Within the last year
Within the past 3 years
11 - 17 of 17 articles
An input source of the model is generated in accordance with a probability density function P r (n,t), where n and t are a spatial variable and a time variable, respectively. Thus the input arrives as a time-variable train. A queue consists of m blocks, and each block consists of a finite number...
In response to the enormous annual dollar value spent on software, major emphasis is being placed within industry, Government and academia on the establishment of a rigorous discipline for the development of software—i. e., on the establishment of software engineering. This has significance in...
Workload classification is a methodology which allows the analyst to describe the workload of a computer system with a minimum number of job classes. This technique reduces the effort required to produce models of a system. This could involve verification of actual systems or simulation of...
Analytic models potentially provide an elegant means of estimating the performance of computer systems at a rather nominal cost. The assumptions which must be made about a system in order to construct a mathematically tractable model, however, are usually severe enough to cast doubt on the...
All telecommunication systems design, development and support for the Headquarters, Department of the Army, is provided by the Automation Support Detachment. The current operational telecommunication system provides the Army with a full range of communication functions, i.e., receipt,...
Trace Driven modeling is a technique that combines measurement and simulation in order to create an accurate model of a computer system. This paper extends the review and overview of trace driven modeling presented in a previous paper 15 by Sherman and Browne. The technique of trace driven...
A simulation methodology is presented for partitioning data sets of a sensitive data processing system into multi-level security classes according to a ranking of the resulting value to the system's opponents if the security of each data set were compromised. The value of the compromised data...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.