|
| | | |
Volume 44 - ACSW Frontiers 2005Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005Australian Computer Science Communications, Vol. 27, No. 7This volume contains all papers presented at the 2005 ACSW Workshops - Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.
Volume CitationBuyya, R., Coddington, P., Montague, P., Safavi-Naini, R., Sheppard, N. and Wendelborn, A., Eds. (2005). ACSW Frontiers 2005. Proceedings of the Third Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005). CRPIT. 44. Newcastle, Australia, ACS.
Third Australasian Symposium on Grid Computing and e-Research (AusGrid 2005)
Papers Included in the VolumeAhmed, M.U., Zaheer, R.A. and Qadir, M.A. (2005). Intelligent Cache Management for Data Grid. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 5-12. |     
| Allan, J. (2005). UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 3. |   
| Beeson, B., Melnikoff, S., Venugopal, S. and Barnes, D.G. (2005). A Portal for Grid-enabled Physics. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 13-20. |     
| Berlich, R., Kunze, M. and Schwarz, K. (2005). Grid Computing in Europe: From Research to Deployment. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 21-27. |     
| Hunter, A., Schibeci, D., Hiew, H.L. and Bellgard, M. (2005). Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 29-32. |     
| Mason, R. and Kelly, W. (2005). G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 33-39. |     
| Muthuvelu, N., Liu, J., Soe, N.L., Venugopal, S., Sulistio, A. and Buyya, R. (2005). A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 41-48. |     
| Smillie, J., Allsman, R., Hungerford, S. and Ozolins, J. (2005). Integrating The MACHO Data-set with the Virtual Observatory. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 49-56. |     
| Winton, L.J. (2005). A Simple Virtual Organisation Model and Practical Implementation. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 57-65. |     
| Xiao, H., Wu, H., Chi, X., Deng, S. and Zhang, H. (2005). An Implementation of Interactive Jobs Submission for Grid Computing Portals. In Proc. Australasian Workshop on Grid Computing and e-Research (AusGrid 2005), Newcastle, Australia. CRPIT, 44. Buyya, R., Coddington, P. and Wendelborn, A., Eds., ACS. 67-68. |     
|
Papers listed: 10
Third Australasian Information Security Workshop (AISW 2005)
Papers Included in the VolumeAtallah, M.J. (2005). A Survey of Watermarking Techniques for Non-Media Digital Objects. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 73. |     
| Cooper, B. and Montague, P. (2005). Translation of Rights Expressions. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 137-144. |     
| Du, J., Woo, C.-S. and Pham, B. (2005). Recovery of Watermark Using Differential Affine Motion Estimation. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 81-88. |     
| Francis, L., Sirett, W.G., Mayes, K. and Markantonakis, K. (2005). Countermeasures for Attacks on Satellite TV Cards using Open Receivers. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 153-158. |     
| Frattolillo, F. and D'Onofrio, S. (2005). Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 159-167. |     
| Frikken, K., Atallah, M.J. and Bykova, M. (2005). Remote Revocation of Smart Cards in a Private DRM System. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 169-178. |     
| Jackson, M. and Shah, A. (2005). The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 119-126. |     
| Josang, A., Fabre, J., Hay, B., Dalziel, J. and Pope, S. (2005). Trust Requirements in Identity Management. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 99-108. |     
| Kanzaki, Y., Igaki, H., Nakamura, M., Monden, A. and Matsumoto, K.-i. (2005). Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 145-151. |     
| Malkin, M. and Venkatesan, R. (2005). Comparison of Texts Streams in the Presence of Mild Adversaries. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 179-186. |     
| Middleton, G.L. (2005). Copyright Conundrum - Liability of ISPs for Online Copyright Infringement. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 109-118. |     
| Reid, J.F. and Caelli, W.J. (2005). DRM, Trusted Computing and Operating System Architecture. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 127-136. |     
| Woo, C.-S., Du, J. and Pham, B. (2005). Performance Factors Analysis of a Wavelet-based Watermarking Method. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 89-97. |     
| Wu, X., Hu, J., Gu, Z. and Huang, J. (2005). A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters. In Proc. Third Australasian Information Security Workshop (AISW 2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R., Montague, P. and Sheppard, N., Eds., ACS. 75-80. |     
|
Papers listed: 14
|