The SCEAS System
Navigation Menu

Conferences in DBLP

ACSW Frontiers (acsw)
2005 (conf/acsw/2005)

  1. J. Allan
    UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:3- [Conf]
  2. Mobin Uddin Ahmed, Raja Asad Zaheer, Muhammad Abdul Qadir
    Intellig Intelligent Cache M ent Management for nagement Data Grid. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:5-12 [Conf]
  3. Brett Beeson, Steve Melniko, Srikumar Venugopal, David G. Barnes
    A Portal for Grid-enabled Physics. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:13-20 [Conf]
  4. Rüdiger Berlich, Marcel Kunze, Kilian Schwarz
    Grid Computing in Europe: From Research to Deployment. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:21-27 [Conf]
  5. Adam Hunter, David Schibeci, Hong Liang Hiew, Matthew I. Bellgard
    Grendel: A bioinformatics Web Service-based architecture for accessing HPC resources. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:29-32 [Conf]
  6. Richard Mason, Wayne Kelly
    G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:33-39 [Conf]
  7. Nithiapidary Muthuvelu, Junyang Liu, Nay Lin Soe, Srikumar Venugopal, Anthony Sulistio, Rajkumar Buyya
    A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:41-48 [Conf]
  8. Jonathan Smillie, Roberta Allsman, Stuart Hungerford, Jason Ozolins
    Integrating The MACHO Dataset with the Virtual Observatory. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:49-56 [Conf]
  9. Lyle J. Winton
    A Simple Virtual Organisation Model and Practical Implementation. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:57-65 [Conf]
  10. Haili Xiao, Hong Wu, Xuebin Chi, Sungen Deng, Honghai Zhang
    An Implementation of Interactive Jobs Submission for Grid Computing Portals. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:67-68 [Conf]
  11. Mikhail J. Atallah
    A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:73- [Conf]
  12. Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang
    A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:75-80 [Conf]
  13. Jiang Du, Chaw-Seng Woo, Binh Pham
    Recovery of Watermark Using Differential Affine Motion Estimation. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:81-88 [Conf]
  14. Chaw-Seng Woo, Jiang Du, Binh Pham
    Performance Factors Analysis of a Wavelet-based Watermarking Method. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:89-97 [Conf]
  15. Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope
    Trust Requirements in Identity Management. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:99-108 [Conf]
  16. Gaye L. Middleton
    Copyright Conundrum Liability of ISPs for Online Copyright Infringement. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:109-118 [Conf]
  17. Margaret Jackson, Ashish Shah
    The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:119-126 [Conf]
  18. Jason Reid, William J. Caelli
    DRM, Trusted Computing and Operating System Architecture. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:127-136 [Conf]
  19. Brenton Cooper, Paul Montague
    Translation of Rights Expressions. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:137-144 [Conf]
  20. Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden
    Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:145-151 [Conf]
  21. Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis
    Countermeasures for Attacks on Satellite TV Cards using Open Receivers. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:153-158 [Conf]
  22. Franco Frattolillo, Salvatore D'Onofrio
    Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:159-167 [Conf]
  23. Keith B. Frikken, Mikhail J. Atallah, Marina Bykova
    Remote Revocation of Smart Cards in a Private DRM System. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:169-178 [Conf]
  24. Michael Malkin, Ramarathnam Venkatesan
    Comparison of Texts Streams in the Presence of Mild Adversaries. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:179-186 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002