Wierman and   
                     Steven Low   Robustness and Consistency in Linear
                                  Quadratic Control with Untrusted
                                  Predictions  . . . . . . . . . . . . . . 18:1--18:35
                Zaiwei Chen and   
               Shancong Mou and   
            Siva Theja Maguluri   Stationary Behavior of Constant Stepsize
                                  SGD Type Algorithms: an Asymptotic
                                  Characterization . . . . . . . . . . . . 19:1--19:24
                Yueyang Pan and   
                  Ruihan Li and   
                     Chenren Xu   The First 5G-LTE Comparative Study in
                                  Extreme Mobility . . . . . . . . . . . . 20:1--20:22
        Christina Giannoula and   
             Ivan Fernandez and   
     Juan Gómez Luna and   
          Nectarios Koziris and   
            Georgios Goumas and   
                     Onur Mutlu   SparseP: Towards Efficient Sparse Matrix
                                  Vector Multiplication on Real
                                  Processing-In-Memory Architectures . . . 21:1--21:49
                 Minhu Wang and   
                 Mingwei Xu and   
                    Jianping Wu   Understanding I/O Direct Cache Access
                                  Performance for End Host Networking  . . 22:1--22:37
                    Wei Liu and   
                Xinlei Yang and   
                    Hao Lin and   
                 Zhenhua Li and   
                      Feng Qian   Fusing Speed Index during Web Page
                                  Loading  . . . . . . . . . . . . . . . . 23:1--23:23

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 6, Number 2, June, 2022

            Niklas Carlsson and   
                Edith Cohen and   
                Philippe Robert   POMACS V6, N2, June 2022 Editorial . . . 24:1--24:??
                  Lingda Li and   
             Santosh Pandey and   
               Thomas Flynn and   
                   Hang Liu and   
               Noel Wheeler and   
                  Adolfy Hoisie   SimNet: Accurate and High-Performance
                                  Computer Architecture Simulation using
                                  Deep Learning  . . . . . . . . . . . . . 25:1--25:??
             Ashraf Mahgoub and   
        Edgardo Barsallo Yi and   
           Karthick Shankar and   
             Eshaan Minocha and   
             Sameh Elnikety and   
             Saurabh Bagchi and   
                Somali Chaterji   WISEFUSE: Workload Characterization and
                                  DAG Transformation for Serverless
                                  Workflows  . . . . . . . . . . . . . . . 26:1--26:??
                Matthew Faw and   
   Orestis Papadigenopoulos and   
      Constantine Caramanis and   
              Sanjay Shakkottai   Learning To Maximize Welfare with a
                                  Reusable Resource  . . . . . . . . . . . 27:1--27:??
                 Pengfei Li and   
                Jianyi Yang and   
                    Shaolei Ren   Expert-Calibrated Learning for Online
                                  Optimization with Switching Costs  . . . 28:1--28:??
             Gyeongsik Yang and   
             Changyong Shin and   
              Jeunghwan Lee and   
                 Yeonho Yoo and   
                      Chuck Yoo   Prediction of the Resource Consumption
                                  of Distributed Deep Learning Systems . . 29:1--29:??
        Mohammadamin Ajdari and   
               Patrick Raaf and   
            Mostafa Kishani and   
            Reza Salkhordeh and   
              Hossein Asadi and   
         André Brinkmann   An Enterprise-Grade Open-Source Data
                                  Reduction Architecture for All-Flash
                                  Storage Systems  . . . . . . . . . . . . 30:1--30:??
             Anne Bouillard and   
              Paul Nikolaus and   
                   Jens Schmitt   Unleashing the Power of Paying
                                  Multiplexing Only Once in Stochastic
                                  Network Calculus . . . . . . . . . . . . 31:1--31:??
         Albert Senen-Cerda and   
                  Jaron Sanders   Asymptotic Convergence Rate of Dropout
                                  on Shallow Linear Neural Networks  . . . 32:1--32:??
               Yunming Xiao and   
            Matteo Varvello and   
          Aleksandar Kuzmanovic   Monetizing Spare Bandwidth: The Case of
                                  Distributed VPNs . . . . . . . . . . . . 33:1--33:??
