نتایج جستجو برای: resource usage

تعداد نتایج: 301794  

2013
Lijie Xu Jie Liu Jun Wei

MapReduce is designed as a simple and scalable framework for big data processing. Due to the lack of resource usage models, its implementation Hadoop hands over resource planning and optimizing works to users. But users also find difficulty in specifying right resource-related, especially memory-related, configurations without good knowledge of job’s memory usage. Modeling memory usage is chall...

2012
J. Andrew Royle Richard B. Chandler

11 1. Understanding space usage and resource selection is a primary focus of many studies 12 of animal populations. Usually, such studies are based on location data obtained from 13 telemetry, and resource selection functions (RSF) are used for inference. Another important 14 focus of wildlife research is estimation and modeling population size and density. Recently 15 developed spatial capture...

2005
Hyun-Goo Kang Youil Kim Taisook Han Hwansoo Han

In this paper, we present a path sensitive type system for resource usage verification. Path sensitivity is essential to model resource usage in C programs correctly and accurately. So far, most of methods to analyze this kind of property in the path sensitive way have been proposed as whole program analyses or unsound analyses. Our main contributions are as follows. First, we formalize a sound...

Journal: :European Transactions on Telecommunications 2003
Costas Courcoubetis Vasilios A. Siris George D. Stamoulis

We present an approach for constructing simple time-based tari s for Variable Bit Rate (VBR) connections from Constant Bit Rate (CBR) prices, using price multipliers that depend on the traÆc parameters of the VBR connection and re ect the resource usage of VBR connections relative to CBR connections. Our approach employs an e ective bandwidth bound as a proxy for the maximum amount of traÆc tha...

2005
Emilio Pasquale Mancini Massimiliano Rak Roberto Torella Umberto Villano

Historically, high performance systems use schedulers and intelligent resource managers in order to optimize system usage and application performance. Most of the times, applications just issue requests of resources to the central system. This centralized approach is an unnecessary constraint for a class of potentially flexible applications, whose resource usage may be modulated as a function o...

2009
Midori Sugaya Yuki Ohno Tatsuo Nakajima

In this paper, a lightweight anomaly detection infrastructure named Anomaly Detection by Resource Monitoring is presented for Information Appliances. We call it Ayaka for short. It provides a monitoring function for detecting anomalies, especially attacks which are a symptom of resource abuse, by using the resource patterns of each process. Ayaka takes a completely application black-box approac...

2004
Nadeem Jamali Xinghui Zhao

Scalable coordination is a key challenge in deploying massively multiagent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs is a model for hierarchical coordination of resource usage by multi-agent applications in a network of peer-owned resources. Programming constructs based on CyberOrgs allow resource trade and control reification w...

2015
Mohamed Elsabagh Daniel Barbará Daniel Fleck Angelos Stavrou

Software systems are often engineered and tested for functionality under normal rather than worst-case conditions. This makes the systems vulnerable to denial of service attacks, where attackers engineer conditions that result in overconsumption of resources or starvation and stalling of execution. While the security community is well familiar with volumetric resource exhaustion attacks at the ...

1997
Marty Humphrey Scott Brandt Gary Nutt Toby Berk

Multimedia applications often fail to perform as designed , when resources must be timeshared between multiple applications at run-time. To address this problem, a software architecture is investigated in which a centralized Dynamic Quality of Service Manager (DQM) mediates resource usage between the operating system and the applications. Applications are written to be able to execute at a rang...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید