• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 585
Next 10 →

When Is "Nearest Neighbor" Meaningful?

by Kevin Beyer, Jonathan Goldstein, Raghu Ramakrishnan, Uri Shaft - In Int. Conf. on Database Theory , 1999
"... . We explore the effect of dimensionality on the "nearest neighbor " problem. We show that under a broad set of conditions (much broader than independent and identically distributed dimensions), as dimensionality increases, the distance to the nearest data point approaches the distance ..."
Abstract - Cited by 408 (2 self) - Add to MetaCart
meaningful; we illustrate this point by identifying some high-dimensional workloads for which this effect does not occur. However, our results do emphasize that the methodology used almost universally in the database literature to evaluate high-dimensional indexing techniques is flawed, and should

Variability in Architectural Simulations of Multi-threaded Workloads

by Alaa R. Alameldeen, David A. Wood - In Proceedings of the Ninth IEEE Symposium on High-Performance Computer Architecture , 2003
"... Multi-threaded commercial workloads implement many important internet services. Consequently, these workloads are increasingly used to evaluate the performance of uniprocessor and multiprocessor system designs. This paper identifies performance variability as a potentially major challenge for archit ..."
Abstract - Cited by 136 (12 self) - Add to MetaCart
for architectural simulation studies using these workloads. Variability refers to the differences between multiple estimates of a workload 's performance. Time variability occurs when a workload exhibits different characteristics during different phases of a single run. Space variability occurs when small

Algorithms for scheduling imprecise computations

by Jane W. S. Liu, Kwei-jay Lin, Wei-kuan Shih, Albert Chuang-shi Yu - IEEE Computer , 1991
"... n a hard real-time cyctem, every time-T critical task must meet its timing con-1 straint, typically specified as its deadline. (A task is a granule of computa-tion treated by the scheduler as a unit of work to be allocated processor time, or scheduled.) If any time-critical task fails to complete an ..."
Abstract - Cited by 256 (17 self) - Add to MetaCart
and produce its result by its deadline, a timing fault occurs and the task's result is of little or no use. Such factors as variations in the processing times of dynamic algorithms make meeting all deadlines at all times difficult. The imprecise computation te~hniquel-~ can minimize this difficulty

Backtracking intrusions

by Samuel T. King, Peter M. Chen , 2003
"... Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in ..."
Abstract - Cited by 240 (11 self) - Add to MetaCart
Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred

Towards an Index of Opportunity: Understanding Changes in Mental Workload during Task Execution

by Shamsi T. Iqbal, Piotr D. Adamczyk, Xianjun Sam Zheng, Brian P. Bailey - In Proc of CHI 2005, ACM Press , 2005
"... To contribute to systems that reason about human attention, our work empirically demonstrates how a user’s mental workload changes during task execution. We conducted a study where users performed interactive, hierarchical tasks while mental workload was measured through the use of pupil size. Resul ..."
Abstract - Cited by 66 (12 self) - Add to MetaCart
level of a task model, and (v) effective understanding of why changes in workload occur requires that the measure be tightly coupled to a validated task model. From the results, we show how to map mental workload onto a computational Index of Opportunity that systems can use to better reason about human

Mitigating congestion in wireless sensor networks

by Bret Hull, Kyle Jamieson, Hari Balakrishnan - in SenSys , 2004
"... Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality to degrade and loss rates to rise, leads to buffer drops and increased delays (as in wired networks), and tends to be gross ..."
Abstract - Cited by 192 (3 self) - Add to MetaCart
Network congestion occurs when offered traffic load exceeds available capacity at any point in a network. In wireless sensor networks, congestion causes overall channel quality to degrade and loss rates to rise, leads to buffer drops and increased delays (as in wired networks), and tends

UMR: A Multi-Round Algorithm for Scheduling Divisible Workloads

by Yang Yang, Henri Casanova - In Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS’03 , 2003
"... Divisible load applications occur in many fields of science and engineering, can be eas-ily parallelized in a master-worker fashion, but pose several scheduling challenges. While a number of approaches have been proposed that allocate work to workers in a single round, using multiple rounds improves ..."
Abstract - Cited by 82 (7 self) - Add to MetaCart
Divisible load applications occur in many fields of science and engineering, can be eas-ily parallelized in a master-worker fashion, but pose several scheduling challenges. While a number of approaches have been proposed that allocate work to workers in a single round, using multiple rounds

Workload Sanitation for Performance Evaluation

by unknown authors
"... The performance of computer systems depends, among other things, on the workload. Performance evaluations are therefore often done using logs of workloads on current productions systems, under the assumption that such real workloads are representative and reliable; likewise, workload modeling is typ ..."
Abstract - Add to MetaCart
workload with such anomalies in effect emphasizes rare and unique events (e.g. occurring for a few days out of two years of logged data), and risks optimizing the design decision for the anomalous workload at the expense of the normal workload. Thus we claim that such anomalies should be removed from

Monitoring of mental workload levels

by Burcu Cinaz, Roberto La Marca, Bert Arnrich, Gerhard Tröster - in Proceedings of IADIS eHealth Conference , 2010
"... Mobile healthcare applications offer new opportunities to prevent long-term health damage due to increased mental workload by continuously monitoring physiological signs related to prolonged high workload and providing just-in-time feedback. In order to achieve a day-by-day quantification of mental ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
load, first different load levels which occur during a workday have to be discriminated. This work goes one step towards this goal: we present our experiment design and preliminary results in discriminating different levels of mental workload based on heart rate features obtained from a mobile ECG

SCALING LIMITS FOR WORKLOAD PROCESS

by Thomas Mikosch, Gennady Samorodnitsky , 2006
"... We study different scaling behavior of a very general telecommunications workload process. The activities of a telecommunication system are described by a marked point process ((Tn, Zn))n∈Z, where Tn is the arrival time of a packet brought to the system or the starting time of the activity of an i ..."
Abstract - Add to MetaCart
on the scaling behavior of workload processes in telecommunications, fractional Brownian motion or infinite variance Lévy stable motion can occur in the scaling limit. However, the fractional Brownian motion is a much more robust limit than the stable motion, and many other limits may occur as well.
Next 10 →
Results 1 - 10 of 585
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University