                   Lin Yang and   
        Yu-Zhen Janice Chen and   
    Mohammad H. Hajiesmaili and   
              Mark Herbster and   
                    Don Towsley   Hierarchical Learning Algorithms for
                                  Multi-scale Expert Problems  . . . . . . 34:1--34:??
              Haris Bin Zia and   
             Aravindh Raman and   
             Ignacio Castro and   
       Ishaku Hassan Anaobi and   
     Emiliano De Cristofaro and   
            Nishanth Sastry and   
                   Gareth Tyson   Toxicity in the Decentralized Web and
                                  the Potential for Model Sharing  . . . . 35:1--35:??
                 Qiulin Lin and   
                 Yanfang Mo and   
                  Junyan Su and   
                   Minghua Chen   Competitive Online Optimization with
                                  Multiple Inventories: a
                                  Divide-and-Conquer Approach  . . . . . . 36:1--36:??
            Chenxingyu Zhao and   
                Tapan Chugh and   
                Jaehong Min and   
                   Ming Liu and   
           Arvind Krishnamurthy   Dremel: Adaptive Configuration Tuning of
                                  RocksDB KV-Store . . . . . . . . . . . . 37:1--37:??
           Shivang Aggarwal and   
  Srisai Karthik Neelamraju and   
                  Ajit Bhat and   
        Dimitrios Koutsonikolas   A Detailed Look at MIMO Performance in
                                  60 GHz WLANs . . . . . . . . . . . . . . 38:1--38:??
           Christina Lee Yu and   
                       Xumei Xi   Tensor Completion with Nearly Linear
                                  Samples Given Weak Side Information  . . 39:1--39:??
                   Liu Wang and   
                 Haoyu Wang and   
                     Ren He and   
                    Ran Tao and   
                Guozhu Meng and   
                  Xiapu Luo and   
                    Xuanzhe Liu   MalRadar: Demystifying Android Malware
                                  in the New Era . . . . . . . . . . . . . 40:1--40:??
             Sheng-Chun Kao and   
              Hyoukjun Kwon and   
           Michael Pellauer and   
         Angshuman Parashar and   
                 Tushar Krishna   A Formalism of DNN Accelerator
                                  Flexibility  . . . . . . . . . . . . . . 41:1--41:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 6, Number 3, December, 2022

     Konstantin Avrachenkov and   
              Phillipa Gill and   
               Bhuvan Urgaonkar   POMACS V6, N3 December 2022 Editorial    42:1--42:??
               Kailong Wang and   
                  Yuxi Ling and   
               Yanjun Zhang and   
                    Zhou Yu and   
                 Haoyu Wang and   
              Guangdong Bai and   
              Beng Chin Ooi and   
                  Jin Song Dong   Characterizing Cryptocurrency-themed
                                  Malicious Browser Extensions . . . . . . 43:1--43:??
            Prashanthi S. K and   
    Sai Anuroop Kesanapalli and   
                 Yogesh Simmhan   Characterizing the Performance of
                                  Accelerated Jetson Edge Devices for
                                  Training Deep Learning Models  . . . . . 44:1--44:??
              Mozhengfu Liu and   
                    Xueyan Tang   Dynamic Bin Packing with Predictions . . 45:1--45:??
             Tareq Si Salem and   
         Georgios Iosifidis and   
                Giovanni Neglia   Enabling Long-term Fairness in Dynamic
                                  Resource Allocation  . . . . . . . . . . 46:1--46:??
                Yunzhuo Liu and   
                   Bo Jiang and   
                   Tian Guo and   
               Zimeng Huang and   
                  Wenhao Ma and   
               Xinbing Wang and   
                   Chenghu Zhou   FuncPipe: a Pipelined Serverless
                                  Framework for Fast and Cost-Efficient
                                  Training of Deep Learning Models . . . . 47:1--47:??
              Naram Mhaisen and   
             Abhishek Sinha and   
           Georgios Paschos and   
               George Iosifidis   Optimistic No-regret Algorithms for
                                  Discrete Caching . . . . . . . . . . . . 48:1--48:??
