载入中。。。 'S bLog
 
载入中。。。
 
载入中。。。
载入中。。。
载入中。。。
载入中。。。
载入中。。。
 
填写您的邮件地址,订阅我们的精彩内容:


 
Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE
[ 2012/7/16 14:24:00 | By: 梦翔儿 ]
 
SIGMETRICS是计算机系统性能评估领域的旗舰会议;Performance是IFIP工作组在性能建模与分析方面的旗舰会议。这两个顶尖级国际会议每三年举行一次联合会议。

=======

 

Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
Table of Contents
previous proceeding |no next proceeding

SESSION: Invited talks
Performance implications of flash and storage class memories
Naresh M. Patel
Pages: 1-2
doi>10.1145/2254756.2254758
Full text: PDF

The storage industry has seen incredible growth in data storage needs by both consumers and enterprises. Long-term technology trends mean that the data deluge will continue well into the future. These trends include the big-data trend (driven by data ...
expand
High-performance computing in mobile services
Zhen Liu
Pages: 3-4
doi>10.1145/2254756.2254759
Full text: PDF

With the ever increasing popularity of smart phones, mobile services have been evolving rapidly to allow users to enjoy localized and personalized experiences. Users can discover local information and keep connected with family and friends on the go, ...
expand
SESSION: Scheduling and load-balancing
Delay tails in MapReduce scheduling
Jian Tan, Xiaoqiao Meng, Li Zhang
Pages: 5-16
doi>10.1145/2254756.2254761
Full text: PDF

MapReduce/Hadoop production clusters exhibit heavy-tailed characteristics for job processing times. These phenomena are resultant of the workload features and the adopted scheduling algorithms. Analytically understanding the delays under different schedulers ...
expand
Optimal queue-size scaling in switched networks
Devavrat Shah, Neil Walton, Yuan Zhong
Pages: 17-28
doi>10.1145/2254756.2254762
Full text: PDF

We consider a switched (queueing) network in which there are constraints on which queues may be served simultaneously; such networks have been used to effectively model input-queued switches and wireless networks. The scheduling policy for such a network ...
expand
Minimizing slowdown in heterogeneous size-aware dispatching systems
Esa Hyyti?, Samuli Aalto, Aleksi Penttinen
Pages: 29-40
doi>10.1145/2254756.2254763
Full text: PDF

We consider a system of parallel queues where tasks are assigned (dispatched) to one of the available servers upon arrival. The dispatching decision is based on the full state information, i.e., on the sizes of the new and existing jobs. We are interested ...
expand
Bipartite graph structures for efficient balancing of heterogeneous loads
Mathieu Leconte, Marc Lelarge, Laurent Massoulié
Pages: 41-52
doi>10.1145/2254756.2254764
Full text: PDF

This paper considers large scale distributed content service platforms, such as peer-to-peer video-on-demand systems. Such systems feature two basic resources, namely storage and bandwidth. Their efficiency critically depends on two factors: (i) content ...
expand
SESSION: Characterization
Workload analysis of a large-scale key-value store
Berk Atikoglu, Yuehai Xu, Eitan Frachtenberg, Song Jiang, Mike Paleczny
Pages: 53-64
doi>10.1145/2254756.2254766
Full text: PDF

Key-value stores are a vital component in many scale-out enterprises, including social networks, online retail, and risk analysis. Accordingly, they are receiving increased attention from the research community in an effort to improve their performance, ...
expand
A first look at cellular machine-to-machine traffic: large scale measurement and characterization
Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Jia Wang
Pages: 65-76
doi>10.1145/2254756.2254767
Full text: PDF

Cellular network based Machine-to-Machine (M2M) communication is fast becoming a market-changing force for a wide spectrum of businesses and applications such as telematics, smart metering, point-of-sale terminals, and home security and automation systems. ...
expand
Bundling practice in BitTorrent: what, how, and why
Jinyoung Han, Seungbae Kim, Taejoong Chung, Ted Taekyoung Kwon, Hyun-chul Kim, Yanghee Choi
Pages: 77-88
doi>10.1145/2254756.2254768
Full text: PDF

