Learn More
This paper develops a linguistically robust Linguistic steganography approach using synonym replacement, which converts a message into semantically innocuous text. Drawing upon linguistic criteria, this approach uses word replacement, with substitution classes based on traditional word replacement features (syntactic categories and subcategories), as well(More)
Systems for processing big data—e.g., Hadoop, Spark, and massively parallel databases—need to run workloads on behalf of multiple tenants simultaneously. The abundant disk-based storage in these systems is usually complemented by a smaller, but much faster, cache. Cache is a precious resource: Tenants who get to use cache can see two orders of magnitude(More)
In many algorithms in the field of data mining to perform clustering of given data, notion of 'cluster similarity' is used to a large extent. Given a set of clusters, we may want to merge them to form a smaller number of clusters; particular applications being Hierarchical clustering algorithms and ideas like SPARCL which is the motivation behind this(More)
1. INTRODUCTION Data analytics clusters are typically set up with a centralized resource manager(RM), e.g. Yarn [29], Mesos [20]. Each application scheduled on the cluster negotiates with the RM for resources. A unit of resources allocated to an application is termed as a container, the size of which is specified by the application at the time of(More)
  • 1