Search results for "Tribute"

showing 10 items of 1455 documents

New dispatching strategy for the integration of active-demand and distributed storage in the electricity market

2015

The proliferation of Distributed Generation (DG) in power systems calls for a redesign of electricity network management, which should be able to accommodate large amounts of intermittent generation. This issue requires a discussion about the current dispatching regulation, giving distributed storage systems and qualified electricity consumption the opportunity to provide ancillary services to the distribution grid. In this work, a new dispatching strategy for the integration of active-demand and distributed storage in the Italian electricity market is presented. The strategy is focused on a distribution Smart Grid (SG), where customers can indirectly participate to the Day-Ahead (DA) and t…

Demand responsebusiness.industryDispatching strategySmart gridEnvironmental economicsSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaStand-alone power systemSmart gridElectricity marketStorage systemOrder (exchange)Distributed generationDistributed data storeElectricity marketElectricitybusinessElectricity retailing2015 AEIT International Annual Conference (AEIT)
researchProduct

Bayesian Game Model: Demand Side Management for Residential Consumers with Electric Vehicles

2019

This paper proposes the game theory enabled approach for the integration of electric vehicles for demand side management (DSM). Demand side management is very complex with conventional approaches. In order to the efficient mechanism of a game theory enabled approach may resolve the complexity. With the increased penetration level of electric vehicles it will be difficult to control grid-to-vehicle integration. The Bayesian game theory provides the solution of such problems in an organized manner. In the presence of distributed energy resources, Electric vehicles will play an important role to stabilize the grid integration. Electric Vehicles consume power during off-peak load period and inj…

Demand sideBayesian gameSmart gridOperations researchbusiness.industryComputer sciencePeak loadDistributed generationbusinessGridGame theory
researchProduct

Denoising 3D Models with Attributes using Soft Thresholding

2004

International audience; Recent advances in scanning and acquisition technologies allow the construction of complex models from real world scenes. However, the data of those models are generally corrupted by measurement errors. This paper describes an efficient single pass algorithm for denoising irregular meshes of scanned 3D model surfaces. In this algorithm, the frequency content of the model is assessed by a multiresolution analysis that requires only 1-ring neighbourhood without any particular parameterization of the model faces. Denoising is achieved by applying the soft thresholding method to the detail coefficients given by the multiresolution analysis. Our method is suitable for irr…

Denoisingsurface attributesirregular mesh[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR]ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]multiresolution analysis[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]Computer Science::Computer Vision and Pattern Recognitionsoft thresholdingComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Random Slicing: Efficient and Scalable Data Placement for Large-Scale Storage Systems

2014

The ever-growing amount of data requires highly scalable storage solutions. The most flexible approach is to use storage pools that can be expanded and scaled down by adding or removing storage devices. To make this approach usable, it is necessary to provide a solution to locate data items in such a dynamic environment. This article presents and evaluates the Random Slicing strategy, which incorporates lessons learned from table-based, rule-based, and pseudo-randomized hashing strategies and is able to provide a simple and efficient strategy that scales up to handle exascale data. Random Slicing keeps a small table with information about previous storage system insert and remove operations…

DesignComputer scienceDistributed computingPerformancestorage managementHash function0102 computer and information sciences02 engineering and technologyParallel computingUSable01 natural sciencesSlicingrandomized data distributionAffordable and Clean Energy0202 electrical engineering electronic engineering information engineeringRandomnessExperimentationscalabilityPseudorandom number generatorbusiness.industry020206 networking & telecommunicationsReliabilityData FormatPRNG010201 computation theory & mathematicsHardware and ArchitectureComputer data storageScalabilityTable (database)businessNetworking & Telecommunications
researchProduct

Modeling and Simulation of Network-on-Chip Systems with DEVS and DEUS

2013

Networks on-chip (NoCs) provide enhanced performance, scalability, modularity, and design productivity as compared with previous communication architectures for VLSI systems on-chip (SoCs), such as buses and dedicated signal wires. Since the NoC design space is very large and high dimensional, evaluation methodologies rely heavily on analytical modeling and simulation. Unfortunately, there is no standard modeling framework. In this paper we illustrate how to design and evaluate NoCs by integrating the Discrete Event System Specification (DEVS) modeling framework and the simulation environment called DEUS. The advantage of such an approach is that both DEVS and DEUS support modularity—the fo…

DeusModularity (networks)DEVSArticle Subjectlcsh:TComputer scienceDistributed computinglcsh:RSIGNAL (programming language)lcsh:MedicineGeneral Medicinelcsh:TechnologyGeneral Biochemistry Genetics and Molecular BiologyModeling and simulationNetwork on a chipScalabilitylcsh:Qlcsh:ScienceLevel of detailSimulationResearch ArticleGeneral Environmental ScienceThe Scientific World Journal
researchProduct

"Table 19" of "Measurement of event shape and inclusive distributions at s**(1/2) = 130-GeV and 136-GeV."

