You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Workflows may be defined as abstractions used to model the coherent flow of activities in the context of an in silico scientific experiment. They are employed in many domains of science such as bioinformatics, astronomy, and engineering. Such workflows usually present a considerable number of activities and activations (i.e., tasks associated with activities) and may need a long time for execution. Due to the continuous need to store and process data efficiently (making them data-intensive workflows), high-performance computing environments allied to parallelization techniques are used to run these workflows. At the beginning of the 2010s, cloud technologies emerged as a promising environmen...
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions. Provenance has been recognized to be important in a wide range of areas including databases, workflows, knowledge representation and reasoning, and digital libraries. Thus, many disciplines have proposed a wide range of provenance models, techniques, and infrastructure for encoding and using provenance. The papers investigate many facets of data provenance, process documentation, data derivation, and data annotation.
The August 1999 conference concentrated on the delivery of high-quality software on schedule and within budget, offering practical experience from both industry and academia. The 37 technical papers provide insights from lessons learned on real projects, covering such topics as databases, object-ori
This text looks at the design and development of application-specific software. It covers topics such as networking engineering, software and systems engineering, security issues, multimedia and information systems, sofware reliability issues, and tools for software and systems.
Papers from an April 2002 conference, 25 in all, report on academic achievements and industrial applications in the engineering of computer-based systems. Contributors represent some 12 countries and a variety of application domains. Papers deal with themes of requirements engineering, processes and tools, system properties and methods, modeling and analysis, system architecture, model-based system development, component-based design and reuse, embedded systems, and mobile agents. Specific topics include an intelligent agent security intrusion system, managing complex temporal requirements in real-time control systems, using category theory to model software component dependencies, and advanced Petri nets for modeling mobile agent enabled interorganizational workflows. There is no subject index. Annotation copyrighted by Book News Inc., Portland, OR.