The 5th International Symposium on High Performance Computing (ISHPC–V) was held in Odaiba, Tokyo, Japan, October 20–22, 2003. The symposium was thoughtfully planned, organized, and supported by the ISHPC Organizing...
详细信息
ISBN:
(数字)9783540397076
ISBN:
(纸本)9783540203599
The 5th International Symposium on High Performance Computing (ISHPC–V) was held in Odaiba, Tokyo, Japan, October 20–22, 2003. The symposium was thoughtfully planned, organized, and supported by the ISHPC Organizing C- mittee and its collaborating organizations. The ISHPC-V program included two keynote speeches, several invited talks, two panel discussions, and technical sessions covering theoretical and applied research topics in high–performance computing and representing both academia and industry. One of the regular sessions highlighted the research results of the ITBL project (IT–based research laboratory, http://***/). ITBL is a Japanese national project started in 2001 with the objective of re- izing a virtual joint research environment using informationtechnology. ITBL aims to connect 100 supercomputers located in main Japanese scienti?c research laboratories via high–speed networks. A total of 58 technical contributions from 11 countries were submitted to ISHPC-V. Each paper received at least three peer reviews. After a thorough evaluation process, the program committee selected 14 regular (12-page) papers for presentation at the symposium. In addition, several other papers with fav- able reviews were recommended for a poster session presentation. They are also included in the proceedings as short (8-page) papers. Theprogramcommitteegaveadistinguishedpaperawardandabeststudent paper award to two of the regular papers. The distinguished paper award was given for “Code and Data Transformations for Improving Shared Cache P- formance on SMT Processors” by Dimitrios S. Nikolopoulos. The best student paper award was given for “Improving Memory Latency Aware Fetch Policies for SMT Processors” by Francisco J. Cazorla.
In 1996 the International Federation for information Processing (IFIP) establ- hed its rst Technical Committee on foundations of computerscience, TC1. The aim of IFIP TC1 is to support the development of theoretical ...
详细信息
ISBN:
(数字)9783540449294
ISBN:
(纸本)9783540678236
In 1996 the International Federation for information Processing (IFIP) establ- hed its rst Technical Committee on foundations of computerscience, TC1. The aim of IFIP TC1 is to support the development of theoretical computerscience as a fundamental science and to promote the exploration of fundamental c- cepts, models, theories, and formal systems in order to understand laws, limits, and possibilities of information processing. This volume constitutes the proceedings of the rst IFIP International C- ference on Theoretical computerscience (IFIP TCS 2000) { Exploring New Frontiers of Theoretical Informatics { organized by IFIP TC1, held at Tohoku University, Sendai, Japan in August 2000. The IFIP TCS 2000 technical program consists of invited talks, contributed talks, and a panel discussion. In conjunction with this program there are two special open lectures by Professors Jan van Leeuwen and Peter D. Mosses. The decision to hold this conference was made by IFIP TC1 in August 1998, and since then IFIP TCS 2000 has bene ted from the e orts of many people; in particular, the TC1 members and the members of the Steering Committee, the program Committee, and the Organizing Committee of the conference. Our special thanks go to the program Committee Co-chairs: Track (1): Jan van Leeuwen (U. Utrecht), Osamu Watanabe (Tokyo Inst. Tech.) Track (2): Masami Hagiya (U. Tokyo), Peter D. Mosses (U. Aarhus).
This volume contains the papers presented at the 4th Fuji International S- posium on Functional and Logic programming (FLOPS’99) held in Tsukuba, Japan, November 11–13, 1999, and hosted by the Electrotechnical Labor...
详细信息
ISBN:
(数字)9783540479505
ISBN:
(纸本)9783540666776
This volume contains the papers presented at the 4th Fuji International S- posium on Functional and Logic programming (FLOPS’99) held in Tsukuba, Japan, November 11–13, 1999, and hosted by the Electrotechnical Laboratory (ETL). FLOPS is a forum for presenting and discussing all issues concerning functional programming, logic programming, and their integration. The sym- sium takes place about every 1.5 years in Japan. Previous FLOPS meetings were held in Fuji Susuno (1995), Shonan Village (1996), and Kyoto (1998). 1 There were 51 submissions from Austria ( ),Belgium (2),Brazil(3),China 3 3 1 7 (1), Denmark (2), France (3 ), Germany (8), Ireland (1), Israel ( ), Italy (1 ), 4 3 12 1 Japan (9 ), Korea (1), Morocco (1), The Netherlands (1), New Zealand (1), 3 1 1 3 5 Portugal ( ), Singapore ( ), Slovakia (1), Spain (4 ), Sweden (1), UK (4 ), 2 3 4 6 1 and USA (2 ), of which the program committee selected 21 for presentation. In 4 addition, this volume contains full papers by the two invited speakers, Atsushi Ohori and Mario Rodr´?guez-Artalejo.
