Abstract is missing.
- Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-ResearchIan M. Atkinson, Douglas du Boulay, Clinton Chee, Kenneth Chiu, Paul D. Coddington, Andrea Gerson, Tristan King, Donald F. McMullen, Romain Quilici, Peter Turner, Andrew L. Wendelborn, Mathew J. Wyatt, Donglai Zhang. 3-10 [doi]
- A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular SystemSherman Cheung, Xingchen Chu, Shengjin Xu, Rajkumar Buyya, Jiyuan Tu. 11-17 [doi]
- Service Oriented Grid Architecture for Geosciences CommunityR. Fraser, T. Rankine, R. Woodcock. 19-23 [doi]
- Securing Grid Data Using Mandatory Access ControlsMatthew Henricksen, William Caelli, Peter R. Croll. 25-32 [doi]
- Communication Network Analysis of the Enterprise Grid SystemsBahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari. 33-40 [doi]
- DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational GridsVerdi March, Yong Meng Teo, Xianbing Wang. 41-48 [doi]
- Autonomic System Management in Mobile Grid EnvironmentsMichael Messig, Andrzej Goscinski. 49-58 [doi]
- The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier ReefTrina S. Myers, Ian M. Atkinson, William J. Lavery. 59-67 [doi]
- Storage and Data Management in EGEEGraeme A. Stewart, David G. Cameron, Greig A. Cowan, Gavin McCance. 69-77 [doi]
- YourSRB: A cross platform interface for SRB and Digital LibrariesMathew J. Wyatt, Nigel G. D. Sim, Dianna L. Hardy, Ian M. Atkinson. 79-85 [doi]
- Security of Statistical Databases: Overview and Future DirectionsMirka Miller. 115-115 [doi]
- Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance MetricGregory V. Bard. 117-124 [doi]
- A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based ServicesOliver Jorns, Gerald Quirchmayr, Oliver Jung. 133-142 [doi]
- Usability and Privacy in Identity Management ArchitecturesAudun Jøsang, Mohammed Al Zomai, Suriadi Suriadi. 143-152 [doi]
- Isogeny cordillera algorithm to obtain cryptographically good elliptic curvesJosep M. Miret, D. Sadornil, J. Tena, R. Tomas, Magda Valls. 153-157 [doi]
- A Range Test Secure in the Active Adversary ModelKun Peng, Ed Dawson. 159-162 [doi]
- The motivation and proposition of a privacy-enhancing architecture for operational databasesKirsten Wahlstrom, Gerald Quirchmayr. 173-182 [doi]
- Design Principles for Low Latency Anonymous Network Systems Secure against Timing AttacksRungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini. 183-191 [doi]
- Controlling Inference: Avoiding P-level Reduction during AnalysisAdepele Williams, Ken Barker. 193-200 [doi]
- Take Heart II: A Modular Bayesian Decision Support SystemKevin B. Korb, Ann E. Nicholson, Lucas R. Hope. 203-203 [doi]
- An Interactive Knowledge-based Learning Environment for Transferring Health KnowledgeJohn Yearwood. 207-207 [doi]
- Hospital Management Knowledge Discovery using Discrete Event SimulationChristopher A. Bain, Gitesh K. Raikundalia, Snehal Mehta. 209-218 [doi]
- An Automated System for Conversion of Clinical Notes into SNOMED Clinical TerminologyJon Patrick, Yefeng Wang, Peter Budd. 219-226 [doi]
- A Data Warehouse Architecture for Clinical Data WarehousingTony R. Sahama, Peter R. Croll. 227-232 [doi]
- Determining Pattern Element Contribution in Medical DatasetsAnna Shillabeer, Darius Pfitzner. 233-240 [doi]
- Extracting Semantics in a Clinical ScenarioYitao Zhang, Jon Patrick. 241-247 [doi]