參考文獻 |
[1]. Agrawal, M., Rao, H. R., Sanders, G. L.: Impact of mobile computing terminals in police work. Journal of Organizational Computing and Electronic Commerce, 13 (2003) 73-89.
[2]. Abdinnour-Helm, S.F., Chaparro, B.S., Farmer S.M.: Using the end-user computing satisfaction (EUCS) instrument to measure satisfaction with a web site, Decision Sciences, 36 (2005) 341-364.
[3]. Androutsellis-Theotokis, S., Spinellis, D.A.: Survey of peer-to-peer content distribution technologies, ACM Computing Surveys, 36 (2004) 335-371.
[4]. Baily, J. E., Pearson, S.: Development of a tool for measuring and analyzing computer user satisfaction. Management Science, 29 (1983) 530-545.
[5]. Bank, D.R., Telecomm disaster recovery planning for electric utilities. IEEE conference Rural Electric Power 2005: D3/1-D3/10.
[6]. Bartoli, A.: Implementing a replicated service with group communication, Journal of Systems Architecture, 50 (2004) 493-519.
[7]. Birman, K.P., Renesse, R.: Reliable distributed computing with the Isis Toolkit. Wiley: IEEE Computer Society Press, 1994.
[8]. Blake, M. B., Fado, D. H., Mack, G. A.: A publish and subscribe collaboration architecture for web based information. ACM conference WWW (2005) 1164-1165.
[9]. Bhide, M., Deolasee, P., Katkar, A., Panchbudhe, A., Ramamritham, K., Shenoy, P.: Adaptive push-pull: disseminating dynamic web data. IEEE Transactions on Computers, 51 (2002) 652-668.
[10]. Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computer Systems, 20 (2002) 398-461.
[11]. Chandra, T. D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43 (1996) 225-267.
[12]. Conti, M., Gregori, E., Lapenna, W.: Client-side content delivery policies in replicated web services: parallel access versus single server approach. Performance Evaluation, 59 (2005) 137-157.
[13]. Davies, D. W.: An historical study of the beginnings of packet switching. Computer Journal, 44 (2001) 152.
[14]. Défago, X., Schiper, A., and Urbán, P.: Total order broadcast and multicast algorithms; Taxonomy and Survey. ACM Computing Surveys, 36 (2004) 372-421.
[15]. Denton, D. K.: INTRANETS: Bringing Integration to Performance Measurement. Performance Improvement, 44 (2005) 28-33.
[16]. Fallara, P.: Disaster recovery planning. IEEE Potentials, 22 (2003) 42-44.
[17]. Fich, F., Rparentt, E.: Hundreds of impossibility results for distributed computing. Distributed Computing, 16 (2003) 121-163.
[18]. Fry, M., MacLarty, G.: Policy-based content delivery: an active network approach. Computer Communications, 24(2001) 241-248.
[19]. Goh, T.N.: A strategic assessment of six sigma. Quality and Reliability Engineering International , 18 (2002) 403-410.
[20]. Greenberg, J., Baron, R. A.: Behavior in Organizations, Allyn and Bacon Inc, MA (1993).
[21]. Gunther, N.J.: The dynamics of performance collapse in large-scaled networks and computers. Journal of High Performance Computing Applications, 14 (2000) 367-372.
[22]. Hayes, P.E., Hammons, A., Picking up the pieces: Utilizing disaster recovery project management to improve readiness and response time, IEEE Industrial Application Magazine, 8(2002) 27-36.
[23]. Herrería-Alonso, S., Suárez-González, A., Fernández-Veiga, M., Rubio, R. F. R., López-García, C.: Improving aggregate flow control in differentiated services networks. Computer Networks, 44 (2004) 499-512.
[24]. Hiles, A.: Surviving a computer disaster. Computing & Control Engineering Journal, 3(1992) 271-274.
[25]. Hsieh, C.C., Hsieh, YC.: Reliability and cost optimization in distributed computing systems. Computers and Operations Research, 30 (2003) 1103-1119.
[26]. Jiang, Y., Wu, M.Y., Shu, W.: A hierarchical overlay multicast network. IEEE conference Multimedia and Expo, (2004) 1047-1050.
[27]. Kamilla, K., Håkan, L., Lundberg, L., Svahnberg, C.: Optimal recovery schemes in fault tolerant distributed computing, Acta Inform, 41(2005) 341-365.
[28]. Katsaros, D., Manolopoulos, Y.: Broadcast program generation for webcasting, Data & Knowledge Engineering, 49 (2004) 1-21.
