Showing 121 - 140 results of 674 for search '"grid computing"', query time: 0.19s Refine Results
  1. 121
  2. 122
  3. 123

    Enabling Grid Computing resources within the KM3NeT computing model by Filippidis Christos

    Published 2016-01-01
    “…In order to support the aforementioned demanding computing requirements we enabled Grid Computing resources, operated by EGI, within the KM3NeT computing model. …”
    Get full text
    Article
  4. 124

    Towards sparse matrix operations: graph database approach for power grid computation by Daoxing Li, Kai Xiao, Xiaohui Wang, Pengtian Guo, Yong Chen

    Published 2023-02-01
    “…Based on the graph description, a series of power grid computations can be implemented on graph database, which reduces redundant data import and export operations while leveraging the parallel computing capability of graph database. …”
    Get full text
    Article
  5. 125
  6. 126

    Implementasi dan Evaluasi Penerapan Globus Toolkit untuk Aplikasi Grid Computing by Widodo Budiharto

    Published 2012-06-01
    Subjects: “…grid computing, Globus Toolkit, WSRF, UCLA Grid Portal…”
    Get full text
    Article
  7. 127

    A high performance UCON and semantic-based authorization framework for grid computing by Ibrahim, Maizura, Ibrahim, Hamidah, Abdullah, Azizol, Latip, Rohaya

    Published 2016
    “…Authorization infrastructures are an important and integral part of grid computing which facilitate access control functions to protect resources. …”
    Get full text
    Article
  8. 128
  9. 129

    Max-average: an extended max-min scheduling algorithm for Grid computing environtment by Maipan-uku, J. Y., Muhammed, Abdullah, Abdullah, Azizol, Hussin, Masnida

    Published 2016
    “…Sharing numerous computational and communication power from connected heterogeneous systems over the world are the two key points of Grid computing. Grid computing can also be referred as a computing platform for users to utilise the remote heterogeneous resources for solving their large scale jobs that require a huge amount of processing power or a huge data storage. …”
    Get full text
    Article
  10. 130
  11. 131

    Content-based information retrieval techniques based on grid computing: a review by Bashir, Mohammed Bakri, Abdul Latiff, Muhammad Shafie, Ahmed, Aboamama Atahar, Yousif, Adil, Eltayeeb, Manhal Elfadil

    Published 2013
    “…However, the content-based information retrieval (CBIR) is concentrated to extract and retrieve the information from massive digital libraries, which require a huge amount of computing and storage resources. The grid computing provides the reliable infrastructure for effective and efficient retrieval on these large collections. …”
    Get full text
    Article
  12. 132

    HMAC authentication mechanisms in a grid computing environment using gridsim toolkit by Ismail, S. A., Ngadi, M. A., Sharif, J. M., Kama, N., Yusop, O. M.

    Published 2015
    “…Recently the authentication of grid computing environment has been to secure the security of local and remote entities in the surrounding. …”
    Article
  13. 133

    RSA authentication mechanisms in control grid computing environment using gridsim toolkit by Ismail, Saiful Adli, Ngadi, Md. Asri, Mohd. Sharif, Johan, Kama, Mohd. Nazri, Sarkan, Haslina

    Published 2015
    “…There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands. …”
    Get full text
    Conference or Workshop Item
  14. 134

    RSA authentication mechanisms in control grid computing environment using Gridsim toolkit by Ismail, Saiful Adli, Ngadi, Md Asri, Mohd Sharif, Johan, Kama, Mohd Nazri, Sarkan, Haslina

    Published 2015
    “…There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most critical factor pertaining to this.There are several approaches has been discussed in the grid computing environment on the safeguard, scalable and efficient authentication that are either Virtual Organization centric or Resource centric.Most of the grid computing uses public key infrastructure (PKI) to secure the identification, but the vulnerability are still cannot be avoid. …”
    Get full text
    Conference or Workshop Item
  15. 135

    A high performance UCON and semantic-based authorization framework for grid computing by Ibrahim, Maizura, Ibrahim, Hamidah, Abdullah, Azizol, Latip, Rohaya

    Published 2016
    “…Authorization infrastructures are an important and integral part of grid computing which facilitate access control functions to protect resources.This paper presents an authorization framework that combines the usage control (UCON) model with semantic web technology.To our knowledge, an authorization framework that combines both the UCON and semantic web technology in one framework has not yet been previously proposed.As the UCON model combines traditional access control, trust management and digital rights management in a grid authorization infrastructure, its adoption enhances the capability of the authorization. …”
    Get full text
    Article
  16. 136
  17. 137

    New heuristic function in ant colony system for job scheduling in grid computing by Ku-Mahamud, Ku Ruhana, Alobaedy, Mustafa Muwafak

    Published 2012
    “…Job scheduling is one of the main factors affecting grid computing performance. Job scheduling problem classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Ant colony system algorithm is a meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This paper focuses on enhancing the heuristic function where information about recent ants’ discoveries will be taken into account.Experiments were conducted using a simulator with dynamic environment features to mimic the grid environment.Results show that the proposed enhanced algorithm produce better output in term of utilization and make span.…”
    Get full text
    Conference or Workshop Item
  18. 138
  19. 139
  20. 140