           Daniele De Sensi and   
         Tiziano De Matteis and   
         Konstantin Taranov and   
      Salvatore Di Girolamo and   
                Tobias Rahn and   
                Torsten Hoefler   Noise in the Clouds: Influence of
                                  Network Performance Variability on
                                  Application Scalability  . . . . . . . . 49:1--49:??
                Benny Van Houdt   On the Stochastic and Asymptotic
                                  Improvement of First-Come First-Served
                                  and Nudge Scheduling . . . . . . . . . . 50:1--50:??
               Isaac Grosof and   
                 Ziv Scully and   
         Mor Harchol-Balter and   
             Alan Scheller-Wolf   Optimal Scheduling in the
                                  Multiserver-job Model under Heavy
                                  Traffic  . . . . . . . . . . . . . . . . 51:1--51:??
                  Yilin Liu and   
               Shijia Zhang and   
              Mahanth Gowda and   
             Srihari Nelakuditi   Leveraging the Properties of mmWave
                                  Signals for $3$D Finger Motion Tracking
                                  for Interactive IoT Applications . . . . 52:1--52:??
                Daniel Vial and   
          Sanjay Shakkottai and   
                     R. Srikant   Robust Multi-Agent Bandits Over
                                  Undirected Graphs  . . . . . . . . . . . 53:1--53:??
                 Shuang Cui and   
                    Kai Han and   
                  Jing Tang and   
                   He Huang and   
                 Xueying Li and   
                       Zhiyu Li   Streaming Algorithms for Constrained
                                  Submodular Maximization  . . . . . . . . 54:1--54:??
                Igor Kadota and   
                Dror Jacoby and   
               Hagit Messer and   
                Gil Zussman and   
            Jonatan Ostrometzky   Switching in the Rain: Predictive
                                  Wireless x-haul Network Reconfiguration  55:1--55:??
         Jalani K. Williams and   
         Mor Harchol-Balter and   
                     Weina Wang   The M/M/$k$ with Deterministic Setup
                                  Times  . . . . . . . . . . . . . . . . . 56:1--56:??
                     Bo Sun and   
                   Lin Yang and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
             John C. S. Lui and   
                Don Towsley and   
              Danny H. K. Tsang   The Online Knapsack Problem with
                                  Departures . . . . . . . . . . . . . . . 57:1--57:??
                  Xinzhe Fu and   
                  Eytan Modiano   Joint Learning and Control in Stochastic
                                  Queueing Networks with Unknown Utilities 58:1--58:??
 Ali Hossein Abbasi Abyaneh and   
                 Maizi Liao and   
             Seyed Majid Zahedi   Malcolm: Multi-agent Learning for
                                  Cooperative Load Management at Rack
                                  Scale  . . . . . . . . . . . . . . . . . 59:1--59:??


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 7, Number 1, March, 2023

     Konstantin Avrachenkov and   
              Phillipa Gill and   
               Bhuvan Urgaonkar   POMACS V7, N1, March 2023 Editorial  . . 1:1--1:??
              Vamsi Addanki and   
                  Chen Avin and   
                  Stefan Schmid   Mars: Near-Optimal Throughput with
                                  Shallow Buffers in Reconfigurable
                                  Datacenter Networks  . . . . . . . . . . 2:1--2:??
                Wangkai Jin and   
                  Xiangjun Peng   SLITS: Sparsity-Lightened Intelligent
                                  Thread Scheduling  . . . . . . . . . . . 3:1--3:??
               Rashna Kumar and   
                  Sana Asif and   
                  Elise Lee and   
           Fabian E. Bustamante   Each at its Own Pace: Third-Party
                                  Dependency and Centralization Around the
                                  World  . . . . . . . . . . . . . . . . . 4:1--4:??
                Fengjiao Li and   
                Xingyu Zhou and   
                          Bo Ji   (Private) Kernelized Bandits with
                                  Distributed Biased Feedback  . . . . . . 5:1--5:??
                Canhui Chen and   
                   Zhixuan Fang   Gacha Game Analysis and Design . . . . . 6:1--6:??
               Marco Chiesa and   
          Fábio L. Verdi   Network Monitoring on Multi-Pipe
                                  Switches . . . . . . . . . . . . . . . . 8:1--8:??
