Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical…
Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…
Application of Video Browsing to Consumer Video Browsing Products -- Watermarking (I) -- User Interface (I) -- Content-Based Image Retrieval -- Sports (II) -- Network (III) -- Streaming (I) -- Visual Content Mining in Multimedia Documents -- Compression (I) -- Face, Gesture, and Behavior (II) -- Applications (I) -- User Interface (II) -- Image Analysis (II) -- Audio Analysis -- Moving from Cont…
Human-Scale Virtual Reality and Interaction -- Surveillance and Tracking -- Image Analysis (III) -- Compression (II) -- Streaming (II) -- Watermarking (II) -- Content Production (II) -- Applications (II) -- Multimedia Analysis -- Compression (III) -- Watermarking (III).Welcome to the proceedings of the 5th Paci?c Rim Conference on Multimedia (PCM 2004) held in Tokyo Waterfront City, Japan, Nove…
Art -- Network (I) -- Sports (I) -- Immersive Conferencing: Novel Interfaces and Paradigms for Remote Collaboration -- Network (II) -- Image Retrieval -- Image Analysis (I) -- Face, Gesture, and Behavior (I) -- Virtual Reality and Computer Graphics -- Content Production (I) -- Intelligent Media Integration for Social Information Infrastructure -- Approaches or Methods of Security Engineering --…
Peer-2-Peer Systems -- Web Services -- Grid Computing -- Jini -- Gnutella -- Scalability -- Security -- Freenet -- Jxta -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- OGSA.
Invited Talks -- What Is Interesting About Scientific Databases? -- Early Data Tailoring for Ubiquitous Information Access in Highly Dynamic Environments -- Tutorial -- Translating Images to Keywords: Problems, Applications and Progress -- Regular Papers -- One to Many 3D Face Recognition Enhanced Through k-d-Tree Based Spatial Access -- Information Retrieval from the Web: An Interactive Paradi…
Design Methodology -- Domain-Crossing Software Product Lines in Embedded Automotive Systems -- Mechatronics Design and Verification -- Modeling and Specification -- Pattern-based Analysis in Distributed Development of Embedded Systems -- An Embedded SW Design Exploration Approach based on UML Estimation Tools -- Software Synthesis and Power Management -- Embedded Hard Real-Time Software Synthes…
Data Bases and Data Mining -- Algorithms and Theoretical Foundations -- Cultural and Museum Information Systems -- Internet-Scale Software/Information Systems -- Wearable and Mobile Computing -- Computer Graphics, Virtual Reality and Visualization -- AI, Machine Learning and Knowledge Bases -- Languages, Text and Speech Processing -- Bioinformatics -- Software Engineering -- Educational Technol…