O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

[biblio02_1] [1] F. Baskett, K. Chandy, R. Muntz, and F. Palacios, “Open, closed, and mixed networks of queues with different classes of customers,” J. ACM, vol. 22, no. 2, April 1975.

[biblio02_2] [2] A. Harbitter and D. A. Menascé, “A methodology for analyzing the performance of authentication protocols,” ACM Trans. Information Systems Security, vol. 5, no. 4, November 2002, pp. 458-491.

[biblio02_3] [3] A. M. Law and W. D. Kelton, Simulation Modeling and Techniques, 3rd ed., McGraw-Hill, New York, <year>2000</year>.

[biblio02_4] [4] M. H. MacDougall, Simulating Computer Systems: Techniques and Tools, MIT Press, Cambridge, Mass., <year>1987</year>.

[biblio02_5] [5] S. M. Ross, A Course in Simulation, Macmillan, New York, <year>1990</year> ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required