Information Technology Reference
In-Depth Information
Flechais, I., Sasse, M. A., & Hailes, S. M. V. (2003).
Bringing security home: A process for developing secure
and usable systems . Paper presented at the New Security
Paradigms Workshop (NSPW'03), Ascona, Switzerland.
Foster, I., Kesselman, C., & Tuecke, S. (2001) The
Anatomy of the Grid: Enabling Scalable Virtual Organiza-
tions. International J. Supercomputer Applications, 15 (3).
Foster. (2002). What is the Grid? A three point checklist.
GRIDtoday, 1 (6).
Flouris, M. D., & Markatos, E. P. (1999). The net-
work RamDisk: Using remote memory on hetero-
geneous NOWs. Cluster Computing , 2 (4), 281-293.
doi:10.1023/A:1019051330479
Fox, G., Williams, R., & Messina, P. (1994). Parallel
computing works! Morgan Kaufmann Publishers.
Freeman, E., Hupfer, S., & Arnold, K. (1999). JavaSpaces
Principles, Patterns, and Practice . Addison-Wesley.
Foster, I., & Kesselman, C. (1998). The Grid - Blueprint
for a New Computing Infrastructure . Morgan Kaufmann.
Freier, A. O., Karlton, P., & Kocher, P. C. (1996). Inter-
net Draft: The SSL Protocol Version 3.0. The Internet
Engineering Task Force (IETF), Available at http://
wp.netscape.com/eng/ssl3/draft302.txt,last accessed in
November 2007.
Foster, I., Kesselman, C., & Tuecke, S. (2001). The Anat-
omy of the Grid: Enabling Scalable Virtual Organizations.
The International Journal of Supercomputer Applications ,
15 (3), 200-222. doi:10.1177/109434200101500302
Foster, I., & Kesselman, C. (Eds.). (1999). The Grid:
Blueprint for a new computing infrastructure . Morgan
Kaufmann Publishers.
Freund, R. F., Gherrity, R. M., Ambrosius, S., Campbell,
M., Halderman, D., Hensgen, E., & Keith, T. Kidd, M.
Kussow, Lima, J. D., Mirabile, F. L., Moore, L., Rust, B.,
& Siegel, H. J. (1998). Scheduling resources in multi-user,
heterogeneous, computing environments with SMART-
NET. 7th IEEE Heterogeneous Computing Workshop ,
(pp. 184-199).
Foster, I., & Kesselman, C. (Eds.). (2004). The Grid 2:
Blueprint for a new computing infrastructure . Morgan
Kaufmann Publishers.
Foster, I. (2000). Internet computing and the emerging
grid. Nature . Retrieved from www.nature.com/nature/
webmatters/grid /grid.html
Frey, J., Mori, T., Nick, J., Smith, C., Snelling, D., Srini-
vasan, L., & Unger, J. (2005). The open Grid services
architecture , version 1.0. www.ggf.org/ggf_areas _ar-
chitecture.htm
Foster, I. (2002). What is the Grid? A Three Point Check-
list . Argonne National Laboratory, http://www- fp.mcs.
anl.gov/~foster/Articles/WhatIsTheGrid.pdf.
Fujimoto, N., & Hagihara, K. (2003). Near-optimal
dynamic task scheduling of independent coarse-grained
tasks onto a computational grid. 32nd Annual Interna-
tional Conference on Parallel Processing (ICPP-03) ,
(pp. 391-398).
Foster, I. (2005). Globus Toolkit version 4: Software
for service-oriented systems. In Network and Parallel
Computing - IFIP International Conference, Beijing,
China, 3779 , 2-13. Springer.
GAIA. (2010). European space agency mission . Gaia
overview. Retrieved from http://www.esa.int/esaSC/
120377_index_0_m.html
Foster, I., & Kesselman, C. (1999). Computational Grids.
In The Grid: Blueprint for a New Computing Infrastruc-
ture , (pp. 15-51).
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1995).
Design Patterns . Reading, MA: Addison-Wesley.
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. (1998).
Security Architecture for Computational Grids . ACM
Conference on Computers and Security, (pp. 83-91).
Ganeriwal, S., Kumar, R., & Srivastava, M. (2003).
Timing-sync protocol for sensor networks . Proceedings
of the First ACM Conference on Embedded Networked
Sensor Systems (SenSys).
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. (1998).
A security architecture for computational grids. Proc. 5th
ACM Conf. on Computer and Communication Security,
(pp. 83-92).
Search WWH ::




Custom Search