Author of the publication

Shelter from the Storm: Building a Safe Archive in a Hostile World.

, , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 294-303. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic Enabled Metadata Framework for Data Grids., , , and . CISIS, page 381-386. IEEE Computer Society, (2008)A workflow approach to designed reservoir study., , , , , , , , and . WORKS@HPDC, page 75-79. ACM, (2007)Semantic enabled metadata management in PetaShare., , , , , and . Int. J. Grid Util. Comput., 1 (4): 275-286 (2009)Poster reception - Utilizing grid computing technologies for advanced reservoir studies., , , , , and . SC, page 151. ACM Press, (2006)Shelter from the Storm: Building a Safe Archive in a Hostile World., , , , , and . OTM Workshops, volume 3762 of Lecture Notes in Computer Science, page 294-303. Springer, (2005)A Generic Task-Farming Framework for Reservoir Analysis in a Grid Environment., , , , , and . ICPP Workshops, page 426-434. IEEE Computer Society, (2006)ResGrid: A Grid-aware Toolkit for Reservoir Uncertainty Analysis., , , , , , , , , and . CCGRID, page 249-252. IEEE Computer Society, (2006)A Novel Segmentation-based Adaptive Feature Extraction Methodology for Discriminating Heart Sounds., , , , , and . HealthCom, page 1-7. IEEE, (2020)High-Efficiency Positioning of Vibration Intrusions for Long-Distance Perimeter Security Monitoring Based on Time-Frequency Variation Envelopes., , , , and . IEEE Trans. Instrum. Meas., (2024)Productivity-based asset pricing: Theory and evidence, and . Journal of Financial Economics, 86 (2): 405--445 (November 2007)