2011
DOI: 10.1002/bltj.20490
|View full text |Cite
|
Sign up to set email alerts
|

Prediction-based load shedding for burst data streams

Abstract: detail records are generated by telephone exchanges at the end of each user session and describe the session in detail. By analyzing streams of CIMs and CDRs, telecommunication companies can develop procedures to improve the number of calls completed successfully, identify potential revenue leakage, identify the most and the least profitable services (through minutes of usage), find out how existing products are consumed by end users, and discover services to be either expanded or limited. They can also detect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Finally, we have demonstrated applications of these concepts in the public safety and health-care arenas. We are currently designing an advanced load-shedding mechanism based on prediction methods [17]; however, more extensive study is required to provide a comprehensive analysis.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, we have demonstrated applications of these concepts in the public safety and health-care arenas. We are currently designing an advanced load-shedding mechanism based on prediction methods [17]; however, more extensive study is required to provide a comprehensive analysis.…”
Section: Resultsmentioning
confidence: 99%
“…However, in the load-shedding scenarios, the query engine shedding mechanism continuously monitored all arriving tuples and simply removed those exceeding processing capabilities [17]. Hence, our similarity-based operator performed considerably better when random drop load shedding was employed, and the average number of recognized faces was higher.…”
Section: Prototype Applications In Vertical Marketsmentioning
confidence: 92%
See 2 more Smart Citations
“…New syntax was implemented to employ automatic human identification using speaker recognition by adding the ASR keyword to the using clause; i.e., select * from stream1, stream2 where attr1 similar attr2 with 0.5 using ASR . Moreover, our solution employs load‐shedding techniques to increase DSMS processing capabilities [15]. Our MMDSMS has been deployed on hosts configured with two 2.5 GHz Intel Core* i5 central processing units (CPUs) and 4.0 GB of random access memory (RAM).…”
Section: Experimental Studymentioning
confidence: 99%