Sciweavers

2241 search results - page 196 / 449
» Performance Modeling and Evaluation of E-Business Systems
Sort
View
WSC
2000
13 years 10 months ago
Ranking and selection for steady-state simulation
We present and evaluate two ranking-and-selection procedures for use in steady-state simulation experiments when the goal is to find which among a finite number of alternative sys...
David Goldsman, William S. Marshall, Seong-Hee Kim...
SIGCOMM
1996
ACM
14 years 1 months ago
On the Relevance of Long-Range Dependence in Network Traffic
There is much experimental evidence that network traffic processes exhibit ubiquitous properties of self-similarity and long-range dependence, i.e., of correlations over a wide ran...
Matthias Grossglauser, Jean-Chrysostome Bolot
JDCTA
2010
172views more  JDCTA 2010»
13 years 4 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
CCGRID
2006
IEEE
14 years 3 months ago
Analysis of Query Matching Criteria and Resource Monitoring Models for Grid Application Scheduling
Making effective use of computational Grids requires scheduling Grid applications onto resources that best match them. Resource-related state (e.g., load, availability, and locati...
Ronak Desai, Sameer Tilak, Bhavin Gandhi, Michael ...
PR
2006
117views more  PR 2006»
13 years 9 months ago
On transforming statistical models for non-frontal face verification
: We address the pose mismatch problem which can occur in face verification systems that have only a single (frontal) face image available for training. In the framework of a Bayes...
Conrad Sanderson, Samy Bengio, Yongsheng Gao