Venue of SIGMETRICS 2021

ACM SIGMETRICS 2021

Beijing, China
June 14-18, 2021

Accepted Papers

Summer Deadline

  • On Private Peering Agreements between Content and Access Providers: A Contractual Equilibrium Analysis by Xin Wang (National University of Singapore), Richard Ma (National University of Singapore)
  • Achieving Zero Asymptotic Queueing Delay for Parallel Jobs by Wentao Weng (Tsinghua University), Weina Wang (Carnegie Mellon University)
  • The Gittins Policy is Nearly Optimal in the M/G/k under Extremely General Conditions by Ziv Scully (Carnegie Mellon University), Isaac Grosof (Carnegie Mellon University; Mor Harchol-Balter (Carnegie Mellon University)
  • Stay Connected, Leave no Trace: Enhancing Security and Privacy in WiFi via Obfuscating Radiometric Fingerprints by Luis F. Abanto-Leon (Technical University of Darmstadt), Andreas Bäuml (Technical University of Darmstadt), Gek Hong (Allyson) Sim (Technical University of Darmstadt), Matthias Hollick (Technical University of Darmstadt), Arash Asadi (Technical University of Darmstadt)
  • Optimal Load Balancing with Locality Constraints by Wentao Weng (Tsinghua University), Xingyu Zhou (The Ohio State University), R Srikant (UIUC)
  • Achievable Stability in Redundancy Systems by Youri Raaijmakers (Eindhoven University of Technology), Sem Borst (Eindhoven University of Technology (TU/e))
  • I Know What You Bought At Chipotle for 9.81 by Solving A Linear Inverse Problem by Michael Fleder (Massachusetts Institute of Technology), Devavrat Shah (Massachusetts Institute of Technology)
  • Improving the performance of heterogeneous data centers through redundancy by Elene Anton (CNRS-IRIT, Toulouse INP), Urtzi Ayesta (CNRS-IRIT and Ikerbasque/Univ. Basque Country), Matthieu Jonckheere (University of Buenos Aires), Maaike Verloop (IRIT-CNRS)
  • A New Methodology and Open-Source Benchmark Suite for Evaluating Data Movement Bottlenecks: A Near-Data Processing Case Study by Geraldo Francisco de Oliveira Junior (ETH Zurich), Juan Gómez Luna (ETH Zurich), Saugata Ghose (University of Illinois at Urbana-Champaign / Carnegie Mellon University), Lois Orosa (ETH Zurich), Nandita Vijaykumar (University of Toronto/Intel), Ivan Fernandez: (University of Malaga (Spain)), Mohammad Sadrosadati (Sharif University of Technology), Onur Mutlu (ETH Zurich)
  • Load Balancing Under Strict Compatibility Constraints by Daan Rutten (Georgia Institute of Technology), Debankur Mukherjee (Georgia Institute of Technology)
  • Magma: A Ground-Truth Fuzzing Benchmark by Ahmad Hazimeh (EPFL), Adrian Herrera (Defence Science and Technology Group), Mathias Payer (EPFL)
  • Tracking Counterfeit Cryptocurrency End-to-end by Bingyu Gao (Beijing University of Posts and Telecommunications), Haoyu Wang (Beijing University of Posts and Telecommunications), Pengcheng Xia Beijing University of Posts and Telecommunications), Siwei Wu (Zhejiang University), Yajin Zhou (Zhejiang University), Xiapu Luo (The Hong Kong Polytechnic University), Gareth Tyson (Queen Mary University of London)
  • Competitive Algorithms for the Online Multiple Knapsack Problem with Application to Electric Vehicle Charging by Bo Sun (The Hong Kong University of Science and Technology), Ali Zeynali (University of Massachusetts Amherst), Tongxin Li (California Institute of Technology), Mohammad Hajiesmaili (University of Massachusetts Amherst), Adam Wierman (California Institute of Technology), Danny H.K. Tsang (The Hong Kong University of Science and Technology)
  • Bregman-style Online Convex Optimization with Energy Harvesting Constraints by Kamiar Asgari (University of Southern California), Michael Neely (University of Southern California)

