Serveur d'exploration Cyberinfrastructure

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems

Identifieur interne : 000002 ( Istex/Corpus ); précédent : 000001; suivant : 000003

Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems

Auteurs : Sarat Sreepathi ; Kumar Mahinthakumar ; Emily Zechman ; Ranji Ranjithan ; Downey Brill ; Xiaosong Ma ; Gregor Von Laszewski

Source :

RBID : ISTEX:4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF

Abstract

Abstract: This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.

Url:
DOI: 10.1007/978-3-540-72584-8_139

Links to Exploration step

ISTEX:4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<author>
<name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: sarat_s@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: gmkumar@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: emzechma@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ranji@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: brill@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ma, Xiaosong" sort="Ma, Xiaosong" uniqKey="Ma X" first="Xiaosong" last="Ma">Xiaosong Ma</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: xma@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Von Laszewski, Gregor" sort="Von Laszewski, Gregor" uniqKey="Von Laszewski G" first="Gregor" last="Von Laszewski">Gregor Von Laszewski</name>
<affiliation>
<mods:affiliation>University of Chicago, Chicago, IL, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: gregor@mcs.anl.gov</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF</idno>
<date when="2007" year="2007">2007</date>
<idno type="doi">10.1007/978-3-540-72584-8_139</idno>
<idno type="url">https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000002</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<author>
<name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: sarat_s@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: gmkumar@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: emzechma@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: ranji@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: brill@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Ma, Xiaosong" sort="Ma, Xiaosong" uniqKey="Ma X" first="Xiaosong" last="Ma">Xiaosong Ma</name>
<affiliation>
<mods:affiliation>North Carolina State University, Raleigh, NC, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: xma@ncsu.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Von Laszewski, Gregor" sort="Von Laszewski, Gregor" uniqKey="Von Laszewski G" first="Gregor" last="Von Laszewski">Gregor Von Laszewski</name>
<affiliation>
<mods:affiliation>University of Chicago, Chicago, IL, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: gregor@mcs.anl.gov</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2007</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF</idno>
<idno type="DOI">10.1007/978-3-540-72584-8_139</idno>
<idno type="ChapterID">139</idno>
<idno type="ChapterID">Chap139</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Sarat Sreepathi</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: sarat_s@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Kumar Mahinthakumar</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: gmkumar@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Emily Zechman</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: emzechma@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Ranji Ranjithan</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: ranji@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Downey Brill</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: brill@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Xiaosong Ma</name>
<affiliations>
<json:string>North Carolina State University, Raleigh, NC, USA</json:string>
<json:string>E-mail: xma@ncsu.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gregor von Laszewski</name>
<affiliations>
<json:string>University of Chicago, Chicago, IL, USA</json:string>
<json:string>E-mail: gregor@mcs.anl.gov</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.</abstract>
<qualityIndicators>
<score>4.275</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>893</abstractCharCount>
<pdfWordCount>2835</pdfWordCount>
<pdfCharCount>18781</pdfCharCount>
<pdfPageCount>8</pdfPageCount>
<abstractWordCount>120</abstractWordCount>
</qualityIndicators>
<title>Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<chapterId>
<json:string>139</json:string>
<json:string>Chap139</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
</json:item>
<json:item>
<name>Takeo Kanade</name>
</json:item>
<json:item>
<name>Josef Kittler</name>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
</json:item>
<json:item>
<name>John C. Mitchell</name>
</json:item>
<json:item>
<name>Moni Naor</name>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
</json:item>
<json:item>
<name>Madhu Sudan</name>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
</json:item>
<json:item>
<name>Doug Tygar</name>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2007</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Yong Shi</name>
</json:item>
<json:item>
<name>Geert Dick van Albada</name>
</json:item>
<json:item>
<name>Jack Dongarra</name>
</json:item>
<json:item>
<name>Peter M. A. Sloot</name>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Theory of Computation</value>
</json:item>
<json:item>
<value>Software Engineering/Programming and Operating Systems</value>
</json:item>
<json:item>
<value>Numeric Computing</value>
</json:item>
<json:item>
<value>Information Systems and Communication Service</value>
</json:item>
<json:item>
<value>Simulation and Modeling</value>
</json:item>
<json:item>
<value>Computer Imaging, Vision, Pattern Recognition and Graphics</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-72583-1</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Computational Science – ICCS 2007</title>
<bookId>
<json:string>978-3-540-72584-8</json:string>
</bookId>
<volume>4487</volume>
<pages>
<last>1065</last>
