Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1082290dlproceedingsBook PagePublication Pagesaus-cswConference Proceedingsconference-collections
ACSW Frontiers '05: Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
2005 Proceeding
Publisher:
  • Australian Computer Society, Inc.
  • P.O. Box 319 Darlinghurst, NSW 2010
  • Australia
Conference:
ACSW Frontiers '05: Grid computing and e-research Newcastle New South Wales Australia 1 January 2005
ISBN:
978-1-920682-26-2
Published:
01 January 2005

Reflects downloads up to 17 Oct 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
UK e-Science pilot project DAME: context, lessons learned & future
Page 3

In November 2000 funding of 213M was made available for a new UK e-Science programme, with allocations to programmes within each of the UKs Research Councils. Also a Core e-Science Programme was formed as a cross-Council activity to develop and broker ...

Article
Free
Intelligent cache management for data grid
Pages 5–12

Data grid is a composition of different services for accessing and manipulating data in a distributed environment. One of the major problems is high access time of remote queries in the data grid. In this paper we present a scheme for data cache ...

Article
Free
A portal for grid-enabled physics
Pages 13–20

This paper presents the motivation for development and implementation of a computational portal for the processing of astrophysical and high energy physics data on global Grids. The requirements for the portal, its design, and choices leading to the ...

Article
Free
Grid computing in Europe: from research to deployment
Pages 21–27

Grid Computing has, over the past few years, matured sufficiently to make it a viable solution for real-world problems. However, there are many different toolkits today that allow to build a Grid environment. And while this wealth of different solutions ...

Article
Free
Grendel: a bioinformatics web service-based architecture for accessing HPC resources
Pages 29–32

Bioinformatics is an important application area for grid computing. Bioinformatics applications exported over a grid have the potential to facilitate transparent access to high performance computing (HPC) resources to a range of stakeholders. These ...

Article
Free
G2-P2P: a fully decentralised fault-tolerant cycle-stealing framework
Pages 33–39

Existing cycle-stealing frameworks are generally based on simple client-server or hierarchical style architectures. G2:P2P moves cycle-stealing into the "pure" peer-to-peer (P2P), or fully decentralised arena, removing the bottleneck and single point of ...

Article
Free
A dynamic job grouping-based scheduling for deploying applications with fine-grained tasks on global grids
Pages 41–48

Although Grids have been used extensively for executing applications with compute-intensive jobs, there exist several applications with a large number of lightweight jobs. The overall processing undertaking of these applications involves high overhead ...

Article
Free
Integrating the MACHO data-set with the virtual observatory
Pages 49–56

A Virtual Observatory (VO) provides enhanced distributed access to online astronomical data-sets, and frequently incorporates data processing and visualisation facilities. Almost all critical aspects of data-grid research and technology are encountered ...

Article
Free
A simple virtual organisation model and practical implementation
Pages 57–65

The development of Grid middleware, such as the Globus Toolkit version 2, reached a level of maturity and stability in which it was possible to create widely distributed resource Grids. Within the last few years various experiences have arisen from the ...

Article
Free
An implementation of interactive jobs submission for grid computing portals
Pages 67–70

The Globus Toolkit has been widely used as middleware in Grid computing environments. Java CoG, Web Service and Portlet help to build Grid computing portals easily and productively. Many Grid Portals can provide a customizable interface allowing ...

Article
Free
A survey of watermarking techniques for non-media digital objects (invited talk)
Page 73

The vast majority of the literature on watermarking has dealt with media such as images, video, and audio - all of which are ultimately destined for consumption by the human perceptual system. There has recently been growing interest in watermarking non-...

Article
Free
A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
Pages 75–80

Semi-fragile watermark fragile to malicious modifications while robust to incidental manipulations is drawing many attentions in image authentication. However, watermark security has not received enough attention yet. Lifting scheme can construct second ...

Article
Free
Recovery of watermark using differential affine motion estimation
Pages 81–88

Digital watermarking techniques have been proposed to protect the copyright of multimedia data. Robustness against geometric distortion is one of the most important issues to be solved to increase the robustness of digital image watermarking systems. ...

Article
Free
Performance factors analysis of a wavelet-based watermarking method
Pages 89–97

The essential performance metrics of a robust watermark include robustness, imperceptibility, watermark capacity and security. In addition, computational cost is important for practicality. Wavelet-based image watermarking methods exploit the frequency ...

Article
Free
Trust requirements in identity management
Pages 99–108

Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. ...

Article
Free
Copyright conundrum: liability of ISPs for online copyright infringement
Pages 109–118

As digital rights holders become increasingly proactive in asserting their rights against infringers, Internet service providers ("ISPs") are more frequently becoming embroiled in online copyright infringement disputes. ISPs have, in turn, become ...

Article
Free
The impact of DRMs on personal use expectations and fair dealing rights
Pages 119–126

This study undertakes a review of fair dealing provisions in Australian copyright law and compares our fair dealing rights with the fair use rights under American law. It examines the impact of eight DRM systems providing music and films online on users' ...

Article
Free
DRM, trusted computing and operating system architecture
Pages 127–136

Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of decrypted digital content and the license enforcement mechanisms themselves is possible. This is difficult to achieve on an ...

Article
Free
Translation of rights expressions
Pages 137–144

Digital Rights Management (DRM) is concerned with the controlled distribution and usage of digital works in order to prevent unauthorized usage of digital content. A significant component of a DRM system is a well-defined language for expressing the ...

Article
Free
Characterizing dynamics of information leakage in security-sensitive software process
Pages 145–151

Minimizing information leakage is a crucial problem in DRM software development processes, where security information (e.g., device keys and S-BOX of CPRM systems) must be rigorously managed.This paper presents a method to evaluate the risk of ...

Article
Free
Countermeasures for attacks on satellite TV cards using open receivers
Pages 153–158

Digital content providers seek to restrict usage by implementing conditional access. One such scenario is the security aspects of digital video broadcast (DVB-S). There has been a history of attacks on this technology to circumvent any security measures ...

Article
Free
Applying web oriented technologies to implement an adaptive spread spectrum watermarking procedure and a flexible DRM platform
Pages 159–167

The advances in multimedia technologies have created opportunities for Internet pirates, who can copy multimedia documents and illegally distribute them, thus violating the legal rights of document owners or web content providers. Such a situation is an ...

Article
Free
Remote revocation of smart cards in a private DRM system
Pages 169–177

We describe a DRM smartcard-based scheme in which content access requests are not linked to a user's identity or smartcard, and in which compromised cards can be revoked without the need to communicate with any card (whether revoked or not). The scheme ...

Article
Free
Comparison of texts streams in the presence of mild adversaries
Pages 179–186

Text sifting is a method of quickly and securely identifying documents for database searching, copy detection, duplicate email detection and plagiarism detection. A small amount of text is extracted from a document using hash functions and is used as the ...

Contributors
  • University of Melbourne
  • The University of Adelaide
  • Motorola Australia
  • University of Calgary
  • Queensland University of Technology
  • The University of Adelaide
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 204 of 424 submissions, 48%
YearSubmittedAcceptedRate
ACSW '18964951%
ACSW '171567850%
ACSW '161727745%
Overall42420448%