Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings / Edition 1

Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings / Edition 1

by Joxan Jaffar
     
 

ISBN-10: 3540620311

ISBN-13: 9783540620310

Pub. Date: 12/12/1996

Publisher: Springer Berlin Heidelberg

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and

Overview

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Product Details

ISBN-13:
9783540620310
Publisher:
Springer Berlin Heidelberg
Publication date:
12/12/1996
Series:
Lecture Notes in Computer Science Series, #1179
Edition description:
1996
Pages:
400
Product dimensions:
6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Randomized parallel list ranking for distributed memory multiprocesors.- Suffix arrays for multiple strings: A method for on-line multiple string searches.- Relations among parallel and sequential computation models.- The expressive power of “possible-is-certain” semantics.- Using shastic methods to guide search in CLP: A preliminary report.- Backtrackable state with linear affine implication and Assumption Grammars.- Declarative debugging in constraint logic programming.- An improved logging and checkpointing scheme for recoverable distributed shared memory.- Distributed concurrency control in real-time cooperative editing systems.- Variable timestamp-based distributed deadlock detection and resolution.- Lambda-definable term rewriting systems.- Sets as anti-chains.- A typed Lambda Calculus of Objects.- Intensionality versus extensionality and Primitive Recursion.- On the bounded theories of finite trees.- Broadcasting in star graphs with Byzantine failures.- Blind threshold signatures based on discrete logarithm.- Computation of the k-error linear complexity of binary sequences with period 2n.- Symbolic rights and vouchers for access control in distributed object systems.- The heuristics for the constrained multicast routing.- On design and analysis of a new block cipher.- CHESSBOARD: A synergy of object-oriented concurrent programming and program layering.- A calculational approach to flattening nested data parallelism in functional languages.- Concurrent object-oriented programming in Tempo++.- A universal scripting framework or Lambda: The ultimate “little language”.- Design and application of a light-weight persistency mechanism.- Hierarchical verification using verification diagrams.- A dynamic evolution for the specifications of distributed systems.- Formal verification and evaluation of execution time in the envelope theory.- Design of controllers for linear hybrid systems.- Checking linear duration invariants by linear programming.- Conjunctive vector representations for set valued feature descriptions.- Constructive negation in definite constraint logic programs.- Multilevel master-slave parallel programming models.- Improving the X.509 prool for ATM networks.- InterMUD communications (IMC) prool with extensions to VRMLise MultiUser Domains (MUDs).- ALPS-HI: An annotated logic programming system with hypothetical implications.- Constructing more relevant models.- Formal analysis for continuous systems controlled by programs.- Implementation tuning of a dataflow language on a sk parallel machine with visualization tools.- Overall system for secure wireless mobile networks.- Materialized view adaptation in distributed databases.- Coupling object orientation & deduction — A modelling perspective.- An integer programming-based nurse rostering system.- Synthesizing parallel divide-and-conquer algorithms using the list interleave operator.- Some thoughts on statecharts, 13 years later.- End-to-end behavior of the internet: Measurements, analysis, and applications.- The Oz programming language and system.- Cryptographic postage indicia.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >