default search action
ACSW Frontiers 2005: Newcastle, NSW, Australia
- Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn:
ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 44, Australian Computer Society 2005, ISBN 1-920682-26-0
Australasian Workshop on Grid Computing and e-Research
- Mobin Uddin Ahmed, Raja Asad Zaheer, Muhammad Abdul Qadir:
Intellig Intelligent Cache M ent Management for nagement Data Grid. 5-12 - J. Allan:
UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. ACSW 2005: 3 - Brett Beeson, Steve Melniko, Srikumar Venugopal, David G. Barnes:
A Portal for Grid-enabled Physics. 13-20 - Rüdiger Berlich, Marcel Kunze, Kilian Schwarz:
Grid Computing in Europe: From Research to Deployment. 21-27 - Adam Hunter, David Schibeci, Hong Liang Hiew, Matthew I. Bellgard:
Grendel: A bioinformatics Web Service-based architecture for accessing HPC resources. 29-32 - Richard Mason, Wayne Kelly:
G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. 33-39 - Nithiapidary Muthuvelu, Junyang Liu, Nay Lin Soe, Srikumar Venugopal, Anthony Sulistio, Rajkumar Buyya:
A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. 41-48 - Jonathan Smillie, Roberta Allsman, Stuart Hungerford, Jason Ozolins:
Integrating The MACHO Dataset with the Virtual Observatory. 49-56 - Lyle J. Winton:
A Simple Virtual Organisation Model and Practical Implementation. 57-65 - Haili Xiao, Hong Wu, Xuebin Chi, Sungen Deng, Honghai Zhang:
An Implementation of Interactive Jobs Submission for Grid Computing Portals. 67-68
Third Australasian Information Security Workshop
- Mikhail J. Atallah:
A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). 73 - Brenton Cooper, Paul Montague:
Translation of Rights Expressions. 137-144 - Jiang Du, Chaw-Seng Woo, Binh Pham:
Recovery of Watermark Using Differential Affine Motion Estimation. 81-88 - Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis:
Countermeasures for Attacks on Satellite TV Cards using Open Receivers. 153-158 - Franco Frattolillo, Salvatore D'Onofrio:
Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. 159-167 - Keith B. Frikken, Mikhail J. Atallah, Marina Bykova:
Remote Revocation of Smart Cards in a Private DRM System. 169-178 - Margaret Jackson, Ashish Shah:
The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. 119-126 - Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope:
Trust Requirements in Identity Management. 99-108 - Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden:
Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. 145-151 - Michael Malkin, Ramarathnam Venkatesan:
Comparison of Texts Streams in the Presence of Mild Adversaries. 179-186 - Gaye L. Middleton:
Copyright Conundrum Liability of ISPs for Online Copyright Infringement. 109-118 - Jason Reid, William J. Caelli:
DRM, Trusted Computing and Operating System Architecture. 127-136 - Chaw-Seng Woo, Jiang Du, Binh Pham:
Performance Factors Analysis of a Wavelet-based Watermarking Method. 89-97 - Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang:
A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. 75-80
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.