Usage Patterns in Multi-tenant Data Centers: a Large-Case Field Study

2015 ◽  
pp. 1257-1266
Author(s):  
Robert Birke ◽  
Lydia Chen ◽  
Evgenia Smirni
2015 ◽  
Author(s):  
Hudson S Borges ◽  
Marco Tulio Valente

API methods are not used alone, but in groups and following patterns. However, despite being a key information for API users, most usage patterns are not described in official API documents. In this article, we report a study that evaluates the feasibility of automatically enriching API documents with information on usage patterns. For this purpose, we mine and analyze 1,952 usage patterns, from a set of 396 Android applications. As part of our findings, we report that the Android API has many undocumented and non-trivial usage patterns, which can be inferred using association rule mining algorithms. We also describe a field study where a version of the original Android documentation is instrumented with the extracted usage patterns. During 17 months, this documentation received 77,863 visits from professional Android developers.


2015 ◽  
Author(s):  
Hudson S Borges ◽  
Marco Tulio Valente

API methods are not used alone, but in groups and following patterns. However, despite being a key information for API users, most usage patterns are not described in official API documents. In this article, we report a study that evaluates the feasibility of automatically enriching API documents with information on usage patterns. For this purpose, we mine and analyze 1,952 usage patterns, from a set of 396 Android applications. As part of our findings, we report that the Android API has many undocumented and non-trivial usage patterns, which can be inferred using association rule mining algorithms. We also describe a field study where a version of the original Android documentation is instrumented with the extracted usage patterns. During 17 months, this documentation received 77,863 visits from professional Android developers.


1987 ◽  
Vol 18 (2) ◽  
pp. 112-130
Author(s):  
Mary Ann Romski ◽  
Sharon Ellis Joyner ◽  
Rose A. Sevcik

Studies of first-word acquisition in typical language-learning children frequently take the form of diary studies. Comparable diary data from language-impaired children with developmental delays, however, are not currently available. This report describes the spontaneous vocalizations of a child with a developmental delay for 14 months, from the time he was age 6:5 to age 7:7. From a corpus of 285 utterances, 47 phonetic forms were identified and categorized. Analysis focused on semantic, communicative, and phonological usage patterns.


Author(s):  
Thomas Mößle ◽  
Florian Rehbein

Aim: The aim of this article is to work out the differential significance of risk factors of media usage, personality and social environment in order to explain problematic video game usage in childhood and adolescence. Method: Data are drawn from the Berlin Longitudinal Study Media, a four-year longitudinal control group study with 1 207 school children. Data from 739 school children who participated at 5th and 6th grade were available for analysis. Result: To explain the development of problematic video game usage, all three areas, i. e. specific media usage patterns, certain aspects of personality and certain factors pertaining to social environment, must be taken into consideration. Video game genre, video gaming in reaction to failure in the real world (media usage), the children’s/adolescents’ academic self-concept (personality), peer problems and parental care (social environment) are of particular significance. Conclusion: The results of the study emphasize that in future – and above all also longitudinal – studies different factors regarding social environment must also be taken into account with the recorded variables of media usage and personality in order to be able to explain the construct of problematic video game usage. Furthermore, this will open up possibilities for prevention.


Author(s):  
Martin Bettschart ◽  
Marcel Herrmann ◽  
Benjamin M. Wolf ◽  
Veronika Brandstätter

Abstract. Explicit motives are well-studied in the field of personality and motivation psychology. However, the statistical overlap of different explicit motive measures is only moderate. As a consequence, the Unified Motive Scales (UMS; Schönbrodt & Gerstenberg, 2012 ) were developed to improve the measurement of explicit motives. The present longitudinal field study examined the predictive validity of the UMS achievement motive subscale. Applicants of a police department ( n = 168, Mage = 25.11, 53 females and 115 males) completed the UMS and their performance in the selection process was assessed. As expected, UMS achievement predicted success in the selection process. The findings provide first evidence for the predictive validity of UMS achievement in an applied setting.


2018 ◽  
Vol 17 (1) ◽  
pp. 33-41 ◽  
Author(s):  
Jing Jiang ◽  
Ang Gao ◽  
Baiyin Yang

Abstract. This study uses implicit voice theory to examine the influence of employees’ critical thinking and leaders’ inspirational motivation on employees’ voice behavior via voice efficacy. The results of a pretest of 302 employees using critical thinking questionnaires and a field study of 273 dyads of supervisors and their subordinates revealed that both employees’ critical thinking and leaders’ inspirational motivation had a positive effect on employees’ voice and that voice efficacy mediates the relationships among employees’ critical thinking, leaders’ inspirational motivation, and employees’ voice. Implications for research and practice are discussed.


1999 ◽  
Author(s):  
Tara K. Macdonald ◽  
Mark P. Zanna ◽  
Geoffrey T. Fong ◽  
Alanna M. Martineau

Sign in / Sign up

Export Citation Format

Share Document