Skip to main navigation Skip to search Skip to main content

Exploiting cloud computing for algorithm development

Neil S. O'Brien, Steven J. Johnston, Elizabeth E. Hart, Kamal Djidjeli, Simon J. Cox

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider the application of cloud computing to the process of algorithm development. We introduce a case study focusing on the development of a novel algorithm in computational electromagnetics, illustrating several challenging areas for algorithm developers where cloud-based architectures can deliver enhanced productivity and potentially save costs. The development, verification and tuning of our algorithm have all been assisted by cloud-based technologies. Our preliminary results both demonstrate the potential of the algorithm to solve the problems accurately, and of cloud-based architectures to accelerate the development and verification process. We propose that cloud-based architectures will in the future play a greater role in the development of algorithms; saving costs by improving hardware utilisation, and reducing turnaround time.
Original languageEnglish
Title of host publication2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Subtitle of host publicationCyberC 2011
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages336-342
Number of pages7
ISBN (Print) 9781457718274
DOIs
Publication statusPublished - Oct 2011
Event2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery - Beijing, China
Duration: 10 Oct 201112 Oct 2011
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6079484

Conference

Conference2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Abbreviated titleCyberC 2011
Country/TerritoryChina
CityBeijing
Period10/10/1112/10/11
Internet address

Fingerprint

Dive into the research topics of 'Exploiting cloud computing for algorithm development'. Together they form a unique fingerprint.

Cite this