Default Cover Image

Third International Conference on the Quantitative Evaluation of Systems

Sept. 11 2006 to Sept. 14 2006

Riverside, CA

Table of Contents

Introduction
Message from the General ChairFreely available from IEEE.pp. x
Papers
Technical Program CommitteeFreely available from IEEE.pp. xiv-xiv
Papers
Message from the Program Committee ChairsFreely available from IEEE.pp. xi-xi
list-reviewerFreely available from IEEE.pp. xv-xv
Invited Talk
Causality, Responsibility, and Blame: A Structural-Model ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 3-8
Session 1.1: Measurements
Behavior of Available End-to-end Bandwidth: Non-Parametric ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 9-18
Continuous Bytecode Instruction Counting for CPU Consumption EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 19-30
Toolbox for Dimensioning Windows Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Session 1.2: Storage Systems
Long-Range Dependence at the Disk Drive LevelFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Session 1.2: Storage Systems
Rate-Controlled Scheduling of Expired Writes for Volatile CachesFull-text access may be available. Sign in or learn about subscription options.pp. 51-62
Session 1.3: Network Models
A versatile infinite-state Markov reward model to study bottlenecks in 2-hop ad hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 63-72
Performance Anlysis of Delay Tolerant Networks with Model Checking TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Session 1.3: Network Models
Measuring and Modeling of Application Flow Length in Commercial GPRS NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
Session 1.3: Network Models
Modeling Fiber Delay Loops in an All Optical SwitchFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
Session 1.3: Network Models
Layered Bottlenecks and Their MitigationFull-text access may be available. Sign in or learn about subscription options.pp. 103-114
Session 1.4: Tools
QPME - Queueing Petri Net Modeling EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 115-116
Session 1.4: Tools
Distributed Simulation of Colored Stochastic Petri Nets With TimeNET 4.0Full-text access may be available. Sign in or learn about subscription options.pp. 117-118
Session 1.4: Tools
Java Modelling Tools: an Open Source Suite for Queueing Network Modelling andWorkload AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 119-120
Session 1.4: Tools
A PMIF Semantic Validation ToolFull-text access may be available. Sign in or learn about subscription options.pp. 121-122
Session 1.4: Tools
Time Petri Nets Analysis with TINAFull-text access may be available. Sign in or learn about subscription options.pp. 123-124
Session 1.4: Tools
UPPAAL 4.0Full-text access may be available. Sign in or learn about subscription options.pp. 125-126
Analysis of Real Time Systems through the ORIS ToolFull-text access may be available. Sign in or learn about subscription options.pp. 127-128
Session 1.4: Tools
APMC 3.0: Approximate Verification of Discrete and Continuous Time Markov ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 129-130
Session 1.4: Tools
LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 131-132
Session 1.4: Tools
MathMC: A Mathematica-Based Tool for CSL Model Checking of Deterministic and Stochastic Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 133-134
Session 1.4: Tools
Traviando - Debugging Simulation Traces with Message Sequence ChartsFull-text access may be available. Sign in or learn about subscription options.pp. 135-136
Session 1.4: Tools
Integration of an MPS Modeling Approach into MobiusFull-text access may be available. Sign in or learn about subscription options.pp. 139-140
Session 1.4: Tools
PACMAN: A PerformAnce Counters MANager for Intel Hyperthreaded ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
Invited Talk
Modeling and Optimization Problems in Contact CentersFull-text access may be available. Sign in or learn about subscription options.pp. 145-156
Session 2.1: Markov Decision Processes
Game-based Abstraction for Markov Decision ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 157-166
Session 2.1: Markov Decision Processes
Compositional Performability Evaluation for STATEMATEFull-text access may be available. Sign in or learn about subscription options.pp. 167-178
Session 2.2: Model Checking
Compositional Quantitative ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 179-188
Session 2.2: Model Checking
Model Checking of Continuous-Time Markov Chains by Closed-Form Bounding DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 189-198
CSL Model Checking for Generalized Stochastic Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 199-210
Efficient lumpability check in partially symmetric systemsFull-text access may be available. Sign in or learn about subscription options.pp. 211-220
Session 2.3: Lumpability
Lumping Markov Chains with Silent StepsFull-text access may be available. Sign in or learn about subscription options.pp. 221-232
Session 2.4: Markov Models
Optimization of Markov Models with Evolutionary Strategies Based on Exact and Approximate Analysis TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Session 2.4: Markov Models
Bound-Preserving Composition for Markov Reward ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
Session 2.4: Markov Models
Limiting Behavior of Markov Chains with Eager AttractorsFull-text access may be available. Sign in or learn about subscription options.pp. 253-264
Invited Talk
Designing and managing storage systems: issues, techniques, and challengesFull-text access may be available. Sign in or learn about subscription options.pp. 265-268
Session 3.1: Optimization in Networks
Optimization of Cache Expiration Dates in Content NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 269-278
Session 3.1: Optimization in Networks
Optimal Static Pricing of Reverse-Link DS-CDMA Multiclass TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 279-290
Session 3.2: Reachability
Strategy Improvement for Concurrent Reachability GamesFull-text access may be available. Sign in or learn about subscription options.pp. 291-300
Session 3.2: Reachability
Safe On-The-Fly Steady-State Detection for Time-Bounded ReachabilityFull-text access may be available. Sign in or learn about subscription options.pp. 301-310
Session 3.2: Reachability
Probably on Time and within BudgetOn Reachability in Priced Probabilistic Timed AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 311-322
A tool support for automatic analysis based on the tagged customer approachFull-text access may be available. Sign in or learn about subscription options.pp. 323-332
On Single-Class Load-Dependent Normalizing Constant EquationsFull-text access may be available. Sign in or learn about subscription options.pp. 333-342
Session 3.3: Queuing
Exploring correctness and accuracy of solutions to matrix polynomial equations in queuesFull-text access may be available. Sign in or learn about subscription options.pp. 343-352
Session 3.3: Queuing
Threshold Workload Control in the BMAP/G/1 QueueFull-text access may be available. Sign in or learn about subscription options.pp. 353-364
Session 3.4: Server Systems
Identifying Low-ProfileWeb Server's IP FingerprintFull-text access may be available. Sign in or learn about subscription options.pp. 365-374
Session 3.4: Server Systems
Load Balancing for Performance Differentiation in Dual-Priority Clustered ServersFull-text access may be available. Sign in or learn about subscription options.pp. 385-394
Author Index
Author IndexFreely available from IEEE.pp. 395
Showing 57 out of 57