scispace - formally typeset
Search or ask a question
Institution

Hewlett-Packard

CompanyPalo Alto, California, United States
About: Hewlett-Packard is a company organization based out in Palo Alto, California, United States. It is known for research contribution in the topics: Signal & Substrate (printing). The organization has 34663 authors who have published 59808 publications receiving 1467218 citations. The organization is also known as: Hewlett Packard & Hewlett-Packard Company.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a range of fluctuation and large deviations results for the logarithm of the characteristic polynomial Z of a random N×N unitary matrix are presented.
Abstract: We present a range of fluctuation and large deviations results for the logarithm of the characteristic polynomial Z of a random N×N unitary matrix, as N→∞ First we show that \(\), evaluated at a finite set of distinct points, is asymptotically a collection of iid complex normal random variables This leads to a refinement of a recent central limit theorem due to Keating and Snaith, and also explains the covariance structure of the eigenvalue counting function Next we obtain a central limit theorem for ln Z in a Sobolev space of generalised functions on the unit circle In this limiting regime, lower-order terms which reflect the global covariance structure are no longer negligible and feature in the covariance structure of the limiting Gaussian measure Large deviations results for ln Z/A, evaluated at a finite set of distinct points, can be obtained for \(\) For higher-order scalings we obtain large deviations results for ln Z/A evaluated at a single point There is a phase transition at A= ln N (which only applies to negative deviations of the real part) reflecting a switch from global to local conspiracy

241 citations

Patent
16 Mar 1999
TL;DR: In this article, a multi-level resource manager hierarchy is proposed for providing resource management in workflow processing of an enterprise, which includes local resource managers (LRMs) that include data to track individual resources and an upper level includes at least one resource manager having data that represents an enterprise-wide view of resource capabilities.
Abstract: A method and a system for providing resource management in workflow processing of an enterprise include a multi-level resource manager hierarchy. An upper level includes at least one resource manager having data that represents an enterprise-wide view of resource capabilities. A subordinate second level of resource managers provides partial views of the resource capabilities of the enterprise. These partial views may be based upon organizational or physical boundaries. At a lowermost level of resource managers are local resource managers (LRMs) that include data to track individual resources. Above this lowermost level, the resource managers in the hierarchy track the resources based upon types of resources. Thus, a second level resource manager is configured to be aware of availability of a resource type, but not the availability of an individual resource. Also above the lowermost level, the resource managers are configured to exchange requests for the resources using a number of different messages. A Plead message is used to send a request to a higher level manager. On the other hand, a Delegate message is used to send a request to a lower level manager. A Refer message allows a request to be sent horizontally. Report messages are sent among resource managers to allow updates of cache entries regarding capabilities of other resource managers.

241 citations

Journal ArticleDOI
01 Nov 2013
TL;DR: Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.
Abstract: Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mitigate and contain sophisticated attackers.

240 citations

Proceedings ArticleDOI
01 Dec 2008
TL;DR: An automated model generation procedure effectively characterizes the different virtualization overheads of two diverse hardware platforms and that the models have median prediction error of less than 5% for both the RUBiS and TPC-W benchmarks.
Abstract: Next Generation Data Centers are transforming labor-intensive, hard-coded systems into shared, virtualized, automated, and fully managed adaptive infrastructures. Virtualization technologies promise great opportunities for reducing energy and hardware costs through server consolidation. However, to safely transition an application running natively on real hardware to a virtualized environment, one needs to estimate the additional resource requirements incurred by virtualization overheads.In this work, we design a general approach for estimating the resource requirements of applications when they are transferred to a virtual environment. Our approach has two key components: a set of microbench-marks to profile the different types of virtualization overhead on a given platform, and a regression-based model that maps the native system usage profile into a virtualized one. This derived model can be used for estimating resource requirements of any application to be virtualized on a given platform. Our approach aims to eliminate error-prone manual processes and presents a fully automated solution. We illustrate the effectiveness of our methodology using Xen virtual machine monitor. Our evaluation shows that our automated model generation procedure effectively characterizes the different virtualization overheads of two diverse hardware platforms and that the models have median prediction error of less than 5% for both the RUBiS and TPC-W benchmarks.

240 citations

Proceedings ArticleDOI
01 May 1993
TL;DR: The implications of the interconnected search pattern, triggers and stop conditions, common analysis techniques, and intermediary roles for the design of information access systems are discussed.
Abstract: We studied the uses of information search results by regular clients of professional intermediaries. The clients in our study engaged in three different types of searches: (1) monitoring a well-known topic or set of variables over time, (2) following an information-gathering plan suggested by a typical approach to the task at hand, and (3) exploring a topic in an undirected fashion. In most cases, a single search evolved into a series of interconnected searches, usually beginning with a high-level overview. We identified a set of common triggers and stop conditions for further search steps. We also observed a set of common operations that clients used to analyze search results. In some settings, the number of search iterations was reduced by restructuring the work done by intermediaries. We discuss the implications of the interconnected search pattern, triggers and stop conditions, common analysis techniques, and intermediary roles for the design of information access systems.

240 citations


Authors

Showing all 34676 results

NameH-indexPapersCitations
Andrew White1491494113874
Stephen R. Forrest1481041111816
Rafi Ahmed14663393190
Leonidas J. Guibas12469179200
Chenming Hu119129657264
Robert E. Tarjan11440067305
Hong-Jiang Zhang11246149068
Ching-Ping Wong106112842835
Guillermo Sapiro10466770128
James R. Heath10342558548
Arun Majumdar10245952464
Luca Benini101145347862
R. Stanley Williams10060546448
David M. Blei98378111547
Wei-Ying Ma9746440914
Network Information
Related Institutions (5)
IBM
253.9K papers, 7.4M citations

94% related

Samsung
163.6K papers, 2M citations

90% related

Carnegie Mellon University
104.3K papers, 5.9M citations

90% related

Microsoft
86.9K papers, 4.1M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

89% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20231
202223
2021240
20201,028
20191,269
2018964