nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A business-oriented Cloud federation model for real-time applications
|
Yang, Xiaoyu |
|
2012 |
28 |
8 |
p. 1158-1167 10 p. |
artikel |
2 |
Acknowledgement of Reviewers over 2011
|
|
|
2012 |
28 |
8 |
p. 1155-1157 3 p. |
artikel |
3 |
A coordinator for scaling elastic applications across multiple clouds
|
Calheiros, Rodrigo N. |
|
2012 |
28 |
8 |
p. 1350-1362 13 p. |
artikel |
4 |
A recommender mechanism for service selection in service-oriented environments
|
Tserpes, Konstantinos |
|
2012 |
28 |
8 |
p. 1285-1294 10 p. |
artikel |
5 |
A safety-focused verification using software fault trees
|
Cha, Sungdeok |
|
2012 |
28 |
8 |
p. 1272-1282 11 p. |
artikel |
6 |
A time-constrained SLA negotiation strategy in competitive computational grids
|
Silaghi, Gheorghe Cosmin |
|
2012 |
28 |
8 |
p. 1303-1315 13 p. |
artikel |
7 |
Contents
|
|
|
2012 |
28 |
8 |
p. iii-iv nvt p. |
artikel |
8 |
Editorial Board
|
|
|
2012 |
28 |
8 |
p. IFC- 1 p. |
artikel |
9 |
Evolution of grid-based services for Diffusion Tensor Image analysis
|
Caan, M.W.A. |
|
2012 |
28 |
8 |
p. 1194-1204 11 p. |
artikel |
10 |
Hierarchical branch and bound algorithm for computational grids
|
Bendjoudi, A. |
|
2012 |
28 |
8 |
p. 1168-1176 9 p. |
artikel |
11 |
HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems
|
Luo, Yi |
|
2012 |
28 |
8 |
p. 1217-1235 19 p. |
artikel |
12 |
Impact of pricing schemes on a market for Software-as-a-Service and perpetual software
|
Rohitratana, Juthasit |
|
2012 |
28 |
8 |
p. 1328-1339 12 p. |
artikel |
13 |
Modeling and analyzing the impact of authorization on workflow executions
|
He, Ligang |
|
2012 |
28 |
8 |
p. 1177-1193 17 p. |
artikel |
14 |
New method for scheduling heterogeneous multi-installment systems
|
Shokripour, Amin |
|
2012 |
28 |
8 |
p. 1205-1216 12 p. |
artikel |
15 |
Preface of special issue on the economics of computing services
|
Altmann, Jörn |
|
2012 |
28 |
8 |
p. 1283-1284 2 p. |
artikel |
16 |
Securing heap memory by data pointer encoding
|
Kim, Kyungtae |
|
2012 |
28 |
8 |
p. 1252-1257 6 p. |
artikel |
17 |
Service level agreement as a complementary currency in peer-to-peer markets
|
Petri, Ioan |
|
2012 |
28 |
8 |
p. 1316-1327 12 p. |
artikel |
18 |
SLA-based management of software licenses as web service resources in distributed computing infrastructures
|
Cacciari, Claudio |
|
2012 |
28 |
8 |
p. 1340-1349 10 p. |
artikel |
19 |
Special section: Trusting software behavior
|
Lee, Gyungho |
|
2012 |
28 |
8 |
p. 1236-1237 2 p. |
artikel |
20 |
Supporting CPU-based guarantees in cloud SLAs via resource-level QoS metrics
|
Goiri, Íñigo |
|
2012 |
28 |
8 |
p. 1295-1302 8 p. |
artikel |
21 |
Trust in collaborative web applications
|
West, Andrew G. |
|
2012 |
28 |
8 |
p. 1238-1251 14 p. |
artikel |
22 |
Trustworthiness testing of phishing websites: A behavior model-based approach
|
Shahriar, Hossain |
|
2012 |
28 |
8 |
p. 1258-1271 14 p. |
artikel |