|
![]() |
|||
|
||||
OverviewThis book constitutes the refereed proceedings of the Second Asian Conference on Computing Science, ASIAN'96, held in Singapore in December 1996.The volume presents 31 revised full papers selected from a total of 169 submissions; also included are three invited papers and 14 posters. The papers are organized in topical sections on algorithms, constraints and logic programming, distributed systems, formal systems, networking and security, programming and systems, and specification and verification. Full Product DetailsAuthor: Joxan Jaffar , Roland H.C. YapPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 1996 ed. Volume: 1179 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 1.280kg ISBN: 9783540620310ISBN 10: 3540620311 Pages: 400 Publication Date: 19 November 1996 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsRandomized parallel list ranking for distributed memory multiprocesors.- Suffix arrays for multiple strings: A method for on-line multiple string searches.- Relations among parallel and sequential computation models.- The expressive power of possible-is-certain semantics.- Using stochastic methods to guide search in CLP: A preliminary report.- Backtrackable state with linear affine implication and Assumption Grammars.- Declarative debugging in constraint logic programming.- An improved logging and checkpointing scheme for recoverable distributed shared memory.- Distributed concurrency control in real-time cooperative editing systems.- Variable timestamp-based distributed deadlock detection and resolution.- Lambda-definable term rewriting systems.- Sets as anti-chains.- A typed Lambda Calculus of Objects.- Intensionality versus extensionality and Primitive Recursion.- On the bounded theories of finite trees.- Broadcasting in star graphs with Byzantine failures.- Blind threshold signatures based on discrete logarithm.- Computation of the k-error linear complexity of binary sequences with period 2n.- Symbolic rights and vouchers for access control in distributed object systems.- The heuristics for the constrained multicast routing.- On design and analysis of a new block cipher.- CHESSBOARD: A synergy of object-oriented concurrent programming and program layering.- A calculational approach to flattening nested data parallelism in functional languages.- Concurrent object-oriented programming in Tempo++.- A universal scripting framework or Lambda: The ultimate little language .- Design and application of a light-weight persistency mechanism.- Hierarchical verification using verification diagrams.- A dynamic evolution for the specifications of distributed systems.- Formal verification and evaluation of execution time in the envelope theory.- Design of controllers for linear hybrid systems.- Checking linear duration invariants by linear programming.- Conjunctive vector representations for set valued feature descriptions.- Constructive negation in definite constraint logic programs.- Multilevel master-slave parallel programming models.- Improving the X.509 protocol for ATM networks.- InterMUD communications (IMC) protocol with extensions to VRMLise MultiUser Domains (MUDs).- ALPS-HI: An annotated logic programming system with hypothetical implications.- Constructing more relevant models.- Formal analysis for continuous systems controlled by programs.- Implementation tuning of a dataflow language on a stock parallel machine with visualization tools.- Overall system for secure wireless mobile networks.- Materialized view adaptation in distributed databases.- Coupling object orientation & deduction - A modelling perspective.- An integer programming-based nurse rostering system.- Synthesizing parallel divide-and-conquer algorithms using the list interleave operator.- Some thoughts on statecharts, 13 years later.- End-to-end behavior of the internet: Measurements, analysis, and applications.- The Oz programming language and system.- Cryptographic postage indicia.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |