Workload Modeling for Computer Systems Performance Evaluation

Reliable performance evaluations require the use of representative workloads. This is no easy task since modern computer systems and their workloads are complex, with many interrelated attributes and complicated structures. Experts often use sophisticated mathematics to analyze and describe workload models, making these models difficult for practitioners to grasp. This book aims to close this gap by emphasizing the intuition and the reasoning behind the definitions and derivations related to the workload models. It provides numerous examples from real production systems, with hundreds of graphs. Using this book, readers will be able to analyze collected workload data and clean it if necessary, derive statistical models that include skewed marginal distributions and correlations, and consider the need for generative models and feedback from the system. The descriptive statistics techniques covered are also useful for other domains.

[1]  Mark Burgess,et al.  Measuring system normality , 2002, TOCS.

[2]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[3]  S.K. Moore How to Measure a City's Metabolism , 2007, IEEE Spectrum.

[4]  Evans J. Adams Workload models for DBMS performance evaluation , 1985, CSC '85.

[5]  Message P Forum,et al.  MPI: A Message-Passing Interface Standard , 1994 .

[6]  H. Sichel On a Distribution Law for Word Frequencies , 1975 .

[7]  Keith D. Underwood,et al.  The implications of working set analysis on supercomputing memory hierarchy design , 2005, ICS '05.

[8]  Jack Dongarra,et al.  MPI: The Complete Reference , 1996 .

[9]  Jason Lee,et al.  A first look at modern enterprise traffic , 2005, IMC '05.

[10]  Amanda Spink,et al.  An analysis of Web searching by European AlltheWeb.com users , 2005, Inf. Process. Manag..

[11]  M. Kendall,et al.  The Problem of $m$ Rankings , 1939 .

[12]  Evgenia Smirni,et al.  Automated anomaly detection and performance modeling of enterprise applications , 2009, TOCS.

[13]  Evgenia Smirni,et al.  Workload Characterization of Input/Output Intensive Parallel Applications , 1997, Computer Performance Evaluation.

[14]  Mahadev Satyanarayanan,et al.  Categories and Subject Descriptors: D.4.3 [Software]: File Systems Management—Distributed , 2022 .

[15]  Robert M. Gray,et al.  On the asymptotic eigenvalue distribution of Toeplitz matrices , 1972, IEEE Trans. Inf. Theory.

[16]  Carey L. Williamson,et al.  A Longitudinal Study of P2P Traffic Classification , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[17]  M. Crovella,et al.  Estimating the Heavy Tail Index from Scaling Properties , 1999 .

[18]  Walter Willinger,et al.  Long-range dependence in variable-bit-rate video traffic , 1995, IEEE Trans. Commun..

[19]  Lizy Kurian John,et al.  Improved automatic testcase synthesis for performance model validation , 2005, ICS '05.

[20]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[21]  John W. Tukey,et al.  Exploratory Data Analysis. , 1979 .

[22]  Andrei Broder,et al.  A taxonomy of web search , 2002, SIGF.

[23]  Francesco Bonchi,et al.  Do you want to take notes?: identifying research missions in Yahoo! search pad , 2010, WWW '10.

[24]  Dan Tsafrir,et al.  Modeling User Runtime Estimates , 2005, JSSPP.

[25]  Junghoo Cho,et al.  Impact of search engines on page popularity , 2004, WWW '04.

[26]  Mor Harchol-Balter Task assignment with unknown duration , 2002, JACM.

[27]  Mor Harchol-Balter,et al.  Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness , 2004, Cluster Computing.

[28]  W. Reed,et al.  From gene families and genera to incomes and internet file sizes: why power laws are so common in nature. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[29]  James E. Pitkow,et al.  Characterizing Browsing Strategies in the World-Wide Web , 1995, Comput. Networks ISDN Syst..

[30]  Suresh Singh,et al.  PAMAS—power aware multi-access protocol with signalling for ad hoc networks , 1998, CCRV.

[31]  Anoop Gupta,et al.  Scaling parallel programs for multiprocessors: methodology and examples , 1993, Computer.

[32]  Udo R. Krieger,et al.  The estimation of heavy-tailed probability density functions and their mixtures , 2001 .

[33]  Giuseppe Serazzi,et al.  Workload characterization: a survey , 1993, Proc. IEEE.

[34]  Virgílio A. F. Almeida,et al.  A methodology for workload characterization of E-commerce sites , 1999, EC '99.

[35]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[36]  Amanda Spink,et al.  Defining a session on Web search engines , 2007, J. Assoc. Inf. Sci. Technol..

[37]  Xiaomin Zhang,et al.  Characterization & analysis of a server consolidation benchmark , 2008, VEE '08.

[38]  Sorin Solomon,et al.  Theoretical analysis and simulations of the generalized Lotka-Volterra model. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[39]  Dror G. Feitelson,et al.  On the definition of "on-line" in job scheduling problems , 2005, SIGA.

[40]  Javier García,et al.  TPC-W E-Commerce Benchmark Evaluation , 2003, Computer.

[41]  Christopher Stewart,et al.  Exploiting nonstationarity for performance prediction , 2007, EuroSys '07.

[42]  Eric A. Brewer,et al.  Self-similarity in file systems , 1998, SIGMETRICS '98/PERFORMANCE '98.

[43]  Carla Schlatter Ellis,et al.  File-Access Characteristics of Parallel Scientific Workloads , 1996, IEEE Trans. Parallel Distributed Syst..

[44]  Dave Anderson You Don’t Know Jack about Disks , 2003, ACM Queue.

[45]  Edward Tufte,et al.  Visual Explanations , 1997 .

[46]  G. D. Bergland,et al.  A guided tour of the fast Fourier transform , 1969, IEEE Spectrum.

[47]  Ellen M. Voorhees TREC: Improving information access through evaluation , 2006 .

[48]  Alan Jay Smith,et al.  Cache Memories , 1982, CSUR.

[49]  Qi Zhang,et al.  Characterization of storage workload traces from production Windows Servers , 2008, 2008 IEEE International Symposium on Workload Characterization.

[50]  J. R. Wallis,et al.  Some long‐run properties of geophysical records , 1969 .

[51]  Anoop Gupta,et al.  Complete computer system simulation: the SimOS approach , 1995, IEEE Parallel Distributed Technol. Syst. Appl..

[52]  Mark Crovella,et al.  Locality in a web of streams , 2005, CACM.

[53]  Mark S. Squillante,et al.  A general methodology for characterizing access patterns and analyzing Web server performance , 1998, Proceedings. Sixth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.98TB100247).

[54]  Mark S. Squillante,et al.  Models of Parallel Applications with Large Computation and I/O Requirements , 2002, IEEE Trans. Software Eng..

[55]  Bo Hong,et al.  Managing flash crowds on the Internet , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..

[56]  James E. Smith,et al.  A study of branch prediction strategies , 1981, ISCA '98.

[57]  John Wilkes,et al.  UNIX Disk Access Patterns , 1993, USENIX Winter.

[58]  Ben Y. Zhao,et al.  Understanding user behavior in large-scale video-on-demand systems , 2006, EuroSys.

[59]  Yale N. Patt,et al.  Using System-Level Models to Evaluate I/O Subsystem Designs , 1998, IEEE Trans. Computers.

[60]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[61]  Balachander Krishnamurthy,et al.  Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites , 2002, WWW.

[62]  Mark S. Squillante,et al.  Analysis of the Impact of Memory in Distributed Parallel Processing Systems , 1994, SIGMETRICS.

[63]  Jeffrey J. P. Tsai,et al.  A noninvasive architecture to monitor real-time distributed systems , 1990, Computer.

[64]  Dan Tsafrir Using Inaccurate Estimates Accurately , 2010, JSSPP.

[65]  Tarek F. Abdelzaher,et al.  Web Content Adaptation to Improve Server Overload Behavior , 1999, Comput. Networks.

[66]  David S. Johnson,et al.  Approximation Algorithms for Bin-Packing — An Updated Survey , 1984 .

[67]  Liang Guo,et al.  How does TCP generate pseudo-self-similarity? , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[68]  Louise Trevillyan,et al.  Representative traces for processor models with infinite cache , 1996, Proceedings. Second International Symposium on High-Performance Computer Architecture.

[69]  Michalis Faloutsos,et al.  Long-range dependence ten years of Internet traffic modeling , 2004, IEEE Internet Computing.

[70]  Mor Harchol-Balter,et al.  Analysis of SRPT scheduling: investigating unfairness , 2001, SIGMETRICS '01.

[71]  Marco Conti,et al.  Human mobility models for opportunistic networks , 2011, IEEE Communications Magazine.

[72]  Carlos Belo,et al.  Experimental validation of the ON-OFF packet-level model for IP traffic , 2007, Comput. Commun..

[73]  Gyungho Lee,et al.  The Effectiveness of Combining in Shared Memory Parallel Computer in the Presence of "Hot Spots" , 1986, ICPP.

[74]  Zary Segall,et al.  Synthetic Workload Generation for Experimentation with Multiprocessors , 1982, ICDCS.

[75]  David A. Lifka,et al.  The ANL/IBM SP Scheduling System , 1995, JSSPP.

[76]  P. E. Jackson,et al.  Estimates of distributions of random variables for certain computer communications traffic models , 1969, Symposium on Problems in the Optimization of Data Communications Systems.

[77]  Ravishankar K. Iyer,et al.  Predictability of Process Resource Usage: A Measurement-Based Study on UNIX , 1989, IEEE Trans. Software Eng..

[78]  Rajkumar Buyya,et al.  Model-Driven Simulation of Grid Scheduling Strategies , 2007, Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007).

[79]  David H. Bailey,et al.  NAS parallel benchmark results , 1992, Proceedings Supercomputing '92.

[80]  Mariacarla Calzarossa,et al.  Workload Characterization Issues and Methodologies , 2000, Performance Evaluation.

[81]  Brad Calder,et al.  Automatically characterizing large scale program behavior , 2002, ASPLOS X.

[82]  Imrich Chlamtac,et al.  The P2 algorithm for dynamic calculation of quantiles and histograms without storing observations , 1985, CACM.

[83]  Bruno Baynat,et al.  Catching IP Traffic Burstiness with a Lightweight Generator , 2007, Networking.

[84]  Daqing He,et al.  Detecting session boundaries from Web user logs , 2000 .

[85]  V. Roychowdhury,et al.  Re-inventing Willis , 2006, physics/0601192.

[86]  J. L. Nolan Stable Distributions. Models for Heavy Tailed Data , 2001 .

[87]  André Seznec,et al.  Choosing representative slices of program execution for microarchitecture simulations: a preliminary , 2000 .

[88]  Amanda Spink,et al.  From E-Sex to E-Commerce: Web Search Changes , 2002, Computer.

[89]  Dror G. Feitelson,et al.  Adaptive parallel job scheduling with flexible coscheduling , 2005, IEEE Transactions on Parallel and Distributed Systems.

[90]  Kevin Jeffay,et al.  Tracking the evolution of Web traffic: 1995-2003 , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..

[91]  Oren Etzioni,et al.  Moving Up the Information Food Chain: Deploying Softbots on the World Wide Web , 1996, AI Mag..

[92]  David A. Wood,et al.  A Comparison of Trace-Sampling Techniques for Multi-Megabyte Caches , 1994, IEEE Trans. Computers.

