Author of the publication

Streaming satellite data to cloud workflows for on-demand computing of environmental data products

, , , and . Workshop on Workflows in Support of Large-Scale Science (WORKS), page 1--8. IEEE, (November 2010)
DOI: 10.1109/WORKS.2010.5671841

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

First-Order Provenance Games., , and . In Search of Elegance in the Theory and Practice of Computation, volume 8000 of Lecture Notes in Computer Science, page 382-399. Springer, (2013)Win-Move is Coordination-Free (Sometimes)., , and . CoRR, (2013)Datalog Queries Distributing over Components., , , and . ACM Trans. Comput. Log., 18 (1): 5:1-5:35 (2017)Reconciling Provenance Policy Conflicts by Inventing Anonymous Nodes., , and . ESWC Workshops, volume 7117 of Lecture Notes in Computer Science, page 172-185. Springer, (2011)Abstract Provenance Graphs: Anticipating and Exploiting Schema-Level Data Provenance., and . IPAW, volume 6378 of Lecture Notes in Computer Science, page 206-215. Springer, (2010)Modeling and optimization of scientific workflows. Ph.D. '08: Proceedings of the 2008 EDBT Ph.D. workshop, page 1--10. New York, NY, USA, ACM, (2008)Towards Reliable, Performant Workflows for Streaming-Applications on Cloud Platforms, , , , , , and . CSE-2010-23. Computer Science Department, UC Davis, (December 2010)General-Purpose Join Algorithms for Listing Triangles in Large Graphs.. CoRR, (2015)Scientific workflow design with data assembly lines., , , and . SC-WORKS, ACM, (2009)Repairing Provenance Policy Violations by Inventing Non-Functional Nodes., , and . RED@ESWC, volume 737 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)