ACSW Frontiers 2005:
Newcastle,
NSW,
Australia
Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn (Eds.):
ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005.
CRPIT 44 Australian Computer Society 2005, ISBN 1-920682-26-0
Australasian Workshop on Grid Computing and e-Research
- Mobin Uddin Ahmed, Raja Asad Zaheer, Muhammad Abdul Qadir:
Intellig Intelligent Cache M ent Management for nagement Data Grid.
5-12
- J. Allan:
UK e-Science Pilot Project DAME: Context, Lessons Learned and Future.
3
- Brett Beeson, Steve Melniko, Srikumar Venugopal, David G. Barnes:
A Portal for Grid-enabled Physics.
13-20
- Rüdiger Berlich, Marcel Kunze, Kilian Schwarz:
Grid Computing in Europe: From Research to Deployment.
21-27
- Adam Hunter, David Schibeci, Hong Liang Hiew, Matthew I. Bellgard:
Grendel: A bioinformatics Web Service-based architecture for accessing HPC resources.
29-32
- Richard Mason, Wayne Kelly:
G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework.
33-39
- Nithiapidary Muthuvelu, Junyang Liu, Nay Lin Soe, Srikumar Venugopal, Anthony Sulistio, Rajkumar Buyya:
A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids.
41-48
- Jonathan Smillie, Roberta Allsman, Stuart Hungerford, Jason Ozolins:
Integrating The MACHO Dataset with the Virtual Observatory.
49-56
- Lyle J. Winton:
A Simple Virtual Organisation Model and Practical Implementation.
57-65
- Haili Xiao, Hong Wu, Xuebin Chi, Sungen Deng, Honghai Zhang:
An Implementation of Interactive Jobs Submission for Grid Computing Portals.
67-68
Third Australasian Information Security Workshop
- Mikhail J. Atallah:
A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk).
73
- Brenton Cooper, Paul Montague:
Translation of Rights Expressions.
137-144
- Jiang Du, Chaw-Seng Woo, Binh Pham:
Recovery of Watermark Using Differential Affine Motion Estimation.
81-88
- Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis:
Countermeasures for Attacks on Satellite TV Cards using Open Receivers.
153-158
- Franco Frattolillo, Salvatore D'Onofrio:
Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform.
159-167
- Keith B. Frikken, Mikhail J. Atallah, Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System.
169-178
- Margaret Jackson, Ashish Shah:
The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights.
119-126
- Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope:
Trust Requirements in Identity Management.
99-108
- Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden:
Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process.
145-151
- Michael Malkin, Ramarathnam Venkatesan:
Comparison of Texts Streams in the Presence of Mild Adversaries.
179-186
- Gaye L. Middleton:
Copyright Conundrum Liability of ISPs for Online Copyright Infringement.
109-118
- Jason Reid, William J. Caelli:
DRM, Trusted Computing and Operating System Architecture.
127-136
- Chaw-Seng Woo, Jiang Du, Binh Pham:
Performance Factors Analysis of a Wavelet-based Watermarking Method.
89-97
- Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang:
A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract.
75-80
Copyright © Mon Mar 15 03:06:35 2010
by Michael Ley (ley@uni-trier.de)