Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Invited Papers -- Differential Gene Expression in the Auditory System -- Searching for Non-coding RNA -- Cyberinfrastructure for PathoSystems Biology -- Analysis of Genomic Tiling Microarrays for Transcript Mapping and the Identification of Transcription Factor Binding Sites -- Full Papers -- Perturbing Thermodynamically Unfeasible Metabolic Networks -- Protein Cellular Localization with Multic…
Invited Lectures -- Algorithmic Randomness, Quantum Physics, and Incompleteness -- On the Complexity of Universal Programs -- Finite Sets of Words and Computing -- Universality and Cellular Automata -- Leaf Language Classes -- Selected Contributions -- Computational Completeness of P Systems with Active Membranes and Two Polarizations -- Computing with a Distributed Reaction-Diffusion Model -- …
Invited Talks -- Data Analysis in the Life Sciences — Sparking Ideas — -- Machine Learning for Natural Language Processing (and Vice Versa?) -- Statistical Relational Learning: An Inductive Logic Programming Perspective -- Recent Advances in Mining Time Series Data -- Focus the Mining Beacon: Lessons and Challenges from the World of E-Commerce -- Data Streams and Data Synopses for Massive D…
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
Mathematical and Theoretical Methods -- Evolutionary Computation -- Neurocomputational Inspired Models -- Learning and Adaptation -- Radial Basic Functions Structures -- Self-organizing Networks and Methods -- Support Vector Machines -- Cellular Neural Networks -- Hybrid Systems -- Neuroengineering and Hardware Implementations -- Pattern Recognition -- Perception and Robotics -- Applications on…
Trends in Data Mining and Knowledge Discovery -- Advanced Methods for the Analysis of Semiconductor Manufacturing Process Data -- Clustering and Visualization of Retail Market Baskets -- Segmentation of Continuous Data Streams Based on a Change Detection Methodology -- Instance Selection Using Evolutionary Algorithms: An Experimental Study -- Using Cooperative Coevolution for Data Mining of Bay…
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…