


Остановите войну!
for scientists:


default search action
ACSW Frontiers 2006: Hobart, Tasmania, Australia
- Rajkumar Buyya, Tianchi Ma, Reihaneh Safavi-Naini, Chris Steketee, Willy Susilo:
The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006. CRPIT 54, Australian Computer Society 2006, ISBN 1-920-68236-8 - Laurent Lefèvre, Paul Roe:
Improving the flexibility of active grids through web services. 3-8 - A. B. M. Russel, Asad I. Khan:
Towards dynamic data grid framework for eResearch. 9-16 - Xiujun Gong, Kensuke Nakamura, Kei Yura, Nobuhiro Go:
Toward building grid applications in bioinformatics. 17-23 - Kris Bubendorfer:
Improving resource utilisation in market oriented grid management and scheduling. 25-31 - Jia Tang, Minjie Zhang:
An agent-based peer-to-peer grid computing architecture: convergence of grid and peer-to-peer computing. 33-39 - Leili Mohammad Khanli, Morteza Analoui:
Grid-JQA: grid Java based quality of service management by active database. 41-45 - Baden Hughes:
Building computational grids with apple's Xgrid middleware. 47-54 - Avinash Shankaranarayanan, Frank K. H. A. Dehne, Andrew Lewis:
A template based static coalition protocol: a3P viGrid. 55-62 - Kenneth A. Hawick, Heath A. James:
Simulating a computational grid with networked animat agents. 63-70 - Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
Redundant parallel data transfer schemes for the grid environment. 71-78 - Peter M. Kelly, Paul D. Coddington, Andrew L. Wendelborn:
A simplified approach to web service development. 79-88 - Jacob Zimmermann, George M. Mohay:
Distributed intrusion detection in clusters based on non-interference. 89-95 - Jinjun Chen, Yun Yang:
Key research issues in grid workflow verification and validation. 97-104 - Rüdiger Berlich, Markus Hardt, Marcel Kunze, Malcolm P. Atkinson, David Fergusson:
EGEE: building a pan-European grid training organisation. 105-111 - Udaya Kiran Tupakula, Vijay Varadharajan:
Analysis of traceback techniques. 115-124 - Jason Smith, Juan Manuel González Nieto, Colin Boyd:
Modelling denial of service attacks on JFK with Meadows's cost-based framework. 125-134 - David Duncombe, George M. Mohay, Andrew J. Clark:
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. 135-144 - Tamas Abraham:
Event sequence mining to develop profiles for computer forensic investigation purposes. 145-153 - Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering. 155-164 - Audun Jøsang, Dieter Gollmann, Richard Au:
A method for access authorisation through delegation networks. 165-174 - Michael Hilker, Christoph Schommer:
Description of bad-signatures for network intrusion detection. 175-182 - Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems. 183-192 - Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel Scanlan:
Catching spam before it arrives: domain specific dynamic blacklists. 193-202 - Jason E. Holt:
Logcrypt: forward security and public verification for secure audit logs. 203-211 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang, Joo Yeon Cho:
Formal analysis of card-based payment systems in mobile devices. 213-220 - Rupinder Gill, Jason Smith, Andrew J. Clark:
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. 221-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.