Exploiting Service Usage Information for Optimizing Server Resource Management

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploiting Single-Usage for Effective Memory Management

Efficient memory management is crucial when designing high performance processors. Upon a miss, the conventional operation mode of a cache hierarchy is to retrieve the missing block from lower levels and to store it into all hierarchy levels. It is however difficult to assert that storing the block into intermediate levels will be really useful. In particular, this is unnecessary if a cache blo...

متن کامل

Bank Card Usage Prediction Exploiting Geolocation Information

We describe the solution of team ISMLL for the ECMLPKDD 2016 Discovery Challenge on Bank Card Usage for both tasks. Our solution is based on three pillars. Gradient boosted decision trees as a strong regression and classification model, an intensive search for good hyperparameter configurations and strong features that exploit geolocation information. This approach achieved the best performance...

متن کامل

Effectively Exploiting Server Log Information for Large Scale Web Sites

With the continuing growth of the Internet, an increasing number of organisations are incorporating the Web into their business activities. The appeal of a site to users in terms of both attractiveness and usability determines whether it will improve profits or cause on–line failure. It is thus vital that web site designers have access to tools that will aid them in evaluating site usage so tha...

متن کامل

Improving Performance and Server Resource Usage with Page

As web engineering evolves web based applications complexity grows in higher orders of magnitude. Is not uncommon to find in today web based applications complex and time consuming rendering algorithms that gather sparse information from distributed sources to generate a web page. A page is usually comprised of several “page fragments”. In this paper we will present an approach for caching thes...

متن کامل

Service Discovery Usage for REsource LOcation And Discovery (RELOAD)

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Internet Technology

سال: 2011

ISSN: 1533-5399,1557-6051

DOI: 10.1145/1993083.1993084