[93]  Brinkley Sprunt,et al.  Pentium 4 Performance-Monitoring Features , 2002, IEEE Micro.

[94]  Jacob R. Lorch,et al.  A five-year study of file-system metadata , 2007, TOS.

[95]  Daniel A. Reed,et al.  A Comparison of Logical and Physical Parallel I/o pAtterns , 1998, Int. J. High Perform. Comput. Appl..

[96]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[97]  R. Chawla,et al.  The Stealth distributed scheduler , 1991, [1991] Proceedings. 11th International Conference on Distributed Computing Systems.

[98]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[99]  Robert F. Rosin Determining a computing center environment , 1965, CACM.

[100]  Kensuke Fukuda,et al.  Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures , 2007, LSAD '07.

[101]  Petre Stoica,et al.  Spectral Analysis of Signals , 2009 .

[102]  Ravi Jain,et al.  Input/Output in Parallel and Distributed Computer Systems , 2011 .

[103]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[104]  Peter J. Denning,et al.  Working Sets Past and Present , 1980, IEEE Transactions on Software Engineering.

[105]  R. Hilgers,et al.  Parameter , 2019, Springer Reference Medizin.

[106]  Jeffrey R. Spirn,et al.  Program Behavior: Models and Measurements , 1977 .

[107]  John S. Heidemann,et al.  The effect of detail on Ethernet simulation , 2004, 18th Workshop on Parallel and Distributed Simulation, 2004. PADS 2004..

[108]  H. E. Hurst,et al.  Long-Term Storage Capacity of Reservoirs , 1951 .

[109]  G. Yule,et al.  A Mathematical Theory of Evolution, Based on the Conclusions of Dr. J. C. Willis, F.R.S. , 1925 .

[110]  Athina P. Petropulu,et al.  Long-range dependence and heavy-tail modeling for teletraffic data , 2002, IEEE Signal Process. Mag..

[111]  W. Neville Holmes,et al.  The Great Term Robbery , 2001, Computer.

[112]  Fabrizio Petrini,et al.  Performance Evaluation of the Quadrics Interconnection Network , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[113]  C. Costa,et al.  GENIUS: a generator of interactive user media sessions , 2004, IEEE International Workshop on Workload Characterization, 2004. WWC-7. 2004.

[114]  María Engracia Gómez,et al.  Analysis of self-similarity in I/O workload using structural modeling , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[115]  Jan Beran,et al.  Music - Chaos, Fractals, and Information , 2004 .

[116]  R. Stets,et al.  A detailed comparison of two transaction processing workloads , 2002, 2002 IEEE International Workshop on Workload Characterization.

[117]  Marco Baroni,et al.  37. Distributions in text , 2009 .

[118]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[119]  David Kotz,et al.  Analysis of a Campus-Wide Wireless Network , 2002, MobiCom '02.

[120]  Anoop Gupta,et al.  SPLASH: Stanford parallel applications for shared-memory , 1992, CARN.

[121]  Mostafa Ammar,et al.  Prefix-preserving IP address anonymization , 2004 .

[122]  Bart Selman,et al.  Heavy-Tailed Phenomena in Satisfiability and Constraint Satisfaction Problems , 2000, Journal of Automated Reasoning.

[123]  Jimmy Lin,et al.  Identification of user sessions with hierarchical agglomerative clustering , 2006, ASIST.

[124]  Kai Li,et al.  The PARSEC benchmark suite: Characterization and architectural implications , 2008, 2008 International Conference on Parallel Architectures and Compilation Techniques (PACT).

[125]  Ning Yang,et al.  An Architecture for Distributed Real-Time Passive Network Measurement , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[126]  Chris Anderson,et al.  The Long Tail: Why the Future of Business is Selling Less of More , 2006 .

[127]  Jerome A. Rolia,et al.  A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems , 2006, IEEE Transactions on Software Engineering.

[128]  Dror G. Feitelson,et al.  L1 Cache Filtering Through Random Selection of Memory References , 2007, 16th International Conference on Parallel Architecture and Compilation Techniques (PACT 2007).

[129]  Anil K. Jain,et al.  Data clustering: a review , 1999, CSUR.

[130]  Anja Feldmann,et al.  Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware , 2007, PAM.

[131]  Alissa Cooper,et al.  A survey of query log privacy-enhancing techniques from a policy perspective , 2008, TWEB.

[132]  Chen Ding,et al.  Analysis of input-dependent program behavior using active profiling , 2007, ExpCS '07.

[133]  James R. Larus,et al.  Cache considerations for multiprocessor programmers , 1990, CACM.

[134]  M. Y. Sanadidi,et al.  The probe gap model can underestimate the available bandwidth of multihop paths , 2006, CCRV.

[135]  Fadi N. Sibai Performance analysis and workload characterization of the 3DMark05 benchmark on modern parallel computer platforms , 2007, CARN.

[136]  Jason Lee,et al.  The devil and packet trace anonymization , 2006, CCRV.

[137]  Robert E. Tarjan,et al.  A Locally Adaptive Data , 1986 .

[138]  Darryl Veitch,et al.  Capturing the Elusive Poissonity in Web Traffic , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[139]  M. A. Beg Estimation of the Tail Probability of the Truncated Pareto Distribution , 1981 .

[140]  Kimmo E. E. Raatikainen,et al.  Cluster analysis and workload classification , 1993, PERV.

[141]  Michael L. Best,et al.  CMMD I/O: a parallel Unix I/O , 1993, [1993] Proceedings Seventh International Parallel Processing Symposium.

[142]  Santosh G. Abraham,et al.  Set-associative cache simulation using generalized binomial trees , 1995, TOCS.

[143]  Lieven Eeckhout,et al.  Quantifying behavioral differences between multimedia and general-purpose workloads , 2003, J. Syst. Archit..

[144]  Benjamin Piwowarski,et al.  Predictive user click models based on click-through history , 2007, CIKM '07.

[145]  Ravi Kumar,et al.  "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.

[146]  J. Duane Northcutt,et al.  The interactive performance of SLIM: a stateless, thin-client architecture , 1999, SOSP.

[147]  Dan Tsafrir,et al.  Backfilling Using System-Generated Predictions Rather than User Runtime Estimates , 2007, IEEE Transactions on Parallel and Distributed Systems.

[148]  Eytan Adar,et al.  User 4XXXXX9: Anonymizing Query Logs , 2007 .

[149]  Giuseppe Serazzi,et al.  End-to-End Performance of Web Services , 2002, Performance.

[150]  James Miller,et al.  Empirical observations on the session timeout threshold , 2009, Inf. Process. Manag..

[151]  Larry Rudolph,et al.  Metrics and Benchmarking for Parallel Job Scheduling , 1998, JSSPP.

[152]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[153]  Jeffrey S. Vetter,et al.  Communication characteristics of large-scale scientific applications for contemporary cluster architectures , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[154]  Susan J. Eggers,et al.  An analysis of database workload performance on simultaneous multithreaded processors , 1998, ISCA.

[155]  Alan Jay Smith,et al.  The automatic improvement of locality in storage systems , 2005, TOCS.

[156]  Uri C. Weiser,et al.  MMX technology extension to the Intel architecture , 1996, IEEE Micro.

[157]  Mor Harchol-Balter,et al.  Analysis of scheduling policies under correlated job sizes , 2010, Perform. Evaluation.

[158]  Larry Rudolph,et al.  Accelerating multi-media processing by implementing memoing in multiplication and division units , 1998, ASPLOS VIII.

[159]  David M Erceg-Hurn,et al.  Modern robust statistical methods: an easy way to maximize the accuracy and power of your research. , 2008, The American psychologist.

[160]  Yong Yan,et al.  Cacheminer: A Runtime Approach to Exploit Cache Locality on SMP , 2000, IEEE Trans. Parallel Distributed Syst..

[161]  Lieven Eeckhout,et al.  Selecting representative benchmark inputs for exploring microprocessor design spaces , 2013, ACM Trans. Archit. Code Optim..

[162]  Alexandra Fedorova,et al.  Addressing shared resource contention in multicore processors via scheduling , 2010, ASPLOS 2010.

[163]  Dror G. Feitelson,et al.  Trading off quality for throughput using content adaptation in web servers , 2011, SYSTOR '11.

[164]  Amin Vahdat,et al.  Swing: realistic and responsive network traffic generation , 2009, TNET.

[165]  Paul Barford,et al.  Generating representative Web workloads for network and server performance evaluation , 1998, SIGMETRICS '98/PERFORMANCE '98.

[166]  Deborah Estrin,et al.  An Empirical Workload Model for Driving Wide-Area TCP/IP Network Simulations , 2001 .

[167]  Scott Barber Creating effective load models for performance testing with incomplete empirical data , 2004, Proceedings. Sixth IEEE International Workshop on Web Site Evolution.

[168]  J. Hosking Modeling persistence in hydrological time series using fractional differencing , 1984 .

[169]  Said Elnaffar,et al.  Is it DSS or OLTP: automatically identifying DBMS workloads , 2008, Journal of Intelligent Information Systems.

[170]  Amund Kvalbein,et al.  An empirical comparison of generators for self similar simulated traffic , 2007, Perform. Evaluation.

[171]  Murad S. Taqqu,et al.  On estimating the intensity of long-range dependence in finite and infinite variance time series , 1998 .

[172]  Abdur Chowdhury,et al.  A picture of search , 2006, InfoScale '06.

[173]  Lizy Kurian John,et al.  Bottlenecks in Multimedia Processing with SIMD Style Extensions and Architectural Enhancements , 2003, IEEE Trans. Computers.

[174]  Joonwon Lee,et al.  Workload Characterization and Performance Implications of Large-Scale Blog Servers , 2012, TWEB.

[175]  Jonathan A. Tawn,et al.  Extreme values in the dock. , 2004 .

[176]  Kensuke Fukuda,et al.  Seven Years and One Day: Sketching the Evolution of Internet Traffic , 2009, IEEE INFOCOM 2009.

[177]  Walter Willinger,et al.  Proof of a fundamental result in self-similar traffic modeling , 1997, CCRV.

[178]  Jon Howell,et al.  Handling Flash Crowds from Your Garage , 2008, USENIX Annual Technical Conference.

[179]  Dror G. Feitelson,et al.  Using Site-Level Modeling to Evaluate the Performance of Parallel System Schedulers , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[180]  N. L. Johnson,et al.  Systems of frequency curves generated by methods of translation. , 1949, Biometrika.

[181]  C. Spearman The proof and measurement of association between two things. By C. Spearman, 1904. , 1987, The American journal of psychology.

[182]  Stijn Eyerman,et al.  Probabilistic job symbiosis modeling for SMT processor scheduling , 2010, ASPLOS XV.

[183]  Dror G. Feitelson,et al.  Metric and workload effects on computer systems evaluation , 2003, Computer.

[184]  Zhen Liu,et al.  Traffic model and performance evaluation of Web servers , 2001, Perform. Evaluation.

[185]  D. W. Scott On optimal and data based histograms , 1979 .

[186]  G. Miller,et al.  Some effects of intermittent silence. , 1957, The American journal of psychology.

[187]  Michael A. Stephens,et al.  Tests Based on EDF Statistics , 2017 .

[188]  Alma Riska,et al.  An EM-based technique for approximating long-tailed data sets with PH distributions , 2004, Perform. Evaluation.

[189]  H. Peter Hofstee,et al.  Understanding system design for Big Data workloads , 2013, IBM J. Res. Dev..

