Information Technology Reference
In-Depth Information
Jürjens, J., Schreck, J., & Bartmann, P. (2008).
Model-
based security analysis for mobile communications
. Paper
presented at the International Conference on Software
Engineering, Leipzig, Germany.
Koubias, S. A., & Haralabidis, H. C. (1996). Mition: A
mac-layer hybrid protocol for multi-channel real-time lans.
Proceedings of the Third IEEE International Conference
on Electronics, Circuits, and Systems
(pp. 327 - 330).
Kahn, G. (1974). The Semantics of Simple Language
for Parallel Programming. In
Proc. of the 1974 IFIP
Congress
, (pp. 471-475).
Krishna Rana, Y., Hua Liu, B., Nyandoro, A., & Jha,
S. (2006
).
Bandwidth Aware Slot Allocation in Hybrid
MAC.
Proceedings of 31st IEEE Conference on Local
Computer Networks
(pp. 89 - 96).
Kaler, C., & Nadalin, A. (Eds.). (2003).
Web services
federation language (WS-Federation)
. Web Services
Specifications Document.
Kruchten, P. (2000).
The rational unified process: An
introduction
(2nd ed.). Addison-Wesley.
Kalra, D., Singleton, P., Ingram, D., Milan, J., MacKay, J.,
Detmer, D., & Rector, A. (2005). Security and confidential-
ity approach for the clinical e-science framework (clef).
Methods of Information in Medicine
,
44
(2), 193-197.
Kuhn, D. R., Coyne, E. J., & Weil, T. R. (2010). Adding
attributes to role-based access control.
IEEE Security
,
June 2010.
Kumar, A., & Qureshi, S. R. (2008, March 29).
Integration
of mobile computing with Grid computing: A middleware
architecture
. Paper presented at the 2nd National Con-
ference on Challenges & Opportunities in Information
Technology (COIT-2008), Mandi Gobindgarh, India.
Kalyanakrishnam, M., Kalbarczyk, Z., & Iyer, R. (1999).
Failure data analysis of a LAN of Windows NT based
computers. In
Proceedings of the 18th IEEE Symposium
on Reliable Distributed Systems (SRDS99)
, (pp. 178-187).
Karmarkar, A., Hadley, M., Mendolsohn, N., Lafon, Y.,
Gudgin, M., Moreau, J. J., & Nielsen, H. (2007).
SOAP
version 1.2 part 1: Messaging framework
(2
nd
ed.). Re-
trieved from http://www.w3.org/TR/2007/REC-soap12-
part1-20070427/
Kwok-Yan, L., Xi-Bin, Z., Siu-Leung, C., Gu, M., & Jia-
Guang, S. (2004). Enhancing Grid security infrastructure
to support mobile computing nodes.
Lecture Notes in
Computer Science
,
2908
, 42-54. doi:10.1007/978-3-
540-24591-9_4
Karonis, N. T., Toonen, B., & Foster, I. (2002). MPICH-G2:
A Grid-enabled implementation of the Message Passing
Interface.
Journal of Parallel and Distributed Comput-
ing
,
63
, 551-563. doi:10.1016/S0743-7315(03)00002-9
Kyasanur, P., Jungmin, C., Chereddi, S., & Vaidya, N.
H. (2006). Multichannel mesh networks: challenges and
protocols.
IEEE Wireless Communication
,
13
(2), 30-36.
doi:10.1109/MWC.2006.1632478
Kirchler, W., Schiffers, M., & Kranzlmüller, D. (2009).
Harmonizing the management of virtual organizations
despite heterogeneous Grid middleware - assessment of
two different approaches. In
Proceedings of the Cracow
Grid Workshop
.
Laure, E., Stockinger, H., & Stockinger, K. (2005). Per-
formance engineering in data Grids.
Concurrency and
Computation
,
17
(2-4), 171-191. doi:10.1002/cpe.923
Laure, E., Fisher, S., & Frohner, A. (2006). Programming
the Grid with gLite.
Computational Methods in Science
and Technology
,
12
(1), 33-45.
Kleinberg, J. (2000).
The Small-World Phenomenon: an
Algorithm Perspective
. Paper presented at the Proceedings
of the 32nd ACM Symposium on Theory of Computing.
LimeWire. http://www.limewire.com/english/content/
home.shtml.
Lederer, H. (2008). DEISA2: Supporting and de-
veloping a European high-performance computing
ecosystem.
Journal of Physics, 125
. doi:10.1088/ 1742-
6596/125/1/011003.
Kolonay, R., & Sobolewski, M. (2004).
Grid interac-
tive service-oriented programming environment
. Paper
presented at the Concurrent Engineering: The Worldwide
Engineering Grid, Tsinghua, China.
Lee, I., Tang, D., Iyer, R., & Hsueh, M.-C. (1993).
Measurement-based evaluation of operating system
fault tolerance.
IEEE Transactions on Reliability
,
42
(2),
238-249. doi:10.1109/24.229493
Search WWH ::
Custom Search