We conduct comprehensive measurements on the current practice of content bundling to understand the structural patterns of torrents and the participant behaviors of swarms on one of the largest BitTorrent portals: The Pirate Bay. From the datasets of ...
expand
SESSION: Networking
Energy-efficient congestion control
Lingwen Gan, Anwar Walid, Steven Low
Pages: 89-100
doi>10.1145/2254756.2254770
Full text: PDF

Various link bandwidth adjustment mechanisms are being developed to save network energy. However, their interaction with congestion control can significantly reduce network throughput, and is not well understood. We firstly put forward a framework to ...
expand
Uniform approximation of the distribution for the number of retransmissions of bounded documents
Predrag R. Jelenkovic, Evangelia D. Skiani
Pages: 101-112
doi>10.1145/2254756.2254771
Full text: PDF

Retransmission-based failure recovery represents a primary approach in existing communication networks, on all protocol layers, that guarantees data delivery in the presence of channel failures. Contrary to the traditional belief that the number of retransmissions ...
expand
Fluid limit of an asynchronous optical packet switch with shared per link full range wavelength conversion
Benny Van Houdt, Luca Bortolussi
Pages: 113-124
doi>10.1145/2254756.2254772
Full text: PDF

We consider an asynchronous all optical packet switch (OPS) where each link consists of N wavelength channels and a pool of C ≤ N full range tunable wavelength converters. Under the assumption of Poisson arrivals with rate λ (per wavelength ...
expand
Towards optimal error-estimating codes through the lens of Fisher information analysis
Nan Hua, Ashwin Lall, Baochun Li, Jun Xu
Pages: 125-136
doi>10.1145/2254756.2254773
Full text: PDF

Error estimating coding (EEC) has recently been established as an important tool to estimate bit error rates in the transmission of packets over wireless links, with a number of potential applications in wireless networks. In this paper, we present an ...
expand
SESSION: Pricing
How well can congestion pricing neutralize denial of service attacks?
Ashish Vulimiri, Gul A. Agha, Philip Brighten Godfrey, Karthik Lakshminarayanan
Pages: 137-150
doi>10.1145/2254756.2254775
Full text: PDF

Denial of service protection mechanisms usually require classifying malicious traffic, which can be difficult. Another approach is to price scarce resources. However, while congestion pricing has been suggested as a way to combat DoS attacks, it has ...
expand
Pricing cloud bandwidth reservations under demand uncertainty
Di Niu, Chen Feng, Baochun Li
Pages: 151-162
doi>10.1145/2254756.2254776
Full text: PDF

In a public cloud, bandwidth is traditionally priced in a pay-as-you-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a novel model of cloud bandwidth allocation and pricing when explicit bandwidth ...
expand
SESSION: Green data centers
Temperature management in data centers: why some (might) like it hot
Nosayba El-Sayed, Ioan A. Stefanovici, George Amvrosiadis, Andy A. Hwang, Bianca Schroeder
Pages: 163-174
doi>10.1145/2254756.2254778
Full text: PDF

The energy consumed by data centers is starting to make up a significant fraction of the world's energy consumption and carbon emissions. A large fraction of the consumed energy is spent on data center cooling, which has motivated a large body of work ...
expand
Renewable and cooling aware workload management for sustainable data centers
Zhenhua Liu, Yuan Chen, Cullen Bash, Adam Wierman, Daniel Gmach, Zhikui Wang, Manish Marwah, Chris Hyser
Pages: 175-186
doi>10.1145/2254756.2254779
Full text: PDF

Recently, the demand for data center computing has surged, increasing the total energy footprint of data centers worldwide. Data centers typically comprise three subsystems: IT equipment provides services to customers; power infrastructure supports the ...
expand
Energy storage in datacenters: what, where, and how much?
Di Wang, Chuangang Ren, Anand Sivasubramaniam, Bhuvan Urgaonkar, Hosam Fathy
Pages: 187-198
doi>10.1145/2254756.2254780
Full text: PDF

Energy storage - in the form of UPS units - in a datacenter has been primarily used to fail-over to diesel generators upon power outages. There has been recent interest in using these Energy Storage Devices (ESDs) for demand-response (DR) to either shift ...
expand
SESSION: Epidemics
Rumor centrality: a universal source detector
Devavrat Shah, Tauhid Zaman
Pages: 199-210
doi>10.1145/2254756.2254782
Full text: PDF

