|
[1]Distinguishing Cloud Computing from Utility Computing, http://www.ebizq.net/blogs/saasweek/2008/03/distinguishing_cloud_computing/, June 2011 [2]Gartner Say''s Cloud Computing Will Be As Influential As E-business, http://www.gartner.com/it/page.jsp?id=707508, June 2011 [3]What cloud computing really means,http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031, June 2011 [4]Show Me the Gateway, http://gigaom.com/2010/06/22/show-me-the-gateway-taking-storage-to-the-cloud/, June 2011 [5]Jiyi Wu; Lingdi Ping; Xiaoping Ge; Ya Wang; Jianqing Fu; "Cloud Storage as the Infrastructure of Cloud Computing",inProc. Intelligent Computing and Cognitive Informatics (ICICCI), 2010, pp. 380 – 383. [6]Ian Foster Argonne,What is the Grid? A Three Point Checklist, National Laboratory & University of Chicago, 2002. [7]Jiyi Wu; Lingdi Ping; Xiaoping Ge; Ya Wang; JianqingFu,"Cloud Storage as the Infrastructure of Cloud Computing", in Proc.Intelligent Computing and Cognitive Informatics (ICICCI), Malaysi, 2010, pp. 380-383. [8]YanmeiHuo; Hongyuan Wang; Liang Hu; Hongji Yang; "A Cloud Storage Architecture Model for Data-Intensive Applications", in Proc.Computer and Management (CAMAN), 2011, pp. 1-4. [9]Microsoft SMB Protocol and CIFS Protocol Overview, MSDN, http://msdn.microsoft.com/en-us/library/aa365233, June 2011 [10]Direct hosting of SMB over TCP/IP. Microsoft, http://support.microsoft.com/kb/204279, June 2011 [11]Costa, L.B.; Ripeanu, M.; “Towards automating the configuration of a distributed storage system”, in Proc.Grid Computing (GRID), 2010, pp. 201-208. [12]Ohsaki, H.; Watanabe, S.; Imase, M.;“On dynamic resource management mechanism using control theoretic approach for wide-area grid computing”, in Proc. Control Applications, 2005, pp. 891-897. [13]Dezhi Han; Fu Feng; “Research on Self-Adaptive Distributed Storage System”, in Proc.Wireless Communications, Networking and Mobile Computing (WiCOM ''08.), 2008. [14]Jianzong Wang; Varman, P.; ChangshengXie; “Avoiding performance fluctuation in cloud storage”, in Proc.High Performance Computing (HiPC),2010. [15]A Survey of DHT Security Techniques http://www.cs.vu.nl/~steen/papers/2009.acm-cs.pdf, June 2011 [16]Qiang Li; QinfenHao; Limin Xiao; Zhoujun Li; “Adaptive Management of Virtualized Resources in Cloud Computing Using Feedback Control” , in Proc.Information Science and Engineering (ICISE), 2009, pp. 99-102. [17]A Distributed Hash Table http://pdos.csail.mit.edu/papers/fdabek-phd-thesis.pdf, June 2011 [18]Nasri, M.; Sharifi, M.; " Load Balancing using Consistent Hashing: a Real Challenge for Large Scale Distributed Web Crawlers",Advanced Information Networking and Applications Workshops (WAINA ''09),2009, pp. 715 – 720. [19]Kan Zhang; Antonopoulos, N.; ZaighamMahmood; “A Review of Incentive Mechanism in Peer-to-Peer Systems”, Advances in P2P Systems(AP2PS ''09),2009, pp. 45-50. [20]Javed I. Khan and Adam Wierzbicki,“Foundation of Peer-to-Peer Computing”, Elsevier Journal of Computer Communication, Volume 31, Issue 2, Feb. 2008. [21]John F. Buford, Heather Yu, EngKeongLua“P2P Networking and Applications.” ISBN 30-12374-214-5, Morgan Kaufmann, Dec. 2008. [22]Deke Guo; Jie Wu; Honghui Chen; Ye Yuan; XueshanLuo; “The Dynamic Bloom Filters”, Knowledge and Data Engineering, Volume 22 , Issue 1, 2010, pp. 120-133. [23]Bruck, J.; JieGao; Anxiao Jiang; “ Weighted Bloom Filter”, Information Theory, 2006 [24]Xin Sun, KanLi,Yushu Liu, "An Efficient Replica Location Method in Hierarchical P2P Networks", in Proc.Computer and Information Science(ICIS 2009), 2009, pp. 769-774. [25]He Huang; Liqiang Wang; “P&P: A Combined Push-Pull Model for Resource Monitoring in Cloud Computing Environment”, Cloud Computing (CLOUD), 2010, pp. 260 - 267. [26]Wenzheng Li; Hongyan Shi; "Dynamic Load Balancing Algorithm Based on FCFS", in Proc.Innovative Computing, Information and Control (ICICIC), 2009, pp. 1528 – 1531. [27]Dinerstein, J.; Dinerstein, S.; Egbert, P.K.; Clyde, S.W.; “Learning-Based Fusion for Data Deduplication”, in Proc.Machine Learning and Applications ICMLA ''08, 2008, pp. 66-71. [28]Bloom Filter, http://en.wikipedia.org/wiki/Bloom_filter, June 2011
|