Last update:
Tue Aug 20 07:31:43 MDT 2024
Augustin Chaintreau and Leana Golubchik and Zhi-Li Zhang Editorial . . . . . . . . . . . . . . . 1:1--1:?? Mathias Gibbens and Chris Gniady and Lei Ye and Beichuan Zhang Hadoop on Named Data Networking: Experience and Results . . . . . . . . . 2:1--2:?? Long Gong and Paul Tune and Liang Liu and Sen Yang and Jun (Jim) Xu Queue-Proportional Sampling: A Better Approach to Crossbar Scheduling for Input-Queued Switches . . . . . . . . . 3:1--3:?? Alan Quach and Zhongjie Wang and Zhiyun Qian Investigation of the 2016 Linux TCP Stack Vulnerability at Scale . . . . . . 4:1--4:?? Prateek Sharma and David Irwin and Prashant Shenoy Portfolio-driven Resource Management for Transient Cloud Servers . . . . . . . . 5:1--5:?? Yi Cao and Javad Nejati and Muhammad Wajahat and Aruna Balasubramanian and Anshul Gandhi Deconstructing the Energy Consumption of the Mobile Page Load . . . . . . . . . . 6:1--6:?? Xin Wang and Richard T. B. Ma and Yinlong Xu On Optimal Two-Sided Pricing of Congested Networks . . . . . . . . . . . 7:1--7:?? Giuliano Casale Accelerating Performance Inference over Closed Systems by Asymptotic Methods . . 8:1--8:?? Xiaoen Ju and Hani Jamjoom and Kang G. Shin Hieroglyph: Locally-Sufficient Graph Processing via Compute--Sync--Merge . . 9:1--9:?? Kevin K. Chang and A. Giray Ya\ualikçi and Saugata Ghose and Aditya Agrawal and Niladrish Chatterjee and Abhijith Kashyap and Donghyuk Lee and Mike O'Connor and Hasan Hassan and Onur Mutlu Understanding Reduced-Voltage Operation in Modern DRAM Devices: Experimental Characterization, Analysis, and Mechanisms . . . . . . . . . . . . . . . 10:1--10:?? Cheng Wang and Bhuvan Urgaonkar and Neda Nasiriani and George Kesidis Using Burstable Instances in the Public Cloud: Why, When and How? . . . . . . . 11:1--11:?? Lei Ying Stein's Method for Mean Field Approximations in Light and Heavy Traffic Regimes . . . . . . . . . . . . 12:1--12:?? Sinong Wang and Ness Shroff Security Game with Non-additive Utilities and Multiple Attacker Resources . . . . . . . . . . . . . . . 13:1--13:?? Lingda Li and Robel Geda and Ari B. Hayes and Yanhao Chen and Pranav Chaudhari and Eddy Z. Zhang and Mario Szegedy A Simple Yet Effective Balanced Edge Partition Model for Parallel Computing 14:1--14:?? You Zhou and Yian Zhou and Min Chen and Shigang Chen Persistent Spread Measurement for Big Network Data Based on Register Intersection . . . . . . . . . . . . . . 15:1--15:?? Steffen Bondorf and Paul Nikolaus and Jens B. Schmitt Quality and Cost of Deterministic Network Calculus: Design and Evaluation of an Accurate and Fast Analysis . . . . 16:1--16:?? Nicolas Gast Expected Values Estimated via Mean-Field Approximation are $ 1 / N $-Accurate . . 17:1--17:?? Brandon Wang and Xiaoye Li and Leandro P. de Aguiar and Daniel S. Menasche and Zubair Shafiq Characterizing and Modeling Patching Practices of Industrial Control Systems 18:1--18:?? David Formby and Anwar Walid and Raheem Beyah A Case Study in Power Substation Network Dynamics . . . . . . . . . . . . . . . . 19:1--19:?? Hung T. Nguyen and Tri P. Nguyen and Tam N. Vu and Thang N. Dinh Outward Influence and Cascade Size Estimation in Billion-scale Networks . . 20:1--20:?? Wonil Choi and Mohammad Arjomand and Myoungsoo Jung and Mahmut Kandemir Exploiting Data Longevity for Enhancing the Lifetime of Flash-based Storage Class Memory . . . . . . . . . . . . . . 21:1--21:?? Shaileshh Bojja Venkatakrishnan and Giulia Fanti and Pramod Viswanath Dandelion: Redesigning the Bitcoin Network for Anonymity . . . . . . . . . 22:1--22:?? Zijun Zhang and Zongpeng Li and Chuan Wu Optimal Posted Prices for Online Cloud Resource Allocation . . . . . . . . . . 23:1--23:?? Wen Sun and Veronique Simon and Sebastien Monnet and Philippe Robert and Pierre Sens Analysis of a Stochastic Model of Replication in Large Distributed Storage Systems: A Mean-Field Approach . . . . . 24:1--24:?? Debankur Mukherjee and Souvik Dhara and Sem C. Borst and Johan S. H. van Leeuwaarden Optimal Service Elasticity in Large-Scale Distributed Systems . . . . 25:1--25:?? Donghyuk Lee and Samira Khan and Lavanya Subramanian and Saugata Ghose and Rachata Ausavarungnirun and Gennady Pekhimenko and Vivek Seshadri and Onur Mutlu Design-Induced Latency Variation in Modern DRAM Chips: Characterization, Analysis, and Latency Reduction Mechanisms . . . . . . . . . . . . . . . 26:1--26:?? Konstantin Avrachenkov and Jasper Goseling and Berksan Serbetci A Low-Complexity Approach to Distributed Cooperative Caching with Geographic Constraints . . . . . . . . . . . . . . 27:1--27:??
Sen Yang and Bill Lin and Jun Xu Safe Randomized Load-Balanced Switching By Diffusing Extra Loads . . . . . . . . 29:1--29:37 Sen Yang and Yan He and Zihui Ge and Dongmei Wang and Jun Xu Predictive Impact Analysis for Designing a Resilient Cellular Backhaul Network 30:1--30:33 Muhammad J. Amjad and Devavrat Shah Censored Demand Estimation in Retail . . 31:1--31:28 Stefan Magureanu and Alexandre Proutiere and Marcus Isaksson and Boxun Zhang Online Learning of Optimally Diverse Rankings . . . . . . . . . . . . . . . . 32:1--32:26 Nicolas Gast and Benny Van Houdt A Refined Mean Field Approximation . . . 33:1--33:28 Sinong Wang and Ness Shroff Towards Fast-Convergence, Low-Delay and Low-Complexity Network Optimization . . 34:1--34:32 Konstantinos Psychas and Javad Ghaderi On Non-Preemptive VM Scheduling in the Cloud . . . . . . . . . . . . . . . . . 35:1--35:29 Lin Yang and Wing Shing Wong and Mohammad H. Hajiesmaili An Optimal Randomized Online Algorithm for QoS Buffer Management . . . . . . . 36:1--36:26 Thinh T. Doan and Carolyn L. Beck and R. Srikant On the Convergence Rate of Distributed Gradient Methods for Finite-Sum Optimization under Communication Delays 37:1--37:27 Reza Aghajani and Xingjie Li and Kavita Ramanan The PDE Method for the Analysis of Randomized Load Balancing Networks . . . 38:1--38:28 Xingyu Zhou and Fei Wu and Jian Tan and Yin Sun and Ness Shroff Designing Low-Complexity Heavy-Traffic Delay-Optimal Load Balancing Schemes: Theory to Algorithms . . . . . . . . . . 39:1--39:30 Benjamin Berg and Jan-Pieter Dorsman and Mor Harchol-Balter Towards Optimality in Parallel Scheduling . . . . . . . . . . . . . . . 40:1--40:30 Thomas Bonald and Céline Comte and Fabien Mathieu Performance of Balanced Fairness in Resource Pools: a Recursive Approach . . 41:1--41:25 Yvonne-Anne Pignolet and Stefan Schmid and Gilles Tredan Tomographic Node Placement Strategies and the Impact of the Routing Model . . 42:1--42:23 Tao B. Schardl and Tyler Denniston and Damon Doucet and Bradley C. Kuszmaul and I-Ting Angelina Lee and Charles E. Leiserson The CSI Framework for Compiler-Inserted Program Instrumentation . . . . . . . . 43:1--43:25 Yudong Chen and Lili Su and Jiaming Xu Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent . . . . . . . . . . . . 44:1--44:25 Xiaomeng Chen and Jiayi Meng and Y. Charlie Hu and Maruti Gupta and Ralph Hasholzner and Venkatesan Nallampatti Ekambaram and Ashish Singh and Srikathyayani Srikanteswara A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis . . . . . . . . . . . . . 45:1--45:28
