Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kay S. Anderson is active.

Publication


Featured researches published by Kay S. Anderson.


winter simulation conference | 2006

SWORD: scalable and flexible workload generator for distributed data processing systems

Kay S. Anderson; Joseph Phillip Bigus; Eric Bouillet; Parijat Dube; Nagui Halim; Zhen Liu; Dimitrios Pendarakis

Workload generation is commonly employed for performance characterization, testing and benchmarking of computer systems and networks. Workload generation typically aims at simulating or emulating traffic generated by different types of applications, protocols and activities, such as Web browsing, email, chat, as well as stream multimedia traffic. We present a scalable workload generator (SWORD) that we have developed for the testing and benchmarking of high-volume data processing systems. The tool is not only scalable but is also flexible and extensible allowing the generation of workload of a variety of types of applications and of contents


Archive | 2004

System and method for optimizing a storage system to support full utilization of storage space

Kay S. Anderson; Fred Douglis; Nagui Halim; John Davis Palmer; Elizabeth Suzanne Richards; David Tao; William H. Tetzlaff; John M. Tracey; Joel L. Wolf


Archive | 2008

SYSTEM AND METHOD FOR SECURITY PLANNING WITH SOFT SECURITY CONSTRAINTS

Kay S. Anderson; Pau-Chen Cheng; Trenton Ray Jaeger; Zhen Liu; Anton V. Riabov; Pankaj Rohatgi; Angela Schuett Reninger; Grant Wagner


Archive | 2006

System and method of stream processing workflow composition using automatic planning

Kay S. Anderson; Joseph Phillip Bigus; Mark D. Feblowitz; Genady Grabarnik; Nagui Halim; Zhen Liu; Anton V. Riabov


Archive | 2004

Optimizing a storage system to support short data lifetimes

Kay S. Anderson; Fred Douglis; Nagui Halim; John Davis Palmer; Elizabeth Suzanne Richards; David Tao; William H. Tetzlaff; John M. Tracey; Joel L. Wolf


Archive | 2006

Apparatus and method of planning through generation of multiple efficient plans

Kay S. Anderson; Genady Grabarnik; Nagui Halim; Zhen Liu; Anton V. Riabov


Archive | 2009

Method of managing and mitigating security risks through planning

Kay S. Anderson; Pau-Chen Cheng; Mark D. Feblowitz; Genady Grabarnik; Shai Halevi; Nagui Halim; Trent Jaeger; Paul A. Karger; Zhen Liu; Ronald Perez; Anton V. Riabov; Pankaj Rohatgi; Angela Marie Schuett; Michael Steiner; Grant Wagner


Archive | 2006

Mitigating and managing privacy risks using planning

Kay S. Anderson; Alexandre V. Evfimievski; Mark D. Feblowitz; Genady Grabarnik; Nagui Halim; Zhen Liu; Ralf Rantzau; Anton V. Riabov; Angela Marie Schuett; Ramakrishnan Srikant; Grant Wagner


Archive | 2004

System and method for optimizing a storage system to support short data lifetimes

Kay S. Anderson; Fred Douglis; Nagui Halim; John Davis Palmer; Elizabeth Suzanne Richards; David Tao; William H. Tetzlaff; John M. Tracey; Joel L. Wolf


Archive | 2007

System and method for benchmarking correlated stream processing systems

Kay S. Anderson; Joseph Phillip Bigus; Eric Bouillet; Parijat Dube; Zhen Liu; Dimitrios Pendarakis

Researchain Logo
Decentralizing Knowledge