Information Technology Reference
In-Depth Information
Welch, V., Barton, T., Keahey, K., & Siebenlist, F. (2005).
Attributes, anonymity, and access: Shibboleth and Globus
integration to facilitate Grid collaboration. In Proceedings
of the Internet2 PKI R&D Workshop .
Xie, T., & Qin, X. (2007). Performance Evaluation of
a New Scheduling Algorithm for Distributed Systems
with Security Heterogeneity. Journal of Parallel and
Distributed Computing , 67 , 1067-1081. doi:10.1016/j.
jpdc.2007.06.004
Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Cza-
jkowski, K., Gawor, J., et al. (2003). Security for Grid
services . Paper presented at the 12th IEEE International
Symposium on High Performance Distributed Computing
(HPDC-12 '03).
Xu, L. (2005). Hydra: A platform for survivable and
secure data storage systems . ACM StorageSS.
Xu, J., Kalbarczyk, Z., & Iyer, R. (1999). Networked
Windows NT system field failure data analysis. In Pro-
ceedings of 1999 Pacific Rim International Symposium
on Dependable Computing , (pp. 178-185).
Weniger, K., & Zitterbart, M. (2004). Mobile ad hoc net-
works - current approaches and future directions. Network,
IEEE , 18 (4), 6-11. doi:10.1109/MNET.2004.1316754
Xu, Z., & Bhuyan, L. (2006). Effective load balancing
in P2P systems . 6 th IEEE International Symposium on
Cluster Computing and the Grid, (pp. 81-88).
WGBO. (1994). Dutch ministry of health, welfare and
sport - WGBO . Retrieved from http://www.hulpgids.nl/
wetten/wgbo.htm
Yang, C.-L., Lebeck, A. R., Tseng, H.-W., & Lee, C.-H.
(2004). Tolerating memory latency through push prefetch-
ing for pointer-intensive applications. ACM Transactions
on Architecture and Code Optimization , 1 (4), 445-475.
doi:10.1145/1044823.1044827
Witten, I. H., & Frank, E. (2005). Data mining: Practical
machine learning tools and techniques (2nd ed.). Morgan
Kaufmann.
WMO. (1998). Dutch ministry of health, welfare and
sport - WMO. Retrieved from http://www.healthlaw.nl/
wmo.html.
Yang, C. T., Li, C. T., Chiang, W. C., & Shih, P. C. (2005).
Design and implementation of TIGER Grid: An integrated
metropolitan-scale Grid environment . 6 th International
Conference on Parallel and Distributed Computing Ap-
plications and Technologies, (pp. 518-520).
World Community Grid. (2008). http://www.worldcom-
munitygrid.org/ (1.5.2008).
Wrzesinska, G., van Nieuwport, R., Maassen, J., Kiel-
mann, T., & Bal, H. (2006). Fault-tolerant scheduling of
fine-grained tasks in Grid environments. International
Journal of High Performance Computing Applications ,
20 (1), 103-114. doi:10.1177/1094342006062528
Yanmin, Z., Jinsong, H., Yunhao, L., & Ni, L. M. Chun-
ming, H., & Jinpeng, H. (2005). TruGrid: A self-sustaining
trustworthy Grid. Paper presented at the 25th IEEE Inter-
national Conference on Distributed Computing Systems
Workshops, 2005.
Wu, Y. J., Lin, S. J., Lai, K. C., Huang, K. C., & Wu, C.
C. (2008). Distributed dynamic load balancing strategies
in P2P Grid systems . 5 th Workshop on Grid Technologies
and Applications, (pp. 95-102).
Ying, Z., Ananda, A. L., & Jacob, L. (2003). A QoS Enabled
MAC Protocol for Multi-Hop Ad Hoc Wireless Networks.
Proceeding of IEEE International Conference on Per-
formance, Computing, and Communications (IPCCC).
Wyckoff, P., McLaughry, S. W., Lehman, T. J., & Ford,
D. A. (1998). T Spaces. IBM Systems Journal , 37 (3),
454-474. doi:10.1147/sj.373.0454
Zhang, X., Freschl, J., & Schopf, J. (2007). Scalability
analysis of three monitoring and information systems:
MDS2, R-GMA, and Hawkeye. Journal of Parallel and
Distributed Computing , 67 (8), 883-902. doi:10.1016/j.
jpdc.2007.03.006
Xia, Y., Chen, S., & Korgaonkar, V. (2006). Load balanc-
ing with multiple hash functions in peer-to-peer networks .
IEEE 12 th International Conference on Parallel and Dis-
tributed Systems, (pp. 411-420).
Zhang, J., & Honeyman, P. (2008). Performance and
availability tradeoffs in replicated file systems. Eighth
IEEE International Symposium on Cluster Computing
and the Grid, Lyon, France (pp. 771-776).
Search WWH ::




Custom Search