Part I - Critique -- 1. Hateful groups and weak powers? -- 2. Evil leaders and obedient masses?.-3. Part II - Model -- 4.Identity: the group as a collective performance -- 5.Violence: the transformation of identity by collective shocks -- 6. Power: the role of leadership in critical junctures -- 7. Part III – Case Studies -- 8. Riots, religion and the mobilisation of communal hatred in India …
Solid State Theory Meets Photonics: The Curious Optical Properties of Photonic Crystals -- Circular Photo-Galvanic and Spin-Galvanic Effects -- Nano-Photoluminescence -- Spectral Trimming of Photonic Crystals -- Full Counting Statistics in Quantum Contacts -- Quantum Dots Attached to Ferromagnetic Leads: Exchange Field, Spring Precession, and Kondo Effect -- Transport of Interaction Electrons T…
Keynote Contributions -- Intelligent Office Appliances (IOA) -- Learning Software Organizations (LSO) -- Learner-Oriented Knowledge Management and KM-Oriented E-Learning (LOKMOL) -- Peer-to-Peer and Agent Infrastructures for Knowledge Management (PAIKM) -- Knowledge Intensive Business Processes (KiBP) -- German Workshop on Experience Management (GWEM) -- Knowledge Management in Medicine (KMM) -…
Usability -- Bringing Usability Concerns to the Design of Software Architecture -- Empirical Usability Testing in a Component-Based Environment: Improving Test Efficiency with Component-Specific Usability Measures -- Software Architecture Analysis of Usability -- Task Modelling -- Support for Task Modeling – A ”Constructive” Exploration -- DynaMo-AID: A Design Process and a Runtime Archit…
EvoBIO Contributions -- Evolutionary Biclustering of Microarray Data -- A Fuzzy Viterbi Algorithm for Improved Sequence Alignment and Searching of Proteins -- Tabu Search Method for Determining Sequences of Amino Acids in Long Polypeptides -- Order Preserving Clustering over Multiple Time Course Experiments -- Can Neural Network Constraints in GP Provide Power to Detect Genes Associated with Hu…
Peer-to-Peer Networks -- Performance of Internet Protocols I -- Wireless Security -- Network Security -- Wireless Performance -- Network Service Support -- Network Modeling and Simulations -- Wireless LANs -- Optical Networking -- Performance of Internet & Web Applications -- Ad Hoc Networks I -- Adaptive Networking -- Performance of Internet Protocols II -- Radio Resource Management -- Interne…
to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.Modern cryptology employs mathematically rigorous concepts and methods from complexity theor…
The Earth's Climate and its Response to Solar Variability: The Climate System -- Atmospheric Dynamics, Modes of Variability and Climate Modelling -- Climate Records -- Radiative Processes in the Atmosphere -- The Greenhouse Effect and Radiative Forcing of Climate Change -- Clouds -- Atmospheric Photochemistry -- Response of Climate to Variations in Solar Irradiance -- The Earth's Electric Field…