We consider the problem of detecting the source of a rumor (information diffusion) in a network based on observations about which set of nodes possess the rumor. In a recent work [10], this question was introduced and studied. The authors proposed rumor ...
expand
Learning the graph of epidemic cascades
Praneeth Netrapalli, Sujay Sanghavi
Pages: 211-222
doi>10.1145/2254756.2254783
Full text: PDF

We consider the problem of finding the graph on which an epidemic spreads, given only the times when each node gets infected. While this is a problem of central importance in several contexts -- offline and online social networks, e-commerce, ...
expand
Network forensics: random infection vs spreading epidemic
Chris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai
Pages: 223-234
doi>10.1145/2254756.2254784
Full text: PDF

Computer (and human) networks have long had to contend with spreading viruses. Effectively controlling or curbing an outbreak requires understanding the dynamics of the spread. A virus that spreads by taking advantage of physical links or user-acquaintance ...
expand
SESSION: Memory and storage
What is a good buffer cache replacement scheme for mobile flash storage?
Hyojun Kim, Moonkyung Ryu, Umakishore Ramachandran
Pages: 235-246
doi>10.1145/2254756.2254786
Full text: PDF

Smartphones are becoming ubiquitous and powerful. The Achilles' heel in such devices that limits performance is the storage. Low-end flash memory is the storage technology of choice in such devices due to energy, size, and cost considerations. In this ...
expand
Versatile refresh: low complexity refresh scheduling for high-throughput multi-banked eDRAM
Mohammad Alizadeh, Adel Javanmard, Shang-Tse Chuang, Sundar Iyer, Yi Lu
Pages: 247-258
doi>10.1145/2254756.2254787
Full text: PDF

Multi-banked embedded DRAM (eDRAM) has become increasingly popular in high-performance systems. However, the data retention problem of eDRAM is exacerbated by the larger number of banks and the high-performance environment in which it is deployed: The ...
expand
SESSION: System performance
Does lean imply green?: a study of the power performance implications of Java runtime bloat
Suparna Bhattacharya, Karthick Rajamani, K. Gopinath, Manish Gupta
Pages: 259-270
doi>10.1145/2254756.2254789
Full text: PDF

The presence of software bloat in large flexible software systems can hurt energy efficiency. However, identifying and mitigating bloat is fairly effort intensive. To enable such efforts to be directed where there is a substantial potential for energy ...
expand
D-factor: a quantitative model of application slow-down in multi-resource shared systems
Seung-Hwan Lim, Jae-Seok Huh, Youngjae Kim, Galen M. Shipman, Chita R. Das
Pages: 271-282
doi>10.1145/2254756.2254790
Full text: PDF

Scheduling multiple jobs onto a platform enhances system utilization by sharing resources. The benefits from higher resource utilization include reduced cost to construct, operate, and maintain a system, which often include energy consumption. Maximizing ...
expand
ADP: automated diagnosis of performance pathologies using hardware events
Wucherl Yoo, Kevin Larson, Lee Baugh, Sangkyum Kim, Roy H. Campbell
Pages: 283-294
doi>10.1145/2254756.2254791
Full text: PDF

Performance characterization of applications' hardware behavior is essential for making the best use of available hardware resources. Modern architectures offer access to many hardware events that are capable of providing information to reveal architectural ...
expand
Providing fairness on shared-memory multiprocessors via process scheduling
Di Xu, Chenggang Wu, Pen-Chung Yew, Jianjun Li, Zhenjiang Wang
Pages: 295-306
doi>10.1145/2254756.2254792
Full text: PDF

Competition for shared memory resources on multiprocessors is the most dominant cause for slowing down applications and makes their performance varies unpredictably. It exacerbates the need for Quality of Service (QoS) on such systems. In this paper, ...
expand
SESSION: Graphs
Characterizing continuous time random walks on time varying graphs
Daniel Figueiredo, Philippe Nain, Bruno Ribeiro, Edmundo de Souza e Silva, Don Towsley
Pages: 307-318
doi>10.1145/2254756.2254794
Full text: PDF

In this paper we study the behavior of a continuous time random walk (CTRW) on a stationary and ergodic time varying dynamic graph. We establish conditions under which the CTRW is a stationary and ergodic process. In general, the stationary distribution ...
expand
Beyond random walk and metropolis-hastings samplers: why you should not backtrack for unbiased graph sampling
Chul-Ho Lee, Xin Xu, Do Young Eun
Pages: 319-330
doi>10.1145/2254756.2254795
Full text: PDF

