Energy Dumpster Diving

نویسندگان

  • Maria A. Kazandjieva
  • Brandon Heller
  • Philip Levis
  • Christos Kozyrakis
چکیده

Power data alone cannot identify sources of energy inefficiency. However, correlating power data with utilization statistics can reveal where power is used well and where it is wasted. We describe a sensing infrastructure, PowerNet, that monitors power and utilization in a building environment. The deployment includes both wired and wireless sensors and covers offices, networking closets, and server racks. We present PowerNet’s architecture, then generate initial insights from each monitored environment. Analyzing PowerNet data traces identifies contexts where electricity consumption can be reduced without cost, and others which call for rethinking system designs altogether.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linguistic Dumpster Diving: Geographical Classification of Arabic Text

In many applied natural language processing tasks, information is thrown out. For example, in speech recognition systems, prosodic information is commonly discarded; in information retrieval systems, a document is commonly treated as an unordered bag of words and syntactic information is thrown out; and in machine translation systems, pragmatic information (e.g., topic-comment structure and ref...

متن کامل

Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista

Analysis of deleted files often provides useful information for the forensic computer examiner. Knowing where to find the deleted files, and how to interpret the metadata associated with the file’s deletion, make up the cornerstone of a successful forensic computer examination. Much like an office trash-can, the Microsoft Windows Recycle Bin is a temporary holding container for files that have ...

متن کامل

Dumpster diving in RNA - sequencing to find the source of every last read

High throughput RNA sequencing technologies have provided invaluable research opportunities across distinct scientific domains by producing quantitative readouts of the transcriptional activity of both entire cellular populations and single cells. The majority of RNA-Seq analyses begin by mapping each experimentally produced sequence (i.e., read) to a set of annotated reference sequences for th...

متن کامل

Taxonomy for Computer Security Incidents

The adaptation and extension is necessary to apply the CERT-taxonomy to malware in order to categorise the threat (e.g., Trojan horses, Viruses etc.) as a basis for countermeasures. For the adaptation of the taxonomy to include malware a new entry in the tools section is needed (malicious software). This entry will cover the Trojan horses mentioned earlier. The proposed extension of the CERT-ta...

متن کامل

The energetic costs of diving in Aedes aegypti and Aedes albopictus pupae.

Undisturbed mosquito pupae rest at the water surface and respond to passing shadows or vibrations by diving. Pupae do not feed and rely solely on energy stored from the larval stage. The ability of a newly emerged adult mosquito to survive, and therefore to transmit disease, depends on these energy reserves. Earlier studies of diving behavior in Aedes aegypti, Ae. albopictus, and Ae. triseriatu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009