← LOSCHEDULING TECHNIQUES FOR NAR-DEDICATED CLUSTER COMPUTING → VULNERABILITY ASSESSMENT FOR COMPLEX MIDDLEWARE INTERRELATIONSHIPS IN DISTRIBUTED SYSTEMS