Third International Conference on the Quantitative Evaluation of Systems - (QEST'06)

11-14 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 59
  • Third International Conference on the Quantitative Evaluation of Systems - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for reuse | PDF file iconPDF (1013 KB)
    Freely Available from IEEE
  • Third International Conference on the Quantitative Evaluation of Systems - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Third International Conference on the Quantitative Evaluation of Systems - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Third International Conference on the Quantitative Evaluation of Systems - Table of contents

    Publication Year: 2006, Page(s):v - ix
    Request permission for reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2006, Page(s): x
    Request permission for reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2006, Page(s): xi
    Request permission for reuse | PDF file iconPDF (60 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers

    Publication Year: 2006, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2006, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2006, Page(s): xv
    Request permission for reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Causality, Responsibility, and Blame: A Structural-Model Approach

    Publication Year: 2006, Page(s):3 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (99 KB) | HTML iconHTML

    This talk provides an overview of work that I have done with Hana Chockler, Orna Kupferman, and Judea Pearl (H. Chockler and J. Y. Halpern, 2004), (H. Chockler, et al., 2003), (J. Y. Halpern and J. Pearl, 2005), on defining notions such as causality, explanation, responsibility, and blame. I first review the Halpern-Pearl definition of causality, what it means that A is a cause of B, and show how ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior of Available End-to-end Bandwidth: Non-Parametric Approach

    Publication Year: 2006, Page(s):9 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    The emerging development of remote sensing and control technology gives rise to new types of real-time networking applications that require "pro-active" quality of service guarantees. In particular, it is important to predict the probability that the available end-to-end bandwidth drops below a specified quality-critical threshold for a given period of time. We refer to such a probability as to a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Continuous Bytecode Instruction Counting for CPU Consumption Estimation

    Publication Year: 2006, Page(s):19 - 30
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (490 KB) | HTML iconHTML

    As an execution platform, the Java virtual machine (JVM) provides many benefits in terms of portability and security. However, this advantage turns into an obstacle when it comes to determining the computing resources (CPU, memory) a program would require to run properly in a given environment. In this paper, we build on the Java resource accounting framework, second edition (J-RAF2), to investiga... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toolbox for Dimensioning Windows Storage Systems

    Publication Year: 2006, Page(s):31 - 40
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Studies on Windows I/O systems are confined to global performance benchmarking and explanations. Users willing to optimize their I/O systems do not know which tool to use, and up to what point it will effectively represent their applications. In this paper, we describe a toolbox allowing developers and computer architects to better dimension and optimize their I/O systems according to application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Long-Range Dependence at the Disk Drive Level

    Publication Year: 2006, Page(s):41 - 50
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (7752 KB) | HTML iconHTML

    Nowadays, the need for storage devices arises in a wide range of computer and electronic devices such as enterprise systems, personal computers, and consumer electronics. Understanding workloads at the disk level in these different systems is essential for enhancement of disk reliability, availability, and performance. In this paper, we present a characterization of disk drive workloads in a wide ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate-Controlled Scheduling of Expired Writes for Volatile Caches

    Publication Year: 2006, Page(s):51 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (8135 KB) | HTML iconHTML

    Conventional disk schedulers use the same algorithm to schedule synchronous and asynchronous requests. To reap more performance, they should be scheduled differently. Asynchronous requests can be queued and delayed in the buffer cache and scheduled at times that improve disk utilization. In future systems, with larger memories and, thus, larger buffer caches in which more requests can be queued an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A versatile infinite-state Markov reward model to study bottlenecks in 2-hop ad hoc networks

    Publication Year: 2006, Page(s):63 - 72
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    In a 2-hop IEEE 801.11-based wireless LAN, the distributed coordination junction (DCF) tends to equally share the available capacity among the contending stations. Recently alternative capacity sharing strategies have been made possible. We propose a versatile infinite-state Markov reward model to study the bottleneck node in a 2-hop IEEE 801.11-based ad hoc network for different adaptive capacity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Anlysis of Delay Tolerant Networks with Model Checking Techniques

