Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2 - 5, 1996, Proceedings / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$86.67
Used and New from Other Sellers
Used and New from Other Sellers
from $3.34
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (10) from $3.34   
  • New (6) from $66.81   
  • Used (4) from $3.34   

Overview

This book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.
The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification.

Read More Show Less

Product Details

  • ISBN-13: 9783540620310
  • Publisher: Springer Berlin Heidelberg
  • Publication date: 12/12/1996
  • Series: Lecture Notes in Computer Science Series , #1179
  • Edition description: 1996
  • Edition number: 1
  • Pages: 400
  • Product dimensions: 9.21 (w) x 6.14 (h) x 0.85 (d)

Table of Contents

Randomized parallel list ranking for distributed memory multiprocesors.- Suffix arrays for multiple strings: A method for on-line multiple string searches.- Relations among parallel and sequential computation models.- The expressive power of “possible-is-certain” semantics.- Using shastic methods to guide search in CLP: A preliminary report.- Backtrackable state with linear affine implication and Assumption Grammars.- Declarative debugging in constraint logic programming.- An improved logging and checkpointing scheme for recoverable distributed shared memory.- Distributed concurrency control in real-time cooperative editing systems.- Variable timestamp-based distributed deadlock detection and resolution.- Lambda-definable term rewriting systems.- Sets as anti-chains.- A typed Lambda Calculus of Objects.- Intensionality versus extensionality and Primitive Recursion.- On the bounded theories of finite trees.- Broadcasting in star graphs with Byzantine failures.- Blind threshold signatures based on discrete logarithm.- Computation of the k-error linear complexity of binary sequences with period 2n.- Symbolic rights and vouchers for access control in distributed object systems.- The heuristics for the constrained multicast routing.- On design and analysis of a new block cipher.- CHESSBOARD: A synergy of object-oriented concurrent programming and program layering.- A calculational approach to flattening nested data parallelism in functional languages.- Concurrent object-oriented programming in Tempo++.- A universal scripting framework or Lambda: The ultimate “little language”.- Design and application of a light-weight persistency mechanism.- Hierarchical verification using verification diagrams.- A dynamic evolution for the specifications of distributed systems.- Formal verification and evaluation of execution time in the envelope theory.- Design of controllers for linear hybrid systems.- Checking linear duration invariants by linear programming.- Conjunctive vector representations for set valued feature descriptions.- Constructive negation in definite constraint logic programs.- Multilevel master-slave parallel programming models.- Improving the X.509 prool for ATM networks.- InterMUD communications (IMC) prool with extensions to VRMLise MultiUser Domains (MUDs).- ALPS-HI: An annotated logic programming system with hypothetical implications.- Constructing more relevant models.- Formal analysis for continuous systems controlled by programs.- Implementation tuning of a dataflow language on a sk parallel machine with visualization tools.- Overall system for secure wireless mobile networks.- Materialized view adaptation in distributed databases.- Coupling object orientation & deduction — A modelling perspective.- An integer programming-based nurse rostering system.- Synthesizing parallel divide-and-conquer algorithms using the list interleave operator.- Some thoughts on statecharts, 13 years later.- End-to-end behavior of the internet: Measurements, analysis, and applications.- The Oz programming language and system.- Cryptographic postage indicia.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)