Sciweavers

MASCOTS
2004
13 years 6 months ago
On Mobility-Capacity-Delay Trade-off in Wireless Ad Hoc Networks
We show that there is a trade off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for mobility of nodes in ad hoc networks. We d...
Renato M. de Moraes, Hamid R. Sadjadpour, Jose Joa...
MASCOTS
2004
13 years 6 months ago
A Framework for Resource Allocation in Grid Computing
Grid computing is the future computing paradigm for enterprise applications. An enterprise application running on a grid is composed of a set of SLA-constrained sub-tasks demandin...
Daniel A. Menascé, Emiliano Casalicchio
MASCOTS
2004
13 years 6 months ago
A Computational Complexity-Aware Model for Performance Analysis of Software Servers
Queueing models are routinely used to analyze the performance of software systems. However, contrary to common assumptions, the time that a software server takes to complete jobs ...
Vipul Mathur, Varsha Apte
MASCOTS
2004
13 years 6 months ago
A Hysteresis Model for Web/TCP Transfer Latency
This paper presents an accurate stochastic model for transfer latency of short-lived Web-like TCP flows with random packet losses. Our model characterizes a data transfer in alter...
Yujian Li, Carey L. Williamson
MASCOTS
2004
13 years 6 months ago
Dual-Processor Parallelisation of Symbolic Probabilistic Model Checking
In this paper, we describe the dual-processor parallelisation of a symbolic (BDD-based) implementation of probabilistic model checking. We use multi-terminal BDDs, which allow a c...
Marta Z. Kwiatkowska, David Parker, Yi Zhang, Rash...
MASCOTS
2004
13 years 6 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
MASCOTS
2004
13 years 6 months ago
Size-Based Scheduling Policies with Inaccurate Scheduling Information
Size-based scheduling policies such as SRPT have been studied since 1960s and have been applied in various arenas including packet networks and web server scheduling. SRPT has bee...
Dong Lu, Huanyuan Sheng, Peter A. Dinda
MASCOTS
2004
13 years 6 months ago
Database Server Workload Characterization in an E-Commerce Environment
Fujian Liu, Yanping Zhao, Wenguang Wang, Dwight J....
MASCOTS
2004
13 years 6 months ago
Reliability of MEMS-Based Storage Enclosures
MEMS-based storage is a new, non-volatile storage technology currently under development. It promises fast data access, high throughput, high storage density, small physical size,...
Bo Hong, Thomas J. E. Schwarz, Scott A. Brandt, Da...
MASCOTS
2004
13 years 6 months ago
Performance Characterisation and Verification of JavaSpaces Based on Design of Experiments
In the ever increasing world of distributed systems, different middleware implementations can be compared qualitatively or quantitatively. Existing evaluation techniques are often...
Frederic Hancke, Tom Dhaene, Jan Broeckhove