ACSW Frontiers 2005: Newcastle, NSW, Australia
Rajkumar Buyya, Paul D. Coddington, Paul Montague, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Andrew L. Wendelborn (Eds.): ACSW Frontiers 2005, 2005 ACSW Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop (AISW 2005), Newcastle, NSW, Australia, January/February 2005. Australian Computer Society 2005 CRPIT 44 ISBN 1-920682-26-0
Australasian Workshop on Grid Computing and e-Research
Mobin Uddin Ahmed, Raja Asad Zaheer, Muhammad Abdul Qadir: Intellig Intelligent Cache M ent Management for nagement Data Grid. 5-12
J. Allan: UK e-Science Pilot Project DAME: Context, Lessons Learned and Future. 3
Brett Beeson, Steve Melniko, Srikumar Venugopal, David G. Barnes: A Portal for Grid-enabled Physics. 13-20
Rüdiger Berlich, Marcel Kunze, Kilian Schwarz: Grid Computing in Europe: From Research to Deployment. 21-27
Adam Hunter, David Schibeci, Hong Liang Hiew, Matthew I. Bellgard: Grendel: A bioinformatics Web Service-based architecture for accessing HPC resources. 29-32
Richard Mason, Wayne Kelly: G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework. 33-39
Nithiapidary Muthuvelu, Junyang Liu, Nay Lin Soe, Srikumar Venugopal, Anthony Sulistio, Rajkumar Buyya: A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids. 41-48
Jonathan Smillie, Roberta Allsman, Stuart Hungerford, Jason Ozolins: Integrating The MACHO Dataset with the Virtual Observatory. 49-56
Lyle J. Winton: A Simple Virtual Organisation Model and Practical Implementation. 57-65
Haili Xiao, Hong Wu, Xuebin Chi, Sungen Deng, Honghai Zhang: An Implementation of Interactive Jobs Submission for Grid Computing Portals. 67-68
Third Australasian Information Security Workshop
Mikhail J. Atallah: A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk). 73
Jiang Du, Chaw-Seng Woo, Binh Pham: Recovery of Watermark Using Differential Affine Motion Estimation. 81-88
Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis: Countermeasures for Attacks on Satellite TV Cards using Open Receivers. 153-158
Franco Frattolillo, Salvatore D'Onofrio: Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform. 159-167
Keith B. Frikken, Mikhail J. Atallah, Marina Bykova: Remote Revocation of Smart Cards in a Private DRM System. 169-178
Margaret Jackson, Ashish Shah: The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights. 119-126
Audun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope: Trust Requirements in Identity Management. 99-108
Yuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden: Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process. 145-151
Michael Malkin, Ramarathnam Venkatesan: Comparison of Texts Streams in the Presence of Mild Adversaries. 179-186
Gaye L. Middleton: Copyright Conundrum Liability of ISPs for Online Copyright Infringement. 109-118
Chaw-Seng Woo, Jiang Du, Binh Pham: Performance Factors Analysis of a Wavelet-based Watermarking Method. 89-97
Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang: A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. 75-80