[29]. King, D.: Post Disaster Surveys: experience and methodology, Australian Journal of Emergency Management, 17(2002) 1-13.
[30]. Kleinrock, L.: Queueing Systems Volume I: Theory. John Wiley and Sons, 1975.
[31]. Legris, P., Ingham, J., Collerette, P., Why do people use information technology? A critical review of the technology acceptance model, Information and Management, 40 (2003) 191-204.
[32]. Liang, C.C., Hsu, P.Y., Leu, J.D., Luh, H.: An effective approach for content delivery in an evolving intranet environment- a case study of the largest telecom company in Taiwan. Lecture Notes in Computer Science, 3806 (2005) 740- 749.
[33]. Liang, C.C., Wang, C.H., Luh, H., Hsu, P.Y.: A robust web-based approach for broadcasting down-ward Messages in a large-scaled company. Lecture Notes in Computer Science, 4255 (2005) 222- 233.
[34]. Liang, C.C., Wang, C.H., Luh, H., Hsu, P.Y.: Disaster Avoidance Mechanism for Content-Delivering Service. Computers & Operations Research (Accepted, 5/16/2007).
[35]. Liang, C.C., Wang, C.H., Luh, H., Hsu, P.Y.: Reliability Measure in Content-Distribution Systems. J Computer Science and Network Security, 7 (2007) 138-143.
[36]. Lim, H., Kim, W., Lee, B., Yim, C.: High-speed IP address lookup using balanced multi-way trees. Computer Communications, 29 (2006) 1927-1935.
[37]. Little, J.D.: A Proof of the Queueing Formula , Operations Research, 9 (1961) 383-387.
[38]. Morgan, G., Shrivastava, S.K.: Implementing flexible object group invocation in networked systems. International conference on Dependable Systems and Networks, (2000) 439-48.
[39]. Mills, R.J., Paper, D., Lawless, K.A., Kulikowich, J.M.: Hypertext navigation- an intrinsic component of the corporate intranet. Journal of Computer Information Systems, 43(2002) 44-50.
[40]. Nunnally, J., Bernstein, I.: Psychometric theory, McGraw-Hill, New York, 1994.
[41]. O'Connor, P.D.T.: Commentary: reliability-past, present, and future. IEEE Transactions on Reliability, 49(2000) 335-341.
[42]. Pallis, G., Vakali, A., Insight and perspectives for content delivery networks. Communications of the ACM, 49 (2006) 101-106.
[43]. Pascal, C.L.: Enabling chance interaction through Instant Messaging. IEEE Transactions on Professional Communication, 46(2003) 138-141.
[44]. Pidgeon, N., O’Leary, M., Man-made disasters: why technology and organizations (sometimes) fail, Safety Science, 34(2000) 15-30.
[45]. Ranganathan, C., Ganpathy, S.: Key dimensions of business-to-customer web sites. Information and Management, 39(2005) 457-465.
[46]. Rodeh, O., Birman, K.P., Dolev, D.: Using AVL trees for fault-tolerant group key management, International Journal of Information Security, 1 (2002) 84-99.
[47]. Saxena, N., Pinotti, C. M., Das, S. K.: A Probabilistic push-pull hybrid scheduling algorithm for asymmetric wireless environment. IEEE conference GLOBALCOM (2004) 5-9.
[48]. Shao, B.B.M., Optimal redundancy allocation for information technology disaster recovery in the network economy, IEEE Transactions on Dependable and Secure Computing, 2(2005) 262-67.
[49]. Smith, D.R., Cybrowski, W.J., Zawislan, F., Amstein, D., Dayton, AD, Studwell, TD.: Disaster recovery planning for transmission systems of the defense information system network. IEEE Journal on Selected Areas in Communications, 12(1994) 13-22.
[50]. Stuckenschmidt, H., van Harmelen, F.: Generating and managing metadata for web-based information systems. Knowledge-Based Systems, 17(2004) 201-206.
[51]. Taylor, H.M., Karlin, S.: An Introduction to Stochastic Modeling, Third Edition, Academic Press, 1998.
[52]. Wang, W.M., Liang C.C., Lu H.Z., Chow W.S., Chang K.Y.: Research of testing process: the case of TOPS system delivery process. TL Technical Journal, 34(2004) 7-34.
[53]. Yen, L.H., Chi, K.H.: Maintaining a ring structure for mobile ad hoc computing, Journal of Parallel and Distributed Computing, 64 (2004) 1371-1379. |