Animals use stochastic search strategies to find a potential nest or to localize the food source. Animals do not rely much on the environmental cues or their sensory inputs. Since their cognitive capabilities are rath...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluati...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing sys- tems that are shared for running big data applications. We an- alyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computingsystems. We detail the design of CloudRank-D that considers representative applications, di- versity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experi- ments, we demonstrate the advantages of our proposed met- tics. In several case studies, we evaluate two small-scale de- ployments of cloud computingsystems using CloudRank-D.
This paper investigates the impact of the installation and participation of conventional generating units owned by Independent Power Producers (IPPs) on the operation of the Greek competitive wholesale and retail elec...
详细信息
ISBN:
(纸本)9780889869240
This paper investigates the impact of the installation and participation of conventional generating units owned by Independent Power Producers (IPPs) on the operation of the Greek competitive wholesale and retail electricity markets. A mid-term scheduling model formulated and solved as a mixed-integer linear program (MILP) is presented. This model is based on the day-ahead market clearing algorithm of the Greek wholesale electricity market. The effect of the participation of IPPs is examined in terms of various market indicators through simulations of the Greek wholesale electricity market during the year 2012 with and without the existence of IPPs.
Most existing hashing methods adopt some projection functions to project the original data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit (zero or one) by...
详细信息
ISBN:
(纸本)9781627480031
Most existing hashing methods adopt some projection functions to project the original data into several dimensions of real values, and then each of these projected dimensions is quantized into one bit (zero or one) by thresholding. Typically, the variances of different projected dimensions are different for existing projection functions such as principal component analysis (PCA). Using the same number of bits for different projected dimensions is unreasonable because larger-variance dimensions will carry more information. Although this viewpoint has been widely accepted by many researchers, it is still not verified by either theory or experiment because no methods have been proposed to find a projection with equal variances for different dimensions. In this paper, we propose a novel method, called isotropic hashing (IsoHash), to learn projection functions which can produce projected dimensions with isotropic variances (equal variances). Experimental results on real data sets show that IsoHash can outperform its counterpart with different variances for different dimensions, which verifies the viewpoint that projections with isotropic variances will be better than those with anisotropic variances.
Twitter sentiment analysis (TSA) has become a hot research topic in recent years. The goal of this task is to discover the attitude or opinion of the tweets, which is typically formulated as a machine learning based t...
详细信息
Hashing, which tries to learn similarity-preserving binary codes for data representation, has been widely used for efficient nearest neighbor search in massive databases due to its fast query speed and low storage cos...
详细信息
Millions of web users today employ their Facebook accounts to sign into more than one million relying party (RP) web-sites. This web-based single sign-on (SSO) scheme is enabled by OAuth 2.0, a web resource authorizat...
详细信息
The Gallager's random coding error exponent for space-time block codes (STBC) over multiple-input multiple-output (MIMO) block-fading channels, with Gaussian input distribution, is investigated. Gallager's err...
详细信息
The Gallager's random coding error exponent for space-time block codes (STBC) over multiple-input multiple-output (MIMO) block-fading channels, with Gaussian input distribution, is investigated. Gallager's error exponent can be used to determine the required codeword length to achieve a prescribed error probability at a given rate below the channel capacity. We first provide new, analytical expressions for Gallager's exponent of STBC systems over η-μ fading channels. The Shannon capacity and cutoff rate, which can be directly derived from Gallager's exponent, are further examined. In order to get additional insights, a high signal-to-noise ratio analysis is pursued to investigate the effects of coherence time and codeword length on the error probability. For the sake of completeness, we provide the link to previous known results on Rayleigh and Nakagami-m fading channels.
We analyze the performance of a cell averaging constant false alarm rate (CA-CFAR) receiver that operates in a heavy-tailed clutter environment that is modeled by an alpha-stable distribution. Stable distributions are...
详细信息
We analyze the performance of a cell averaging constant false alarm rate (CA-CFAR) receiver that operates in a heavy-tailed clutter environment that is modeled by an alpha-stable distribution. Stable distributions are usually characterized with known characteristic function but their probability distribution are not known in closed form except for some special cases of the characteristic exponent α. Therefore, previous performance studies of CFAR in alpha-stable clutter have been limited to only some very special cases of α that correspond to the Gaussian, Cauchy and Pearson distributions, for which the statistical distribution of the clutter is available in closed-form. In this paper, we derive the distribution of the receiver output for arbitrary values of α in terms of the Fox's H-function. The derived statistical distribution is useful in evaluating the false alarm and detection probabilities of the system.
暂无评论