By Topic

13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

27-29 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 78
  • 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Table of contents

    Publication Year: 2005, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (48 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (54 KB) | HTML iconHTML
    Freely Available from IEEE
  • Comittees

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Referees

    Publication Year: 2005, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • The challenge of complexity and scale

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB) | HTML iconHTML

    Summary form only given. Systems built from commodity processors dominate high-performance computing, with systems containing thousands of processors now being deployed. As node counts for multi-teraflop systems grow to tens of thousands, with proposed petaflop system likely to contain hundreds of thousands of nodes, and with a tsunami of new experimental and computational. The mean time before fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards pairing Java applications on SMT processors

    Publication Year: 2005, Page(s):7 - 14
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    This paper investigates various issues of pairing Java applications for multithreaded execution on Intel's hyper-threading Pentium 4 processor. We first quantify the overall performance of multiprogrammed Java applications using a metric called combined speedup. Using the performance counters provided by the Pentium 4, we then quantitatively evaluate the performance of underneath micro-architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workload characterization of bioinformatics applications

    Publication Year: 2005, Page(s):15 - 22
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    The exponential growth in the amount of genomic information has spurred growing interest in large scale analysis of genetic data. Bioinformatics applications represent the increasingly important workloads. However, very few results on the behavior of these applications running on the state-of-the-art microprocessor and systems have been published. This paper proposes a suite of widely used bioinfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved estimation for software multiplexing of performance counters

    Publication Year: 2005, Page(s):23 - 32
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    On-chip performance counters are gaining popularity as an analysis and validation tool. Most contemporary processors have between two and six physical counters that can monitor an equal number of unique events simultaneously at fixed sampling periods. Through multiplexing and estimation, an even greater number of unique events can be monitored in a single program execution. When a program is sampl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding patterns of TCP connection usage with statistical clustering

    Publication Year: 2005, Page(s):35 - 44
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    We describe a new methodology for understanding how applications use TCP to exchange data. The method is useful for characterizing TCP workloads and synthetic traffic generation. Given a packet header trace, the method automatically constructs a source-level model of the applications using TCP in a network without any a priori knowledge of which applications are actually present in a network. From... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical model of TCP performance

    Publication Year: 2005, Page(s):45 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    We propose a model of TCP performance that captures the behavior of a set of network paths with diverse characteristics. The model uses more parameters than others, but we show that each feature of the model is important for at least some paths. We show that the model is sufficient to describe the datasets we collected with acceptable accuracy. Finally, we show that the model's parameters can be e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High short-term bit-rates from TCP flows

    Publication Year: 2005, Page(s):55 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    Micro-bursts from TCP flows are investigated. The chip-rate is introduced and used to quantify the short-term bit-rate of TCP flows. This paper examines packets with chip-rates above the 90th percentile. The examination is performed over time scales ranging from 244 μs to 125 ms. Two issues are addressed, the impact and the causes of the micro-bursts. It is found that the packets wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical simulation of multithreaded architectures

    Publication Year: 2005, Page(s):67 - 74
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Detailed, cycle-accurate processor simulation is an integral component of the design and study of computer architectures. However, as the detail of simulation and processor design size increase, simulation times grow exponentially, and it becomes increasingly necessary to find fast, efficient simulation techniques that still ensure accurate results. At the same time, multithreaded multi-core desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate modeling of aggressive speculation in modern microprocessor architectures

    Publication Year: 2005, Page(s):75 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Computer architects utilize cycle simulators to evaluate microprocessor chip design tradeoffs and estimate performance metrics. Traditionally, cycle simulators are either trace-driven or execution-driven. In this paper, we describe ValueSim, a software layer that is interposed between a cycle simulators and either a functional simulator or a value-enhanced trace. By writing to the ValueSim API, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cycle accurate memory modeling a case-study in validation

    Publication Year: 2005, Page(s):85 - 94
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Simulation is an integral tool in performance analysis, however without some knowledge of a simulator's underlying accuracy and limitations, the results may prove wrong or misleading. Timing validation is one aspect of development which is easy to overlook, typically due to the lack of a comparison target at the time the simulator was written. This paper discusses the design and validation of an a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of TCP/AQM under denial-of-service attacks

    Publication Year: 2005, Page(s):97 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The interaction between TCP and various active queue management (AQM) algorithms has been extensively analyzed for the last few years. However, the analysis usually assumed that routers and TCP flows are not under any network attacks. In this paper, we investigate how the performance of TCP flows is affected by denial-of-service (DoS) attacks under the drop tail and various AQM schemes. In particu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving OSPF dynamics on a broadcast LAN

    Publication Year: 2005, Page(s):105 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    In this paper, we analyze OSPF's interface state machine and propose modifications in order to reduce the time/processing requirements of the leader election process in a broadcast LAN environment. The proposed modifications are based on dynamic adjustment of wait time duration rather than using a static value. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of routing protocols in very large-scale mobile wireless ad hoc networks

    Publication Year: 2005, Page(s):115 - 122
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    As wireless devices become more and more popular, ad hoc networks grow in the number of nodes as well as the complexity of communication among the large number of nodes. However, due to the limitation of simulation technologies, it is either impossible or very hard to investigate the scalability of ad hoc routing protocols in very large-scale wireless networks. In this paper, a comprehensive simul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disk infant mortality in large storage systems

    Publication Year: 2005, Page(s):125 - 134
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    As disk drives have dropped in price relative to tape, the desire for the convenience and speed of online access to large data repositories has, led to the deployment of petabyte-scale disk farms with thousands of disks. Unfortunately, the very large size of these repositories renders them vulnerable to previously rare failure modes such as multiple, unrelated disk failures leading to data loss. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage performance virtualization via throughput and latency control

    Publication Year: 2005, Page(s):135 - 142
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    I/O consolidation is a growing trend in production environments due to the increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to serve multiple users/workloads simultaneously. It is imperative to make sure that these users are insulated from each other by visualization in order to meet any service level objective (SLO). This paper presents a 2-lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified multiple-level cache for high performance storage systems

    Publication Year: 2005, Page(s):143 - 150
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Multi-level cache hierarchies are widely used in high-performance storage systems to improve I/O performance. However, traditional cache management algorithms are not suited well for such cache organizations. Recently proposed multi-level cache replacement algorithms using aggressive exclusive caching work well with single or multiple-client, low-correlated workloads, but suffer serious performanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A traffic characterization procedure for multimedia applications in converged networks

    Publication Year: 2005, Page(s):153 - 160
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    This work presents a traffic characterization procedure for traffic engineering (TE) in converged networks. An analytical model, focused in a self-similar aggregated traffic characterization is proposed, which considers QoS restrictions for delay metrics. The model, together with evolutionary techniques, is used for the optimization of the link capacity assignment task in network planning with mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.