Sciweavers

899 search results - page 59 / 180
» fast 2009
Sort
View
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 9 days ago
Application of a simple binary genetic algorithm to a noiseless testbed benchmark
One of the earliest evolutionary computation algorithms, the genetic algorithm, is applied to the noise-free BBOB 2009 testbed. It is adapted to the continuous domain by increasin...
Miguel Nicolau
FAST
2009
13 years 5 months ago
A Formal Model of Provenance in Distributed Systems
We present a formalism for provenance in distributed systems based on the -calculus. Its main feature is that all data products are annotated with metadata representing their prov...
Issam Souilah, Adrian Francalanza, Vladimiro Sasso...
FAST
2009
13 years 5 months ago
Transparently Gathering Provenance with Provenance Aware Condor
We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system infor...
Christine F. Reilly, Jeffrey F. Naughton
FAST
2009
13 years 5 months ago
The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
As increasing amounts of valuable information are produced and persist digitally, the ability to determine the origin of data becomes important. In science, medicine, commerce, an...
Ragib Hasan, Radu Sion, Marianne Winslett
FAST
2009
13 years 5 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...