Information Technology Reference
In-Depth Information
Compilation of References
Aarts, R. (Ed.). (2004).
Liberty ID-WSF interaction ser-
vice specification
. Liberty Alliance document. Retrieved
from http://www.project-liberty.org/
Agrawal, R., & Srikant, R. (1996).
Mining sequential pat-
terns: Generalizations and performance improvements.
Paper presented at the 5th International Conference on
Extending Database Technology: Advances in Database
Technology.
Aberer, K., Mauroux, P. C., Datta, A., Despotovic, Z.,
Hauswirth, M., Punceva, M., & Schmidt, R. (2003). P-
Grid: A self-organizing structured P2P system.
SIGMOD,
32.
ACM.
Ahronovitz, M., et al. (2010).
Cloud computing use cases
.
A white paper produced by the Cloud Computing Use
Case Discussion Group. Retrieved from http://groups.
google.com/ group/cloud-computing-use-cases
Abramson, D., & Kommineni, J. (2004). A Flexible IO
Scheme for Grid Workflows. In
Proc. of the 18th Inter-
national Parallel and Distributed Processing Symposium
.
Krakow, Poland.
Akyildiz, I. F., Xudong Wang, B., & Weilin Wang, B.
(2005). Wireless mesh networks: a survey.
Computer
Networks and ISDN Systems
,
47
(4), 445-487.
Abramson, D., Foster, I., Giddy, J., Lewis, A., Sosic, R.,
Sutherst, R., & White, N. (1997). Nimrod Computational
Workbench: A Case Study in Desktop Metacomputing.
In
Australian Computer Science Conference (ACSC 97)
.
Macquarie University, Sydney.
Aldrich, J. (1997). R. A. Fisher and the making of maxi-
mum likelihood 1912-1922.
Statistical Science
,
12
(3),
162-176. doi:10.1214/ss/1030037906
Alfieri, R., Cecchini, R., Ciaschini, V., dell'Agnello, L.,
Frohner, A., Gianoli, A., et al. Spataro, F. (2004). Voms,
an authorization system for virtual organizations.
Euro-
pean Across Grids Conference, LNCS 2970
, (pp. 33-40).
Springer, 2004.
Abramson, D., Sosic, R., Giddy, J., & Hall, B. (1995).
Nimrod: A Tool for Performing Parameterised Simulations
using Distributed Workstations. In
Proc. of the 4th IEEE
Symposium on High Performance Distributed Computing
.
Virginia. IEEE Press.
Ali, S., Siegel, H. J., Hensgen, D., & Freund, R. F. (1999).
Dynamic mapping of a class of independent tasks onto
heterogeneous computing systems.
Journal of Parallel
and Distributed Computing
,
59
(2), 107-131. doi:10.1006/
jpdc.1999.1581
Acunetix.
Google Hacking
. from http://www.acunetix.
com/websitesecurity/google-hacking.htm.
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., &
Lilley, J. (1999). The Design and Implementation of
an Intentional Naming System.
Proc. 17th ACM SOSP
,
Kiawah Island, SC, Dec.
Allen, G., Davis, K., Goodale, T., Hutanu, A., Kaiser, H.,
& Kielmann, T. (2005). The Grid Application Toolkit:
Towards generic and easy application programming
interfaces for the Grid.
Proceedings of the IEEE
,
93
(3),
534-550. doi:10.1109/JPROC.2004.842755
Agrawal, R., & Srikant, R. (1995).
Mining sequential
patterns.
Paper presented at the 17th International Con-
ference on Data Engineering.
Search WWH ::
Custom Search