Sciweavers

PAM
2012
Springer
12 years 3 months ago
A Longitudinal Characterization of Local and Global BitTorrent Workload Dynamics
Abstract. Workload characterization is important for understanding how systems and services are used in practice and to help identify design improvements. To better understand the ...
Niklas Carlsson, György Dán, Anirban M...
PAM
2012
Springer
12 years 3 months ago
Characterizing Delays in Norwegian 3G Networks
Abstract. This paper presents a first look at long-term delay measurements from data connections in 3 Norwegian 3G Networks. We have performed active measurements for more than 6 ...
Ahmed Elmokashfi, Amund Kvalbein, Jie Xiang, Krist...
EWSN
2012
Springer
12 years 3 months ago
On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks
Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the th...
Flavio Fabbri, Marco Zuniga, Daniele Puccinelli, P...
EWSN
2012
Springer
12 years 3 months ago
Low Power or High Performance? A Tradeoff Whose Time Has Come (and Nearly Gone)
Abstract. Some have argued that the dichotomy between high-performance operation and low resource utilization is false – an artifact that will soon succumb to Moore’s Law and c...
JeongGil Ko, Kevin Klues, Christian Richter, Wanja...
ICDCSW
2011
IEEE
12 years 7 months ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis
ICDCSW
2011
IEEE
12 years 7 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
ICDCSW
2011
IEEE
12 years 7 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
ICDCSW
2011
IEEE
12 years 7 months ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes
DSN
2011
IEEE
12 years 7 months ago
Resource and virtualization costs up in the cloud: Models and design choices
—Virtualization offers the potential for cost-effective service provisioning. For service providers who make significant investments in new virtualized data centers in support of...
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova
DSN
2011
IEEE
12 years 7 months ago
Modeling time correlation in passive network loss tomography
—We consider the problem of inferring link loss rates using passive measurements. Prior inference approaches are mainly built on the time correlation nature of packet losses. How...
Jin Cao, Aiyou Chen, Patrick P. C. Lee