|
Cressie, N., Shi, T., & Kang, E. L. (2010). Fixed rank filtering for spatio-temporal data. Journal of Computational and Graphical Statistics, 19(3), 724-745. [2] Cressie, N., & Johannesson, G. (2008). Fixed rank kriging for very large spatial data sets. Journal of the Royal statistical Society: Series B (Statistical Methodology), 70(1), 209-226. [3] Dempster, A. P., Laird, N. M. and Rubin, D. B. (1977) Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B 39, 1–38. [4] Fan, J., & Li, R. (2001). Variable selection via nonconcave penalized likelihood and its oracle properties. Journal of the American Statistical Association, 96(456),1348-1360. [5] Katzfuss, M. and Cressie, N. (2009) Maximum likelihood estimation of covariance parameters in the spatial-random-effects model. In Proceedings of the Joint Statistical Meetings Alexandria: American Statistical Association, pp. 3378-90 [6] Katzfuss, M. and Cressie, N. (2011) Katzfuss, M., & Cressie, N. (2012). Bayesian hierarchical spatiotemporal smoothing for very large datasets. Environmetrics, 23(1), 94-107. [7] Katzfuss, M., & Cressie, N. (2011). Spatiotemporal smoothing and EM estimation for massive remote sensing data sets. Journal of Time Series Analysis, 32(4),430-446. [8] Shumway, R. H., & Stoffer, D. S. (2010). Time Series Analysis and Its Applications with R Examples. (3rd ed), New York: Springer. [9] Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), 267-288. [10] Wang, H. (2009). Forward regression for ultra-high dimensional variable screening. Journal of the American Statistical Association, 104(488), 1512-1524. [11] Zou, H. (2006).llocation in distributed clouds," in IEEE International Conference on Computer Communications, 2012.
[7] D. Breitgand and A. Epstein, "Improving consolidation of virtual machines with risk-aware bandwidth oversubscription in compute clouds," in IEEE International Conference on Computer Communications, 2012.
[8] H. Yanagisawa, T. Osogami, and R. Raymond, "Dependable virtual machine allocation," in IEEE International Conference on Computer Communications, 2013.
[9] J. Jiang, T. Lan, S. Ha, M. Chen, and M. Chiang, "Joint vm placement and routing for data center traffic engineering," in IEEE International Conference on Computer Communications, 2012.
[10] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., 1979.
[11] B. Urgaonkar, P. Shenoy, and T. Roscoe, "Resource overbooking and application profiling in shared hosting platforms," ACM Special Interest Group on Operating Systems Operating Systems Review, vol. 36, pp. 239-254, 2002.
[12] M. Al-Fares, A. Loukissas, and A. Vahdat, "A scalable, commodity data center network architecture,' in ACM Special Interest Group on Data Communications, 2008.
[13] The PIK log. [Online]. Available: http://www.cs.huji.ac.il/labs/parallel/workload/l_pik_iplex/index.html
[14] T. Nanri and M. Kurokawa, "Efficient runtime algorithm selection of collective communication with topology-based performance models," in International Conference on Parallel and Distributed Processing Techniques and Applications, 2012.
[15] G. Wang and T. Ng, "The impact of virtualization on network performance of Amazon EC2 data center," in IEEE International Conference on Computer Communications, 2010.
[16] Advanced center for computing and communication, RIKEN. [Online]. Available: http://accc.riken.jp/ricc_e/
[17] V. Shrivastava, P. Zerfos, K.-W. Lee, H. Jamjoom, Y.-H. Liu, and S. Banerjee, "Application-aware virtual machine migration in data centers," in IEEE International Conference on Computer Communications, 2011. |