[190]  Kang G. Shin,et al.  SWSL: A Synthetic Workload Specification Language for Real-Time Systems , 1994, IEEE Trans. Software Eng..

[191]  M. Taqqu,et al.  Stable Non-Gaussian Random Processes : Stochastic Models with Infinite Variance , 1995 .

[192]  Alan Jay Smith Workloads (creation and use) , 2007, CACM.

[193]  Geoffrey N. Lambert A Comparative Study of System Response Time on Program Developer Productivity , 1984, IBM Syst. J..

[194]  Lada A. Adamic,et al.  Internet: Growth dynamics of the World-Wide Web , 1999, Nature.

[195]  Nikolai Joukov,et al.  A nine year study of file system and storage benchmarking , 2008, TOS.

[196]  Lieven Eeckhout,et al.  Measuring benchmark similarity using inherent program characteristics , 2006, IEEE Transactions on Computers.

[197]  Arnold O. Allen Probability, Statistics, and Queueing Theory , 1978 .

[198]  David R. Kaeli,et al.  Tracing and Characterization of Windows NT-based System Workloads , 1998, Digit. Tech. J..

[199]  Lada A. Adamic Zipf, Power-laws, and Pareto-a ranking tutorial , 2000 .

[200]  Larry Rudolph,et al.  Distributed hierarchical control for parallel processing , 1990, Computer.

[201]  Peter J. Denning,et al.  The working set model for program behavior , 1968, CACM.

[202]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[203]  Reagan Moore,et al.  A Batch Scheduler for the Intel Paragon MPP System with a Non-contiguous Node Allocation Algorithm , 1996, JSSPP.

[204]  Dror G. Feitelson,et al.  Job Characteristics of a Production Parallel Scientivic Workload on the NASA Ames iPSC/860 , 1995, JSSPP.

[205]  Fabio Ricciato,et al.  Revisiting an old friend: on the observability of the relation between long range dependence and heavy tail , 2010, Telecommun. Syst..

[206]  Pete Wyckoff,et al.  Hive - A Warehousing Solution Over a Map-Reduce Framework , 2009, Proc. VLDB Endow..

[207]  Leo Egghe,et al.  The power of power laws and an interpretation of Lotkaian informetric systems as self-similar fractals: Research Articles , 2005 .

[208]  Allen B. Downey,et al.  The structural cause of file size distributions , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[209]  Amanda Spink,et al.  Sexual and pornographic Web searching: Trends analysis , 2006, First Monday.

[210]  Matthew K. Farrens,et al.  Branch transition rate: a new metric for improved branch classification analysis , 2000, Proceedings Sixth International Symposium on High-Performance Computer Architecture. HPCA-6 (Cat. No.PR00550).

[211]  Herbert A. Simon,et al.  Some Further Notes on a Class of Skew Distribution Functions , 1960, Inf. Control..

[212]  Helmut Hlavacs,et al.  Modeling user behavior: a layered approach , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[213]  Mary K. Vernon,et al.  Dynamic vs. Static Quantum-Based Parallel Processor Allocation , 1996, JSSPP.

[214]  Bruce G. Lindsay,et al.  Approximate medians and other quantiles in one pass and with limited memory , 1998, SIGMOD '98.

[215]  Alan M. Frieze,et al.  A general model of web graphs , 2003, Random Struct. Algorithms.

[216]  Ramin Sadre,et al.  Fitting World Wide Web request traces with the EM-algorithim , 2001, SPIE ITCom.

[217]  Sanjay Ghemawat,et al.  MapReduce: a flexible data processing tool , 2010, CACM.

[218]  Alexandru Iosup,et al.  The Grid Workloads Archive , 2008, Future Gener. Comput. Syst..

[219]  Amanda Spink,et al.  Automated gathering of Web information: An in-depth examination of agents interacting with search engines , 2006, TOIT.

[220]  Patrice Abry,et al.  Does fractal scaling at the IP level depend on TCP flow arrival processes? , 2002, IMW '02.

[221]  Jason Liu,et al.  Experimental evaluation of wireless simulation assumptions , 2004, MSWiM '04.

[222]  Reinhold Weicker,et al.  An overview of common benchmarks , 1990, Computer.

[223]  Anja Feldmann,et al.  NAT Usage in Residential Broadband Networks , 2011, PAM.

[224]  Alma Riska,et al.  M/G/1-Type Markov Processes: A Tutorial , 2002, Performance.

[225]  Cynthia Bailey Lee,et al.  Are User Runtime Estimates Inherently Inaccurate? , 2004, JSSPP.

[226]  Perline Zipf's law, the central limit theorem, and the random division of the unit interval. , 1996, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[227]  Richard B. Bunt,et al.  Hierarchical Workload Characterization for a Busy Web Server , 2002, Computer Performance Evaluation / TOOLS.

[228]  Ian Spence,et al.  Using color to code quantity in spatial displays. , 1999 .

[229]  Marco Mellia,et al.  Measuring IP and TCP behavior on edge nodes with Tstat , 2005, Comput. Networks.

[230]  Martin F. Arlitt,et al.  Characterizing Web user sessions , 2000, PERV.

[231]  Adam Wierman,et al.  Open Versus Closed: A Cautionary Tale , 2006, NSDI.

[232]  Murad S. Taqqu,et al.  Semi-parametric estimation of the long-range dependence parameter : A survey , 2003 .

[233]  Mark S. Squillante,et al.  Analysis of Job Arrival Patterns and Parallel Scheduling Performance , 1999, Perform. Evaluation.

[234]  Andrea Everard,et al.  Does spell-checking software need a warning label? , 2005, CACM.

[235]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[236]  G. L. Tietjen,et al.  The Analysis and Detection of Outliers , 2017 .

[237]  D. Patterson,et al.  Performance characterization of a quad Pentium Pro SMP using OLTP workloads , 1998, Proceedings. 25th Annual International Symposium on Computer Architecture (Cat. No.98CB36235).

[238]  Huimin Zhao,et al.  Semantic matching across heterogeneous data sources , 2007, Commun. ACM.

[239]  Anand Sivasubramaniam,et al.  Synthesizing Representative I/O Workloads for TPC-H , 2004, 10th International Symposium on High Performance Computer Architecture (HPCA'04).

[240]  D. Citron MisSPECulation: partial and misleading use of spec CPU2000 in computer architecture conferences , 2003, 30th Annual International Symposium on Computer Architecture, 2003. Proceedings..

[241]  Shahid H. Bokhari,et al.  On the Mapping Problem , 1981, IEEE Transactions on Computers.

[242]  Anja Feldmann,et al.  Leveraging Zipf's law for traffic offloading , 2012, CCRV.

[243]  P. A. Blight The Analysis of Time Series: An Introduction , 1991 .

[244]  B. Mandelbrot How Long Is the Coast of Britain? Statistical Self-Similarity and Fractional Dimension , 1967, Science.

[245]  Michalis Faloutsos,et al.  A user-friendly self-similarity analysis tool , 2003, CCRV.

[246]  R. Ramaswamy,et al.  High-Speed Prefix-Preserving IP Address Anonymization for Passive Measurement Systems , 2007, IEEE/ACM Transactions on Networking.

[247]  Minaxi Gupta,et al.  Revisiting Web Server Workload Invariants in the Context of Scientific Web Sites , 2006, ACM/IEEE SC 2006 Conference (SC'06).

[248]  Dror G. Feitelson,et al.  On Identifying User Session Boundaries in Parallel Workload Logs , 2012, JSSPP.

[249]  Randy H. Katz,et al.  Heterogeneity and dynamicity of clouds at scale: Google trace analysis , 2012, SoCC '12.

[250]  Anja Feldmann,et al.  Pitfalls in HTTP Traffic Measurements and Analysis , 2012, PAM.

[251]  Michael D. Smith,et al.  The measured performance of personal computer operating systems , 1996, TOCS.

[252]  David Geer Federated Approach Expands Database-Access Technology , 2003, Computer.

[253]  Lieven Eeckhout,et al.  Evaluating iterative optimization across 1000 datasets , 2010, PLDI '10.

[254]  Michele C. Weigle,et al.  Tmix: a tool for generating realistic TCP application workloads in ns-2 , 2006, CCRV.

[255]  Alma Riska,et al.  Disk Drive Level Workload Characterization , 2006, USENIX Annual Technical Conference, General Track.

[256]  Vwani P. Roychowdhury,et al.  A mathematical theory of citing , 2005, J. Assoc. Inf. Sci. Technol..

[257]  Francisco Vilar Brasileiro,et al.  A User-Based Model of Grid Computing Workloads , 2012, 2012 ACM/IEEE 13th International Conference on Grid Computing.

[258]  Ellen M. Voorhees,et al.  TREC: Continuing information retrieval's tradition of experimentation , 2007, CACM.

[259]  Edward G. Coffman,et al.  Bin packing with divisible item sizes , 1987, J. Complex..

[260]  Leslie G. Valiant,et al.  A bridging model for parallel computation , 1990, CACM.

[261]  Mark Levene,et al.  A stochastic model for the evolution of the Web allowing link deletion , 2006, TOIT.

[262]  Akshat Verma,et al.  Generalized ERSS tree model: Revisiting working sets , 2010, Perform. Evaluation.

[263]  Dominique Thiébaut,et al.  On the Fractal Dimension of Computer Programs and its Application to the Prediction of the Cache Miss Ratio , 1989, IEEE Trans. Computers.

[264]  Domenico Ferrari A generative model of working set dynamics , 1981, SIGMETRICS '81.

[265]  Bernard J. Jansen Limits of the Web Log Analysis Artifacts , 2006 .

[266]  Jens Mache,et al.  Job scheduling for prime time vs. non-prime time , 2002, Proceedings. IEEE International Conference on Cluster Computing.

[267]  John A. Kunze,et al.  A trace-driven analysis of the UNIX 4.2 BSD file system , 1985, SOSP '85.

[268]  Gabriele Kotsis A systematic approach for workload modeling for parallel processing systems , 1997 .

[269]  Kevin Jeffay,et al.  Modeling and generating TCP application workloads , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).

[270]  Alexandra Fedorova,et al.  Managing Contention for Shared Resources on Multicore Processors , 2010 .

[271]  Dror G. Feitelson,et al.  Memory Usage in the LANL CM-5 Workload , 1997, JSSPP.

[272]  Pablo Rodriguez,et al.  I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.

[273]  Eelco Herder,et al.  Data Cleaning Methods for Client and Proxy Logs , 2006 .

[274]  Lada A. Adamic,et al.  Tracking information epidemics in blogspace , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[275]  Brinkley Sprunt,et al.  The Basics of Performance-Monitoring Hardware , 2002, IEEE Micro.

[276]  B. Briscoe,et al.  Metcalfe's law is wrong - communications networks increase in value as they add members-but by how much? , 2006, IEEE Spectrum.

[277]  Philip S. Yu,et al.  Scheduling parallelizable tasks to minimize average response time , 1994, SPAA '94.

[278]  D. Darling,et al.  A Test of Goodness of Fit , 1954 .

[279]  Paul S. Cheng Trace-Driven System Modeling , 1969, IBM Syst. J..

[280]  R. Nowak,et al.  Toward a Model for Source Addresses of Internet Background Radiation , 2006 .

[281]  W. Stahel,et al.  Log-normal Distributions across the Sciences: Keys and Clues , 2001 .

