Information Technology Reference
In-Depth Information
Barabasi, A.-L., Freeh, V. W., Jeong, H., & Brockman, J.
B. (2001). Parasitic Computing. Nature , 412.
Bell, W. H., Cameron, D. G., Carvajal-Schiaffino, R.,
Millar, A. P., Stockinger, K., & Zini, F. (2003). Evaluation
of an economy-based file replication strategy for a data
Grid . In International Workshop on Agent based Cluster
and Grid Computing at CCGrid 2003. Tokyo, Japan: IEEE
Computer Society Press.
Barsanti, L., & Sodan, A. (2007). Adaptive job schedul-
ing via predictive job resource allocation. Proceedings
of the 12 th Conference on Job Scheduling Strategies for
Parallel Processing, (pp. 115-140).
Bellare, M., & Rogaway, P. (1993). Random oracles are
practical: A paradigm for designing efficient protocols .
In CCS '93 1st ACM Conference on Computer and
Communications Security, (pp. 62-73). New York, NY:
ACM Press.
Bartosz Baliś, M., & Wegiel, M. (2008). LGF: A flex-
ible framework for exposing legacy codes as services.
Future Generation Computer Systems , 24 (7), 711-719.
doi:10.1016/j.future.2007.12.001
Basin, D., & Doser, J. (2002). SecureUML: A UML-based
modeling language for model-driven security. Paper
presented at the 5th International Conference on the
Unified Modeling Language. Lecture Notes in Computer
Science 2460 .
Bellavista, P., & Corradi, A. (2006). The hand-
book of mobile middleware . Auerbach Publications.
doi:10.1201/9781420013153
Beltrame, F., Maggi, P., Melato, M., Molinari, E., Sisto, R.,
& Torterolo, L. (2006). SRB data Grid and compute Grid
integration via the EnginFrame Grid portal. Proceedings
of the 1 st SRB Workshop , 2-3 February 2006, San Diego,
USA. Retrieved from www.sdsc.edu/srb/Workshop /
SRB-handout-v2.pdf
Basin, D., Doser, J., & Lodderstedt, T. (2003). Model driven
security for process-oriented systems . Paper presented
at the ACM Symposium on Access Control Models and
Technologies, Como, Italy.
Batchu, R., Dandass, Y. S., Skjellum, A., & Beddhu,
M. (2004). MPI/FT: A Model-Based Approach to Low-
Overhead Fault Tolerant Message-Passing Middleware.
Cluster Computing , 7 (4), 303-315. doi:10.1023/
B:CLUS.0000039491.64560.8a
Berendt, B., Günther, O., & Spiekermann, S. (2005).
Privacy in e-commerce. Communications of the ACM,
48 (4). ACM Press.
Bhanwar, S., & Bawa, S. (2008). Securing a Grid . Paper
presented at the World Academy of Science, Engineering
and Technology.
Baur, T., Breu, R., Kalman, T., Lindinger, T., Milbert, A.,
Poghosyan, G., … Rombert, M. (2009). An interoperable
Grid Information System for integrated resource moni-
toring based on virtual organizations. Journal of Grid
Computing, 7 (3). Springer.
Bharambe, A. R., Agrawal, S., & Seshan, S. (2004). Mer-
cury: Supporting scalable multi-attribute range queries.
In SIGCOMM Symposium on Communications Architec-
tures and Protocols, (pp 353-366). Portland, OR, USA.
Bazinet, A., Myers, D., Fuetsch, J., & Cummings,
M. (2007). Grid Services Base Library: A high-level,
procedural application programming interface for writ-
ing Globus-based Grid services. Future Generation
Computer Systems , 23 (3), 517-522. doi:10.1016/j.
future.2006.07.009
BIRN. (2008). Biomedical Informatics Research Network .
Retrieved from www.nbirn.net/index.shtm
Blancquer, I., Hernández, V., Segrelles, D., & Torres,
E. (2009). Enhancing privacy and authorization control
scalability in the Grid through ontologies. IEEE Transac-
tions on Information Technology in Biomedicine , 13 (1),
16-24. doi:10.1109/TITB.2008.2003369
BEinGRID. (2008). Business experiments in grids . Re-
trieved from www.beingrid.com
BOINC - Berkeley Open Infrastructure for Network
Computing. (2008). http://boinc.berkeley.edu/ (1.5.2008)
Search WWH ::




Custom Search