Experiences with http/WebDAV protocols for data access in high throughput computing
نویسندگان
چکیده
منابع مشابه
Mechanisms for High Throughput Computing
For many experimental scientists, scienti c progress and quality of research are strongly linked to computing throughput. In other words, most scientists are concerned with how many oating point operations per week or per month they can extract from their computing environment rather than the number of such operations the environment can provide them per second or minute. Floating point operati...
متن کاملEfficient Data Mining with Evolutionary Algorithms for Cloud Computing Application
With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...
متن کاملBilevel Architecture for High-Throughput Computing
We have prototyped and analyzed design of a novel approach for the high throughput computing – a core element for the emerging HENP computational grid. Independent event processing in HENP is well suited for computing in parallel. The prototype facilitates use of inexpensive mass-market components by providing fault tolerant resilience (instead of the expensive total system reliability) via hig...
متن کاملDesign considerations in high-throughput automation for biotechnology protocols
This paper examines automation design issues related to a simple Biotechnology protocol case study. The example chosen is the preparation of RNA from tissue-cultured cells. The starting point in automation design is to first set the process as a manual labor production line and identify processes that can be automated. The paper explores the vast range of possible solutions, some may be robotic...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2011
ISSN: 1742-6596
DOI: 10.1088/1742-6596/331/7/072003