Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

Proceedings Fifth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

12-15 Jan. 1997

Filter Results

Displaying Results 1 - 25 of 38
  • Proceedings Fifth International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Queueing network models with two classes of customers

    Publication Year: 1997, Page(s):229 - 234
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB)

    Some peculiar properties of multi-class product-form closed queueing networks with two classes of customers are presented. In particular, we show that in a network with two stations there exists a combination of customer classes such that the stations are equally utilized regardless of the population size. Such an equiutilization point is shown to be an optimal operational point at which the syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1997, Page(s): 249
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Analytic models of workload behavior and pipeline performance

    Publication Year: 1997, Page(s):91 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    The evaluation of pipeline performance and the analysis of different design alternatives and cost/performance tradeoffs are a fundamental aspect of high-performance computer system design. This performance evaluation process requires accurate models of both the pipeline organization and the characteristics of the workload being executed. We derive general mathematical models and analyses of worklo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of virtual memory MTU reassembly within the PowerPC architecture

    Publication Year: 1997, Page(s):81 - 90
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1364 KB)

    Message transfer unit (MTU) reassembly schemes in modern operating systems cause I/O performance degradation when MTU sizes are larger than the architecture's page size. This can happen with emerging network technologies, such as Asynchronous Transfer Mode (ATM), where MTUs can be 64 KB or greater Traditional solutions either reassemble using memory copy or preallocate contiguous memory; these, ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid simulation approach enabling performance characterization of large software systems

    Publication Year: 1997, Page(s):73 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    We describe a method for performance analysis of large software systems that combines a fast instruction-set simulator with off-line detailed analysis of segments of the execution. The combination is faster than straight cycle-accurate simulation, simpler and more flexible than techniques relying on hardware monitoring, and accurate. Specifically, the instruction-set simulator running at a slowdow... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing the workload of scientific visualization tools: a preliminary study on TIPSY

    Publication Year: 1997, Page(s):59 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    In recent years, a lot of research has focused on the study of scientific applications running on high-performance systems. So far, however, little concern has been expressed over performance issues related to interactive visualization and analysis. This is due to the lack of standardization of scientific visualization software, as many tools are designed and developed on an ad-hoc basis, coping w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A neural controller for transit node in high speed communication networks

    Publication Year: 1997, Page(s):70 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    In order to provide multi-megabit communication services to an increasing number of users one needs efficient means of traffic control and network resource management. The neural network-based controller used in transit node of high speed networks seems to be a useful tool for assurance reliable and cost effective communications. The major aim of this paper is to study the problem of traffic contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modeling framework for IT adoption study

    Publication Year: 1997, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    A modeling framework, based on analytical hierarchical processes (AHP), neural networks and fuzzy logic using a value-based approach, is proposed for information technology (IT) adoption studies. The design process is described with examples like the Internet and Unix. A comparative analysis among various models in the framework is one of the salient features of this framework View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for the computation of reliability bounds for non-repairable fault-tolerant systems

    Publication Year: 1997, Page(s):221 - 228
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    A realistic modeling of fault-tolerant systems requires to take into account phenomena such as the dependence of component failure rates and coverage parameters on the operational configuration of the system, which cannot be properly captured using combinatoric techniques. Such dependencies can be modeled with detail using continuous-time Markov chains (CTMCs). However, the use of CTMC models is l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Disk caching in large database and timeshared systems

    Publication Year: 1997, Page(s):184 - 195
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    We present the results of a variety of trace-driven simulations of disk cache designs using traces from a variety of mainframe timesharing and database systems in production use. We compute miss ratios, run lengths, traffic ratios, cache residency times, degree of memory pollution and other statistics for a variety of designs, varying lock size, prefetching algorithm and write algorithm. We find t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load and performance modeling of communication subsystems with the DO-IT toolbox

    Publication Year: 1997, Page(s):65 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The specification and description language (SDL) and message sequence charts (MSCs) are established techniques to support the software development process in the telecommunication industry. Several commercial tools exist supporting functional aspects of the engineering process. However, rather little research has been done concerning the integration of nonfunctional aspects in the development proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart: an advanced shared-memory simulator-towards a system-level simulation environment

    Publication Year: 1997, Page(s):131 - 138
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1424 KB)

    System-level events, such as process switching and task migration, have a major effect on the performance of computer systems. “Smart” is a new simulation environment that extends existing simulators, such as MINT, with the capability to emulate the effect of such mechanisms. “Smart” provides a user friendly interface (GUI) that allows control of different system parameters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring RPC traffic in an OS/2 DCE environment

