1 |
MPICH-G2, http://www3.niu.edu/mpi
|
2 |
I. Foster and C. Kesselman (eds.) "The Grid: Blueprint for a new Computing Infrastructure," Morgan Kaufman Publishers, 1998.
|
3 |
S. Sarma, S. Weis, D. Engles, "RFID Systems and Security and Privacy Implication," In CHES, vol. 2523 of LNCS, pp. 454-469, August 2002.
|
4 |
Willam P. Walsh, Research and application of RFID Technology to enhance aviation security, IEEE, 2000.
|
5 |
M. Ohkubo, K. Suzuki, and S. Kinoshita. "Cryptographic approach to "privacy-friendly" tags". In RFID Privacy Workshop, MIT, USA, 2003.
|
6 |
Hyung-Jun Kim, Sung-up Jo, Yong-won Kwon, So-Hyun Ryu, Yong-je Woo, Chang-Sung Jeong, and hyoungwoo Park, "Fast Parallel Algorithm for Volume Rendering and Its Experiment on Computational Grid", ICCS 2003, INCS 2657, pp. 610-618, 2003.
|