Information Technology Reference
In-Depth Information
Hoare, C. (1985). Communicating Sequential Processes .
Prentice Hall.
Huang, P. J., Yu, Y. F., Chen, Q. J., Huang, T. L., Lai, K.
C., & Li, K. C. (2010). A self-adaptive load balancing
strategy for P2P grids. In C. H. Hsu, et al. (Eds.), ICA3PP
2010, part II, LNCS 6082 , (pp. 348-357). Heidelberg/
Berlin, Germany: Springer-Verlag.
Hommel, W. (2005a). Using XACML for privacy control
in SAML-based identity federations. In Proceedings of
the 9th Conference on Communications and Multimedia
Security (CMS 2005) . Springer.
Huck, P., Butler, M., Gupta, A., & Feng, M. (2002).
A Self-Configuring and Self-Administering Name
System with Dynamic Address Assignment. ACM
Transactions on Internet Technology , 2 (1), 14-46.
doi:10.1145/503334.503336
Hommel, W. (2005b). An architecture for privacy-aware
inter-domain identity management. In Proceedings of the
16th IFIP/IEEE Distributed Systems: Operations and
Management (DSOM 2005) . Springer.
Huda, M. T., Schmidt, W. H., & Peake, I. D. (2005). An
agent oriented proactive fault-tolerant framework for Grid
computing. Proceedings of the First International Confer-
ence on e-Science and Grid Computing (e-Science'05),
IEEE (pp. 304-311).
Housley, R., Polk, W., Ford, W., & Solo, D. (2002). Cer-
tificate and certificate revocation list (CRL) profile . RFC
3280. Internet Engineering Task Force (IETF).Jenronimo,
M., & Weast, J. (2003). UPnP design by example: A
software developer's guide to universal plug and play.
Intel Press. , ISBN-13 , 978-0971786110.
Hughes, J., & Maler, E. (2005). OASIS security assertion
markup language (SAML), V2.0 technical overview . OA-
SIS Security Services Technical Committee Document.
Hsu, M., & Silberschatz, A. (1991). Unilateral Commit:
A New Paradigm for Reliable Distributed Transaction
Processing. In Proc. of the 7th International Conference
on Data Engineering , (pp. 286-293). IEEE Computer
Society.
Humphrey, M., Thompson, M. R., & Jackson, K. R.
(2005). Security for Grids . Lawrence Berkeley National
Laboratory. (Paper LBNL-54853).
Hu, J., & Klefstad, R. (2006). Decentralized load balanc-
ing on unstructured Peer-2-Peer computing Grids . 5 th
IEEE International Symposium on Network Computing
and Applications, (pp. 247-250).
IBM Websphere MQ. (2008). The IBM Websphere MQ
Family. [online]. URL: http://www.ibm.com/software/
websphere. (March, 2008).
IEEE 802.11 Working Group (1997). Wireless LAN Me-
dium Access Control (MAC) and Physical Layer (PHY)
Specifications .
Hua, K. A., Jiang, N., Peng, R., & Tantaoui, M. A. (2004).
PSP: A Persistent Streaming Protocol for Transactional
Communications. In ICCCAS 2004: Proc. of the 2004
International Conference on Communications, Circuits
and Systems, 1 , 529-533. IEEE Computer Society.
IEEE Std 802.11e. (2004). Medium Access Control (MAC)
Enhancements for Quality of Service (QoS) . IEEE Draft
for Wireless Medium Access Control (MAC) and Physical
Layer (PHY) Specifications, / Draft 11.0.
Huang, K.-C. (2006). Performance evaluation of adap-
tive processor allocation policies for moldable parallel
batch jobs . Paper presented at the Third Workshop on
Grid Technologies and Applications.
Imamura, T., Tsujita, Y., Koide, H., & Takemiya, H. (2000).
An Architecture of Stampi: MPI Library on a Cluster of
Parallel Computers. In Dongarra, J., Kacsuk, P., & Pod-
horszki, N. (Eds.), Recent Advances in Parallel Virtual
Machine and Message Passing Interface (pp. 200-207).
Springer. doi:10.1007/3-540-45255-9_29
Huang, K.-C., & Chang, H.-Y. (2006). An integrated
processor allocation and job scheduling approach to
workload management on computing Grid. Paper pre-
sented at the 2006 International Conference on Parallel
and Distributed Processing Techniques and Applications
(PDPTA'06), Las Vegas, USA.
Inca: User Level Grid Monitoring. from http://inca.sdsc.
edu/drupal/.
Search WWH ::




Custom Search