Information Technology Reference
In-Depth Information
Cisco Systems, Inc. (2010). Cisco collaboration cloud .
Retrieved September 26, 2010 from http://www.cisco.
com/en/US/ prod/ps10352/ collaboration_cloud.html
Dierks, T., & Rescorla, E. (2006). The transport layer
security (TLS) protocol v1.1 - RFC 4346 . Retrieved
March 29, 2010, from http://www.ietf.org/ rfc/ rfc4346.txt
Cloud Computing Congress. (2010). Cloud computing
China . Retrieved March 10, 2010, from http://www.
cloudcomputingchina.org/
Dikaiakos, M. D., Katsaros, D., Mehra, P., Pallis, G., &
Vakali, A. (2009). Cloud computing: Distributed Internet
computing for IT and scientific research. IEEE Internet
Computing , 13 (5), 10-13. doi:10.1109/MIC.2009.103
Cockburn, D., & Jennings, N. R. (Eds.). (1996). ARCHON:
A distributed artificial intelligence system for industrial
applications (pp. 319-344). Wiley. Foundation of Dis-
tributed Artificial Intelligence.
Dobson, G. (2004). Quality of service in service-oriented
architecture . Retrieved from http://digs.sourceforge.net
/papers/qos.pdf
Czarnecki, K., Hwan, C., & Kalleberg, K. T. (2006).
Feature models are views on ontologies. In Proceedings
of the 10th International on Software Product Line Con-
ference (vol. 1). IEEE Computer Society.
DOLCE. (2010). Laboratory for applied ontology . Re-
trieved March 8, 2010, from http://www.loa-cnr.it/
DuraSpace Organization. (2009). DuraCloud overview
2009 .
Czerwinski, S., Zhao, B. Y., Hodes, T., Joseph, A., & Katz,
R. (1999). An architecture for a secure service discovery
service. Paper presented at the Fifth Annual International
Conference on Mobile Computing and Networks (Mobi-
Com '99), Seattle, WA.
Durkee, D. (2010). Why cloud computing will never
be free. Communications of the ACM , 53 (5), 62-69.
doi:10.1145/1735223.1735242
Edgington, T., Choi, B., Henson, K., Raghu, T., & Vinze,
A. (2004). Adopting ontology to facilitate knowledge
sharing. Communications of the ACM , 47 (11), 85-90.
doi:10.1145/1029496.1029499
Dabrowski, C., Mills, K., & Elder, J. (2002, July 2002).
Understanding consistency maintenance in service dis-
covery architectures during communication failure. Paper
presented at the 4th International Workshop on Active
Middleware Services, Edinburgh, UK.
Elizabeth, M., & Hull, C. (1987). Occam - A programming
language for multiprocessor systems. Computer Languag-
es , 12 (1), 27-37. doi:10.1016/0096-0551(87)90010-5
Dan, A., Johnson, R., & Arsanjani, A. (2007). Information
as a service: Modeling and realization. Paper presented
at the International Workshop on Systems Development
in SOA Environments, Washington, DC.
Ellison, C. (2002). Home network security. Intel Technol-
ogy Journal , 6 (4), 37-48.
Endrei, M., Ang, J., Arsanjani, A., Chua, S., Comte, P.,
& Krogdahl, P. (2004). Patterns: Service-oriented archi-
tecture and Web services . IBM Press.
de Haaf, B. (2008, August 8). Cloud computing - The
jargon is back! Cloud Computing Journal . Retrieved
from http://cloudcomputing.sys-con.com /node/613070
ETSI. (2006). Smartcards UICC security service module:
Stage 1 . (ETSI TS 102 266 V7.1.0). Retrieved March 29,
2010, from http://pda.etsi.org/ pda/ queryform.asp
Department of Energy, US Government. (2010). Report
to congress on server and data center energy efficiency .
Retrieved April 25, 2010, from http://www1.eere.energy.
gov/ femp/pdfs/ epa_dc_report_congress.pdf
Fahringer, T., Anthes, C., Arragon, A., Lipaj, A., Müller-
Iden, J., & Rawlings, C. J. … Surridge, M. (2007). The
Edutain@Grid Project. In D. J. Veit & J. Altmann (Eds.),
GECON 2007. LNCS, 4685 , (pp. 182-187). Heidelberg,
Germany: Springer.
Dey, A. K. (2001). Understanding and using context. Per-
sonal and Ubiquitous Computing , 5 (1), 4-7. doi:10.1007/
s007790170019
Dey, A. K., & Abowd, G. D. (1999). Towards a better un-
derstanding of context and context-awareness . (Technical
Report GIT-GVU-99-22), Georgia Institute of Technology,
College of Computing.
Search WWH ::




Custom Search