Approaches or Methods of Security Engineering Workshop -- Information Security and Hiding (ISH 2005) Workshop -- Modeling of Location Management in Mobile Information Systems Workshop -- Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop -- Ubiquitous Web Systems and Intelligence Workshop -- Modelling Complex Systems Workshop.The four volume set assembled…
Keynote Speech -- Track 1: Network Protocols, Routing, Algorithms -- Track 2: Languages and Compilers for HPC -- Track 3: Parallel/Distributed System Architectures -- Track 4: Embedded Systems -- Track 5: Parallel/Distributed Algorithms -- Track 6: Wireless and Mobile Computing -- Track 7: Web Services and Internet Computing -- Track 8: Peer-to-Peer Computing -- Track 9: Grid and Cluster Comput…
Information and Communication Technology (ICT) Education Workshop -- Digital Device for Ubiquitous Computing Workshop -- Optimization: Theories and Applications (OTA) 2005 Workshop -- Tracks.The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore,…
Comparing Parallelization of an ACO: Message Passing vs. Shared Memory -- An LP-Based Hybrid Heuristic Procedure for the Generalized Assignment Problem with Special Ordered Sets -- Parametrized Greedy Heuristics in Theory and Practice -- A Taxonomy of Cooperative Search Algorithms -- A Hybrid Genetic and Variable Neighborhood Descent for Probabilistic SAT Problem -- A Hybrid Meta-heuristic Appr…
Invited Talks -- Topic 1 – Support Tools and Environments -- Topic 2 – Performance Prediction and Evaluation -- Topic 3 – Scheduling and Load-Balancing -- Topic 4 – Compilers for High Performance -- Topic 5 – Parallel and Distributed Databases, Data Mining and Knowledge Discovery -- Topic 6 – Grid and Cluster Computing: Models, Middleware and Architectures -- Topic 7 – Parallel Co…
Invited Lectures -- Hypertree Decompositions: Structure, Algorithms, and Applications -- Combinatorial Search on Graphs Motivated by Bioinformatics Applications: A Brief Survey -- Regular Papers -- Domination Search on Graphs with Low Dominating-Target-Number -- Fully Dynamic Algorithm for Recognition and Modular Decomposition of Permutation Graphs -- Approximating Rank-Width and Clique-Width Q…
Mathematical Modelling of Instability Phenomena -- Phenomenological Modelling of Instability -- Modelling Buckling Interaction -- Computational asymptotic post-buckling analysis of slender elastic structures -- Mechanical Models for the Subclasses of Catastrophes.The study of structural instability plays a role of primary importance in the field of applied mechanics. Despite the remarkable prog…
Numerical investigation of the frequency influence on soil characteristics during vibratory driving of tubular piles -- Critical state theory for sand with fines: A DEM perspective -- Modelling the liquefaction behaviour of Sydney sand and the link between static and cyclic instability -- Numerical stability analysis of the abutment dam slopes using the key group -- An Enhanced Solution For The…