Information Technology Reference
In-Depth Information
Jürjens, J., Schreck, J., & Bartmann, P. (2008). Model-
based security analysis for mobile communications . Paper
presented at the International Conference on Software
Engineering, Leipzig, Germany.
Koubias, S. A., & Haralabidis, H. C. (1996). Mition: A
mac-layer hybrid protocol for multi-channel real-time lans.
Proceedings of the Third IEEE International Conference
on Electronics, Circuits, and Systems (pp. 327 - 330).
Kahn, G. (1974). The Semantics of Simple Language
for Parallel Programming. In Proc. of the 1974 IFIP
Congress , (pp. 471-475).
Krishna Rana, Y., Hua Liu, B., Nyandoro, A., & Jha,
S. (2006 ). Bandwidth Aware Slot Allocation in Hybrid
MAC. Proceedings of 31st IEEE Conference on Local
Computer Networks (pp. 89 - 96).
Kaler, C., & Nadalin, A. (Eds.). (2003). Web services
federation language (WS-Federation) . Web Services
Specifications Document.
Kruchten, P. (2000). The rational unified process: An
introduction (2nd ed.). Addison-Wesley.
Kalra, D., Singleton, P., Ingram, D., Milan, J., MacKay, J.,
Detmer, D., & Rector, A. (2005). Security and confidential-
ity approach for the clinical e-science framework (clef).
Methods of Information in Medicine , 44 (2), 193-197.
Kuhn, D. R., Coyne, E. J., & Weil, T. R. (2010). Adding
attributes to role-based access control. IEEE Security ,
June 2010.
Kumar, A., & Qureshi, S. R. (2008, March 29). Integration
of mobile computing with Grid computing: A middleware
architecture . Paper presented at the 2nd National Con-
ference on Challenges & Opportunities in Information
Technology (COIT-2008), Mandi Gobindgarh, India.
Kalyanakrishnam, M., Kalbarczyk, Z., & Iyer, R. (1999).
Failure data analysis of a LAN of Windows NT based
computers. In Proceedings of the 18th IEEE Symposium
on Reliable Distributed Systems (SRDS99) , (pp. 178-187).
Karmarkar, A., Hadley, M., Mendolsohn, N., Lafon, Y.,
Gudgin, M., Moreau, J. J., & Nielsen, H. (2007). SOAP
version 1.2 part 1: Messaging framework (2 nd ed.). Re-
trieved from http://www.w3.org/TR/2007/REC-soap12-
part1-20070427/
Kwok-Yan, L., Xi-Bin, Z., Siu-Leung, C., Gu, M., & Jia-
Guang, S. (2004). Enhancing Grid security infrastructure
to support mobile computing nodes. Lecture Notes in
Computer Science , 2908 , 42-54. doi:10.1007/978-3-
540-24591-9_4
Karonis, N. T., Toonen, B., & Foster, I. (2002). MPICH-G2:
A Grid-enabled implementation of the Message Passing
Interface. Journal of Parallel and Distributed Comput-
ing , 63 , 551-563. doi:10.1016/S0743-7315(03)00002-9
Kyasanur, P., Jungmin, C., Chereddi, S., & Vaidya, N.
H. (2006). Multichannel mesh networks: challenges and
protocols. IEEE Wireless Communication , 13 (2), 30-36.
doi:10.1109/MWC.2006.1632478
Kirchler, W., Schiffers, M., & Kranzlmüller, D. (2009).
Harmonizing the management of virtual organizations
despite heterogeneous Grid middleware - assessment of
two different approaches. In Proceedings of the Cracow
Grid Workshop .
Laure, E., Stockinger, H., & Stockinger, K. (2005). Per-
formance engineering in data Grids. Concurrency and
Computation , 17 (2-4), 171-191. doi:10.1002/cpe.923
Laure, E., Fisher, S., & Frohner, A. (2006). Programming
the Grid with gLite. Computational Methods in Science
and Technology , 12 (1), 33-45.
Kleinberg, J. (2000). The Small-World Phenomenon: an
Algorithm Perspective . Paper presented at the Proceedings
of the 32nd ACM Symposium on Theory of Computing.
LimeWire. http://www.limewire.com/english/content/
home.shtml.
Lederer, H. (2008). DEISA2: Supporting and de-
veloping a European high-performance computing
ecosystem. Journal of Physics, 125 . doi:10.1088/ 1742-
6596/125/1/011003.
Kolonay, R., & Sobolewski, M. (2004). Grid interac-
tive service-oriented programming environment . Paper
presented at the Concurrent Engineering: The Worldwide
Engineering Grid, Tsinghua, China.
Lee, I., Tang, D., Iyer, R., & Hsueh, M.-C. (1993).
Measurement-based evaluation of operating system
fault tolerance. IEEE Transactions on Reliability , 42 (2),
238-249. doi:10.1109/24.229493
Search WWH ::




Custom Search