Abstract—The recent challenges for higher education call for research that can offer a comprehens... more Abstract—The recent challenges for higher education call for research that can offer a comprehensive understanding about the performance and efficiency of higher education institutions in their three primary missions: research, education, and service. In other for this to happen, it is necessary for researchers to have access to a multitude of data sources. However, due to the nature of their academic training, many higher education practitioners do not have access to expertise in working with different data sources.
Abstract This research utilizes several well known forecasting techniques in combination with Emp... more Abstract This research utilizes several well known forecasting techniques in combination with Empirical Mode Decomposition (EMD) to investigate the trade-offs of EMD's decomposition (sifting) step for forecasting the arrival workload of an enterprise cluster. The research is based on earlier work on the forecasting potential of EMD. Results show that EMD helps to improve forecasting results. Parallelization is used to perform extensive investigation across the full range of data.
Abstract: This paper describes a methodology for modeling workload for distributed systems. It de... more Abstract: This paper describes a methodology for modeling workload for distributed systems. It derives concise and descriptive models of workload from the actual workload traces. The job inter-arrival time, runtime, CPU required, and daily arrival pattern are modeled. This methodology has been successfully used in several cases studies to model workloads from enterprise grid systems to supercomputers in academic environments.
Abstract: This paper studies the relationship between investments in High-Performance Computing (... more Abstract: This paper studies the relationship between investments in High-Performance Computing (HPC) instrumentation and research competitiveness. Measures of institutional HPC investment are computed from data that is readily available from the Top 500 list, a list that has been published twice a year since 1993 that lists the fastest 500 computers in the world at that time.
Abstract Shibboleth is an architecture and protocol for allowing users to authenticate and be aut... more Abstract Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution.
… . ITNG'07. Fourth International Conference on, Jan 1, 2007
Abstract A version control repository structure has been created based on open source utility sof... more Abstract A version control repository structure has been created based on open source utility software. The structure consists of a subversion repository with an Apache Web interface that is protected by a Shibboleth authentication system. This structure can allow authorized and authenticated data sharing between institutions, yet retains simplicity and protects privacy for users. In addition, it also helps local administrators from having to perform extra account management for new users from other institutions
Abstract—The recent challenges for higher education call for research that can offer a comprehens... more Abstract—The recent challenges for higher education call for research that can offer a comprehensive understanding about the performance and efficiency of higher education institutions in their three primary missions: research, education, and service. In other for this to happen, it is necessary for researchers to have access to a multitude of data sources. However, due to the nature of their academic training, many higher education practitioners do not have access to expertise in working with different data sources.
Abstract This research utilizes several well known forecasting techniques in combination with Emp... more Abstract This research utilizes several well known forecasting techniques in combination with Empirical Mode Decomposition (EMD) to investigate the trade-offs of EMD's decomposition (sifting) step for forecasting the arrival workload of an enterprise cluster. The research is based on earlier work on the forecasting potential of EMD. Results show that EMD helps to improve forecasting results. Parallelization is used to perform extensive investigation across the full range of data.
Abstract: This paper describes a methodology for modeling workload for distributed systems. It de... more Abstract: This paper describes a methodology for modeling workload for distributed systems. It derives concise and descriptive models of workload from the actual workload traces. The job inter-arrival time, runtime, CPU required, and daily arrival pattern are modeled. This methodology has been successfully used in several cases studies to model workloads from enterprise grid systems to supercomputers in academic environments.
Abstract: This paper studies the relationship between investments in High-Performance Computing (... more Abstract: This paper studies the relationship between investments in High-Performance Computing (HPC) instrumentation and research competitiveness. Measures of institutional HPC investment are computed from data that is readily available from the Top 500 list, a list that has been published twice a year since 1993 that lists the fastest 500 computers in the world at that time.
Abstract Shibboleth is an architecture and protocol for allowing users to authenticate and be aut... more Abstract Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and attribute information to be performed at the hosting or home institution.
… . ITNG'07. Fourth International Conference on, Jan 1, 2007
Abstract A version control repository structure has been created based on open source utility sof... more Abstract A version control repository structure has been created based on open source utility software. The structure consists of a subversion repository with an Apache Web interface that is protected by a Shibboleth authentication system. This structure can allow authorized and authenticated data sharing between institutions, yet retains simplicity and protects privacy for users. In addition, it also helps local administrators from having to perform extra account management for new users from other institutions
Uploads
Papers by Linh Ngo