scispace - formally typeset
Search or ask a question
Institution

Naval Postgraduate School

EducationMonterey, California, United States
About: Naval Postgraduate School is a education organization based out in Monterey, California, United States. It is known for research contribution in the topics: Tropical cyclone & Nonlinear system. The organization has 5246 authors who have published 11614 publications receiving 298300 citations. The organization is also known as: NPS & U.S. Naval Postgraduate School.


Papers
More filters
Journal ArticleDOI
TL;DR: The physical, chemical and biological perturbations in central California waters associated with the strong 1997-1998 El Nino are described and explained on the basis of time series collected from ships, moorings, tide gauges and satellites as mentioned in this paper.

262 citations

Journal ArticleDOI
TL;DR: In this paper, a global eddy resolving simulation using the Parallel Ocean Program (POP) general circulation model is presented, and the simulation represents a major step forward in high resolution ocean modeling, with applications to prediction, climate, and general ocean science.

261 citations

Proceedings ArticleDOI
30 Mar 1998
TL;DR: The author studies the performance of four mapping algorithms and concludes that the use of intelligent mapping algorithms is beneficial, even when the expected time for completion of a job is not deterministic.
Abstract: The author studies the performance of four mapping algorithms. The four algorithms include two naive ones: opportunistic load balancing (OLB), and limited best assignment (LBA), and two intelligent greedy algorithms: an O(nm) greedy algorithm, and an O(n/sup 2/m) greedy algorithm. All of these algorithms, except OLB, use expected run-times to assign jobs to machines. As expected run-times are rarely deterministic in modern networked and server based systems, he first uses experimentation to determine some plausible run-time distributions. Using these distributions, he next executes simulations to determine how the mapping algorithms perform. Performance comparisons show that the greedy algorithms produce schedules that, when executed, perform better than naive algorithms, even though the exact run-times are not available to the schedulers. He concludes that the use of intelligent mapping algorithms is beneficial, even when the expected time for completion of a job is not deterministic.

260 citations

Proceedings ArticleDOI
12 Apr 1999
TL;DR: A collection of eleven heuristics from the literature has been selected, implemented, and analyzed under one set of common assumptions and provides one even basis for comparison and insights into circumstances where one technique will outperform another.
Abstract: Heterogeneous computing (HC) environments are well suited to meet the computational demands of large, diverse groups of tasks (i.e., a meta-task). The problem of mapping (defined as matching and scheduling) these tasks onto the machines of an HC environment has been shown, in general, to be NP-complete, requiring the development of heuristic techniques. Selecting the best heuristic to use in a given environment, however, remains a difficult problem, because comparisons are often clouded by different underlying assumptions in the original studies of each heuristic. Therefore, a collection of eleven heuristics from the literature has been selected, implemented, and analyzed under one set of common assumptions. The eleven heuristics examined are opportunistic load balancing, user-directed assignment, fast greedy, min-min, max-min, greedy, genetic algorithm, simulated annealing, genetic simulated annealing, tabu, and A*. This study provides one even basis for comparison and insights into circumstances where one technique will outperform another. The evaluation procedure is specified, the heuristics are defined, and then selected results are compared.

259 citations

Book ChapterDOI
14 Apr 1997
TL;DR: A type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property, which basically states that a program output can never change as a result of modifying only inputs classified at higher levels.
Abstract: This paper presents a type system which guarantees that well-typed programs in a procedural programming language satisfy a noninterference security property. With all program inputs and outputs classified at various security levels, the property basically states that a program output, classified at some level, can never change as a result of modifying only inputs classified at higher levels. Intuitively, this means the program does not “leak” sensitive data. The property is similar to a notion introduced years ago by Goguen and Meseguer to model security in multi-level computer systems [7]. We also give an algorithm for inferring and simplifying principal types, which document the security requirements of programs.

258 citations


Authors

Showing all 5313 results

NameH-indexPapersCitations
Mingwei Chen10853651351
O. C. Zienkiewicz10745571204
Richard P. Bagozzi104347103667
Denise M. Rousseau8421850176
John Walsh8175625364
Ming C. Lin7637023466
Steven J. Ghan7520725650
Hui Zhang7520027206
Clare E. Collins7156021443
Christopher W. Fairall7129319756
Michael T. Montgomery6825814231
Tim Li6738316370
Thomas M. Antonsen6588817583
Nadia Magnenat-Thalmann6552114850
Johnny C. L. Chan6126114886
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

89% related

University of Maryland, College Park
155.9K papers, 7.2M citations

88% related

Arizona State University
109.6K papers, 4.4M citations

87% related

University of Colorado Boulder
115.1K papers, 5.3M citations

86% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202331
2022151
2021321
2020382
2019352
2018362