Information Technology Reference
In-Depth Information
Pfitzmann, B. (2002). Privacy in browser-based attribute
exchange. In Proceedings of the ACM Workshop on
Privacy in Electronic Society (WPES 2002) . ACM Press.
PRAGMA-Grid. (2008). http://www.pragma-grid.net/
(1.5.2008)
Proactive. (2005). Proactive manual , rev.ed. 2.2. Proac-
tive, INRIA. Retrieved from http://www-sop.inria.fr /
oasis/Proactive/
P-GRADE portal . (n.d.). Retrieved from http://www.lpds.
sztaki.hu /pgrade/
P-GRADE. (2003). Parallel Grid run-time and applica-
tion development environment. Retrieved from www.
lpds.sztaki.hu /pgrade/
Purtilo, J. M. (1994). The POLYLITH Software Bus. ACM
Transactions on Programming Languages and Systems ,
16 (1), 151-174. doi:10.1145/174625.174629
Qiang, Q., Jacob, L., Radhakrishna Pillai, R., & Prabha-
karan, B. (2002). MAC Protocol Enhancements for QoS
Guarantee and Fairness over the IEEE 802.11 Wireless
LAN. Proceeding of the Conference on Computer Com-
munication Network (ICCNC).
Phan, T., Huang, L., Ruiz, N., & Bagrodia, R. (2005).
Integrating mobile wireless devices into the computa-
tional Grid. In Ilyas, M., & Mahgoub, I. (Eds.), Mobile
computing handbook . Auerbach Publications.
Phinjaroenphan, P., Bevinakoppa, S., & Zeephongsekul,
P. (2005). A method for estimating the execution time of
a parallel task on a Grid node. Lecture Notes in Computer
Science , 3470 , 226-236. doi:10.1007/11508380_24
Rajendran, V., Obraczka, K., & Garcia-Luna-Aceves, J.
J. (2003). Energy-Efficient, Collision-Free Medium Ac-
cess Control for Wireless Sensor Networks. Proceedings
of the First ACM Conference on Embedded Networked
Sensor Systems (SenSys).
Pitzmann, A., & Köhntopp, M. (2001). Anonymity,
unobservability, and pseudonymity — a proposal for
terminology. Designing Privacy Enhancing Technologies
(pp. 1-9). LNCS.
Ramabhadran, S., Ratnasamy, S., Hellerstein, J. M., &
Shenker, S. (2004). Prefix hash tree - an indexing data
structure over distributed hash tables . In PODC'04 : 23rd
Annual ACM Symposium on Principles of Distributed
Computing.
Plank, J., & Elwasif, W. (1998). Experimental assessment
of workstation failures and their impact on checkpointing
systems. Twenty-Eighth Annual International Symposium
on Fault-Tolerant Computing, (pp. 48-57).
Ranganathan, K., & Foster, I. (2003). Computation sched-
uling and data replication algorithms for data Grids. In
Nabrzysk, J., Schopf, J., Weglarz, J., Nabrzysk, J., Schopf,
J., & Weglarz, J. (Eds.), Grid resource management:
State of the art and future trends (pp. 359-373). Kluwer
Academic Publishers Group.
Popp, G., Jürjens, J., Wimmel, G., & Breu, R. (2003).
Security-critical system development with extended use
cases . Paper presented at the Tenth Asia-Pacific Software
Engineering Conference (APSEC'03).
Portal, C. H. R. O. N. O. S. (2004). Retrieved from http://
portal.chronos.org/ gridsphere/gridsphere
Ratnasamy, S., Francis, P., Handley, M., Karp, R., & Shen-
ker, S. (2001). A Scalable Content Addressable Network .
Paper presented at the Proceedings of ACM SIGCOMM.
Powers, C., & Schunter, M. (2003). Enterprise privacy
authorization language . W3C member submission. Re-
trieved from http://www.w3.org/Submission /2003/
SUBM-EPAL-20031110/
Raza, Z., & Vidyarthi, D. P. (2009). GA based scheduling
model for computational Grid to minimize turnaround
time. International Journal of Grid and High Performance
Computing , 1 (4), 70-90. doi:10.4018/jghpc.2009070806
Prabhakar, S., Ribbens, C., & Bora, P. (2002). Multifac-
eted web services: An approach to secure and scalable
grid scheduling. Proceedings of Euroweb, Oxford, UK.
Raza, Z., & Vidyarthi, D. P. (2008). Maximizing reli-
ability with task scheduling in a computational Grid.
Second International Conference on Information Systems
Technology and Management(ICISTM), Dubai, UAE.
PRACE. (2008). Partnership for advanced computing in
Europe . Retrieved from www.prace-project.eu/
Search WWH ::




Custom Search