Analytical and Stochastic Modeling Techniques and Applications [electronic resource] : 17th International Conference, ASMTA 2010, Cardiff, UK, June 14-16, 2010, Proceedings / edited by Khalid Al-Begain, Dieter Fiems, William Knottenbelt.
Contributor(s): Al-Begain, Khalid [editor.] | Fiems, Dieter [editor.] | Knottenbelt, William [editor.] | SpringerLink (Online service).
Material type: BookSeries: Programming and Software Engineering: 6148Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010.Description: XI, 409 p. 132 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642135682.Subject(s): Software engineering | Computer networks | Electronic digital computers -- Evaluation | Application software | Computer science -- Mathematics | Mathematical statistics | Algorithms | Software Engineering | Computer Communication Networks | System Performance and Evaluation | Computer and Information Systems Applications | Probability and Statistics in Computer Science | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.1 Online resources: Click here to access onlineQueueing Theory I -- A Batch-Service Queueing Model with a Discrete Batch Markovian Arrival Process -- Queueing System MAP/PH/N with Propagated Failures -- Analysis of a Discrete-Time Queueing System with an NT-Policy -- Packet Loss Minimization in Load-Balancing Switch -- Queueing Theory II -- The Preemptive Repeat Hybrid Server Interruption Model -- Networks of Symmetric Multi-class Queues with Signals Changing Classes -- Product-Form Solutions for Models with Joint-State Dependent Transition Rates -- The qnetworks Toolbox: A Software Package for Queueing Networks Analysis -- Specification Languages and Tools -- Rewriting Logic Based Performance Estimation of Embedded Systems -- A Formal Language toward the Unification of Model Checking and Performance Evaluation -- Security Evaluation of Layered Intrusion Tolerant Systems -- Stochastic PERT and CAST Logic Approach for Computer Support of Complex Operation Planning -- Telecommunication Systems I -- Perfect Sampling of Load Sharing Policies in Large Scale Distributed Systems -- Stochastic Comparisons for Performability of Telecommunication Systems -- Model-Based Stochastic Simulation of P2P VoIP Using Graph Transformation System -- Performance Evaluation of Media Segmentation Heuristics Using Non-markovian Multi-class Arrival Processes -- Telecommmunication Systems II -- A Formal Approach to Investigate the Performance of Modern E-commerce Services -- Leader Election in Anonymous Radio Networks: Model Checking Energy Consumption -- Upper Bound on Overall Delay in Wireless Broadband Networks with Non Real-Time Traffic -- Estimation -- Robustness of the Whittle Estimator Applied to Non-Gaussian Long-Range Dependent Processes -- Service Time Estimation with a Refinement Enhanced Hybrid Clustering Algorithm -- Invariant Embedding Technique and Its Applications for Improvement or Optimization of Statistical Decisions -- Prediction -- Prediction Model Selection and Spare Parts Ordering Policy for Efficient Support of Maintenance and Repair of Equipment -- Prediction-Based Dynamic Target Interception Using Discrete Markov Chains -- Neural Networks as Surrogate Models for Measurements in Optimization Algorithms -- Stochastic Modelling -- Limit Behavior of the Hybrid Approximation of Stochastic Process Algebras -- Analysis of an Automated Auction with Concurrent Multiple Unit Acceptance Capacity -- Congestive Collapse and Its Avoidance in a Dynamic Dial-a-Ride System with Time Windows.
There are no comments for this item.