             Mingming Zhang and   
                   Xiang Li and   
                 Baojun Liu and   
                  Jianyu Lu and   
               Yiming Zhang and   
               Jianjun Chen and   
                Haixin Duan and   
                 Shuang Hao and   
                 Xiaofeng Zheng   Detecting and Measuring Security Risks
                                  of Hosting-Based Dangling Domains  . . . 9:1--9:??
              Itamar Gozlan and   
                  Chen Avin and   
               Gil Einziger and   
               Gabriel Scalosub   Go-to-Controller is Better: Efficient
                                  and Optimal LPM Caching with Splicing    10:1--10:??
                Daan Rutten and   
       Nicolas Christianson and   
         Debankur Mukherjee and   
                   Adam Wierman   Smoothed Online Optimization with
                                  Unreliable Predictions . . . . . . . . . 12:1--12:??
               Yizhou Zhang and   
                 Guannan Qu and   
                     Pan Xu and   
                 Yiheng Lin and   
                Zaiwei Chen and   
                   Adam Wierman   Global Convergence of Localized Policy
                                  Iteration in Networked Multi-Agent
                                  Reinforcement Learning . . . . . . . . . 13:1--13:??
               Usama Naseer and   
           Theophilus A. Benson   JS Capsules: a Framework for Capturing
                                  Fine-grained JavaScript Memory
                                  Measurements for the Mobile Web  . . . . 14:1--14:??
                 Wenzhe Zhu and   
                 Yongkun Li and   
                    Erci Xu and   
                     Fei Li and   
                 Yinlong Xu and   
                 John C. S. Lui   DiffForward: On Balancing Forwarding
                                  Traffic for Modern Cloud Block Services
                                  via Differentiated Forwarding  . . . . . 15:1--15:??
        Christina Giannoula and   
              Kailong Huang and   
              Jonathan Tang and   
          Nectarios Koziris and   
            Georgios Goumas and   
             Zeshan Chishti and   
             Nandita Vijaykumar   DaeMon: Architectural Support for
                                  Efficient Data Movement in Fully
                                  Disaggregated Systems  . . . . . . . . . 16:1--16:??
                  Haoran Lu and   
             Qingchuan Zhao and   
             Yongliang Chen and   
              Xiaojing Liao and   
                   Zhiqiang Lin   Detecting and Measuring Aggressive
                                  Location Harvesting in Mobile Apps via
                                  Data-flow Path Embedding . . . . . . . . 18:1--18:??
             Kyle MacMillan and   
               Tarun Mangla and   
                James Saxon and   
          Nicole P. Marwell and   
                  Nick Feamster   A Comparative Analysis of Ookla
                                  Speedtest and Measurement Labs Network
                                  Diagnostic Test (NDT7) . . . . . . . . . 19:1--19:??
            Johannes Zerwas and   
         Csaba Györgyi and   
              Andreas Blenk and   
              Stefan Schmid and   
                      Chen Avin   Duo: a High-Throughput Reconfigurable
                                  Datacenter Network Using Local Routing
                                  and Control  . . . . . . . . . . . . . . 20:1--20:??
                 Amanda Hsu and   
                   Frank Li and   
                    Paul Pearce   Fiat Lux: Illuminating IPv6
                                  Apportionment with Different Datasets    21:1--21:??
         Alexander Goldberg and   
               Giulia Fanti and   
                  Nihar B. Shah   Batching of Tasks by Users of
                                  Pseudonymous Forums: Anonymity
                                  Compromise and Protection  . . . . . . . 22:1--22:??
         Sebastian Allmeier and   
                   Nicolas Gast   Bias and Refinement of Multiscale Mean
                                  Field Models . . . . . . . . . . . . . . 23:1--23:??
             Serkut Ayvasik and   
              Fidan Mehmeti and   
             Edwin Babaians and   
              Wolfgang Kellerer   PEACH: Proactive and Environment-Aware
                                  Channel State Information Prediction
                                  with Depth Images  . . . . . . . . . . . 24:1--24:??
