By Topic

2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems

Date 17-19 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 75
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (605 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (370 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2010, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB) | HTML iconHTML

    Summary form only given. Making sound security decisions when designing, operating, and maintaining a complex system is a challenging task. Analysts need to be able to understand and predict how different factors affect the overall system security. During system design, security analysts want to compare the security of multiple proposed system architectures. After a system is deployed, analysts wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    In principle, the entire world can earnestly exploit sensors and pervasive systems to great societal benefits. In practice, however, there are no widely known models or tools for evaluating, simulating or benchmarking their performance. Unlike traditional distributed systems, where the resource/needs of computation and communication dominate the performance equation, pervasive systems forge new me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EntomoModel: Understanding and Avoiding Performance Anomaly Manifestations

    Publication Year: 2010, Page(s):3 - 13
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1183 KB) | HTML iconHTML

    Subtle implementation errors or mis-configurations in complex Internet services may lead to performance degradations without causing failures. These undiscovered performance anomalies afflict many of today's systems, causing violations of service-level agreements (SLAs), unnecessary resource over provisioning, or both. In this paper, we re-inserted realistic anomaly causes into a multi-tier Intern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Concurrency to Improve Latency and throughput in a Hybrid Storage System

    Publication Year: 2010, Page(s):14 - 23
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB) | HTML iconHTML

    This paper considers the problem of how to improve the performance of hybrid storage system employing solid state disks and hard disk drives. We utilize both initial block allocation as well as migration to reach “Wardrop equilibrium”, in which the response times of different devices equalize. We show that such a policy allows adaptive load balancing across devices of different perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PAC: Pattern-driven Application Consolidation for Efficient Cloud Computing

    Publication Year: 2010, Page(s):24 - 33
    Cited by:  Papers (30)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel pattern driven application consolidation (PAC) system to achieve efficient resource sharing in virtualized cloud computing infrastructures. PAC employs signal processing techniques to dynamically discover significant patterns called signatures of different applications and hosts. PAC then p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the Performance of Virtual Machine Migration

    Publication Year: 2010, Page(s):37 - 46
    Cited by:  Papers (69)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (13724 KB) | HTML iconHTML

    With the ability to move virtual machines between physical hosts, live migration is a core feature of virtualisation. However for migration to be useful, deployable feature on a large (datacentre) scale, we need to predict migration times with accuracy. In this paper, we characterise the parameters affecting live migration with particular emphasis on the Xen virtualisation platform. We discuss the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Routing for Vehicular Ad Hoc Networks: Throughput-Delay Tradeoff

    Publication Year: 2010, Page(s):47 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    In this paper, we address the problem of low-latency routing in a vehicular highway network. To cover long highways while minimizing the number of required roadside access points, we utilize vehicle-to-vehicle communication to propagate data in the network. Vehicular networks are highly dynamic, and hence routing algorithms that require global network state information or centralized coordination ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DiffECC: Improving SSD Read Performance Using Differentiated Error Correction Coding Schemes

    Publication Year: 2010, Page(s):57 - 66
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1448 KB) | HTML iconHTML

    This paper presents a cross-layer co-design approach to reduce SSD read response latency. The key is to cohesively exploit the NAND flash memory device write speed vs. raw storage reliability trade-off at the physical layer and run-time data access workload variation at the system level. Leveraging run-time data access workload variation, we can opportunistically slow down NAND flash memory write ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PUD-LRU: An Erase-Efficient Write Buffer Management Algorithm for Flash Memory SSD

    Publication Year: 2010, Page(s):69 - 78
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1673 KB) | HTML iconHTML

    Flash memory SSDs pose a well-known challenge, that is, the erase-before-write problem. Researchers try to solve this inherent problem from two different angles by either designing sophisticated Flash Translation Layer (FTL) schemes to postpone and minimize erasures or designing flash-aware buffer management algorithms to absorb unnecessary erasures. Our experimental results show that buffer manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of Replica Placement on the Reliability of Large-Scale Data Storage Systems

    Publication Year: 2010, Page(s):79 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Replication is a widely used method to protect large-scale data storage systems from data loss when storage nodes fail. It is well known that the placement of replicas of the different data blocks across the nodes affects the time to rebuild. Several systems described in the literature are designed based on the premise that minimizing the rebuild times maximizes the system reliability. Our results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequential Prefetch Cache Sizing for Maximal Hit Rate

    Publication Year: 2010, Page(s):89 - 98
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    We propose a prefetch cache sizing module for use with any sequential prefetching scheme and evaluate its impact on the hit rate. Disk array caches perform sequential prefetching by loading data contiguous to I/O request data into the array cache. If the I/O workload has sequential locality, then data prefetched in response to sequential accesses in the workload will receive hits. Different scheme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage

    Publication Year: 2010, Page(s):101 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume networks is infeasible even for short-term periods due to the increased storage requirements. Traditional approaches for data reduction like aggregation and sampling either require knowing the traffic features of intere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profit Allocation in Coalitional VoD Service

    Publication Year: 2010, Page(s):111 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Although video-on-demand (VoD) services are provided by many ISPs, the amount of content provided by each VoD service is one order smaller than that provided by rental video services, so the limited content count is one of the obstacles to widespread VoD services. To solve this problem, ISPs can form a coalition with other ISPs and use content owned by other ISPs. However, to form a coalition amon... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair Allocation of Substrate Resources among Multiple Overlay Networks

    Publication Year: 2010, Page(s):121 - 130
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (451 KB) | HTML iconHTML

    Overlay networks are becoming prevalent in today's networking environment. We consider scenarios where substrate resources are primarily consumed by many overlay networks placed on top of the substrate. We focus on the fair and efficient allocation of substrate link bandwidth among competing overlays. We adapt various existing fairness definitions to this scenario and define a metric to evaluate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Predictability of System Anomalies in Real World

    Publication Year: 2010, Page(s):133 - 140
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    As computer systems become increasingly complex, system anomalies have become major concerns in system management. In this paper, we present a comprehensive measurement study to quantify the predictability of different system anomalies. Online anomaly prediction allows the system to foresee impending anomalies so as to take proper actions to mitigate anomaly impact. Our anomaly prediction approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Relevance of Social Information to Opportunistic Forwarding

    Publication Year: 2010, Page(s):141 - 150
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    In opportunistic ad-hoc networks, multi-hop data transfer over contemporaneous paths is unlikely since the devices are often disconnected from each other. However, data can still be stored and forwarded over time in an opportunistic hop-by-hop manner. Previous work has considered how the availability of various types of information such as social relationships can be used to guide forwarding algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.