Advertisement

Grid Supporting Platform for AMS Data Processing

  • Junzhou Luo
  • Aibo Song
  • Ye Zhu
  • Xiaopeng Wang
  • Teng Ma
  • Zhiang Wu
  • Yaobin Xu
  • Liang Ge
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)

Abstract

The purpose of AMS experiment is to look for the source of the dark matter, source of the cosmic ray and the universe made of antimatter. The characteristics of AMS experiment are massive data and complicated computing. The data are frequently transmitted, retrieved and processed among the computing nodes located in USA, Europe and China. This paper introduces the grid platform at Southeast University, called SEUGrid, for the AMS data processing and analysis. Some key technologies such as the scheduling strategy, data replica management and semantic access control, which SEUGrid adopts to fit the AMS data processing, are described in the paper.

Keywords

Source Node Policy Language Computing Node Semantic Description Direct Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ji, P., Luo, J.: A Trust-Based Scheduling of Tasks on Grid Computing Systems. In: The International Conference on Computer, Communication and Control Technologies (CCCT 2003) and the 9th International Conference on Information Systems Analysis and Synthesis (ISAS 2003), vol. III, pp. 132–137 (2003)Google Scholar
  2. 2.
    Ji, P., Luo, J.: A QoS Demands Evaluation Based Classified Admission Control Algorithm. In: Proc. 7th International Conference on Computer Supported Cooperative Work in Design (2003)Google Scholar
  3. 3.
    Teng, M., Luo, J.: A Prediction-Based and Cost-Based Replica Replacement Algorithm Research and Simulation. In: Advanced Information Networking and Applications, AINA 2005, vol. 1, pp. 935–940 (2005); ISSN: 1550-445XGoogle Scholar
  4. 4.
    Lampson, B.W.: Protection. Computer Networks 8(1), 18–24 (1974)Google Scholar
  5. 5.
    Qian, X., Lunt, T.: A mac policy framework for multilevel relational databases. IEEE Transactions on Knowledge and Data Engineering 8(1), 1–14 (1996)CrossRefGoogle Scholar
  6. 6.
    Ferraiolo, D., Kuhn, D.: Role based access control. In: 15th NIST-NSA National Computer Security Conference (1992)Google Scholar
  7. 7.
    Jin, H.: ChinaGrid: Making grid computing a reality. In: Chen, Z., Chen, H., Miao, Q., Fu, Y., Fox, E., Lim, E.-p. (eds.) ICADL 2004. LNCS, vol. 3334, pp. 13–24. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Junzhou Luo
    • 1
  • Aibo Song
    • 1
  • Ye Zhu
    • 1
  • Xiaopeng Wang
    • 1
  • Teng Ma
    • 1
  • Zhiang Wu
    • 1
  • Yaobin Xu
    • 1
  • Liang Ge
    • 1
  1. 1.Department of Computer Science & EngineeringSoutheast UniversityNanjingP. R. China

Personalised recommendations