{"id":"https://openalex.org/W2121684846","doi":"https://doi.org/10.1109/eurmic.2003.1231576","title":"Modelling the performance of CORBA using layered queueing networks","display_name":"Modelling the performance of CORBA using layered queueing networks","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W2121684846","doi":"https://doi.org/10.1109/eurmic.2003.1231576","mag":"2121684846"},"language":"en","primary_location":{"id":"doi:10.1109/eurmic.2003.1231576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eurmic.2003.1231576","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat No 03CH37412) EURMIC-03","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098291813","display_name":"Verdickt","orcid":null},"institutions":[{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Verdickt","raw_affiliation_strings":["Department of information technology, Ghent University, Ghent, Belgium","Dept. of Inf. Technol., Ghent Univ., , Belgium"],"affiliations":[{"raw_affiliation_string":"Department of information technology, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]},{"raw_affiliation_string":"Dept. of Inf. Technol., Ghent Univ., , Belgium","institution_ids":["https://openalex.org/I32597200"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035191247","display_name":"Dhoedt","orcid":null},"institutions":[{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Dhoedt","raw_affiliation_strings":["Department of information technology, Ghent University, Ghent, Belgium","Dept. of Inf. Technol., Ghent Univ., , Belgium"],"affiliations":[{"raw_affiliation_string":"Department of information technology, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]},{"raw_affiliation_string":"Dept. of Inf. Technol., Ghent Univ., , Belgium","institution_ids":["https://openalex.org/I32597200"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113671264","display_name":"Gielen","orcid":null},"institutions":[{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Gielen","raw_affiliation_strings":["Department of information technology, Ghent University, Ghent, Belgium","Dept. of Inf. Technol., Ghent Univ., , Belgium"],"affiliations":[{"raw_affiliation_string":"Department of information technology, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]},{"raw_affiliation_string":"Dept. of Inf. Technol., Ghent Univ., , Belgium","institution_ids":["https://openalex.org/I32597200"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005527791","display_name":"Demeester","orcid":null},"institutions":[{"id":"https://openalex.org/I32597200","display_name":"Ghent University","ror":"https://ror.org/00cv9y106","country_code":"BE","type":"education","lineage":["https://openalex.org/I32597200"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Demeester","raw_affiliation_strings":["Department of information technology, Ghent University, Ghent, Belgium","Dept. of Inf. Technol., Ghent Univ., , Belgium"],"affiliations":[{"raw_affiliation_string":"Department of information technology, Ghent University, Ghent, Belgium","institution_ids":["https://openalex.org/I32597200"]},{"raw_affiliation_string":"Dept. of Inf. Technol., Ghent Univ., , Belgium","institution_ids":["https://openalex.org/I32597200"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5098291813"],"corresponding_institution_ids":["https://openalex.org/I32597200"],"apc_list":null,"apc_paid":null,"fwci":3.8328,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.94236274,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10715","display_name":"Distributed and Parallel Computing Systems","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/common-object-request-broker-architecture","display_name":"Common Object Request Broker Architecture","score":0.9274471998214722},{"id":"https://openalex.org/keywords/middleware","display_name":"Middleware (distributed applications)","score":0.8633029460906982},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.8384014964103699},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081839084625244},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.6783934831619263},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6416773796081543},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5333229303359985},{"id":"https://openalex.org/keywords/layered-queueing-network","display_name":"Layered queueing network","score":0.4518938362598419},{"id":"https://openalex.org/keywords/interoperable-object-reference","display_name":"Interoperable Object Reference","score":0.42659080028533936},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2866337299346924},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23111492395401},{"id":"https://openalex.org/keywords/distributed-object","display_name":"Distributed object","score":0.21901404857635498},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06692475080490112}],"concepts":[{"id":"https://openalex.org/C49312422","wikidata":"https://www.wikidata.org/wiki/Q691593","display_name":"Common Object Request Broker Architecture","level":2,"score":0.9274471998214722},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.8633029460906982},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.8384014964103699},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081839084625244},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.6783934831619263},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6416773796081543},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5333229303359985},{"id":"https://openalex.org/C33891772","wikidata":"https://www.wikidata.org/wiki/Q6505536","display_name":"Layered queueing network","level":3,"score":0.4518938362598419},{"id":"https://openalex.org/C204671669","wikidata":"https://www.wikidata.org/wiki/Q1413463","display_name":"Interoperable Object Reference","level":4,"score":0.42659080028533936},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2866337299346924},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23111492395401},{"id":"https://openalex.org/C81192388","wikidata":"https://www.wikidata.org/wiki/Q5283169","display_name":"Distributed object","level":3,"score":0.21901404857635498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06692475080490112}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eurmic.2003.1231576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eurmic.2003.1231576","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th IEEE Instrumentation Technology Conference (Cat No 03CH37412) EURMIC-03","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W34165041","https://openalex.org/W163487581","https://openalex.org/W1554130893","https://openalex.org/W2055136026","https://openalex.org/W2066798432","https://openalex.org/W2079636926","https://openalex.org/W2098406784","https://openalex.org/W2119239145","https://openalex.org/W2157578316","https://openalex.org/W2169367311","https://openalex.org/W2918016588","https://openalex.org/W4285719527","https://openalex.org/W6601399471","https://openalex.org/W6606728247","https://openalex.org/W6675232694","https://openalex.org/W7067781036"],"related_works":["https://openalex.org/W1524224399","https://openalex.org/W2372491645","https://openalex.org/W1521693992","https://openalex.org/W2230324638","https://openalex.org/W2376449037","https://openalex.org/W2171577968","https://openalex.org/W2206352446","https://openalex.org/W2237525653","https://openalex.org/W1582282797","https://openalex.org/W2157393537"],"abstract_inverted_index":{"One-of":[0],"the":[1,8,39,46,76,81,95,98,101,104,107,121],"typical":[2],"features":[3],"of":[4,10,25,38,41,89,97,103],"distributed":[5,118],"systems":[6],"is":[7,55,124],"heterogeneity":[9],"its":[11],"components":[12],"(e.g.":[13],"geographical":[14],"spreading":[15],"and":[16,100],"different":[17],"platform":[18],"architectures),":[19],"leading":[20],"to":[21,80,93],"interoperability":[22],"issues.":[23],"Many":[24],"these":[26],"are":[27,78],"handled":[28],"by":[29],"generic":[30],"middleware-based":[31],"solutions.":[32],"We":[33],"present":[34],"an":[35],"analytic":[36],"model":[37,77,99,110],"impact":[40],"using":[42,62],"such":[43],"middleware":[44,66],"on":[45],"overall":[47],"system":[48,61,67,123],"performance.":[49],"Specifically,":[50],"a":[51,59,65,86,117],"layered":[52],"queueing":[53],"network":[54],"described":[56],"that":[57],"models":[58],"client/server":[60],"CORBA":[63],"as":[64],"offering":[68],"location":[69],"transparency.":[70],"The":[71],"response":[72,83],"times":[73,84],"estimated":[74],"from":[75],"compared":[79],"measured":[82],"for":[85,115],"growing":[87],"number":[88],"clients,":[90],"in":[91,106],"order":[92],"assess":[94],"accuracy":[96],"values":[102],"parameters":[105],"model.":[108],"This":[109],"can":[111],"then":[112],"be":[113],"used":[114],"designing":[116],"application,":[119],"before":[120],"entire":[122],"installed":[125],"or":[126],"even":[127],"fully":[128],"implemented.":[129]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