[282]  Philip L. Rosenfeld,et al.  Fractal Nature of Software-Cache Interaction , 1983, IBM J. Res. Dev..

[283]  D. E. Kline,et al.  Machine Vision Technology for the Forest Products Industry , 1997, Computer.

[284]  G. Schwarz Estimating the Dimension of a Model , 1978 .

[285]  Mary K. Vernon,et al.  Performance Analysis of Mesh Interconnection Networks with Deterministic Routing , 1994, IEEE Trans. Parallel Distributed Syst..

[286]  Dror G. Feitelson,et al.  On Simulation and Design of Parallel-Systems Schedulers: Are We Doing the Right Thing? , 2009, IEEE Transactions on Parallel and Distributed Systems.

[287]  M. Taqqu,et al.  Large-Sample Properties of Parameter Estimates for Strongly Dependent Stationary Gaussian Time Series , 1986 .

[288]  Richard Wolski,et al.  Predicting bounds on queuing delay for batch-scheduled parallel machines , 2006, PPoPP '06.

[289]  Barton P. Miller,et al.  Dynamic program instrumentation for scalable performance tools , 1994, Proceedings of IEEE Scalable High Performance Computing Conference.

[290]  Andrea Bianco,et al.  Web user session characterization via clustering techniques , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[291]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[292]  Ophir Frieder,et al.  Hourly analysis of a very large topically categorized web query log , 2004, SIGIR '04.

[293]  David Kotz,et al.  File-system workload on a scientific multiprocessor , 1995, IEEE Parallel Distributed Technol. Syst. Appl..

[294]  Bo Li,et al.  An Empirical Study of Flash Crowd Dynamics in a P2P-Based Live Video Streaming System , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[295]  Reka Albert,et al.  Mean-field theory for scale-free random networks , 1999 .

[296]  Timothy Sherwood,et al.  Whiteboards that compute: A workload analysis , 2008, 2008 IEEE International Symposium on Workload Characterization.

[297]  Azer Bestavros,et al.  Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.

[298]  G. Ackerman Modeling Terrorists , 2006, IEEE Spectrum.

[299]  Derek de Solla Price,et al.  A general theory of bibliometric and other cumulative advantage processes , 1976, J. Am. Soc. Inf. Sci..

[300]  Mendel Rosenblum,et al.  The design and implementation of a log-structured file system , 1991, SOSP '91.

[301]  Jun Li,et al.  MASH: the multicasting Archie server hierarchy , 1997, CCRV.

[302]  Lalit M. Patnaik,et al.  Genetic algorithms: a survey , 1994, Computer.

[303]  Miodrag Potkonjak,et al.  MediaBench: a tool for evaluating and synthesizing multimedia and communications systems , 1997, Proceedings of 30th Annual International Symposium on Microarchitecture.

[304]  Domenico Ferrari,et al.  On the foundations of artificial workload design , 1983, SIGMETRICS '84.

[305]  Dror G. Feitelson,et al.  The workload on parallel supercomputers: modeling the characteristics of rigid jobs , 2003, J. Parallel Distributed Comput..

[306]  James R. Larus,et al.  The Singularity system , 2010, Commun. ACM.

[307]  Eric A. Brewer,et al.  System Design Issues for Internet Middleware Services: Deductions from a Large Client Trace , 1997, USENIX Symposium on Internet Technologies and Systems.

[308]  Amanda Spink,et al.  Real life, real users, and real needs: a study and analysis of user queries on the web , 2000, Inf. Process. Manag..

[309]  Kimberly C. Claffy,et al.  Their Share: Diversity and Disparity in IP Traffic , 2004, PAM.

[310]  Tulika Mitra,et al.  Dynamic 3D graphics workload characterization and the architectural implications , 1999, MICRO-32. Proceedings of the 32nd Annual ACM/IEEE International Symposium on Microarchitecture.

[311]  Dror G. Feitelson,et al.  Empirical quantification of opportunities for content adaptation in web servers , 2010, SYSTOR '10.

[312]  Jin Cao,et al.  On the nonstationarity of Internet traffic , 2001, SIGMETRICS '01.

[313]  Lieven Eeckhout,et al.  Designing Computer Architecture Research Workloads , 2003, Computer.

[314]  Lada A. Adamic,et al.  Zipf's law and the Internet , 2002, Glottometrics.

[315]  David J. Lilja,et al.  Simulation of computer architectures: simulators, benchmarks, methodologies, and recommendations , 2006, IEEE Transactions on Computers.

[316]  Thomas Dean,et al.  A Retrospective of the AAAI Robot Competitions , 1997, AI Mag..

[317]  Peter J. Denning The locality principle , 2005, Commun. ACM.

[318]  Mor Harchol-Balter,et al.  On Choosing a Task Assignment Policy for a Distributed Server System , 1998, J. Parallel Distributed Comput..

[319]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[320]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[321]  D. Sornette,et al.  Extreme Deviations and Applications , 1997, cond-mat/9705132.

[322]  Brian N. Bershad,et al.  Why we search: visualizing and predicting user behavior , 2007, WWW '07.

[323]  Gustavo de Veciana,et al.  Bandwidth sharing: the role of user impatience , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[324]  Maria Ebling,et al.  SynRGen: an extensible file reference generator , 1994, SIGMETRICS.

[325]  Allen B. Downey,et al.  A parallel workload model and its implications for processor allocation , 1996, Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183).

[326]  Svetlozar T. Rachev,et al.  Stable Paretian modeling in finance: some empirical and theoretical aspects , 1998 .

[327]  Dan Tsafrir,et al.  Workload sanitation for performance evaluation , 2006, 2006 IEEE International Symposium on Performance Analysis of Systems and Software.

[328]  Ren Asmussen,et al.  Fitting Phase-type Distributions via the EM Algorithm , 1996 .

[329]  Paul Barford,et al.  Impression Fraud in On-line Advertising via Pay-Per-View Networks , 2013, USENIX Security Symposium.

[330]  Dirk Grunwald,et al.  Legal issues surrounding monitoring during network research , 2007, IMC '07.

[331]  Ramin Yahyapour,et al.  Scaling of Workload Traces , 2003, JSSPP.

[332]  Virgílio A. F. Almeida,et al.  Characterizing reference locality in the WWW , 1996, Fourth International Conference on Parallel and Distributed Information Systems.

[333]  Dror G. Feitelson,et al.  Utilization and Predictability in Scheduling the IBM SP2 with Backfilling , 1998, Proceedings of the First Merged International Parallel Processing Symposium and Symposium on Parallel and Distributed Processing.

[334]  Ke Wang,et al.  Behavior-based modeling and its application to Email analysis , 2006, TOIT.

[335]  Lester Lipsky,et al.  The Importance of Power-Tail Distributions for Modeling Queueing Systems , 1999, Oper. Res..

[336]  Lester Lipsky,et al.  Long-lasting transient conditions in simulations with heavy-tailed workloads , 1997, WSC '97.

[337]  Richard Wolski,et al.  Dynamically forecasting network performance using the Network Weather Service , 1998, Cluster Computing.

[338]  K. Magleby,et al.  Sampling, log binning, fitting, and plotting durations of open and shut intervals from single channels and the effects of noise , 1987, Pflügers Archiv - European Journal of Physiology.

[339]  Dror G. Feitelson,et al.  A case for conservative workload modeling: Parallel job scheduling with daily cycles of activity , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.

[340]  James C. Browne,et al.  Trace-driven modeling and analysis of CPU scheduling in a multiprogramming system , 1972, Commun. ACM.

[341]  Lieven Eeckhout,et al.  Microarchitecture-Independent Workload Characterization , 2007, IEEE Micro.

[342]  L. Richardson Variation of the Frequency of Fatal Quarrels with Magnitude , 1948 .

[343]  Benoit B. Mandelbrot,et al.  A Note On a Class of Skew Distribution Functions: Analysis and Critique of a Paper by H. A. Simon , 1959, Inf. Control..

[344]  Katerina Goseva-Popstojanova,et al.  Empirical Characterization of Session–Based Workload and Reliability for Web Servers , 2006, Empirical Software Engineering.

[345]  Song Jiang,et al.  Workload analysis of a large-scale key-value store , 2012, SIGMETRICS '12.

[346]  Pierre-Jacques Courtois,et al.  A decomposable model of program paging behaviour , 2004, Acta Informatica.

[347]  Dror G. Feitelson,et al.  Packing Schemes for Gang Scheduling , 1996, JSSPP.

[348]  Dror G. Feitelson Metrics for Mass-Count Disparity , 2006, 14th IEEE International Symposium on Modeling, Analysis, and Simulation.

[349]  Thu D. Nguyen,et al.  Parallel Application Characteristics for Multiprocessor Scheduling Policy Design , 1996, JSSPP.

[350]  Brian N. Bershad,et al.  Execution characteristics of desktop applications on Windows NT , 1998, ISCA.

[351]  M. Schulz,et al.  Identifying and Exploiting Spatial Regularity in Data Memory References , 2003, ACM/IEEE SC 2003 Conference (SC'03).

[352]  W. Vogels File system usage in Windows NT 4.0 , 2000, OPSR.

[353]  Gurindar S. Sohi,et al.  The Use of Feedback in Multiprocessors and Its Application to Tree Saturation Control , 1990, IEEE Trans. Parallel Distributed Syst..

[354]  Dror G. Feitelson,et al.  Distinguishing humans from robots in web search logs: preliminary results using query rates and intervals , 2009, WSCD '09.

[355]  B. Mandelbrot,et al.  Fractional Brownian Motions, Fractional Noises and Applications , 1968 .

[356]  F. J. Anscombe,et al.  Graphs in Statistical Analysis , 1973 .

[357]  William J. Knottenbelt,et al.  Database system performance evaluation models: A survey , 2012, Perform. Evaluation.

[358]  Luiz André Barroso,et al.  Memory system characterization of commercial workloads , 1998, ISCA.

[359]  Yiming Yang,et al.  The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .

[360]  Lada A. Adamic,et al.  Evolutionary Dynamics of the World Wide Web , 1999 .

[361]  Luigi M. Ricciardi,et al.  A Trace-Driven Simulator for Performance Evaluation of Cache-Based Multiprocessor Systems , 1995, IEEE Trans. Parallel Distributed Syst..

[362]  Allen B. Downey,et al.  Lognormal and Pareto distributions in the Internet , 2005, Comput. Commun..

[363]  Lada A. Adamic,et al.  The Web's hidden order , 2001, CACM.

[364]  Carla Schlatter Ellis,et al.  Practical prefetching techniques for parallel file systems , 1991, [1991] Proceedings of the First International Conference on Parallel and Distributed Information Systems.

[365]  Gennady Samorodnitsky,et al.  Variable heavy tailed durations in internet traffic , 2002 .

[366]  Saleem N. Bhatti,et al.  Modelling user behaviour in networked games , 2001, MULTIMEDIA '01.

[367]  K. Grimsrud,et al.  Locality as a Visualization Tool , 1996, IEEE Trans. Computers.

[368]  María Engracia Gómez,et al.  A new approach in the analysis and modeling of disk access patterns , 2000, 2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422).

[369]  Yutao Zhong,et al.  Predicting whole-program locality through reuse distance analysis , 2003, PLDI.

[370]  D. Sornette,et al.  Stretched exponential distributions in nature and economy: “fat tails” with characteristic scales , 1998, cond-mat/9801293.

