1 |
P. Vivekananth, "An overview of trust models and proposal of new model based on teputation for resource selection in grid computing," International Journal of Engineering and Technology, Vol. 2, No. 4, pp. 387-389, 2010.
DOI
|
2 |
C. Li, "Joint application-fabric layer optimization in grid Computing," in 2008 11th IEEE International Conference on Computational Science and Engineering, Sao Paulo: Brazil, pp. 141-146, 2008.
|
3 |
O. Lysne, J. M. Montaana, J. Flich, J. Duato, T. M. Pinkston, and T. Skeie, "An efficient and deadlock-free network reconfiguration protocol," IEEE Transactions on Computers, Vol. 57, No. 6, pp. 762-779, 2008.
DOI
|
4 |
I. Gorton, Z. Huang, Y. Chen, B. Kalahar, S. Jin, D. Baxter, and J. Feo, "A high-performance hybrid computing approach to massive contingency analysis in the power grid," in The 5th IEEE International Conference on e-Science, Oxford: United Kingdom, pp. 277-283, 2009.
|
5 |
Q. Zheng, "On the design of mutually aware optimal pricing and load balancing Strategiesfor grid computing systems computers," IEEE Transactions on Computers, Vol. 63, No. 7, pp. 1802-1811, 2013.
DOI
|
6 |
M. Smith, F. Schwarzer, M. Harbach, T. Noll, and B. Freisleben, "A streaming intrusion detection system for grid computing environments," in The 11th IEEE International Conference on High Performance Computing and Communications 2009. HPCC'09. Seoul: Korea, pp. 44-51, 2009.
|
7 |
Y. Zhang, L. Wang, W. Sun, R. C. Green, and M. Alam, "Distributed intrusion detection system in a multi-layer network architecture of smart grids," IEEE Transactions on Smart Grid, Vol. 2, No. 4, pp. 796-808, 2011.
DOI
|
8 |
R. S. Chang, C. Y. Lin, and C. F. Lin, "An adaptive scoring job scheduling algorithm for grid computing," Information Sciences, Vol. 207, pp. 79-89, 2012.
DOI
|