Information Technology Reference
In-Depth Information
Meier-Kolthoff, J. P., Auch, A. F., Huson, D. H., & Göker,
M. (2007). COPYCAT: Co-phylogenetic Analysis tool.
Bioinformatics (Oxford, England)
,
23
(7), 898-900.
doi:10.1093/bioinformatics/btm027
Morselli, R., Bhattacharjee, B., Srinivasan, A., & Marsh,
M. A. (2005).
Efficient Lookup on Unstructured Topolo-
gies
. Paper presented at the Proceedings of ACM PODC,
Las Vegas, NV, USA.
Meinilä, M., Kuusela, J., Zietara, M. S., & Lumme, J.
(2004). Initial steps of speciation by geographic isola-
tion and host switch in salmonid pathogen
Gyrodactylus
salaris (Monogenea: Gyrodactylidae).
International
Journal for Parasitology
,
34
(4), 515-526. doi:10.1016/j.
ijpara.2003.12.002
Moses, T. (Ed.). (2005).
OASIS eXtensible access control
markup language 2.0, core specification
. OASIS XACML
Technical Committee Standard.
Mouratidis, H. (2004).
A security oriented approach in
the development of multiagent systems: Applied to the
management of the health and social are needs of older
people in England
. University of Sheffield.
Merkle, D., & Middendorf, M. (2005). Reconstruction of
the cophylogenetic history of related phylogenetic trees
with divergence timing information.
Theory in Biosci-
ences
,
123
(4), 277-299. doi:10.1016/j.thbio.2005.01.003
Mouratidis, H., & Giorgini, P. (2006).
Integrating security
and software engineering: Advances and future vision
.
Hershey, PA: IGI Global.
Mickens, J. W., & Noble, B. D. (2006). Exploiting avail-
ability prediction in distributed systems. In
Proceedings
of the 3rd Conference on Networked Systems Design &
Implementation (NSDI06)
, (pp. 6-19).
Mujumdar, M., Bheevgade, M., Malik, L., & Patrikar, R.
(2008).
High performance computational Grids - fault
tolerance at system level
. International Conference on
Emerging Trends in Engineering and Technology (ICE-
TET) (pp. 379-383).
Microsoft. (2008).
Microsoft Message Queueing.
[online].
URL: http://www.microsoft.com/windowsserver2003/
technologies/msmq/default.mspx (March, 2008).
Mutka, M. W., & Livny, M. (1988). Profiling workstations'
available capacity for remote execution. In
Proceedings
of the 12th IFIP WG 7.3 International Symposium on
Computer Performance Modelling, Measurement and
Evaluation
, (pp. 529-544).
Microsoft. (n.d.).
Peer name resolution protocol
. Re-
trieved from http://technet.microsoft.com/en-us/library/
bb726971.aspx
Milojičić, D. S., Douglis, F., Paindaveine, Y., Wheeler, R.,
& Zhou, S. (2000). Process migration.
ACM Computing
Surveys
,
32
(3), 241-299. doi:10.1145/367701.367728
Myers, M., & Schaad, J. (2007).
Certificate management
over CMS (CMC) transport protocols. Internet Engineer-
ing Task Force
. IETF.
Mockapetris, P. (1987).
Domain names - implementation
and specification. RFC 1035. Internet Engineering Task
Force
. IETF.
Myers, A. D. (2002). Hybrid MAC Protocols For Mobile
Ad Hoc Networks.
PhD thesis, Computer Science, Uni-
versity of Texas at Dallas
.
Mohsin, M., & Prakash, R. (2002). IP Address Assignment
in a Mobile Ad Hoc Network.
IEEE Military Communi-
cations Conference (MILCOM 2002), 2
(10), 856-861.
MyGrid. (2008). Retrieved from www.mygrid.org.uk
Nabrizyski, J., Schopf, J. M., & Weglarz, J. (2003). Grid
resource management: State of the art and future trends.
In Nabrizyski, J., Schopf, J. M., & Weglarz, J. (Eds.),
International series in operations research and manage-
ment
. Kluwer Academic Publishers Group.
Mont, M. (2004).
Dealing with privacy obligations in
enterprises
. (Report No. HPL-2004-109). Bristol, UK:
HP Laboratories.
Montagnat, J., Frohner, A., Jouvenot, D., Pera, C., Kun-
szt, P., & Koblitz, B. (2007). A secure grid medical data
manager interfaced to the glite middleware.
Journal of
Grid Computing
,
6
(1).
Nadeem, F., Prodan, R., & Fahringer, T. (2008). Character-
izing, modeling and predicting dynamic resource avail-
ability in a large scale multi-purpose grid. In
Proceedings
of the 2008 8th IEEE International Symposium on Cluster
Computing and the Grid (CCGRID08)
, (pp. 348-357).
Search WWH ::
Custom Search