[1] F. Baskett, K. Chandy, R. Muntz, and F. Palacios, "Open, closed, and mixed networks of queues with different classes of customers," J. ACM, vol. 22, no. 2, April 1975. [2] A. Harbitter and D. A. Menascé, "A methodology for analyzing the performance of authentication protocols," ACM Trans. Information Systems Security, vol. 5, no. 4, November 2002, pp. 458-491. [3] A. M. Law and W. D. Kelton, Simulation Modeling and Techniques, 3rd ed., McGraw-Hill, New York, 2000. [4] M. H. MacDougall, Simulating Computer Systems: Techniques and Tools, MIT Press, Cambridge, Mass., 1987. [5] S. M. Ross, A Course in Simulation, Macmillan, New York, 1990. [6] D. A. Menascé, "Two-level iterative queuing modeling of software contention," Proc. Tenth IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), Fort Worth, Texas, October 12-16, 2002, pp. 267 276. [7] D. A. Menascé and V. A. F. Almeida, Scaling for E-business: technologies, Models, Performance, and Capacity Planning, Prentice Hall, Upper Saddle River, New Jersey 2000. [8] J. Rolia and K. C. Sevcik, "The method of layers," IEEE Tr. Software Engineering, vol. 21, no. 8, 1995, pp. 689 700. [9] A. Thomasian, "Performance analysis of concurrency control methods," in Performance Evaluation: Origins and Directions, G. Haring, C. Lindemann, and M. Reiser (eds.), Springer, Berlin, 2000, pp. 329 354. |