Foundations -- Knowledge Discovery and Data Mining -- Automatic Discovery of Class Hierarchies via Output Space Decomposition -- Graph-based Mining of Complex Data -- Predictive Graph Mining with Kernel Methods -- TreeMiner: An Efficient Algorithm for Mining Embedded Ordered Frequent Trees -- Sequence Data Mining -- Link-based Classification -- Applications -- Knowledge Discovery from Evolution…
Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey -- The Boomerang Attack on 5 and 6-Round Reduced AES -- A Three Rounds Property of the AES -- DFA on AES -- Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES -- Algebraic Attacks and Related Results -- Some Algebraic Aspects of the Advanced Encryption Standard -- Ge…
Overview -- Active Mining Project: Overview -- Tutorial Papers -- Computational and Statistical Methods in Bioinformatics -- Indexing and Mining Audiovisual Data -- Active Information Collection -- Relevance Feedback Document Retrieval Using Support Vector Machines -- Micro View and Macro View Approaches to Discovered Rule Filtering -- Mining Chemical Compound Structure Data Using Inductive Log…
to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.Modern cryptology employs mathematically rigorous concepts and methods from complexity theor…
Algorithmic Problems & Their Complexity -- Fundamental Complexity Classes -- Reductions — Algorithmic Relationships Between Problems -- The Theory of NP-Completeness -- NP-complete and NP-equivalent Problems -- The Complexity Analysis of Problems -- The Complexity of Approximation Problems — Classical Results -- The Complexity of Black Box Problems -- Additional Complexity Classes and Relat…
Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -…
New Designs -- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC -- New Applications of T-Functions in Block Ciphers and Hash Functions -- The Poly1305-AES Message-Authentication Code -- Stream Ciphers I -- Narrow T-Functions -- A New Class of Single Cycle T-Functions -- F-FCSR: Design of a New Class of Stream Ciphers -- Boolean Functions -- Cryptographically Significant Boolean Fu…
Invited Talks -- T? ??? ?í ? ??í?? ? The Interaction Between Algorithms and Game Theory -- Using an Adaptive Memory Strategy to Improve a Multistart Heuristic for Sequencing by Hybridization -- High-Performance Algorithm Engineering for Large-Scale Graph Problems and Computational Biology -- Contributed Regular Papers -- The “Real” Approximation Factor of the MST Heuristic for the Minimum…
Pushing Constraints to Detect Local Patterns -- From Local to Global Patterns: Evaluation Issues in Rule Learning Algorithms -- Pattern Discovery Tools for Detecting Cheating in Student Coursework -- Local Pattern Detection and Clustering -- Local Patterns: Theory and Practice of Constraint-Based Relational Subgroup Discovery -- Visualizing Very Large Graphs Using Clustering Neighborhoods -- Fe…
1 Introduction -- 1 Introduction -- 2 Preliminaries and Monograph Structure -- I Combinatorial Bounds -- 3 Johnson-Type Bounds and Applications to List Decoding -- 4 Limits to List Decodability -- 5 List Decodability Vs. Rate -- II Code Constructions and Algorithms -- 6 Reed-Solomon and Algebraic-Geometric Codes -- 7 A Unified Framework for List Decoding of Algebraic Codes -- 8 List Decoding of…