Shenglin Zhang and Ying Liu and Weibin Meng and Zhiling Luo and Jiahao Bu and Sen Yang and Peixian Liang and Dan Pei and Jun Xu and Yuzhi Zhang and Yu Chen and Hui Dong and Xianping Qu and Lei Song PreFix: Switch Failure Prediction in Datacenter Networks . . . . . . . . . . 2:1--2:29 Rupert Freeman and Seyed Majid Zahedi and Vincent Conitzer and Benjamin C. Lee Dynamic Proportional Sharing: a Game-Theoretic Approach . . . . . . . . 3:1--3:36 Alan Kuhnle and Victoria G. Crawford and My T. Thai Network Resilience and the Length-Bounded Multicut Problem: Reaching the Dynamic Billion-Scale with Guarantees . . . . . . . . . . . . . . . 4:1--4:26 Jian Tan and Guocong Quan and Kaiyi Ji and Ness Shroff On Resource Pooling and Separation for LRU Caching . . . . . . . . . . . . . . 5:1--5:31 Mohammad A. Islam and Luting Yang and Kiran Ranganath and Shaolei Ren Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel . . . . . 6:1--6:33 Santiago Duran and Ina Maria Verloop Asymptotic Optimal Control of Markov-Modulated Restless Bandits . . . 7:1--7:25 Zhaowei Tan and Yuanjie Li and Qianru Li and Zhehui Zhang and Zhehan Li and Songwu Lu Supporting Mobile VR in LTE Networks: How Close Are We? . . . . . . . . . . . 8:1--8:31 Saba Ahmadian and Onur Mutlu and Hossein Asadi ECI-Cache: a High-Endurance and Cost-Efficient I/O Caching Scheme for Virtualized Platforms . . . . . . . . . 9:1--9:34 Buchnik Eliav and Edith Cohen Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity . . . . . . . 10:1--10:19 Qingkai Liang and Eytan Modiano Minimizing Queue Length Regret Under Adversarial Network Models . . . . . . . 11:1--11:32 Xiaohan Wei and Hao Yu and Michael J. Neely Online Learning in Weakly Coupled Markov Decision Processes: a Convergence Time Study . . . . . . . . . . . . . . . . . 12:1--12:38 Donggyu Yun and Alexandre Proutiere and Sumyeong Ahn and Jinwoo Shin and Yung Yi Multi-armed Bandit with Additional Observations . . . . . . . . . . . . . . 13:1--13:22 Debankur Mukherjee and Sem C. Borst and Johan S. H. van Leeuwaarden Asymptotically Optimal Load Balancing Topologies . . . . . . . . . . . . . . . 14:1--14:29 Arjun Anand and Gustavo de Veciana A Whittle's Index Based Approach for QoE Optimization in Wireless Networks . . . 15:1--15:39 Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf SOAP: One Clean Analysis of All Age-Based Scheduling Policies . . . . . 16:1--16:30 Pengfei Zheng and Benjamin C. Lee Hound: Causal Learning for Datacenter-scale Straggler Diagnosis . . 17:1--17:36 Bo Jiang and Philippe Nain and Don Towsley and Saikat Guha On a Class of Stochastic Multilayer Networks . . . . . . . . . . . . . . . . 18:1--18:25 Vlad Nitu and Aram Kocharyan and Hannas Yaya and Alain Tchana and Daniel Hagimont and Hrachya Astsatryan Working Set Size Estimation Techniques in Virtualized Environments: One Size Does not Fit All . . . . . . . . . . . . 19:1--19:22 Xingyu Zhou and Fei Wu and Jian Tan and Kannan Srinivasan and Ness Shroff Degree of Queue Imbalance: Overcoming the Limitation of Heavy-traffic Delay Optimality in Load Balancing Systems . . 21:1--21:41 Kausik Subramanian and Loris D'Antoni and Aditya Akella Synthesis of Fault-Tolerant Distributed Router Configurations . . . . . . . . . 22:1--22:26
Adam Wierman and Aditya Akella Message from the Editors . . . . . . . . 23:1--23:1 Lin Yang and Lei Deng and Mohammad H. Hajiesmaili and Cheng Tan and Wing Shing Wong An Optimal Algorithm for Online Non-Convex Learning . . . . . . . . . . 25:1--25:25 Mowei Wang and Yong Cui and Shihan Xiao and Xin Wang and Dan Yang and Kai Chen and Jun Zhu Neural Network Meets DCN: Traffic-driven Topology Adaptation with Deep Learning 26:1--26:25 Tim Hellemans and Benny Van Houdt On the Power-of-d-choices with Least Loaded Server Selection . . . . . . . . 27:1--27:22 Oleksii Oleksenko and Dmitrii Kuvaiskii and Pramod Bhatotia and Pascal Felber and Christof Fetzer Intel MPX Explained: a Cross-layer Analysis of the Intel MPX System Stack 28:1--28:30 Giulia Fanti and Shaileshh Bojja Venkatakrishnan and Surya Bakshi and Bradley Denby and Shruti Bhargava and Andrew Miller and Pramod Viswanath Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees . . . . . . . . . . . . . . . 29:1--29:35 Thibault Séjourn\`e and Samitha Samaranayake and Siddhartha Banerjee The Price of Fragmentation in Mobility-on-Demand Services . . . . . . 30:1--30:26 Jessica Hoffmann and Constantine Caramanis The Cost of Uncertainty in Curing Epidemics . . . . . . . . . . . . . . . 31:1--31:33 Daniel S. Berger and Nathan Beckmann and Mor Harchol-Balter Practical Bounds on Optimal Caching with Variable Object Sizes . . . . . . . . . 32:1--32:38 Christina Vlachou and Ioannis Pefkianakis and Kyu-Han Kim LTERadar: Towards LTE-Aware Wi-Fi Access Points . . . . . . . . . . . . . . . . . 33:1--33:31 Sem Borst and Martin Zubeldia Delay Scaling in Many-Sources Wireless Networks without Queue State Information 34:1--34:45 Akshay Jain and Mahmoud Khairy and Timothy G. Rogers A Quantitative Evaluation of Contemporary GPU Simulation Methodology 35:1--35:28 Mohammad Sadegh Talebi and Alexandre Proutiere Learning Proportionally Fair Allocations with Low Regret . . . . . . . . . . . . 36:1--36:31
Yixin Luo and Saugata Ghose and Yu Cai and Erich F. Haratsch and Onur Mutlu Improving $3$D NAND Flash Memory Lifetime by Tolerating Early Retention Loss and Process Variation . . . . . . . 37:1--37:48 Saugata Ghose and Abdullah Giray Yaglikçi and Raghav Gupta and Donghyuk Lee and Kais Kudrolli and William X. Liu and Hasan Hassan and Kevin K. Chang and Niladrish Chatterjee and Aditya Agrawal and Mike O'Connor and Onur Mutlu What Your DRAM Power Models Are Not Telling You: Lessons from a Detailed Experimental Study . . . . . . . . . . . 38:1--38:41 Xulong Tang and Ashutosh Pattnaik and Onur Kayiran and Adwait Jog and Mahmut Taylan Kandemir and Chita Das Quantifying Data Locality in Dynamic Parallelism in GPUs . . . . . . . . . . 39:1--39:24 Anish Agarwal and Muhammad Jehangir Amjad and Devavrat Shah and Dennis Shen Model Agnostic Time Series Analysis via Matrix Estimation . . . . . . . . . . . 40:1--40:39 Xingyu Zhou and Jian Tan and Ness Shroff Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions . . 41:1--41:33 Xulong Tang and Mahmut Taylan Kandemir and Hui Zhao and Myoungsoo Jung and Mustafa Karakoy Computing with Near Data . . . . . . . . 42:1--42:30 Florin Ciucu and Felix Poloczek Two Extensions of Kingman's GI/G/1 Bound 43:1--43:33
Lan N. Nguyen and My T. Thai Network Resilience Assessment via QoS Degradation Metrics: an Algorithmic Approach . . . . . . . . . . . . . . . . 1:1--1:32 Ran Liu and Edmund Yeh and Atilla Eryilmaz Proactive Caching for Low Access-Delay Services under Uncertain Predictions . . 2:1--2:46 Xiao Zhu and Yihua Ethan Guo and Ashkan Nikravesh and Feng Qian and Z. Morley Mao Understanding the Networking Performance of Wear OS . . . . . . . . . . . . . . . 3:1--3:25 Mark van der Boor and Sem Borst and Johan van Leeuwaarden Hyper-Scalable JSQ with Sparse Feedback 4:1--4:37 Tu Dinh Ngoc and Bao Bui and Stella Bitchebe and Alain Tchana and Valerio Schiavoni and Pascal Felber and Daniel Hagimont Everything You Should Know About Intel SGX Performance on Virtualized Systems 5:1--5:21 Haoran Yu and Ermin Wei and Randall A. Berry Analyzing Location-Based Advertising for Vehicle Service Providers Using Effective Resistances . . . . . . . . . 6:1--6:35 Richard Combes and Mikael Touati Computationally Efficient Estimation of the Spectral Gap of a Markov Chain . . . 7:1--7:21 Youil Han and Bryan S. Kim and Jeseong Yeon and Sungjin Lee and Eunji Lee TeksDB: Weaving Data Structures for a High-Performance Key--Value Store . . . 8:1--8:23 Shoaib Akram and Jennifer Sartor and Kathryn McKinley and Lieven Eeckhout Crystal Gazer: Profile-Driven Write-Rationing Garbage Collection for Hybrid Memories . . . . . . . . . . . . 9:1--9:27 Qiulin Lin and Hanling Yi and John Pang and Minghua Chen and Adam Wierman and Michael Honig and Yuanzhang Xiao Competitive Online Optimization under Inventory Constraints . . . . . . . . . 10:1--10:28 Lili Su and Martin Zubeldia and Nancy Lynch Collaboratively Learning the Best Option on Graphs, Using Bounded Local Memory 11:1--11:32 Lili Su and Jiaming Xu Securing Distributed Gradient Descent in High Dimensional Statistical Learning 12:1--12:41 Monika Henzinger and Stefan Neumann and Stefan Schmid Efficient Distributed Workload (Re-)Embedding . . . . . . . . . . . . . 13:1--13:38 Dengwang Tang and Vijay G. Subramanian Random Walk Based Sampling for Load Balancing in Multi-Server Systems . . . 14:1--14:44 Chul-Ho Lee and Min Kang and Do Young Eun Non-Markovian Monte Carlo on Directed Graphs . . . . . . . . . . . . . . . . . 15:1--15:31 Joshua Comden and Sijie Yao and Niangjun Chen and Haipeng Xing and Zhenhua Liu Online Optimization in Cloud Resource Provisioning: Predictions, Regrets, and Algorithms . . . . . . . . . . . . . . . 16:1--16:30 Lei Zhang and Zhemin Yang and Yuyu He and Mingqi Li and Sen Yang and Min Yang and Yuan Zhang and Zhiyun Qian App in the Middle: Demystify Application Virtualization in Android and its Security Threats . . . . . . . . . . . . 17:1--17:24 Reza Alijani and Siddhartha Banerjee and Sreenivas Gollapudi and Kostas Kollias and Kamesh Munagala The Segmentation-Thickness Tradeoff in Online Marketplaces . . . . . . . . . . 18:1--18:26 Pavlos Nikolopoulos and Christos Pappas and Katerina Argyraki and Adrian Perrig Retroactive Packet Sampling for Traffic Receipts . . . . . . . . . . . . . . . . 19:1--19:39
