Filters








10 Hits in 4.6 sec

PROJECTS BASED ON THE WEB PROCESSING SERVICE FRAMEWORK BIRDHOUSE

C. Ehbrecht, T. Landry, N. Hempelmann, D. Huard, S. Kindermann
2018 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
By supporting climate, earth observation and biodiversity data and processes, Birdhouse can be used in a wide array of Earth sciences projects and workflows.  ...  Using an interoperable software architecture, institutions can provide both data and services allowing users to process the data remotely from a laptop, instead of having to acquire and maintain large  ...  ACKNOWLEDGEMENTS The European authors acknowledge that Birdhouse development was funded by European Union (Copernicus) and the German Helmholtz Association (LSDMA).  ... 
doi:10.5194/isprs-archives-xlii-4-w8-43-2018 fatcat:k4d6fut34rajdlcivpz6pbnov4

Mt-wave

Anthony J. Arkles, Dwight J. Makaroff
2011 Proceeding of the second joint WOSP/SIPEW international conference on Performance engineering - ICPE '11  
In particular, we identified and fixed a significant and unintuitive bottleneck in an open-source project management application and verified caching behaviour in a cloud-hosted commercial product.  ...  We postulate that multi-tier profiling, starting at the web browser, is the appropriate way to solve this problem.  ...  in place to receive log messages from these different systems, collecting and aggregating profiling information will further help the analyst understand the behaviour in the system, especially by providing  ... 
doi:10.1145/1958746.1958783 dblp:conf/wosp/ArklesM11 fatcat:536xmnhsyrfjxktt56lolhhol4

Lux: Always-on Visualization Recommendations for Exploratory Dataframe Workflows [article]

Doris Jung-Lin Lee, Dixin Tang, Kunal Agarwal, Thyne Boonmark, Caitlyn Chen, Jake Kang, Ujjaini Mukhopadhyay, Jerry Song, Micah Yong, Marti A. Hearst, Aditya G. Parameswaran
2021 arXiv   pre-print
We demonstrate that through the use of a careful design and three system optimizations, Lux adds no more than two seconds of overhead on top of pandas for over 98% of datasets in the UCI repository.  ...  We evaluate Lux in terms of usability via a controlled first-use study and interviews with early adopters, finding that Lux helps fulfill the needs of data scientists for visualization support within their  ...  Magpie: Python at speed and scale using cloud backends. In CIDR, February 2021. tions.  ... 
arXiv:2105.00121v2 fatcat:gphjm3jqdzevbc4f6yvfyjod7i

Μηχανισμός παρακολούθησης αιτήσεων με χαμηλή επιβάρυνση σε κατανεμημένο σύστημα Ε/Ε [article]

Efangelos-Marios Kogias, National Technological University Of Athens, National Technological University Of Athens
2015
It enables live tracing and inserts minimal overhead to the instrumented system, so that it can continue working effectively in production scale.  ...  Distributed storage systems require special treatment concerning their monitoring and tracing.  ...  It was primarily designed to solve problems that arise on large scale cloud environments.  ... 
doi:10.26240/heal.ntua.12099 fatcat:u62wxbf6vfdoplvnhb6lcodeda

Deterministic systems analysis

Anton Burtsev
2013
Modern large-scale cloud systems are designed to be elastic, i.e., to scale propor tionally to the load.  ...  However, modern large-scale cloud systems are designed to be elastic, i.e., scale the entire system and its parts proportionally to the load.  ... 
doi:10.26053/0h-3dyc-e0g0 fatcat:qxfcv6uferfatirluhbu2khkhe

Proceedings of the Linux Audio Conference 2018 [article]

Artem Popov, Stefan Westerfeld, José Rafael Subia Valdez, Tobias Herzke, Hendrik Kayser, Christopher Seifert, Paul Maanen, Christopher Obbard, Guillermo Payá-Vayá, Holger Blume, Volker Hohmann, Mark McCurry (+12 others)
2018
The conference took place at c-base, Berlin, from June 7th - 10th, 2018 and was organized in cooperation with the Electronic Music Studio at TU Berlin.  ...  These proceedings contain all papers presented at the Linux Audio Conference 2018.  ...  The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.  ... 
doi:10.14279/depositonce-7046 fatcat:pdoptwbesna7ra6fpos2tueld4

Software systems for supporting scientific campaigns on high performance and distributed computing resources

Ioannis Paraskevakos
2021
MapReduce is one of the most successfully abstraction used to execute data-intensive workflows at scale on cloud resources.  ...  Specifically, the dissertation focuses on computational campaigns with data- and compute-intensive workflows that utilize HPC resources at scale.  ...  the choice of storage and filesystem backend.  ... 
doi:10.7282/t3-n11z-ss38 fatcat:tyw4zvnh5zao3oij32v7yyvq44

Arora_columbia_0054D_14471.pdf [article]

2018
We use a novel two-stage process, whereby we first create place-holders in the binary at compile time and instrument them at run-time. iProbe is a standalone tool that can be used for instrumenting applications  ...  We believe that this piece of work provides the first of it's kind practical real-time debugging of large multi-tier and cloud applications, without requiring any application down-time, and minimal performance  ...  For our testing we used pycassa python cassandra client.  ... 
doi:10.7916/d8bk2vfx fatcat:lydj23fownh7vphjt6r5nhfun4

Provenance-based computing

Lucian Carata, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Andy Hopper, Ripduman Sohan
2019
It is the contextualisation that allows tying the measurements to provenance in a meaningful way, and I look at a number of use-cases in understanding application performance.  ...  In this context, provenance can be used as part of feedback loops, with a double purpose: building software that is able to adapt for meeting certain quality and performance targets (semi-automated tuning  ...  This trades off generality and memory footprint for speed of execution.  ... 
doi:10.17863/cam.34872 fatcat:eilqtn3gbvfzjakqdmbbtcp5ae

Systematic Evaluations Of Security Mechanism Deployments

Sze Yiu Chau
2019
services, are vulnerable to content extraction due to the use of unjustified assumptions in their security mechanism designs and implementations.  ...  X.509 certificates are widely used in TLS as a means to achieve authentication.  ...  For each library, extraction using EqC 2 yielded paths at the scale of tens, and finished within a minute.  ... 
doi:10.25394/pgs.9037817 fatcat:c62pusqmdjacpgq2cwcdonvcvi