    Publication Year: 2006, Page(s):73 - 82
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (8009 KB) | HTML iconHTML

    Delay tolerant networks are a class of wireless networks that has recently attracted a lot of attention from the networking community. They are characterized by frequent network partitioning, intermittent connectivity, long and variable delays, high error rates. Such performance challenging conditions are usually found in environments populated by a sparse set of fixed or mobile nodes with limited... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and Modeling of Application Flow Length in Commercial GPRS Networks

    Publication Year: 2006, Page(s):83 - 92
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    New mobile access networks provide reasonable high bandwidth to allow true Internet access. This paper models two dominant applications of those networks. One application, WAP, is novel and specific to mobile networks, the other is HTTP, which is already dominantly present in the Internet. However, our measurements reveal that WAP traffic is the dominant application in mobile networks. Therefore, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Fiber Delay Loops in an All Optical Switch

    Publication Year: 2006, Page(s):93 - 102
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    We analyze the effect of a few fiber delay loops on the number of deflections in an all optical packet switch. The switch is based on the ROMEO architecture developed by Alcatel. We use deflection routing because of the lack of optical memory. Some fiber delay loops allow the packets to be locally deflected instead of being sent on the network for much longer delays. As the model is numerically di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Layered Bottlenecks and Their Mitigation

    Publication Year: 2006, Page(s):103 - 114
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    Bottlenecks are a simple and well-understood phenomenon in service systems and queueing models. However in systems with layered resources bottlenecks are more complicated, because of simultaneous resource possession. Thus, the holding time of a higher-layer resource, such as a process thread, may include a small execution demand, but a large time to use other resources at a lower layer (such as a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QPME - Queueing Petri Net Modeling Environment

    Publication Year: 2006, Page(s):115 - 116
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    Queueing Petri nets are a powerful formalism that can be exploited for modeling distributed systems and analyzing their performance and scalability. However, currently available tools for modeling and analysis using queueing Petri nets are very limited in terms of the scalability of the analysis algorithms they provide. Moreover, tools are available only on highly specialized platforms unaccessibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Simulation of Colored Stochastic Petri Nets With TimeNET 4.0

    Publication Year: 2006, Page(s):117 - 118
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    This paper presents a prototype extension of TimeNET, which allows the distributed simulation of colored stochastic Petri nets on a cluster of workstations. TimeNET is a software tool for the modeling and performability evaluation using stochastic Petri nets. Recent changes are available as beta version 4.0, and include a new XML- and Java-based graphical user interface allowing the tool to run in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Java Modelling Tools: an Open Source Suite for Queueing Network Modelling andWorkload Analysis

    Publication Year: 2006, Page(s):119 - 120
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    The Java modelling tools (JMT) is an open source suite for performance evaluation, capacity planning and modelling of computer and communication systems. The suite implements numerous state-of-the-art algorithms for the exact, asymptotic and simulative analysis of queueing network models, either with or without product-form solution. Models can be described either through wizard dialogs or with a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A PMIF Semantic Validation Tool

    Publication Year: 2006, Page(s):121 - 122
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    A performance model interchange format (PMIF) be transferred among queueing network model (QNM) based modeling tools. Such a tool would only need to have PMIF import/export mechanisms. The XML specification of the PMIF allows implementers to use widely available tools to parse the XML file, check the syntax, and simplify the translation to/from the XML format. Those tools, however, do not know the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Petri Nets Analysis with TINA

    Publication Year: 2006, Page(s):123 - 124
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Beside the usual graphic editing and simulation facilities, the software tool Tina may build a number of state space abstractions for Petri nets or Time Petri nets, preserving certain classes of properties. For Petri nets, these abstractions help preventing combinatorial explosion and rely on so-called partial order techniques such as covering steps and/or persistent sets. For time Petri nets, tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.