Abstract is missing.
- UK e-Science Pilot Project DAME: Context, Lessons Learned and FutureJ. Allan. 3
- Intellig Intelligent Cache M ent Management for nagement Data GridMobin Uddin Ahmed, Raja Asad Zaheer, Muhammad Abdul Qadir. 5-12 [doi]
- A Portal for Grid-enabled PhysicsBrett Beeson, Steve Melniko, Srikumar Venugopal, David G. Barnes. 13-20 [doi]
- Grid Computing in Europe: From Research to DeploymentRüdiger Berlich, Marcel Kunze, Kilian Schwarz. 21-27 [doi]
- Grendel: A bioinformatics Web Service-based architecture for accessing HPC resourcesAdam Hunter, David Schibeci, Hong Liang Hiew, Matthew I. Bellgard. 29-32 [doi]
- G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing FrameworkRichard Mason, Wayne Kelly. 33-39 [doi]
- A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global GridsNithiapidary Muthuvelu, Junyang Liu, Nay Lin Soe, Srikumar Venugopal, Anthony Sulistio, Rajkumar Buyya. 41-48 [doi]
- Integrating The MACHO Dataset with the Virtual ObservatoryJonathan Smillie, Roberta Allsman, Stuart Hungerford, Jason Ozolins. 49-56 [doi]
- A Simple Virtual Organisation Model and Practical ImplementationLyle J. Winton. 57-65 [doi]
- An Implementation of Interactive Jobs Submission for Grid Computing PortalsHaili Xiao, Hong Wu, Xuebin Chi, Sungen Deng, Honghai Zhang. 67-68 [doi]
- A Survey of Watermarking Techniques for Non-Media Digital Objects (Invited Talk)Mikhail J. Atallah. 73 [doi]
- A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters AbstractXiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang. 75-80 [doi]
- Recovery of Watermark Using Differential Affine Motion EstimationJiang Du, Chaw-Seng Woo, Binh Pham. 81-88 [doi]
- Performance Factors Analysis of a Wavelet-based Watermarking MethodChaw-Seng Woo, Jiang Du, Binh Pham. 89-97 [doi]
- Trust Requirements in Identity ManagementAudun Jøsang, John Fabre, Brian Hay, James Dalziel, Simon Pope. 99-108 [doi]
- Copyright Conundrum Liability of ISPs for Online Copyright InfringementGaye L. Middleton. 109-118 [doi]
- The Impact of DRMs on Personal Use Expectations and Fair Dealing RightsMargaret Jackson, Ashish Shah. 119-126 [doi]
- DRM, Trusted Computing and Operating System ArchitectureJason Reid, William J. Caelli. 127-136 [doi]
- Translation of Rights ExpressionsBrenton Cooper, Paul Montague. 137-144 [doi]
- Characterizing Dynamics of Information Leakage in Security-Sensitive Software ProcessYuichiro Kanzaki, Hiroshi Igaki, Masahide Nakamura, Akito Monden. 145-151 [doi]
- Countermeasures for Attacks on Satellite TV Cards using Open ReceiversLishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis. 153-158 [doi]
- Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM PlatformFranco Frattolillo, Salvatore D Onofrio. 159-167 [doi]
- Remote Revocation of Smart Cards in a Private DRM SystemKeith B. Frikken, Mikhail J. Atallah, Marina Bykova. 169-178 [doi]
- Comparison of Texts Streams in the Presence of Mild AdversariesMichael Malkin, Ramarathnam Venkatesan. 179-186 [doi]