                Ruofeng Liu and   
                   Nakjung Choi   A First Look at Wi-Fi 6 in Action:
                                  Throughput, Latency, Energy Efficiency,
                                  and Security . . . . . . . . . . . . . . 25:1--25:??
                    Jing Yu and   
                 Dimitar Ho and   
                   Adam Wierman   Online Adversarial Stabilization of
                                  Unknown Networked Systems  . . . . . . . 26:1--26:??
               Hongyuan Liu and   
              Sreepathi Pai and   
                     Adwait Jog   Asynchronous Automata Processing on GPUs 27:1--27:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 7, Number 2, June, 2023

     Konstantin Avrachenkov and   
              Phillipa Gill and   
               Bhuvan Urgaonkar   POMACS V7, N2, June 2023 Editorial . . . 28:1--28:??
                  Tyler Sam and   
                Yudong Chen and   
               Christina Lee Yu   Overcoming the Long Horizon Barrier for
                                  Sample-Efficient Reinforcement Learning
                                  with Latent Low-Rank Structure . . . . . 29:1--29:??
              Adithya Kumar and   
      Anand Sivasubramaniam and   
                    Timothy Zhu   SplitRPC: a Control + Data Path
                                  Splitting RPC Stack for ML Inference
                                  Serving  . . . . . . . . . . . . . . . . 30:1--30:??
                 Ding Zhang and   
Panneer Selvam Santhalingam and   
               Parth Pathak and   
                   Zizhan Zheng   CoBF: Coordinated Beamforming in Dense
                                  mmWave Networks  . . . . . . . . . . . . 31:1--31:??
               Weizhao Tang and   
            Lucianna Kiffer and   
               Giulia Fanti and   
                      Ari Juels   Strategic Latency Reduction in
                                  Blockchain Peer-to-Peer Networks . . . . 32:1--32:??
                     Yi Liu and   
               Shouqian Shi and   
                Minghao Xie and   
                Heiner Litz and   
                      Chen Qian   Smash: Flexible, Fast, and
                                  Resource-efficient Placement and Lookup
                                  of Distributed Storage . . . . . . . . . 33:1--33:??
                 Haibo Wang and   
     Dimitrios Melissourgos and   
                  Chaoyi Ma and   
                   Shigang Chen   Real-time Spread Burst Detection in Data
                                  Streaming  . . . . . . . . . . . . . . . 35:1--35:??
                 Jiaxin Lin and   
                     Tao Ji and   
              Xiangpeng Hao and   
                 Hokeun Cha and   
                 Yanfang Le and   
                Xiangyao Yu and   
                  Aditya Akella   Towards Accelerating Data Intensive
                                  Application's Shuffle Process Using
                                  SmartNICs  . . . . . . . . . . . . . . . 36:1--36:??
             Hasan Al Maruf and   
               Yuhong Zhong and   
                Hongyi Wang and   
         Mosharaf Chowdhury and   
                 Asaf Cidon and   
               Carl Waldspurger   Memtrade: Marketplace for Disaggregated
                                  Memory Clouds  . . . . . . . . . . . . . 41:1--41:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 7, Number 3, December, 2023

               Florin Ciucu and   
               Giulia Fanti and   
                 Rhonda Righter   POMACS V7, N3, December 2023 Editorial   42:1--42:??
     Mohammad Bakhshalipour and   
             Phillip B. Gibbons   Agents of Autonomy: a Systematic Study
                                  of Robotics on Modern Hardware . . . . . 43:1--43:??
       Andrea Monterubbiano and   
            Jonatan Langlet and   
              Stefan Walzer and   
             Gianni Antichi and   
            Pedro Reviriego and   
           Salvatore Pontarelli   Lightweight Acquisition and Ranging of
                                  Flows in the Data Plane  . . . . . . . . 44:1--44:??
             Adam Lechowicz and   
       Nicolas Christianson and   
                Jinhang Zuo and   
               Noman Bashir and   
       Mohammad Hajiesmaili and   
               Adam Wierman and   
                Prashant Shenoy   The Online Pause and Resume Problem:
                                  Optimal Algorithms and An Application to
                                  Carbon-Aware Load Shifting . . . . . . . 45:1--45:??
