MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommun
DOI: 10.1109/mascot.1999.805058
|View full text |Cite
|
Sign up to set email alerts
|

Modeling user behavior: a layered approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 13 publications
0
11
0
1
Order By: Relevance
“…It is also possible to continue the modeling with additional, lower levels [335]. For example, an application may generate a sequence of requests from different servers, and each such request may be transmitted as a sequence of packets.…”
Section: The Three-level User-based Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…It is also possible to continue the modeling with additional, lower levels [335]. For example, an application may generate a sequence of requests from different servers, and each such request may be transmitted as a sequence of packets.…”
Section: The Three-level User-based Modelmentioning
confidence: 99%
“…Web activity may be analyzed in terms of a three-layer model similar to the one proposed earlier: the aggregate traffic, the sequences of sessions from individual clients, and the requests within each session [524]. But it is also possible to dissect the data in more detail, leading to some variant of the following multilevel model [36,335,445,535,575]:…”
Section: World Wide Web Activitymentioning
confidence: 99%
See 1 more Smart Citation
“…Users interact with computer systems in periods of continuous activity known as sessions [8,1,18]. For parallel systems schedulers, a session is made of one or more job submissions.…”
Section: The Structure Of Sessionsmentioning
confidence: 99%
“…Hlavacs et al [8] presented a framework for modeling user behavior in interactive computer systems, using sessions, applications, and commands, which are initiated synchronously. An implementation of the framework for generating workload for network traffic simulation was presented in [7].…”
Section: Related Workmentioning
confidence: 99%