Chapter 1 The Research Gap: Globalisation, Migration and Ageing Society -- Chapter 2 Participation and Engagement: Dynamics of Social Life -- Chapter 3 Economic Situation -- Chapter 4 Housing and Location Choice -- Chapter 5 Independence and Care: In Search of an Effective Care Model -- Chapter 6 Intergenerational Transfer and Transnational Migration Decisions in Later Life -- Chapter 7 Life Sa…
1.Modified Duncan-Chang model and mechanics parameter determination based on triaxial consolidated drained tests of Guiyang red clay in China -- 2.Hydro-thermal properties of the unsaturated soil -- 3.Gas bubble nucleation and migration in soils - Pore-network model simulation -- 4.A Coupled Chemo-mechanical Analysis of the Dissolution-dominated Sinkholes -- 5.Simplified Methodology for Stiffne…
Invited Contributions -- Towards a Unified Model for Web Services Composition -- Peer-to-Peer Data Integration with Active XML -- Query Incentive Networks -- Database and Information Retrieval Techniques for XML -- Regular Contributions -- Implementing a Tamper-Evident Database System -- Ontology Engineering from a Database Perspective -- Retracted: Shared Ontology for Pervasive Computing -- Pr…
Acknowledgements -- Matching Visibility and Performance: A Standing Challenge for World-Class Universities -- Section I: Global Reflection -- Excellence Strategies and the Creation of World-Class Universities -- Towards World-Class Systems: World-Class Universities in High Participation Systems of Higher Education -- World-Class Universities in an Age of Slow Growth -- The Role of Universities …
Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Invited Presentations -- Lessons for the Future from a Decade of Informedia Video Analysis Research -- Large Scale Evaluations of Multimedia Information Retrieval: The TRECVid Experience -- Image and Video Retrieval from a User-Centered Mobile Multimedia Perspective -- Multimedia Research Challenges for Industry -- Industrial Presentations -- Practical Applications of Multimedia Search -- Video…