Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Panels -- COTS Component-Based Embedded Systems – A Dream or Reality? -- Free and Proprietary Software in COTS-Based Software Development -- Workshops -- 2nd International Workshop on Incorporating COTS into Software Systems: Assessment and Prediction of Behavior and QoS Attributes of COTS Software Components and Systems -- Challenges of COTS IV & V -- Tutorials -- The COTS Product Market: An…
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
Pattern Analysis -- System Modeling -- Signal Processing -- Image Processing -- Financial Analysis -- Erratum.This book and its sister volumes constitute the proceedings of the 2nd International Symposium on Neural Networks (ISNN 2005). ISNN 2005 was held in the beautiful mountain city Chongqing by the upper Yangtze River in southwestern China during May 30–June 1, 2005, as a sequel of ISNN 2…
Control Systems -- Robotic Systems -- Telecommunication Networks -- Incidence Detection -- Fault Diagnosis -- Power Systems -- Biomedical Applications -- Industrial Applications -- Other Applications.The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural Networks, ISNN 2005, held in Chongqing, China in May/June 2005. The 483…
Theoretical Analysis -- Model Design -- Learning Methods -- Optimization Methods -- Kernel Methods -- Component Analysis.The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural Networks, ISNN 2005, held in Chongqing, China in May/June 2005. The 483 revised papers presented were carefully reviewed and selected from 1.425 submi…
Interchangeability and Solution Adaptation in Crisp CSPs -- Interchangeability in Soft CSPs -- Multi Agent Computation of Interchangeability in Distributed CSPs -- Interchangeability in Dynamic Environments -- Generic Case Adaptation Framework -- Conclusions.Constraint satisfaction problems are significant in the domain of automated reasoning for artificial intelligence. They can be applied to …
Invited Lectures -- Bioinformatics -- Networks -- String Algorithms -- Scheduling -- Complexity -- Steiner Trees -- Graph Drawing and Layout Design -- Quantum Computing -- Randomized Algorithms -- Geometry -- Codes -- Finance -- Facility Location -- Graph Theory -- Graph Algorithms -- Others.
Task Modelling -- The Influence of Improved Task Models on Dialogues -- Task-Based Web Modelling: The Web Object Life Cycle Modelling Concept -- Hypermedia and Web-Based Systems -- Model-Based Design of Online Help Systems -- A Design Toolkit for Hypermedia Applications Based on Ariadne Development Method -- SWCEditor: A Model-Based Tool for Interactive Modelling of Web Navigation -- Model-Base…