

Author: McGough A. Cohen Jeremy Darlington John Katsiri Eleftheria Lee William Panagiotidi Sofia Patel Yash
Publisher: Springer Publishing Company
ISSN: 1570-7873
Source: Journal of Grid Computing, Vol.3, Iss.3-4, 2005-09, pp. : 259-281
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






By García Leiva R. Barroso López M. Cancio Meliá G. Chardi Marco B. Cons L. Poznański P. Washbrook A. Ferro E. Holt A.
Journal of Grid Computing, Vol. 2, Iss. 4, 2004-12 ,pp. :


A Taxonomy of Workflow Management Systems for Grid Computing
Journal of Grid Computing, Vol. 3, Iss. 3-4, 2005-09 ,pp. :


By Ko Catherine Hurley Margaret
Information Management & Computer Security, Vol. 3, Iss. 3, 1995-03 ,pp. :