ACM SIGMETRICS Performance Evaluation Review
Exploiting nonstationarity for performance prediction
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Comparing the performance of web server architectures
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Designing an overload control strategy for secure e-commerce applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Router buffer sizing revisited: the role of the output/input capacity ratio
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Cutting corners: workbench automation for server benchmarking
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Equilibrium analysis through separation of user and network behavior
Computer Networks: The International Journal of Computer and Telecommunications Networking
AKARA: A Flexible Clustering Protocol for Demanding Transactional Workloads
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Predicting replicated database scalability from standalone database profiling
Proceedings of the 4th ACM European conference on Computer systems
WorkOut: I/O workload outsourcing for boosting RAID reconstruction performance
FAST '09 Proccedings of the 7th conference on File and storage technologies
A systematic and practical approach to generating policies from service level objectives
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Black-box performance models for virtualized web service applications
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
Proceedings of the 5th European conference on Computer systems
Enabling a bufferless core network using edge-to-edge packet-level FEC
INFOCOM'10 Proceedings of the 29th conference on Information communications
Gadara: dynamic deadlock avoidance for multithreaded programs
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
A little language for rapidly constructing automated performance tests
Proceedings of the 2nd ACM/SPEC International Conference on Performance engineering
Ginpex: deriving performance-relevant infrastructure properties through goal-oriented experiments
Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS
Exception-less system calls for event-driven servers
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
On the impact of the flow size distribution's tail index on network performance with TCP connections
ACM SIGMETRICS Performance Evaluation Review - Special Issue on IFIP PERFORMANCE 2011- 29th International Symposium on Computer Performance, Modeling, Measurement and Evaluation
Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers
IEEE/ACM Transactions on Networking (TON)
Performance evaluation of scheduling algorithms for database services with soft and hard SLAs
Proceedings of the second international workshop on Data intensive computing in the clouds
Less is more: trading a little bandwidth for ultra-low latency in the data center
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Web workload generation challenges - an empirical investigation
Software—Practice & Experience
"Cut me some slack": latency-aware live migration for databases
Proceedings of the 15th International Conference on Extending Database Technology
A tool for the generation of realistic network workload for emerging networking scenarios
Computer Networks: The International Journal of Computer and Telecommunications Networking
Comparing high-performance multi-core web-server architectures
Proceedings of the 5th Annual International Systems and Storage Conference
On extracting session data from activity logs
Proceedings of the 5th Annual International Systems and Storage Conference
When average is not average: large response time fluctuations in n-tier systems
Proceedings of the 9th international conference on Autonomic computing
QoS and energy management with Petri nets: A self-adaptive framework
Journal of Systems and Software
SWAT: a lightweight load balancing method for multitenant databases
Proceedings of the 16th International Conference on Extending Database Technology
QACO: exploiting partial execution in web servers
Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference
Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications
Distribution-based query scheduling
Proceedings of the VLDB Endowment
Modeling variations in load intensity over time
Proceedings of the third international workshop on Large scale testing
Warranties for faster strong consistency
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
Workload generators may be classified as based on a closed system model, where new job arrivals are only triggered by job completions (followed by think time), or an open system model, where new jobs arrive independently of job completions. In general, system designers pay little attention to whether a workload generator is closed or open. Using a combination of implementation and simulation experiments, we illustrate that there is a vast difference in behavior between open and closed models in real-world settings. We synthesize these differences into eight simple guiding principles, which serve three purposes. First, the principles specify how scheduling policies are impacted by closed and open models, and explain the differences in user level performance. Second, the principles motivate the use of partly open system models, whose behavior we show to lie between that of closed and open models. Finally, the principles provide guidelines to system designers for determining which system model is most appropriate for a given workload.