Thomas Bonald and Nick Duffield Editorial . . . . . . . . . . . . . . . 20:1--20:2 Lavanya Jose and Stephen Ibanez and Mohammad Alizadeh and Nick McKeown A Distributed Algorithm to Calculate Max-Min Fair Rates Without Per-Flow State . . . . . . . . . . . . . . . . . 21:1--21:42 Ming Shi and Xiaojun Lin and Lei Jiao On the Value of Look-Ahead in Competitive Online Convex Optimization 22:1--22:42 Benny Van Houdt Global Attraction of ODE-based Mean Field Models with Hyperexponential Job Sizes . . . . . . . . . . . . . . . . . 23:1--23:23 Song Wei and Kun Zhang and Bibo Tu HyperBench: a Benchmark Suite for Virtualization Capabilities . . . . . . 24:1--24:22 Daniel Vial and Vijay Subramanian A Structural Result for Personalized PageRank and its Algorithmic Consequences . . . . . . . . . . . . . . 25:1--25:88 Behnam Pourghassemi and Ardalan Amiri Sani and Aparna Chandramowlishwaran What-If Analysis of Page Load Time in Web Browsers Using Causal Profiling . . 27:1--27:23 Pradeep Ambati and David Irwin Optimizing the Cost of Executing Mixed Interactive and Batch Workloads on Transient VMs . . . . . . . . . . . . . 28:1--28:24 Dhruv Kumar and Jian Li and Abhishek Chandra and Ramesh Sitaraman A TTL-based Approach for Data Aggregation in Geo-distributed Streaming Analytics . . . . . . . . . . . . . . . 29:1--29:27 Pavlos Sermpezis and Vasileios Kotronis Inferring Catchment in Internet Routing 30:1--30:31 Florin Ciucu and Felix Poloczek and Amr Rizk Queue and Loss Distributions in Finite-Buffer Queues . . . . . . . . . . 31:1--31:29 Doron Zarchy and Radhika Mittal and Michael Schapira and Scott Shenker Axiomatizing Congestion Control . . . . 33:1--33:33 Milan Radulovic and Rommel Sánchez Verdejo and Paul Carpenter and Petar Radojkovi\'c and Bruce Jacob and Eduard Ayguadé PROFET: Modeling System Performance and Energy Without Simulating the CPU . . . 34:1--34:33 Tim Hellemans and Tejas Bodas and Benny Van Houdt Performance Analysis of Workload Dependent Load Balancing Policies . . . 35:1--35:35 Osman Emre Dai and Daniel Cullina and Negar Kiyavash and Matthias Grossglauser Analysis of a Canonical Labeling Algorithm for the Alignment of Correlated Erd\Hos--Rényi Graphs . . . . 36:1--36:25 Muhammad Amjad and Vishal Misra and Devavrat Shah and Dennis Shen mRSC: Multi-dimensional Robust Synthetic Control . . . . . . . . . . . . . . . . 37:1--37:27 Mustafa Karakoy and Orhan Kislal and Xulong Tang and Mahmut Taylan Kandemir and Meenakshi Arunachalam Architecture-Aware Approximate Computing 38:1--38:24 Guocong Quan and Jian Tan and Atilla Eryilmaz and Ness Shroff A New Flexible Multi-flow LRU Cache Management Paradigm for Minimizing Misses . . . . . . . . . . . . . . . . . 39:1--39:30 Jessica Hoffmann and Constantine Caramanis Learning Graphs from Noisy Epidemic Cascades . . . . . . . . . . . . . . . . 40:1--40:34 Honghao Wei and Xiaohan Kang and Weina Wang and Lei Ying QuickStop: a Markov Optimal Stopping Approach for Quickest Misinformation Detection . . . . . . . . . . . . . . . 41:1--41:25 Isaac Grosof and Ziv Scully and Mor Harchol-Balter Load Balancing Guardrails: Keeping Your Heavy Traffic on the Road to Low Response Times . . . . . . . . . . . . . 42:1--42:31 Semih Cayci and Atilla Eryilmaz and R. Srikant Learning to Control Renewal Processes with Bandit Feedback . . . . . . . . . . 43:1--43:32
Ayush Mishra and Xiangpeng Sun and Atishya Jain and Sameer Pande and Raj Joshi and Ben Leong The Great Internet TCP Congestion Control Census . . . . . . . . . . . . . 45:1--45:24 Michael Fleder and Devavrat Shah Forecasting with Alternative Data . . . 46:1--46:29 Zhenjie Yang and Yong Cui and Shihan Xiao and Xin Wang and Minming Li and Chuming Li and Yadong Liu Achieving Efficient Routing in Reconfigurable DCNs . . . . . . . . . . 47:1--47:30 Palma London and Shai Vardi and Adam Wierman Logarithmic Communication for Distributed Optimization in Multi-Agent Systems . . . . . . . . . . . . . . . . 48:1--48:29 Yiyang Chang and Chuan Jiang and Ashish Chandra and Sanjay Rao and Mohit Tawarmalani Lancet: Better Network Resilience by Designing for Pruned Failure Sets . . . 49:1--49:26 Xinzhe Fu and Eytan Modiano Fundamental Limits of Volume-based Network DoS Attacks . . . . . . . . . . 50:1--50:36 You Zhou and Youlin Zhang and Chaoyi Ma and Shigang Chen and Olufemi O. Odegbile Generalized Sketch Families for Network Traffic Measurement . . . . . . . . . . 51:1--51:34 Sinong Wang and Jiashang Liu and Ness Shroff Fundamental Limits of Approximate Gradient Coding . . . . . . . . . . . . 52:1--52:22 Abishek Sankararaman and Ayalvadi Ganesh and Sanjay Shakkottai Social Learning in Multi Agent Multi Armed Bandits . . . . . . . . . . . . . 53:1--53:35 Daniel Cullina and Negar Kiyavash and Prateek Mittal and H. Vincent Poor Partial Recovery of Erd\Hos--Rényi Graph Alignment via $k$-Core Alignment . . . . 54:1--54:21 Sean R. Sinclair and Siddhartha Banerjee and Christina Lee Yu Adaptive Discretization for Episodic Reinforcement Learning in Metric Spaces 55:1--55:44 Francesco Bronzino and Paul Schmitt and Sara Ayoubi and Guilherme Martins and Renata Teixeira and Nick Feamster Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience . . . . . . . . . 56:1--56:25 Illés Antal Horváth and Ziv Scully and Benny Van Houdt Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing Servers . . . . . . . . 57:1--57:21 Ankur Mallick and Malhar Chaudhari and Utsav Sheth and Ganesh Palanikumar and Gauri Joshi Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix--Vector Multiplication . . . . . . . . . . . . . 58:1--58:40 Jordi Ros-Giralt and Atul Bohara and Sruthi Yellamraju and M. Harper Langston and Richard Lethin and Yuang Jiang and Leandros Tassiulas and Josie Li and Yuanlong Tan and Malathi Veeraraghavan On the Bottleneck Structure of Congestion-Controlled Networks . . . . . 59:1--59:31 Saugata Ghose and Tianshi Li and Nastaran Hajinazar and Damla Senol Cali and Onur Mutlu Demystifying Complex Workload-DRAM Interactions: an Experimental Study . . 60:1--60:50 Nikita Ivkin and Ran Ben Basat and Zaoxing Liu and Gil Einziger and Roy Friedman and Vladimir Braverman I Know What You Did Last Summer: Network Monitoring using Interval Queries . . . 61:1--61:28
