1 |
Dario Bruneo, Marco Scarpa, Angelo Zaia, and Antonio Puliafito, 'Communication Paradigm for Mobile Grid Users', Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003
DOI
|
2 |
F. Berman, G. Fox, T. Hey, The Grid: past, present, future, Grid Computing - Making the Global Infra-structure a Reality, Wiley and Sons
|
3 |
W. Ma, Y. Fang, 'Dynamic hierarchical mobility management strategy for mobile IP networks', Selected Areas in Communications, IEEE Journal on Volume: 22, Issue: 4, May, 2004
DOI
ScienceOn
|
4 |
B. Strulo, J Farr, and A. Smith, 'Securing mobile ad hoc networks-a motivational approach', BT Technology Journal, 2003
DOI
|
5 |
M. Sanver, S. P. Durairju, A. Gupta, 'Should one incorporate Mobile-ware in Parallel and Distributed Computation?', HiPC 2003
|
6 |
N. Suri, J. M. Bradshaw, M. M. Carvalho, and T. B. Cowin, 'Agile Computing: Bridging the Gap between Grid Computing and Ad-hoc Peer-to-Peer Resource Sharing', Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003
DOI
|
7 |
Thomas Phan, Lloyd Huang, and Chris Dulan, 'Challenge: Integrating Mobile Wireless Devices Into the Computational Grid', MOBICOM 02, September 23-26, Atlanta Georgia, USA
|
8 |
Globus-http://www.globus.org/
|
9 |
Condor-G: http://www.cs.wisc.edu/condor/condorg
|
10 |
M. Migliardi, M. Maheswaran, B. Maniymaran, P. Card, and F. Azzedin, 'Mobile Interfaces to Computational, Data, and Service Grid System', Mobile Computing and Communication Review, Volume1, Number 2
DOI
|
11 |
Tae-Kyung Kim, Dong-Young Lee, and T. M. Chung, 'Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model For Distributed System', Lecture Notes in Computer Science: EurAsia ICT 2002, Tehran, Iran, LNCS2510 pp.842-849, October, 2002
|
12 |
S. Y. Yi and M. Livny, 'Extending the Condor Distributed System for Mobile Clients', ACM Mobile Computing and Communications Review, 1999
|
13 |
T. Hayton, 'The mobile Grid', Global Grid Forum 5
|