Sciweavers

ICDCSW
2011
IEEE
13 years 1 days ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis
ICDCSW
2011
IEEE
13 years 1 days ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
ICDCSW
2011
IEEE
13 years 1 days ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia
ICDCSW
2011
IEEE
13 years 1 days ago
Link-Level Network Topology Generation
Abstract—Internet topology generation involves producing synthetic network topologies that imitate the characteristics of the Internet. Although the accuracy of newly developed n...
Mehmet Burak Akgun, Mehmet Hadi Gunes