Vishwaraj Doshi and Do Young Eun Fiedler Vector Approximation via Interacting Random Walks . . . . . . . . 01:1--01:28 Martin Zubeldia Delay-optimal Policies in Partial Fork-Join Systems with Redundancy and Random Slowdowns . . . . . . . . . . . . 02:1--02:49 Hsuan-Chi Kuo and Jianyan Chen and Sibin Mohan and Tianyin Xu Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating . . . . . . . . 03:1--03:27 Reza Alijani and Siddhartha Banerjee and Sreenivas Gollapudi and Kamesh Munagala and Kangning Wang Predict and Match: Prophet Inequalities with Uncertain Supply . . . . . . . . . 04:1--04:23 JinKe Song and Qiang Li and Haining Wang and Limin Sun Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild . . . . . . . . . . . . . . . . . . 05:1--05:25 Lei Zhang and Reza Karimi and Irfan Ahmad and Ymir Vigfusson Optimal Data Placement for Heterogeneous Cache, Memory, and Storage Systems . . . 06:1--06:27 Zhihui Shao and Mohammad A. Islam and Shaolei Ren Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers . . 07:1--07:39 Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf Simple Near-Optimal Scheduling for the M/G/1 . . . . . . . . . . . . . . . . . 11:1--11:29 Yang Cai and Federico Echenique and Hu Fu and Katrina Ligett and Adam Wierman and Juba Ziani Third-Party Data Providers Ruin Simple Mechanisms . . . . . . . . . . . . . . . 12:1--12:31 Pengxiong Zhu and Keyu Man and Zhongjie Wang and Zhiyun Qian and Roya Ensafi and J. Alex Halderman and Haixin Duan Characterizing Transnational Internet Performance and the Great Bottleneck of China . . . . . . . . . . . . . . . . . 13:1--13:23 Richard Combes and Alexandre Prouti\`ere and Alexandre Fauquette Unimodal Bandits with Continuous Arms: Order-optimal Regret without Smoothness 14:1--14:28 Lin Yang and Mohammad H. Hajiesmaili and Ramesh Sitaraman and Adam Wierman and Enrique Mallada and Wing S. Wong Online Linear Optimization with Inventory Management Constraints . . . . 16:1--16:29 Martin Karsten and Saman Barghi User-level Threading: Have Your Cake and Eat It Too . . . . . . . . . . . . . . . 17:1--17:30 Yiheng Lin and Gautam Goel and Adam Wierman Online Optimization with Predictions and Non-convex Losses . . . . . . . . . . . 18:1--18:32 Sungjin Im and Benjamin Moseley and Kamesh Munagala and Kirk Pruhs Dynamic Weighted Fairness with Minimal Disruptions . . . . . . . . . . . . . . 19:1--19:18 Chen Avin and Manya Ghobadi and Chen Griner and Stefan Schmid On the Complexity of Traffic Traces and Implications . . . . . . . . . . . . . . 20:1--20:29
Y. C. Tay and Athina Markopoulou Editorial . . . . . . . . . . . . . . . 21:1--21:1 Shouqian Shi and Chen Qian Ludo Hashing: Compact, Fast, and Dynamic Key-value Lookups for Practical Network Systems . . . . . . . . . . . . . . . . 22:1--22:32 Philippe Nain and Gayane Vardoyan and Saikat Guha and Don Towsley On the Analysis of a Multipartite Entanglement Distribution Switch . . . . 23:1--23:39 Xiaoqi Tan and Bo Sun and Alberto Leon-Garcia and Yuan Wu and Danny H. K. Tsang Mechanism Design for Online Resource Allocation: a Unified Approach . . . . . 24:1--24:46 Rajarshi Bhattacharjee and Subhankar Banerjee and Abhishek Sinha Fundamental Limits on the Regret of Online Network-Caching . . . . . . . . . 25:1--25:31 Peter Snyder and Antoine Vastel and Ben Livshits Who Filters the Filters: Understanding the Growth, Usefulness and Efficiency of Crowdsourced Ad Blocking . . . . . . . . 26:1--26:24 Ludovic Thomas and Jean-Yves Le Boudec On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks . . . . . . . . . . 27:1--27:41 Chun-Yi Liu and Jagadish Kotra and Myoungsoo Jung and Mahmut Taylan Kandemir Centaur: a Novel Architecture for Reliable, Low-Wear, High-Density $3$D NAND Storage . . . . . . . . . . . . . . 28:1--28:25 Weizhao Tang and Weina Wang and Giulia Fanti and Sewoong Oh Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks . . . . . . . . . . . . . . . . 29:1--29:39 Ziv Scully and Lucas van Kreveld and Onno Boxma and Jan-Pieter Dorsman and Adam Wierman Characterizing Policies with Optimal Response Time Tails under Heavy-Tailed Job Sizes . . . . . . . . . . . . . . . 30:1--30:33 Fred Lin and Keyur Muzumdar and Nikolay Pavlovich Laptev and Mihai-Valentin Curelea and Seunghak Lee and Sriram Sankar Fast Dimensional Analysis for Root Cause Investigation in a Large-Scale Service Environment . . . . . . . . . . . . . . 31:1--31:23 Yibo Pi and Sugih Jamin and Peter Danzig and Feng Qian Latency Imbalance Among Internet Load-Balanced Paths: a Cloud-Centric View . . . . . . . . . . . . . . . . . . 32:1--32:29 Seyed Armin Vakil Ghahani and Mahmut Taylan Kandemir and Jagadish B. Kotra DSM: a Case for Hardware-Assisted Merging of DRAM Rows with Same Content 33:1--33:26 Erik Tillberg and Peter Marbach and Ravi Mazumdar Optimal Bidding Strategies for Online Ad Auctions with Overlapping Targeting Criteria . . . . . . . . . . . . . . . . 34:1--34:55 Aditya Gopalan and Abishek Sankararaman and Anwar Walid and Sriram Vishwanath Stability and Scalability of Blockchain Systems . . . . . . . . . . . . . . . . 35:1--35:35 Apostolos Pyrgelis and Carmela Troncoso and Emiliano De Cristofaro Measuring Membership Privacy on Aggregate Location Time-Series . . . . . 36:1--36:28 Yuheng Huang and Haoyu Wang and Lei Wu and Gareth Tyson and Xiapu Luo and Run Zhang and Xuanzhe Liu and Gang Huang and Xuxian Jiang Understanding (Mis)Behavior on the EOSIO Blockchain . . . . . . . . . . . . . . . 37:1--37:28 Atakan Aral and Melike Erol-Kantarci and Ivona Brandi\'c Staleness Control for Edge Data Analytics . . . . . . . . . . . . . . . 38:1--38:24 Xiaohan Wei and Hao Yu and Michael J. Neely Online Primal-Dual Mirror Descent under Stochastic Constraints . . . . . . . . . 39:1--39:36 Alexander Marder and Matthew Luckie and Bradley Huffaker and KC Claffy vrfinder: Finding Outbound Addresses in Traceroute . . . . . . . . . . . . . . . 40:1--40:28
Xin Wang and Richard T. B. Ma On Private Peering Agreements between Content and Access Providers: a Contractual Equilibrium Analysis . . . . 41:1--41:32 Wentao Weng and Weina Wang Achieving Zero Asymptotic Queueing Delay for Parallel Jobs . . . . . . . . . . . 42:1--42:36 Ziv Scully and Isaac Grosof and Mor Harchol-Balter The Gittins Policy is Nearly Optimal in the M/G/$k$ under Extremely General Conditions . . . . . . . . . . . . . . . 43:1--43:29 Luis Fernando Abanto-Leon and Andreas Bäuml and Gek Hong (Allyson) Sim and Matthias Hollick and Arash Asadi Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints 44:1--44:31 Wentao Weng and Xingyu Zhou and R. Srikant Optimal Load Balancing with Locality Constraints . . . . . . . . . . . . . . 45:1--45:37 Youri Raaijmakers and Sem Borst Achievable Stability in Redundancy Systems . . . . . . . . . . . . . . . . 46:1--46:21 Michael Fleder and Devavrat Shah I Know What You Bought At Chipotle for \$9.81 by Solving A Linear Inverse Problem . . . . . . . . . . . . . . . . 47:1--47:17 Elene Anton and Urtzi Ayesta and Matthieu Jonckheere and Ina Maria Verloop Improving the Performance of Heterogeneous Data Centers through Redundancy . . . . . . . . . . . . . . . 48:1--48:29 Ahmad Hazimeh and Adrian Herrera and Mathias Payer Magma: a Ground-Truth Fuzzing Benchmark 49:1--49:29 Bingyu Gao and Haoyu Wang and Pengcheng Xia and Siwei Wu and Yajin Zhou and Xiapu Luo and Gareth Tyson Tracking Counterfeit Cryptocurrency End-to-end . . . . . . . . . . . . . . . 50:1--50:28 Bo Sun and Ali Zeynali and Tongxin Li and Mohammad Hajiesmaili and Adam Wierman and Danny H. K. Tsang Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging 51:1--51:32 Kamiar Asgari and Michael J. Neely Bregman-style Online Convex Optimization with Energy-Harvesting Constraints . . . 52:1--52:25
Lishan Yang and Bin Nie and Adwait Jog and Evgenia Smirni SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input Sizing 01:1--01:29 Zhaowei Zhu and Jingxuan Zhu and Ji Liu and Yang Liu Federated Bandit: a Gossiping Approach 02:1--02:29 Behnam Pourghassemi and Jordan Bonecutter and Zhou Li and Aparna Chandramowlishwaran adPerf: Characterizing the Performance of Third-party Ads . . . . . . . . . . . 03:1--03:26 Iman Akbari and Mohammad A. Salahuddin and Leni Ven and Noura Limam and Raouf Boutaba and Bertrand Mathieu and Stephanie Moteau and Stephane Tuffin A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web . . . . . . . . . . . . . 04:1--04:26 Kai Han and Shuang Cui and Tianshuai Zhu and Enpei Zhang and Benwei Wu and Zhizhuo Yin and Tong Xu and Shaojie Tang and He Huang Approximation Algorithms for Submodular Data Summarization with a Knapsack Constraint . . . . . . . . . . . . . . . 05:1--05:31 Klaus-Tycho Foerster and Janne H. Korhonen and Ami Paz and Joel Rybicki and Stefan Schmid Input-Dynamic Distributed Algorithms for Communication Networks . . . . . . . . . 06:1--06:33 Weina Wang and Qiaomin Xie and Mor Harchol-Balter Zero Queueing for Multi-Server Jobs . . 07:1--07:25 Jing Tang and Xueyan Tang and Andrew Lim and Kai Han and Chongshou Li and Junsong Yuan Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint . . . . . . . . . . 08:1--08:22 Thibaut Cuvelier and Richard Combes and Eric Gourdin Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits . . . . . . . . . . . . . . 09:1--09:31