Fall Deadline

  • SUGAR: Speeding Up GPGPU Application Resilience Estimation with Input Sizing by Lishan Yang (William & Mary), Bin Nie (William & Mary), Adwait Jog (William & Mary), Evgenia Smirni (William & Mary)
  • Federated Bandit: A Gossiping Approach by Zhaowei Zhu (University of California, Santa Cruz), Jingxuan Zhu (Stony Brook University), Ji Liu (Stony Brook University), Yang Liu (University of California, Santa Cruz)
  • Understanding the Impact of Emerging Non-Volatile Memory in Off-the-Shelf Consumer Devices by Geraldo Francisco De Oliveira Junior (ETH Zurich), Saugata Ghose (University of Illinois at Urbana-Champaign / Carnegie Mellon University), Juan Gómez Luna (ETH Zurich), Amirali Boroumand (Carnegie Mellon University), Alexis Savery (Google), Sonny Rao (Google), Salman Qazi (Google), Gwendal Grignou (Google), Rahul Thakur (Google), Eric Shiu (Google), Onur Mutlu (ETH Zurich)
  • adPerf: Characterizing the Performance of Third-party Ads by Behnam Pourghassemi (University of California, Irvine), Jordan Bonecutter (University of California, Irvine), Zhou Li (University of California, Irvine), Aparna Chandramowlishwaran (University of California, Irvine)
  • A Look Behind the Curtain: Traffic Classification in an Increasingly Encrypted Web by Iman Akbari (University of Waterloo), Mohammad A. Salahuddin (University of Waterloo), Leni Ven (University of Waterloo), Noura Limam (University of Waterloo), Raouf Boutaba (University of Waterloo), Bertrand Mathieu (Orange Labs), Stephanie Moteau (Orange Labs), Stephane Tuffin (Orange Labs)
  • Approximation Algorithms for Submodular Data Summarization with a Knapsack Constraint by Kai Han (University of Science and Technology of China), Shuang Cui (University of Science and Technology of China), Tianshuai Zhu (University of Science and Technology of China), Enpei Zhang (University of Science and Technology of China), Benwei Wu (University of Science and Technology of China), Zhizhuo Yin (University of Science and Technology of China), Tong Xu (University of Science and Technology of China), Shaojie Tang (University of Texas at Dallas), He Huang (Soochow University)
  • Dynamic Pricing and Matching for Two-Sided Markets with Strategic Servers by Sushil Mahavir Varma (Georgia Institute of Technology), Francisco Castro (University of California, Los Angeles), Siva Theja Maguluri (Georgia Institute of Technology)
  • Input-Dynamic Distributed Algorithms for Communication Networks by Klaus-Tycho Foerster (University of Vienna), Janne H. Korhonen (IST Austria), Ami Paz (University of Vienna), Joel Rybicki (IST Austria), Stefan Schmid (University of Vienna)
  • Zero Queueing for Multi-Server Jobs by Weina Wang (Carnegie Mellon University), Qiaomin Xie (Cornell University), Mor Harchol-Balter (Carnegie Mellon University)
  • Revisiting Modified Greedy Algorithm for Monotone Submodular Maximization with a Knapsack Constraint by Jing Tang (National University of Singapore), Xueyan Tang (Nanyang Technological University), Andrew Lim (National University of Singapore), Kai Han (University of Science and Technology of China), Chongshou Li (National University of Singapore), Junsong Yuan (State University of New York at Buffalo)
  • Online Virtual Machine Allocation with Lifetime and Load Predictions by Niv Buchbinder (Tel Aviv University and Microsoft Research), Yaron Fairstein (Technion), Konstantina Mellou (Microsoft Research), Ishai Menache (Microsoft Research), Joseph (Seffi) Naor (Technion)
  • Benchmarking a New Paradigm: Understanding a Modern Processing-in-Memory Architecture by Juan Gómez-Luna (ETH Zurich), Izzat El Hajj (AUB), Iván Fernández (Universidad de Málaga), Christina Giannoula (National Technical University of Athens), Geraldo Francisco de Oliveira Junior (ETH Zurich Onur Mutlu (ETH Zurich)
  • Statistically Efficient, Polynomial-Time Algorithms for Combinatorial Semi-Bandits by Thibaut Cuvelier (Orange Labs & CentraleSupélec), Richard Combes (CentraleSupélec), Eric Gourdin (Orange Labs)

