Scientific workflow execution reproducibility using cloud aware provenance
Full text
Figure
Related documents
In the foregoing sections we have studied an unbounded model of parallel-batching scheduling with criteria Lmax and Cmax and established an algorithm for finding all Pareto
We achieve security by having good measures in as many cryptographic properties as possible for the Boolean function in a cipher, such as balancedness to resist statistical
Figure 2.1 Common Causes of Water Pipes Leak 9 Figure 2.2 Internal Pipe Corrosion 10 Figure 2.3 Infrared Thermography Result 12 Figure 2.4 Ground Penetrating Radar 13 Figure 2.5
20 different time series were chosen for analysis in this paper and were taken from disparate monthly, weekly, daily and hourly data sources.. Hourly data was taken from one
As described in Figure 12, the assignProgramsToServer method appends elements of the program list parameter to the playlist of the Wowza server designated by
H3a Controlling for trustworthiness perceptions, there is a positive relationship between consumers’ purchase intentions and their willingness to give private information to a land
The degree of MSc is awarded to any candidate who achieves a mark of at least 50 per cent for each of its four components: (1) the unseen exam, (2) the written assignments,
On the sixth day, when they prepare what they bring in, it will be twice as much as they gather on other days.” So Moses and Aaron said to all the Israelites, “In the evening