Search Results - "Poole, Stephen W."

Refine Results
  1. 1

    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models by Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, Yau, David K. Y.

    Published in Risk analysis (01-04-2016)
    “…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
    Get full text
    Journal Article
  2. 2
  3. 3

    A Reliable Split-Step Fourier Method for the Propagation Equation of Ultra-Fast Pulses in Single-Mode Optical Fibers by Deiterding, R., Glowinski, R., Oliver, H., Poole, S.

    Published in Journal of lightwave technology (15-06-2013)
    “…The extension to the split-step Fourier method (SSFM) for Schrödinger-type pulse propagation equations that we propose in this article is designed with the…”
    Get full text
    Journal Article
  4. 4

    Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment by Khemka, Bhavesh, Friese, Ryan, Briceno, Luis D., Siegel, Howard Jay, Maciejewski, Anthony A., Koenig, Gregory A., Groer, Chris, Okonski, Gene, Hilton, Marcia M., Rambharos, Rajendra, Poole, Steve

    Published in IEEE transactions on computers (01-08-2015)
    “…We model an oversubscribed heterogeneous computing system where tasks arrive dynamically and a scheduler maps the tasks to machines for execution. The…”
    Get full text
    Journal Article
  5. 5

    The Use and Origin of Chert on Early Mesolithic Sites in the Pennines and Rossendale by Poole, Stephen W

    Published 01-01-2020
    “…The recognition of a number of previously unknown Early Mesolithic industries, including both Star Carr and Deepcar type lithic technology in a key area for…”
    Get full text
    Dissertation
  6. 6

    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models by Rao, Nageswara S. V., Poole, Stephen W., Ma, Chris Y. T., He, Fei, Zhuang, Jun, Yau, David K. Y.

    Published in Risk analysis (06-04-2015)
    “…The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different…”
    Get full text
    Journal Article
  7. 7

    Confidence: Analyzing performance with empirical probabilities by Settlemyer, B W, Hodson, S W, Kuehn, J A, Poole, S W

    “…Variability in the performance of shared system components is a major obstacle in analyzing the effective throughput of leadership class computers. Shared file…”
    Get full text
    Conference Proceeding
  8. 8

    A mathematical analysis of the R-MAT random graph generator by Groër, Chris, Sullivan, Blair D., Poole, Steve

    Published in Networks (01-10-2011)
    “…The R‐MAT graph generator introduced by Chakrabarti et al (Int Conf Data Mining, 2004) offers a simple, fast method for generating very large directed graphs…”
    Get full text
    Journal Article
  9. 9

    Revisiting Server Energy Proportionality by Chung-Hsing Hsu, Poole, Stephen W.

    “…Server energy proportionality refers to a proposed ideal that a server consumes energy proportional to its utilization level. Since its introduction in 2007,…”
    Get full text
    Conference Proceeding
  10. 10

    Optimizing I/O forwarding techniques for extreme-scale event tracing by Ilsche, Thomas, Schuchart, Joseph, Cope, Jason, Kimpe, Dries, Jones, Terry, Knüpfer, Andreas, Iskra, Kamil, Ross, Robert, Nagel, Wolfgang E., Poole, Stephen

    Published in Cluster computing (01-03-2014)
    “…Programming development tools are a vital component for understanding the behavior of parallel applications. Event tracing is a principal ingredient to these…”
    Get full text
    Journal Article
  11. 11

    Robust split-step Fourier methods for simulating the propagation of ultra-short pulses in single- and two-mode optical communication fibers by Deiterding, Ralf, Poole, Stephen W

    Published 06-04-2015
    “…Extensions of the split-step Fourier method (SSFM) for Schr\"odinger-type pulse propagation equations for simulating femto-second pulses in single- and…”
    Get full text
    Journal Article
  12. 12

    Experimental Analysis of Flow Optimization and Data Compression for TCP Enhancement by Rao, N.S.V., Poole, S.W., Wing, W.R., Carter, S.M.

    Published in IEEE INFOCOM Workshops 2009 (01-04-2009)
    “…Flow optimization and data compression methods promise to improve TCP performance, and edge devices that implement them to transparently improve wide-area…”
    Get full text
    Conference Proceeding
  13. 13

    Experimental study of wide-area 10 Gbps IP transport technologies by Rao, N.S.V., Poole, S.W., Hicks, S.E., Kemper, C., Hodson, S., Hinkel, G., Lothian, J.

    “…A number of large-scale applications require 10 Gbps data transport rates between high-performance computing, storage and file systems, which are connected…”
    Get full text
    Conference Proceeding
  14. 14

    A technique for moving large data sets over high-performance long distance networks by Settlemyer, B. W., Dobson, J. D., Hodson, S. W., Kuehn, J. A., Poole, S. W., Ruwart, T. M.

    “…In this paper we look at the performance characteristics of three tools used to move large data sets over dedicated long distance networking infrastructure…”
    Get full text
    Conference Proceeding
  15. 15
  16. 16

    Power signatures of high-performance computing workloads by Combs, Jacob, Nazor, Jolie, Thysell, Rachelle, Santiago, Fabian, Hardwick, Matthew, Olson, Lowell, Rivoire, Suzanne, Hsu, Chung-Hsing, Poole, Stephen W.

    “…Workload-aware power management and scheduling techniques have the potential to save energy while minimizing negative impact on performance. The effectiveness…”
    Get full text
    Conference Proceeding
  17. 17

    Power measurement for high performance computing: State of the art by Chung-Hsing Hsu, Poole, S. W.

    “…Power utilization is a primary concern for high performance computing (HPC). Understanding it through physical measurements provides the critical first step to…”
    Get full text
    Conference Proceeding
  18. 18

    Application Power Signature Analysis by Chung-Hsing Hsu, Combs, Jacob, Nazor, Jolie, Santiago, Fabian, Thysell, Rachelle, Rivoire, Suzanne, Poole, Stephen W.

    “…The high-performance computing (HPC) community has been greatly concerned about energy efficiency. To address this concern, it is essential to understand and…”
    Get full text
    Conference Proceeding
  19. 19

    Cloud computing infrastructure robustness: A game theory approach by Rao, N. S. V., Poole, S. W., Fei He, Jun Zhuang, Ma, C. Y. T., Yau, D. K. Y.

    “…A cloud computing infrastructure typically consists of a number of sites that house servers and are connected to the Internet. Its operation critically depends…”
    Get full text
    Conference Proceeding
  20. 20

    Wide-area performance profiling of 10GigE and InfiniBand technologies by Rao, N.S.V., Weikuan Yu, Wing, W.R., Poole, S.W., Vetter, J.S.

    “…For wide-area high-performance applications, light-paths provide 10Gbps connectivity, and multi-core hosts with PCI-Express can drive such data rates. However,…”
    Get full text
    Conference Proceeding