hal. 308-313
hal. 253-260
Parte 1 -- Un cifrario del XVIII secolo -- La prima macchina cifrante al mondo -- Damm, Hagelin e Gyldén -- Intercettazione di segnali radio e analisi crittografica prima del 1939 -- Guerra -- Entra in scena Arne Beurling -- La flotta russa del Baltico -- Segnali misteriosi -- Telescriventi -- L’analisi di Beurling -- La G-Schreiber e gli “app” -- Crittoanalisi sistematica -- Esce di sce…
Keynote Address -- Data Management in Mobile Peer-to-Peer Networks -- On Using Histograms as Routing Indexes in Peer-to-Peer Systems -- Processing and Optimization of Complex Queries in Schema-Based P2P-Networks -- Using Information Retrieval Techniques to Route Queries in an InfoBeacons Network -- Similarity Search in P2P Networks -- Content-Based Similarity Search over Peer-to-Peer Systems --…
Keynotes -- Bioinformatics -- Watermarking and Encryption -- XML Query Processing -- XML Coding and Metadata Management -- Data Mining -- Data Generation and Understanding -- Panel -- Music Retrieval -- Query Processing in Subscription Systems -- Extending XML -- Web Services -- High-Dimensional Indexing -- Sensor and Stream Data Processing -- Database Performance Issues -- Clustering, Classifi…
Testing of Finite State Machines -- I. Testing of Finite State Machines -- 1 Homing and Synchronizing Sequences -- 2 State Identification -- 3 State Verification -- 4 Conformance Testing -- II. Testing of Labeled Transition Systems -- Testing of Labeled Transition Systems -- 5 Preorder Relations -- 6 Test Generation Algorithms Based on Preorder Relations -- 7 I/O-automata Based Testing -- 8 Tes…