Graph sampling via crawling has been actively considered as a generic and important tool for collecting uniform node samples so as to consistently estimate and uncover various characteristics of complex networks. The so-called simple random walk with ...
expand
Clustered embedding of massive social networks
Han Hee Song, Berkant Savas, Tae Won Cho, Vacha Dave, Zhengdong Lu, Inderjit S. Dhillon, Yin Zhang, Lili Qiu
Pages: 331-342
doi>10.1145/2254756.2254796
Full text: PDF

The explosive growth of social networks has created numerous exciting research opportunities. A central concept in the analysis of social networks is a proximity measure, which captures the closeness or similarity between nodes in the network. Despite ...
expand
SESSION: Sampling and ranking
Don't let the negatives bring you down: sampling from streams of signed updates
Edith Cohen, Graham Cormode, Nick Duffield
Pages: 343-354
doi>10.1145/2254756.2254798
Full text: PDF

Random sampling has been proven time and time again to be a powerful tool for working with large data. Queries over the full dataset are replaced by approximate queries over the smaller (and hence easier to store and manipulate) sample. The sample constitutes ...
expand
Efficient rank aggregation using partial data
Ammar Ammar, Devavrat Shah
Pages: 355-366
doi>10.1145/2254756.2254799
Full text: PDF

The need to rank items based on user input arises in many practical applications such as elections, group decision making and recommendation systems. The primary challenge in such scenarios is to decide on a global ranking based on partial preferences ...
expand
Fair sampling across network flow measurements
Nick Duffield
Pages: 367-378
doi>10.1145/2254756.2254800
Full text: PDF

Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow, and completed flow records are sampled in the measurement infrastructure. Recent research, motivated by the need of service ...
expand
POSTER SESSION: Poster session
TCAM-based NFA implementation
Kunyang Peng, Qunfeng Dong
Pages: 379-380
doi>10.1145/2254756.2254802
Full text: PDF

Regular expression matching as the core packet inspection engine of network systems has long been striving to be both fast in matching speed (like DFA) and scalable in storage space (like NFA). Recently, ternary content addressable memory (TCAM) has ...
expand
Stable and efficient pricing for inter-domain traffic forwarding
Elliot Anshelevich, Ameya Hate, Koushik Kar, Michael Usher
Pages: 381-382
doi>10.1145/2254756.2254803
Full text: PDF

We address the question of strategic pricing of inter-domain traffic forwarding services provided by ISPs, which is also closely coupled with the question of how ISPs route their traffic towards their neighboring ISPs. Posing this question as a non-cooperative ...
expand
Measuring and characterizing home networks
Lucas DiCioccio, Renata Teixeira, Catherine Rosenberg
Pages: 383-384
doi>10.1145/2254756.2254804
Full text: PDF

This paper presents the design and evaluation of HomeNet Profiler, a tool that runs on an end-system in the home to collect data from home networks. HomeNet Profiler collects a wide range of measurements including: the set of devices, the set of services ...
expand
Comparing metro-area cellular and WiFi performance: extended abstract
Joel Sommers, Paul Barford
Pages: 385-386
doi>10.1145/2254756.2254805
Full text: PDF

Cellular and 802.11 WiFi offer two compelling connectivity options for mobile users. The goal of our work is to better understand performance characteristics of these technologies in diverse environments and conditions. To that end, we compare and contrast ...
expand
Towards a statistical characterization of the competitiveness of oblivious routing
Gábor Németh, Gábor Rétvári
Pages: 387-388
doi>10.1145/2254756.2254806
Full text: PDF

Oblivious routing asks for a static routing that serves arbitrary user demands with minimal performance penalty. Performance is measured in terms of the competitive ratio, the proportion of the maximum congestion to the best possible congestion. In this ...
expand
Range tomography
Sajjad Zarifzadeh, Madhwaraj G K, Constantine Dovrolis
Pages: 389-390
doi>10.1145/2254756.2254807
Full text: PDF
A scalable architecture for maintaining packet latency measurements
Myungjin Lee, Nick Duffield, Ramana Rao Kompella
Pages: 391-392
doi>10.1145/2254756.2254808
Full text: PDF

