Information Technology Reference
In-Depth Information
Pfitzmann, B. (2002). Privacy in browser-based attribute
exchange. In
Proceedings of the ACM Workshop on
Privacy in Electronic Society (WPES 2002)
. ACM Press.
PRAGMA-Grid. (2008). http://www.pragma-grid.net/
(1.5.2008)
Proactive. (2005).
Proactive manual
, rev.ed. 2.2. Proac-
tive, INRIA. Retrieved from http://www-sop.inria.fr /
oasis/Proactive/
P-GRADE portal
. (n.d.). Retrieved from http://www.lpds.
sztaki.hu /pgrade/
P-GRADE. (2003).
Parallel Grid run-time and applica-
tion development environment.
Retrieved from www.
lpds.sztaki.hu /pgrade/
Purtilo, J. M. (1994). The POLYLITH Software Bus.
ACM
Transactions on Programming Languages and Systems
,
16
(1), 151-174. doi:10.1145/174625.174629
Qiang, Q., Jacob, L., Radhakrishna Pillai, R., & Prabha-
karan, B. (2002). MAC Protocol Enhancements for QoS
Guarantee and Fairness over the IEEE 802.11 Wireless
LAN.
Proceeding of the Conference on Computer Com-
munication Network (ICCNC).
Phan, T., Huang, L., Ruiz, N., & Bagrodia, R. (2005).
Integrating mobile wireless devices into the computa-
tional Grid. In Ilyas, M., & Mahgoub, I. (Eds.),
Mobile
computing handbook
. Auerbach Publications.
Phinjaroenphan, P., Bevinakoppa, S., & Zeephongsekul,
P. (2005). A method for estimating the execution time of
a parallel task on a Grid node.
Lecture Notes in Computer
Science
,
3470
, 226-236. doi:10.1007/11508380_24
Rajendran, V., Obraczka, K., & Garcia-Luna-Aceves, J.
J. (2003). Energy-Efficient, Collision-Free Medium Ac-
cess Control for Wireless Sensor Networks.
Proceedings
of the First ACM Conference on Embedded Networked
Sensor Systems (SenSys).
Pitzmann, A., & Köhntopp, M. (2001).
Anonymity,
unobservability, and pseudonymity — a proposal for
terminology. Designing Privacy Enhancing Technologies
(pp. 1-9). LNCS.
Ramabhadran, S., Ratnasamy, S., Hellerstein, J. M., &
Shenker, S. (2004).
Prefix hash tree - an indexing data
structure over distributed hash tables
. In PODC'04
:
23rd
Annual ACM Symposium on Principles of Distributed
Computing.
Plank, J., & Elwasif, W. (1998).
Experimental assessment
of workstation failures and their impact on checkpointing
systems.
Twenty-Eighth Annual International Symposium
on Fault-Tolerant Computing, (pp. 48-57).
Ranganathan, K., & Foster, I. (2003). Computation sched-
uling and data replication algorithms for data Grids. In
Nabrzysk, J., Schopf, J., Weglarz, J., Nabrzysk, J., Schopf,
J., & Weglarz, J. (Eds.),
Grid resource management:
State of the art and future trends
(pp. 359-373). Kluwer
Academic Publishers Group.
Popp, G., Jürjens, J., Wimmel, G., & Breu, R. (2003).
Security-critical system development with extended use
cases
. Paper presented at the Tenth Asia-Pacific Software
Engineering Conference (APSEC'03).
Portal, C. H. R. O. N. O. S. (2004). Retrieved from http://
portal.chronos.org/ gridsphere/gridsphere
Ratnasamy, S., Francis, P., Handley, M., Karp, R., & Shen-
ker, S. (2001).
A Scalable Content Addressable Network
.
Paper presented at the Proceedings of ACM SIGCOMM.
Powers, C., & Schunter, M. (2003).
Enterprise privacy
authorization language
. W3C member submission. Re-
trieved from http://www.w3.org/Submission /2003/
SUBM-EPAL-20031110/
Raza, Z., & Vidyarthi, D. P. (2009). GA based scheduling
model for computational Grid to minimize turnaround
time.
International Journal of Grid and High Performance
Computing
,
1
(4), 70-90. doi:10.4018/jghpc.2009070806
Prabhakar, S., Ribbens, C., & Bora, P. (2002).
Multifac-
eted web services: An approach to secure and scalable
grid scheduling.
Proceedings of Euroweb, Oxford, UK.
Raza, Z., & Vidyarthi, D. P. (2008).
Maximizing reli-
ability with task scheduling in a computational Grid.
Second International Conference on Information Systems
Technology and Management(ICISTM), Dubai, UAE.
PRACE. (2008).
Partnership for advanced computing in
Europe
. Retrieved from www.prace-project.eu/
Search WWH ::
Custom Search