Sciweavers

76 search results - page 12 / 16
» The Provenance of Workflow Upgrades
Sort
View
GCA
2009
13 years 5 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
PROCEDIA
2010
140views more  PROCEDIA 2010»
13 years 2 months ago
Theoretical enzyme design using the Kepler scientific workflows on the Grid
One of the greatest challenges in computational chemistry is the design of enzymes to catalyze non-natural chemical reactions. We focus on harnessing the distributed parallel comp...
Jianwu Wang, Prakashan Korambath, Seonah Kim, Scot...
ISCA
2010
IEEE
216views Hardware» more  ISCA 2010»
13 years 6 months ago
The impact of management operations on the virtualized datacenter
Virtualization has the potential to dramatically reduce the total cost of ownership of datacenters and increase the flexibility of deployments for general-purpose workloads. If pr...
Vijayaraghavan Soundararajan, Jennifer M. Anderson
CSB
2005
IEEE
139views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Open Microscopy Environment
High-throughput scoring of image-based biological assays heavily depends on the extraction of quantitative numerical information from microscopy images. This paper describes how t...
Ilya G. Goldberg
GRC
2009
IEEE
13 years 11 months ago
From granulation hierarchy to granular perspective
It is well-known that one can granulate data and information in multiple ways to generate a plethora of granulation hierarchies each with their levels of granularity. It is left im...
C. Maria Keet