Search results for "Tribute"
showing 10 items of 1455 documents
New dispatching strategy for the integration of active-demand and distributed storage in the electricity market
2015
The proliferation of Distributed Generation (DG) in power systems calls for a redesign of electricity network management, which should be able to accommodate large amounts of intermittent generation. This issue requires a discussion about the current dispatching regulation, giving distributed storage systems and qualified electricity consumption the opportunity to provide ancillary services to the distribution grid. In this work, a new dispatching strategy for the integration of active-demand and distributed storage in the Italian electricity market is presented. The strategy is focused on a distribution Smart Grid (SG), where customers can indirectly participate to the Day-Ahead (DA) and t…
Bayesian Game Model: Demand Side Management for Residential Consumers with Electric Vehicles
2019
This paper proposes the game theory enabled approach for the integration of electric vehicles for demand side management (DSM). Demand side management is very complex with conventional approaches. In order to the efficient mechanism of a game theory enabled approach may resolve the complexity. With the increased penetration level of electric vehicles it will be difficult to control grid-to-vehicle integration. The Bayesian game theory provides the solution of such problems in an organized manner. In the presence of distributed energy resources, Electric vehicles will play an important role to stabilize the grid integration. Electric Vehicles consume power during off-peak load period and inj…
Denoising 3D Models with Attributes using Soft Thresholding
2004
International audience; Recent advances in scanning and acquisition technologies allow the construction of complex models from real world scenes. However, the data of those models are generally corrupted by measurement errors. This paper describes an efficient single pass algorithm for denoising irregular meshes of scanned 3D model surfaces. In this algorithm, the frequency content of the model is assessed by a multiresolution analysis that requires only 1-ring neighbourhood without any particular parameterization of the model faces. Denoising is achieved by applying the soft thresholding method to the detail coefficients given by the multiresolution analysis. Our method is suitable for irr…
Random Slicing: Efficient and Scalable Data Placement for Large-Scale Storage Systems
2014
The ever-growing amount of data requires highly scalable storage solutions. The most flexible approach is to use storage pools that can be expanded and scaled down by adding or removing storage devices. To make this approach usable, it is necessary to provide a solution to locate data items in such a dynamic environment. This article presents and evaluates the Random Slicing strategy, which incorporates lessons learned from table-based, rule-based, and pseudo-randomized hashing strategies and is able to provide a simple and efficient strategy that scales up to handle exascale data. Random Slicing keeps a small table with information about previous storage system insert and remove operations…
Modeling and Simulation of Network-on-Chip Systems with DEVS and DEUS
2013
Networks on-chip (NoCs) provide enhanced performance, scalability, modularity, and design productivity as compared with previous communication architectures for VLSI systems on-chip (SoCs), such as buses and dedicated signal wires. Since the NoC design space is very large and high dimensional, evaluation methodologies rely heavily on analytical modeling and simulation. Unfortunately, there is no standard modeling framework. In this paper we illustrate how to design and evaluate NoCs by integrating the Discrete Event System Specification (DEVS) modeling framework and the simulation environment called DEUS. The advantage of such an approach is that both DEVS and DEUS support modularity—the fo…
"Table 19" of "Measurement of event shape and inclusive distributions at s**(1/2) = 130-GeV and 136-GeV."
1997
2-jet rate for the Durham Algorithm.
"Table 27" of "Tuning and test of fragmentation models based on identified particles and precision event shape data."
1996
Differential 2-jet rate for the Durham Algorithm. Corrected to final state particles. YCUT is the jet finding cutt-off parameter.
Hierarchies of probabilistic and team FIN-learning
2001
AbstractA FIN-learning machine M receives successive values of the function f it is learning and at some moment outputs a conjecture which should be a correct index of f. FIN learning has two extensions: (1) If M flips fair coins and learns a function with certain probability p, we have FIN〈p〉-learning. (2) When n machines simultaneously try to learn the same function f and at least k of these machines output correct indices of f, we have learning by a [k,n]FIN team. Sometimes a team or a probabilistic learner can simulate another one, if their probabilities p1,p2 (or team success ratios k1/n1,k2/n2) are close enough (Daley et al., in: Valiant, Waranth (Eds.), Proc. 5th Annual Workshop on C…
Balls into non-uniform bins
2014
Balls-into-bins games for uniform bins are widely used to model randomized load balancing strategies. Recently, balls-into-bins games have been analysed under the assumption that the selection probabilities for bins are not uniformly distributed. These new models are motivated by properties of many peer-to-peer (P2P) networks, which are not able to perfectly balance the load over the bins. While previous evaluations try to find strategies for uniform bins under non-uniform bin selection probabilities, this paper investigates heterogeneous bins, where the "capacities" of the bins might differ significantly. We show that heterogeneous environments can even help to distribute the load more eve…
Randomized renaming in shared memory systems.
2021
Abstract Renaming is a task in distributed computing where n processes are assigned new names from a name space of size m . The problem is called tight if m = n , and loose if m > n . In recent years renaming came to the fore again and new algorithms were developed. For tight renaming in asynchronous shared memory systems, Alistarh et al. describe a construction based on the AKS network that assigns all names within O ( log n ) steps per process. They also show that, depending on the size of the name space, loose renaming can be done considerably faster. For m = ( 1 + ϵ ) ⋅ n and constant ϵ , they achieve a step complexity of O ( log log n ) . In this paper we consider tight as well as loos…