This memory reference pattern is typical of several types of access in shared-memory systems. Cache-line fetches and prefetches, vectorregister loads and stores, even paging traffic can be represented in this way. In addition to issuing bursts of accesses, another characteristic Cedar shares with modern microprocessor-based systems is illustrated in Figure 2.2. The amount of local processing that occurs between bursts of accesses varies across a wide rage, but the average value is small compared to the maximum. A negative-exponentially distributed random variable, which is the result of a Poisson process [21], also shares this characteristic. This distribution is characteristic of repeated trials with constant probability and is often used...
Abstract. We review characteristics of data traffic which we term stylized facts: burstiness, long r...
We review characteristics of data traffic which we term stylized facts: burstiness, long-range depen...
While numerous studies have examined the macro-level behav-ior of traffic in data center networks—ov...
This thesis presents the development and use of a performance analysis methodology suitable for use ...
The N-Burst model describes traffic in telecommunication systems as the superposition of N packet (o...
Abstract: We consider a model for bursty traffic in ATM. The model is a single server queue with inf...
Multicluster systems have emerged as a promising infrastructure for provisioning of cost-effective h...
Traffic models are an essential component of performance analyses of telecommunication networks. Thi...
We consider a special case of the M/G/∞ traffic process, named as Poisson Lomax Burst Process (PLBP)...
In this thesis, we study the cause and impact of burstiness in computer network traffic. A connectio...
We believe that many distributed computing systems of the future will use distributed shared memory ...
Cluster-based systems have emerged as a promising technology for providing cost-effectiveness in hig...
The probability of a station failing to deliver packets before their deadlines, called the probabili...
This paper studies the performance of interrupt-driven kernels when subjected to heavy network traff...
International audienceBurst-Buffers are high throughput, small size intermediate storage systems typ...
Abstract. We review characteristics of data traffic which we term stylized facts: burstiness, long r...
We review characteristics of data traffic which we term stylized facts: burstiness, long-range depen...
While numerous studies have examined the macro-level behav-ior of traffic in data center networks—ov...
This thesis presents the development and use of a performance analysis methodology suitable for use ...
The N-Burst model describes traffic in telecommunication systems as the superposition of N packet (o...
Abstract: We consider a model for bursty traffic in ATM. The model is a single server queue with inf...
Multicluster systems have emerged as a promising infrastructure for provisioning of cost-effective h...
Traffic models are an essential component of performance analyses of telecommunication networks. Thi...
We consider a special case of the M/G/∞ traffic process, named as Poisson Lomax Burst Process (PLBP)...
In this thesis, we study the cause and impact of burstiness in computer network traffic. A connectio...
We believe that many distributed computing systems of the future will use distributed shared memory ...
Cluster-based systems have emerged as a promising technology for providing cost-effectiveness in hig...
The probability of a station failing to deliver packets before their deadlines, called the probabili...
This paper studies the performance of interrupt-driven kernels when subjected to heavy network traff...
International audienceBurst-Buffers are high throughput, small size intermediate storage systems typ...
Abstract. We review characteristics of data traffic which we term stylized facts: burstiness, long r...
We review characteristics of data traffic which we term stylized facts: burstiness, long-range depen...
While numerous studies have examined the macro-level behav-ior of traffic in data center networks—ov...