نتایج جستجو برای: reducing workload
تعداد نتایج: 266568 فیلتر نتایج به سال:
Today’s distributed data processing systems typically follow a query shipping approach and exploit data locality for reducing network traffic. In such systems the distribution of data over the cluster resources plays a significant role, and when skewed, it can harm the performance of executing applications. In this paper, we address the challenges of automatically adapting the distribution of d...
This paper addresses the problem of task allocation over a heterogeneous team of human operators and robotic agents with the object of improving mission efficiency and reducing costs. A distributed systems-level predictive approach is presented which simultaneously plans schedules for the human operators and robotic agents while accounting for agent availability, workload and coordination requi...
Wireless ad hoc networks usually have lower network throughput than wireless infrastructure networks due to the inherent nature of multi-hop communication on a shared channel in wireless ad hoc networks. Network coding is a method that can improve the network throughput by reducing the amount of workload in the network while still ensuring that all user data is transferred. With network coding,...
Task period and deadline selection are often used to adjust the workload to the available computational resources. This paper presents a method for adjusting the periods of the tasks which obtains the minimal hyper-period. Task periods are modelled as a range of possible periods. The selected periods are not constrained to be natural numbers, but can also be rational numbers. Without this limit...
Periodic broadcast and scheduled multicast have been shown to be very effective in reducing the demand on server bandwidth. While periodic broadcast is ideally suited for very popular videos, scheduled multicast is better for less demanded objects. Work has also been done to show that a hybrid of these techniques offers the best performance. Existing hybrid techniques, however, assume that the ...
A task analysis is conducted for the complex task of network security engineers, intrusion detection (ID) of computer networks. ID helps engineers protect network from harmful attacks and can be broken down into the following phases: pre-processing information, monitoring the network, analyzing attacks, and responding to attacks. Different cognitive loads are placed on the engineer at each phas...
Peer-to-peer (p2p) systems are attracting increasing attention as an efficient means of sharing data among large, diverse and dynamic sets of users. Clustering in p2p systems aims at improving query processing performance by reducing communication costs, through placing similar data at neighboring peers. In this paper, we present a distributed procedure for p2p clustering in a system where peer...
answered calls while driving a simulator. Calls were answered using a center-console-mounted phone or one of several phone designs which utilized a HUD to display the caller ID and steering-wheel-mounted buttons to activate the phone. Driving workload was manipulated by varying the curve radius and by varying the timing of the call, either 1 second before or 5 seconds after the start of a curve...
The Data List Management Library (DLML) processes data lists in parallel, balancing the workload transparently to programmers. Programmers only need to organise data into a list, use DLML functions to insert and get data items, and specify the sequential function(s) to process each data item according to the application logic. The first design of DLML was targeted for use at a single cluster. T...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید