No abstract available.
Towards Time-Parallel Road Traffic Simulation
As an alternative to spatial parallelization of simulation models, time-parallel simulation offers the potential for massive parallelism with a high level of independence between the parallel processes. Unfortunately, due to inherent problems, the ...
Parallel Event-Driven Neural Network Simulations Using the Hodgkin-Huxley Neuron Model
Neural systems are composed of a large number of highly-connected neurons and are widely simulated within the neurological community. In this paper, we examine the application of parallel discrete event simulation techniques to networks of a complex ...
Optimistic Parallel Discrete Event Simulations of Physical Systems Using Reverse Computation
- Yarong Tang,
- Kalyan S. Perumalla,
- Richard M. Fujimoto,
- Homa Karimabadi,
- Jonathan Driscoll,
- Yuri Omelchenko
Efficient computer simulation of complex physical phenomena has long been challenging due to their multi-physics and multi-scale nature. In contrast to traditional time-stepped execution methods, we describe an approach using optimistic parallel ...
Seven-O'Clock: A New Distributed GVT Algorithm Using Network Atomic Operations
In this paper we introduce a new concept, network atomic operations (NAOs) to create a zero-cost consistent cut. Using NAOs, we define a wall-clock-time driven GVT algorithm called Seven OýClock that is an extension of Fujimotoýs shared memory GVT ...
Optimistic Protocol Analysis in a Performance Analyzer and Prediction Tool
Parallelising sequential discrete event simulation programs is often a tedious process, with no guarantee for speedup. This paper describes a performance analyser tool developed to predict the execution performance of parallel discrete event simulation ...
µsik " A Micro-Kernel for Parallel/Distributed Simulation Systems
A novel micro-kernel approach to building parallel/distributed simulation systems is presented. Using this approach, a unified system architecture is developed for incorporating multiple types of simulation processes. The processes hold potential to ...
Distributed Worm Simulation with a Realistic Internet Model
Internet worm spread is a phenomenon involving millions of hosts, who interact in complex and diverse environment. Scanning speed of each infected host depends on its resources and the defenses at work in its network. Aggressive worms further interact ...
Mobile Contagion: Simulation of Infection and Defense
For worms with known signatures, properly configured firewalls can prevent infection of a network from the outside. However, as several recent worms have shown, portable computers provide worms with an entry point into such networks, since these ...
Comparative Study between Analytical Models and Packet-Level Worm Simulations
The threat of Internet worms has been, and continues to be, one of the most important issues faced by networking researchers and network users. The need for accurate and efficient modeling and analysis methods cannot be understated. Models that ...
Performance Benchmark of a Parallel and Distributed Network Simulator
Simulation of large-scale networks requires enormous amounts of memory and processing time. One way of speeding up these simulations is to distribute the model over a number of connected workstations. However, this introduces inefficiencies caused by ...
Performance Prediction Using Simulation of Large-Scale Interconnection Networks in POSE
- Terry L. Wilmarth,
- Gengbin Zheng,
- Eric J. Bohm,
- Yogesh Mehta,
- Nilesh Choudhury,
- Praveen Jagadishprasad,
- Laxmikant V. Kale
Parallel discrete event simulation (PDES) of models with fine-grained computation remains a challenging problem. We explore the usage of POSE, our Parallel Object-oriented Simulation Environment, for application performance prediction on large parallel ...
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises
The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of LANs. The simulator must be able to present a realistic ...
Efficient Simulation of Wireless Networks Using Lazy MAC State Update
Scalable and efficient network simulation methods are the method of choice for evaluating and verifying wireless network protocols on a moderate to large scale. This need becomes obvious when simulating very large-scale wireless networks such as ...
Simulation of Network Traffic at Coarse Timescales
Simulation of large-scale networks demands that we model some flows at coarser time-scales than others, simply to keep the execution cost manageable. This paper studies a method for periodically computing traffic at a time-scale larger than that ...
Simulating Realistic Packet Routing without Routing Protocols
A fundamental requirement for any network simulation environment is the realistic forwarding of packets from a source to a destination in the simulated topology. The routing decisions at each hop along the path should accurately represent decisions made ...
The WarpIV Simulation Kernel
This paper provides an overview of the WarpIV Simulation Kernel that was designed to be an initial implementation of the Standard Simulation Architecture (SSA). WarpIV is the next generation replacement for the Synchronous Parallel Environment for ...
Transparent State Management for Optimistic Synchronization in the High Level Architecture
In this paper we present the design and implementation of a software architecture, namely MAgic State Manager (MASM), to be employed within a Run-Time Infrastructure (RTI) in support of HLA federations. MASM allows performing checkpointing/recovery of ...
XTW, A Parallel and Distributed Logic Simulator
In this paper, a new event scheduling mechanism XEQ and a new rollback procedure rb-messages are proposed for use in optimistic logic simulation. We incorporate both of these techniques in a simulator XTW. XTW groups LPs into clusters, and makes use of ...
A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast
Previous scanning worms have beensignificant sources of network congestion and have had catastrophic effects on switches, routers and end-systems. In this paper, we focus on the simulation of the secondary resource-exhaustion effects that scanning worms ...
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this paper, we present an advanced worm called "routing worm", which implements two advanced attacking ...
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA - Defense Against Cyber Attacks on MANETS [4], "One of the most severe cyber threats is ...
Sequential Performance of Asynchronous Conservative PDES Algorithms
The widespread use of sequential simulation in large scale parameter studies means that large cost savings can be made by improving the performance of these simulators. Sequential discrete event simulation systems usually employ a central event list to ...
Merging Parallel Simulation Programs
In earlier work cloning is proposed as a means forefficiently splitting a running simulation midway through its execution into multiple parallel simulations. In simulation cloning, clones usually are able to share computations that occur early in the ...
Concurrent Replication of Parallel and Distributed Simulations
Parallel and distributed simulations enable the analysis of complex systems by concurrently exploiting the aggregate computation power and memory of clusters of execution units. In this paper we investigate a new direction for increasing both the ...
Software Diversity as a Defense against Viral Propagation: Models and Simulations
The use of software diversity has often been discussed in the research literature as an effectivemeans to break up the software monoculture present on the Internet and to thus prevent malcode propagation. However, there have been no quantitative studies ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SIGSIM-PADS '19 | 25 | 13 | 52% |
SIGSIM-PADS '18 | 46 | 15 | 33% |
SIGSIM PADS '15 | 60 | 35 | 58% |
SIGSIM PADS '14 | 33 | 19 | 58% |
SIGSIM PADS '13 | 75 | 29 | 39% |
PADS '08 | 52 | 21 | 40% |
PADS '07 | 37 | 24 | 65% |
PADS '06 | 43 | 21 | 49% |
PADS '05 | 46 | 30 | 65% |
PADS '03 | 33 | 20 | 61% |
PADS '02 | 29 | 19 | 66% |
PADS '01 | 31 | 21 | 68% |
PADS '00 | 36 | 19 | 53% |
PADS '99 | 38 | 19 | 50% |
PADS '98 | 39 | 21 | 54% |
PADS '97 | 47 | 27 | 57% |
PADS '96 | 43 | 18 | 42% |
PADS '94 | 66 | 27 | 41% |
Overall | 779 | 398 | 51% |