1997

2-jet rate for the Durham Algorithm.

Dijet Production133.0Astrophysics::High Energy Astrophysical PhenomenaE+ E- ScatteringIntegrated Cross SectionExclusiveHigh Energy Physics::ExperimentJet ProductionE+ E- --> 2JETCross SectionSIGComputer Science::Distributed Parallel and Cluster Computing
researchProduct

"Table 27" of "Tuning and test of fragmentation models based on identified particles and precision event shape data."

1996

Differential 2-jet rate for the Durham Algorithm. Corrected to final state particles. YCUT is the jet finding cutt-off parameter.

Dijet ProductionDN/DSIGAstrophysics::High Energy Astrophysical PhenomenaE+ E- ScatteringExclusiveHigh Energy Physics::Experiment91.2Single Differential DistributionJet ProductionE+ E- --> 2JETComputer Science::Distributed Parallel and Cluster Computing
researchProduct

Hierarchies of probabilistic and team FIN-learning

2001

AbstractA FIN-learning machine M receives successive values of the function f it is learning and at some moment outputs a conjecture which should be a correct index of f. FIN learning has two extensions: (1) If M flips fair coins and learns a function with certain probability p, we have FIN〈p〉-learning. (2) When n machines simultaneously try to learn the same function f and at least k of these machines output correct indices of f, we have learning by a [k,n]FIN team. Sometimes a team or a probabilistic learner can simulate another one, if their probabilities p1,p2 (or team success ratios k1/n1,k2/n2) are close enough (Daley et al., in: Valiant, Waranth (Eds.), Proc. 5th Annual Workshop on C…

Discrete mathematics020203 distributed computingProbabilistic learningConjectureFinGeneral Computer ScienceIndex (typography)Probabilistic logicInductive inference0102 computer and information sciences02 engineering and technologyFunction (mathematics)01 natural sciencesTheoretical Computer ScienceMoment (mathematics)Computational learning theory010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringTeam learningAlgorithmComputer Science(all)MathematicsTheoretical Computer Science
researchProduct

Balls into non-uniform bins

2014

Balls-into-bins games for uniform bins are widely used to model randomized load balancing strategies. Recently, balls-into-bins games have been analysed under the assumption that the selection probabilities for bins are not uniformly distributed. These new models are motivated by properties of many peer-to-peer (P2P) networks, which are not able to perfectly balance the load over the bins. While previous evaluations try to find strategies for uniform bins under non-uniform bin selection probabilities, this paper investigates heterogeneous bins, where the "capacities" of the bins might differ significantly. We show that heterogeneous environments can even help to distribute the load more eve…

Discrete mathematicsMathematical optimizationComputational complexity theoryComputer Networks and CommunicationsComputer scienceDistributed computingAstrophysics::Cosmology and Extragalactic AstrophysicsPhysics::Data Analysis; Statistics and ProbabilityLoad balancing (computing)BinTheoretical Computer ScienceLoad managementCapacity planningArtificial IntelligenceHardware and ArchitectureTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYBounded functionBall (bearing)Resource allocationHardware_ARITHMETICANDLOGICSTRUCTURESGame theorySoftwareMathematicsMathematicsofComputing_DISCRETEMATHEMATICS2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
researchProduct

Randomized renaming in shared memory systems.

2021

Abstract Renaming is a task in distributed computing where n processes are assigned new names from a name space of size m . The problem is called tight if m = n , and loose if m > n . In recent years renaming came to the fore again and new algorithms were developed. For tight renaming in asynchronous shared memory systems, Alistarh et al. describe a construction based on the AKS network that assigns all names within O ( log n ) steps per process. They also show that, depending on the size of the name space, loose renaming can be done considerably faster. For m = ( 1 + ϵ ) ⋅ n and constant ϵ , they achieve a step complexity of O ( log log n ) . In this paper we consider tight as well as loos…

Discrete mathematicsShared memory modelSpeedupComputer Networks and CommunicationsComputer science020206 networking & telecommunications02 engineering and technologyParallel computingTheoretical Computer ScienceRandomized algorithmTask (computing)Constant (computer programming)Shared memoryArtificial IntelligenceHardware and ArchitectureAsynchronous communicationDistributed algorithm0202 electrical engineering electronic engineering information engineeringOverhead (computing)020201 artificial intelligence & image processingSoftware
researchProduct