Concurrency and parallelism, programming, networking, and security : Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, proceedings
Author(s)
Bibliographic Information
Concurrency and parallelism, programming, networking, and security : Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, proceedings
(Lecture notes in computer science, 1179)
Springer, c1996
Available at 52 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
-
Library, Research Institute for Mathematical Sciences, Kyoto University数研
L/N||LNCS||117996057084
Note
Includes bibliographical references and index
Description and Table of Contents
Description
This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.
Table of Contents
Randomized parallel list ranking for distributed memory multiprocesors.- Suffix arrays for multiple strings: A method for on-line multiple string searches.- Relations among parallel and sequential computation models.- The expressive power of "possible-is-certain" semantics.- Using stochastic methods to guide search in CLP: A preliminary report.- Backtrackable state with linear affine implication and Assumption Grammars.- Declarative debugging in constraint logic programming.- An improved logging and checkpointing scheme for recoverable distributed shared memory.- Distributed concurrency control in real-time cooperative editing systems.- Variable timestamp-based distributed deadlock detection and resolution.- Lambda-definable term rewriting systems.- Sets as anti-chains.- A typed Lambda Calculus of Objects.- Intensionality versus extensionality and Primitive Recursion.- On the bounded theories of finite trees.- Broadcasting in star graphs with Byzantine failures.- Blind threshold signatures based on discrete logarithm.- Computation of the k-error linear complexity of binary sequences with period 2n.- Symbolic rights and vouchers for access control in distributed object systems.- The heuristics for the constrained multicast routing.- On design and analysis of a new block cipher.- CHESSBOARD: A synergy of object-oriented concurrent programming and program layering.- A calculational approach to flattening nested data parallelism in functional languages.- Concurrent object-oriented programming in Tempo++.- A universal scripting framework or Lambda: The ultimate "little language".- Design and application of a light-weight persistency mechanism.- Hierarchical verification using verification diagrams.- A dynamic evolution for the specifications of distributed systems.- Formal verification and evaluation of execution time in the envelope theory.- Design of controllers for linear hybrid systems.- Checking linear duration invariants by linear programming.- Conjunctive vector representations for set valued feature descriptions.- Constructive negation in definite constraint logic programs.- Multilevel master-slave parallel programming models.- Improving the X.509 protocol for ATM networks.- InterMUD communications (IMC) protocol with extensions to VRMLise MultiUser Domains (MUDs).- ALPS-HI: An annotated logic programming system with hypothetical implications.- Constructing more relevant models.- Formal analysis for continuous systems controlled by programs.- Implementation tuning of a dataflow language on a stock parallel machine with visualization tools.- Overall system for secure wireless mobile networks.- Materialized view adaptation in distributed databases.- Coupling object orientation & deduction - A modelling perspective.- An integer programming-based nurse rostering system.- Synthesizing parallel divide-and-conquer algorithms using the list interleave operator.- Some thoughts on statecharts, 13 years later.- End-to-end behavior of the internet: Measurements, analysis, and applications.- The Oz programming language and system.- Cryptographic postage indicia.
by "Nielsen BookData"