Experiences with http/WebDAV protocols for data access in high throughput computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mechanisms for High Throughput Computing

For many experimental scientists, scienti c progress and quality of research are strongly linked to computing throughput. In other words, most scientists are concerned with how many oating point operations per week or per month they can extract from their computing environment rather than the number of such operations the environment can provide them per second or minute. Floating point operati...

متن کامل

Efficient Data Mining with Evolutionary Algorithms for Cloud Computing Application

With the rapid development of the internet, the amount of information and data which are produced, are extremely massive. Hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. Data mining can overcome this problem. While data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. As the speed of ...

متن کامل

Bilevel Architecture for High-Throughput Computing

We have prototyped and analyzed design of a novel approach for the high throughput computing – a core element for the emerging HENP computational grid. Independent event processing in HENP is well suited for computing in parallel. The prototype facilitates use of inexpensive mass-market components by providing fault tolerant resilience (instead of the expensive total system reliability) via hig...

متن کامل

Design considerations in high-throughput automation for biotechnology protocols

This paper examines automation design issues related to a simple Biotechnology protocol case study. The example chosen is the preparation of RNA from tissue-cultured cells. The starting point in automation design is to first set the process as a manual labor production line and identify processes that can be automated. The paper explores the vast range of possible solutions, some may be robotic...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2011

ISSN: 1742-6596

DOI: 10.1088/1742-6596/331/7/072003