A Theory of Predicate-Complete Test Coverage and Generation -- A Perspective on Component Refinement -- A Fully Abstract Semantics for UML Components -- From (Meta) Objects to Aspects: A Java and AspectJ Point of View -- MoMo: A Modal Logic for Reasoning About Mobility -- Probabilistic Linda-Based Coordination Languages -- Games with Secure Equilibria, -- Priced Timed Automata: Algorithms and A…
Keynote Addresses -- Data Confidentiality in Collaborative Computing -- Productivity in High Performance Computing -- A New Approach to Programming and Prototyping Parallel Systems -- The Changing Challenges of Collaborative Algorithmics -- Quantum Physics and the Nature of Computation -- Plenary Session - Best Papers -- Preemption Adaptivity in Time-Published Queue-Based Spin Locks -- Critical…
Grid Computing and Peer-to-Peer (P2P) Systems Workshop -- Spatial Analysis and GIS: Local or Global? Workshop -- Computer Graphics and Rendering Workshop -- Data Mining and Bioinformatics Workshop -- Parallel and Distribuited Computing Workshop -- Symbolic Computation, SC 2005 Workshop -- Specific Aspects of Computational Physics for Modeling Suddenly-Emerging Phenomena Workshop -- Internet Com…
Approaches or Methods of Security Engineering Workshop -- Information Security and Hiding (ISH 2005) Workshop -- Modeling of Location Management in Mobile Information Systems Workshop -- Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop -- Ubiquitous Web Systems and Intelligence Workshop -- Modelling Complex Systems Workshop.The four volume set assembled…
Keynote Speech -- Track 1: Network Protocols, Routing, Algorithms -- Track 2: Languages and Compilers for HPC -- Track 3: Parallel/Distributed System Architectures -- Track 4: Embedded Systems -- Track 5: Parallel/Distributed Algorithms -- Track 6: Wireless and Mobile Computing -- Track 7: Web Services and Internet Computing -- Track 8: Peer-to-Peer Computing -- Track 9: Grid and Cluster Comput…
Information and Communication Technology (ICT) Education Workshop -- Digital Device for Ubiquitous Computing Workshop -- Optimization: Theories and Applications (OTA) 2005 Workshop -- Tracks.The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore,…
Session 1: Mobility Management -- Impact of Link State Changes and Inaccurate Link State Information on Mobility Support and Resource Reservations -- Comparison of Signaling and Packet Forwarding Overhead for HMIP and MIFA -- Profile System for Management of Mobility Context Information for Access Network Selection and Transport Service Provision in 4G Networks -- Replic8: Location-Aware Data R…
Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Enc…
1: Large Scale Computations -- Large Scale Simulations -- Development and Integration of Parallel Multidisciplinary Computational Software for Modeling a Modern Manufacturing Process -- Automatically Tuned FFTs for BlueGene/L’s Double FPU -- A Survey of High-Quality Computational Libraries and Their Impact in Science and Engineering Applications -- A Performance Evaluation of the Cray X1 for …
to Application Logging -- Understanding Apache log4j -- Destination of Logging—The Appender Objects -- Formatting Logging Information in log4j -- Filtering, Error Handling, and Special Rendering of Log Messages -- Extending log4j to Create Custom Logging Components -- A Complete log4j Example -- log4j and J2EE -- Using the Apache Log Tag Library -- Best Practices and Looking Forward to 1.3.In…