Conferences in DBLP
J. Allan UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:3- [Conf ] Mobin Uddin Ahmed , Raja Asad Zaheer , Muhammad Abdul Qadir Intellig Intelligent Cache M ent Management for nagement Data Grid. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:5-12 [Conf ] Brett Beeson , Steve Melniko , Srikumar Venugopal , David G. Barnes A Portal for Grid-enabled Physics. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:13-20 [Conf ] Rüdiger Berlich , Marcel Kunze , Kilian Schwarz Grid Computing in Europe: From Research to Deployment. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:21-27 [Conf ] Adam Hunter , David Schibeci , Hong Liang Hiew , Matthew I. Bellgard Grendel: A bioinformatics Web Service-based architecture for accessing HPC resources. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:29-32 [Conf ] Richard Mason , Wayne Kelly G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:33-39 [Conf ] Nithiapidary Muthuvelu , Junyang Liu , Nay Lin Soe , Srikumar Venugopal , Anthony Sulistio , Rajkumar Buyya A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:41-48 [Conf ] Jonathan Smillie , Roberta Allsman , Stuart Hungerford , Jason Ozolins Integrating The MACHO Dataset with the Virtual Observatory. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:49-56 [Conf ] Lyle J. Winton A Simple Virtual Organisation Model and Practical Implementation. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:57-65 [Conf ] Haili Xiao , Hong Wu , Xuebin Chi , Sungen Deng , Honghai Zhang An Implementation of Interactive Jobs Submission for Grid Computing Portals. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:67-68 [Conf ] Mikhail J. Atallah A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:73- [Conf ] Xiaoyun Wu , Junquan Hu , Zhixiong Gu , Jiwu Huang A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:75-80 [Conf ] Jiang Du , Chaw-Seng Woo , Binh Pham Recovery of Watermark Using Differential Affine Motion Estimation. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:81-88 [Conf ] Chaw-Seng Woo , Jiang Du , Binh Pham Performance Factors Analysis of a Wavelet-based Watermarking Method. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:89-97 [Conf ] Audun Jøsang , John Fabre , Brian Hay , James Dalziel , Simon Pope Trust Requirements in Identity Management. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:99-108 [Conf ] Gaye L. Middleton Copyright Conundrum Liability of ISPs for Online Copyright Infringement. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:109-118 [Conf ] Margaret Jackson , Ashish Shah The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:119-126 [Conf ] Jason Reid , William J. Caelli DRM, Trusted Computing and Operating System Architecture. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:127-136 [Conf ] Brenton Cooper , Paul Montague Translation of Rights Expressions. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:137-144 [Conf ] Yuichiro Kanzaki , Hiroshi Igaki , Masahide Nakamura , Akito Monden Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:145-151 [Conf ] Lishoy Francis , William G. Sirett , Keith Mayes , Constantinos Markantonakis Countermeasures for Attacks on Satellite TV Cards using Open Receivers. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:153-158 [Conf ] Franco Frattolillo , Salvatore D'Onofrio Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:159-167 [Conf ] Keith B. Frikken , Mikhail J. Atallah , Marina Bykova Remote Revocation of Smart Cards in a Private DRM System. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:169-178 [Conf ] Michael Malkin , Ramarathnam Venkatesan Comparison of Texts Streams in the Presence of Mild Adversaries. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2005, pp:179-186 [Conf ]