By Topic

2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems

Date 7-9 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 74
  • [Back cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (363 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (152 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Lists

    Publication Year: 2012, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (57 KB) | HTML iconHTML

    Convergence of recent advances in mobile high performance computing (HPC) and mobile ad hoc networks is termed as `tactical cloudlet'. A fully realized tactical cloudlet concept provides a unique capability for the military and this capability would be powerful not only in enabling highly mobile, highly responsive, and quickly deployable tactical forces but also enhancing soldiers' situational awa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (54 KB)

    Summary form only given. This talk discusses research opportunities for MASCOTS participants due to a confluence of trends in applications, technology and theory. APPLICATIONS: Organizations around the world want to use information technology to support sustainability; for example, the G20 summit in June focused on water, food, energy and health security, and disaster mitigation. Systems that help... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Algorithm for Placement of Virtual Clusters in Large Data Centers

    Publication Year: 2012, Page(s):3 - 10
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    We consider the problem of placing virtual clusters, each consisting of a set of heterogeneous virtual machines (VM) with some interrelationships due to communication needs and other dependability-induced constraints, onto physical machines (PM) in a large data center. The placement of such constrained, networked virtual clusters, including compute, storage, and networking resources is challenging... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Sides of a Coin: Optimizing the Schedule of MapReduce Jobs to Minimize Their Makespan and Improve Cluster Performance

    Publication Year: 2012, Page(s):11 - 18
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Large-scale MapReduce clusters that routinely process petabytes of unstructured and semi-structured data represent a new entity in the changing landscape of clouds. A key challenge is to increase the utilization of these MapReduce clusters. In this work, we consider a subset of the production workload that consists of MapReduce jobs with no dependencies. We observe that the order in which these jo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Squeezing Out the Cloud via Profit-Maximizing Resource Allocation Policies

    Publication Year: 2012, Page(s):19 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    We study the problem of maximizing the average hourly profit earned by a Software-as-a-Service (SaaS) provider who runs a software service on behalf of a customer using servers rented from an Infrastructure-as-a-Service (IaaS) provider. The SaaS provider earns a fee per successful transaction and incurs costs pro-portional to the number of server-hours it uses. A number of resource allocation poli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks

    Publication Year: 2012, Page(s):31 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    Congestion control in multi-hop infrastructure wireless mesh networks is both an important and a unique problem. It is unique because it has two prominent causes of failed transmissions which are difficult to tease apart - lossy nature of wireless medium and high extent of congestion around gateways in the network. The concurrent presence of these two causes limits applicability of already availab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cross-Layer Analytical Model to Estimate the Capacity of a WiMAX Network

    Publication Year: 2012, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (993 KB) | HTML iconHTML

    Specialized physical and medium access control layer operations of WiMAX introduce a challenging problem to formulate a precise cross-layer analytical model for its capacity estimation. Although the cross-layer formulation is yet to be attempted in the literature, it can effectively serve as a fast and cost-effective tool to facilitate future deployment planning, efficient network maintenance, etc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Spectrum Occupancy Prediction Based on Partial Periodic Pattern Mining

    Publication Year: 2012, Page(s):51 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Cognitive radio appears as a promising technology to allocate wireless spectrum between licensed and unlicensed users in an efficient way. The availability of spectrum holes vastly affects the throughput and delay of unlicensed users. Predictive methods for inferring the availability of spectrum holes can help to improve spectrum extraction rate and reduce collision rate. In this paper, a spectrum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing the ns-3 Propagation Models

    Publication Year: 2012, Page(s):61 - 67
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    An important aspect of any network simulation that models wireless networks is the design and implementation of the Propagation Loss Model. The propagation loss model is used to determine the wireless signal strength at the set of receivers for any packet being transmitted by a single transmitter. There are a number of different ways to model this phenomenon, and these vary both in terms of comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Taming Wild Horses: The Need for Virtual Time-Based Scheduling of VMs in Network Simulations

    Publication Year: 2012, Page(s):68 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB) | HTML iconHTML

    The next generation of scalable network simulators employ virtual machines (VMs) to act as high-fidelity models of traffic producer/consumer nodes in simulated networks. However, network simulations could be inaccurate if VMs are not scheduled according to virtual time, especially when many VMs are hosted per simulator core in a multi-core simulator environment. Since VMs are by default free-runni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Traffic Benchmarks for Empirical Networking Research: The Role of Connection Structure in Traffic Workload Modeling

    Publication Year: 2012, Page(s):78 - 86
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    Networking research would be well served by the adoption of a set of traffic benchmarks to model network applications for empirical evaluations; such benchmarks are common in many other areas of computing. While it has long been known that certain aspects of modeling traffic, such as round trip time, can dramatically affect application and network performance, there is still no agreement as to how... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair Scheduling on Parallel Bonded Channels with Intersecting Bonding Groups

    Publication Year: 2012, Page(s):89 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    We describe an efficient scheduling technique for providing weighted sharing of aggregate capacity in networks having parallel bonded channels in which a single channel may simultaneously be a member of multiple bonding groups. Our work is motivated by the introduction of this capability into version 3 of the Data Over Cable Service Interface Specification (DOCSIS). Our technique extends Golestani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the TCP-Incast Problem with Application-Level Scheduling

    Publication Year: 2012, Page(s):99 - 106
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Data center networks are characterized by high link speeds, low propagation delays, small switch buffers, and temporally clustered arrivals of many concurrent TCP flows fulfilling data transfer requests. However, the combination of these features can lead to transient buffer overflow and bursty packet losses, which in turn lead to TCP retransmission timeouts that degrade the performance of short-l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MMPP Characterization of Web Application Traffic

    Publication Year: 2012, Page(s):107 - 114
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    Web application traffic has been shown to exhibit burstiness. The traditional model based on Poisson process is unable to capture the burstiness in traffic. On the other hand, the Markov-modulated Poisson process (MMPP) has been successfully used to model bursty traffic in a variety of computing environments. In this paper, we conduct experiments to investigate the effectiveness of MMPP as a traff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating Multi-threaded Application Simulation through Barrier-Interval Time-Parallelism

    Publication Year: 2012, Page(s):117 - 126
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3527 KB) | HTML iconHTML

    In the last decade, the microprocessor industry has undergone a dramatic change, ushering in the new era of multi-/manycore processors. As new designs incorporate increasing core counts, simulation technology has not matched pace, resulting in simulation times that increasingly dominate the design cycle. Complexities associated with the execution of code and communication between simulated cores h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Large Scale Circuits Using Massively Parallel Discrete-Event Simulation

    Publication Year: 2012, Page(s):127 - 133
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    As computing systems grow to exascale levels of performance, the smallest elements of a single processor can greatly affect the entire computer system (e.g. its power consumption). As future generations of processors are developed, simulation at the gate level is necessary to ensure that the necessary target performance benchmarks are met prior to fabrication. The most common simulation tools avai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.