By Topic

39th Annual Simulation Symposium (ANSS'06)

Date 2-6 April 2006

Filter Results

Displaying Results 1 - 25 of 46
  • 39th Annual Simulation Symposium - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Proceedings. 39th Annual Simulation Symposium

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • 39th Annual Simulation Symposium - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • 39th Annual Simulaltion Symposium

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • Modeling and Simulation of Context-Awareness

    Publication Year: 2006, Page(s): xi
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Design and analysis of an adaptive, global strategy for detecting and mitigating distributed DoS attacks in grid environments

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Basic protection schemes against denial-of-service (DoS) are based on a perimeter-based model, where attacks are dealt with after they occur. This is quite often too late to prevent damage or loss of resources and service. The focus of this paper is to investigate a distributed defense method that can neutralize the attack before it reaches the potential target in mass. In order to effectively imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for adaptive wavelet prediction in self-sizing networks

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    In this paper, we propose a traffic predictor based on multiresolution decomposition for the adaptive bandwidth control in locally controlled self-sizing networks. A self-sizing network can provide quantitative packet-level QoS to aggregate traffic by allocating link/switch capacity automatically and adaptively using online traffic data. In a locally controlled network such as Internet, resource a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation study of firewalls to aid improved performance

    Publication Year: 2006
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The overall performance of a firewall is crucial in enforcing and administrating security, especially when the network is under attack. The continuous growth of the Internet, coupled with the increasing sophistication of the attacks, is placing stringent demands on firewall performance. Under such circumstances it becomes very vital to understand the fundamental behind firewalls and their operatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of end-to-end traffic-aware routing

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    There has been a lot research effort on developing reactive routing algorithms for mobile ad hoc networks (MANETs) over the past few years. Most of these algorithms consider finding the shortest path from source to destination in building a route. However, this can lead to some network nodes being more overloaded than the others. In MANETs resources, such as node power and channel bandwidth are of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and optimization for the design of IMS networks

    Publication Year: 2006
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    The IP multimedia subsystem (IMS) is envisioned as the solution for the next generation multimedia rich communication. Based on an open IP infrastructure, it enables convergence of data, speech, video and mobile network technology. The session initiation protocol (SIP) is the signaling protocol chosen by the 3GPP consortium for IMS. We propose to analyze the IMS network based on the SIP signaling ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized Credit Based QoS Routing : Performance Evaluation Using

    Publication Year: 2006, Page(s):42 - 49
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Localized Quality of Service (QoS) routing has recently been proposed as a viable alternative approach to traditional QoS routing algorithms that use global state information. In this approach, problems associated with maintaining global state information and the staleness of such information are avoided by having the source nodes to infer the network QoS state based on flow blocking statistics co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and evaluation of the effect of obstacles on the performance of wireless sensor networks

    Publication Year: 2006
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB) | HTML iconHTML

    In this work, we propose an obstacle model to be used while simulating wireless sensor networks. To the best of our knowledge, this is the first time such an integrated and systematic obstacle model appears. We define several types of obstacles that can be found inside the deployment area of a wireless sensor network and provide a categorization of these obstacles, based on their nature (physical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new scheme for mobility, sensing, and security management in wireless ad hoc sensor networks

    Publication Year: 2006
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The growth of different network architectures to connect wireless sensors for monitoring physical environments has become an important application area. Chief issues related to such systems include: (a) the permanence of environment monitoring, (b) the mobility management of sensors, (c) the ad-hoc communication method, and (d) the security of responsive messages. This paper presents an ad-hoc arc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and performance evaluation of two zone dissemination protocols for vehicular ad-hoc networks

    Publication Year: 2006
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Vehicular ad-hoc networks is an emerging research area focussing on communication infrastructures that support vehicles and road-signs in distributing road-state data such as information about hazardous road conditions ahead, approaching emergency vehicles, and traffic delays. Vehicular ad-hoc networks combine the areas of sensor networks (data acquisition) with mobile ad-hoc networks (highly dyna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of packet processing architectures using multiclass queuing networks

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Modern real-time systems consist of complex parallel and heterogeneous architectures. Early design decisions, such as the partitioning of functionality onto architecture building blocks and the choice of algorithms, have a large impact on the quality of the resulting platform. In order to support the designer during this concept phase, we have developed our performance evaluation framework SystemQ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed quasi-Monte Carlo algorithm for option pricing on HNOWs using mpC

    Publication Year: 2006
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Monte Carlo (MC) simulation is one of the popular approaches for approximating the value of options and other derivative securities due to the absence of straightforward closed form solutions for many financial models. However, the slow convergence rate, O(N- 12/) for N number of samples of the MC method has motivated research in quasi Monte-Carlo (QMC) techniques. QMC methods use low d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Grid-boxing for spatial simulation performance optimisation

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Computer simulations of complex systems such as physical aggregation processes or swarming and collective behaviour of life-forms, often require order N-squared computational complexity for N microscopic components. This is a significant handicap to simulating systems large enough to compare with real-world experimental data. We discuss space partitioning methods for two such simulation codes and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adapted importance sampling schemes for the simulation of dependability models of fault-tolerant systems with deferred repair

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This paper targets the simulation of continuous-time Markov chain models of fault-tolerant systems with deferred repair. We start by stating sufficient conditions for a given importance sampling scheme to satisfy the bounded relative error property. Using those sufficient conditions, it is noted that many previously proposed importance sampling techniques such as failure biasing and balanced failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A mathematical model for performability of Beowulf clusters

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Beowulf clusters have become very popular as an alternative to supercomputers world-wide. However, the most pressing issues of today's cluster solutions is the need for high availability and performance. Such systems, clearly, are prone to break-downs. Even if cover is provided with some probability c, there will be reconfiguration and/or rebooting delays to resume the operation of a cluster. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and performability analysis of network memory servers

    Publication Year: 2006
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    This paper presents an analytical method for the performability evaluation of a proposed network memory server attached to a local area network. The proposed server is expected to improve data storage and retrieval. However, the underlying network will receive an increased amount of traffic which may have a significant effect on the network's performance. The proposed analytical model and its solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance modeling and evaluation of e-business systems

    Publication Year: 2006
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    A general model of an e-business system comprising an application server and a database engine is analyzed and evaluated. Incoming jobs, once admitted for processing, compete for the available resources. Database accesses are of different types and are subject to time-outs. An efficient approximate solution is provided; its accuracy is evaluated by comparing the model estimates with those obtained... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance enhancement by eliminating redundant function execution

    Publication Year: 2006
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Programs often call the same function with the same arguments, yielding the same results. We call this phenomenon, "function reuse". Previously, we have shown such a behavior for some of the SPEC2000 integer benchmarks using HP ATOM instrumentation tools. However, this required extensive analysis by hand, and assumptions regarding side-effects caused by functions. In this paper, we modified a well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.