scispace - formally typeset
T

Tracy Kimbrel

Researcher at IBM

Publications -  34
Citations -  2013

Tracy Kimbrel is an academic researcher from IBM. The author has contributed to research in topics: Flow shop scheduling & Scheduling (computing). The author has an hindex of 20, co-authored 34 publications receiving 1982 citations. Previous affiliations of Tracy Kimbrel include National Science Foundation & University of Washington.

Papers
More filters
Journal ArticleDOI

Speed scaling to manage energy and temperature

TL;DR: The study of speed scaling to manage temperature is initiated and it is shown that the optimal temperature schedule can be computed offline in polynomial-time using the Ellipsoid algorithm and that no deterministic online algorithm can have a better competitive ratio.
Proceedings ArticleDOI

Dynamic placement for clustered web applications

TL;DR: A middleware clustering technology capable of allocating resources to web applications through dynamic application instance placement, which aims to minimize the number of placement changes and keep resource utilization balanced across all server machines.
Proceedings ArticleDOI

Dynamic speed scaling to manage energy and temperature

TL;DR: This paper considers online speed scaling algorithms to minimize the energy used subject to the constraint that every job finishes by its deadline, and provides a tight bound on the competitive ratio of the previously proposed optimal available algorithm.
Book ChapterDOI

Dynamic application placement under service and memory constraints

TL;DR: The system environment where this problem arises is described, a heuristic algorithm is presented to solve it, and an experimental analysis comparing the algorithm to previously known algorithms indicates that the new algorithm performs much better.

A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching (CMU-CS-96-174)

TL;DR: In this paper, the effects of several combined prefetching and caching strategies for systems with multiple disks are investigated using disk-accurate traced-riven simulation, and the performance characteristics of each of the algorithms in cases in which applications provide full advance knowledge of accesses using hints.