No abstract available.
A study of dynamic reconnection
The recently introduced Extended Architecture (XA) of large IBM computer systems includes, in the disk I/O area, the ability for an access to be resumed and completed on a path different from the one on which it has been initiated. The expected disk ...
The MVA Pre-empt resume priority approximation
A Mean Value Analysis (MVA) approximation is presented for computing the average performance measures of closed multiclass queueing networks containing non pre-emptive Head Of Line (HOL) and Pre-empt Resume (PR) priority centers. The approximation has ...
On the BLI-model of program behaviour
The BLI-model of program behaviour is sometimes referred to as an exact measure of the locality structure of the programs. However, only limited experimental data is available of the applicability of the BLI-model. In this paper the characteristics of ...
HOPT: A myopic version of the STOCHOPT automatic file migration policy
The STOCHOPT automatic file migration policy (proposed by A.J. Smith) minimizes the expected retention and recall costs of an abitrarily sized file. We consider the application of the STOCHOPT policy to a file system in which the file inter-reference ...
Paging on an object-oriented personal computer
A high-performance personal computing environment must avoid perceptible pauses resulting from many page faults within a short period of time. Our performance goals for a paged virtual memory system for the Smalltalk-80TM@@@@; programming environment ...
State space transformations in queueing network modeling
An important problem in queueing network modeling is that of characterizing and analyzing relationships among alternative models of a single system. The problem is approached by developing the concept of a state space transformation, which is a ...
Workload representations in queueing models of computer systems
There are two basic representations of workload populations in load independent, separable queueing network models. These correspond to the notions of open and closed classes, an open class being one in which customers may arrive and depart the model, ...
A decomposition solution to the queueing network model of the centralized DBMS with static locking
The effect of concurrency control methods on the performance of computer systems is analyzed in the context of a centralized database with a static lock request policy, i.e., database transactions should acquire all locks before their activation. In the ...
Diffusion approximations for storage processes in computer systems
In this paper we focus on the storage resource. A basic model of the space time requirements of jobs in a computer system is described, and a number of its variations analyzed by means of diffusion approxmiations. Subject to the usual heavy traffic ...
Transient diffusion approximation for some queuening systems.
There are many situations where information about the transient behaviour of computer systems is wanted. In this paper a diffusion approximation to the transient behaviour of some queueing systems is proposed. The solution of the forward diffusion ...
Performance analysis of checkpointing strategies
A widely used error recovery technique in database systems is the rollback and recovery technique. This technique saves periodically the state of the system and records all activities on a reliable log tape. The operation of saving the system state is ...
An operational view on renewal theory
In this paper we derive a formula for the moments of the residual life in operational context, and show that the Paradox of Residual Life holds also in a finite queueing model. In addition, we prove the renewal theorem, show that forward and backward ...
Construction of a validated simulator for performance prediction of DECnet-based computer networks
Predicting important performance parameters of computer networks, recognizing potential bottlenecks, comparing design alternatives are factors of decisive importance in building complex computer networks. In this respect, computer aided simulation has ...
The computational speed of supercomputers
Problems related to the evaluation of computational speeds of supercomputers are discussed. Measurements of sequential speeds, vector speeds, and asynchronous parallel processing speeds are presented. A simple model is developed that allows us to ...
On the measured behaviour of a X.25 packet switching subnetwork
The aim of this paper is to present some measurements on the performance of a X.25 packet switching subnetwork and of a typical X.25 DTE-DCE interface. The communication parameters considered are the window size of the link layer flow control, the ...
Queueing analysis of a canonical model of real-time multiprocessors
Multiprocessors are beginning to be regarded increasingly favorably as candidates for controllers in critical real-time control applications such as aircraft. Their considerable tolerance of component failures together with their great potential for ...
Queueing network models of multimicrocomputer networks
Recent developments in very large scale integration have made it feasible to construct a highly parallel computer composed of large numbers of interconnected microcomputers. The modeling problems posed by this approach to parallel processing differ in ...
A class of generalised stochastic petri nets for the performance evaluation of multiprocessor systems
Graph models have been proposed by many authors as a useful tool for the analysis of peculiar features of computer systems such as concurrency, synchronization, communication, and cooperation among subsystems. Much of the work in this field is related ...
A performance evaluation of the multiple bus network for multiprocessor systems
In this paper we present a mathematical model to compute the bandwidth of the multiple bus interconnection network. Due to the computational complexity associated with the exact solution, the processors are removed from the queues at the end of each ...
An approximate analysis of multiprocessor systems
This paper presents an approximate analysis of a multiprocessor system consisting of P processors, M memory modules, and B buses. The model assumes constant memory access times, arbitrary memory access patterns, and bus contention. The solution ...
A new aggregation approximation procedure for solving closed queueing networks with simultaneous resource possession
A new aggregation approximation procedure is presented for analyzing single class closed queueing networks with simultaneous resource possession. It is applicable to multiple entry systems such as I/O models and relies on a new multi-entrance queue to ...
An exact analysis of the distribution of cycle times in a class of queueing networks
Prediction of detailed characteristics of the time delays experienced by customers in queueing networks is of great importance in various modelling and performance evaluation activities: operations research, computer systems and communication networks. ...
The phantom customer and marked customer methods for optimization of closed queueing networks with blocking and general service times
This paper is based on a recent technique called perturbation analysis of discrete event systems. The aims of the paper are two-fold. The first, is to bring this technique, which is still relatively new, to the attention of a wider audience, since the ...
Characterization of an optimal delayed resolution policy
A class of policies called stationary delayed resolution policies have been proposed recently for sharing finite number of buffers at a store-and-forward node in a message switching network [9]. It has been shown that with respect to the total weighted ...
Performance models of token ring local area networks
This paper presents a simple heuristic analytic algorithm for predicting the “response times” of messages in asymmetric token ring local area networks. A description of the token ring and the model is presented in section 2 the algorithm is described in ...
Queueing delays on virtual circuits using a sliding window flow control scheme
A tandem queue model is developed that models the end-to-end delay behavior in networks that employ sliding window flow control. Messages arriving to find the window filled are assumed to be queued outside the network to await their turn to enter. The ...
Index Terms
Proceedings of the 1983 ACM SIGMETRICS conference on Measurement and modeling of computer systems
Recommendations
Acceptance Rates
| Year | Submitted | Accepted | Rate |
|---|---|---|---|
| SIGMETRICS '19 | 317 | 50 | 16% |
| SIGMETRICS '18 | 270 | 54 | 20% |
| SIGMETRICS '17 Abstracts | 76 | 27 | 36% |
| SIGMETRICS '16 | 208 | 28 | 13% |
| SIGMETRICS '15 | 239 | 32 | 13% |
| SIGMETRICS '14 | 237 | 40 | 17% |
| SIGMETRICS '13 | 196 | 54 | 28% |
| SIGMETRICS '03 | 222 | 26 | 12% |
| SIGMETRICS '02 | 170 | 23 | 14% |
| SIGMETRICS '01 | 233 | 29 | 12% |
| SIGMETRICS '00 | 165 | 28 | 17% |
| SIGMETRICS '99 | 92 | 18 | 20% |
| SIGMETRICS '98/PERFORMANCE '98 | 136 | 25 | 18% |
| SIGMETRICS '97 | 130 | 25 | 19% |
| Overall | 2,691 | 459 | 17% |