<first>1058</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>book-series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-72584-8</json:string>
</eisbn>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-72584-8</json:string>
</doi>
</host>
<publicationDate>2007</publicationDate>
<copyrightDate>2007</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-72584-8_139</json:string>
</doi>
<id>4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF</id>
<score>0.8537218</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>Springer-Verlag Berlin Heidelberg, 2007</p>
</availability>
<date>2007</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<author xml:id="author-1">
<persName>
<forename type="first">Sarat</forename>
<surname>Sreepathi</surname>
</persName>
<email>sarat_s@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-2">
<persName>
<forename type="first">Kumar</forename>
<surname>Mahinthakumar</surname>
</persName>
<email>gmkumar@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-3">
<persName>
<forename type="first">Emily</forename>
<surname>Zechman</surname>
</persName>
<email>emzechma@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-4">
<persName>
<forename type="first">Ranji</forename>
<surname>Ranjithan</surname>
</persName>
<email>ranji@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-5">
<persName>
<forename type="first">Downey</forename>
<surname>Brill</surname>
</persName>
<email>brill@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-6">
<persName>
<forename type="first">Xiaosong</forename>
<surname>Ma</surname>
</persName>
<email>xma@ncsu.edu</email>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
</author>
<author xml:id="author-7">
<persName>
<forename type="first">Gregor</forename>
<surname>von Laszewski</surname>
</persName>
<email>gregor@mcs.anl.gov</email>
<affiliation>University of Chicago, Chicago, IL, USA</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Computational Science – ICCS 2007</title>
<title level="m" type="sub">7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part I</title>
<idno type="pISBN">978-3-540-72583-1</idno>
<idno type="eISBN">978-3-540-72584-8</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-540-72584-8</idno>
<idno type="book-ID">978-3-540-72584-8</idno>
<idno type="book-title-ID">149861</idno>
<idno type="book-sequence-number">4487</idno>
<idno type="book-volume-number">4487</idno>
<idno type="book-chapter-count">162</idno>
<editor>
<persName>
<forename type="first">Yong</forename>
<surname>Shi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Geert</forename>
<forename type="first">Dick</forename>
<surname>van Albada</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jack</forename>
<surname>Dongarra</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Peter</forename>
<forename type="first">M.</forename>
<forename type="first">A.</forename>
<surname>Sloot</surname>
</persName>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2007"></date>
<biblScope unit="volume">4487</biblScope>
<biblScope unit="page" from="1058">1058</biblScope>
<biblScope unit="page" to="1065">1065</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<forename type="first">Pandu</forename>
<surname>Rangan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
</editor>
<biblScope>
<date>2007</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="series-Id">558</idno>
</series>
<idno type="istex">4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF</idno>
<idno type="DOI">10.1007/978-3-540-72584-8_139</idno>
<idno type="ChapterID">139</idno>
<idno type="ChapterID">Chap139</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2007</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.</p>
</abstract>
<textClass>
<keywords scheme="Book-Subject-Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book-Subject-Group">
<list>
<label>I</label>
<label>I16005</label>
<label>I14002</label>
<label>I1701X</label>
<label>I18008</label>
<label>I21025</label>
<label>I22005</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Theory of Computation</term>
</item>
<item>
<term>Software Engineering/Programming and Operating Systems</term>
</item>
<item>
<term>Numeric Computing</term>
</item>
<item>
<term>Information Systems and Communication Service</term>
</item>
<item>
<term>Simulation and Modeling</term>
</item>
<item>
<term>Computer Imaging, Vision, Pattern Recognition and Graphics</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2007">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-09-22">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
<SeriesAbbreviatedTitle>LNCS</SeriesAbbreviatedTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<GivenName>Pandu</GivenName>
<FamilyName>Rangan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingStyle="Unnumbered" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-72584-8</BookID>
<BookTitle>Computational Science – ICCS 2007</BookTitle>
<BookSubTitle>7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part I</BookSubTitle>
<BookVolumeNumber>4487</BookVolumeNumber>
<BookSequenceNumber>4487</BookSequenceNumber>
<BookDOI>10.1007/978-3-540-72584-8</BookDOI>
<BookTitleID>149861</BookTitleID>
<BookPrintISBN>978-3-540-72583-1</BookPrintISBN>
<BookElectronicISBN>978-3-540-72584-8</BookElectronicISBN>
<BookChapterCount>162</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I16005" Priority="1" Type="Secondary">Theory of Computation</BookSubject>
<BookSubject Code="I14002" Priority="2" Type="Secondary">Software Engineering/Programming and Operating Systems</BookSubject>
<BookSubject Code="I1701X" Priority="3" Type="Secondary">Numeric Computing</BookSubject>
<BookSubject Code="I18008" Priority="4" Type="Secondary">Information Systems and Communication Service</BookSubject>
<BookSubject Code="I21025" Priority="5" Type="Secondary">Simulation and Modeling</BookSubject>
<BookSubject Code="I22005" Priority="6" Type="Secondary">Computer Imaging, Vision, Pattern Recognition and Graphics</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Yong</GivenName>
<FamilyName>Shi</FamilyName>
</EditorName>
