• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 78,432
Next 10 →

Table 3. Enhanced service time approxima- tion

in Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
by Tarek Abdelzaher, Kang G. Shin, Nina Bhatti 2002
"... In PAGE 12: ... We then take the larger of the two service times to account for the bottleneck resource. Thus, the combined expression for Ts is: Ts(x) = maxf1:604 + 0:063x; 0:093xg The accuracy of the above approximation is shown in Table3 . We can see that the approximation is accurate over most of the range of URL sizes.... In PAGE 12: ... It appears that HP-UX is optimized for long TCP transfers, making CPU service time increase sublinearly with transfer size thus falling below the linear estimate. Figure 7 compares the approximations shown in Table 2 and Table3 respectively. The total service time TN of N requests is P1 i N Tsi(xi), where xi is the requested URL size in the ith request, and Tsi(xi) is the service time of that request.... ..."
Cited by 131

Table 3. Enhanced service time approxima- tion

in Performance Guarantees for Web Server End-Systems: A Control-Theoretical Approach
by Tarek F. Abdelzaher, Kang G. Shin, Nina Bhatti 2002
"... In PAGE 12: ... We then take the larger of the two service times to account for the bottleneck resource. Thus, the combined expression for T s is: T s (x)=maxf1:604 + 0:063x;; 0:093xg The accuracy of the above approximation is shown in Table3 . We can see that the approximation is accurate over most of the range of URL sizes.... In PAGE 12: ... It appears that HP-UX is optimized for long TCP transfers, making CPU service time increase sublinearly with transfer size thus falling below the linear estimate. Figure 7 compares the approximations shown in Table 2 and Table3 respectively. The total service time T N of N requests is P 1 i N T s i (x i ), where x i is the requested URL size in the ith request, and T s i (x i ) is the service time of that request.... ..."
Cited by 131

Table 1: Enhancement Evaluation of Phantom Image

in unknown title
by unknown authors
"... In PAGE 21: ... In order to quantitatively measure the enhancement performance with di erent ap- proaches, we computed the contrast, the contrast improvement index, the noise level, the peak signal to noise ratio, and the average signal to noise ratio. Table1 , Table 2, Table 3, Table 4, Table 5, and Table 6 showed the evaluation results. The values listed in each row in these tables were computed based on the image patches which have the same location for all original and processed images.... In PAGE 21: ... These depend on the contrast of micro- calci cations to the background, the density and variety of the background in the original image. In Table1 and Table 2, it showed that the noise levels of all enhancement ROIs by these three approaches were much lower than the original ROIs. It is reasonable because background structures were removed.... In PAGE 28: ...27 List of Tables Table1 : Enhancement Evaluation of Phantom Image Table 2: Background Noise Evaluation Table 3: Contrast Evaluation Table 4: Contrast Improvement Index (CII) Evaluation Table 5: Peak Signal to Noise Ratio (PSNR) Evaluation... ..."

Table 3.3. Text detection performance (calculated in character level)

in Instructor
by Hao Wang, Hao Wang, Picaset Oy, Supervisor Prof, Jouko Lampinen

Table 6: Comparing hybrids for static and dynamic placement of sporadics.

in Hybrid Algorithms for Dynamic Schedulability Testing
by Charlie Mcelhone 1995
Cited by 2

Table 6: Comparing hybrids for static and dynamic placement of sporadics.

in Hybrid Algorithms For Dynamic Schedulability Testung
by Charlie McElhone 1995
Cited by 2

Table 1 MPEG-2 hybrid scalable bitstream using spatial and SNR scalability (24 fps)Paek (1995)

in Meeting QoS Challenges for Scalable Video Flows in Multimedia Networking
by Cristina Aurrecoechea, Andrew Campbell, Alexandros Eleftheriadis
"... In PAGE 5: ... These points are typically significantly apart, and transitions between the two are perceptually significant. Table1 Paek (1995) shows an example of hybrid scalability with spatial (E1) and SNR (E2) enhancement layers. Table 1 MPEG-2 hybrid scalable bitstream using spatial and SNR scalability (24 fps)Paek (1995)... In PAGE 7: ... Multi-layered flows are characterised by three sub-signals in the flow specification: a base layer (BL), and up to two enhancement layers (E1 and E2, respectively). Each layer is represented by a frame size, bit rate and subjective or perceptive quality of service as illustrated in Table1 . Based on these characteristics the MPEG2 coder Paek (1995) Eleftheriadis (1995) determines approximate bit rate for each sub-layer.... In PAGE 9: ...L+E1+E2 is the range of bandwidth required e.g., from 0.32 Mbps to 3 Mbps for the hybrid scalable MPEG2 flow in Table1 ). As a result, as resources become available each flow experiences the same quot;percentage increase quot; in the perceptible QoS, we call this weighted fair share.... In PAGE 9: ...nhancement can be accommodated (i.e., Bwfs(i) = E1(i) | E1(i)+E2(i) e.g., 0.83 Mbps or 2.68 Mbps from Table1 ). While in continuous mode any increment of residual bandwidth Bwfs(i) can be utilised (i.... In PAGE 9: ...g., for a frame rate of 24 frames per second as shown in Table1 the interval era is approx.... ..."
Cited by 1

Table 1: Service-based vs. event-based Protocol (encoding protocol modules). Finally, we present an example protocol stack that we have implemented to val- idate the service-based approach.

in Service Interface: A New Abstraction for Implementing and Composing Protocols
by Olivier Rütti, Paweł T. Wojciechowski, André Schiper 2006
Cited by 1

Table 3. The enhanced sliding window approach

in Optimising Selective Sampling for Bootstrapping Named Entity
by Stefan Rüping, Tobias Scheffer (eds
"... In PAGE 24: ... When only 1158 (50% ) of the patterns are provided with two views, the sM-D algorithm performs signifi- cantly better in all categories. Table3 shows how the sM-D algorithm varies for different numbers of paired patterns. (The slight improvement in clustering per- formance (with increased variance) for the paired view data in the 50% paired case is likely due to an in- creased chance of not including inappropriate pairs in the paired dataset.... In PAGE 25: ...Table3 . Average Entropy for sM-D for varying amount of two-view data.... ..."

Table 8: A comparison of placement runtimes on an island- style interconnect architecture.

in Architecture-Adaptive Routability-Driven Placement for FPGAs
by Akshay Sharma, Carl Ebeling, Scott Hauck, Senior Member 2005
"... In PAGE 27: ... Lastly, we also observed that a low-effort clustering technique might produce estimates that are comparable in quality to both heuristic and clustering-based estimates. In Table8 , we present runtime comparisons between VPR and Independence. The version of Independence used to obtain the numbers in Table 8 includes runtime enhancements based on the A* algorithm.... ..."
Cited by 5
Next 10 →
Results 11 - 20 of 78,432
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University