Symbolic Test Generation -- Test Generation Based on Symbolic Specifications -- Symbolic Test Case Generation for Primitive Recursive Functions -- Preserving Contexts for Soft Conformance Relation -- Testing Non-functional Properties -- Testing of Symbolic-Probabilistic Systems -- A Test Generation Framework for quiescent Real-Time Systems -- Online Testing of Real-time Systems Using Uppaal -- …
Ecology Based Decentralized Agent Management System -- Ecology Based Decentralized Agent Management System -- From Abstract to Concrete Norms in Agent Institutions -- Meeting the Deadline: Why, When and How -- Multi-agent Systems Reliability, Fuzziness, and Deterrence -- Formalism Challenges of the Cougaar Model Driven Architecture -- Facilitating the Specification Capture and Transformation Pr…
Keynote Talks -- Formal Aids for the Growth of Software Systems -- Formal Methods and Testing: Hypotheses, and Correctness Approximations -- The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions -- Object Orientation -- Modular Verification of Static Class Invariants -- Decoupling in Object Orientation -- Controlling Object Allocation Using Cre…
Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -…
New Designs -- A New MAC Construction ALRED and a Specific Instance ALPHA-MAC -- New Applications of T-Functions in Block Ciphers and Hash Functions -- The Poly1305-AES Message-Authentication Code -- Stream Ciphers I -- Narrow T-Functions -- A New Class of Single Cycle T-Functions -- F-FCSR: Design of a New Class of Stream Ciphers -- Boolean Functions -- Cryptographically Significant Boolean Fu…
Experience Reports -- Lean Software Management Case Study: Timberline Inc. -- XP South of the Equator: An eXPerience Implementing XP in Brazil -- Introducing Extreme Programming into a Software Project at the Israeli Air Force -- The Agile Journey -- New Insights -- From User Stories to Code in One Day? -- Evaluate XP Effectiveness Using Simulation Modeling -- Agile Security Using an Incrementa…
Invited Talks -- T? ??? ?í ? ??í?? ? The Interaction Between Algorithms and Game Theory -- Using an Adaptive Memory Strategy to Improve a Multistart Heuristic for Sequencing by Hybridization -- High-Performance Algorithm Engineering for Large-Scale Graph Problems and Computational Biology -- Contributed Regular Papers -- The “Real” Approximation Factor of the MST Heuristic for the Minimum…
Getting Started -- The Art Gallery Web: A Data Modeling Example -- Building the Data Map -- The Art Gallery Web (Continued) -- Keys and Valid Associations -- The Art Gallery Web (Continued) -- Defining Attributes -- The Art Gallery Web (Continued) -- Verifying the Data Model -- Validating the Data Model -- Design Patterns -- From Logical to Physical -- The End and the Beginning.LOGICAL DATA MOD…
Pushing Constraints to Detect Local Patterns -- From Local to Global Patterns: Evaluation Issues in Rule Learning Algorithms -- Pattern Discovery Tools for Detecting Cheating in Student Coursework -- Local Pattern Detection and Clustering -- Local Patterns: Theory and Practice of Constraint-Based Relational Subgroup Discovery -- Visualizing Very Large Graphs Using Clustering Neighborhoods -- Fe…
1 Introduction -- 1 Introduction -- 2 Preliminaries and Monograph Structure -- I Combinatorial Bounds -- 3 Johnson-Type Bounds and Applications to List Decoding -- 4 Limits to List Decodability -- 5 List Decodability Vs. Rate -- II Code Constructions and Algorithms -- 6 Reed-Solomon and Algebraic-Geometric Codes -- 7 A Unified Framework for List Decoding of Algebraic Codes -- 8 List Decoding of…