Skip to main content

Showing 1–5 of 5 results for author: Ristov, S

Searching in archive cs. Search in all archives.
.
  1. Workflows Community Summit 2022: A Roadmap Revolution

    Authors: Rafael Ferreira da Silva, Rosa M. Badia, Venkat Bala, Debbie Bard, Peer-Timo Bremer, Ian Buckley, Silvina Caino-Lores, Kyle Chard, Carole Goble, Shantenu Jha, Daniel S. Katz, Daniel Laney, Manish Parashar, Frederic Suter, Nick Tyler, Thomas Uram, Ilkay Altintas, Stefan Andersson, William Arndt, Juan Aznar, Jonathan Bader, Bartosz Balis, Chris Blanton, Kelly Rosa Braghetto, Aharon Brodutch , et al. (80 additional authors not shown)

    Abstract: Scientific workflows have become integral tools in broad scientific computing use cases. Science discovery is increasingly dependent on workflows to orchestrate large and complex scientific experiments that range from execution of a cloud-based data preprocessing pipeline to multi-facility instrument-to-edge-to-HPC computational workflows. Given the changing landscape of scientific computing and t… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Report number: ORNL/TM-2023/2885

  2. arXiv:2207.14584  [pdf

    cs.DC cs.AI cs.ET cs.LG

    Decentralized Machine Learning for Intelligent Health Care Systems on the Computing Continuum

    Authors: Dragi Kimovski, Sasko Ristov, Radu Prodan

    Abstract: The introduction of electronic personal health records (EHR) enables nationwide information exchange and curation among different health care systems. However, the current EHR systems do not provide transparent means for diagnosis support, medical research or can utilize the omnipresent data produced by the personal medical devices. Besides, the EHR systems are centrally orchestrated, which could… ▽ More

    Submitted 3 October, 2022; v1 submitted 29 July, 2022; originally announced July 2022.

  3. Workflows Community Summit: Advancing the State-of-the-art of Scientific Workflows Management Systems Research and Development

    Authors: Rafael Ferreira da Silva, Henri Casanova, Kyle Chard, Tainã Coleman, Dan Laney, Dong Ahn, Shantenu Jha, Dorran Howell, Stian Soiland-Reys, Ilkay Altintas, Douglas Thain, Rosa Filgueira, Yadu Babuji, Rosa M. Badia, Bartosz Balis, Silvina Caino-Lores, Scott Callaghan, Frederik Coppens, Michael R. Crusoe, Kaushik De, Frank Di Natale, Tu M. A. Do, Bjoern Enders, Thomas Fahringer, Anne Fouilloux , et al. (33 additional authors not shown)

    Abstract: Scientific workflows are a cornerstone of modern scientific computing, and they have underpinned some of the most significant discoveries of the last decade. Many of these workflows have high computational, storage, and/or communication demands, and thus must execute on a wide range of large-scale platforms, from large clouds to upcoming exascale HPC platforms. Workflows will play a crucial role i… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

  4. A Topic Coverage Approach to Evaluation of Topic Models

    Authors: Damir Korenčić, Strahil Ristov, Jelena Repar, Jan Šnajder

    Abstract: Topic models are widely used unsupervised models capable of learning topics - weighted lists of words and documents - from large collections of text documents. When topic models are used for discovery of topics in text collections, a question that arises naturally is how well the model-induced topics correspond to topics of interest to the analyst. In this paper we revisit and extend a so far negl… ▽ More

    Submitted 2 September, 2021; v1 submitted 11 December, 2020; originally announced December 2020.

    Comments: Final version accepted for publication in IEEE Access (https://doi.org/10.1109/ACCESS.2021.3109425); Contributions unchanged, results augmented with the analysis of the models' precision and recall and the analysis of the measures' running time; Improved description of the contributions; Improved future work

    ACM Class: H.3.3; I.5.4; I.2.7

  5. arXiv:1204.1140  [pdf

    cs.CR cs.DC

    Cloud Computing Security in Business Information Systems

    Authors: Sasko Ristov, Marjan Gusev, Magdalena Kostoska

    Abstract: Cloud computing providers' and customers' services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analyze… ▽ More

    Submitted 5 April, 2012; originally announced April 2012.

    Journal ref: S. Ristov, M. Gusev, and M. Kostoska, "Cloud computing security in business information systems," International Journal of Network Security & Its Applications (IJNSA), vol. 4, no. 2, pp. 75-93, 2012