[371]  Tai-Yi Huang,et al.  SCALLOP: a scalable and load-balanced peer-to-peer lookup protocol , 2004, IEEE Transactions on Parallel and Distributed Systems.

[372]  Dror G. Feitelson A Critique of ESP , 2000, JSSPP.

[373]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[374]  G. McLachlan,et al.  The EM algorithm and extensions , 1996 .

[375]  Anja Feldmann,et al.  On dominant characteristics of residential broadband internet traffic , 2009, IMC '09.

[376]  Min Zhou,et al.  Analysis of personal computer workloads , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[377]  Anja Feldmann,et al.  On TCP and self-similar traffic , 2005, Perform. Evaluation.

[378]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .

[379]  Anees Shaikh,et al.  Load-sensitive routing of long-lived IP flows , 1999, SIGCOMM '99.

[380]  Joel L. Wolf,et al.  Synthetic Traces for Trace-Driven Simulation of Cache Memories , 1992, IEEE Trans. Computers.

[381]  Béla Bollobás,et al.  The degree sequence of a scale‐free random graph process , 2001, Random Struct. Algorithms.

[382]  Isaac D. Scherson,et al.  Improving Parallel Job Scheduling Using Runtime Measurements , 2000, JSSPP.

[383]  Alan Jay Smith,et al.  Characteristics of production database workloads and the TPC benchmarks , 2001, IBM Syst. J..

[384]  Oualid Jouini,et al.  Call centers with hyperexponential patience modeling , 2013 .

[385]  David J. Lilja,et al.  Measuring computer performance : A practitioner's guide , 2000 .

[386]  Günter Haring,et al.  A hierarchical approach to workload characterization for parallel systems , 1995, HPCN Europe.

[387]  J. Geweke,et al.  THE ESTIMATION AND APPLICATION OF LONG MEMORY TIME SERIES MODELS , 1983 .

[388]  Niv Ahituv,et al.  SPEC as a Performance Evaluation Measure , 1995, Computer.

[389]  Jun Yang,et al.  Frequent Value Locality and Value-Centric Data Cache Design , 2000, ASPLOS.

[390]  Paul Messina,et al.  A quantitative study of parallel scientific applications with explicit communication , 2004, The Journal of Supercomputing.

[391]  John P. Nolan Univariate stable distributions: parameterizations and software , 1998 .

[392]  M. Degroot,et al.  Probability and Statistics , 2021, Examining an Operational Approach to Teaching Probability.

[393]  Joseph L. Hellerstein,et al.  Obfuscatory obscanturism: Making workload traces of commercially-sensitive systems safe to release , 2012, 2012 IEEE Network Operations and Management Symposium.

[394]  Geoffrey M. Voelker,et al.  Characterization of a Large Web Site Population with Implications for Content Delivery , 2004, WWW '04.

[395]  Michael Mitzenmacher,et al.  A Brief History of Generative Models for Power Law and Lognormal Distributions , 2004, Internet Math..

[396]  Martin J. Fischer,et al.  Difficulties in simulating queues with Pareto service , 2002, Proceedings of the Winter Simulation Conference.

[397]  Dror G. Feitelson,et al.  Uncovering the Effect of System Performance on User Behavior from Traces of Parallel Systems , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[398]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[399]  Giuseppe Serazzi,et al.  Construction and Use of Multiclass Workload Models , 1994, Perform. Evaluation.

[400]  Alistair Moffat,et al.  Some Observations on User Search Behaviour , 2006, Aust. J. Intell. Inf. Process. Syst..

[401]  Mariacarla Calzarossa,et al.  Models of mail server workloads , 2001, Perform. Evaluation.

[402]  Adi Raveh,et al.  Comparing Logs and Models of Parallel Workloads Using the Co-plot Method , 1999, JSSPP.

[403]  J. Sikora Disk failures in the real world : What does an MTTF of 1 , 000 , 000 hours mean to you ? , 2007 .

[404]  M. O. Lorenz,et al.  Methods of Measuring the Concentration of Wealth , 1905, Publications of the American Statistical Association.

[405]  Bob Boothe,et al.  Performance on a bandwidth constrained network: How much bandwidth do we need? , 1993, Supercomputing '93. Proceedings.

[406]  Wentian Li,et al.  Zipf's Law everywhere , 2002, Glottometrics.

[407]  Monica S. Lam,et al.  The cache performance and optimizations of blocked algorithms , 1991, ASPLOS IV.

[408]  Raj Jain Characteristics of Destination Address Locality in Computer Networks: A Comparison of Caching Schemes , 1989, Comput. Networks ISDN Syst..

[409]  G. Yule,et al.  A Mathematical Theory of Evolution Based on the Conclusions of Dr. J. C. Willis, F.R.S. , 1925 .

[410]  Ted G. Lewis Where Is Client/Server Software Headed? , 1995, Computer.

[411]  Mary K. Vernon,et al.  Characteristics of a Large Shared Memory Production Workload , 2001, JSSPP.

[412]  Alexander Gluhak,et al.  A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.

[413]  Alan Jay Smith,et al.  Design and characterization of the Berkeley multimedia workload , 2002, Multimedia Systems.

[414]  Eric Anderson,et al.  Capture, Conversion, and Analysis of an Intense NFS Workload , 2009, FAST.

[415]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[416]  Kenneth C. Sevcik,et al.  An interconnection network that exploits locality of communication , 1988, [1988] Proceedings. The 8th International Conference on Distributed.

[417]  Carsten Griwodz,et al.  Workload Characterization for News-on-Demand Streaming Services , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[418]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[419]  Archana Ganapathi,et al.  Statistics-driven workload modeling for the Cloud , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).

[420]  Barry L. Nelson,et al.  Automatic modeling of file system workloads using two-level arrival processes , 1998, TOMC.

[421]  E. Asensio,et al.  Analyzing the Network Traffic Requirements of Multiplayer Online Games , 2008, 2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences.

[422]  Miklós Telek,et al.  Markovian Modeling of Real Data Traffic: Heuristic Phase Type and MAP Fitting of Heavy Tailed and Fractal Like Samples , 2002, Performance.

[423]  Richard G. Baraniuk,et al.  Connection-level analysis and modeling of network traffic , 2001, IMW '01.

[424]  Chandler Stolp,et al.  The Visual Display of Quantitative Information , 1983 .

[425]  Mark Crovella Performance Evaluation with Heavy Tailed Distributions , 2000, Computer Performance Evaluation / TOOLS.

[426]  Eric A. Brewer,et al.  Lessons from Giant-Scale Services , 2001, IEEE Internet Comput..

[427]  Gwilym M. Jenkins,et al.  Time series analysis, forecasting and control , 1971 .

[428]  Phillip Krueger,et al.  ob Scheduling is More Important than Processor Allocation for Hypercube Computers , 1994, IEEE Trans. Parallel Distributed Syst..

[429]  Alan P. Batson,et al.  Characteristics of program localities , 1976, CACM.

[430]  Peter J. Denning,et al.  Properties of the working-set model , 1972, CACM.

[431]  Patrice Abry,et al.  Wavelet Analysis of Long-Range-Dependent Traffic , 1998, IEEE Trans. Inf. Theory.

[432]  Amin Vahdat,et al.  Realistic and responsive network traffic generation , 2006, SIGCOMM 2006.

[433]  Tran Ngoc Minh,et al.  Towards a profound analysis of bags-of-tasks in parallel systems and their performance impact , 2011, HPDC '11.

[434]  Azer Bestavros,et al.  Sources and characteristics of Web temporal locality , 2000, Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728).

[435]  B. Welford Note on a Method for Calculating Corrected Sums of Squares and Products , 1962 .

[436]  Jeffrey K. Hollingsworth,et al.  An API for Runtime Code Patching , 2000, Int. J. High Perform. Comput. Appl..

[437]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[438]  Larry Rudolph,et al.  Towards Convergence in Job Schedulers for Parallel Supercomputers , 1996, JSSPP.

[439]  Richard Wolski,et al.  QBETS: queue bounds estimation from time series , 2007, SIGMETRICS '07.

[440]  Neil Munro,et al.  Debating (what once was) the CDA , 1997, CACM.

[441]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[442]  Anja Feldmann,et al.  Web search clickstreams , 2006, IMC '06.

[443]  Evgenia Smirni,et al.  Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[444]  Warren Smith,et al.  Benchmarks and Standards for the Evaluation of Parallel Job Schedulers , 1999, JSSPP.

[445]  Wei Sun,et al.  Workload-aware load balancing for clustered Web servers , 2005, IEEE Transactions on Parallel and Distributed Systems.

[446]  Dan Tsafrir,et al.  Instability in parallel job scheduling simulation: the role of workload flurries , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[447]  Walter Willinger,et al.  Self‐Similar Network Traffic: An Overview , 2002 .

[448]  Francine Berman,et al.  A model for moldable supercomputer jobs , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[449]  Carlos González,et al.  Workload Characterization of 3D Games , 2006, 2006 IEEE International Symposium on Workload Characterization.

[450]  David Talby,et al.  What is worth learning from parallel workloads?: a user and session based analysis , 2005, ICS '05.

[451]  M. Meerschaert,et al.  Parameter Estimation for the Truncated Pareto Distribution , 2006 .

[452]  Amin Vahdat,et al.  Modeling and generating realistic streaming media server workloads , 2007, Comput. Networks.

[453]  Anoop Gupta,et al.  The SPLASH-2 programs: characterization and methodological considerations , 1995, ISCA.

[454]  Anand Sivasubramaniam,et al.  Decision-support workload characteristics on a clustered database server from the OS perspective , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[455]  P. Diaconis,et al.  Computer-Intensive Methods in Statistics , 1983 .

[456]  Albert-László Barabási,et al.  The origin of bursts and heavy tails in human dynamics , 2005, Nature.

[457]  Sivarama P. Dandamudi,et al.  Reducing hot-spot contention in shared-memory multiprocessor systems , 1999, IEEE Concurr..

[458]  Jozo J. Dujmovic Universal benchmark suites , 1999, MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[459]  Lieven Eeckhout,et al.  Workload design: selecting representative program-input pairs , 2002, Proceedings.International Conference on Parallel Architectures and Compilation Techniques.

[460]  J. S. Marron,et al.  Long-range dependence in a changing Internet traffic mix , 2005, Comput. Networks.

[461]  Biplab Sikdar,et al.  On the Contribution of TCP to the Self-Similarity of Network Traffic , 2001, IWDC.

[462]  Dmitry N. Zotkin,et al.  Job-length estimation and performance in backfilling schedulers , 1999, Proceedings. The Eighth International Symposium on High Performance Distributed Computing (Cat. No.99TH8469).

[463]  Sachin Agarwal,et al.  The New Web: Characterizing AJAX Traffic , 2008, PAM.

[464]  Alma Riska,et al.  Efficient fitting of long-tailed data sets into phase-type distributions , 2002, PERV.

[465]  Herodotos Herodotou,et al.  Profiling, what-if analysis, and cost-based optimization of MapReduce programs , 2011, Proc. VLDB Endow..

[466]  Martin Arlitt,et al.  A workload characterization study of the 1998 World Cup Web site , 2000, IEEE Netw..

[467]  G. E. Noether,et al.  Why Kendall Tau , 1981 .

[468]  Dan Tsafrir,et al.  The Dynamics of Backfilling: Solving the Mystery of Why Increased Inaccuracy May Help , 2006, 2006 IEEE International Symposium on Workload Characterization.

