Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 44 - ACSW Frontiers 2005

Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005

Australian Computer Science Communications, Vol. 27, No. 7

This volume contains all papers presented at the 2005 ACSW Workshops - Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Rajkumar Buyya, Paul Coddington, Paul Montague, Rei Safavi-Naini, Nicholas Sheppard and Andrew Wendelborn.

Published

January 2005.

ISBN-13

1-920682-26-0.

ISSN

1445-1336.

24 Papers, xvi+188 pages, softcover.

Order or Recommend this Volume.

BiBTeX file for Volume.

Complete Volume.

Click for larger view


Volume Citation

Buyya, R., Coddington, P., Montague, P., Safavi-Naini, R., Sheppard, N. and Wendelborn, A., Eds. (2005). ACSW Frontiers 2005. Proceedings of the Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005). CRPIT. 44. Newcastle, Australia, ACS.


Third Australasian Symposium on Grid Computing and e-Research (AusGrid 2005)

Papers Included in the Volume

Ahmed, M.U., Zaheer, R.A. and Qadir, M.A. (2005). Intelligent Cache Management for Data Grid. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 5-12. abstractpdfBibTeXEndNoteGS

Allan, J. (2005). UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 3. BibTeXEndNoteGS

Beeson, B., Melnikoff, S., Venugopal, S. and Barnes, D.G. (2005). A Portal for Grid-enabled Physics. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 13-20. abstractpdfBibTeXEndNoteGS

Berlich, R., Kunze, M. and Schwarz, K. (2005). Grid Computing in Europe: From Research to Deployment. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 21-27. abstractpdfBibTeXEndNoteGS

Hunter, A., Schibeci, D., Hiew, H.L. and Bellgard, M. (2005). Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 29-32. abstractpdfBibTeXEndNoteGS

Mason, R. and Kelly, W. (2005). G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 33-39. abstractpdfBibTeXEndNoteGS

Muthuvelu, N., Liu, J., Soe, N.L., Venugopal, S., Sulistio, A. and Buyya, R. (2005). A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 41-48. abstractpdfBibTeXEndNoteGS

Smillie, J., Allsman, R., Hungerford, S. and Ozolins, J. (2005). Integrating The MACHO Data-set with the Virtual Observatory. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 49-56. abstractpdfBibTeXEndNoteGS

Winton, L.J. (2005). A Simple Virtual Organisation Model and Practical Implementation. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 57-65. abstractpdfBibTeXEndNoteGS

Xiao, H., Wu, H., Chi, X., Deng, S. and Zhang, H. (2005). An Implementation of Interactive Jobs Submission for Grid Computing Portals. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 67-68. abstractpdfBibTeXEndNoteGS

Papers listed: 10


Third Australasian Information Security Workshop (AISW 2005)

Papers Included in the Volume

Atallah, M.J. (2005). A Survey of Watermarking Techniques for Non-Media Digital Objects. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 73. abstractpdfBibTeXEndNoteGS

Cooper, B. and Montague, P. (2005). Translation of Rights Expressions. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 137-144. abstractpdfBibTeXEndNoteGS

Du, J., Woo, C.-S. and Pham, B. (2005). Recovery of Watermark Using Differential Affine Motion Estimation. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 81-88. abstractpdfBibTeXEndNoteGS

Francis, L., Sirett, W.G., Mayes, K. and Markantonakis, K. (2005). Countermeasures for Attacks on Satellite TV Cards using Open Receivers. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 153-158. abstractpdfBibTeXEndNoteGS

Frattolillo, F. and D'Onofrio, S. (2005). Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 159-167. abstractpdfBibTeXEndNoteGS

Frikken, K., Atallah, M.J. and Bykova, M. (2005). Remote Revocation of Smart Cards in a Private DRM System. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 169-178. abstractpdfBibTeXEndNoteGS

Jackson, M. and Shah, A. (2005). The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 119-126. abstractpdfBibTeXEndNoteGS

Josang, A., Fabre, J., Hay, B., Dalziel, J. and Pope, S. (2005). Trust Requirements in Identity Management. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 99-108. abstractpdfBibTeXEndNoteGS

Kanzaki, Y., Igaki, H., Nakamura, M., Monden, A. and Matsumoto, K.-i. (2005). Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 145-151. abstractpdfBibTeXEndNoteGS

Malkin, M. and Venkatesan, R. (2005). Comparison of Texts Streams in the Presence of Mild Adversaries. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 179-186. abstractpdfBibTeXEndNoteGS

Middleton, G.L. (2005). Copyright Conundrum - Liability of ISPs for Online Copyright Infringement. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 109-118. abstractpdfBibTeXEndNoteGS

Reid, J.F. and Caelli, W.J. (2005). DRM, Trusted Computing and Operating System Architecture. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 127-136. abstractpdfBibTeXEndNoteGS

Woo, C.-S., Du, J. and Pham, B. (2005). Performance Factors Analysis of a Wavelet-based Watermarking Method. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 89-97. abstractpdfBibTeXEndNoteGS

Wu, X., Hu, J., Gu, Z. and Huang, J. (2005). A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 75-80. abstractpdfBibTeXEndNoteGS

Papers listed: 14

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 20 Mar 2007