       Alagappan Ramanathan and   
          Sangeetha Abdu Jyothi   Nautilus: a Framework for Cross-Layer
                                  Cartography of Submarine Cables and IP
                                  Links  . . . . . . . . . . . . . . . . . 46:1--46:??
           Esteban Carisimo and   
              Caleb J. Wang and   
                 Mia Weaver and   
Fabián E. Bustamante and   
                   Paul Barford   A Hop Away from Everywhere: a View of
                                  the Intercontinental Long-haul
                                  Infrastructure . . . . . . . . . . . . . 47:1--47:??
                  Yige Hong and   
                Qiaomin Xie and   
                     Weina Wang   Near-Optimal Stochastic Bin-Packing in
                                  Large Service Systems with Time-Varying
                                  Item Sizes . . . . . . . . . . . . . . . 48:1--48:??
                  Peter Cai and   
                 Martin Karsten   Kernel vs. User-Level Networking: Don't
                                  Throw Out the Stack with the Interrupts  49:1--49:??
        Christos Tsanikidis and   
                  Javad Ghaderi   Near-Optimal Packet Scheduling in
                                  Multihop Networks with End-to-End
                                  Deadline Constraints . . . . . . . . . . 50:1--50:??
               Jintao Huang and   
                  Ningyu He and   
                     Kai Ma and   
                 Jiang Xiao and   
                     Haoyu Wang   Miracle or Mirage? A Measurement Study
                                  of NFT Rug Pulls . . . . . . . . . . . . 51:1--51:??
                     Kai Li and   
               Shixuan Guan and   
                     Darren Lee   Towards Understanding and Characterizing
                                  the Arbitrage Bot Scam In the Wild . . . 52:1--52:??
      Simon Lindståhl and   
        Alexandre Proutiere and   
               Andreas Johnsson   Change Point Detection with Adaptive
                                  Measurement Schedules for Network
                                  Performance Verification . . . . . . . . 53:1--53:??
                Yicheng Pan and   
                 Yang Zhang and   
                 Tingzhu Bi and   
                 Linlin Han and   
                   Yu Zhang and   
                    Meng Ma and   
           Xiangzhuang Shen and   
               Xinrui Jiang and   
                  Feng Wang and   
                   Xian Liu and   
                      Ping Wang   HEAL: Performance Troubleshooting Deep
                                  inside Data Center Hosts . . . . . . . . 54:1--54:??
                Minzhao Lyu and   
         Rahul Dev Tripathi and   
                Vijay Sivaraman   MetaVRadar: Measuring Metaverse Virtual
                                  Reality Network Activity . . . . . . . . 55:1--55:??
            Stella Bitchebe and   
                  Yves Kone and   
             Pierre Olivier and   
            Jalil Boukhobza and   
Yérom-David Bromberg and   
            Daniel Hagimont and   
                   Alain Tchana   GuaNary: Efficient Buffer Overflow
                                  Detection In Virtualized Clouds Using
                                  Intel EPT-based Sub-Page Write
                                  Protection Support . . . . . . . . . . . 56:1--56:??
            Walid A. Hanafy and   
              Qianlin Liang and   
               Noman Bashir and   
                David Irwin and   
                Prashant Shenoy   CarbonScaler: Leveraging Cloud Workload
                                  Elasticity for Optimizing
                                  Carbon-Efficiency  . . . . . . . . . . . 57:1--57:??
                 Yudi Huang and   
                  Yilei Lin and   
                        Ting He   Optimized Cross-Path Attacks via
                                  Adversarial Reconnaissance . . . . . . . 58:1--58:??
                Euijin Choo and   
             Mohamed Nabeel and   
                 Doowon Kim and   
           Ravindu De Silva and   
                    Ting Yu and   
                    Issa Khalil   A Large Scale Study and Classification
                                  of VirusTotal Reports on Phishing and
                                  Malware URLs . . . . . . . . . . . . . . 59:1--59:??
                  Jiayu Pan and   
                    Yin Sun and   
                 Ness B. Shroff   Sampling for Remote Estimation of the
                                  Wiener Process over an Unreliable
                                  Channel  . . . . . . . . . . . . . . . . 60:1--60:??