Anshul Gandhi and Negar Kiyavash and Jia Wang Editorial . . . . . . . . . . . . . . . 13:1--13:1 Yue Zhang and Bayan Turkistani and Allen Yuqing Yang and Chaoshun Zuo and Zhiqiang Lin A Measurement Study of Wechat Mini-Apps 14:1--14:25 Qingzhao Zhang and David Ke Hong and Ze Zhang and Qi Alfred Chen and Scott Mahlke and Z. Morley Mao A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software . . 15:1--15:25 Yiguang Zhang and Jessy Xinyi Han and Ilica Mahajan and Priyanjana Bengani and Augustin Chaintreau Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks . . . . . . . . . . . . . . . . 16:1--16:38 Tongxin Li and Yue Chen and Bo Sun and Adam Wierman and Steven H. Low Information Aggregation for Constrained Online Control . . . . . . . . . . . . . 18:1--18:35 Tim Hellemans and Benny Van Houdt Mean Waiting Time in Large-Scale and Critically Loaded Power of $d$ Load Balancing Systems . . . . . . . . . . . 19:1--19:34 Xulong Tang and Mahmut Taylan Kandemir and Mustafa Karakoy Mix and Match: Reorganizing Tasks for Enhancing Data Locality . . . . . . . . 20:1--20:24 Isaac Grosof and Kunhe Yang and Ziv Scully and Mor Harchol-Balter \pkgNudge: Stochastically Improving upon FCFS . . . . . . . . . . . . . . . . . . 21:1--21:29 Grzegorz Kielanski and Benny Van Houdt On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems . . . . . . . . . . . . . . . . 22:1--22:28 Rachee Singh and David Tench and Phillipa Gill and Andrew McGregor \pkgPredictRoute: a Network Path Prediction Toolkit . . . . . . . . . . . 23:1--23:24 Noémie Périvier and Chamsi Hssaine and Samitha Samaranayake and Siddhartha Banerjee Real-time Approximate Routing for Smart Transit Systems . . . . . . . . . . . . 24:1--24:30 Francesca Randone and Luca Bortolussi and Mirco Tribastone Refining Mean-field Approximations by Dynamic State Truncation . . . . . . . . 25:1--25:30 Weimin Chen and Xinran Li and Yuting Sui and Ningyu He and Haoyu Wang and Lei Wu and Xiapu Luo \pkgSADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts . . . . . . . . . . . . 26:1--26:30 Liren Yu and Jiaming Xu and Xiaojun Lin The Power of $D$-hops in Matching Power-Law Graphs . . . . . . . . . . . . 27:1--27:43 Ashish Bijlani and Umakishore Ramachandran and Roy Campbell Where did my 256 GB go? A Measurement Analysis of Storage Consumption on Smart Mobile Devices . . . . . . . . . . . . . 28:1--28:28
Niklas Carlsson and Edith Cohen and Philippe Robert POMACS V5, N3, December 2021 Editorial 29:1--29:1 Lin Yang and Ali Zeynali and Mohammad H. Hajiesmaili and Ramesh K. Sitaraman and Don Towsley Competitive Algorithms for Online Multidimensional Knapsack Problems . . . 30:1--30:30 Hassan Iqbal and Ayesha Khalid and Muhammad Shahzad Dissecting Cloud Gaming Performance with \pkgDECAF . . . . . . . . . . . . . . . 31:1--31:27 Michalis Pachilakis and Panagiotis Papadopoulos and Nikolaos Laoutaris and Evangelos P. Markatos and Nicolas Kourtellis \pkgYourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy . . . . . . . . . . . . . . . . 32:1--32:26 Tomer Lange and Joseph (Seffi) Naor and Gala Yadgar Offline and Online Algorithms for SSD Management . . . . . . . . . . . . . . . 33:1--33:28 Bingqian Lu and Jianyi Yang and Weiwen Jiang and Yiyu Shi and Shaolei Ren One Proxy Device Is Enough for Hardware-Aware Neural Architecture Search . . . . . . . . . . . . . . . . . 34:1--34:34 Yuanyuan Li and Tareq Si Salem and Giovanni Neglia and Stratis Ioannidis Online Caching Networks with Adversarial Guarantees . . . . . . . . . . . . . . . 35:1--35:39 Suho Shin and Hoyong Choi and Yung Yi and Jungseul Ok Power of Bonus in Pricing for Crowdsourcing . . . . . . . . . . . . . 36:1--36:25 Ryan J. Kinnear and Ravi R. Mazumdar and Peter Marbach Real-time Bidding for Time Constrained Impression Contracts in First and Second Price Auctions --- Theory and Algorithms 37:1--37:37 Chen Griner and Johannes Zerwas and Andreas Blenk and Manya Ghobadi and Stefan Schmid and Chen Avin \pkgCerberus: The Power of Choices in Datacenter Topology Design --- a Throughput Perspective . . . . . . . . . 38:1--38:33 Pengcheng Xia and Haoyu Wang and Bingyu Gao and Weihang Su and Zhou Yu and Xiapu Luo and Chao Zhang and Xusheng Xiao and Guoai Xu Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange . . . . . . . . . 39:1--39:26 Francesco Bronzino and Paul Schmitt and Sara Ayoubi and Hyojoon Kim and Renata Teixeira and Nick Feamster Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic . . . . . . . . . . . . 40:1--40:24 Sourav Das and Nitin Awathare and Ling Ren and Vinay J. Ribeiro and Umesh Bellur \pkgTuxedo: Maximizing Smart Contract Computation in PoW Blockchains . . . . . 41:1--41:30 Shizhen Zhao and Peirui Cao and Xinbing Wang Understanding the Performance Guarantee of Physical Topology Design for Optical Circuit Switched Data Centers . . . . . 42:1--42:24 Lin Jin and Shuai Hao and Haining Wang and Chase Cotton Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements . . . . . . . . . . . . . . 43:1--43:25 Yun Seong Nam and Jianfei Gao and Chandan Bothra and Ehab Ghabashneh and Sanjay Rao and Bruno Ribeiro and Jibin Zhan and Hui Zhang \pkgXatu: Richer Neural Network Based Prediction for Video Streaming . . . . . 44:1--44:26
Niklas Carlsson and Edith Cohen and Philippe Robert POMACS V6, N1, March 2022 Editorial . . 1:1--1:1 Hem Regmi and Sanjib Sur Argus: Predictable Millimeter-Wave Picocells with Vision and Learning Augmentation . . . . . . . . . . . . . . 2:1--2:26 Brivaldo A. Silva and Paulo Mol and Osvaldo Fonseca and Italo Cunha and Ronaldo A. Ferreira and Ethan Katz-Bassett Automatic Inference of BGP Location Communities . . . . . . . . . . . . . . 3:1--3:23 Young-Kyoon Suh and Junyoung An and Byungchul Tak and Gap-Joo Na A Comprehensive Empirical Study of Query Performance Across GPU DBMSes . . . . . 4:1--4:29 Loqman Salamatian and Scott Anderson and Joshua Matthews and Paul Barford and Walter Willinger and Mark Crovella Curvature-based Analysis of Network Connectivity in Private Backbone Infrastructures . . . . . . . . . . . . 5:1--5:32 Sachin Ashok and Shubham Tiwari and Nagarajan Natarajan and Venkata N. Padmanabhan and Sundararajan Sellamanickam Data-Driven Network Path Simulation with iBox . . . . . . . . . . . . . . . . . . 6:1--6:26 Soheil Khadirsharbiyani and Jagadish Kotra and Karthik Rao and Mahmut Kandemir Data Convection: a GPU-Driven Case Study for Thermal-Aware Data Placement in $3$D DRAMs . . . . . . . . . . . . . . . . . 7:1--7:25 Xingyu Zhou Differentially Private Reinforcement Learning with Linear Function Approximation . . . . . . . . . . . . . 8:1--8:27 Yuwei Luo and Varun Gupta and Mladen Kolar Dynamic Regret Minimization for Control of Non-stationary Linear Dynamical Systems . . . . . . . . . . . . . . . . 9:1--9:72 Sandeepa Bhuyan and Shulin Zhao and Ziyu Ying and Mahmut T. Kandemir and Chita R. Das End-to-end Characterization of Game Streaming Applications on Mobile Platforms . . . . . . . . . . . . . . . 10:1--10:25 Ranvir Rana and Sreeram Kannan and David Tse and Pramod Viswanath Free2Shard: Adversary-resistant Distributed Resource Allocation for Blockchains . . . . . . . . . . . . . . 11:1--11:38 Yaxiong Xie and Kyle Jamieson NG-Scope: Fine-Grained Telemetry for NextG Cellular Networks . . . . . . . . 12:1--12:26 Sebastian Allmeier and Nicolas Gast Mean Field and Refined Mean Field Approximations for Heterogeneous Systems: It Works! . . . . . . . . . . . 