Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MASCOTS
MASCOTS 2008
Generate Citations
2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems
Sept. 8 2008 to Sept. 10 2008
Baltimore, MD
Table of Contents
[Breaker page]
Freely available from IEEE.
pp. 1
Controlled Epidemic Routing for Multicasting in Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad Abdulla
,
Robert Simon
Geographic Constraint Mobility Model for Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
by
Sabbir Ahmed
,
Gour C. Karmakar
,
Joarder Kamruzzaman
Increased Reliability with SSPiRAL Data Layouts
Full-text access may be available. Sign in or learn about subscription options.
by
Ahmed Amer
,
Darrell D. E. Long
,
Thomas Schwarz
,
Jehan-Francois Paris
Bounding the Performance of BCMP Networks with Load-Dependent Stations
Full-text access may be available. Sign in or learn about subscription options.
by
Jonatha Anselmi
,
Paolo Cremonesi
Comparison of Single-Rate Multicast Congestion Control Protocols vs. ASMP
Full-text access may be available. Sign in or learn about subscription options.
by
Christos Bouras
,
Apostolos Gkamas
,
Georgios Kioumourtzis
Runtime prediction models for Web-based system resources
Full-text access may be available. Sign in or learn about subscription options.
by
Sara Casolari
,
Mauro Andreolini
,
Michele Colajanni
Modeling and Analyzing the Effect of Microarchitecture Design Parameters on Microprocessor Soft Error Vulnerability
Full-text access may be available. Sign in or learn about subscription options.
by
Chang Burm Cho
,
Wangyuan Zhang
,
Tao Li
Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments
Full-text access may be available. Sign in or learn about subscription options.
by
Jeonghwan Choi
,
Sriram Govindan
,
Bhuvan Urgaonkar
,
Anand Sivasubramaniam
A Performance Model of Multi-Version Concurrency Control
Full-text access may be available. Sign in or learn about subscription options.
by
Pierangelo di Sanzo
,
Bruno Ciciani
,
Francesco Quaglia
,
Paolo Romano
Failure Prediction Models for Proactive Fault Tolerance within Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Ben Eckart
,
Xin Chen
,
Xubin He
,
Stephen L. Scott
Quantifying Temporal and Spatial Localities in Storage Workloads and Transformations by Data Path Components
Full-text access may be available. Sign in or learn about subscription options.
by
Cory Fox
,
Dragan Lojpur
,
An-I Andy Wang
Network Information Flow in Network of Queues
Full-text access may be available. Sign in or learn about subscription options.
by
Phillipa Gill
,
Zongpeng Li
,
Anirban Mahanti
,
Jingxiang Luo
,
Carey Williamson
Optimal Layered Multicast with Network Coding: Mathematical Model and Empirical Studies
Full-text access may be available. Sign in or learn about subscription options.
by
Ajay Gopinathan
,
Zongpeng Li
Optimizing Galois Field Arithmetic for Diverse Processor Architectures and Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Kevin M. Greenan
,
Ethan L. Miller
,
Thomas J.E. Schwarz S.J.
TCP over WiMAX: A Measurement Study
Full-text access may be available. Sign in or learn about subscription options.
by
Emir Halepovic
,
Qian Wu
,
Carey Williamson
,
Majid Ghaderi
Taxis: Scalable Strong Anonymous Communication
Full-text access may be available. Sign in or learn about subscription options.
by
Andreas Hirt
,
Michael Jacobson
,
Carey Williamson
An Analysis of Hard Drive Energy Consumption
Full-text access may be available. Sign in or learn about subscription options.
by
Anthony Hylick
,
Ripduman Sohan
,
Andrew Rice
,
Brian Jones
A Markov Chain Model to Account for Multi-Rate Transmission and Node Cooperative Behavior in IEEE 802.11 Data Link Protocol
Full-text access may be available. Sign in or learn about subscription options.
by
Lakshmi Narasimhan Kannan
,
Niraj Agarwal
,
Andrea Fumagalli
,
Marco Tacca
Operational Analysis of Parallel Servers
Full-text access may be available. Sign in or learn about subscription options.
by
Terence Kelly
,
Kai Shen
,
Alex Zhang
,
Christopher Stewart
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
Full-text access may be available. Sign in or learn about subscription options.
by
Hyojeong Kim
,
Kihong Park
On Impact of Dynamic Virtual Machine Reallocation on Data Center Efficiency
Full-text access may be available. Sign in or learn about subscription options.
by
Andrzej Kochut
Modelling and Validation of Response Times in Zoned RAID
Full-text access may be available. Sign in or learn about subscription options.
by
Abigail S. Lebrecht
,
Nicholas J. Dingle
,
William J. Knottenbelt
Characterization of Large-Scale SMTP Traffic: the Coexistence of the Poisson Process and Self-Similarity
Full-text access may be available. Sign in or learn about subscription options.