Winter Deadline

  • Real-time approximate routing for smart transit systems by Noémie Périvier (Columbia University), Chamsi Hssaine (Cornell University), Samitha Samaranayake (Cornell University), Siddhartha Banerjee (Cornell University)
  • Mean Waiting Time in Large-Scale and Critically Loaded Power of d Load Balancing Systems by Tim Hellemans (University of Antwerp), Benny Van Houdt (University of Antwerp)
  • The Power of $D$-hops in Matching Power-Law Graphs by LIREN YU (Purdue University), Jiaming Xu (Duke University), Xiaojun Lin (Purdue University)
  • Where did my 256GB go? Large-scale Analysis of Mobile Storage Consumption by Ashish Bijlani (Georgia Tech), Kishore Ramachandran (Georgia Tech), Roy H. Campbell (University of Illinois at Urbana-Champaign)
  • Refining Mean-field Approximations by Dynamic State Truncation by Francesca Randone (IMT School for Advanced Studies Lucca), Luca Bortolussi (University of Trieste), Mirco Tribastone (IMT School for Advanced Studies Lucca)
  • On the Asymptotic Insensitivity of the Supermarket Model in Processor Sharing Systems by Grzegorz Kielanski (University of Antwerp), Benny Van Houdt (University of Antwerp)
  • A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software by Qingzhao Zhang (University of Michigan), Ke David Hong (University of Michigan), Ze Zhang (University of Michigan), Qi Alfred Chen (UC Irvine), Scott Mahlke (University of Michigan/Nvidia Research), Z. Morley Mao (University of Michigan)
  • Nudge: Stochastically Improving upon FCFS by Isaac Grosof (Carnegie Mellon University) Kunhe Yang (Tsinghua University), Ziv Scully (Carnegie Mellon University), Mor Harchol-Balter (Carnegie Mellon University)
  • Chasm in Hegemony: Explaining and Reproducing Disparities in Homophilous Networks by Yiguang Zhang (Columbia University), Jessy Xinyi Han (Massachusetts Institute of Technology), Ilica Mahajan (Columbia University), Priyanjana Bengani (Columbia University), Augustin Chaintreau (Columbia University)
  • Mix and Match: Reorganizing Tasks for Enhancing Data Locality by Xulong Tang (University of Pittsburgh, USA), Mahmut Taylan Kandemir (Penn State, USA), Mustafa Karakoy (TUBITAK-BILGEM, Turkey)
  • Information Aggregation for Constrained Online Control by Tongxin Li (California Institute of Technology), Yue Chen (Tsinghua University), Bo Sun (The Hong Kong University of Science and Technology), Adam Wierman (California Institute of Technology), Steven H. Low (California Institute of Technology)
  • DeepSketch: A Learning-based Reference Search Technique for Post-deduplication Delta Compression by Jisung Park (ETH Zürich), Jeonggyun Kim (DGIST), Yeseong Kim (DGIST), Sungjin Lee (DGIST), Onur Mutlu (ETH Zürich)
  • SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts by Weimin Chen (Beijing University of Posts and Telecommunications), Xinran Li (Beijing University of Posts and Telecommunications), Yuting Sui (Beijing University of Posts and Telecommunications), Ningyu He (Peking University), Haoyu Wang (Beijing University of Posts and Telecommunications), Lei Wu (Zhejiang University), Xiapu Luo (The Hong Kong Polytechnic University)
  • A Measurement Study of Wechat Mini-Apps by Yue Zhang (Computer Science & Engineering, Ohio State University), Bayan Turkistani (Computer Science & Engineering, Ohio State University), Allen Yuqing Yang (Ohio State University), Chaoshun Zuo (Ohio State University), Zhiqiang Lin (Ohio State University)
  • PredictRoute: A Network Path Prediction Toolkit by Rachee Singh (Microsoft/University of Massachusetts Amherst), David Tench (University of Massachusetts Amherst), Phillipa Gill (University of Massachusetts Amherst), Andrew McGregor (University of Massachusetts Amherst)