                Avi Mizrahi and   
           Daniella Bar-Lev and   
              Eitan Yaakobi and   
              Ori Rottenstreich   Invertible Bloom Lookup Tables with
                                  Listing Guarantees . . . . . . . . . . . 61:1--61:??
           Venkatraman Iyer and   
                 Sungho Lee and   
                  Semun Lee and   
         Juitem Joonwoo Kim and   
                Hyunjun Kim and   
                  Youngjae Shin   Automated Backend Allocation for
                                  Multi-Model, On-Device AI Inference  . . 62:1--62:??


Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 8, Number 1, March, 2024

               Florin Ciucu and   
               Giulia Fanti and   
                 Rhonda Righter   POMACS V8, N1, March 2024 Editorial  . . 1:1--1:??
             Rohan Basu Roy and   
                  Devesh Tiwari   StarShip: Mitigating I/O Bottlenecks in
                                  Serverless Computing for Scientific
                                  Workflows  . . . . . . . . . . . . . . . 2:1--2:??
                Radu Anghel and   
         Yury Zhauniarovich and   
     Carlos Gañán   Who's Got My Back? Measuring the
                                  Adoption of an Internet-wide BGP RTBH
                                  Service  . . . . . . . . . . . . . . . . 3:1--3:??
                Jianyi Yang and   
                 Pengfei Li and   
     Mohammad Jaminur Islam and   
                    Shaolei Ren   Online Allocation with Replenishable
                                  Budgets: Worst Case and Beyond . . . . . 4:1--4:??
            Gilbert Jonatan and   
                Haeyoon Cho and   
                 Hyojun Son and   
                 Xiangyu Wu and   
               Neal Livesay and   
                Evelio Mora and   
         Kaustubh Shivdikar and   
José L. Abellán and   
                 Ajay Joshi and   
                David Kaeli and   
                       John Kim   Scalability Limitations of
                                  Processing-in-Memory using Real System
                                  Evaluations  . . . . . . . . . . . . . . 5:1--5:??
             Huaifeng Zhang and   
        Mohannad Alhanahnah and   
     Fahmi Abdulqadir Ahmed and   
                Dyako Fatih and   
            Philipp Leitner and   
                Ahmed Ali-Eldin   Machine Learning Systems are Bloated and
                                  Vulnerable . . . . . . . . . . . . . . . 6:1--6:??
         Chi-Jen (Roger) Lo and   
           Mahesh K. Marina and   
            Nishanth Sastry and   
                     Kai Xu and   
               Saeed Fadaei and   
                        Yong Li   Shrinking VOD Traffic via Rényi--Entropic
                                  Optimal Transport  . . . . . . . . . . . 7:1--7:??
                Scott Cheng and   
              Jun-Liang Lin and   
               Murali Emani and   
        Siddhisanket Raskar and   
                Sam Foreman and   
                   Zhen Xie and   
       Venkatram Vishwanath and   
         Mahmut Taylan Kandemir   Thorough Characterization and Analysis
                                  of Large Transformer Model Training
                                  At-Scale . . . . . . . . . . . . . . . . 8:1--8:??
                 Runhan Xie and   
               Isaac Grosof and   
                     Ziv Scully   Heavy-Traffic Optimal Size- and
                                  State-Aware Dispatching  . . . . . . . . 9:1--9:??
                 Neil Ortiz and   
         Alvaro A. Cardenas and   
                   Avishai Wool   SCADA World: an Exploration of the
                                  Diversity in Power Grid Networks . . . . 10:1--10:??
                   Xi Jiang and   
                 Shinan Liu and   
      Aaron Gember-Jacobson and   
        Arjun Nitin Bhagoji and   
               Paul Schmitt and   
         Francesco Bronzino and   
                  Nick Feamster   NetDiffusion: Network Data Augmentation
                                  Through Protocol-Constrained Traffic
                                  Generation . . . . . . . . . . . . . . . 11:1--11:??