[469]  David S. Stoffer,et al.  Time series analysis and its applications , 2000 .

[470]  Jong-Suk Ruth Lee,et al.  Comparison of various estimators in simulated FGN , 2007, Simul. Model. Pract. Theory.

[471]  Irving L. Traiger,et al.  Evaluation Techniques for Storage Hierarchies , 1970, IBM Syst. J..

[472]  Norman I. Badler,et al.  Virtual humans for validating maintenance procedures , 2002, CACM.

[473]  John K. Ousterhout,et al.  Scheduling Techniques for Concurrent Systems , 1982, ICDCS.

[474]  Jon M. Peha,et al.  Effect of TCP on self-similarity of network traffic , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[475]  E. Kaplan,et al.  Nonparametric Estimation from Incomplete Observations , 1958 .

[476]  Richard G. Baraniuk,et al.  A Multifractal Wavelet Model with Application to Network Traffic , 1999, IEEE Trans. Inf. Theory.

[477]  John A. Gubner,et al.  Theorems and fallacies in the theory of long-range-dependent Processes , 2005, IEEE Transactions on Information Theory.

[478]  Edward R. Tufte,et al.  Envisioning Information , 1990 .

[479]  Ronald R. Willis A man/machine workload model , 1976, SIML.

[480]  Susan J. Eggers,et al.  On the validity of trace-driven simulation for multiprocessors , 1991, ISCA '91.

[481]  Dror G. Feitelson,et al.  Workload Modeling for Performance Evaluation , 2002, Performance.

[482]  Jan Vanthienen,et al.  Evaluation of Web Robot Discovery Techniques: A Benchmarking Study , 2006, ICDM.

[483]  Hossein Saiedian,et al.  Can You Trust Software Capability Evaluations? , 2000, Computer.

[484]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[485]  Sheng Di,et al.  Characterization and Comparison of Cloud versus Grid Workloads , 2012, 2012 IEEE International Conference on Cluster Computing.

[486]  Oren Etzioni,et al.  The MetaCrawler architecture for resource aggregation on the Web , 1997 .

[487]  Christos Faloutsos,et al.  Capturing the spatio-temporal behavior of real traffic data , 2002, Perform. Evaluation.

[488]  Kristian Skrede Gleditsch,et al.  Scale Invariance in the Severity of Terrorism , 2006 .

[489]  Olivier Temam,et al.  Quantifying loop nest locality using SPEC'95 and the perfect benchmarks , 1999, TOCS.

[490]  J. Eeckhout Gibrat's Law for (All) Cities , 2004 .

[491]  Constantinos Dovrolis,et al.  Measuring the Congestion Responsiveness of Internet Traffic , 2007, PAM.

[492]  Mor Harchol-Balter,et al.  SOFTScale: Stealing Opportunistically for Transient Scaling , 2012, Middleware.

[493]  Luigi M. Ricciardi,et al.  Trace Factory: generating workloads for trace-driven simulation of shared-bus multiprocessors , 1997, IEEE Concurrency.

[494]  H. Simon,et al.  ON A CLASS OF SKEW DISTRIBUTION FUNCTIONS , 1955 .

[495]  Dror G. Feitelson,et al.  Improving and stabilizing parallel computer performance using adaptive backfilling , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[496]  Alexandru Iosup,et al.  Grid Computing Workloads , 2011, IEEE Internet Computing.

[497]  M. Tremblay,et al.  UltraSparc I: a four-issue processor supporting multimedia , 1996, IEEE Micro.

[498]  Jeffrey D. Ullman,et al.  Big data: a research agenda , 2013, IDEAS '13.

[499]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[500]  Amnon Barak,et al.  Mos: A multicomputer distributed operating system , 1985, Softw. Pract. Exp..

[501]  Philip S. Yu,et al.  A Parallel Hash Join Algorithm for Managing Data Skew , 1993, IEEE Trans. Parallel Distributed Syst..

[502]  J. S. Marron,et al.  On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic , 2005, Comput. Networks.

[503]  David A. Padua,et al.  Calculating stack distances efficiently , 2002, MSP/ISMM.

[504]  C. Klüppelberg,et al.  Subexponential distributions , 1998 .

[505]  Ramin Yahyapour,et al.  Parallel Computer Workload Modeling with Markov Chains , 2004, JSSPP.

[506]  Matthias Sutter,et al.  Power laws of research output. Evidence for journals of economics , 2004, Scientometrics.

[507]  Alan M. Davis,et al.  The Art of Requirements Triage , 2003, Computer.

[508]  Peter A. Dinda,et al.  The user in experimental computer systems research , 2007, ExpCS '07.

[509]  Edward Rolf Tufte,et al.  The visual display of quantitative information , 1985 .

[510]  Giuseppe Serazzi,et al.  A Characterization of the Variation in Time of Workload Arrival Patterns , 1985, IEEE Transactions on Computers.

[511]  M. Lew,et al.  Beyond Eyeballing: Fitting Models to Experimental Data , 2000, Critical reviews in biochemistry and molecular biology.

[512]  Michael S. Borella,et al.  Source models of network game traffic , 2000, Comput. Commun..

[513]  Ian W. Marshall,et al.  File popularity characterisation , 2000, PERV.

[514]  Geoffrey J. McLachlan,et al.  Finite Mixture Models , 2019, Annual Review of Statistics and Its Application.

[515]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[516]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[517]  C. Granger,et al.  AN INTRODUCTION TO LONG‐MEMORY TIME SERIES MODELS AND FRACTIONAL DIFFERENCING , 1980 .

[518]  Jens Mache,et al.  A Comparative Study of Real Workload Traces and Synthetic Workload Models for Parallel Job Scheduling , 1998, JSSPP.

[519]  Jeffrey Casazza,et al.  Redefining Server Performance Characterization for Virtualization Benchmarking , 2006 .

[520]  Patrice Abry,et al.  Multifractality in TCP/IP traffic: the case against , 2005, Comput. Networks.

[521]  Domenico Ferrari,et al.  A Sensitivity Study of the Clustering Approach to Workload Modeling , 1986, Perform. Evaluation.

[522]  Anja Feldmann,et al.  A First Look at Mobile Hand-Held Device Traffic , 2010, PAM.

[523]  Amanda Spink,et al.  A temporal comparison of AltaVista Web searching , 2005, J. Assoc. Inf. Sci. Technol..

[524]  B. Mandelbrot Fractal Geometry of Nature , 1984 .

[525]  A. Lo Long-Term Memory in Stock Market Prices , 1989 .

[526]  Dror G. Feitelson,et al.  Locality of sampling and diversity in parallel system workloads , 2007, ICS '07.

[527]  Leonid Oliker,et al.  System Utilization Benchmark on the Cray T3E and IBM SP , 2000, JSSPP.

[528]  John S. Heidemann,et al.  Flash crowd mitigation via adaptive admission control based on application-level observations , 2005, TOIT.

[529]  Lester Lipsky,et al.  Simulations with Heavy‐Tailed Workloads , 2002 .

[530]  David Tse,et al.  Probabilistic methods for web caching , 2001, Perform. Evaluation.

[531]  Martin Arlitt,et al.  Web Workload Characterization: Ten Years Later , 2005 .

[532]  Sharad Malik,et al.  A Power Model for Routers: Modeling Alpha 21364 and InfiniBand Routers , 2003, IEEE Micro.

[533]  Murad S. Taqqu,et al.  Robustness of whittle-type estimators for time series with long-range dependence , 1997 .

[534]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .

[535]  Dror G. Feitelson,et al.  Probabilistic Prediction of Temporal Locality , 2007, IEEE Computer Architecture Letters.

[536]  Dror G. Feitelson,et al.  Preserving User Behavior Characteristics in Trace-Based Simulation of Parallel Job Scheduling , 2014, 2014 IEEE 22nd International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems.

[537]  D. J. Davis,et al.  AN ANALYSIS OF SOME FAILURE DATA , 1952 .

[538]  Mark T. Maybury,et al.  Expert Finding for Collaborative Virtual Environments , 2001, CACM.

[539]  Jonathan A. Tawn,et al.  An extreme value analysis for the investigation into the sinking of the M. V. Derbyshire. , 2003 .

[540]  Y. Charlie Hu,et al.  Program-Counter-Based Pattern Classification in Buffer Caching , 2004, OSDI.

[541]  Raj Jain,et al.  Packet Trains-Measurements and a New Model for Computer Network Traffic , 1986, IEEE J. Sel. Areas Commun..

[542]  Dror G. Feitelson,et al.  Improved Utilization and Responsiveness with Gang Scheduling , 1997, JSSPP.

[543]  Dan Tsafrir,et al.  Experience with using the Parallel Workloads Archive , 2014, J. Parallel Distributed Comput..

[544]  Tristan Henderson,et al.  The changing usage of a mature campus-wide wireless network , 2008, Comput. Networks.

[545]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[546]  Marko Becker Performance By Design Computer Capacity Planning By Example , 2016 .

[547]  Walter Willinger,et al.  Experimental queueing analysis with long-range dependent packet traffic , 1996, TNET.

[548]  Carsten Franke,et al.  On Grid Performance Evaluation Using Synthetic Workloads , 2006, JSSPP.

[549]  Margo I. Seltzer,et al.  File system aging—increasing the relevance of file system benchmarks , 1997, SIGMETRICS '97.

[550]  Donald F. Towsley,et al.  Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications , 2005, Comput. Networks.

[551]  Kimberly Keeton,et al.  Synthesizing representative I/O workloads using iterative distillation , 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, 2003. MASCOTS 2003..

[552]  Steven Hotovy,et al.  Workload Evolution on the Cornell Theory Center IBM SP2 , 1996, JSSPP.

[553]  Richard G. Baraniuk,et al.  Multiscale nature of network traffic , 2002, IEEE Signal Process. Mag..

[554]  Walter Willinger,et al.  Self-similarity and heavy tails: structural modeling of network traffic , 1998 .

[555]  Dario Rossi,et al.  Detailed Analysis of Skype Traffic , 2009, IEEE Transactions on Multimedia.

[556]  Gennady Samorodnitsky,et al.  Understanding Heavy Tails in a Bounded World or, is a Truncated Heavy Tail Heavy or Not? , 2010, 1001.3218.

[557]  Gregory F Feitelson A Distributional Measure of Correlation Dror , 2005 .

[558]  Jean-Yves Le Boudec Performance Evaluation of Computer and Communication Systems , 2010, Computer and communication sciences.

[559]  Adi Raveh,et al.  A Co-Plot analysis of logs and models of parallel workloads , 2007, TOMC.

[560]  David W. Embley,et al.  Behavioral Aspects of Text Editors , 1981, CSUR.

[561]  Frank Klawonn,et al.  Guide to Intelligent Data Analysis - How to Intelligently Make Sense of Real Data , 2010, Texts in Computer Science.

[562]  Larry Rudolph,et al.  Creating a wider bus using caching techniques , 1995, Proceedings of 1995 1st IEEE Symposium on High Performance Computer Architecture.

[563]  K. Sreenivasan,et al.  On the construction of a representative synthetic workload , 1974, CACM.

[564]  M. Stephens EDF Statistics for Goodness of Fit and Some Comparisons , 1974 .

[565]  K. Lomax Business Failures: Another Example of the Analysis of Failure Data , 1954 .

