C Tan, Y Xia, H Chen, B Zang - IEEE/IFIP International …, 2012 - ieeexplore.ieee.org
The increasing amount of resources in a single machine constantly increases the level of server consolidation for virtualization. However, along with the improvement of server …
T Guedes, LB Martins, MLF Falci, V Silva… - Future Generation …, 2020 - Elsevier
Several scientists have moved their IO-and CPU-intensive workflows to Data-Intensive Scalable Computing (DISC) frameworks aiming at benefit from high scalability, broad …
Software project management is a complex task that requires accurate information and experience to inform the decisionmaking process. In the real world software project …
Compliance with privacy policies imposes requirements on organizations and their information systems. Maintaining auditable privacy logs is one of the key mechanisms …
J Cheney, R Perera - Provenance and Annotation of Data and Processes …, 2015 - Springer
Security is likely to be a critical factor in the future adoption of provenance technology, because of the risk of inadvertent disclosure of sensitive information. In this survey paper we …
Provenance refers to the origin of a particular object. In computational terms, provenance is a historical record of the derivation of data that can help to understand the current record. In …
C Howe, JA Tullis - Remote Sensing, 2022 - mdpi.com
Multiple scientific disciplines face a so-called crisis of reproducibility and replicability (R&R) in which the validity of methodologies is questioned due to an inability to confirm …
The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user's …
J Gomes, VC Lopes, VVG Neto, RF De Oliveira… - Proceedings of the 10th …, 2022 - dl.acm.org
The process of transferring technology from research institutes to industry involves benchmarking it in exhaustive experiments to assure it reaches the established quality …