Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 09 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis
Article No.: 41, Pages 1–32https://doi.org/10.1145/3428326

Driven by the rapid growth of content traffic and the demand for service quality, Internet content providers (CPs) have started to bypass transit providers and connect with access providers directly via private peering agreements. This peering ...

research-article
Achieving Zero Asymptotic Queueing Delay for Parallel Jobs
Article No.: 42, Pages 1–36https://doi.org/10.1145/3428327

Zero queueing delay is highly desirable in large-scale computing systems. Existing work has shown that it can be asymptotically achieved by using the celebrated Power-of-d-choices (pod) policy with a probe overhead $d = ømegałeft(\fracłog N 1-łambda \...

research-article
Open Access
The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions
Article No.: 43, Pages 1–29https://doi.org/10.1145/3428328

The Gittins scheduling policy minimizes the mean response in the single-server M/G/1 queue in a wide variety of settings. Most famously, Gittins is optimal when preemption is allowed and service requirements are unknown but drawn from a known ...

research-article
Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints
Article No.: 44, Pages 1–31https://doi.org/10.1145/3428329

The intrinsic hardware imperfection of WiFi chipsets manifests itself in the transmitted signal, leading to a unique radiometric fingerprint. This fingerprint can be used as an additional means of authentication to enhance security. In fact, recent works ...

research-article
Public Access
Optimal Load Balancing with Locality Constraints
Article No.: 45, Pages 1–37https://doi.org/10.1145/3428330

Applications in cloud platforms motivate the study of efficient load balancing under job-server constraints and server heterogeneity. In this paper, we study load balancing on a bipartite graph where left nodes correspond to job types and right nodes ...

research-article
Open Access
Achievable Stability in Redundancy Systems
Article No.: 46, Pages 1–21https://doi.org/10.1145/3428331

We consider a system with N~parallel servers where incoming jobs are immediately replicated to, say, d~servers. Each of the N servers has its own queue and follows a FCFS discipline. As soon as the first job replica is completed, the remaining replicas ...

research-article
Open Access
I Know What You Bought At Chipotle for $9.81 by Solving A Linear Inverse Problem
Article No.: 47, Pages 1–17https://doi.org/10.1145/3428332

We consider the question of identifying which set of products are purchased and at what prices in a given transaction by observing only the total amount spent in the transaction, and nothing more. The ability to solve such an inverse problem can lead to ...

research-article
Improving the Performance of Heterogeneous Data Centers through Redundancy
Article No.: 48, Pages 1–29https://doi.org/10.1145/3428333

We analyze the performance of redundancy in a multi-type job and multi-type server system. We assume the job dispatcher is unaware of the servers' capacities, and we set out to study under which circumstances redundancy improves the performance. With ...

research-article
Magma: A Ground-Truth Fuzzing Benchmark
Article No.: 49, Pages 1–29https://doi.org/10.1145/3428334

High scalability and low running costs have made fuzz testing the de facto standard for discovering software bugs. Fuzzing techniques are constantly being improved in a race to build the ultimate bug-finding tool. However, while fuzzing excels at finding ...

research-article
Tracking Counterfeit Cryptocurrency End-to-end
Article No.: 50, Pages 1–28https://doi.org/10.1145/3428335

The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the cryptocurrency ecosystem, there is expanding evidence that ...

research-article
Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging
Article No.: 51, Pages 1–32https://doi.org/10.1145/3428336

We introduce and study a general version of the fractional online knapsack problem with multiple knapsacks, heterogeneous constraints on which items can be assigned to which knapsack, and rate-limiting constraints on the assignment of items to knapsacks. ...

research-article
Open Access
Bregman-style Online Convex Optimization with EnergyHarvesting Constraints
Article No.: 52, Pages 1–25https://doi.org/10.1145/3428337

This paper considers online convex optimization (OCO) problems where decisions are constrained by available energy resources. A key scenario is optimal power control for an energy harvesting device with a finite capacity battery. The goal is to minimize ...

Subjects

Comments