13:1--13:43 Jihyun Ryoo and Mahmut Taylan Kandemir and Mustafa Karakoy Memory Space Recycling . . . . . . . . . 14:1--14:24 Dongwei Xiao and Zhibo LIU and Yuanyuan Yuan and Qi Pang and Shuai Wang Metamorphic Testing of Deep Learning Compilers . . . . . . . . . . . . . . . 15:1--15:28 Sina Darabi and Negin Mahani and Hazhir Baxishi and Ehsan Yousefzadeh-Asl-Miandoab and Mohammad Sadrosadati and Hamid Sarbazi-Azad NURA: a Framework for Supporting Non-Uniform Resource Accesses in GPUs 16:1--16:27 Weici Pan and Guanya Shi and Yiheng Lin and Adam Wierman Online Optimization with Feedback Delay and Nonlinear Switching Cost . . . . . . 17:1--17:34 Tongxin Li and Ruixiao Yang and Guannan Qu and Guanya Shi and Chenkai Yu and Adam Wierman and Steven Low Robustness and Consistency in Linear Quadratic Control with Untrusted Predictions . . . . . . . . . . . . . . 18:1--18:35 Zaiwei Chen and Shancong Mou and Siva Theja Maguluri Stationary Behavior of Constant Stepsize SGD Type Algorithms: an Asymptotic Characterization . . . . . . . . . . . . 19:1--19:24 Yueyang Pan and Ruihan Li and Chenren Xu The First 5G-LTE Comparative Study in Extreme Mobility . . . . . . . . . . . . 20:1--20:22 Christina Giannoula and Ivan Fernandez and Juan Gómez Luna and Nectarios Koziris and Georgios Goumas and Onur Mutlu SparseP: Towards Efficient Sparse Matrix Vector Multiplication on Real Processing-In-Memory Architectures . . . 21:1--21:49 Minhu Wang and Mingwei Xu and Jianping Wu Understanding I/O Direct Cache Access Performance for End Host Networking . . 22:1--22:37 Wei Liu and Xinlei Yang and Hao Lin and Zhenhua Li and Feng Qian Fusing Speed Index during Web Page Loading . . . . . . . . . . . . . . . . 23:1--23:23
Niklas Carlsson and Edith Cohen and Philippe Robert POMACS V6, N2, June 2022 Editorial . . . 24:1--24:?? Lingda Li and Santosh Pandey and Thomas Flynn and Hang Liu and Noel Wheeler and Adolfy Hoisie SimNet: Accurate and High-Performance Computer Architecture Simulation using Deep Learning . . . . . . . . . . . . . 25:1--25:?? Ashraf Mahgoub and Edgardo Barsallo Yi and Karthick Shankar and Eshaan Minocha and Sameh Elnikety and Saurabh Bagchi and Somali Chaterji WISEFUSE: Workload Characterization and DAG Transformation for Serverless Workflows . . . . . . . . . . . . . . . 26:1--26:?? Matthew Faw and Orestis Papadigenopoulos and Constantine Caramanis and Sanjay Shakkottai Learning To Maximize Welfare with a Reusable Resource . . . . . . . . . . . 27:1--27:?? Pengfei Li and Jianyi Yang and Shaolei Ren Expert-Calibrated Learning for Online Optimization with Switching Costs . . . 28:1--28:?? Gyeongsik Yang and Changyong Shin and Jeunghwan Lee and Yeonho Yoo and Chuck Yoo Prediction of the Resource Consumption of Distributed Deep Learning Systems . . 29:1--29:?? Mohammadamin Ajdari and Patrick Raaf and Mostafa Kishani and Reza Salkhordeh and Hossein Asadi and André Brinkmann An Enterprise-Grade Open-Source Data Reduction Architecture for All-Flash Storage Systems . . . . . . . . . . . . 30:1--30:?? Anne Bouillard and Paul Nikolaus and Jens Schmitt Unleashing the Power of Paying Multiplexing Only Once in Stochastic Network Calculus . . . . . . . . . . . . 31:1--31:?? Albert Senen-Cerda and Jaron Sanders Asymptotic Convergence Rate of Dropout on Shallow Linear Neural Networks . . . 32:1--32:?? Yunming Xiao and Matteo Varvello and Aleksandar Kuzmanovic Monetizing Spare Bandwidth: The Case of Distributed VPNs . . . . . . . . . . . . 33:1--33:?? Lin Yang and Yu-Zhen Janice Chen and Mohammad H. Hajiesmaili and Mark Herbster and Don Towsley Hierarchical Learning Algorithms for Multi-scale Expert Problems . . . . . . 34:1--34:?? Haris Bin Zia and Aravindh Raman and Ignacio Castro and Ishaku Hassan Anaobi and Emiliano De Cristofaro and Nishanth Sastry and Gareth Tyson Toxicity in the Decentralized Web and the Potential for Model Sharing . . . . 35:1--35:?? Qiulin Lin and Yanfang Mo and Junyan Su and Minghua Chen Competitive Online Optimization with Multiple Inventories: a Divide-and-Conquer Approach . . . . . . 36:1--36:?? Chenxingyu Zhao and Tapan Chugh and Jaehong Min and Ming Liu and Arvind Krishnamurthy Dremel: Adaptive Configuration Tuning of RocksDB KV-Store . . . . . . . . . . . . 37:1--37:?? Shivang Aggarwal and Srisai Karthik Neelamraju and Ajit Bhat and Dimitrios Koutsonikolas A Detailed Look at MIMO Performance in 60 GHz WLANs . . . . . . . . . . . . . . 38:1--38:?? Christina Lee Yu and Xumei Xi Tensor Completion with Nearly Linear Samples Given Weak Side Information . . 39:1--39:?? Liu Wang and Haoyu Wang and Ren He and Ran Tao and Guozhu Meng and Xiapu Luo and Xuanzhe Liu MalRadar: Demystifying Android Malware in the New Era . . . . . . . . . . . . . 40:1--40:?? Sheng-Chun Kao and Hyoukjun Kwon and Michael Pellauer and Angshuman Parashar and Tushar Krishna A Formalism of DNN Accelerator Flexibility . . . . . . . . . . . . . . 41:1--41:??
Konstantin Avrachenkov and Phillipa Gill and Bhuvan Urgaonkar POMACS V6, N3 December 2022 Editorial 42:1--42:?? Kailong Wang and Yuxi Ling and Yanjun Zhang and Zhou Yu and Haoyu Wang and Guangdong Bai and Beng Chin Ooi and Jin Song Dong Characterizing Cryptocurrency-themed Malicious Browser Extensions . . . . . . 43:1--43:?? Prashanthi S. K and Sai Anuroop Kesanapalli and Yogesh Simmhan Characterizing the Performance of Accelerated Jetson Edge Devices for Training Deep Learning Models . . . . . 44:1--44:?? Mozhengfu Liu and Xueyan Tang Dynamic Bin Packing with Predictions . . 45:1--45:?? Tareq Si Salem and Georgios Iosifidis and Giovanni Neglia Enabling Long-term Fairness in Dynamic Resource Allocation . . . . . . . . . . 46:1--46:?? Yunzhuo Liu and Bo Jiang and Tian Guo and Zimeng Huang and Wenhao Ma and Xinbing Wang and Chenghu Zhou FuncPipe: a Pipelined Serverless Framework for Fast and Cost-Efficient Training of Deep Learning Models . . . . 47:1--47:?? Naram Mhaisen and Abhishek Sinha and Georgios Paschos and George Iosifidis Optimistic No-regret Algorithms for Discrete Caching . . . . . . . . . . . . 48:1--48:?? Daniele De Sensi and Tiziano De Matteis and Konstantin Taranov and Salvatore Di Girolamo and Tobias Rahn and Torsten Hoefler Noise in the Clouds: Influence of Network Performance Variability on Application Scalability . . . . . . . . 49:1--49:?? Benny Van Houdt On the Stochastic and Asymptotic Improvement of First-Come First-Served and Nudge Scheduling . . . . . . . . . . 50:1--50:?? Isaac Grosof and Ziv Scully and Mor Harchol-Balter and Alan Scheller-Wolf Optimal Scheduling in the Multiserver-job Model under Heavy Traffic . . . . . . . . . . . . . . . . 51:1--51:?? Yilin Liu and Shijia Zhang and Mahanth Gowda and Srihari Nelakuditi Leveraging the Properties of mmWave Signals for $3$D Finger Motion Tracking for Interactive IoT Applications . . . . 52:1--52:?? Daniel Vial and Sanjay Shakkottai and R. Srikant Robust Multi-Agent Bandits Over Undirected Graphs . . . . . . . . . . . 53:1--53:?? Shuang Cui and Kai Han and Jing Tang and He Huang and Xueying Li and Zhiyu Li Streaming Algorithms for Constrained Submodular Maximization . . . . . . . . 54:1--54:?? Igor Kadota and Dror Jacoby and Hagit Messer and Gil Zussman and Jonatan Ostrometzky Switching in the Rain: Predictive Wireless x-haul Network Reconfiguration 55:1--55:?? Jalani K. Williams and Mor Harchol-Balter and Weina Wang The M/M/$k$ with Deterministic Setup Times . . . . . . . . . . . . . . . . . 56:1--56:?? Bo Sun and Lin Yang and Mohammad Hajiesmaili and Adam Wierman and John C. S. Lui and Don Towsley and Danny H. K. Tsang The Online Knapsack Problem with Departures . . . . . . . . . . . . . . . 57:1--57:?? Xinzhe Fu and Eytan Modiano Joint Learning and Control in Stochastic Queueing Networks with Unknown Utilities 58:1--58:?? Ali Hossein Abbasi Abyaneh and Maizi Liao and Seyed Majid Zahedi Malcolm: Multi-agent Learning for Cooperative Load Management at Rack Scale . . . . . . . . . . . . . . . . . 59:1--59:??