by
Youngjae Lee
,
Jin-Soo Kim
GRAID: A Green RAID Storage Architecture with Improved Energy Efficiency and Reliability
Full-text access may be available. Sign in or learn about subscription options.
by
Bo Mao
,
Dan Feng
,
Hong Jiang
,
Suzhen Wu
,
Jianxi Chen
,
Lingfang Zeng
Allocation and Admission Policies for Service Streams
Full-text access may be available. Sign in or learn about subscription options.
by
Michele Mazzucco
,
Isi Mitrani
,
Mike Fisher
,
Paul McKee
Realistic Topology Modeling for the Internet BGP Infrastructure
Full-text access may be available. Sign in or learn about subscription options.
by
Veena Raghavan
,
George Riley
,
Talal Jaafar
Modeling Software Contention Using Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
by
Nilabja Roy
,
Akshay Dabholkar
,
Nathan Hamm
,
Larry Dowdy
,
Douglas Schmidt
Sensitivity Based Power Management of Enterprise Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Sriram Sankar
,
Sudhanva Gurumurthi
,
Mircea R. Stan
Evaluating the Effectiveness of Information Extraction in Real-World Storage Management
Full-text access may be available. Sign in or learn about subscription options.
by
Aameek Singh
,
Sandeep Uttamchandani
,
Yin Wang
On the Stability of Best Effort Flow Control Mechanisms in On-Chip Architectures
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammad S. Talebi
,
Ahmad Khonsari
Finding Good Configurations in High-Dimensional Spaces: Doing More with Less
Full-text access may be available. Sign in or learn about subscription options.
by
Risi Thonangi
,
Vamsidhar Thummala
,
Shivnath Babu
AKCE: An Efficient and Accurate K-Coverage Eligibility Algorithm in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Meng-Chun Wueng
,
Shyh-In Hwang
,
Chia-Hsuan Ho
PEARL: Performance, Energy, and Reliability Balanced Dynamic Data Redistribution for Next Generation Disk Arrays
Full-text access may be available. Sign in or learn about subscription options.
by
Tao Xie
,
Yao Sun
A Large-scale and Decentralized Infrastructure for Multiple Queries Optimization and Aggregation
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaoyu Yang
,
Yiming Hu
Multi-Torrent: a Performance Study
Full-text access may be available. Sign in or learn about subscription options.
by
Yan Yang
,
Alix L.H. Chow
,
Leana Golubchik
A Novel and Generic Model for Synthesizing Disk I/O Traffic Based on The Alpha-stable Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Qiang Zou
,
Dan Feng
,
Yifeng Zhu
,
Hong Jiang
,
Xiaohu Ge
,
Zhihua Zhou
Filtering Effects of Media Merging in a Cache Hierarchy
Full-text access may be available. Sign in or learn about subscription options.
by
Jean Cao
,
Carey Williamson
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Carol J. Fung
,
Yanni Ellen Liu
Evaluating the Effectiveness of REDCAP to Recover the Locality Missed by Today's Linux Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Pilar Gonzalez-Ferez
,
Juan Piernas
,
Toni Cortes
Influence of Propagation Modeling on VoIP Quality Performance in Wireless Mesh Network Simulation
Full-text access may be available. Sign in or learn about subscription options.
by
Arlen Nascimento
,
Saulo Queiroz
,
Leandro Galvao
,
Edjair Mota
,
Edson Nascimento
Using Non-Volatile RAM as a Write Buffer for NAND Flash Memory-based Storage Devices
Full-text access may be available. Sign in or learn about subscription options.
by
Sungmin Park
,
Hoyoung Jung
,
Hyoki Shim
,
Sooyong Kang
,
Jaehyuk Cha
Write Buffer-aware Address Mapping for NAND Flash Memory Devices
Full-text access may be available. Sign in or learn about subscription options.
by
Sungmin Park
,
Hoyoung Jung
,
Hyoki Shim
,
Sooyong Kang
,
Jaehyuk Cha
A Discrete Event Simulation Model for Parallel Data Transfer Applications
Full-text access may be available. Sign in or learn about subscription options.
by
John Sherrell
,
Jason S. Wertz
,
Don Gruenbacher
Efficient index lookup for De-duplication backup system
Full-text access may be available. Sign in or learn about subscription options.
by
Youjip Won
,
Jongmyeong Ban
,
Jaehong Min
,
Jungpil Hur
,
Sangkyu Oh
,
Jangsun Lee
An Energy-efficient Buffer Cache Replacement Algorithm
Full-text access may be available. Sign in or learn about subscription options.
by
Jianhui Yue
,
Yifeng Zhu
,
Zhao Cai
Showing 46 out of 46