Automated addition of fault-tolerance to existing programs is highly desirable, as it allows the designer to focus on the system behavior in the absence of faults and leave the fa...
The use of web services as the basis for grid middleware has allowed scientists to wrap legacy applications as services in order to provide their capabilities to grid users. Howev...
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Most existing Peer-to-peer (P2P) systems support only title-based searches, which can not satisfy the content searches. In this paper, we proposed a semantic correlativity model wh...
Abstract--Clusters featuring the InfiniBand interconnect are continuing to scale. As an example, the "Ranger" system at the Texas Advanced Computing Center (TACC) include...
Matthew J. Koop, Pavel Shamis, Ishai Rabinovitz, D...