<Contact>
<Email>yshi@mail.unomaha.edu</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Geert</GivenName>
<GivenName>Dick</GivenName>
<Particle>van</Particle>
<FamilyName>Albada</FamilyName>
</EditorName>
<Contact>
<Email>dick@science.uva.nl</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Jack</GivenName>
<FamilyName>Dongarra</FamilyName>
</EditorName>
<Contact>
<Email>dongarra@cs.utk.edu</Email>
</Contact>
</Editor>
<Editor>
<EditorName DisplayOrder="Western">
<GivenName>Peter</GivenName>
<GivenName>M.</GivenName>
<GivenName>A.</GivenName>
<FamilyName>Sloot</FamilyName>
</EditorName>
<Contact>
<Email>sloot@science.uva.nl</Email>
</Contact>
</Editor>
</EditorGroup>
</BookHeader>
<Chapter ID="Chap139" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingStyle="Unnumbered" TocLevels="0">
<ChapterID>139</ChapterID>
<ChapterDOI>10.1007/978-3-540-72584-8_139</ChapterDOI>
<ChapterSequenceNumber>139</ChapterSequenceNumber>
<ChapterTitle Language="En">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</ChapterTitle>
<ChapterFirstPage>1058</ChapterFirstPage>
<ChapterLastPage>1065</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2007</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Sarat</GivenName>
<FamilyName>Sreepathi</FamilyName>
</AuthorName>
<Contact>
<Email>sarat_s@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Kumar</GivenName>
<FamilyName>Mahinthakumar</FamilyName>
</AuthorName>
<Contact>
<Email>gmkumar@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Emily</GivenName>
<FamilyName>Zechman</FamilyName>
</AuthorName>
<Contact>
<Email>emzechma@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Ranji</GivenName>
<FamilyName>Ranjithan</FamilyName>
</AuthorName>
<Contact>
<Email>ranji@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Downey</GivenName>
<FamilyName>Brill</FamilyName>
</AuthorName>
<Contact>
<Email>brill@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff1">
<AuthorName DisplayOrder="Western">
<GivenName>Xiaosong</GivenName>
<FamilyName>Ma</FamilyName>
</AuthorName>
<Contact>
<Email>xma@ncsu.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff2">
<AuthorName DisplayOrder="Western">
<GivenName>Gregor</GivenName>
<Particle>von</Particle>
<FamilyName>Laszewski</FamilyName>
</AuthorName>
<Contact>
<Email>gregor@mcs.anl.gov</Email>
</Contact>
</Author>
<Affiliation ID="Aff1">
<OrgName>North Carolina State University, Raleigh, NC</OrgName>
<OrgAddress>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>University of Chicago, Chicago, IL</OrgName>
<OrgAddress>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
</titleInfo>
<name type="personal">
<namePart type="given">Sarat</namePart>
<namePart type="family">Sreepathi</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: sarat_s@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Kumar</namePart>
<namePart type="family">Mahinthakumar</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: gmkumar@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Emily</namePart>
<namePart type="family">Zechman</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: emzechma@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ranji</namePart>
<namePart type="family">Ranjithan</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: ranji@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Downey</namePart>
<namePart type="family">Brill</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: brill@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Xiaosong</namePart>
<namePart type="family">Ma</namePart>
<affiliation>North Carolina State University, Raleigh, NC, USA</affiliation>
<affiliation>E-mail: xma@ncsu.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gregor</namePart>
<namePart type="family">von Laszewski</namePart>
<affiliation>University of Chicago, Chicago, IL, USA</affiliation>
<affiliation>E-mail: gregor@mcs.anl.gov</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2007</dateIssued>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid environment. The components developed in this research include: (i) a coarse-grained parallel wrapper for the simulation module that includes additional features for persistent execution, (ii) a seamless job submission interface, and (iii) a graphical real time application monitoring tool. The performance of the cyberinfrastructure is evaluated on a local cluster and the TeraGrid.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Computational Science – ICCS 2007</title>
<subTitle>7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part I</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Yong</namePart>
<namePart type="family">Shi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Geert</namePart>
<namePart type="given">Dick</namePart>
<namePart type="family">van Albada</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jack</namePart>
<namePart type="family">Dongarra</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Peter</namePart>
<namePart type="given">M.</namePart>
<namePart type="given">A.</namePart>
<namePart type="family">Sloot</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16005">Theory of Computation</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14002">Software Engineering/Programming and Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I1701X">Numeric Computing</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18008">Information Systems and Communication Service</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21025">Simulation and Modeling</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I22005">Computer Imaging, Vision, Pattern Recognition and Graphics</topic>
</subject>
<identifier type="DOI">10.1007/978-3-540-72584-8</identifier>
<identifier type="ISBN">978-3-540-72583-1</identifier>
<identifier type="eISBN">978-3-540-72584-8</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">149861</identifier>
<identifier type="BookID">978-3-540-72584-8</identifier>
<identifier type="BookChapterCount">162</identifier>
<identifier type="BookVolumeNumber">4487</identifier>
<identifier type="BookSequenceNumber">4487</identifier>
