The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
NCAR's Bluefire supercomputer is instrumented with a set of low-overhead processes that continually monitor the floating point counters of its 3,840 batch-compute cores. We extract performance numbers for each batch job by correlating the data from corresponding nodes. From experience and heuristics for good performance, we use this data, in part, to identify poorly performing jobs and then work with...
External stressors like parasites cause alteration in the metabolic pathways of the host. Monitoring the small molecular weight metabolites in the tissue or biofluid offer a convenient approach to understand these alterations. In this paper, we report a urine 1H NMR based metabonomic study to understand the alterations in the human host during the infection of the malarial parasite Plasmodium vivax...
Performance and availability are of critical importance when Internet services are integrated into emergency response management. Poor performance or service failure can result in severe economic, social or environmental cost. This paper presents Whirlwind, a software architecture that includes primitives for overload management and fault tolerance. A Whirlwind service is composed of a collection...
The threat of mobile viruses is important problem that needs to be addressed in the near future. There has been a lot of research conducted regarding PC viruses and worms, but very little work has been done concerning the same issues in the mobile environment. As of now, mobile viruses have not caused a big problem, however there is future potential for more severe virus attacks that could cause physical...
Designing and building software that is free of defects that can be exploited by malicious adversaries is a difficult task. Despite extensive efforts via the application of formal methods, use of automated software engineering tools, and performing extensive pre-deployment testing, exploitable errors still appear in software. The problem of cyber resilience is further compounded by the growing sophistication...
This paper discusses the CAISO experience of implementing automated Remedial Action Schemes in Energy Management Systems. Some details of the script language used for coding the algorithms are also discussed. These algorithms fall into the general class of condition-detection and action-initiation set of sequences. Remedial Action Schemes are typically applied to solve single and multiple contingency...
We address issues of investigations in plant ecology with a time span exceeding the range of ordinary research projects. According to the findings in the papers of this special issue of Community Ecology and other related publications, long-term monitoring is faced with specific methodological challenges: 1. Since the system to be monitored as well as the objectives of monitoring may change over time,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.