By Topic

14th IEEE International Symposium on Modeling, Analysis, and Simulation

Date 11-14 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 53
  • 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - TOC

    Publication Year: 2006, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Committee Members

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Adapting Predictions and Workloads for Power Management

    Publication Year: 2006, Page(s):3 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Power conservation in systems is critical for mobile, sensor network, and other power-constrained environments. While disk spin-down policies can contribute greatly to reducing the power consumption of the storage subsystem, the reshaping of the access workload can actively increase such energy savings. Traditionally reshaping of the access workload is a result of caches passively modifying the wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelism-Aware Request Scheduling for MEMS-based Storage Devices

    Publication Year: 2006, Page(s):13 - 20
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    MEMS-based storage is being developed as a new storage media. Due to its attractive features such as high-bandwidth, low-power consumption, and low cost, MEMS storage is anticipated to be used for a wide range of applications. However, MEMS storage has vastly different physical characteristics compared to a traditional disk. First, MEMS storage has thousands of heads that can be activated simultan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • B: Disk Array Data Layout Tolerating Multiple Failures

    Publication Year: 2006, Page(s):21 - 32
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    We present B a novel data layout method for tolerating multiple disk failures within disk arrays. In a disk array with 2n disks, B tolerates at most 2(n - 1) simultaneous failures; reconstruction work is spread over the surviving disks using only exclusive-or operations. The data layout is based upon B array-codes; our approach provides an efficient software implementation. B utilizes the minimal ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Stadium-Scale Wireless Media Streaming

    Publication Year: 2006, Page(s):33 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    This paper proposes a scalable architecture for multimedia streaming in wireless LANs. Current IEEE 802.11 WLANs can support tens of media streaming users. We propose a hierarchical approach that can support over 1000 concurrent users. Our architecture exploits several existing technologies, including multi-channel WLANs, power control, and caching. The paper first describes the system design and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Spatial Stationarity of Link Statistics in Mobile Ad Hoc Network Modelling

    Publication Year: 2006, Page(s):43 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The performance evaluation of ad hoc network components through simulation allows for isolation of parameters, easy access to global quantities and a statistically significant number of repeatable trials. In designing network protocols, it is important to investigate the relationship between global network performance and the underlying locally observed network characteristics. Mobility models are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Optimal Path and Source Redundancy for Achieving QoS and Maximizing Lifetime of Query-Based Wireless Sensor Networks

    Publication Year: 2006, Page(s):51 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, as well as command and control in battlefield situations. In query-based sensor systems, a user would issue a query with quality of service (QoS) requirements in terms of reliability and timeliness, and expect a response to be returned within the deadline. Sati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics for Mass-Count Disparity

    Publication Year: 2006, Page(s):61 - 68
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Mass-count disparity is the technical underpinning of the "mice and elephants" phenomenon - that most samples are small, but a few are huge - which may be the most important attribute of heavy-tailed distributions. We propose to visualize this phenomenon by plotting the conventional distribution and the mass distribution together in the same plot. This then leads to a natural quantification of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Class of Non-Iterative Bounds for Closed Queueing Networks

    Publication Year: 2006, Page(s):69 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A new emerging class of problems related to the online configuration and optimization of computer systems and networks requires the solution in a very short amount of time of a large number of analytical performance models, often based on queueing networks. In this paper we propose the Geometric Bounds (GB), a new family of fast noniterative bounds on performance metrics of closed productform queu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • eRAID: A Queueing Model Based Energy Saving Policy

    Publication Year: 2006, Page(s):77 - 86
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Recently energy consumption becomes an ever critical concern for both low-end and high-end storage servers. In this paper, we propose an energy saving policy, eRAID (energy-efficient RAID), for mirrored redundant disk array systems. eRAID saves energy by spinning down partial or entire mirror disk group with controllable performance degradation. We first develop an energy-saving model for multi-di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Impact of OS and Linker Effects on Level-2 Cache Performance

    Publication Year: 2006, Page(s):87 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The design of microprocessors depends strongly on architectural simulation. As simulation can be very slow, it is necessary to reduce simulation time by simplifying the simulator and increasing its level of abstraction. A very common abstraction is to ignore operating system effects. As a result of this, there is no information available during simulation about the relationship between virtual add... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Holistic Debugging -- Enabling Instruction Set Simulation for Software Quality Assurance

    Publication Year: 2006, Page(s):96 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    We present holistic debugging, a novel method for observing execution of complex and distributed software. It builds on an instruction set simulator, which provides reproducible experiments and non-intrusive probing of state in a distributed system. Instruction set simulators, however, only provide low-level information, so a holistic debugger contains a translation framework that maps this inform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Statistical Traffic Model for On-Chip Interconnection Networks

    Publication Year: 2006, Page(s):104 - 116
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB) | HTML iconHTML

    Network traffic modeling is a critical first step towards understanding and unraveling network power/performancerelated issues. Extensive prior research in the area of classic networks such as the Internet, Ethernet, and wireless LANs transporting TCP/IP, HTTP, and FTP traffic among others, has demonstrated how traffic models and model-based synthetic traffic generators can facilitate understandin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • V-eM: A Cluster of Virtual Machines for Robust, Detailed, and High-Performance Network Emulation

    Publication Year: 2006, Page(s):117 - 126
    Cited by:  Papers (13)  |  Patents (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    In this paper we present the design and performance evaluation of a network emulation cluster built with commodity PCs and network switches. Each emulated node runs inside its own virtual machine and is complete with a kernel and device drivers and the virtual machine monitor ensures isolation between the emulated nodes, fair access to the resources of the underlying physical node, and high perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sluggish Calendar Queues for Network Simulation

    Publication Year: 2006, Page(s):127 - 136
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1464 KB) | HTML iconHTML

    Discrete event simulation is an indispensable tool to understand the dynamics of communication networks and evaluate their performance. As the scale and complexity of these networks increases, simulation itself becomes a computationally prohibitive undertaking. Among all possible solutions, improving the performance of event manipulation operations is an important one. In this paper, we discover t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Packet Encapsulation and Aggregation

    Publication Year: 2006, Page(s):137 - 146
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In an attempt to increase data throughput, many modern data transmission protocols provide capabilities for aggregating transmitted data fragments into larger packets at the time of encapsulation in a particular OSI layer. The decision and ability to aggregate packets into a single frame can have significant impact on the performance of the communication system. The impact can be even more substan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Microarchitecture Soft Error Vulnerability Phase Behavior

    Publication Year: 2006, Page(s):147 - 155
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Computer systems increasingly depend on exploiting program dynamic behavior to optimize performance, power and reliability. Prior studies have shown that program execution exhibits phase behavior in both performance and power domains. Reliabilityoriented program phase behavior, however, remains largely unexplored. As semiconductor transient faults (soft errors) emerge as a critical challenge to re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fluid-Diffusive Approach for Modelling P2P Systems

    Publication Year: 2006, Page(s):156 - 166
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper presents an application of basic concepts of statistical physics to devise an approximate model describing the dynamics of large peer-to-peer networks, based on fluid-diffusive equations. The model we propose is quite general and highly modular, and allows to represent several effects related to resources distribution among peers, user behavior, resource localization algorithms and dyna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Site-Level Modeling to Evaluate the Performance of Parallel System Schedulers

    Publication Year: 2006, Page(s):167 - 178
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The conventional performance evaluation methodology for parallel system schedulers uses an open model to generate the workloads used in simulations. In many cases recorded workload traces are simply played back, assuming that they are reliable representatives of real workloads, and leading to the expectation that the simulation results actually predict the scheduler’s true performance. We sho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.