    Publication Year: 1997, Page(s):51 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Distributed computing involves systems that operate across networks transparently, using the resources of multiple machines. The Open Software Foundation's Distributed Computing Environment (DCE) has evolved to address the need for a vendor-neutral platform to which distributed applications can be developed, and upon which they can run. Central to the design philosophy of DCE is its reliance on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a reliable multicast session protocol for collaborative continuous-feed applications

    Publication Year: 1997, Page(s):213 - 219
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    This paper presents an analytic model of a reliable multicast session protocol for collaborative continuous-feed applications. The protocol supports N×N group multicast communications at the session layer and runs on the top of existing reliable transport protocols (e.g., TCP). The protocol is portable as a network-layer-independent library that is suitable for both LAN and WAN environments.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the quantitative specification of jitter constrained periodic streams

    Publication Year: 1997, Page(s):171 - 176
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    An increasing number of application systems can be characterized by their requirement to process sequences of events in real-time. These sequences are principally of constant rate, but may vary within given limits. Hence, several parameter sets that seem to differ only slightly have been proposed to describe such sequences. This includes the parameter sets used in the Tenet Protocol Suite, in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fluid traffic modelling in simulation of a call admission control scheme for ATM networks

    Publication Year: 1997, Page(s):110 - 115
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Simulating traffic for an ATM network may be very time consuming due to the large amount of transmitted cells, if traditional simulation modelling at the cell level is employed. A possible means to speed up the simulations is to model the traffic at a higher abstraction level. We evaluate different simulation modelling techniques on a scheme for call admission control in ATM networks. By generatin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical studies of paging and I/O activity of parallel programs

    Publication Year: 1997, Page(s):177 - 183
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    We present a suite of tools for monitoring and analysis of paging and I/O activity of parallel programs. Then we discuss results of the measurements for several parallel programs. The tools we have developed allow the user to select the statements to be measured, and then to define the format of the trace record generated by each traceable event. The tools, written in Tcl/Tk are portable and easy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical load sharing policy for distributed systems

    Publication Year: 1997, Page(s):3 - 10
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    In dynamic load sharing policies, system state information can be collected in a distributed manner or by a single coordinator node. Two principal policies that belong to the distributed scheme are the sender-initiated and receiver-initiated policies. In the centralized scheme, a central coordinator node is responsible for collecting system state information. Distributed policies do not perform as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partitioning PCS for parallel simulation

    Publication Year: 1997, Page(s):38 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Parallel and distributed simulation techniques have been investigated in a number of studies as a way to decrease long execution times of personal communication system (PCS) simulations. However, most studies have omitted important issues in radio propagation in the simulations. Including these radio propagation issues makes it significantly more difficult to partition a PCS model efficiently. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling integrated services traffic for bandwidth management in next-generation intranets

    Publication Year: 1997, Page(s):154 - 161
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    This paper discusses modeling requirements of network traffic over next-generation internets and intranets. This traffic will include not only traditional data, but continuous media and multimedia services like telephony, digital television, and interactive TV. We propose a model for interactive TV and discuss its relationship to traditional data and media traffic models. We also present simulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AND-ATM Network Design System

    Publication Year: 1997, Page(s):98 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    In this paper augmented infinitesimal perturbation analysis (APA) is used for gradient estimation in a hybrid simulation/analytic system for computer communications network capacity planning called ATM Network Design (AND) System. Usage of APA provides an alternative to traditional network planning methods that assume independence of packet service times. A steepest descent algorithm determines lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cache injection/cofetch architecture: initial performance evaluation

    Publication Year: 1997, Page(s):63 - 64
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    One of the major problems in a number of SM (shared memory) and DSM (distributed shared memory) applications is the overall cost of read misses in conditions when: (a) system latencies are relatively large, and (b) a shared data item is read relatively few times by each of the processors in the system; modern SM and DSM systems are typically based on off-the-shelf microprocessors which do not incl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based alarm correlation in cellular phone networks

    Publication Year: 1997, Page(s):197 - 204
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    Though cellular phone networks already contain intelligent network elements diagnosing local faults, alarm bursts caused by network element failures cannot be handled properly by this technology. It is the responsibility of the operators to extract the relevant alarms from such a burst and identify the cause. To assist the operators, several alarm correlation tools have been developed. The paper i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient analysis techniques for symmetric multiprocessor architectures

    Publication Year: 1997, Page(s):125 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    Performance analysis of multiprocessor architectures in the early design phases is an important task in the development of complex parallel architectures. An approach for the hierarchical modeling and analysis of a wide class of multiprocessor architectures is introduced. The technique combines and extends several efficient approaches to analyze large CTMCs underlying hierarchical models of multip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.