Information and Software Technology (50), pp. 833
–859.
Ercan, T. (2010)
“Effective Use of Cloud Computing in Educational Institutions” [doi: 10.1016/j.sbspro.2010.03.130],
Procedia
―Social and Behavioral Sciences (2)2, pp. 938–942.
Erdogmus, H. (2009)
“Cloud Computing: Does Nirvana Hide Behind the Nebula?” IEEE Software (26)2, pp. 4–6.
Foster, I., Z. Yong, I. Raicu, and S. Lu (2008)
“Cloud Computing and Grid Computing 360-Degree Compared,”
Paper presented at the Grid Computing Environments Workshop, 2008, GCE
’08. Austin, TX.
Garg, S.K., C.S. Yeo, A. Anandasivam, and R. Buyya (2011)
“Environment-conscious Scheduling of HPC
Applications on Distributed Cloud-oriented Data Centers,
” Journal of Parallel and Distributed Computing (71)6,
pp. 732
–749, doi: 10.1016/j.jpdc.2010.04.004.
Geer, D. (2009)
“The OS Faces a Brave New World,” Computer (42)10, pp. 15–17.
Gentry, C. (2010)
“Computing Arbitrary Functions of Encrypted Data,” Communications of the ACM (53)3, p. 97.
Glaser, B., and A. Strauss (1967)
“The Discovery of Grounded Theory: Strategies for Qualitative Research,”
Chicago, IL: Aldine Publishing Company.
Gold, S. (2009)
“Artificial Reality,” Infosecurity (6)3, pp. 38–41, doi: 10.1016/S1754-4548(09)70062-2.
Golden, B. (2009)
“Cloud Computing: ‘Be Prepared,’” EDUCAUSE Review (44)4, p. 64.
Goscinski, A., and M. Brock (2010)
“Toward Dynamic and Attribute Based Publication, Discovery and Selection for
Cloud
Computing,
”
Future
Generation
Computer
Systems
(26)7,
pp.
947
–970,
doi:
10.1016/j.future.2010.03.009.
52
Volume 31
Article 2
Greengard, S., and N. Kshetri (2010)
“Cloud Computing and Developing Nations,” Communications of the ACM
(53)5, p. 18.
Grobauer, B., T. Walloschek, and E. Stocker (2011)
“Understanding Cloud Computing Vulnerabilities,” IEEE Security
& Privacy (9)2, pp. 50
–57.
Grossman, R.L. (2009)
“The Case for Cloud Computing,” IT Professional (11)2, p. 23.
Grossman, R.L., Y. Gu, M. Sabala, and W. Zhang (2009)
“Compute and Storage Clouds Using Wide Area High
Performance Networks,
” Future Generation Computer Systems (25)2, pp. 179–183.
Guizzo, E. (2011)
“Robots with Their Heads in the Clouds,” IEEE Spectrum (48)3, pp. 16–18.
Guzzo, R.A., S.E. Jackson, and R.A. Katzell (1987)
“Meta-analysis Analysis,” Research in Organizational Behavior
(9), pp. 407
–442.
Han, Y. (2010)
“On the Clouds: A New Way of Computing,” Information Technology and Libraries (29)2, p. 87.
Hayes, B. (2008)
“Cloud Computing,” Communications of the ACM (9)3, p. 51.
Hewitt, C. (2008)
“ORGs for Scalable, Robust, Privacy-friendly Client Cloud Computing,” IEEE Internet Computing
(12)5, p. 96.
Hofmann, P., and D. Woods (2010)
“Cloud Computing: The Limits of Public Clouds for Business Applications,” IEEE
Internet Computing (14)6, p. 90.
Huff, S.L., M.C. Munro, and B.H.Martin,(1988)
“Growth Stages of End User Computing,” Communications of the
ACM (31)5, pp. 542
–550.
Hwang, K., and D. Li (2010)
“Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet
Do'stlaringiz bilan baham: |