Institution
Hewlett-Packard
Company•Palo Alto, California, United States•
About: Hewlett-Packard is a company organization based out in Palo Alto, California, United States. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 34663 authors who have published 59808 publications receiving 1467218 citations. The organization is also known as: Hewlett Packard & Hewlett-Packard Company.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the "declared" set of friends and followers as mentioned in this paper, revealing that the linked structures of social networks do not reveal actual interactions among people.
Abstract: Scholars, advertisers and political activists see massive online social networks as a representation of social interactions that can be used to study the propagation of ideas, social bond dynamics and viral marketing, among others. But the linked structures of social networks do not reveal actual interactions among people. Scarcity of attention and the daily rythms of life and work makes people default to interacting with those few that matter and that reciprocate their attention. A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the “declared” set of friends and followers.
787 citations
••
TL;DR: The nature of the oxide electroforming as an electro-reduction and vacancy creation process caused by high electric fields and enhanced by electrical Joule heating is explained with direct experimental evidence.
Abstract: Metal and semiconductor oxides are ubiquitous electronic materials. Normally insulating, oxides can change behavior under high electric fields—through ‘electroforming’ or ‘breakdown’—critically affecting CMOS (complementary metal‐oxide‐semiconductor) logic, DRAM (dynamic random access memory) and flash memory, and tunnel barrier oxides. An initial irreversible electroforming process has been invariably required for obtaining metal oxide resistance switches, which may open urgently needed new avenues for advanced computer memory and logic circuits including ultra-dense non-volatile random access memory (NVRAM) and adaptive neuromorphic logic circuits. This electrical switching arises from the coupled motion of electrons and ions within the oxide material, as one of the first recognized examples of a memristor (memory‐resistor) device, the fourth fundamental passive circuit element originally predicted in 1971 by Chua. A lack of device repeatability has limited technological implementation of oxide switches, however. Here we explain the nature of the oxide electroforming as an electro-reduction and vacancy creation process caused by high electric fields and enhanced by electrical Joule heating with direct experimental evidence. Oxygen vacancies are created and drift towards the cathode, forming localized conducting channels in the oxide. Simultaneously, O 2− ions drift towards the anode where they evolve O2 gas, causing physical deformation of the junction. The problematic gas eruption and physical deformation are mitigated by shrinking to the nanoscale and controlling the electroforming voltage polarity. Better yet, electroforming problems can be largely eliminated by engineering the device structure to remove ‘bulk’ oxide effects in favor of interface-controlled electronic switching.
787 citations
••
TL;DR: This issue's articles tackle topics including architecture and management of cloud computing infrastructures, SaaS and IaaS applications, discovery of services and data in cloud computing infrastructure, and cross-platform interoperability.
Abstract: Cloud computing is a disruptive technology with profound implications not only for Internet services but also for the IT sector as a whole. Its emergence promises to streamline the on-demand provisioning of software, hardware, and data as a service, achieving economies of scale in IT solutions' deployment and operation. This issue's articles tackle topics including architecture and management of cloud computing infrastructures, SaaS and IaaS applications, discovery of services and data in cloud computing infrastructures, and cross-platform interoperability. Still, several outstanding issues exist, particularly related to SLAs, security and privacy, and power efficiency. Other open issues include ownership, data transfer bottlenecks, performance unpredictability, reliability, and software licensing issues. Finally, hosted applications' business models must show a clear pathway to monetizing cloud computing. Several companies have already built Internet consumer services such as search, social networking, Web email, and online commerce that use cloud computing infrastructure. Above all, cloud computing's still unknown "killer application" will determine many of the challenges and the solutions we must develop to make this technology work in practice.
786 citations
•
05 Jul 2011TL;DR: This paper attempts to tackle the challenges of event detection in Twitter with EDCoW (Event Detection with Clustering of Wavelet-based Signals), which builds signals for individual words by applying wavelet analysis on the frequencybased raw signals of the words.
Abstract: Twitter, as a form of social media, is fast emerging in recent years. Users are using Twitter to report real-life events. This paper focuses on detecting those events by analyzing the text stream in Twitter. Although event detection has long been a research topic, the characteristics of Twitter make it a non-trivial task. Tweets reporting such events are usually overwhelmed by high flood of meaningless “babbles”. Moreover, event detection algorithm needs to be scalable given the sheer amount of tweets. This paper attempts to tackle these challenges with EDCoW (Event Detection with Clustering of Wavelet-based Signals). EDCoW builds signals for individual words by applying wavelet analysis on the frequencybased raw signals of the words. It then filters away the trivial words by looking at their corresponding signal autocorrelations. The remaining words are then clustered to form events with a modularity-based graph partitioning technique. Experimental results show promising result of EDCoW.
784 citations
•
31 Mar 2003TL;DR: The mechanisms in Plutus to reduce the number of cryptographic keys exchanged between users by using filegroups, distinguish file read and write access, handle user revocation efficiently, and allow an untrusted server to authorize file writes are explained.
Abstract: Plutus is a cryptographic storage system that enables secure file sharing without placing much trust on the file servers. In particular, it makes novel use of cryptographic primitives to protect and share files. Plutus features highly scalable key management while allowing individual users to retain direct control over who gets access to their files. We explain the mechanisms in Plutus to reduce the number of cryptographic keys exchanged between users by using filegroups, distinguish file read and write access, handle user revocation efficiently, and allow an untrusted server to authorize file writes. We have built a prototype of Plutus on OpenAFS. Measurements of this prototype show that Plutus achieves strong security with overhead comparable to systems that encrypt all network traffic.
781 citations
Authors
Showing all 34676 results
Name | H-index | Papers | Citations |
---|---|---|---|
Andrew White | 149 | 1494 | 113874 |
Stephen R. Forrest | 148 | 1041 | 111816 |
Rafi Ahmed | 146 | 633 | 93190 |
Leonidas J. Guibas | 124 | 691 | 79200 |
Chenming Hu | 119 | 1296 | 57264 |
Robert E. Tarjan | 114 | 400 | 67305 |
Hong-Jiang Zhang | 112 | 461 | 49068 |
Ching-Ping Wong | 106 | 1128 | 42835 |
Guillermo Sapiro | 104 | 667 | 70128 |
James R. Heath | 103 | 425 | 58548 |
Arun Majumdar | 102 | 459 | 52464 |
Luca Benini | 101 | 1453 | 47862 |
R. Stanley Williams | 100 | 605 | 46448 |
David M. Blei | 98 | 378 | 111547 |
Wei-Ying Ma | 97 | 464 | 40914 |