By Topic

Date 4-6 April 2005

Filter Results

Displaying Results 1 - 25 of 45
  • 38th Annual Simulation Symposium - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Proceedings. 38th Annual Simulation Symposium

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • 38th Annual Simulation Symposium - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • 38th Annual Simulation Symposium - Table of contents

    Publication Year: 2005, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2005, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Call for Papers: 39th Annual Simulation Symposium

    Publication Year: 2005, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Why we still don't know how to simulate networks

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (36 KB) | HTML iconHTML

    Discrete event simulation has been used in the evaluation of computer communications networks for three or four decades. Over this period of time our simulation capability has improved significantly due to the efforts of the simulation research community. There has also been significant progress over the years by the networking research community in understanding the use of simulation in the desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A context-aware data forwarding algorithm for sensor networks

    Publication Year: 2005, Page(s):7 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Recent advances in wireless communication and technologies have given rise to low-cost sensor networks. Sensor networks comprise of low-cost, low-power nodes that are densely deployed in the environment to monitor a specific state of the environment, for example: temperature, light, sound, speed or radiation. This paper presents a new data forwarding algorithm for sensor networks that takes into c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximation techniques for the analysis of large traffic-groomed tandem optical networks

    Publication Year: 2005, Page(s):15 - 22
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    We consider a traffic-groomed optical network consisting of N nodes arranged in tandem. This optical network is modeled by a tandem queueing network of multirate loss queues with simultaneous resource possession. Two approximation methods are proposed for the analysis of this queueing network assuming that the total number of servers in each multi-rate loss queue is very large. The accuracy of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A methodology for the optimal configuration of TCP traffic in network simulations under link load constraints

    Publication Year: 2005, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Given that over 90% of the Internet load is carried by TCP, most network simulation studies use TCP flows to generate the background traffic. A basic, but unresolved, question however is: how can one decide how many TCP flows to simulate from one network node to another? Simulating too many flows on a link can cause an unrealistically high loss rate on that link, while simulating too few flows can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis for multi-service networks with congestion-based pricing for QoS traffic

    Publication Year: 2005, Page(s):33 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1552 KB) | HTML iconHTML

    There has been recent interest in employing unified pricing schemes for supporting both QoS and best-effort traffic within multiservice networks. This paper presents an analytical approach for the design and analysis of this class of network pricing control. In particular, we propose an approximation method to estimate overall user value arising from all traffic types, given the routes for QoS tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route recovery mechanisms for ad hoc networks equipped with switched single beam antennas

    Publication Year: 2005, Page(s):41 - 48
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In this paper we propose a novel three phase route recovery mechanism for routing over switched single beam directional antennas. We enhance the popular dynamic source routing (DSR) protocol to the underlying directional layer and include an improved broadcast mechanism to facilitate an efficient route discovery. In the event of a link failure, our optimized directional routing protocol (DRP) proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Internet delay-based clustering

    Publication Year: 2005, Page(s):51 - 59
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    The scalability of routing in large scale networks, such as the Internet, is critical to achieve low delay and high throughput. The lack of scalability of routing protocols in large-scale networks results from the prohibitive overhead incurred during dissemination of path metric values across the network. This paper addresses this problem and proposes a cluster-based scheme, referred to as d-media... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power conservation schemes for energy efficient data propagation in heterogeneous wireless sensor networks

    Publication Year: 2005, Page(s):60 - 71
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    We propose, implement and evaluate new energy conservation schemes for efficient data propagation in wireless sensor networks. Our protocols are adaptive, i.e. locally monitor the network conditions and accordingly adjust towards optimal operation choices. This dynamic feature is particularly beneficial in heterogeneous settings and in cases of redeployment of sensor devices in the network area. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perfect simulations for random trip mobility models

    Publication Year: 2005, Page(s):72 - 79
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    The random trip model was recently proposed as a generic mobility model that contains many particular mobility models, including the widely-known random waypoint and random walks, and accommodates more realistic scenarios. The probability distribution of the movement of a mobile in all these models typically varies with time and converges to a "steady state" distribution (viz- stationary distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of multicast feedback control mechanisms

    Publication Year: 2005, Page(s):80 - 87
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    In reliable multicast applications, packet loss needs to be reported by having group members send feedback messages. This results in the well-known feedback implosion problem. The available feedback control mechanisms can be classified as timer-based, hierarchy-based and router-assisted, among which the timer-based approach is more preferable due to its simplicity and flexibility. This paper compa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation verification and validation by dynamic policy enforcement

    Publication Year: 2005, Page(s):91 - 98
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB) | HTML iconHTML

    This paper presents a new verification and validation (V&V) technique for simulation using dynamic policy enforcement. Constraints are formally specified as policies, and they will be used to check whether simulation satisfies these policies at runtime. This paper also proposes a development framework where policies are developed along with system development and V&V. Once policies are extracted f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximation of discrete phase-type distributions

    Publication Year: 2005, Page(s):99 - 106
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    The analysis of discrete stochastic models such as generally distributed stochastic Petri nets can be done using state space-based methods. The behavior of the model is described by a Markov chain that can be solved mathematically. The phase-type distributions that are used to describe non-Markovian distributions have to be approximated. An approach for the fast and accurate approximation of discr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Could enough samples be more important than better designs for computer experiments?

    Publication Year: 2005, Page(s):107 - 115
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    A study was conducted to compare fifteen approaches to improve Latin hypercube designs for computer experiments, based on simulation tests and statistical analyses ANOVA. Kriging models were employed to approximate twenty test functions. Validation at 5000 or 10,000 points was conducted to find prediction errors. The results show that there are statistically significant differences between the app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving scalability of network emulation through parallelism and abstraction

    Publication Year: 2005, Page(s):119 - 129
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    One approach to network emulation involves simulating a virtual network with a real-time network simulator and providing an I/O interface that enables interaction between real hosts and the virtual network. This allows real protocols and applications to be tested in a controlled and repeatable environment. To reflect conditions of large networks such as the Internet it is important that the emulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GIPSE: streamlining the management of simulation on the grid

    Publication Year: 2005, Page(s):130 - 137
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    Although the grid allows the researcher to tap a vast amount of resources, the complexity involved in utilizing this power can make it unwieldy and time-consuming. The Grid Interface for Parameter Sweeps and Exploration (GIPSE) toolset aims to solve this issue by freeing users from script debugging, storage issues, and other minutiae involved in managing simulations on the grid. GIPSE, which inter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective co-verification of IEEE 802.11a MAC/PHY combining emulation and simulation technology

    Publication Year: 2005, Page(s):138 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    This work presents a system architecture and effective co-verification methodologies for the IEEE 802.11a medium access control (MAC) layer/physical (PHY) layer implementation. The architecture modeling includes hardware/software partitioning of a total system based on timing measurements from the C/C++ and Verilog design, and analysis of real-time requirements specified in the standard. The syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User centric walk: an integrated approach for modeling the browsing behavior of users on the Web

    Publication Year: 2005, Page(s):149 - 159
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The performance evaluation of Web applications usually requires the analysis of sequences of user requests for specific Web pages. These sequences can be obtained, for example, by applying empirical methods (recording the real sequence of requests), or by applying a formal model for generating synthetic results. In this paper, we present our Web browsing model and its implementation as part of our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.