[1]XIE Yi,TANG Chenghua,HUANG Xiangnong.A doubly hidden Markov model for synthesizing bursty workloads[J].CAAI Transactions on Intelligent Systems,2012,7(2):108-114.
Copy

A doubly hidden Markov model for synthesizing bursty workloads

References:
[1]PAXSON V, FLOYD S. Wide area traffic: the failure of Poisson modeling[J]. IEEE/ACM Transactions on Networking (ToN), 1995, 3(3): 244.
[2]LELAND W, TAQQU M, WILLINGER W, et al. On the selfsimilar nature of Ethernet traffic[J]. IEEE/ACM Transactions on Networking, 2002, 2(1): 115. 
[3]BERAN J, SHERMAN R, TAQQU M, et al. Long range dependence in variable bit rate video traffic[J]. IEEE Trans on Communication, 1995, 43: 15661579.
[4]ZVIRONIENE A, NAVICKAS Z, RINDZEVICIUS R. Bursty traffic simulation by ONOFF model[J]. Electronics and Electrical Engineering, 2006, 70(6): 6568. 
[5]RIEDI R, CROUSE M, RIBEIRO V, et al. A multifractal wavelet model with application to network traffic[J]. IEEE Transactions on Information Theory, 2002, 45(3): 9921018.
[6]NORROS I. On the use of fractional Brownian motion in the theory of connectionless networks[J]. IEEE Journal on Selected Areas in Communications, 2002, 13(6): 953962.
[7]ABRY P, BARANIUK R, FLANDRIN P, et al. The multiscale nature of network traffic: discovery, analysis, and modeling[J]. IEEE Signal Processing Magazine, 2002(19): 2846.
[8]NISHIMURA S, SHINNO M. Modeling burst traffic using a MAP with a tree structure[J]. Journal of the Operations Research, 2004, 47(3): 129144. 
[9]ANDERSSON M, CAO J, KIHL M, et al. Performance modeling of an Apache web server with bursty arrival traffic[EB/OL].[20110618]. http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=532529&fileOId=625324.
[10]KONTOVASILIS K, MITROU N. Bursty traffic modeling and efficient analysis algorithms via fluidflow models for ATM IBCN[J]. Annals of Operations Research, 1994, 49(1): 279323.
[11]LIU P, CHEUNG W, LI K. On the modeling of bursty traffic[C]//Proceedings on Computer, Communication, Control and Power Engineering. Beijing, China, 2002: 220223.
[12]JOHNSON M. Why doesn’t EM find good HMM POStaggers[C]//Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLPCoNLL). Prague, Czech Republic, 2007: 296305.
[13]FINE S, SINGER Y, TISHBY N. The hierarchical hidden Markov model: analysis and applications[J]. Machine Learning, 1998, 32(1): 4162.
[14]RABINER L. A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989, 77(2): 257286. 
Similar References:

Memo

-

Last Update: 2012-07-12

Copyright © CAAI Transactions on Intelligent Systems