[PDF][PDF] A linear-time heuristic for improving network partitions

CM Fiduccia, RM Mattheyses - Papers on Twenty-five years of electronic …, 1988 - dl.acm.org
An iterative mincut heuristic for partitioning networks is presented whose worst case
computation time, per pass, grows linearly with the size of the network. In practice, only a …

Linking scientific instruments and computation: Patterns, technologies, and experiences

R Vescovi, R Chard, ND Saint, B Blaiszik, J Pruyne… - Patterns, 2022 - cell.com
Powerful detectors at modern experimental facilities routinely collect data at multiple GB/s.
Online analysis methods are needed to enable the collection of only interesting subsets of …

Software as a service for data scientists

B Allen, J Bresnahan, L Childers, I Foster… - Communications of the …, 2012 - dl.acm.org
Software as a service for data scientists Page 1 FeBRuARY 2012 | VoL. 55 | No. 2 |
coMMunicaTions of The acM 81 in performing them for terabyte or larger datasets (increasingly …

A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made “end-to-me” for web traffic

X de Carné de Carnavalet, PC van Oorschot - ACM Computing Surveys, 2023 - dl.acm.org
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees
that improve end-user security and privacy. While TLS helps defend against pervasive …

Cross-domain data sharing in distributed electronic health record systems

J Sun, Y Fang - IEEE Transactions on Parallel and Distributed …, 2009 - ieeexplore.ieee.org
Cross-organization or cross-domain cooperation takes place from time to time in Electronic
Health Record (EHR) system for necessary and high-quality patient treatment. Cautious …

The MyProxy online credential repository

J Basney, M Humphrey, V Welch - Software: Practice and …, 2005 - Wiley Online Library
The MyProxy online credential repository has been used by the Grid computing community
for over four years for managing security credentials in the Grid public key infrastructure …

Security and trust issues in semantic grids

D Olmedilla, OF Rana, B Matthews, W Nejdl - 2006 - drops.dagstuhl.de
Grid computing allows sharing of services and resources accross institutions. However,
current Grid security mechanisms for authentication and authorization are too rigid and they …

[PDF][PDF] Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy

T Barton, J Basney, T Freeman, T Scavo… - 5th Annual PKI R&D …, 2006 - academia.edu
This paper describes the recent results of the GridShib and MyProxy projects to integrate the
public key infrastructure (PKI) deployed for Grids with different site authentication …

TeraGrid GIScience gateway: bridging cyberinfrastructure and GIScience

S Wang, Y Liu - International Journal of Geographical Information …, 2009 - Taylor & Francis
Cyberinfrastructure (CI) represents the integrated information and communication
technologies for distributed information processing and coordinated knowledge discovery …

Ordinal measures for visual correspondence

DN Bhat, SK Nayar - Proceedings CVPR IEEE Computer …, 1996 - ieeexplore.ieee.org
We present ordinal measures for establishing image correspondence. Linear
correspondence measures like correlation and the sum of squared differences are known to …