Load Shedding

Load Shedding is a technique used in information systems, especially web services, to avoid overloading the system and making it unavailable of all… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
If generation in a power system is insufficient to power all loads, efficient load shedding operations may need to be deployed to… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table I
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In distributed stream processing environments, large numbers of continuous queries are distributed onto multiple servers. When… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
During overloads in the mains, the load curtailment applied to interruptible loads is often the only solution to keep the network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In Data Stream Management Systems (DSMSs), query processing has to meet various Quality-of-Service (QoS) requirements. In many… (More)
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Data stream management systems may be subject to higher input rates than their resources can handle. When overloaded, the system… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, a new approach to adaptive underfrequency load shedding (UFLS), a procedure for protecting electric power systems… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Systems for processing continuous monitoring queries over data streams must be adaptive because data streams are often bursty and… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
"!# #$ % $ & % ' (*) % +-,. $ &/ 0 1 2 3% 41 0 + 5 % 1 &/ !# #%#67$/ 18!# #% % #% ' "% 9,: $ &/ %<;=,> '? "( % $@ "!" 1A B% " 1 0… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Many data stream sources (communication network traffic, HTTP requests, etc.) are prone to dramatic spikes in volume. Because… (More)
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper provides a self-healing strategy to deal with catastrophic events when power system vulnerability analysis indicates… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 6
Is this relevant?