Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation…
Preliminaries -- The Technical Background -- On Programming -- Fundamentals -- Algorithm Extraction -- Recursion Removal -- Quantifications -- Refinement and Re-use -- Developments -- Sorting -- Data Refinement -- Sorting Revisited -- Failures and Fixes -- Further Examples -- On Interactive Software.Central to Formal Methods is the so-called Correctness Theorem which relates a specification to …
When Worlds Collide: Can UML Help SoC Design? -- Why Systems-on-Chip needs More UML like a Hole in the Head -- UML as a Framework for Combining Different Models of Computation -- A Generic Model Execution Platform for the Design of Hardware and Software -- Hardware/Software Codesign of Reconfigurable Architectures Using UML -- A Methodology for Bridging the Gap between UML and Codesign -- UML T…
to Reconfigurable Hardware -- Reconfigurable Hardware Exploitation in Wireless Multimedia Communications -- Reconfigurable Hardware Technologies -- Design Flow for Reconfigurable Systems-on-Chip -- SystemC Based Approach -- OCAPI-XL Based Approach -- MPEG-4 Video Decoder -- Prototyping of a HIPERLAN/2 Reconfigurable System-on-Chip -- WCDMA Detector.System Level Design of Reconfigurable Systems-…
Independent Safety Assessment -- The IEE/BCS Independent Safety Assurance Working Group -- Putting Trust into Safety Arguments -- Independent Safety Assessment of Safety Arguments -- Safety and Security -- Structuring a Safety Case for an Air Traffic Control Operations Room -- SafSec: Commonalities Between Safety and Security Assurance -- Accident Investigation -- Learning from a Train Derailme…
Specific Approaches -- Conceptual Modeling of Structure and Behavior with UML – The Top Level Object-Oriented Framework (TLOOF) Approach -- How to Manage Uniformly Software Architecture at Different Abstraction Levels -- Schema Integration Based on Uncertain Semantic Mappings -- Process Modeling and Views -- Combining Intention-Oriented and State-Based Process Modeling -- Pattern-Based Analys…
to Memetic Algorithms -- Memetic Evolutionary Algorithms -- Applications of Memetic Algorithms -- An Evolutionary Approach for the Maximum Diversity Problem -- Multimeme Algorithms Using Fuzzy Logic Based Memes For Protein Structure Prediction -- A Memetic Algorithm Solving the VRP, the CARP and General Routing Problems with Nodes, Edges and Arcs -- Using Memetic Algorithms for Optimal Calibrat…
CSCW Techniques and Methods -- Vega Information Grid for Collaborative Computing -- Physical Object Icons Buttons Gesture (PIBG): A New Interaction Paradigm with Pen -- A Novel Method of QoS Based Resource Management and Trust Based Task Scheduling -- Learning to Plan the Collaborative Design Process -- Groupware System Design and the Context Concept -- Grid Authorization Management Oriented to…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…
Invited Speakers -- Computer Networks -- Sensor and Satellite Networks -- Security and Cryptography -- Performance Evaluation -- E-Commerce and Web Services -- Multiagent Systems -- Machine Learning -- Information Retrieval and Natural Language Processing -- Image and Speech Processing -- Algorithms and Database Systems -- Theory of Computing -- Epilogue.