|
|
|||
|
||||
OverviewThis book constitutes the revised selected papers of the 21st European Workshop on Computer Performance Engineering, EPEW 2025, held in Catania, Italy, on June 26, 2025. The 11 papers presented in this volume were carefully reviewed and selected from 15 submissions. These papers present performance evaluation of systems from a theoretical and practical viewpoint. Application of performance evaluation techniques to emerging technologies, like cyber-physical systems ranging from mobile devices and Internet-of-Things (IoT), fog and edge computing, applications to large-scale cloud computing systems, smart grids, security infrastructures, are among the topics of interest to EPEW 2025. Full Product DetailsAuthor: Laura Carnevali , Josu DoncelPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032163448ISBN 10: 3032163447 Pages: 172 Publication Date: 11 February 2026 Audience: College/higher education , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Enhancing Multiformalism Models with Rewrite Engines. .- Risk Assessment Models in Hydroelectric Plants. .- On Portability of Software Performance Solutions to the Energy Domain. .- Accelerating Mobile Inference through Fine-Grained CPU-GPU Co-Execution. .- Approximating Heavy-Tailed Distributions with a Mixture of Bernstein Phase-Type and Hyperexponential Models. .- Response time in a tandem network of two processor sharing queues. .- Performance analysis and load balancing in a multi-tier buffered cellular network. .- Performance-Aware Microservices Architecture Live Planning and Scaling. .- On Synchronous Approximations of Non-Markovian Processes with Dual Bounds. .- The Pyramis Library: Efficient Numerical Evaluation of Hierarchical UML Statecharts applied to Stochastic Workflows. .- CyberSecurity Performance Evaluation through Attack Block Diagrams.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||