First principles vulnerability assessment

JA Kupsch, BP Miller, E Heymann… - Proceedings of the 2010 …, 2010 - dl.acm.org
Clouds and Grids offer significant challenges to providing secure infrastructure software. As
part of a our effort to secure such middleware, we present First Principles Vulnerability …

A case study into using common real-time workflow monitoring infrastructure for scientific workflows

K Vahi, I Harvey, T Samak, D Gunter, K Evans… - Journal of grid …, 2013 - Springer
Scientific workflow systems support various workflow representations, operational modes,
and configurations. Regardless of the system used, end users have common needs: to track …

A general approach to real-time workflow monitoring

K Vahi, I Harvey, T Samak, D Gunter… - 2012 SC Companion …, 2012 - ieeexplore.ieee.org
Scientific workflow systems support different workflow representations, operational modes
and configurations. However, independent of the system used, end users need to track the …

Multi-scale feature extraction and nested-subset classifier design for high accuracy handwritten character recognition

J Zhang, X Ding, C Liu - Proceedings 15th International …, 2000 - ieeexplore.ieee.org
Both efficient representation and robust classification are essential to high-performance
cursive offline handwritten Chinese character recognition. A novel multi-scale feature …

Intelligent power management over large clusters

AS McGough, C Gerrard, P Haldane… - 2010 IEEE/ACM Int'l …, 2010 - ieeexplore.ieee.org
There is a growing tension within large organisations such as universities between the
desire to perform vast amounts of computational processing and the desire to reduce power …

Exploring provenance in a distributed job execution system

CF Reilly, JF Naughton - International Provenance and Annotation …, 2006 - Springer
We examine provenance in the context of a distributed job execution system. It is crucial to
capture provenance information during the execution of a job in a distributed environment …

[PDF][PDF] Transparently Gathering Provenance with Provenance Aware Condor.

CF Reilly, JF Naughton - Workshop on the Theory and Practice of …, 2009 - usenix.org
We observed that the Condor batch execution system exposes a lot of information about the
jobs that run in the system. This observation led us to explore whether this system …

Using machine learning in trace-driven energy-aware simulations of high-throughput computing systems

AS McGough, N Al Moubayed, M Forshaw - … of the 8th ACM/SPEC on …, 2017 - dl.acm.org
When performing a trace-driven simulation of a High Throughput Computing system we are
limited to the knowledge which should be available to the system at the current point within …

A realtime monitoring platform for workflow subroutines

D Rathnayake, A Wickramarachchi… - … on Advances in ICT …, 2018 - ieeexplore.ieee.org
With the advancement in distributed computing, workflow management systems have shifted
towards executing processes on top of distributed and parallel information systems, resulting …

Detection and protection against distributed denial of service attacks in accountable grid computing systems

W Lee, AC Squicciarini, E Bertino - 2011 11th IEEE/ACM …, 2011 - ieeexplore.ieee.org
By exploiting existing vulnerabilities, malicious parties can take advantage of resources
made available by grid systems to attack mission-critical websites or the grid itself. In this …