Information Technology Reference
In-Depth Information
Compilation of References
Aarts, R. (Ed.). (2004). Liberty ID-WSF interaction ser-
vice specification . Liberty Alliance document. Retrieved
from http://www.project-liberty.org/
Agrawal, R., & Srikant, R. (1996). Mining sequential pat-
terns: Generalizations and performance improvements.
Paper presented at the 5th International Conference on
Extending Database Technology: Advances in Database
Technology.
Aberer, K., Mauroux, P. C., Datta, A., Despotovic, Z.,
Hauswirth, M., Punceva, M., & Schmidt, R. (2003). P-
Grid: A self-organizing structured P2P system. SIGMOD,
32. ACM.
Ahronovitz, M., et al. (2010). Cloud computing use cases .
A white paper produced by the Cloud Computing Use
Case Discussion Group. Retrieved from http://groups.
google.com/ group/cloud-computing-use-cases
Abramson, D., & Kommineni, J. (2004). A Flexible IO
Scheme for Grid Workflows. In Proc. of the 18th Inter-
national Parallel and Distributed Processing Symposium .
Krakow, Poland.
Akyildiz, I. F., Xudong Wang, B., & Weilin Wang, B.
(2005). Wireless mesh networks: a survey. Computer
Networks and ISDN Systems , 47 (4), 445-487.
Abramson, D., Foster, I., Giddy, J., Lewis, A., Sosic, R.,
Sutherst, R., & White, N. (1997). Nimrod Computational
Workbench: A Case Study in Desktop Metacomputing.
In Australian Computer Science Conference (ACSC 97) .
Macquarie University, Sydney.
Aldrich, J. (1997). R. A. Fisher and the making of maxi-
mum likelihood 1912-1922. Statistical Science , 12 (3),
162-176. doi:10.1214/ss/1030037906
Alfieri, R., Cecchini, R., Ciaschini, V., dell'Agnello, L.,
Frohner, A., Gianoli, A., et al. Spataro, F. (2004). Voms,
an authorization system for virtual organizations. Euro-
pean Across Grids Conference, LNCS 2970 , (pp. 33-40).
Springer, 2004.
Abramson, D., Sosic, R., Giddy, J., & Hall, B. (1995).
Nimrod: A Tool for Performing Parameterised Simulations
using Distributed Workstations. In Proc. of the 4th IEEE
Symposium on High Performance Distributed Computing .
Virginia. IEEE Press.
Ali, S., Siegel, H. J., Hensgen, D., & Freund, R. F. (1999).
Dynamic mapping of a class of independent tasks onto
heterogeneous computing systems. Journal of Parallel
and Distributed Computing , 59 (2), 107-131. doi:10.1006/
jpdc.1999.1581
Acunetix. Google Hacking . from http://www.acunetix.
com/websitesecurity/google-hacking.htm.
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., &
Lilley, J. (1999). The Design and Implementation of
an Intentional Naming System. Proc. 17th ACM SOSP ,
Kiawah Island, SC, Dec.
Allen, G., Davis, K., Goodale, T., Hutanu, A., Kaiser, H.,
& Kielmann, T. (2005). The Grid Application Toolkit:
Towards generic and easy application programming
interfaces for the Grid. Proceedings of the IEEE , 93 (3),
534-550. doi:10.1109/JPROC.2004.842755
Agrawal, R., & Srikant, R. (1995). Mining sequential
patterns. Paper presented at the 17th International Con-
ference on Data Engineering.
Search WWH ::




Custom Search