Information Technology Reference
In-Depth Information
Compilation of References
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., &
Levkowetz, H. (Eds.). (2004). Extensible authentication
protocol (EAP) - RFC 3748 . Retrieved September 29,
2010, from http://www.ietf.org/ rfc/ rfc3748.txt
Adjie-Winoto, W., Schwartz, E., Balakrishnan, H., & Lil-
ley, J. (1999, December). The design and implementation
of an intentional naming system. Paper presented at the
17th ACM Symposium on Operating Systems Principles
(SOSP '99), Kiawah Island, SC.
Aboba, B., Simon, D., & Eronen, P. (2008). Extensible
authentication protocol (EAP) key management frame-
work - RFC 5247. Retrieved September 29, 2010, from
http://www.ietf.org/ rfc/ rfc5247.txt
Aggarwal, S. (2005). TCO of on-demand applications is
significantly better for SMBs and mid-market enterprises.
Yankees Group report. Retrieved March 10, 2010 from
http://www.intente.net/pdfs/ Yankee_On_Demand_vs_
On _Premises_TCO_1_.pdf?ID=13165
Aboelaze, M., & Aloul, F. (2005). Current and future
trends in sensor networks: A survey. In Proceedings of
the Second IFIP International Conference on Wireless
and Optical Communications Networks WOCN 2005 ,
(pp. 551-555).
Aichi Steel Corporation. (2009). MI sensor. In The gen-
eral catalogue .
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., &
Cayirci, E. (2002). Wireless sensor networks: A survey.
Computer Networks , 38 , 393-422. doi:10.1016/S1389-
1286(01)00302-4
Achilleos, A., Yang, K., & Georgalas, N. (2010). Context
modelling and a context-aware framework for pervasive
service creation: A model-driven approach. Pervasive
and Mobile Computing , 6 , 281-296. doi:10.1016/j.
pmcj.2009.07.014
Albrecht, A. J. (1979). Measuring application develop-
ment productivity. Proceedings of the Joint SHARE,
GUIDE, and IBM Application Development Symposium ,
(pp. 83-92). Monterey, California, October 14-17, IBM
Corporation.
Adam, S., & Doerr, J. (2008). The role of service abstrac-
tion and service variability and its impact on require-
ment engineering for service-oriented systems . Annual
IEEE International Computer Software and Applications
Conference.
Alkkiomäki, V., & Smolander, K. (2007). Integration use
cases - An applied UML technique for modeling functional
requirements in service oriented architecture. Paper pre-
sented at the Requirements Engineering: Foundation for
Software Quality, 13th International Working Conference,
REFSQ 2007, Trondheim, Norway.
Adams, C., & Farrell, S. Kause., & Mononen, T. (2005).
Internet X.509 public key infrastructure certificate man-
agement protocol (CMP) - RFC 4210 . Retrieved March
29, 2010, from http://www.ietf.org/ rfc/ rfc4210.txt
Addis, A., Zlatev, Z., Mitchell, B., & Boniface, M. (2009).
Modelling interactive real-time applications on service
oriented infrastructures . 2009 NEM Summit - Towards
Future Media Internet, September 28-30, 2009, St Malo,
France.
Al-Muhtadi, J., Chetan, S., Ranganathan, A., & Campbell,
R. H. (2004, March). Super spaces: A middleware for
large-scale pervasive computing environments . Paper
presented at the IEEE International Workshop on Per-
vasive Computing and Communications (Perware '04),
Orlando, Florida, USA.
Search WWH ::




Custom Search