Securing Publish/Subscribe for Multi-domain Systems -- ABACUS: A Distributed Middleware for Privacy Preserving Data Sharing Across Private Data Warehouses -- Causeway: Support for Controlling and Analyzing the Execution of Multi-tier Applications -- MINERVA?: A Scalable Efficient Peer-to-Peer Search Engine -- An Optimal Overlay Topology for Routing Peer-to-Peer Searches -- Combining Flexibility…
Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…
High Performance Computing and Algorithms -- Computer Modeling and Simulations -- Biological and Medical Informatics -- Data and Information Sciences -- Computational Graphics and Visualization.The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas an…
Component-Based and Model-Driven Development with UML -- Model-Based Testing with UML -- Built-in Contract Testing -- Built-in Contract Testing and Implementation Technologies -- Reuse and Related Technologies -- Assessing Quality-of-Service Contracts.Component-based software development regards software construction in terms of conventional engineering disciplines where the assembly of systems…
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…
Keynotes -- Conceptual Schema-Centric Development: A Grand Challenge for Information Systems Research -- A MDA-Compliant Environment for Developing User Interfaces of Information Systems -- Toward Semantic Interoperability of Heterogeneous Biological Data Sources -- Conceptual Modeling -- The Association Construct in Conceptual Modelling – An Analysis Using the Bunge Ontological Model -- Comp…