Information Technology Reference
In-Depth Information
Van 't Noordende, G. J., Brazier, F. M. T., & Tanenbaum,
A. S. (2004). Security in a mobile agent system . 1st
IEEE Symp. on Multi-Agent Security and Survivability,
Philadelphia.
Voelker, G. M., Anderson, E. J., Kimbrel, T., Feeley, M. J.,
Chase, J. S., Karlin, A. R., et al. (1998). Implementing co-
operative prefetching and caching in a globally-managed
memory system. Paper presented at the Joint International
Conference on Measurement and Modeling of Computer
Systems, Madison, Wisconsin, United States.
Van 't Noordende, G., Balogh, A., Hofman, R., Brazier,
F. M. T., & Tanenbaum, A. S. (2007). A secure jailing
system for confining untrusted applications . 2nd Int'l
Conf. on Security and Cryptography (SECRYPT), (pp.
414-423). Barcelona, Spain.
von Laszewski, G., Gawor, J., Lane, P., Rehn, N., & Rus-
sell, M. (2003). Features of the Java Commodity Grid Kit.
Concurrency and Computation , 14 (13-15), 1045-1055.
doi:10.1002/cpe.674
Vanderwiel, S. P., & Lilja, D. J. (2000). Data prefetch
mechanisms. ACM Computing Surveys , 32 (2), 174-199.
doi:10.1145/358923.358939
Walfredo, C., & Francine, B. (2002). Using moldabil-
ity to improve the performance of supercomputer jobs.
Journal of Parallel and Distributed Computing , 62 (10),
1571-1601.
Venugopal, S., Buyya, R., & Winton, L. (2004). A Grid
service broker for scheduling distributed data-oriented
applications on global grids. Proceedings of the 2nd
workshop on Middleware for Grid computing , (pp.
75-80). Toronto, Canada. Retrieved from www.Gridbus.
org/broker
Walfredo, C., & Francine, B. (2000). Adaptive selec-
tion of partition size for supercomputer requests . Paper
presented at the Workshop on Job Scheduling Strategies
for Parallel Processing.
Verbeke, J., Nadgir, N., Ruetsch, G., & Sharapov, I.
(2002). Framework for peer-to-peer distributed comput-
ing in a heterogeneous, decentralized environment. In
Proceedings of Third International Workshop on Grid
Computing , (pp. 1-12).
Walker, E. (2008). Benchmarking Amazon EC2 for high-
performance scientific computing . Retrieved from http://
www.usenix.org/ publications/login/ 2008-10/openpdfs/
walker.pdf
Walls, C., & Breidenbach, R. (2005). Spring in action .
Greenwich, Connecticut, USA: Manning Publications Co.
Vidyarthi, D. P., Sarker, B. K., Tripathi, A. K., & Yang, L.
T. (2009). Scheduling in distributed computing systems .
Springer. doi:10.1007/978-0-387-74483-4
Walton, J., & Whicker, L. (1996) Virtual Enterprise: Myth
and Reality. Journal of Control , (pp. 22-25).
Vincze, G., Novák, Z., Pap, Z., & Vida, R. (2008). RE-
SERV: A distributed, load balanced Information System
for Grid applications . 8 th IEEE International Symposium
on Cluster Computing and the Grid, (pp. 596-601).
Wang, H., Takizawa, H., & Kobayashi, H. (2007). A
dependable peer-to-peer computing platform. Future Gen-
eration Computer Systems , 23 (8), 939-955. doi:10.1016/j.
future.2007.03.004
Vishwanath, V., Burns, R., Leigh, J., & Seablom, M.
(2008). Accelerating tropical cyclone analysis using
LambdaRAM, a distributed data cache over wide-area
ultra-fast networks. Future Generation Computer Systems ,
25 (2), 184-191. doi:10.1016/j.future.2008.07.005
Wang, N., Liu, X., He, J., Han, J., Zhang, L., & Xu, Z.
(2007). Collaborative memory pool in cluster system .
Paper presented at the International Conference on Paral-
lel Processing.
Wason, T. (Ed.). (2004). Liberty identity federation frame-
work ID-FF architecture overview . Liberty Alliance Speci-
fication. Retrieved from http://www.project-liberty.org/
Vivas, J. L., López, J., & Montenegro, J. A. (2007).
Grid security architecture: Requirements, fundamentals,
standards, and models. In Xiao, Y. (Ed.), Security in
distributed, Grid, mobile, and pervasive computing (p.
440). Tuscaloosa, USA.
Weiler, S., & Ihren, J. (2006). Minimally covering NSEC
records and DNSSEC online signing. Internet Engineer-
ing Task Force . IETF.
Search WWH ::




Custom Search