Bibliography


[1] F. Baskett, K. Chandy, R. Muntz, and F. Palacios, "Open, closed, and mixed networks of queues with different classes of customers," J. ACM, vol. 22, no. 2, April 1975.

[2] A. Harbitter and D. A. Menascé, "A methodology for analyzing the performance of authentication protocols," ACM Trans. Information Systems Security, vol. 5, no. 4, November 2002, pp. 458-491.

[3] A. M. Law and W. D. Kelton, Simulation Modeling and Techniques, 3rd ed., McGraw-Hill, New York, 2000.

[4] M. H. MacDougall, Simulating Computer Systems: Techniques and Tools, MIT Press, Cambridge, Mass., 1987.

[5] S. M. Ross, A Course in Simulation, Macmillan, New York, 1990.

[6] D. A. Menascé, "Two-level iterative queuing modeling of software contention," Proc. Tenth IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), Fort Worth, Texas, October 12-16, 2002, pp. 267 276.

[7] D. A. Menascé and V. A. F. Almeida, Scaling for E-business: technologies, Models, Performance, and Capacity Planning, Prentice Hall, Upper Saddle River, New Jersey 2000.

[8] J. Rolia and K. C. Sevcik, "The method of layers," IEEE Tr. Software Engineering, vol. 21, no. 8, 1995, pp. 689 700.

[9] A. Thomasian, "Performance analysis of concurrency control methods," in Performance Evaluation: Origins and Directions, G. Haring, C. Lindemann, and M. Reiser (eds.), Springer, Berlin, 2000, pp. 329 354.



Performance by Design. Computer Capacity Planning by Example
Performance by Design: Computer Capacity Planning By Example
ISBN: 0130906735
EAN: 2147483647
Year: 2003
Pages: 166

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net