Information Technology Reference
In-Depth Information
Cisco Systems, Inc. (2010).
Cisco collaboration cloud
.
Retrieved September 26, 2010 from http://www.cisco.
com/en/US/ prod/ps10352/ collaboration_cloud.html
Dierks, T., & Rescorla, E. (2006).
The transport layer
security (TLS) protocol v1.1 - RFC 4346
. Retrieved
March 29, 2010, from http://www.ietf.org/ rfc/ rfc4346.txt
Cloud Computing Congress. (2010).
Cloud computing
China
. Retrieved March 10, 2010, from http://www.
cloudcomputingchina.org/
Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., &
Vakali, A. (2009). Cloud computing: Distributed Internet
computing for IT and scientific research.
IEEE Internet
Computing
,
13
(5), 10-13. doi:10.1109/MIC.2009.103
Cockburn, D., & Jennings, N. R. (Eds.). (1996).
ARCHON:
A distributed artificial intelligence system for industrial
applications
(pp. 319-344). Wiley. Foundation of Dis-
tributed Artificial Intelligence.
Dobson, G. (2004).
Quality of service in service-oriented
architecture
. Retrieved from http://digs.sourceforge.net
/papers/qos.pdf
Czarnecki, K., Hwan, C., & Kalleberg, K. T. (2006).
Feature models are views on ontologies. In
Proceedings
of the 10th International on Software Product Line Con-
ference
(vol. 1). IEEE Computer Society.
DOLCE. (2010).
Laboratory for applied ontology
. Re-
trieved March 8, 2010, from http://www.loa-cnr.it/
DuraSpace Organization. (2009).
DuraCloud overview
2009
.
Czerwinski, S., Zhao, B. Y., Hodes, T., Joseph, A., & Katz,
R. (1999).
An architecture for a secure service discovery
service.
Paper presented at the Fifth Annual International
Conference on Mobile Computing and Networks (Mobi-
Com '99), Seattle, WA.
Durkee, D. (2010). Why cloud computing will never
be free.
Communications of the ACM
,
53
(5), 62-69.
doi:10.1145/1735223.1735242
Edgington, T., Choi, B., Henson, K., Raghu, T., & Vinze,
A. (2004). Adopting ontology to facilitate knowledge
sharing.
Communications of the ACM
,
47
(11), 85-90.
doi:10.1145/1029496.1029499
Dabrowski, C., Mills, K., & Elder, J. (2002, July 2002).
Understanding consistency maintenance in service dis-
covery architectures during communication failure.
Paper
presented at the 4th International Workshop on Active
Middleware Services, Edinburgh, UK.
Elizabeth, M., & Hull, C. (1987). Occam - A programming
language for multiprocessor systems.
Computer Languag-
es
,
12
(1), 27-37. doi:10.1016/0096-0551(87)90010-5
Dan, A., Johnson, R., & Arsanjani, A. (2007).
Information
as a service: Modeling and realization.
Paper presented
at the International Workshop on Systems Development
in SOA Environments, Washington, DC.
Ellison, C. (2002). Home network security.
Intel Technol-
ogy Journal
,
6
(4), 37-48.
Endrei, M., Ang, J., Arsanjani, A., Chua, S., Comte, P.,
& Krogdahl, P. (2004).
Patterns: Service-oriented archi-
tecture and Web services
. IBM Press.
de Haaf, B. (2008, August 8). Cloud computing - The
jargon is back!
Cloud Computing Journal
. Retrieved
from http://cloudcomputing.sys-con.com /node/613070
ETSI. (2006).
Smartcards UICC security service module:
Stage 1
. (ETSI TS 102 266 V7.1.0). Retrieved March 29,
2010, from http://pda.etsi.org/ pda/ queryform.asp
Department of Energy, US Government. (2010).
Report
to congress on server and data center energy efficiency
.
Retrieved April 25, 2010, from http://www1.eere.energy.
gov/ femp/pdfs/ epa_dc_report_congress.pdf
Fahringer, T., Anthes, C., Arragon, A., Lipaj, A., Müller-
Iden, J., & Rawlings, C. J. … Surridge, M. (2007). The
Edutain@Grid Project. In D. J. Veit & J. Altmann (Eds.),
GECON 2007. LNCS, 4685
, (pp. 182-187). Heidelberg,
Germany: Springer.
Dey, A. K. (2001). Understanding and using context.
Per-
sonal and Ubiquitous Computing
,
5
(1), 4-7. doi:10.1007/
s007790170019
Dey, A. K., & Abowd, G. D. (1999).
Towards a better un-
derstanding of context and context-awareness
. (Technical
Report GIT-GVU-99-22), Georgia Institute of Technology,
College of Computing.
Search WWH ::
Custom Search