1,108 research outputs found

    From Marketer-Generated Content to User-Generated Content: Evidence from Online Health Communities

    Get PDF
    How should marketers engage with social media features in online communities to shape knowledge contributions from customers in their potential markets? This is an important question because customer contributions are important drivers of business value. We examine the effect of marketer generated content in online health communities on user-generated content, using longitudinal data from a leading online health community. We focus on the firm’s practice of knowledge investment, in which its marketers provide product information or share life experience by posting in the social interaction section of online health platforms. The results demonstrate that because of knowledge investment in healthcare markets, the use of platform’s social media feature by marketer influence both the quantity and linguistics features of customer-generated content

    Autoscaling Method for Docker Swarm Towards Bursty Workload

    Get PDF
    The autoscaling mechanism of cloud computing can automatically adjust computing resources according to user needs, improve quality of service (QoS) and avoid over-provision. However, the traditional autoscaling methods suffer from oscillation and degradation of QoS when dealing with burstiness. Therefore, the autoscaling algorithm should consider the effect of bursty workloads. In this paper, we propose a novel AmRP (an autoscaling method that combines reactive and proactive mechanisms) that uses proactive scaling to launch some containers in advance, and then the reactive module performs vertical scaling based on existing containers to increase resources rapidly. Our method also integrates burst detection to alleviate the oscillation of the scaling algorithm and improve the QoS. Finally, we evaluated our approach with state-of-the-art baseline scaling methods under different workloads in a Docker Swarm cluster. Compared with the baseline methods, the experimental results show that AmRP has fewer SLA violations when dealing with bursty workloads, and its resource cost is also lower

    The nanostructure formations on the stranski krastanow film-substrate system

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Hardware-in-the-loop simulation technology of wide-band radar targets based on scattering center model

    Get PDF
    AbstractHardware-in-the-loop (HWIL) simulation technology can verify and evaluate the radar by simulating the radio frequency environment in an anechoic chamber. The HWIL simulation technology of wide-band radar targets can accurately generate wide-band radar target echo which stands for the radar target scattering characteristics and pulse modulation of radar transmitting signal. This paper analyzes the wide-band radar target scattering properties first. Since the responses of target are composed of many separate scattering centers, the target scattering characteristic is restructured by scattering centers model. Based on the scattering centers model of wide-band radar target, the wide-band radar target echo modeling and the simulation method are discussed. The wide-band radar target echo is reconstructed in real-time by convoluting the transmitting signal to the target scattering parameters. Using the digital radio frequency memory (DRFM) system, the HWIL simulation of wide-band radar target echo with high accuracy can be actualized. A typical wide-band radar target simulation is taken to demonstrate the preferable simulation effect of the reconstruction method of wide-band radar target echo. Finally, the radar target time-domain echo and high-resolution range profile (HRRP) are given. The results show that the HWIL simulation gives a high-resolution range distribution of wide-band radar target scattering centers

    The Communication Complexity of Set Intersection and Multiple Equality Testing

    Full text link
    In this paper we explore fundamental problems in randomized communication complexity such as computing Set Intersection on sets of size kk and Equality Testing between vectors of length kk. Sa\u{g}lam and Tardos and Brody et al. showed that for these types of problems, one can achieve optimal communication volume of O(k)O(k) bits, with a randomized protocol that takes O(logk)O(\log^* k) rounds. Aside from rounds and communication volume, there is a \emph{third} parameter of interest, namely the \emph{error probability} perrp_{\mathrm{err}}. It is straightforward to show that protocols for Set Intersection or Equality Testing need to send Ω(k+logperr1)\Omega(k + \log p_{\mathrm{err}}^{-1}) bits. Is it possible to simultaneously achieve optimality in all three parameters, namely O(k+logperr1)O(k + \log p_{\mathrm{err}}^{-1}) communication and O(logk)O(\log^* k) rounds? In this paper we prove that there is no universally optimal algorithm, and complement the existing round-communication tradeoffs with a new tradeoff between rounds, communication, and probability of error. In particular: 1. Any protocol for solving Multiple Equality Testing in rr rounds with failure probability 2E2^{-E} has communication volume Ω(Ek1/r)\Omega(Ek^{1/r}). 2. There exists a protocol for solving Multiple Equality Testing in r+log(k/E)r + \log^*(k/E) rounds with O(k+rEk1/r)O(k + rEk^{1/r}) communication, thereby essentially matching our lower bound and that of Sa\u{g}lam and Tardos. Our original motivation for considering perrp_{\mathrm{err}} as an independent parameter came from the problem of enumerating triangles in distributed (CONGEST\textsf{CONGEST}) networks having maximum degree Δ\Delta. We prove that this problem can be solved in O(Δ/logn+loglogΔ)O(\Delta/\log n + \log\log \Delta) time with high probability 11/poly(n)1-1/\operatorname{poly}(n).Comment: 44 page
    corecore