Sciweavers

1818 search results - page 310 / 364
» How users use access control
Sort
View
INFOVIS
2002
IEEE
14 years 2 months ago
Visualizing Data with Bounded Uncertainty
Visualization is a powerful way to facilitate data analysis, but it is crucial that visualization systems explicitly convey the presence, nature, and degree of uncertainty to user...
Chris Olston, Jock D. Mackinlay
HPDC
2003
IEEE
14 years 2 months ago
Optimizing GridFTP through Dynamic Right-Sizing
In this paper, we describe the integration of dynamic right-sizing — an automatic and scalable buffer management technique for enhancing TCP performance — into GridFTP, a sub...
Sunil Thulasidasan, Wu-chun Feng, Mark K. Gardner
KDD
2010
ACM
199views Data Mining» more  KDD 2010»
14 years 29 days ago
Overlapping experiment infrastructure: more, better, faster experimentation
At Google, experimentation is practically a mantra; we evaluate almost every change that potentially affects what our users experience. Such changes include not only obvious user-...
Diane Tang, Ashish Agarwal, Deirdre O'Brien, Mike ...
ICPP
2009
IEEE
14 years 3 months ago
Investigating High Performance RMA Interfaces for the MPI-3 Standard
—The MPI-2 Standard, released in 1997, defined an interface for one-sided communication, also known as remote memory access (RMA). It was designed with the goal that it should p...
Vinod Tipparaju, William Gropp, Hubert Ritzdorf, R...
CLUSTER
2006
IEEE
14 years 3 months ago
Resource Management for Interactive Jobs in a Grid Environment
1 Most recent Grid middleware technologies have been aimed at the execution of sequential batch jobs. However, some users require interactive access when running jobs on Grid sites...
Enol Fernández, Elisa Heymann, Miquel A. Se...