Sciweavers

2379 search results - page 421 / 476
» Grids and Grid technologies for wide-area distributed comput...
Sort
View
IPPS
2009
IEEE
15 years 6 months ago
Performance prediction for running workflows under role-based authorization mechanisms
When investigating the performance of running scientific/ commercial workflows in parallel and distributed systems, we often take into account only the resources allocated to the ...
Ligang He, Mark Calleja, Mark Hayes, Stephen A. Ja...
MIDDLEWARE
2005
Springer
15 years 5 months ago
Managing the follow-me semantics to build large-scale pervasive applications
In this paper, we present the concept of follow-me semantics of the large-scale pervasive application and discuss the features and services to its implementation based on the inte...
Iara Augustin, Adenauer C. Yamin, Cláudio F...
NETWORKS
2008
14 years 11 months ago
Reformulation and sampling to solve a stochastic network interdiction problem
The Network Interdiction Problem involves interrupting an adversary's ability to maximize flow through a capacitated network by destroying portions of the network. A budget c...
Udom Janjarassuk, Jeff Linderoth
CG
2005
Springer
14 years 11 months ago
An algorithm for tetrahedral mesh generation based on conforming constrained Delaunay tetrahedralization
An unstructured tetrahedral mesh generation algorithm for 3D model with constraints is presented. To automatically generate a tetrahedral mesh for model with constraints, an advan...
Yi-Jun Yang, Jun-Hai Yong, Jia-Guang Sun
HPDC
2005
IEEE
15 years 5 months ago
Recording and using provenance in a protein compressibility experiment
Very large scale computations are now becoming routinely used as a methodology to undertake scientific research. In this context, ‘provenance systems’ are regarded as the equ...
Paul T. Groth, Simon Miles, Weijian Fang, Sylvia C...