By Topic

Principles of Advanced and Distributed Simulation, 2008. PADS '08. 22nd Workshop on

Date 3-6 June 2008

Filter Results

Displaying Results 1 - 25 of 40
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (565 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Message from General Chair

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chair

    Publication Year: 2008, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (114 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2008, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Mobility Models for Wireless Networks: Challenges, Pitfalls, and Successes

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The performance of any mobile network is highly influenced by the mobility patterns of nodes in the network. In fact mobility behavior is the most important environmental factor that determines performance and influences network design. Thus it is important that we develop models that (1) accurately capture the mobility of nodes, while at the same time (2) are amenable to mathematical analysis and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Jails: A Hybrid Approach to Scalable Network Emulation

    Publication Year: 2008, Page(s):7 - 14
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    It is essential to evaluate the performance of newly developed distributed software and network protocols. Network emulation enables reproducible evaluation of unmodified real implementations. Software built for distributed systems, such as a large scale peer-to-peer system, requires evaluation scenarios with thousands of communicating nodes. Two approaches for scaling network emulation to such sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Model Update Algorithms for Remote Network Emulation

    Publication Year: 2008, Page(s):15 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Remote network emulation is an approach that utilizes a remote parallel simulator to improve the scale and accuracy of network emulation for general users with no local access to high performance computing facilities. The remote network emulation approach involves using a large scale detailed packet level simulation at a remote site in conjunction with a local network emulation to quickly provide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Scalable Routing Experiments with Real-Time Network Simulation

    Publication Year: 2008, Page(s):23 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1831 KB) | HTML iconHTML

    The ability to conduct accurate and realistic experiments is critical in furthering the research and development of network routing protocols. Existing framework for routing experiments is found to be lacking in one or more of the three required features: realism, scalability, and flexibility. We develop a new software infrastructure that combines the scalability and flexibility benefits of real-t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Vehicular Traffic Simulation using Reverse Computation-based Optimistic Execution

    Publication Year: 2008, Page(s):33 - 42
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Vehicular traffic simulations are useful in applications such as emergency management and homeland security planning tools. High speed of traffic simulations translates directly to speed of response and level of resilience in those applications. Here, a parallel traffic simulation approach is presented that is aimed at reducing the time for simulating emergency vehicular traffic scenarios. Three u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling and Simulation of Pedestrian Behaviours

    Publication Year: 2008, Page(s):43 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    The modelling and simulation of autonomous pedestrians has important applications in real-time crowd and crisis simulations. With the increase in processing powers and dedicated graphics cards, more processing powers can now be allocated for the generation of realistic behaviours for individuals within the crowd. We have proposed a representation for autonomous agents that is aimed to generate som... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel and Distributed Spatial Simulation of Chemical Reactions

    Publication Year: 2008, Page(s):51 - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    The application of parallel and distributed simulation techniques is often limited by the amount of parallelism available in the model. This holds true for large-scale cell- biological simulations, afield that has emerged as data and knowledge concerning these systems increases and biologists call for tools to guide wet-lab experimentation. A promising approach to exploit parallelism in this domai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Referee Selection for Fair and Responsive Peer-to-Peer Gaming

    Publication Year: 2008, Page(s):63 - 71
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (670 KB) | HTML iconHTML

    Peer-to-peer (P2P) architectures for Massively Multiplayer Online Games (MMOG) provide better scalability than Client/Server (CIS); however, they increase the possibility of cheating. Recently proposed P2P protocols use trusted referees that simulate/validate the game to provide security equivalent to C/S. When selecting referees from un- trusted peers, selecting non-colluding referees becomes cri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Process Models for Packet/Analytic-Based Network Simulations

    Publication Year: 2008, Page(s):72 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    WE present our preliminary work that develops a new approach to hybrid packet/analytic network simulations for improved network simulation fidelity, scale, and simulation efficiency. Much work in the literature addresses this topic, including [10] [11] [8] [12] [13] and others. Current approaches rely upon models, which we refer to in this paper as Deterministic Fluid Models [9] [12], to address t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Real Traffic Carried with Encrypted Cover Flows

    Publication Year: 2008, Page(s):80 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Encrypted protocols, such as SSL, are becoming more prevalent because of the growing use of e-commerce, anonymity services, and secure authentication. Likewise, traffic analysis is becoming more common because it is often the only way to analyze these protocols. Though there are many valid uses for traffic analysis (such as network policy enforcement and intrusion detection), it can also be used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm Selection Approach for Simulation Systems

    Publication Year: 2008, Page(s):91 - 98
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    No simulation algorithm will deliver best performance under all circumstances, so simulation systems often offer execution alternatives to choose from. This leads to another problem: how is the user supposed to know which algorithm to select? The need for an automated selection mechanism is often neglected, as many simulation systems are focused on specific applications or modeling formalisms and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interval Branching

    Publication Year: 2008, Page(s):99 - 108
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    We propose a new simulation method, called interval branching, which aims to facilitate efficient simulation studies of systems that involve temporal uncertainty. The method uses interval timestamps for events and explores different execution orders of overlapping events by branching the simulation. We first present a sequential version of interval branching, and then extend it to parallel simulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbiotic Simulation Systems: An Extended Definition Motivated by Symbiosis in Biology

    Publication Year: 2008, Page(s):109 - 116
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    Although various forms of symbiosis are known in biology, only mutualism has been considered in the context of symbiotic simulation systems. In this paper, we explain why the original definition of symbiotic simulation systems is narrow and why it is important to consider other forms of symbiosis as well. As a consequence we propose an extended definition of symbiotic simulation systems motivated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Performance of Real Time Videoconferencing in Ad Hoc Networks Through Emulation

    Publication Year: 2008, Page(s):119 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    The validation of new video protocols and applications for mobile ad hoc networks in a real environment is an important task. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, off-the-shelf devices and open source software. We use this tool to test a videocall using the OLSR protocol in different scenarios, vary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable versus Accurate Physical Layer Modeling in Wireless Network Simulations

    Publication Year: 2008, Page(s):127 - 134
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    In wireless networking, due to the high complexity of analytical and theoretical models, simulations are generally considered as the most convenient methodology for performance evaluation. Nonetheless, the physical complexity of the wireless medium induces a clear tradeoff between accuracy and scalability in a wireless network simulator design. In this paper, we focus on this tradeoff and study th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Testbed Enabling Run-Time Operations for Wireless Applications

    Publication Year: 2008, Page(s):135 - 143
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In this paper, we propose a hybrid Testbed enabling Run-time Operations for Wireless network Applications (TROWA). TROWA is a wireless network emulator and its simulation core is based on the network simulator MobiREAL. TROWA can emulate packet transmissions in multi-hop wireless networks in real-time, with realistic mobility models of urban pedestrians. Also it provides APIs that allow real stati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Federated Agent Based Modeling and Simulation: an Approach for Complex Critical Systems Analysis

    Publication Year: 2008, Page(s): 147
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (97 KB) | HTML iconHTML

    What we propose is a framework, based on federated simulation and ABMS, which has the goal to support the correct modeling, understanding and quantification of complex critical systems interdependencies and behavior. The advantages of the proposed solution are: 1) the complex system is modeled using a bottom-up approach, form the single components to the whole system (ABMS capability); 2) specific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.