Search results for "RDW"
showing 10 items of 1401 documents
Comparative analysis of architectures for monitoring cloud computing infrastructures
2015
The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…
Corrigendum to “Imaginary time propagation code for large-scale two-dimensional eigenvalue problems in magnetic fields” [Comput. Phys. Comm. 184(3) (…
2016
Evaluation of legendre functions of argument greater than one
1997
Abstract In this paper we present an algorithm to evaluate Legendre functions of the first and second kinds ( P v , Q v ) for integraland half-integral order and argument greater than one. The code is based on the calculation of the continued fraction for the Q 's. the Wronskian relating P 's and Q 's and the application of forward recurrence relations for the P 's and backward recurrence for the Q 's. We also show an application of these algorithms to the evaluation of the electrostatic field due to a charged toroidal conductor at potential V .
Modeling visual sampling on in-car displays: The challenge of predicting safety-critical lapses of control
2015
In this article, we study how drivers interact with in-car interfaces, particularly by focusing on understanding driver in-car glance behavior when multitasking while driving. The work focuses on using an in-car touch screen to find a target item from a large number of unordered visual items spread across multiple screens. We first describe a cognitive model that aims to represent a driver?s visual sampling strategy when interacting with an in-car display. The proposed strategy assumes that drivers are aware of the passage of time during the search task; they try to adjust their glances at the display to a time limit, after which they switch back to the driving task; and they adjust their t…
Cloning and training collective intelligence with generative adversarial networks
2021
Industry 4.0 and highly automated critical infrastructure can be seen as cyber‐physical‐social systems controlled by the Collective Intelligence. Such systems are essential for the functioning of the society and economy. On one hand, they have flexible infrastructure of heterogeneous systems and assets. On the other hand, they are social systems, which include collaborating humans and artificial decision makers. Such (human plus machine) resources must be pre‐trained to perform their mission with high efficiency. Both human and machine learning approaches must be bridged to enable such training. The importance of these systems requires the anticipation of the potential and previously unknow…
On Brauer’s Height Zero Conjecture
2014
In this paper, the unproven half of Richard Brauer’s Height Zero Conjecture is reduced to a question on simple groups.
Circuit Lower Bounds via Ehrenfeucht-Fraisse Games
2006
In this paper we prove that the class of functions expressible by first order formulas with only two variables coincides with the class of functions computable by AC/sup 0/ circuits with a linear number of gates. We then investigate the feasibility of using Ehrenfeucht-Fraisse games to prove lower bounds for that class of circuits, as well as for general AC/sup 0/ circuits.
A code to evaluate prolate and oblate spheroidal harmonics
1998
Abstract We present a code to evaluate prolate ( P n m ( x ), Q n m ( x ); n ≥ m , x > 1) and oblate ( P n m ( ix ), Q n m ( ix ); n ≥ m , x > 0) spheroidal harmonics, that is, spherical harmonics ( n and m integers) for real arguments larger than one and for purely imaginary arguments. We start from the known values (in closed form) of P m m and P m +1 m and we apply the forward recurrence relation over n up to a given degree n = N Max . The Wronskian relating P 's and Q 's, together with the evaluation of the continued fraction for Q m+N staggeredMax m / Q m+N staggeredMax -1 m , allows the calculation of Q m+N staggeredMax m and Q m+N staggeredMax -1 m . Backward recurrence is then appli…
Rigorous Multimode Equivalent Network Representation of Multilayer Planar Circuits
2018
The objective of this paper is to extend the use of the Multimode Equivalent Network formulation, originally developed to analyze waveguide junctions, to the analysis of planar circuits that include arbitrary rectangular printed, zero thickness metallizations together with internal and external ports in the transverse plane. The theoretical derivations lead to an accurate and computationally efficient tool for the analysis of boxed, multilayer microwave printed circuits. In addition to theory, the tool developed is used here to analyze two practical examples: a dual-bandpass and a 4-pole bandpass boxed microstrip filters. Good agreement with respect to commercial software tools and measurem…
A Guaranteed performance of a green data center based on the contribution of vital nodes
2016
International audience; In order to satisfy the need for the critical computing resources, many data center architectures proposed to house a huge number of network devices. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a power-aware routing algorithm that saves energy consumption with a negligible trade-off on the performance of the network. The idea is to keep active only the source and …