• No results found

Scientific workflow execution reproducibility using cloud aware provenance

N/A
N/A
Protected

Academic year: 2020

Share "Scientific workflow execution reproducibility using cloud aware provenance"

Copied!
205
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 2.3: Chimera database schema dealing with physical location of transformation
Table 2.1: Summary of Grid-based Workflow Management Systems
Figure 2.4: Literature survey of provenance management systems and approaches in Cloud
Table 2.3: Summary of Cloud-based Provenance Approaches
+7

References

Related documents

In the foregoing sections we have studied an unbounded model of parallel-batching scheduling with criteria Lmax and Cmax and established an algorithm for finding all Pareto

We achieve security by having good measures in as many cryptographic properties as possible for the Boolean function in a cipher, such as balancedness to resist statistical

Figure 2.1 Common Causes of Water Pipes Leak 9 Figure 2.2 Internal Pipe Corrosion 10 Figure 2.3 Infrared Thermography Result 12 Figure 2.4 Ground Penetrating Radar 13 Figure 2.5

20 different time series were chosen for analysis in this paper and were taken from disparate monthly, weekly, daily and hourly data sources.. Hourly data was taken from one

As described in Figure 12, the assignProgramsToServer method appends elements of the program list parameter to the playlist of the Wowza server designated by

H3a Controlling for trustworthiness perceptions, there is a positive relationship between consumers’ purchase intentions and their willingness to give private information to a land

The degree of MSc is awarded to any candidate who achieves a mark of at least 50 per cent for each of its four components: (1) the unseen exam, (2) the written assignments,

On the sixth day, when they prepare what they bring in, it will be twice as much as they gather on other days.” So Moses and Aaron said to all the Israelites, “In the evening