References

  1. G. Abowd & E.D. Mynatt (2000): Charting past, present, and future research in ubiquitous computing. ACM Trans. Comput.-Hum. Interact. 7, pp. 29–58, doi:10.1145/344949.344988.
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica & M. Zaharia (2009): Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28. EECS Department, University of California, Berkeley.
  3. M. Bartoletti, P. Degano, G.L. Ferrari & R. Zunino (2009): Local Policies for Resource Usage Analysis. ACM Trans. Program. Lang. Syst., doi:10.1145/1552309.1552313.
  4. M. Bartoletti & R. Zunino (2010): A Calculus of Contracting Processes. In: Proc of LICS'10. IEEE Computer Society, pp. 332–341, doi:10.1109/LICS.2010.25.
  5. C. Bodei, P. Degano, F. Nielson & H. Nielson (2001): Static Analysis for the Pi-Calculus with Applications to Security. Inf. Comput. 168(1), pp. 68–92, doi:10.1006/inco.2000.3020.
  6. C. Bodei, V. D. Dinh & G. L. Ferrari (2011): A G-Local π-calculus. In: Proc. of PLACES 2011, doi:10.4204/EPTCS.38.6. Available at http://places11.di.fc.ul.pt/proceedings.pdf/view.
  7. M. G. Buscemi & U. Montanari (2007): Cc-pi: A Constraint-based Language for Specifying Service Level Agreements. In: Proc of ESOP'07, LNCS 4421. Springer, pp. 18–32, doi:10.1007/978-3-540-71316-6_3.
  8. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg & I. Brandic (2009): Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25, pp. 599–616, doi:10.1016/j.future.2008.12.001.
  9. Lu\'ıs Caires (2008): Spatial-behavioral types for concurrency and resource control in distributed systems. Theor. Comput. Sci. 402(2-3), pp. 120–141, doi:10.1016/j.tcs.2008.04.030.
  10. G. Castagna, N. Gesbert & L. Padovani (2009): A theory of Contracts for Web services. ACM Trans. Program. Lang. Syst. 31(5), doi:10.1007/978-3-642-00590-9.
  11. M. Collinson & D.J. Pym (2010): Algebra and Logic for Access Control. Formal Asp. Comput. 22(3-4), pp. 483–484, doi:10.1007/s00165-010-0155-2.
  12. D. Gelernter (1985): Generative communication in Linda. ACM Trans. Program. Lang. Syst. 7(1), pp. 80–112, doi:10.1145/2363.2433.
  13. N. Kobayashi, K. Suenaga & L. Wischik (2006): Resource Usage Analysis for the Pi-Calculus. Logical Methods in Computer Science 2(3), pp. 298–312, doi:10.2168/LMCS-2(3:4)2006.
  14. D. Sangiorgi & D. Walker (2001): Pi-Calculus: A Theory of Mobile Processes. Cambridge University Press, New York, NY, USA.
  15. E. D. Vries, A. Francalanza & M. Hennessy (2009): Uniqueness Typing for Resource Management in Message-Passing Concurrency. In: Proc. of LINEARITY, EPTCS 22, pp. 26–37, doi:10.4204/EPTCS.22.3.
  16. L. Youseff, M. Butrico & D. Da Silva (2008): Toward a Unified Ontology of Cloud Computing. In: Proc of GCE '08, pp. 1–10, doi:10.1109/GCE.2008.4738443.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org