Information Technology Reference
In-Depth Information
Indyk, P., Motwani, R., Raghavan, P., & Vempala, S.
(1997). Locality-preserving hashing in multidimensional
spaces. In STOC '97: Proc. of the Twenty-Ninth Annual
ACM Symposium on Theory of Computing , (pp. 618-625).
New York, NY: ACM Press.
Jha, S., Kaiser, H., El Khamra, Y., & Weidner, O. (2007).
Design and implementation of network performance
aware applications using SAGA and Cactus . 3rd IEEE
Conference on eScience and Grid Computing, Bangalore,
India, 10-13 Dec, (pp. 143-150).
Iosup, A., Jan, M., Sonmez, O., & Epema, D. (2007). On
the dynamic resource availability in grids. In Proceed-
ings of 8th IEEE/ACM International Conference on Grid
Computing , (pp. 26-33).
Jiang, S., Petrini, F., Ding, X., & Zhang, X. (2006). A
locality-aware cooperative cache management protocol to
improve network file system performance. Paper presented
at the 26th IEEE International Conference on Distributed
Computing Systems, Lisbon, Portugal.
Iyengar, M. S., & Singhalc, M. (2006). Effect of network
latency on load sharing in distributed systems. Journal
of Parallel and Distributed Computing , 66 (6), 839-853.
doi:10.1016/j.jpdc.2005.09.005
Job Description Language Attributes . (n.d.). Retrieved
from http://auger.jlab.org/jdl /PPDG_JDL.htm
John, T., Uwe, S., Joel, L. W., & Philip, S. Y. (1994).
Scheduling parallel tasks to minimize average response
time . Paper presented at the fifth annual ACM-SIAM
Symposium on Discrete algorithms.
Iyer, R. K., & Rossetti, D. J. (1985). Effect of system
workload on operating system reliability: A study on IBM
3081. IEEE Transactions on Software Engineering , 11 (12),
1438-1448. doi:10.1109/TSE.1985.232180
Johnson, R. (2005). J2EE development frameworks.
Computer , 38 (1), 107-110. doi:10.1109/MC.2005.22
Jacob, B., Ferreira, L., Bieberstein, N., Gilzean, C., Gi-
rard, J.-Y., Strachowski, R., & Yu, S. (2003). Enabling
applications for Grid computing with Globus . IBM Red-
book. Retrieved from www.redbooks.ibm.com /abstracts/
sg246936.html?Open
Johnson, B. K., & Ram, D. J. (2001). DP: A Paradigm
for Anonymous Remote Computation and Communi-
cation for Cluster Computing. IEEE Transactions on
Parallel and Distributed Systems , 12 (10), 1052-1065.
doi:10.1109/71.963417
Jacobson, I., Booch, G., & Rumbaugh, J. (1999). The
unified software development process . Addison-Wesley
Professional.
Jones, M. (2003). Grid Security - An overview of methods
used to create a secure grid. Retrieved from http://www.
cse.buffalo.edu/faculty/miller/Courses/Grid-Seminar/
Security.pdf.
Jain, N., Das, S. R., & Nasipuri, A. (2000). A Multichan-
nel CSMA MAC Protocol with Receiver-Based Channel
Selection for Multihop Wireless Networks . Proceedings
of the 10 th IEEE International Conference on Computer
Communications and Networks (pp. 432-439).
JPPF. (2008). Java Parallel Processing Framework.
Retrieved October 16, 2008, from http://www.jppf.org.
JSDL. (n.d.). Job submission description language (jsdl)
specification, v.1.0 . Retrieved from http://www.gridforum.
org/documents/GFD.56.pdf
Jameel, H., Kalim, U., Sajjad, A., Lee, S., & Jeon, T.
(2005). Mobile-to-Grid middleware: Bridging the gap
between mobile and Grid environments . Paper presented
at the European Grid Conference EGC 2005, Amsterdam,
The Netherlands.
Jürjens, J. (2005). Secure systems development with
UML . Springer.
Jana, D., Chaudhuri, A., & Bhaumik, N. B. (2009). Pri-
vacy and anonymity protection in computational Grid
services. International Journal of Computer Science and
Applications , 6 (1), 98-107.
Jurjens, J. (2001). Towards development of secure sys-
tems using UMLsec . Paper presented at the Fundamental
Approaches to Software Engineering (FASE/ETAPS).
Jurjens, J. (2002). UMLsec: Extending UML for secure
systems development . Paper presented at the 5th Inter-
national Conference on the Unified Modeling Language
(UML), Dresden, Germany.
Search WWH ::




Custom Search