Konstantin Avrachenkov and Phillipa Gill and Bhuvan Urgaonkar POMACS V7, N1, March 2023 Editorial . . 1:1--1:?? Vamsi Addanki and Chen Avin and Stefan Schmid Mars: Near-Optimal Throughput with Shallow Buffers in Reconfigurable Datacenter Networks . . . . . . . . . . 2:1--2:?? Wangkai Jin and Xiangjun Peng SLITS: Sparsity-Lightened Intelligent Thread Scheduling . . . . . . . . . . . 3:1--3:?? Rashna Kumar and Sana Asif and Elise Lee and Fabian E. Bustamante Each at its Own Pace: Third-Party Dependency and Centralization Around the World . . . . . . . . . . . . . . . . . 4:1--4:?? Fengjiao Li and Xingyu Zhou and Bo Ji (Private) Kernelized Bandits with Distributed Biased Feedback . . . . . . 5:1--5:?? Canhui Chen and Zhixuan Fang Gacha Game Analysis and Design . . . . . 6:1--6:?? Marco Chiesa and Fábio L. Verdi Network Monitoring on Multi-Pipe Switches . . . . . . . . . . . . . . . . 8:1--8:?? Mingming Zhang and Xiang Li and Baojun Liu and Jianyu Lu and Yiming Zhang and Jianjun Chen and Haixin Duan and Shuang Hao and Xiaofeng Zheng Detecting and Measuring Security Risks of Hosting-Based Dangling Domains . . . 9:1--9:?? Itamar Gozlan and Chen Avin and Gil Einziger and Gabriel Scalosub Go-to-Controller is Better: Efficient and Optimal LPM Caching with Splicing 10:1--10:?? Daan Rutten and Nicolas Christianson and Debankur Mukherjee and Adam Wierman Smoothed Online Optimization with Unreliable Predictions . . . . . . . . . 12:1--12:?? Yizhou Zhang and Guannan Qu and Pan Xu and Yiheng Lin and Zaiwei Chen and Adam Wierman Global Convergence of Localized Policy Iteration in Networked Multi-Agent Reinforcement Learning . . . . . . . . . 13:1--13:?? Usama Naseer and Theophilus A. Benson JS Capsules: a Framework for Capturing Fine-grained JavaScript Memory Measurements for the Mobile Web . . . . 14:1--14:?? Wenzhe Zhu and Yongkun Li and Erci Xu and Fei Li and Yinlong Xu and John C. S. Lui DiffForward: On Balancing Forwarding Traffic for Modern Cloud Block Services via Differentiated Forwarding . . . . . 15:1--15:?? Christina Giannoula and Kailong Huang and Jonathan Tang and Nectarios Koziris and Georgios Goumas and Zeshan Chishti and Nandita Vijaykumar DaeMon: Architectural Support for Efficient Data Movement in Fully Disaggregated Systems . . . . . . . . . 16:1--16:?? Haoran Lu and Qingchuan Zhao and Yongliang Chen and Xiaojing Liao and Zhiqiang Lin Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding . . . . . . . . 18:1--18:?? Kyle MacMillan and Tarun Mangla and James Saxon and Nicole P. Marwell and Nick Feamster A Comparative Analysis of Ookla Speedtest and Measurement Labs Network Diagnostic Test (NDT7) . . . . . . . . . 19:1--19:?? Johannes Zerwas and Csaba Györgyi and Andreas Blenk and Stefan Schmid and Chen Avin Duo: a High-Throughput Reconfigurable Datacenter Network Using Local Routing and Control . . . . . . . . . . . . . . 20:1--20:?? Amanda Hsu and Frank Li and Paul Pearce Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets 21:1--21:?? Alexander Goldberg and Giulia Fanti and Nihar B. Shah Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection . . . . . . . 22:1--22:?? Sebastian Allmeier and Nicolas Gast Bias and Refinement of Multiscale Mean Field Models . . . . . . . . . . . . . . 23:1--23:?? Serkut Ayvasik and Fidan Mehmeti and Edwin Babaians and Wolfgang Kellerer PEACH: Proactive and Environment-Aware Channel State Information Prediction with Depth Images . . . . . . . . . . . 24:1--24:?? Ruofeng Liu and Nakjung Choi A First Look at Wi-Fi 6 in Action: Throughput, Latency, Energy Efficiency, and Security . . . . . . . . . . . . . . 25:1--25:?? Jing Yu and Dimitar Ho and Adam Wierman Online Adversarial Stabilization of Unknown Networked Systems . . . . . . . 26:1--26:?? Hongyuan Liu and Sreepathi Pai and Adwait Jog Asynchronous Automata Processing on GPUs 27:1--27:??
Konstantin Avrachenkov and Phillipa Gill and Bhuvan Urgaonkar POMACS V7, N2, June 2023 Editorial . . . 28:1--28:?? Tyler Sam and Yudong Chen and Christina Lee Yu Overcoming the Long Horizon Barrier for Sample-Efficient Reinforcement Learning with Latent Low-Rank Structure . . . . . 29:1--29:?? Adithya Kumar and Anand Sivasubramaniam and Timothy Zhu SplitRPC: a Control + Data Path Splitting RPC Stack for ML Inference Serving . . . . . . . . . . . . . . . . 30:1--30:?? Ding Zhang and Panneer Selvam Santhalingam and Parth Pathak and Zizhan Zheng CoBF: Coordinated Beamforming in Dense mmWave Networks . . . . . . . . . . . . 31:1--31:?? Weizhao Tang and Lucianna Kiffer and Giulia Fanti and Ari Juels Strategic Latency Reduction in Blockchain Peer-to-Peer Networks . . . . 32:1--32:?? Yi Liu and Shouqian Shi and Minghao Xie and Heiner Litz and Chen Qian Smash: Flexible, Fast, and Resource-efficient Placement and Lookup of Distributed Storage . . . . . . . . . 33:1--33:?? Haibo Wang and Dimitrios Melissourgos and Chaoyi Ma and Shigang Chen Real-time Spread Burst Detection in Data Streaming . . . . . . . . . . . . . . . 35:1--35:?? Jiaxin Lin and Tao Ji and Xiangpeng Hao and Hokeun Cha and Yanfang Le and Xiangyao Yu and Aditya Akella Towards Accelerating Data Intensive Application's Shuffle Process Using SmartNICs . . . . . . . . . . . . . . . 36:1--36:?? Hasan Al Maruf and Yuhong Zhong and Hongyi Wang and Mosharaf Chowdhury and Asaf Cidon and Carl Waldspurger Memtrade: Marketplace for Disaggregated Memory Clouds . . . . . . . . . . . . . 41:1--41:??
