Research Questions for the Evolving Communications Landscape -- Mobile Back to Front: Uncertainty and Danger in the Theory—Technology Relation -- Wi-Fi Networks and the Reorganization of Wireline—Wireless Relationship -- Mobile Phones as Fashion Statements: The Co-creation of Mobile Communication’s Public Meaning -- Behavioral Changes at the Mobile Workplace: A Symbolic Interactionistic A…
An Overlapping Communication Protocol Using Improved Time-Slot Leasing for Bluetooth WPANs -- Full-Duplex Transmission on the Unidirectional Links of High-Rate Wireless PANs -- Server Supported Routing: A Novel Architecture and Protocol to Support Inter-vehicular Communication -- Energy-Efficient Aggregate Query Evaluation in Sensor Networks -- Data Sampling Control and Compression in Sensor Ne…
Securing Publish/Subscribe for Multi-domain Systems -- ABACUS: A Distributed Middleware for Privacy Preserving Data Sharing Across Private Data Warehouses -- Causeway: Support for Controlling and Analyzing the Execution of Multi-tier Applications -- MINERVA?: A Scalable Efficient Peer-to-Peer Search Engine -- An Optimal Overlay Topology for Routing Peer-to-Peer Searches -- Combining Flexibility…
Computer Aided Composition -- Supporting Tools for Designing-By-Contract in Component-Based Applications -- Access Rights – The Keys to Cooperative Work/Learning -- Flexible Notifications and Task Models for Cooperative Work Management -- Managing Ontological Complexity: A Case Study -- Looking Beyond Computer Applications: Investigating Rich Structures -- Towards a Generic Building Block for…
Massively Multi-agent Technology -- Agent Server Technology for Managing Millions of Agents -- Exploring Flows in the Intelligent Agent Grid Environment -- Adaptive Agent Allocation for Massively Multi-agent Applications -- Hierarchical Resource Usage Coordination for Large-Scale Multi-agent Systems -- Towards Fault-Tolerant Massively Multiagent Systems -- Virtual Space Ontologies for Scripting…
Overview -- Managing Threats to Web Databases and Cyber Systems -- Intrusion Detection: A Survey -- Data Mining Based Analysis of Computer Attacks -- Learning Rules and Clusters for Anomaly Detection in Network Traffic -- Statistical Causality Analysis of Infosec Alert Data -- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization -- Te…
Invited Paper -- XML Databases and Beyond-Plenty of Architectural Challenges Ahead -- Regular Papers Database Theory -- Usable Recursive Queries -- Relation-Collapse: An Optimisation Technique for the Similarity Algebra -- On Modal Deductive Databases -- Declarative Data Fusion – Syntax, Semantics, and Implementation -- Non-destructive Integration of Form-Based Views -- Database Modelling an…
Case-Based Reasoning -- Neuro-symbolic System for Business Internal Control -- Applying Case Based Reasoning Approach in Analyzing Organizational Change Management Data -- Improving the K-NN Classification with the Euclidean Distance Through Linear Data Transformations -- An IBR System to Quantify the Ocean’s Carbon Dioxide Budget -- A Beta-Cooperative CBR System for Constructing a Business M…
Invited Contributions -- Towards a Unified Model for Web Services Composition -- Peer-to-Peer Data Integration with Active XML -- Query Incentive Networks -- Database and Information Retrieval Techniques for XML -- Regular Contributions -- Implementing a Tamper-Evident Database System -- Ontology Engineering from a Database Perspective -- Retracted: Shared Ontology for Pervasive Computing -- Pr…
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…