[1]
|
Kumar, R. and Mieritz, L. (2007) Conceptualizing Green IT and Data Centre Power and Cooling Issues. Gartner Research Paper No. G00150322.
|
[2]
|
Mishra, S. (2013) Green Computing. Science Horizon, 21.
|
[3]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
|
[4]
|
Wang, D. (2008) Meeting Green Computing Challenges. Proceedings of 10th Electronics Packaging Technology Conference (EPTC 2008), Singapore, 9-12 December 2008, 121-126. http://dx.doi.org/10.1109/EPTC.2008.4763421
|
[5]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[6]
|
Daniels, G., Greene, L. and Carr, S. (2010) Planet Green, ICT for a Low-Carbon Future. Decisive Media Limited, London.
|
[7]
|
Barroso, L.A. (2007) The Case for Energy-Proportional Computing. Computer, 40, 33-37. http://dx.doi.org/10.1109/MC.2007.443
|
[8]
|
Murugesan, S. (2008) Harnessing Green IT: Principles and Practices. IT Professional, 10, 24-33. http://dx.doi.org/10.1109/MITP.2008.10
|
[9]
|
Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28. http://dx.doi.org/10.4236/ijcns.2015.83003
|
[10]
|
Zeng, H., Ellis, C. and Lebeck, R. (2005) Experiences in Managing Energy with ECO System. IEEE Pervasive Computing, 4, 62-68. http://dx.doi.org/10.1109/MPRV.2005.10
|
[11]
|
Sari, A. (2015) Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. In: New Threats and Countermeasures in Digital Crime and Cyber Terrorism, IGI Global, Hershey, 66-94. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005
|
[12]
|
Cabusao, G., Mochizuki, M., Mashiko, K., Kobayashi, T., Singh, R., Thang, N. and Xiao, W. (2010) Data Center Energy Conservation Utilizing a Heat Pipe Based Ice Storage System. Proceedings of the IEEE Symposium Components, Packaging and Manufacturing Technology, Tokyo, 24-26 August 2010, 1-4. http://dx.doi.org/10.1109/cpmtsympj.2010.5680287
|
[13]
|
Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154. http://dx.doi.org/10.4236/jis.2015.62015
|
[14]
|
McKenna, P. (2008) Can We Stop the Internet from Destroying Our Planet? New Scientist, January 2008
|
[15]
|
Sari, A., Karaduman, A. and Firat, A. (2015) Deployment Challenges of Offshore Renewable Energy Systems for Sustainability in Developing Countries. Journal of Geographic Information System, 7, 465-477. http://dx.doi.org/10.4236/jgis.2015.75037
|
[16]
|
Tozer, R. and Salim, M. (2010) Data Center Air Management Metrics-Practical Approach. Proceedings of the 12th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems (ITherm), Las Vegas, 2-5 June 2010, 1-8. http://dx.doi.org/10.1109/itherm.2010.5501366
|
[17]
|
Romadhon, R., Ali, M., Mahdzir, M. and Abakr, A. (2009) Optimization of Cooling Systems in Data Centre by Computational Fluid Dynamics Model and Simulation. Proceedings of the Innovative Technologies in Intelligent Systems and Industrial Applications, Monash, 25-26 July 2009, 322-327. http://dx.doi.org/10.1109/citisia.2009.5224189
|
[18]
|
Kanmdar, M.R. (2008) Literature Review: Green Computing Implementation Procedures for Energy Efficiency. http://maulik-kamdar.com/2010/08/green-computing/
|
[19]
|
Brill, K.G. (n.d.) The Invisible Crisis in the Data Center: The Economic Meltdown of Moore’s Law.
|
[20]
|
Blevis, E. (2007) Sustainable Interaction Design: Invention & Disposal, Renewal & Reuse. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM Press, New York, 503-512. http://dx.doi.org/10.1145/1240624.1240705
|
[21]
|
Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
|
[22]
|
Nathuji, R. and Schwan, K. (2007) Virtual Power: Coordinated Power Management in Virtualized Enterprise Systems. In: Proceedings of the 21st ACM SIGOPS Symposium on Operating Systems Principles, ACM Press, New York, 265-278. http://dx.doi.org/10.1145/1323293.1294287
|
[23]
|
Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. Proceedings of the 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.
|
[24]
|
Data Centers—Siemens (n.d.) WCMS3PortletPage. http://w3.siemens.com/topics/global/en/data-centers/pages/home.aspx
|
[25]
|
Images For > Data Center Design Layout (n.d.) http://imgkid.com/data-center-design-layout.shtml
|
[26]
|
Open Data Center Alliance Usage: Data Security Framework Rev 1.0 (n.d.) http://www.opendatacenteralliance.org/docs/Data_Security_Framework_Rev1.0.pdf.
|
[27]
|
Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, 2, 1-6.
|
[28]
|
Secure Virtual Framework | hptippingpoint. (n.d.) http://www.ndm.net/ips/hp-tippingpoint/secure-virtual-framework.
|
[29]
|
Sudha, M. (2012) Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography. Advances in Computer Science and Its Applications, 1, 32-37.
|
[30]
|
Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. http://dx.doi.org/10.4236/ijcns.2015.83004
|
[31]
|
Thorsteinson, P. and Ganesh, G.G.A. (2003) Asymmetric Cryptography. http://www.informit.com/articles/article.aspx?p=102212
|
[32]
|
Zeadally, A., Khan, S.A., Ullah, S. and Naveen, A.C. (2012) Energy-Efficient Networking: Past, Present, and Future. The Journal of Supercompting, 62, 1093-1118. http://dx.doi.org/10.1007/s11227-011-0632-2
|
[33]
|
Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18. http://dx.doi.org/10.14738/tmlai.25.430
|
[34]
|
Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273. http://dx.doi.org/10.4236/ijcns.2015.87026
|
[35]
|
Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. In: Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13), ACM Press, New York, 454-456. http://dx.doi.org/10.1145/2523514.2523586
|
[36]
|
Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337. http://dx.doi.org/10.1109/cicsyn.2013.79
|