Search
Now showing items 1-1 of 1
Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments
(Information Sciences. 2012, vol. 192, p. 228-243.)
Now showing items 1-1 of 1