Florin Ciucu and Giulia Fanti and Rhonda Righter POMACS V7, N3, December 2023 Editorial 42:1--42:?? Mohammad Bakhshalipour and Phillip B. Gibbons Agents of Autonomy: a Systematic Study of Robotics on Modern Hardware . . . . . 43:1--43:?? Andrea Monterubbiano and Jonatan Langlet and Stefan Walzer and Gianni Antichi and Pedro Reviriego and Salvatore Pontarelli Lightweight Acquisition and Ranging of Flows in the Data Plane . . . . . . . . 44:1--44:?? Adam Lechowicz and Nicolas Christianson and Jinhang Zuo and Noman Bashir and Mohammad Hajiesmaili and Adam Wierman and Prashant Shenoy The Online Pause and Resume Problem: Optimal Algorithms and An Application to Carbon-Aware Load Shifting . . . . . . . 45:1--45:?? Alagappan Ramanathan and Sangeetha Abdu Jyothi Nautilus: a Framework for Cross-Layer Cartography of Submarine Cables and IP Links . . . . . . . . . . . . . . . . . 46:1--46:?? Esteban Carisimo and Caleb J. Wang and Mia Weaver and Fabián E. Bustamante and Paul Barford A Hop Away from Everywhere: a View of the Intercontinental Long-haul Infrastructure . . . . . . . . . . . . . 47:1--47:?? Yige Hong and Qiaomin Xie and Weina Wang Near-Optimal Stochastic Bin-Packing in Large Service Systems with Time-Varying Item Sizes . . . . . . . . . . . . . . . 48:1--48:?? Peter Cai and Martin Karsten Kernel vs. User-Level Networking: Don't Throw Out the Stack with the Interrupts 49:1--49:?? Christos Tsanikidis and Javad Ghaderi Near-Optimal Packet Scheduling in Multihop Networks with End-to-End Deadline Constraints . . . . . . . . . . 50:1--50:?? Jintao Huang and Ningyu He and Kai Ma and Jiang Xiao and Haoyu Wang Miracle or Mirage? A Measurement Study of NFT Rug Pulls . . . . . . . . . . . . 51:1--51:?? Kai Li and Shixuan Guan and Darren Lee Towards Understanding and Characterizing the Arbitrage Bot Scam In the Wild . . . 52:1--52:?? Simon Lindståhl and Alexandre Proutiere and Andreas Johnsson Change Point Detection with Adaptive Measurement Schedules for Network Performance Verification . . . . . . . . 53:1--53:?? Yicheng Pan and Yang Zhang and Tingzhu Bi and Linlin Han and Yu Zhang and Meng Ma and Xiangzhuang Shen and Xinrui Jiang and Feng Wang and Xian Liu and Ping Wang HEAL: Performance Troubleshooting Deep inside Data Center Hosts . . . . . . . . 54:1--54:?? Minzhao Lyu and Rahul Dev Tripathi and Vijay Sivaraman MetaVRadar: Measuring Metaverse Virtual Reality Network Activity . . . . . . . . 55:1--55:?? Stella Bitchebe and Yves Kone and Pierre Olivier and Jalil Boukhobza and Yérom-David Bromberg and Daniel Hagimont and Alain Tchana GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection Support . . . . . . . . . . . 56:1--56:?? Walid A. Hanafy and Qianlin Liang and Noman Bashir and David Irwin and Prashant Shenoy CarbonScaler: Leveraging Cloud Workload Elasticity for Optimizing Carbon-Efficiency . . . . . . . . . . . 57:1--57:?? Yudi Huang and Yilei Lin and Ting He Optimized Cross-Path Attacks via Adversarial Reconnaissance . . . . . . . 58:1--58:?? Euijin Choo and Mohamed Nabeel and Doowon Kim and Ravindu De Silva and Ting Yu and Issa Khalil A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs . . . . . . . . . . . . . . 59:1--59:?? Jiayu Pan and Yin Sun and Ness B. Shroff Sampling for Remote Estimation of the Wiener Process over an Unreliable Channel . . . . . . . . . . . . . . . . 60:1--60:?? Avi Mizrahi and Daniella Bar-Lev and Eitan Yaakobi and Ori Rottenstreich Invertible Bloom Lookup Tables with Listing Guarantees . . . . . . . . . . . 61:1--61:?? Venkatraman Iyer and Sungho Lee and Semun Lee and Juitem Joonwoo Kim and Hyunjun Kim and Youngjae Shin Automated Backend Allocation for Multi-Model, On-Device AI Inference . . 62:1--62:??
Florin Ciucu and Giulia Fanti and Rhonda Righter POMACS V8, N1, March 2024 Editorial . . 1:1--1:?? Rohan Basu Roy and Devesh Tiwari StarShip: Mitigating I/O Bottlenecks in Serverless Computing for Scientific Workflows . . . . . . . . . . . . . . . 2:1--2:?? Radu Anghel and Yury Zhauniarovich and Carlos Gañán Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service . . . . . . . . . . . . . . . . 3:1--3:?? Jianyi Yang and Pengfei Li and Mohammad Jaminur Islam and Shaolei Ren Online Allocation with Replenishable Budgets: Worst Case and Beyond . . . . . 4:1--4:?? Gilbert Jonatan and Haeyoon Cho and Hyojun Son and Xiangyu Wu and Neal Livesay and Evelio Mora and Kaustubh Shivdikar and José L. Abellán and Ajay Joshi and David Kaeli and John Kim Scalability Limitations of Processing-in-Memory using Real System Evaluations . . . . . . . . . . . . . . 5:1--5:?? Huaifeng Zhang and Mohannad Alhanahnah and Fahmi Abdulqadir Ahmed and Dyako Fatih and Philipp Leitner and Ahmed Ali-Eldin Machine Learning Systems are Bloated and Vulnerable . . . . . . . . . . . . . . . 6:1--6:?? Chi-Jen (Roger) Lo and Mahesh K. Marina and Nishanth Sastry and Kai Xu and Saeed Fadaei and Yong Li Shrinking VOD Traffic via Rényi--Entropic Optimal Transport . . . . . . . . . . . 7:1--7:?? Scott Cheng and Jun-Liang Lin and Murali Emani and Siddhisanket Raskar and Sam Foreman and Zhen Xie and Venkatram Vishwanath and Mahmut Taylan Kandemir Thorough Characterization and Analysis of Large Transformer Model Training At-Scale . . . . . . . . . . . . . . . . 8:1--8:?? Runhan Xie and Isaac Grosof and Ziv Scully Heavy-Traffic Optimal Size- and State-Aware Dispatching . . . . . . . . 9:1--9:?? Neil Ortiz and Alvaro A. Cardenas and Avishai Wool SCADA World: an Exploration of the Diversity in Power Grid Networks . . . . 10:1--10:?? Xi Jiang and Shinan Liu and Aaron Gember-Jacobson and Arjun Nitin Bhagoji and Paul Schmitt and Francesco Bronzino and Nick Feamster NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation . . . . . . . . . . . . . . . 11:1--11:?? Negar Akbarzadeh and Sina Darabi and Atiyeh Gheibi-Fetrat and Amir Mirzaei and Mohammad Sadrosadati and Hamid Sarbazi-Azad H$3$DM: a High-bandwidth High-capacity Hybrid $3$D Memory Design for GPUs . . . 12:1--12:?? Liz Izhikevich and Manda Tran and Katherine Izhikevich and Gautam Akiwate and Zakir Durumeric Democratizing LEO Satellite Network Measurement . . . . . . . . . . . . . . 13:1--13:?? Nicolas Gast and Benny Van Houdt Approximations to Study the Impact of the Service Discipline in Systems with Redundancy . . . . . . . . . . . . . . . 14:1--14:?? Giovane C. M. Moura and Marco Davids and Caspar Schutijser and Cristian Hesselman and John Heidemann and Georgios Smaragdakis Deep Dive into NTP Pool's Popularity and Mapping . . . . . . . . . . . . . . . . 15:1--15:?? Alagappan Ramanathan and Rishika Sankaran and Sangeetha Abdu Jyothi Xaminer: an Internet Cross-Layer Resilience Analysis Tool . . . . . . . . 16:1--16:?? Fatih Aslan and George Iosifidis and Jose A. Ayala-Romero and Andres Garcia-Saavedra and Xavier Costa-Perez Fair Resource Allocation in Virtualized O-RAN Platforms . . . . . . . . . . . . 17:1--17:??
Florin Ciucu and Giulia Fanti and Rhonda Righter POMACS V8, N2, June 2024 Editorial . . . 18:1--18:?? Lingdong Wang and Simran Singh and Jacob Chakareski and Mohammad Hajiesmaili and Ramesh K. Sitaraman BONES: Near-Optimal Neural-Enhanced Video Streaming . . . . . . . . . . . . 19:1--19:?? Ruizhe Shi and Ruizhi Cheng and Bo Han and Yue Cheng and Songqing Chen A Closer Look into IPFS: Accessibility, Content, and Performance . . . . . . . . 20:1--20:?? Kahlil Dozier and Loqman Salamatian and Dan Rubenstein Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!) . . . . . . . . . . . . . . . . 21:1--21:?? Tianyue Chu and Nikolaos Laoutaris FedQV: Leveraging Quadratic Voting in Federated Learning . . . . . . . . . . . 22:1--22:?? Qingsong Liu and Zhixuan Fang Learning the Optimal Control for Evolving Systems with Converging Dynamics . . . . . . . . . . . . . . . . 23:1--23:?? Ellen Cardinaels and Sem Borst and Johan S. H. van Leeuwaarden Multi-dimensional State Space Collapse in Non-complete Resource Pooling Scenarios . . . . . . . . . . . . . . . 24:1--24:?? Yiguang Zhang and Reetahan Mukhopadhyay and Augustin Chaintreau Network Fairness Ambivalence: When does social network capital mitigate or amplify unfairness? . . . . . . . . . . 25:1--25:?? Diego Goldsztajn and Sem C. Borst and Johan S. H. van Leeuwaarden Server Saturation in Skewed Networks . . 26:1--26:?? George Yu and Ziv Scully Strongly Tail-Optimal Scheduling in the Light-Tailed M/G/1 . . . . . . . . . . . 27:1--27:?? Santosh Pandey and Amir Yazdanbakhsh and Hang Liu TAO: Re-Thinking DL-based Microarchitecture Simulation . . . . . . 28:1--28:??