           Negar Akbarzadeh and   
                Sina Darabi and   
       Atiyeh Gheibi-Fetrat and   
               Amir Mirzaei and   
       Mohammad Sadrosadati and   
             Hamid Sarbazi-Azad   H$3$DM: a High-bandwidth High-capacity
                                  Hybrid $3$D Memory Design for GPUs . . . 12:1--12:??
             Liz Izhikevich and   
                 Manda Tran and   
       Katherine Izhikevich and   
             Gautam Akiwate and   
                Zakir Durumeric   Democratizing LEO Satellite Network
                                  Measurement  . . . . . . . . . . . . . . 13:1--13:??
               Nicolas Gast and   
                Benny Van Houdt   Approximations to Study the Impact of
                                  the Service Discipline in Systems with
                                  Redundancy . . . . . . . . . . . . . . . 14:1--14:??
        Giovane C. M. Moura and   
               Marco Davids and   
          Caspar Schutijser and   
         Cristian Hesselman and   
             John Heidemann and   
           Georgios Smaragdakis   Deep Dive into NTP Pool's Popularity and
                                  Mapping  . . . . . . . . . . . . . . . . 15:1--15:??
       Alagappan Ramanathan and   
           Rishika Sankaran and   
          Sangeetha Abdu Jyothi   Xaminer: an Internet Cross-Layer
                                  Resilience Analysis Tool . . . . . . . . 16:1--16:??
                Fatih Aslan and   
           George Iosifidis and   
       Jose A. Ayala-Romero and   
     Andres Garcia-Saavedra and   
             Xavier Costa-Perez   Fair Resource Allocation in Virtualized
                                  O-RAN Platforms  . . . . . . . . . . . . 17:1--17:??

Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)
Volume 8, Number 2, June, 2024

               Florin Ciucu and   
               Giulia Fanti and   
                 Rhonda Righter   POMACS V8, N2, June 2024 Editorial . . . 18:1--18:??
              Lingdong Wang and   
               Simran Singh and   
           Jacob Chakareski and   
       Mohammad Hajiesmaili and   
            Ramesh K. Sitaraman   BONES: Near-Optimal Neural-Enhanced
                                  Video Streaming  . . . . . . . . . . . . 19:1--19:??
                 Ruizhe Shi and   
               Ruizhi Cheng and   
                     Bo Han and   
                  Yue Cheng and   
                  Songqing Chen   A Closer Look into IPFS: Accessibility,
                                  Content, and Performance . . . . . . . . 20:1--20:??
              Kahlil Dozier and   
          Loqman Salamatian and   
                 Dan Rubenstein   Analysis of False Negative Rates for
                                  Recycling Bloom Filters (Yes, They
                                  Happen!) . . . . . . . . . . . . . . . . 21:1--21:??
                Tianyue Chu and   
             Nikolaos Laoutaris   FedQV: Leveraging Quadratic Voting in
                                  Federated Learning . . . . . . . . . . . 22:1--22:??
               Qingsong Liu and   
                   Zhixuan Fang   Learning the Optimal Control for
                                  Evolving Systems with Converging
                                  Dynamics . . . . . . . . . . . . . . . . 23:1--23:??
           Ellen Cardinaels and   
                  Sem Borst and   
    Johan S. H. van Leeuwaarden   Multi-dimensional State Space Collapse
                                  in Non-complete Resource Pooling
                                  Scenarios  . . . . . . . . . . . . . . . 24:1--24:??
              Yiguang Zhang and   
      Reetahan Mukhopadhyay and   
            Augustin Chaintreau   Network Fairness Ambivalence: When does
                                  social network capital mitigate or
                                  amplify unfairness?  . . . . . . . . . . 25:1--25:??
           Diego Goldsztajn and   
               Sem C. Borst and   
    Johan S. H. van Leeuwaarden   Server Saturation in Skewed Networks . . 26:1--26:??
                  George Yu and   
                     Ziv Scully   Strongly Tail-Optimal Scheduling in the
                                  Light-Tailed M/G/1 . . . . . . . . . . . 27:1--27:??
             Santosh Pandey and   
          Amir Yazdanbakhsh and   
                       Hang Liu   TAO: Re-Thinking DL-based
                                  Microarchitecture Simulation . . . . . . 28:1--28:??