Results 1 - 10
of
1,408
A Maximum Entropy approach to Natural Language Processing
- COMPUTATIONAL LINGUISTICS
, 1996
"... The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we des ..."
Abstract
-
Cited by 1366 (5 self)
- Add to MetaCart
The concept of maximum entropy can be traced back along multiple threads to Biblical times. Only recently, however, have computers become powerful enough to permit the widescale application of this concept to real world problems in statistical estimation and pattern recognition. In this paper we
On the Placement of Web Server Replicas
- In Proceedings of IEEE INFOCOM
, 2001
"... Abstract—Recently there has been an increasing deployment of content distribution networks (CDNs) that offer hosting services to Web content providers. CDNs deploy a set of servers distributed throughout the Internet and replicate provider content across these servers for better performance and avai ..."
Abstract
-
Cited by 359 (9 self)
- Add to MetaCart
the placement algorithms using both synthetic and real network topologies, as well as Web server traces, and show that the placement of Web replicas is crucial to CDN performance. We also address a number of practical issues when using these algorithms, such as their sensitivity to imperfect knowledge about
Execution Patterns in Object-Oriented Visualization
- In Proceedings Conference on Object-Oriented Technologies and Systems (COOTS ’98
, 1998
"... Execution patterns are a new metaphor for visualizing execution traces of object-oriented programs. We present an execution pattern view that lets a programmer visualize and explore a program's execution at varied levels of abstraction. The view employs visual, navigational, and analytical tech ..."
Abstract
-
Cited by 68 (4 self)
- Add to MetaCart
techniques that accommodate lengthy, real-world traces. By classifying repetitive behavior automatically into high-order execution patterns, we drastically reduce the information a programmer must assimilate, with little loss of insight.
The ONE Simulator for DTN Protocol Evaluation
- In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUtools
, 2009
"... Delay-tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performa ..."
Abstract
-
Cited by 156 (13 self)
- Add to MetaCart
protocols. It allows users to create scenarios based upon different synthetic movement models and real-world traces and offers a framework for implementing routing and application protocols (already including six well-known routing protocols). Interactive visualization and post-processing tools support
A TinyOS Based Tool for Gathering Real-World Wireless Traces
"... This paper presents a user-friendly TinyOS and Java-based tool for hassel-free collection of real-world wireless traces from any real-world environment (indoor or outdoor). Categories and Subject Descriptors ..."
Abstract
- Add to MetaCart
This paper presents a user-friendly TinyOS and Java-based tool for hassel-free collection of real-world wireless traces from any real-world environment (indoor or outdoor). Categories and Subject Descriptors
BUBBLE Rap: Social-based forwarding in delay tolerant networks
- in Proc. ACM MobiHoc
, 2008
"... In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heteroge ..."
Abstract
-
Cited by 284 (31 self)
- Add to MetaCart
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction
Opportunistic Data Dissemination Using Real-World User Mobility Traces
"... Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance of a profile-based data dissemination scheme. We use a 2step simulation approach which combines realistic user mobility trac ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
traces with synthetic mobility models. We consider different system configurations and evaluate their effects on the data dissemination scheme. In particular, we look at how different wireless networking technologies affect the system and how much can we benefit from the installation of fixed information
Generation of High Bandwidth Network Traffic Traces
- In In Proceedings of MASCOTS
"... High bandwidth network traffic traces are needed to understand the behavior of high speed networks (such as the Internet backbone). However, the implementation of a mechanism to collect such traces is difficult in practice. In the absence of real traces, tools to generate high bandwidth traces would ..."
Abstract
-
Cited by 16 (8 self)
- Add to MetaCart
would aid the study of high speed network behavior. We describe three methods of generating high bandwidth network traces: scaling low bandwidth network traffic traces, merging multiple low bandwidth traces and generating traces through simulation by scaling a structural model of real world traces. We
Do Incentives Build Robustness in BitTorrent
- In NSDI’07
, 2007
"... A fundamental problem with many peer-to-peer systems is the tendency for users to “free ride”—to consume resources without contributing to the system. The popular file distribution tool BitTorrent was explicitly designed to address this problem, using a tit-for-tat reciprocity strategy to provide po ..."
Abstract
-
Cited by 132 (11 self)
- Add to MetaCart
positive incentives for nodes to contribute resources to the swarm. While BitTorrent has been extremely successful, we show that its incentive mechanism is not robust to strategic clients. Through performance modeling parameterized by real world traces, we demonstrate that all peers contribute resources
Direct visualization of real-world light transport
- In Proceedings of Vision, Modeling, and Visualization (VMV
, 2008
"... Light transport in complex scenes with possibly intricate optical properties is difficult to grasp in-tuitively. The study of light transport has so far mainly been conducted by indirect observations. Cameras or human observers typically only sense the radiance reflected from a scene, i.e. the light ..."
Abstract
-
Cited by 4 (2 self)
- Add to MetaCart
-sualization of light transport in the real world. In the fluorescent fluid the traces of light become vis-ible as a small fraction of the energy transported along the ray is scattered out towards the viewer. We demonstrate this visualization for direct illumi-nation effects such as reflections and refractions
Results 1 - 10
of
1,408