Sciweavers

1717 search results - page 318 / 344
» Data Integrity in a Distributed Storage System
Sort
View
108
Voted
SIGADA
2004
Springer
15 years 5 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
GRID
2007
Springer
15 years 6 months ago
Load prediction using hybrid model for computational grid
—Due to the dynamic nature of grid environments, schedule algorithms always need assistance of a long-time-ahead load prediction to make decisions on how to use grid resources ef...
Yongwei Wu, Yulai Yuan, Guangwen Yang, Weimin Zhen...
EDOC
2006
IEEE
15 years 4 months ago
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows
Abstract-- Analysis of workflows in terms of structural correctness is important for ensuring the quality of workflow models. Typically, this analysis is only one step in a larger ...
Rainer Hauser, Michael Friess, Jochen Malte Kü...
ICPADS
2010
IEEE
14 years 10 months ago
Hybrid Checkpointing for MPI Jobs in HPC Environments
As the core count in high-performance computing systems keeps increasing, faults are becoming common place. Checkpointing addresses such faults but captures full process images ev...
Chao Wang, Frank Mueller, Christian Engelmann, Ste...
113
Voted
CVPR
2006
IEEE
16 years 2 months ago
A Simple Bayesian Framework for Content-Based Image Retrieval
We present a Bayesian framework for content-based image retrieval which models the distribution of color and texture features within sets of related images. Given a userspecified ...
Katherine A. Heller, Zoubin Ghahramani