|
[1] E. Sousa, P. Maciel, C. Araujo and F. Chicout, "Performability Evaluation of EFT Systems for SLA Assurance," IPDPS, pp. 1-8, 2009. [2] C. Araujo, E. Sousa, P. Maciel, F. Chicout and E. Andrade, "Performance Modeling for Evaluation and Planning of Electronic Funds Transfer Systems With Bursty Arrival Traffic," First International Conference on Intensive Applications and Services, vol. 17, pp. 65-70, 2009. [3] C. Araujo, P. Maciel, A. Zimmermann, E. Andrade, E. Sousa, G. Callou and P. Cunha, "Performability Modeling of Electronic Funds Transfer Systems," Computing, pp. 315-334, 2010. [4] D. A. Menasce, R. Fonesca, V. A. F. Almeida and M. A. Mendes, "A Methodology for Workload Characterization of E-Commerce Sites," E-Commerce, Denver, Colorado, pp. 119-128, 1999. [5] Y. Arian and Y. Levy, "Algorithms for Generalized Round Robin Routing," Operations Research Letters, vol. 12, pp. 313-319, 1992. [6] N. Saquib, M. S. R. Sakib and A. S. K. Pathan, "ViSim: A User-Friendly Graphical Simulation Tool for Performance Analysis of MANET Routing Protocols," Mathematical and Computer Modeling, vol. 53, pp. 2204-2218, 2011. [7] L. A. Zadeh, "Fuzzy Sets," Information and Control, vol. 8, no. 3, pp. 338-353, 1965. [8] S. Upadhayay and M. Sharma, "Performance Evaluation of Fuzzy Routing Algorithms for a New Fuzzy Mixed Metric Approach," IJCSNS, vol. 8, no. 4, pp. 21-28, April 2008. [9] W. Arnold, H. Hellendoorn, R. Seising, C. Thomas and A. Weitzel, "Fuzzy Routing," Fuzzy Sets and Systems, vol. 85, pp. 131-153, 1997. [10] Z. Jing, C. Xuefen, L. Guan, L. Hongxia and I. Awan, "Design of Fuzzy Based Multi-Constrained Routing Protocol and the Performance Evaluation," Journal of Interconnection Networks, vol. 9, no. 4, pp. 369-387, 2008. [11] S. Pi and B. Sun, "Fuzzy Controllers Based Multipath Routing Algorithm in MANET," Physics Procedia, vol. 24, pp. 1178-1185, 2012. [12] J. Nie, J. Wen, J. Luo, X. He and Z. Zhou, "An Adaptive Fuzzy Logic Based Secure Routing Protocol in Mobile Ad Hoc Networks," Fuzzy Sets and Systems, vol. 157, pp. 1704-1712, 2006. [13] P. Dutta and A. Banerjee, "Fuzzy Controlled Power-Aware Multicast Routing (FPMR) For Mobile Ad Hoc Networks," Procedia Technology, vol. 4, pp. 38-49, 2012. [14] T. Boubana and M. Belmesk, "An Object Oriented Approach to Formally Analyze the UML 2.0 Activity Partitions," Information and Software Technology, vol. 49, pp. 999-1016, 2007. [15] C.-J. Huang, Y.-W. Wang, H.-H. Liao, C.-F. Lin, K.-W. Hu and T.-Y. Chang, "A Power Efficient Routing Protocol for Underwater Wireless Sensor Networks," Applied Soft Computing, vol. 11, no. 2, pp. 2348-2355, March 2011. [16] K. Sacha, "Real-Time Specification Using Petri Nets," Microprocessing and Microprogramming, vol. 38, pp. 607-614, 1993. [17] J. C. Vidal, M. Lama and A. Bugarin, "OPENET: Ontology-Based Engine for High-Level Petri Nets," Expert Systems With Applications, vol. 37, pp. 6493-6509, 2010. [18] N. Lohmann, S. Mennicke and C. Sura, "The Petri Net API," 2010. [19] M. I. Catalan, D. A. Ludena and H. Umeno, "VM-Based Benchmark and Analysis System for Testing Online Transaction Processing," Proceedings of Second International Conference on Innovative Computing, Informaion and Control, ICICIC, IEEE Computer Society, Washington, DC. [20] Q. Zhang, N. Mi, E. Smirni, A. Riska and E. Riedel, "Evaluating the Performability of Systems With Background Jobs," Proceedings of the International Conference on Dependable Systems and Networks, pp. 495-504, 2006. [21] R. Jain, Art of Computer Systems Performance Analysis Techniques for Experimental Design Measurements Simulation and Modeling, New York: Wiley Computer Publishing, April 1991. [22] N. Gharbi and M. Ioualalen, "GSPN Analysis of Retrial Systems With Server Breakdowns and Repairs," Applied Mathematics and Computation, vol. 174, pp. 1151-1168, 2006. [23] J. L. Hellerstein, K. Katircioglu and M. Surendra, "An On-Line, Business-Oriented Optimization of Performance and Availability for Utility Computing," Selected Areas in Communications, IEEE J, vol. 23, pp. 2013-2021, 2010. [24] K. S. Trivedi, S. Hunter, S. Graig and R. Fricks, "Reliability Analysis Techniques Explored Through a Communication Network Example," Proceedings of International Workshop on Computer-Aided Design, Test and Evaluation for Dependability, 1996. [25] L. Sesmun and F. Turner, "Using Performability in the Design of Communication Networks," IEEE Proceedings - Computers and Digital Technologies, vol. 147, pp. 355-363, 2000. [26] G. R. Ash, "Design and Control of Networks With Dynamic Nonhierarchical Routing," Communications Magazine, IEEE, vol. 28, no. 10, pp. 34-40, October 1990. [27] T. Tsiakis and G. Sthephanides, "The Concept of Security and Trust in Electronic Payments," Computers & Security, vol. 24, no. 1, pp. 10-15, February 2005. [28] T. Aura and D. Gollmann, "Communications Security on the Internet," Software Focus, vol. 2, no. 3, pp. 104-111, January 2002.
|