Author:
Kim Jong-Kook,Hensgen Debra A.,Kidd Taylor,Siegel Howard Jay,St. John David,Irvine Cynthia,Levin Tim,Porter N. Wayne,Prasanna Viktor K.,Freund Richard F.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference45 articles.
1. AICE, Agile Information Control Environment Proposers Information Package, BAA 98–26, September 1998, http://web-ext2.darpa.mil/iso/aice/aicepip.htm
2. S. Ali, J.-K. Kim, Y. Yu, S.B. Gundala, S. Gertphol. H.J. Siegel, A. A. Maciejewski, and V. Prasanna, Utilization-based techniques for statically mapping heterogeneous applications onto hiper-d heterogeneous computing system. Parallel and Distributed Computing Practices, accepted to appear in 2004.
3. S. Ali, A.A. Maciejewski, H.J. Siegel, and J.-K. Kim, Measuring the robustness of a resource allocation. IEEE Transactions on Parallel and Distributed Systems, accepted to appear in 2004.
4. L. Badger, D.F. Stern, D.L. Sherman, K.M. Walker, and S.A. Haghighat, Practical domain and type enforcement for Unix. 1995 IEEE Symposium on Security and Privacy (May 1995) pp. 66– 77.
5. M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized trust management.1996 IEEE Symposium on Security and Privacy (May 1996) pp. 164–173.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献