-
1
-
-
85030750455
-
Using magpie for request extraction and workload modelling
-
P. T. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modelling. In OSDI, pages 259-272, 2004.
-
(2004)
OSDI
, pp. 259-272
-
-
Barham, P.T.1
Donnelly, A.2
Isaacs, R.3
Mortier, R.4
-
3
-
-
33750035572
-
A security model for provenance
-
Harvard University, Jan.
-
U. Braun and A. Shinnar. A Security Model for Provenance. Technical Report TR-04-06, Harvard University, Jan. 2006.
-
(2006)
Technical Report
, vol.TR-04-06
-
-
Braun, U.1
Shinnar, A.2
-
5
-
-
84941152957
-
-
ClearCase. http://www.ibm.org/software/awdtools/clearcase.
-
ClearCase
-
-
-
6
-
-
33750039435
-
Justice department hid parts of report criticizing diversity effort
-
Oct. 31
-
R. Edmonds. Justice department hid parts of report criticizing diversity effort. Associated Press, Oct. 31 2003.
-
(2003)
Associated Press
-
-
Edmonds, R.1
-
7
-
-
31444448932
-
The virtual data grid: A new model and architecture for data-intensive collaboration
-
Asilomar, CA, Jan.
-
I. Foster, J. Voeckler, M. Wilde, and Y. Zhao. The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration. In CIDR, Asilomar, CA, Jan. 2003.
-
(2003)
CIDR
-
-
Foster, I.1
Voeckler, J.2
Wilde, M.3
Zhao, Y.4
-
9
-
-
84880567417
-
-
GenePattern. http://www.broad.mit.edu/cancer/software/genepattern.
-
GenePattern
-
-
-
10
-
-
4544225295
-
The vesta approach to software configuration management
-
Compaq Systems Research Center, March
-
A. Heydon, R. Levin, T. Mann, and Y. Yu. The Vesta Approach to Software Configuration Management. Technical Report 168, Compaq Systems Research Center, March 2001.
-
(2001)
Technical Report
, vol.168
-
-
Heydon, A.1
Levin, R.2
Mann, T.3
Yu, Y.4
-
14
-
-
84870728859
-
-
Lineage File System, http://crjrpto.stanford.edu/~cao/lineage.html.
-
Lineage File System
-
-
-
21
-
-
31444456082
-
Metadata in the collaboratory for multi-scale chemical science
-
Seattle, WA
-
C. Pancerella et al. Metadata in the Collaboratory for Multi-scale Chemical Science. In Dublin Core Conference, Seattle, WA, 2003.
-
(2003)
Dublin Core Conference
-
-
Pancerella, C.1
-
22
-
-
57149137285
-
ExtScow: The design, Implementation, and Analysis of Metadat for a Time-Shifting File System
-
Computer Science Department, The Johns Hopkins University
-
Z. N. J. Peterson and R. C. Burns. ExtScow: The design, Implementation, and Analysis of Metadat for a Time-Shifting File System. Technical Report HSSL2003-03, Computer Science Department, The Johns Hopkins University, 2003. http://hssl.cs.jhu.edu/papers/peterson-ext3cow03.pdf.
-
(2003)
Technical Report HSSL2003-03
-
-
Peterson, Z.N.J.1
Burns, R.C.2
-
25
-
-
0032645761
-
Elephant: The file system that never forgets
-
D. J. Santry, M. J. Feeley, N. C. Hutchinson, and A. C. Veitch. Elephant: The file system that never forgets. In Workshop on Hot Topics in Operating Systems, pages 2-7, 1999.
-
(1999)
Workshop on Hot Topics in Operating Systems
, pp. 2-7
-
-
Santry, D.J.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
-
26
-
-
84941147432
-
-
Valgrind, an open-source memory debugger for
-
J. Seward. Valgrind, an open-source memory debugger for GNU/Linux. http://valgrind.org, 2005.
-
(2005)
-
-
Seward, J.1
-
27
-
-
33750067451
-
Document shows SCO prepped lawsuit against BofA
-
Mar. 4
-
S. Shankland and S. Ard. Document shows SCO prepped lawsuit against BofA. News.Com, Mar. 4 2004.
-
(2004)
News.Com
-
-
Shankland, S.1
Ard, S.2
-
28
-
-
33750074236
-
Transparent result caching
-
A. Vahdat and T. Anderson. Transparent result caching. Technical Report CSD-97-974, 8, 1997.
-
(1997)
Technical Report
, vol.8 CSD-97-974
-
-
Vahdat, A.1
Anderson, T.2
-
30
-
-
33747156412
-
Transparent accountable data mining: New strategies for privacy protection
-
Massachusets Institute of Technology Computer Science and Artificial Intelligence Laboratory
-
D. J. Weitzner, H. Abelson, T. Berners-Lee, C. Hanson, J. Hendler, L. Kagal, D. L. McGuinness, G. J. Sussman, and K. K. Waterman. Transparent accountable data mining: New strategies for privacy protection. Technical report, Massachusets Institute of Technology Computer Science and Artificial Intelligence Laboratory, 2006.
-
(2006)
Technical Report
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Hanson, C.4
Hendler, J.5
Kagal, L.6
McGuinness, D.L.7
Sussman, G.J.8
Waterman, K.K.9
-
31
-
-
33750061700
-
Web site lists Iran coup names
-
June 24
-
E. Wong. Web site lists Iran coup names. The New York Times, June 24 2000.
-
(2000)
The New York Times
-
-
Wong, E.1
-
32
-
-
26444469838
-
-
J. Zhao, M. Goble, C.and Greenwood, C. Wroe, and R. Stevens. Annotating, linking and browsing provenance logs for e-science.
-
Annotating, Linking and Browsing Provenance Logs for E-science
-
-
Zhao, J.1
Goble, M.2
Greenwood, C.A.3
Wroe, C.4
Stevens, R.5
|