共 50 条
[21]
A Containment-Based Security Model for Cycle-Stealing P2P Applications
[J].
INFORMATION SECURITY JOURNAL,
2010, 19 (04)
:191-203
[22]
Hayek R., 2008, P INT C EXT DAT TECH
[23]
Hedrick C., 1988, 1058 REQ COMM
[24]
Heine F., 2004, P 5 INT WORKSH GRID
[25]
Hennig L. W., 2008, P 2008 IEEE WIC ACM
[26]
HOSCHEK W, 2000, P 1 INT WORKSH GRID
[27]
Jiao B., 2010, P 33 INT C RES DEV I
[28]
FRDT Footprint Resource Discovery Tree for grids
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2011, 27 (02)
:148-156
[29]
Kim J.-S., 2008, P INT C GRID COMP GR
[30]
Kunszt P., 2004, P INT C PAR PROC APP