Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
Invited Papers -- Recognizable Sets of Graphs, Hypergraphs and Relational Structures: A Survey -- Some New Directions and Questions in Parameterized Complexity -- Basic Notions of Reaction Systems -- A Kleene Theorem for a Class of Communicating Automata with Effective Algorithms -- Algebraic and Topological Models for DNA Recombinant Processes -- Contributed Papers -- Regular Expressions for T…
Invited Lecture -- Robust Airline Fleet Assignment:Imposing Station Purity Using Station Decomposition -- Computing the Arrow-Debreu Competitive Market Equilibrium and Its Extensions -- Contributed Papers -- Complexity of Minimal Tree Routing and Coloring -- Energy Efficient Broadcasting and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optim…
Classification and Taxonomy -- Single-Path and Standard Path Switching Fabrics -- Two Stage Swithching Fabrics -- Three-Stage Switching Fabrics -- Replicated Baseline Switching Fabrics.This state-of-the-art survey of switching fabric architectures gives special attention to combinatorial properties of switching fabrics – nonblockingness and rearrangeability. Also describing control algorithms…
Fundamentals -- Foiling the Adversary -- Fingerprinting -- Success Amplification and Random Sampling -- Abundance of Witnesses -- Optimization and Random Rounding.Randomness is a powerful phenomenon that can be harnessed to solve various problems in all areas of computer science. Randomized algorithms are often more efficient, simpler and, surprisingly, also more reliable than their determinist…
Telecommunication Networks -- to Telecommunication Networks -- Digital Networks -- IP-Based Networks -- Queuing Theory and Applications -- Survey on Probability Theory -- Markov Chains and Queuing Theory -- M/G/1 Queuing Theory and Applications -- Local Area Networks Analysis -- Networks of Queues.Queuing Theory and Telecommunications : Networks and Applications provides some fundamental knowle…
MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Keynote and Invited Talks -- Research Session 1: XML -- Research Session 2: Performance and Query Evaluation -- Research Session 3: Data Mining (I) -- Research Session 4: Semantic Web and Web Ontology -- Research Session 5: Data Management (I) -- Research Session 6: Information Systems -- Research Session 7: Web Services and Workflow (I) -- Research Session 8: Data Management (II) -- Research S…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…