Information Technology Reference
In-Depth Information
Meier-Kolthoff, J. P., Auch, A. F., Huson, D. H., & Göker,
M. (2007). COPYCAT: Co-phylogenetic Analysis tool.
Bioinformatics (Oxford, England) , 23 (7), 898-900.
doi:10.1093/bioinformatics/btm027
Morselli, R., Bhattacharjee, B., Srinivasan, A., & Marsh,
M. A. (2005). Efficient Lookup on Unstructured Topolo-
gies . Paper presented at the Proceedings of ACM PODC,
Las Vegas, NV, USA.
Meinilä, M., Kuusela, J., Zietara, M. S., & Lumme, J.
(2004). Initial steps of speciation by geographic isola-
tion and host switch in salmonid pathogen Gyrodactylus
salaris (Monogenea: Gyrodactylidae). International
Journal for Parasitology , 34 (4), 515-526. doi:10.1016/j.
ijpara.2003.12.002
Moses, T. (Ed.). (2005). OASIS eXtensible access control
markup language 2.0, core specification . OASIS XACML
Technical Committee Standard.
Mouratidis, H. (2004). A security oriented approach in
the development of multiagent systems: Applied to the
management of the health and social are needs of older
people in England . University of Sheffield.
Merkle, D., & Middendorf, M. (2005). Reconstruction of
the cophylogenetic history of related phylogenetic trees
with divergence timing information. Theory in Biosci-
ences , 123 (4), 277-299. doi:10.1016/j.thbio.2005.01.003
Mouratidis, H., & Giorgini, P. (2006). Integrating security
and software engineering: Advances and future vision .
Hershey, PA: IGI Global.
Mickens, J. W., & Noble, B. D. (2006). Exploiting avail-
ability prediction in distributed systems. In Proceedings
of the 3rd Conference on Networked Systems Design &
Implementation (NSDI06) , (pp. 6-19).
Mujumdar, M., Bheevgade, M., Malik, L., & Patrikar, R.
(2008). High performance computational Grids - fault
tolerance at system level . International Conference on
Emerging Trends in Engineering and Technology (ICE-
TET) (pp. 379-383).
Microsoft. (2008). Microsoft Message Queueing. [online].
URL: http://www.microsoft.com/windowsserver2003/
technologies/msmq/default.mspx (March, 2008).
Mutka, M. W., & Livny, M. (1988). Profiling workstations'
available capacity for remote execution. In Proceedings
of the 12th IFIP WG 7.3 International Symposium on
Computer Performance Modelling, Measurement and
Evaluation , (pp. 529-544).
Microsoft. (n.d.). Peer name resolution protocol . Re-
trieved from http://technet.microsoft.com/en-us/library/
bb726971.aspx
Milojičić, D. S., Douglis, F., Paindaveine, Y., Wheeler, R.,
& Zhou, S. (2000). Process migration. ACM Computing
Surveys , 32 (3), 241-299. doi:10.1145/367701.367728
Myers, M., & Schaad, J. (2007). Certificate management
over CMS (CMC) transport protocols. Internet Engineer-
ing Task Force . IETF.
Mockapetris, P. (1987). Domain names - implementation
and specification. RFC 1035. Internet Engineering Task
Force . IETF.
Myers, A. D. (2002). Hybrid MAC Protocols For Mobile
Ad Hoc Networks. PhD thesis, Computer Science, Uni-
versity of Texas at Dallas .
Mohsin, M., & Prakash, R. (2002). IP Address Assignment
in a Mobile Ad Hoc Network. IEEE Military Communi-
cations Conference (MILCOM 2002), 2 (10), 856-861.
MyGrid. (2008). Retrieved from www.mygrid.org.uk
Nabrizyski, J., Schopf, J. M., & Weglarz, J. (2003). Grid
resource management: State of the art and future trends.
In Nabrizyski, J., Schopf, J. M., & Weglarz, J. (Eds.),
International series in operations research and manage-
ment . Kluwer Academic Publishers Group.
Mont, M. (2004). Dealing with privacy obligations in
enterprises . (Report No. HPL-2004-109). Bristol, UK:
HP Laboratories.
Montagnat, J., Frohner, A., Jouvenot, D., Pera, C., Kun-
szt, P., & Koblitz, B. (2007). A secure grid medical data
manager interfaced to the glite middleware. Journal of
Grid Computing , 6 (1).
Nadeem, F., Prodan, R., & Fahringer, T. (2008). Character-
izing, modeling and predicting dynamic resource avail-
ability in a large scale multi-purpose grid. In Proceedings
of the 2008 8th IEEE International Symposium on Cluster
Computing and the Grid (CCGRID08) , (pp. 348-357).
Search WWH ::




Custom Search