[566]  M. Kendall A NEW MEASURE OF RANK CORRELATION , 1938 .

[567]  Michael Mitzenmacher,et al.  The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[568]  Pei Cao,et al.  Adaptive page replacement based on memory reference behavior , 1997, SIGMETRICS '97.

[569]  Harold S. Stone,et al.  A Model of Workloads and Its Use in Miss-Rate Prediction for Fully Associative Caches , 1992, IEEE Trans. Computers.

[570]  Ashok K. Agrawala,et al.  An Approach to the Workload Characterization Problem , 1976, Computer.

[571]  Miklós Telek,et al.  PhFit: A General Phase-Type Fitting Tool , 2002, Computer Performance Evaluation / TOOLS.

[572]  Herbert Bos,et al.  File size distribution on UNIX systems: then and now , 2006, OPSR.

[573]  Bill Nitzberg,et al.  A comparison of workload traces from two production parallel machines , 1996, Proceedings of 6th Symposium on the Frontiers of Massively Parallel Computation (Frontiers '96).

[574]  Mary Baker,et al.  Measurements of a distributed file system , 1991, SOSP '91.

[575]  Richard P Taylor Order in Pollock's chaos. , 2002, Scientific American.

[576]  V. Jacobson,et al.  Congestion avoidance and control , 1988, CCRV.

[577]  Li Xiao,et al.  Fast and low-cost search schemes by exploiting localities in P2P networks , 2005, J. Parallel Distributed Comput..

[578]  Michael I. Jordan,et al.  Characterizing, modeling, and generating workload spikes for stateful services , 2010, SoCC '10.

[579]  Patrick H. Worley,et al.  The Effect of Time Constraints on Scaled Speedup , 1990, SIAM J. Sci. Comput..

[580]  Paul Barford,et al.  Self-configuring network traffic generation , 2004, IMC '04.

[581]  John K. Ousterhout Scheduling Techniques for Concurrebt Systems. , 1982, ICDCS 1982.

[582]  James E. Smith,et al.  Statistical Simulation: Adding Efficiency to the Computer Designer's Toolbox , 2003, IEEE Micro.

[583]  Vinod Yegneswaran,et al.  A framework for malicious workload generation , 2004, IMC '04.

[584]  Gregory F. Pfister,et al.  “Hot spot” contention and combining in multistage interconnection networks , 1985, IEEE Transactions on Computers.

[585]  V. S. Subrahmanian,et al.  Heterogeneous Multimedia Reasoning , 1995, Computer.

[586]  John Wilkes,et al.  An introduction to disk drive modeling , 1994, Computer.

[587]  Victor L. Wallace,et al.  Further analysis of a computing center environment , 1967, CACM.

[588]  Engin Kirda,et al.  Server-Side Bot Detection in Massively Multiplayer Online Games , 2009, IEEE Security & Privacy.

[589]  Brian Hayes The Britney Spears Problem , 2008 .

[590]  Shikharesh Majumdar,et al.  A measure of program locality and its application , 1984, SIGMETRICS '84.

[591]  B. Efron,et al.  A Leisurely Look at the Bootstrap, the Jackknife, and , 1983 .

[592]  Thomas W. Mastaglio,et al.  A Large-Scale Complex Virtual Environment for Team Training , 1995, Computer.

[593]  Monica S. Lam,et al.  Global optimizations for parallelism and locality on scalable parallel machines , 1993, PLDI '93.

[594]  H. Akaike A new look at the statistical model identification , 1974 .

[595]  Trevor Mudge,et al.  MiBench: A free, commercially representative embedded benchmark suite , 2001 .

[596]  Nazareno Andrade,et al.  OurGrid: An Approach to Easily Assemble Grids with Equitable Resource Sharing , 2003, JSSPP.

[597]  Jie Huang,et al.  The HiBench benchmark suite: Characterization of the MapReduce-based data analysis , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).

[598]  Dror G. Feitelson Experimental analysis of the root causes of performance evaluation results: a backfilling case study , 2005, IEEE Transactions on Parallel and Distributed Systems.

[599]  Ellen M. Voorhees On test collections for adaptive information retrieval , 2008, Inf. Process. Manag..

[600]  Jaime Teevan,et al.  Large scale query log analysis of re-finding , 2010, WSDM '10.

[601]  Virgílio A. F. Almeida,et al.  Traffic Characteristics and Communication Patterns in Blogosphere , 2006, ICWSM.

[602]  Lieven Eeckhout,et al.  Distilling the essence of proprietary workloads into miniature benchmarks , 2008, TACO.

[603]  Sheldon M. Ross,et al.  Introduction to probability models , 1975 .

[604]  M. Hearst The fitness of false beliefs , 1997 .

[605]  Richard B. Bunt,et al.  The effect of client caching on file server workloads , 1996, Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences.

[606]  Philip K. Chan,et al.  Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.

[607]  Fernando Paganini,et al.  Congestion control for high performance, stability, and fairness in general networks , 2005, IEEE/ACM Transactions on Networking.

[608]  Lieven Eeckhout,et al.  Performance analysis through synthetic trace generation , 2000, 2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422).

[609]  B. Gopinath,et al.  An inter-reference gap model for temporal locality in program behavior , 1995, SIGMETRICS '95/PERFORMANCE '95.

[610]  Allen B. Downey Predicting queue times on space-sharing parallel computers , 1997, Proceedings 11th International Parallel Processing Symposium.

[611]  Yanpei Chen,et al.  Interactive Analytical Processing in Big Data Systems: A Cross-Industry Study of MapReduce Workloads , 2012, Proc. VLDB Endow..

[612]  Larry L. Peterson,et al.  Experiences with network simulation , 1996, SIGMETRICS '96.

[613]  Trevor N. Mudge,et al.  Trace-driven memory simulation: a survey , 1997, CSUR.

[614]  Emmanouel A. Varvarigos,et al.  Profiling Computation Jobs in Grid Systems , 2007, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07).

[615]  Douglas N. Kimelman,et al.  The RP3 program visualization environment , 1991, IBM J. Res. Dev..

[616]  Rosie Jones,et al.  Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs , 2008, CIKM '08.

[617]  Patrice Abry,et al.  Long‐range Dependence: Revisiting Aggregation with Wavelets , 1998 .

[618]  R. Davies,et al.  Tests for Hurst effect , 1987 .

[619]  Nick McKeown,et al.  Update on buffer sizing in internet routers , 2006, CCRV.

[620]  Aleksandar Milenkovic,et al.  An efficient single-pass trace compression technique utilizing instruction streams , 2007, TOMC.

[621]  Pradeep K. Dubey,et al.  How Multimedia Workloads Will Change Processor Design , 1997, Computer.

[622]  X. Gabaix Zipf's Law for Cities: An Explanation , 1999 .

[623]  W. Willinger,et al.  A critical look at Lo's modified R/S statistic , 1999 .

[624]  Kishor S. Trivedi,et al.  Software Reliability and Rejuvenation: Modeling and Analysis , 2002, Performance.

[625]  Dror G. Feitelson,et al.  Exploiting Core Working Sets to Filter the L1 Cache with Random Sampling , 2012, IEEE Transactions on Computers.

[626]  Martin F. Arlitt,et al.  Web server workload characterization: the search for invariants , 1996, SIGMETRICS '96.

[627]  Doug Downey,et al.  Models of Searching and Browsing: Languages, Studies, and Application , 2007, IJCAI.

[628]  Samuel J. Leffler,et al.  A Fast File System for UNIX (Revised July 27, 1983) , 1983 .

[629]  Dror G. Feitelson,et al.  Self-Tuning Systems , 1999, IEEE Softw..

[630]  Larry Rudolph,et al.  Evaluation of Design Choices for Gang Scheduling Using Distributed Hierarchical Control , 1996, J. Parallel Distributed Comput..

[631]  Christos Faloutsos,et al.  Identifying Web Browsing Trends and Patterns , 2001, Computer.

[632]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[633]  Dror G. FeitelsonCorresponding authorThe Rachel Workload resampling for performance evaluation of parallel job schedulers , 2014 .

[634]  S.D. Kleban,et al.  Hierarchical Dynamics, Interarrival Times, and Performance , 2003, ACM/IEEE SC 2003 Conference (SC'03).

[635]  Kun-Chan Lan,et al.  Rapid model parameterization from traffic measurements , 2002, TOMC.

[636]  Oliver W. W. Yang,et al.  Estimation of Hurst parameter by variance-time plots , 1997, 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM. 10 Years Networking the Pacific Rim, 1987-1997.

[637]  Domenico Ferrari,et al.  Workload charaterization and Selection in Computer Performance Measurement , 1972, Computer.

[638]  Dan Tsafrir,et al.  Fine grained kernel logging with KLogger: experience and insights , 2007, EuroSys '07.

[639]  Paul R. Wilson,et al.  Dynamic Storage Allocation: A Survey and Critical Review , 1995, IWMM.

[640]  Hai Jin,et al.  PCantorSim: Accelerating parallel architecture simulation through fractal-based sampling , 2013, TACO.

[641]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[642]  Mor Harchol-Balter,et al.  Necessary and Sufficient Conditions for Representing General Distributions by Coxians , 2003, Computer Performance Evaluation / TOOLS.

[643]  John L. Henning SPEC CPU2000: Measuring CPU Performance in the New Millennium , 2000, Computer.

[644]  Miron Livny,et al.  The Available Capacity of a Privately Owned Workstation Environmont , 1991, Perform. Evaluation.

[645]  Dror G. Feitelson,et al.  Parallel File Systems for the IBM SP Computers , 1995, IBM Syst. J..

[646]  José Luis García-Dorado,et al.  Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact , 2012, IEEE Transactions on Network and Service Management.

[647]  Juan M. Orduña,et al.  Workload Characterization in Multiplayer Online Games , 2006, ICCSA.

[648]  Evgenia Smirni,et al.  Dealing with Burstiness in Multi-Tier Applications: Models and Their Parameterization , 2012, IEEE Transactions on Software Engineering.

[649]  Larry Rudolph,et al.  Debugging parallel programs in parallel , 1988, PADD '88.

[650]  Hisashi Kobayashi,et al.  Modeling and analysis , 1978 .

[651]  Douglas C. Montgomery,et al.  Applied Statistics and Probability for Engineers, Third edition , 1994 .

[652]  Virgílio A. F. Almeida,et al.  A hierarchical and multiscale approach to analyze E-business workloads , 2003, Perform. Evaluation.

[653]  Allen B. Downey,et al.  The elusive goal of workload characterization , 1999, PERV.

[654]  Lieven Eeckhout,et al.  Quantifying the Impact of Input Data Sets on Program Behavior and its Applications , 2003, J. Instr. Level Parallelism.

[655]  Fang Wang,et al.  Modeling of Workload in MPPs , 1997, JSSPP.

[656]  Mariacarla Calzarossa,et al.  A Community Databank for Performance Tracefiles , 2001, PVM/MPI.

[657]  Michael Muskulus,et al.  Modeling correlated workloads by combining model based clustering and a localized sampling algorithm , 2007, ICS '07.

[658]  R. J. Honicky,et al.  Workload Modelling of Stateful Protocols Using HMMs , 2005, Int. CMG Conference.

[659]  David S. Moore,et al.  Tests of Chi-Squared Type , 2017 .

[660]  R. Redner,et al.  Mixture densities, maximum likelihood, and the EM algorithm , 1984 .