Latency has become an important metric for network monitoring since the emergence of new latency-sensitive applications (e.g., algorithmic trading and high-performance computing). In this paper, to provide latency measurements at both finer (e.g., packet) ...
expand
Modeling randomness in network traffic
Markus Laner, Philipp Svoboda, Markus Rupp
Pages: 393-394
doi>10.1145/2254756.2254809
Full text: PDF

A continuous challenge in the field of network traffic modeling is to map recorded traffic onto parameters of random processes, in order to enable simulations of the respective traffic. A key element thereof is a convenient model which is simple, yet, ...
expand
Performance evaluation of the random replacement policy for networks of caches
Massimo Gallo, Bruno Kauffmann, Luca Muscariello, Alain Simonian, Christian Tanguy
Pages: 395-396
doi>10.1145/2254756.2254810
Full text: PDF

Caching is a key component for Content Distribution Networks and new Information-Centric Network architectures. In this paper, we address performance issues of caching networks running the RND replacement policy. We first prove that when the popularity ...
expand
Saving on cooling: the thermal scheduling problem
Koyel Mukherjee, Samir Khuller, Amol Deshpande
Pages: 397-398
doi>10.1145/2254756.2254811
Full text: PDF
Congestion control meets medium access: throughput, delay, and complexity
Shreeshankar Bodas, Devavrat Shah, Damon Wischik
Pages: 399-400
doi>10.1145/2254756.2254812
Full text: PDF

This paper looks at the problem of designing medium access algorithm for wireless networks with the objective of providing high throughput and low delay performance to the users, while requiring only a modest computational effort at the transmitters ...
expand
Optimized cloud placement of virtual clusters using biased importance sampling
Asser N. Tantawi
Pages: 401-402
doi>10.1145/2254756.2254813
Full text: PDF

We introduce an algorithm for the placement of constrained, networked virtual clusters in the cloud, that is based on importance sampling (also known as cross-entropy). Rather than using a straightforward implementation of such a technique, which proved ...
expand
Power and energy containers for multicore servers
Kai Shen, Arrvindh Shriraman, Sandhya Dwarkadas, Xiao Zhang
Pages: 403-404
doi>10.1145/2254756.2254814
Full text: PDF

Power capping and energy efficiency are critical concerns in server systems, particularly when serving dynamic workloads on resource-sharing multicores. We present a new operating system facility (power and energy containers) that accounts for and controls ...
expand
Characterizing the impact of the workload on the value of dynamic resizing in data centers
Kai Wang, Minghong Lin, Florin Ciucu, Adam Wierman, Chuang Lin
Pages: 405-406
doi>10.1145/2254756.2254815
Full text: PDF

Energy consumption imposes a significant cost for data centers; yet much of that energy is used to maintain excess service capacity during periods of predictably low load. Resultantly, there has recently been interest in developing designs that allow ...
expand
Provisioning for large scale cloud computing services
Yue Tan, Yingdong Lu, Cathy H. Xia
Pages: 407-408
doi>10.1145/2254756.2254816
Full text: PDF

Resource provisioning, the task of planning sufficient amounts of resources to meet service level agreements, has become an important management task in emerging cloud computing services. In this paper, we present a stochastic modeling approach to guide ...
expand
Distributed wide-area traffic management for cloud services
Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang
Pages: 409-410
doi>10.1145/2254756.2254817
Full text: PDF

The performance of interactive cloud services depends heavily on which data centers handle client requests, and which wide-area paths carry traffic. While making these decisions, cloud service providers also need to weigh operational considerations like ...
expand
On the efficacy of fine-grained traffic splitting protocols in data center networks
Advait Abhay Dixit, Pawan Prakash, Ramana Rao Kompella, Charlie Hu
Pages: 411-412
doi>10.1145/2254756.2254818
Full text: PDF

Current multipath routing techniques split traffic at a per-flow level because, according to conventional wisdom, forwarding packets of a TCP flow along different paths leads to packet reordering which is detrimental to TCP. In this paper, we revisit ...
expand
Content-aware traffic engineering
Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann
Pages: 413-414
doi>10.1145/2254756.2254819
Full text: PDF

