Prediction, Analysis and Monitoring of System Architecture -- Performance Prediction of J2EE Applications Using Messaging Protocols -- EJBMemProf – A Memory Profiling Framework for Enterprise JavaBeans -- Model-Driven Safety Evaluation with State-Event-Based Component Failure Annotations -- Optimizing Resource Usage in Component-Based Real-Time Systems -- Evaluating Performance Attributes of …
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…
Keynotes -- Conceptual Schema-Centric Development: A Grand Challenge for Information Systems Research -- A MDA-Compliant Environment for Developing User Interfaces of Information Systems -- Toward Semantic Interoperability of Heterogeneous Biological Data Sources -- Conceptual Modeling -- The Association Construct in Conceptual Modelling – An Analysis Using the Bunge Ontological Model -- Comp…
Typing Haskell with an Attribute Grammar -- Programming with Arrows -- Epigram: Practical Programming with Dependent Types -- Combining Datatypes and Effects -- GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications -- A Functional Shell That Operates on Typed and Compiled Applications -- Declarative Debugging with Buddha -- Server-Side Web Programming in WASH -- Ref…
Database Systems -- Database System Architecture – A Walk Through Time: From Centralized Platform to Mobile Computing – Keynote Address -- Extending Wide-Area Replication Support with Mobility and Improved Recovery -- Extending Databases to Precision-Controlled Retrieval of Qualitative Information -- An Approach for Solving Very Large Scale Instances of the Design Distribution Problem for D…
Keynote Papers -- Invited Papers -- Association Rules -- Classification -- Clustering -- Novel Algorithms -- Text Mining -- Multimedia Mining -- Sequential Data Mining and Time Series Mining -- Web Mining -- Biomedical Mining -- Advanced Applications -- Security and Privacy Issues -- Spatial Data Mining -- Streaming Data Mining.
Invited Presentations -- Another Look at Dynamic Ad-Hoc Wireless Networks -- Routing in Wireless Networks and Local Solutions for Global Problems -- Contributed Papers -- Equilibria for Broadcast Range Assignment Games in Ad-Hoc Networks -- Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks -- Cluster-Based Framework in Vehicular Ad-Hoc Networks -- Randomiz…
Gödel Machines: Towards a Technical Justification of Consciousness -- Postext – A Mind for Society -- Comparing Resource Sharing with Information Exchange in Co-operative Agents, and the Role of Environment Structure -- Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems -- SMART (Stochastic Model Acquisition with ReinforcemenT) Learning Agent…
Prologue -- Generalizing Proofs-as-Programs -- Functional Program Synthesis -- The Curry-Howard Protocol -- Imperative Proofs-as-Programs -- Intuitionistic Hoare Logic -- Properties of Intuitionistic Hoare Logic -- Proofs-as-Imperative-Programs -- Structured Proofs-as-Programs -- Reasoning about Structured Specifications -- Proof-theoretic Properties of SSL -- Structured Proofs-as-Programs -- G…
Probabilistic guarded commands and their refinement logic -- to pGCL: Its logic and its model -- Probabilistic loops: Invariants and variants -- Case studies in termination: Choice coordination, the dining philosophers, and the random walk -- Probabilistic data refinement: The steam boiler -- Semantic structures -- Theory for the demonic model -- The geometry of probabilistic programs -- Proved…