Default Cover Image

2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)

Sept. 19 2016 to Sept. 21 2016

London, United Kingdom

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xi
Foreword from the General ChairFreely available from IEEE.pp. xii-xiii
Message from the Program ChairsFreely available from IEEE.pp. xiv-xiv
Organizing CommitteeFreely available from IEEE.pp. xv-xvi
ReviewersFreely available from IEEE.pp. xvii-xvii
Keynote TalksFull-text access may be available. Sign in or learn about subscription options.pp. xviii-xxi
A Better Model for Job Redundancy: Decoupling Server Slowdown and Job SizeFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Exact Analysis of Energy-Aware Multiserver Queueing Systems with Setup TimesFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Optimal Provision of Multiple Service TypesFull-text access may be available. Sign in or learn about subscription options.pp. 21-29
Picky: Efficient and Reproducible Sharing of Large Datasets Using Merkle-TreesFull-text access may be available. Sign in or learn about subscription options.pp. 30-38
An Uncertainty-Aware Approach to Optimal Configuration of Stream Processing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Performance Evaluation of a Tape Library SystemFull-text access may be available. Sign in or learn about subscription options.pp. 59-68
Stochastic Modeling of Hybrid Cache SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 69-78
Exploiting Replication for Energy Efficiency of Heterogeneous Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 79-84
Modeling the Energy-Time Performance of MIC Architecture SystemFull-text access may be available. Sign in or learn about subscription options.pp. 85-94
ALUPower: Data Dependent Power Consumption in GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 95-104
Experimental Calibration and Validation of a Speed Scaling SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 105-114
Static Program Analysis for Identifying Energy Bugs in Graphics-Intensive Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 115-124
Performance Modeling of Virtual Switching SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 125-134
Evacuee Flow Optimisation Using G-Network with Multiple Classes of Positive CustomersFull-text access may be available. Sign in or learn about subscription options.pp. 135-143
Modeling Energy Packets Networks in the Presence of FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 144-153
A Diffusion Model for Energy Harvesting Sensor NodesFull-text access may be available. Sign in or learn about subscription options.pp. 154-158
Performance Model Derivation of Operational Systems through Log AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 159-168
Pilot: A Framework that Understands How to Do Performance Benchmarks the Right WayFull-text access may be available. Sign in or learn about subscription options.pp. 169-178
QoS-Aware CAPEX Minimization in Urban Off-Grid Radio Access NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Vertical Integration of CDN and Network Operator: Model and AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 189-195
Cloud-Based Spectrum Sharing in Virtual Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 196-204
Geographic Routing in Extreme-Scale Highly-Dynamic Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 205-210
RESAR: Reliable Storage at Exabyte ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
I/O Scheduling Schemes for Better I/O Proportionality on Flash-Based SSDsFull-text access may be available. Sign in or learn about subscription options.pp. 221-230
Diplomat: Mapping of Multi-kernel Applications Using a Static Dataflow AbstractionFull-text access may be available. Sign in or learn about subscription options.pp. 241-250
Prospects for Shaping User-Centric Mobile Application Workloads to Benefit the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 251-260
Optimizing Secure SDN-Enabled Inter-Data Centre Overlay Networks through Cognitive RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Energy Efficient Policies for Upstream Content Server SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Online Work Distribution to CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Autoscaling Effects in Speed Scaling SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 307-312
Achieving Efficiency without Sacrificing Model Accuracy: Network Calculus on Compact DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 313-318
Bounding Aggregations on Phase-Type Arrivals for Performance Analysis of CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
A Performance Approach to Mobile SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
Is Multipath TCP (MPTCP) Beneficial for Video Streaming over DASH?Full-text access may be available. Sign in or learn about subscription options.pp. 331-336
Parallel HTTP for Video Streaming in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
Optimal Cell Assignment Algorithms for Pico-Cell NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
Product-Forms for Probabilistic Input/Output AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Efficient Timeout Synthesis in Fixed-Delay CTMC Using Policy IterationFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
A Markov Reward Model Based Greedy Heuristic for the Virtual Network Embedding ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
A Platform for Run-Time Health Verification of Elastic Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Energy Storage in Smart Homes: Grid-Convenience Versus Self-Use and SurvivabilityFull-text access may be available. Sign in or learn about subscription options.pp. 385-390
Towards Systemic Risk Aware Engineering of Large-Scale Networks: Complex Systems PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 391-393
Towards a Scalable Test Solution for the Analysis of Interconnect Shorts in On-chip NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 394-399
LayerMover: Storage Migration of Virtual Machine across Data Centers Based on Three-Layer Image StructureFull-text access may be available. Sign in or learn about subscription options.pp. 400-405
Write Amplification with Write SkewFull-text access may be available. Sign in or learn about subscription options.pp. 406-411
Bulk I/O Storage Management for Big Data ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 412-417
RAIDX: RAID without StripingFull-text access may be available. Sign in or learn about subscription options.pp. 418-423
Efficient Memory Occupancy Models for In-memory DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 430-432
Understanding the Energy, Performance, and Programming Effort Trade-Offs of Android Persistence FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
Behavior-Aware Integrated CPU-GPU Power Management for Mobile GamesFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
Designing and Enabling Simulation of Real-World GPU Network Applications with ns-3 and DCEFull-text access may be available. Sign in or learn about subscription options.pp. 445-450
Characterizing Performance and Power towards Efficient Synchronization of GPU KernelsFull-text access may be available. Sign in or learn about subscription options.pp. 451-456
Data Modelling with Gaussian Process in Sensor Networks for Urban Environmental MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 457-462
TerrainLOS: An Outdoor Propagation Model for Realistic Sensor Network SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 463-468
Cooperation Stimulation and Security in Wireless Ad Hoc Networks — A Power-Efficient Bayesian Game ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 469-474
Dynamic Clustering Algorithm for Tracking Target with High and Variable CelerityFull-text access may be available. Sign in or learn about subscription options.pp. 475-480
Improve Restore Speed in Deduplication Systems Using Segregated CacheFull-text access may be available. Sign in or learn about subscription options.pp. 487-492
An Experimental Study on the Effect of Asymmetric Memory Latency of New Memory on Application PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 493-498
Author IndexFreely available from IEEE.pp. 499-501
Publisher’s InformationFreely available from IEEE.pp. 502-502
Showing 79 out of 79