Recent studies show that a large fraction of Internet traffic is originated by Content Providers (CPs) such as content distribution networks and hyper-giants. To cope with the increasing demand for content, CPs deploy massively distributed server infrastructures. ...
expand
Understanding performance anomalies of SSDs and their impact in enterprise application environment
Jian Hu, Hong Jiang, Prakash Manden
Pages: 415-416
doi>10.1145/2254756.2254820
Full text: PDF

SSD is known to have the erase-before-write and out-of-place update properties. When the number of invalidated pages is more than a given threshold, a process referred to as garbage collection (GC) is triggered to erase blocks after valid pages in these ...
expand
Classifying internet one-way traffic
Eduard Glatz, Xenofontas Dimitropoulos
Pages: 417-418
doi>10.1145/2254756.2254821
Full text: PDF

In this work we analyze a massive data-set that captures 5.23 petabytes of traffic to shed light into the composition of one-way traffic towards a large network based on a novel one-way traffic classifier. We find that one-way traffic makes a very large ...
expand
Fast cost efficient designs by building upon the plackett and burman method
Manish Arora, Feng Wang, Bob Rychlik, Dean Tullsen
Pages: 419-420
doi>10.1145/2254756.2254822
Full text: PDF

CPU processor design involves a large set of increasingly complex design decisions, and simulating all possible designs is typically not feasible. Sensitivity analysis, a commonly used technique, can be dependent on the starting point of the design and ...
expand
Multi-hop network tomography: path reconstruction and per-hop arrival time estimation from partial information
Matthias Keller, Jan Beutel, Lothar Thiele
Pages: 421-422
doi>10.1145/2254756.2254823
Full text: PDF

In the context of low-power wireless sensor networks, this paper presents multi-hop network tomography (MNT), a novel, non-intrusive algorithm for reconstructing the path, the per-hop arrival order, and the per-hop arrival time of individual packets ...
expand
Smartphones vs. laptops: comparing web browsing behavior and the implications for caching
Ioannis Papapanagiotou, Erich M. Nahum, Vasileios Pappas
Pages: 423-424
doi>10.1145/2254756.2254824
Full text: PDF

In this work we present the differences and similarities of the web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting methodology to distinguish different types of wireless devices (smartphone vs ...
expand
TUTORIAL SESSION: Tutorials
Micro and macro views of discrete-state markov models and their application to efficient simulation with phase-type distributions
Philipp Reinecke, Miklós Telek, Katinka Wolter
Pages: 425-426
doi>10.1145/2254756.2254826
Full text: PDF
POTRA: a framework for building power models for next generation multicore architectures
Ramon Bertran, Marc Gonzàlez, Xavier Martorell, Nacho Navarro, Eduard Ayguadé
Pages: 427-428
doi>10.1145/2254756.2254827
Full text: PDF
Basic theory and some applications of martingales
Richard A. Hayden
Pages: 429-430
doi>10.1145/2254756.2254828
Full text: PDF

This tutorial surveys the fundamental results of the theory of martingales from the perspective of the performance engineer. We will present the fundamental results and illustrate their power through simple and elegant proofs of important and well-known ...
expand
Applications of machine learning to performance evaluation
Edmundo de Souza e Silva, Daniel Sadoc Menasche
Pages: 431-432
doi>10.1145/2254756.2254829
Full text: PDF
Introduction to network experiments using the GENI cyberinfrastructure
Jay Aikat, Kevin Jeffay
Pages: 433-434
doi>10.1145/2254756.2254830
Full text: PDF

In this tutorial, we will introduce the SIGMETRICS/Performance community to the vast testbeds, tools and resources openly available through the GENI (Global Environment for Network Innovations) project. We will present details about the distributed computing resources available on GENI for researchers interested in simulation as well as measurement-based performance evaluation experiments. We will demonstrate simple experiments on GENI, and leave them with information on how to run experiments for research and education using GENI resources.

http://dl.acm.org/citation.cfm?id=2254756

http://www.sigmetrics.org/sigmetrics2012/

 
 
  • 标签:SIGMETRICS 2012 
  • 发表评论:
    载入中。。。

     
     
     

    梦翔儿网站 梦飞翔的地方 http://www.dreamflier.net
    中华人民共和国信息产业部TCP/IP系统 备案序号:辽ICP备09000550号

    Powered by Oblog.