Modeling User Runtime Estimates -- Workload Analysis of a Cluster in a Grid Environment -- ScoPred–Scalable User-Directed Performance Prediction Using Complexity Modeling and Historical Data -- Open Job Management Architecture for the Blue Gene/L Supercomputer -- AnthillSched: A Scheduling Strategy for Irregular and Iterative I/O-Intensive Parallel Jobs -- An Extended Evaluation of Two-Phase …
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
Invited Talks -- Digital Fountains and Their Application to Informed Content Delivery over Adaptive Overlay Networks -- Securing the Net: Challenges, Failures and Directions -- Regular Papers -- Coterie Availability in Sites -- Keeping Denial-of-Service Attackers in the Dark -- On Conspiracies and Hyperfairness in Distributed Computing -- On the Availability of Non-strict Quorum Systems -- Musi…
Workshop Proceedings -- Aggregating Correlated Data in Sensor Networks -- The Efficiency of Optimal Taxes -- Congestion Games, Load Balancing, and Price of Anarchy -- Bandwidth Allocation in Networks: A Single Dual Update Subroutine for Multiple Objectives -- Limits and Power Laws of Models for the Web Graph and Other Networked Information Spaces -- Cuts and Disjoint Paths in the Valley-Free Pa…
Setting the Stage for Structured Populations -- Island Models -- Island Models: Empirical Properties -- Lattice Cellular Models -- Lattice Cellular Models: Empirical Properties -- Random and Irregular Cellular Populations -- Coevolutionary Structured Models -- Some Nonconventional Models.Evolutionary algorithms (EAs) is now a mature problem-solving family of heuristics that has found its way in…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Systems of Containers and Enumeration Problems -- Some Heuristic Analysis of Local Search Algorithms for SAT Problems -- Clustering in Stochastic Asynchronous Algorithms for Distributed Simulations -- On Construction of the Set of Irreducible Partial Covers -- Recent Advances in Multiobjective Optimization -- Polynomial Time Checking for Generation of Finite Distributions of Rational Probabilit…
Life Science Grid -- Gene Trek in Procaryote Space Powered by a GRID Environment -- An Integrated System for Distributed Bioinformatics Environment on Grids -- Distributed Cell Biology Simulations with E-Cell System -- The Architectural Design of High-Throughput BLAST Services on OBIGrid -- Heterogeneous Database Federation Using Grid Technology for Drug Discovery Process -- Grid Portal Interfa…
Invited Papers -- Automata-Theoretic Techniques for Analyzing Infinite-State Systems -- Enumerating Regular Expressions and Their Languages -- Contributed Papers -- A General Weighted Grammar Library -- On the Complexity of Hopcroft’s State Minimization Algorithm -- Implementation of Catalytic P Systems -- Code Selection by Tree Series Transducers -- Some Non-semi-decidability Problems for Li…
Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…