<part>
<date>2007</date>
<detail type="volume">
<number>4487</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>1058</start>
<end>1065</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="given">Pandu</namePart>
<namePart type="family">Rangan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2007</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF</identifier>
<identifier type="DOI">10.1007/978-3-540-72584-8_139</identifier>
<identifier type="ChapterID">139</identifier>
<identifier type="ChapterID">Chap139</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2007</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer Berlin Heidelberg, 2007</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<json:item>
<type>multicat</type>
<uri>https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/enrichments/multicat</uri>
</json:item>
<istex:refBibTEI uri="https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<analytic>
<title level="a" type="main">Introduction to the ICCS 2006 Workshop on Dynamic data driven applications systems</title>
<author>
<persName>
<forename type="first">F</forename>
<surname>Darema</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Lecture Notes in Computer Science</title>
<imprint>
<biblScope unit="volume">3993</biblScope>
<biblScope unit="page" from="375" to="383"></biblScope>
<date type="published" when="2006"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b1">
<analytic>
<title level="a" type="main">An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems</title>
<author>
<persName>
<forename type="first">G</forename>
<surname>Mahinthakumar</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">G</forename>
<surname>Von Laszewski</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Ranjithan</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">D</forename>
<surname>Brill</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Uber</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">K</forename>
<forename type="middle">W</forename>
<surname>Harrison</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Sreepathi</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">M</forename>
<surname>Zechman</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Lecture Notes in Computer Science</title>
<imprint>
<publisher>Springer-Verlag</publisher>
<publisher>Springer-Verlag</publisher>
<biblScope unit="page" from="401" to="408"></biblScope>
<date type="published" when="2006"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">Evolutionary Computation-based Methods for Characterizing Contaminant Sources in a Water Distribution System</title>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">M</forename>
<surname>Zechman</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Ranjithan</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">Journal of Water Resources Planning and Management</title>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Adaptive Contamination Source Identification in Water Distribution Systems Using an Evolutionary Algorithm-based Dynamic Optimization Procedure</title>
<author>
<persName>
<forename type="first">L</forename>
<surname>Liu</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">M</forename>
<surname>Zechman</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">E</forename>
<forename type="middle">D</forename>
<surname>Brill</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">G</forename>
<surname>Jr</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Mahinthakumar</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">J</forename>
<surname>Ranjithan</surname>
</persName>
</author>
<author>
<persName>
<surname>Uber</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Water Distribution Systems Analysis Symposium</title>
<meeting>
<address>
<addrLine>Cincinnati, OH</addrLine>
</address>
</meeting>
<imprint>
<date type="published" when="20065-08"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<monogr>
<title></title>
<author>
<persName>
<forename type="first">Kepler</forename>
<surname>Project</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Website</forename>
</persName>
</author>
<imprint></imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Sreepathi</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Master's Thesis</title>
<imprint>
<date type="published" when="2006-12"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<analytic>
<title level="a" type="main">The EPANET programmer's toolkit</title>
<author>
<persName>
<forename type="first">L</forename>
<forename type="middle">A</forename>
<surname>Rossman</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Proceedings of Water Resources Planning and Management Division Annual Specialty Conference</title>
<meeting>Water Resources Planning and Management Division Annual Specialty Conference
<address>
<addrLine>Tempe, AZ</addrLine>
</address>
</meeting>
<imprint>
<publisher>ASCE</publisher>
<date type="published" when="1999"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b7">
<analytic>
<title level="a" type="main">Simulation-Optimization for Threat Management in Urban Water Systems, Demo, Fall</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Sreepathi</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Internet2 Meeting</title>
<imprint>
<date type="published" when="2006-12"></date>
</imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
<json:item>
<type>refBibs</type>
<uri>https://api.istex.fr/document/4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF/enrichments/refBibs</uri>
</json:item>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000002 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000002 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    CyberinfraV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:4B90FABFAB3C42505E5BBFADD1489C21DC2FDABF
   |texte=   Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems
}}

Wicri

This area was generated with Dilib version V0.6.25.
Data generation: Thu Oct 27 09:30:58 2016. Site generation: Sun Mar 10 23:08:40 2024