This book constitutes the proceedings of the 5th International Conference on Social Informatics, SocInfo 2013, held in Kyoto, Japan, in November 2013. The 23 full papers, 15 short papers and three poster papers includ...
详细信息
ISBN:
(数字)9783319032603
ISBN:
(纸本)9783319032597
This book constitutes the proceedings of the 5th International Conference on Social Informatics, SocInfo 2013, held in Kyoto, Japan, in November 2013. The 23 full papers, 15 short papers and three poster papers included in this volume were carefully reviewed and selected from 103 submissions. The papers present original research work on studying the interplay between socially-centric platforms and social phenomena.
This book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 20...
详细信息
ISBN:
(数字)9789811666247
ISBN:
(纸本)9789811666230;9789811666261
This book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines.;This volume covers broad areas of Intelligent Data Engineering and Analytics. The conference papers included herein presents both theoretical as well as practical aspects of data intensive computing, data mining, big data, knowledge management, intelligent data acquisition and processing from sensors, data communication networks protocols and architectures, etc. The volume will also serve as a knowledge centre for students of post-graduate level in various engineering disciplines.
TheInternationalConferenceonRoughSetandKnowledgetechnology(RSKT) has been held every year since 2006. RSKT serves as a major forum that brings researchers and industry practitioners together to discuss and deliberate ...
详细信息
ISBN:
(数字)9783642162480
ISBN:
(纸本)9783642162473
TheInternationalConferenceonRoughSetandKnowledgetechnology(RSKT) has been held every year since 2006. RSKT serves as a major forum that brings researchers and industry practitioners together to discuss and deliberate on fundamental issues of knowledge processing and management and knowled- intensive practical solutions in the current knowledge age. Experts from around the world meet to present state-of-the-art scienti?c results, to nurture academic and industrial interaction, and to promote collaborative research in rough sets and knowledge technology. The ?rst RSKT was held in Chongqing, China, f- lowed by RSKT 2007 in Toronto, Canada, RSKT 2008 in Chengdu, China and RSKT 2009 in Gold Coast, Australia. RSKT 2010, the 5th in the series, was held in Beijing, China, October 15–17, 2010. This volume contains 98 papers selected for presentation at RSKT 2010. Following the success of the previous conferences, RSKT 2010 continued the tradition of a very rigorous reviewing process. Every submission was reviewed ***,RSKT2010invitedseveralareachairsto- pervise the review process of every submission. Most submissions were reviewed by three experts. The program Committee members were deeply involved in a highly engaging selection process with discussions among reviewers and area chairs. When necessary, additional expert reviews were sought. As a result, only top-quality papers were chosen for presentation at the conference, including 49 regular papers (acceptance rate of 28%) and 25 short papers (acceptance rate of 14.3%). We would like to thank all the authors for contributing their best papers. Without their support, this conference would not have been possible.
This book constitutes the refereed proceedings of the 6th International Conference on information Systems, technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012.The 38 revised papers were car...
详细信息
ISBN:
(数字)9783642291661
ISBN:
(纸本)9783642291654
This book constitutes the refereed proceedings of the 6th International Conference on information Systems, technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012.
The 38 revised papers were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on information systems; informationtechnology; information management; business intelligence; management science and education; applications; workshop on program protection and
reverse engineering.
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Mala...
详细信息
ISBN:
(数字)9783642176197
ISBN:
(纸本)9783642176180
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the program Committee; those authored or co-authored by program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software.
The third International Workshop on information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for computer Security Research, University of Wollongong. The ma...
详细信息
ISBN:
(数字)9783540444565
ISBN:
(纸本)9783540414162
The third International Workshop on information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re?ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.
暂无评论