[661]  Paul R. Wilson,et al.  The memory fragmentation problem: solved? , 1998, ISMM '98.

[662]  Mark Rosenstein What is actually taking place on web sites: e-commerce lessons from web server logs , 2000, EC '00.

[663]  B. M. Hill,et al.  A Simple General Approach to Inference About the Tail of a Distribution , 1975 .

[664]  Dario Rossi,et al.  User patience and the Web: a hands-on investigation , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[665]  Carol Ash,et al.  The Probability Tutoring Book , 1993 .

[666]  Aaron Halfaker,et al.  Using edit sessions to measure participation in wikipedia , 2013, CSCW.

[667]  Eelco Herder,et al.  Not quite the average: An empirical study of Web use , 2008, TWEB.

[668]  Amy Apon,et al.  Inital Starting Point Analysis for K-Means Clustering: A Case Study , 2006 .

[669]  D. J. Bartholomew,et al.  Time Series Analysis Forecasting and Control , 1971 .

[670]  Brian Everitt,et al.  Cluster analysis , 1974 .

[671]  Peter A. Dinda,et al.  Effects and implications of file size/service time correlation on Web server scheduling policies , 2005, 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[672]  Kenneth C. Sevcik Characterizations of parallelism in applications and their use in scheduling , 1989, SIGMETRICS '89.

[673]  David Kotz,et al.  Extracting a Mobility Model from Real User Traces , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[674]  Guanying Wang,et al.  A simulation approach to evaluating design decisions in MapReduce setups , 2009, 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems.

[675]  Archana Ganapathi,et al.  The Case for Evaluating MapReduce Performance Using Workload Suites , 2011, 2011 IEEE 19th Annual International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems.

[676]  Mor Harchol-Balter,et al.  A Closed-Form Solution for Mapping General Distributions to Minimal PH Distributions , 2003, Computer Performance Evaluation / TOOLS.

[677]  Jong-Suk Ruth Lee,et al.  Suggestions of efficient self-similar generators , 2007, Simul. Model. Pract. Theory.

[678]  Michael B. Greenwald,et al.  Practical Algorithms for Self Scaling Histograms or Better than Average Data Collection , 1996, Perform. Evaluation.

[679]  W. Cirne,et al.  A comprehensive model of the supercomputer workload , 2001, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538).

[680]  Lieven Eeckhout,et al.  Hybrid analytical-statistical modeling for efficiently exploring architecture and workload design spaces , 2001, Proceedings 2001 International Conference on Parallel Architectures and Compilation Techniques.

[681]  W. Buchholz,et al.  A Synthetic Job for Measuring System Performance , 1969, IBM Syst. J..

[682]  Peter A. Dinda,et al.  Measuring and understanding user comfort with resource borrowing , 2004, Proceedings. 13th IEEE International Symposium on High performance Distributed Computing, 2004..

[683]  Ben Shneiderman,et al.  Designing The User Interface , 2013 .

[684]  Mor Harchol-Balter,et al.  Web servers under overload: How scheduling can help , 2006, TOIT.

[685]  Chris Chatfield,et al.  Confessions of a pragmatic statistician , 2002 .

[686]  Carla Schlatter Ellis,et al.  Characterizing Parallel File-access Patterns on a , 1995 .

[687]  P. Taylor Fooled by Randomness , 2012 .

[688]  Alexandru Iosup,et al.  The Characteristics and Performance of Groups of Jobs in Grids , 2007, Euro-Par.

[689]  Michel L. Goldstein,et al.  Problems with fitting to the power-law distribution , 2004, cond-mat/0402322.

[690]  Norma Banas,et al.  Visualization , 1968, Machine-mediated learning.

[691]  E. G. Coffman,et al.  Interarrival statistics for time sharing systems , 1966, CACM.

[692]  Dror G. Feitelson,et al.  The Forgotten Factor: Facts on Performance Evaluation and Its Dependence on Workloads , 2002, Euro-Par.

[693]  Lieven Eeckhout,et al.  Control flow modeling in statistical simulation for accurate and efficient processor design studies , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..

[694]  Zongpeng Li,et al.  Youtube traffic characterization: a view from the edge , 2007, IMC '07.

[695]  Allen D. Malony,et al.  Performance Measurement Intrusion and Perturbation Analysis , 1992, IEEE Trans. Parallel Distributed Syst..

[696]  J. Cavanaugh,et al.  The Bayesian information criterion: background, derivation, and applications , 2012 .

[697]  William LeFebvre,et al.  CNN.com: Facing a World Crisis , 2001, LiSA.

[698]  Henry G. Baker,et al.  Infant mortality and generational garbage collection , 1993, SIGP.

[699]  Marios D. Dikaiakos,et al.  Web robot detection: A probabilistic reasoning approach , 2009, Comput. Networks.

[700]  Sally Floyd,et al.  Difficulties in simulating the internet , 2001, TNET.

[701]  Evgenia Smirni,et al.  Model-Driven System Capacity Planning under Workload Burstiness , 2010, IEEE Transactions on Computers.

[702]  George Varghese,et al.  New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice , 2003, TOCS.

[703]  A. J. KleinOsowski,et al.  MinneSPEC: A New SPEC Benchmark Workload for Simulation-Based Computer Architecture Research , 2002, IEEE Computer Architecture Letters.

[704]  Alan Weiss,et al.  A compound model for TCP connection arrivals for LAN and WAN applications , 2002, Comput. Networks.

[705]  Riccardo Gusella,et al.  Characterizing the Variability of Arrival Processes with Indexes of Dispersion , 1991, IEEE J. Sel. Areas Commun..

[706]  Amanda Spink,et al.  Determining the informational, navigational, and transactional intent of Web queries , 2008, Inf. Process. Manag..

[707]  Monika Henzinger,et al.  Analysis of a very large web search engine query log , 1999, SIGF.

[708]  Gennady Samorodnitsky,et al.  Long Range Dependence , 2007, Found. Trends Stoch. Syst..

[709]  P. Ball Theatre: Playing dirty , 2004, Nature.

[710]  Ralph B. D'Agostino,et al.  Goodness-of-Fit-Techniques , 2020 .

[711]  Sidney I. Resnick,et al.  Why non-linearities can ruin the heavy-tailed modeler's day , 1998 .

[712]  Debanjan Saha,et al.  Measurement-based characterization of a collection of on-line games , 2005, IMC '05.

[713]  B. S. Manoj,et al.  Communication challenges in emergency response , 2007, Commun. ACM.

[714]  Songqing Chen,et al.  Analysis of multimedia workloads with implications for internet streaming , 2005, WWW '05.

[715]  Anja Feldmann,et al.  Fitting mixtures of exponentials to long-tail distributions to analyze network performance models , 1997, Proceedings of INFOCOM '97.

[716]  Chita R. Das,et al.  Towards characterizing cloud backend workloads: insights from Google compute clusters , 2010, PERV.

[717]  Jan Beran,et al.  Statistics for long-memory processes , 1994 .

[718]  Uri C. Weiser,et al.  Intel MMX for multimedia PCs , 1997, Commun. ACM.

[719]  James E. Smith,et al.  Characterizing computer performance with a single number , 1988, CACM.

[720]  Anja Feldmann,et al.  An Assessment of Overt Malicious Activity Manifest in Residential Networks , 2011, DIMVA.

[721]  Amnon Barak,et al.  A distributed load‐balancing policy for a multicomputer , 1985, Softw. Pract. Exp..

[722]  Alan Jay Smith,et al.  Characteristics of I/O traffic in personal computer and server workloads , 2002, IBM Syst. J..

[723]  Dror G. Feitelson,et al.  Utilization, Predictability, Workloads, and User Runtime Estimates in Scheduling the IBM SP2 with Backfilling , 2001, IEEE Trans. Parallel Distributed Syst..

[724]  Peter J. Denning,et al.  Experiments with program locality , 1899, AFIPS '72 (Fall, part I).

[725]  Lieven Eeckhout,et al.  Evaluating Benchmark Subsetting Approaches , 2006, 2006 IEEE International Symposium on Workload Characterization.

[726]  Virgílio A. F. Almeida,et al.  On the intrinsic locality properties of Web reference streams , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[727]  Michael Mitzenmacher,et al.  Dynamic Models for File Sizes and Double Pareto Distributions , 2004, Internet Math..

[728]  David Kotz,et al.  Low-Level Interfaces for High-Level Parallel I/O , 1995, Input/Output in Parallel and Distributed Computer Systems.

[729]  David Christensen,et al.  Fast algorithms for the calculation of Kendall’s τ , 2005, Comput. Stat..

[730]  Teunis J. Ott,et al.  Load-balancing heuristics and process behavior , 1986, SIGMETRICS '86/PERFORMANCE '86.

[731]  Anja Feldmann,et al.  Data networks as cascades: investigating the multifractal nature of Internet WAN traffic , 1998, SIGCOMM '98.

[732]  Mor Harchol-Balter,et al.  SRPT Scheduling for Web Servers , 2001, JSSPP.

[733]  Carey L. Williamson,et al.  Internet Web servers: workload characterization and performance implications , 1997, TNET.

[734]  Anja Feldmann,et al.  The changing nature of network traffic: scaling phenomena , 1998, CCRV.

[735]  Fan Zhang,et al.  A Comprehensive Toolset for Workload Characterization, Performance Modeling, and Online Control , 2003, Computer Performance Evaluation / TOOLS.

[736]  Alexandra Fedorova,et al.  Desktop Workload Characterization for CMP / SMT and Implications for Operating System Design , 2007 .

[737]  Dario Rossi,et al.  Experiences of Internet traffic monitoring with tstat , 2011, IEEE Network.

[738]  Evangelos P. Markatos,et al.  Load Balancing vs. Locality Management in Shared-Memory Multiprocessors , 1992, ICPP.

[739]  Dror G. Feitelson,et al.  On extracting session data from activity logs , 2012, SYSTOR '12.

[740]  Kenneth C. Sevcik,et al.  Application Scheduling and Processor Allocation in Multiprogrammed Parallel Processing Systems , 1994, Perform. Evaluation.

[741]  Wentian Li,et al.  Random texts exhibit Zipf's-law-like word frequency distribution , 1992, IEEE Trans. Inf. Theory.

[742]  Evangelos P. Markatos Visualizing working sets , 1997, OPSR.

[743]  B. Efron Computers and the Theory of Statistics: Thinking the Unthinkable , 1979 .

[744]  Richard Koch,et al.  The 80/20 Principle: The Secret of Achieving More With Less , 1998 .

[745]  Jaime Teevan,et al.  Information re-retrieval: repeat queries in Yahoo's logs , 2007, SIGIR.

[746]  Carey Williamson,et al.  A Synthetic Workload Model for Internet Mosaic Traffic , 1995 .

[747]  Marios D. Dikaiakos,et al.  An investigation of web crawler behavior: characterization and metrics , 2005, Comput. Commun..

[748]  Alan Jay Smith,et al.  I/O reference behavior of production database workloads and the TPC benchmarks—an analysis at the logical level , 1999, TODS.

[749]  Wolfgang Fischer,et al.  The Markov-Modulated Poisson Process (MMPP) Cookbook , 1993, Perform. Evaluation.

[750]  Miklós Telek,et al.  PhFit: a general phase-type fitting tool , 2002, Proceedings International Conference on Dependable Systems and Networks.

[751]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .