Information Technology Reference
In-Depth Information
Flechais, I., Sasse, M. A., & Hailes, S. M. V. (2003).
Bringing security home: A process for developing secure
and usable systems
. Paper presented at the New Security
Paradigms Workshop (NSPW'03), Ascona, Switzerland.
Foster, I., Kesselman, C., & Tuecke, S. (2001) The
Anatomy of the Grid: Enabling Scalable Virtual Organiza-
tions.
International J. Supercomputer Applications, 15
(3).
Foster. (2002). What is the Grid? A three point checklist.
GRIDtoday, 1
(6).
Flouris, M. D., & Markatos, E. P. (1999). The net-
work RamDisk: Using remote memory on hetero-
geneous NOWs.
Cluster Computing
,
2
(4), 281-293.
doi:10.1023/A:1019051330479
Fox, G., Williams, R., & Messina, P. (1994).
Parallel
computing works!
Morgan Kaufmann Publishers.
Freeman, E., Hupfer, S., & Arnold, K. (1999).
JavaSpaces
Principles, Patterns, and Practice
. Addison-Wesley.
Foster, I., & Kesselman, C. (1998).
The Grid - Blueprint
for a New Computing Infrastructure
. Morgan Kaufmann.
Freier, A. O., Karlton, P., & Kocher, P. C. (1996).
Inter-
net Draft: The SSL Protocol Version 3.0.
The Internet
Engineering Task Force (IETF), Available at http://
wp.netscape.com/eng/ssl3/draft302.txt,last accessed in
November 2007.
Foster, I., Kesselman, C., & Tuecke, S. (2001). The Anat-
omy of the Grid: Enabling Scalable Virtual Organizations.
The International Journal of Supercomputer Applications
,
15
(3), 200-222. doi:10.1177/109434200101500302
Foster, I., & Kesselman, C. (Eds.). (1999).
The Grid:
Blueprint for a new computing infrastructure
. Morgan
Kaufmann Publishers.
Freund, R. F., Gherrity, R. M., Ambrosius, S., Campbell,
M., Halderman, D., Hensgen, E., & Keith, T. Kidd, M.
Kussow, Lima, J. D., Mirabile, F. L., Moore, L., Rust, B.,
& Siegel, H. J. (1998). Scheduling resources in multi-user,
heterogeneous, computing environments with SMART-
NET.
7th IEEE Heterogeneous Computing Workshop
,
(pp. 184-199).
Foster, I., & Kesselman, C. (Eds.). (2004).
The Grid 2:
Blueprint for a new computing infrastructure
. Morgan
Kaufmann Publishers.
Foster, I. (2000). Internet computing and the emerging
grid.
Nature
. Retrieved from www.nature.com/nature/
webmatters/grid /grid.html
Frey, J., Mori, T., Nick, J., Smith, C., Snelling, D., Srini-
vasan, L., & Unger, J. (2005).
The open Grid services
architecture
, version 1.0. www.ggf.org/ggf_areas _ar-
chitecture.htm
Foster, I. (2002).
What is the Grid? A Three Point Check-
list
. Argonne National Laboratory, http://www- fp.mcs.
anl.gov/~foster/Articles/WhatIsTheGrid.pdf.
Fujimoto, N., & Hagihara, K. (2003). Near-optimal
dynamic task scheduling of independent coarse-grained
tasks onto a computational grid.
32nd Annual Interna-
tional Conference on Parallel Processing (ICPP-03)
,
(pp. 391-398).
Foster, I. (2005). Globus Toolkit version 4: Software
for service-oriented systems.
In Network and Parallel
Computing - IFIP International Conference, Beijing,
China, 3779
, 2-13. Springer.
GAIA. (2010).
European space agency mission
. Gaia
overview. Retrieved from http://www.esa.int/esaSC/
120377_index_0_m.html
Foster, I., & Kesselman, C. (1999). Computational Grids.
In
The Grid: Blueprint for a New Computing Infrastruc-
ture
, (pp. 15-51).
Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1995).
Design Patterns
. Reading, MA: Addison-Wesley.
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. (1998).
Security Architecture for Computational Grids
. ACM
Conference on Computers and Security, (pp. 83-91).
Ganeriwal, S., Kumar, R., & Srivastava, M. (2003).
Timing-sync protocol for sensor networks
. Proceedings
of the First ACM Conference on Embedded Networked
Sensor Systems (SenSys).
Foster, I., Kesselman, C., Tsudik, G., & Tuecke, S. (1998).
A security architecture for computational grids.
Proc. 5th
ACM Conf. on Computer and Communication Security,
(pp. 83-92).
Search WWH ::
Custom Search