1. Hotovy, S.: Workload evolution on the Cornell theory center IBM SP2. Job Scheduling Strategies for Parallel Proc. Workshop (IPPS 96), pp. 27–40 (1996)
2. Mohamadi Begum Y., Maluk Mohamed M.A.: DEEPG: dual heap overlay resource discovery protocol for mobile grid. Scalability Comput. Pract. Exp. 12(2), 239–255 (2011)
3. Ian, G.; David, W.: Architectural considerations for cryptanalytic hardware. In: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design, O’Reilly, pp. 10-1–10-26 (1998)
4. Brute-force attack. http://en.wikipedia.org/wiki/Brute-force_attack (Accessed 22 May 2012)
5. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesly, USA (1989)