Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…
Application of Video Browsing to Consumer Video Browsing Products -- Watermarking (I) -- User Interface (I) -- Content-Based Image Retrieval -- Sports (II) -- Network (III) -- Streaming (I) -- Visual Content Mining in Multimedia Documents -- Compression (I) -- Face, Gesture, and Behavior (II) -- Applications (I) -- User Interface (II) -- Image Analysis (II) -- Audio Analysis -- Moving from Cont…
Human-Scale Virtual Reality and Interaction -- Surveillance and Tracking -- Image Analysis (III) -- Compression (II) -- Streaming (II) -- Watermarking (II) -- Content Production (II) -- Applications (II) -- Multimedia Analysis -- Compression (III) -- Watermarking (III).Welcome to the proceedings of the 5th Paci?c Rim Conference on Multimedia (PCM 2004) held in Tokyo Waterfront City, Japan, Nove…
Art -- Network (I) -- Sports (I) -- Immersive Conferencing: Novel Interfaces and Paradigms for Remote Collaboration -- Network (II) -- Image Retrieval -- Image Analysis (I) -- Face, Gesture, and Behavior (I) -- Virtual Reality and Computer Graphics -- Content Production (I) -- Intelligent Media Integration for Social Information Infrastructure -- Approaches or Methods of Security Engineering --…
Peer-2-Peer Systems -- Web Services -- Grid Computing -- Jini -- Gnutella -- Scalability -- Security -- Freenet -- Jxta -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- OGSA.
Invited Talks -- What Is Interesting About Scientific Databases? -- Early Data Tailoring for Ubiquitous Information Access in Highly Dynamic Environments -- Tutorial -- Translating Images to Keywords: Problems, Applications and Progress -- Regular Papers -- One to Many 3D Face Recognition Enhanced Through k-d-Tree Based Spatial Access -- Information Retrieval from the Web: An Interactive Paradi…
Design Methodology -- Domain-Crossing Software Product Lines in Embedded Automotive Systems -- Mechatronics Design and Verification -- Modeling and Specification -- Pattern-based Analysis in Distributed Development of Embedded Systems -- An Embedded SW Design Exploration Approach based on UML Estimation Tools -- Software Synthesis and Power Management -- Embedded Hard Real-Time Software Synthes…
Data Bases and Data Mining -- Algorithms and Theoretical Foundations -- Cultural and Museum Information Systems -- Internet-Scale Software/Information Systems -- Wearable and Mobile Computing -- Computer Graphics, Virtual Reality and Visualization -- AI, Machine Learning and Knowledge Bases -- Languages, Text and Speech Processing -- Bioinformatics -- Software Engineering -- Educational Technol…
Keynote Speech -- Session 1: Sensor Networks I -- Session 2: 3G/B3G Networks -- Session 3: Peer-to-Peer Systems -- Session 4: Caching and Routing -- Session 5: Wireless Networks -- Session 6: Multicast I -- Session 7: Ad Hoc Networks I -- Session 8: Algorithms I -- Session 9: Security I -- Session 10: Peer-to-Peer Systems and Web Service -- Session 11: Multicast II -- Session 12: Traffic and Ne…