Institution
Hewlett-Packard
Company•Palo Alto, California, United States•
About: Hewlett-Packard is a company organization based out in Palo Alto, California, United States. It is known for research contribution in the topics: Signal & Substrate (printing). The organization has 34663 authors who have published 59808 publications receiving 1467218 citations. The organization is also known as: Hewlett Packard & Hewlett-Packard Company.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, a range of fluctuation and large deviations results for the logarithm of the characteristic polynomial Z of a random N×N unitary matrix are presented.
Abstract: We present a range of fluctuation and large deviations results for the logarithm of the characteristic polynomial Z of a random N×N unitary matrix, as N→∞ First we show that \(\), evaluated at a finite set of distinct points, is asymptotically a collection of iid complex normal random variables This leads to a refinement of a recent central limit theorem due to Keating and Snaith, and also explains the covariance structure of the eigenvalue counting function Next we obtain a central limit theorem for ln Z in a Sobolev space of generalised functions on the unit circle In this limiting regime, lower-order terms which reflect the global covariance structure are no longer negligible and feature in the covariance structure of the limiting Gaussian measure Large deviations results for ln Z/A, evaluated at a finite set of distinct points, can be obtained for \(\) For higher-order scalings we obtain large deviations results for ln Z/A evaluated at a single point There is a phase transition at A= ln N (which only applies to negative deviations of the real part) reflecting a switch from global to local conspiracy
241 citations
•
16 Mar 1999TL;DR: In this article, a multi-level resource manager hierarchy is proposed for providing resource management in workflow processing of an enterprise, which includes local resource managers (LRMs) that include data to track individual resources and an upper level includes at least one resource manager having data that represents an enterprise-wide view of resource capabilities.
Abstract: A method and a system for providing resource management in workflow processing of an enterprise include a multi-level resource manager hierarchy. An upper level includes at least one resource manager having data that represents an enterprise-wide view of resource capabilities. A subordinate second level of resource managers provides partial views of the resource capabilities of the enterprise. These partial views may be based upon organizational or physical boundaries. At a lowermost level of resource managers are local resource managers (LRMs) that include data to track individual resources. Above this lowermost level, the resource managers in the hierarchy track the resources based upon types of resources. Thus, a second level resource manager is configured to be aware of availability of a resource type, but not the availability of an individual resource. Also above the lowermost level, the resource managers are configured to exchange requests for the resources using a number of different messages. A Plead message is used to send a request to a higher level manager. On the other hand, a Delegate message is used to send a request to a lower level manager. A Refer message allows a request to be sent horizontally. Report messages are sent among resource managers to allow updates of cache entries regarding capabilities of other resource managers.
241 citations
••
01 Nov 2013TL;DR: Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
Abstract: Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
240 citations
••
01 Dec 2008TL;DR: An automated model generation procedure effectively characterizes the different virtualization overheads of two diverse hardware platforms and that the models have median prediction error of less than 5% for both the RUBiS and TPC-W benchmarks.
Abstract: Next Generation Data Centers are transforming labor-intensive, hard-coded systems into shared, virtualized, automated, and fully managed adaptive infrastructures. Virtualization technologies promise great opportunities for reducing energy and hardware costs through server consolidation. However, to safely transition an application running natively on real hardware to a virtualized environment, one needs to estimate the additional resource requirements incurred by virtualization overheads.In this work, we design a general approach for estimating the resource requirements of applications when they are transferred to a virtual environment. Our approach has two key components: a set of microbench-marks to profile the different types of virtualization overhead on a given platform, and a regression-based model that maps the native system usage profile into a virtualized one. This derived model can be used for estimating resource requirements of any application to be virtualized on a given platform. Our approach aims to eliminate error-prone manual processes and presents a fully automated solution. We illustrate the effectiveness of our methodology using Xen virtual machine monitor. Our evaluation shows that our automated model generation procedure effectively characterizes the different virtualization overheads of two diverse hardware platforms and that the models have median prediction error of less than 5% for both the RUBiS and TPC-W benchmarks.
240 citations
••
01 May 1993TL;DR: The implications of the interconnected search pattern, triggers and stop conditions, common analysis techniques, and intermediary roles for the design of information access systems are discussed.
Abstract: We studied the uses of information search results by regular clients of professional intermediaries. The clients in our study engaged in three different types of searches: (1) monitoring a well-known topic or set of variables over time, (2) following an information-gathering plan suggested by a typical approach to the task at hand, and (3) exploring a topic in an undirected fashion. In most cases, a single search evolved into a series of interconnected searches, usually beginning with a high-level overview. We identified a set of common triggers and stop conditions for further search steps. We also observed a set of common operations that clients used to analyze search results. In some settings, the number of search iterations was reduced by restructuring the work done by intermediaries. We discuss the implications of the interconnected search pattern, triggers and stop conditions, common analysis techniques, and intermediary roles for the design of information access systems.
240 citations
Authors
Showing all 34676 results
Name | H-index | Papers | Citations |
---|---|---|---|
Andrew White | 149 | 1494 | 113874 |
Stephen R. Forrest | 148 | 1041 | 111816 |
Rafi Ahmed | 146 | 633 | 93190 |
Leonidas J. Guibas | 124 | 691 | 79200 |
Chenming Hu | 119 | 1296 | 57264 |
Robert E. Tarjan | 114 | 400 | 67305 |
Hong-Jiang Zhang | 112 | 461 | 49068 |
Ching-Ping Wong | 106 | 1128 | 42835 |
Guillermo Sapiro | 104 | 667 | 70128 |
James R. Heath | 103 | 425 | 58548 |
Arun Majumdar | 102 | 459 | 52464 |
Luca Benini | 101 | 1453 | 47862 |
R. Stanley Williams | 100 | 605 | 46448 |
David M. Blei | 98 | 378 | 111547 |
Wei-Ying Ma | 97 | 464 | 40914 |