Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Preface -- Solving Over-Constrained Problems with SAT Technology -- A Symbolic Search Based Approach for Quantified Boolean Formulas -- Substitutional Definition of Satisfiability in Classical Propositional Logic -- A Clause-Based Heuristic for SAT Solvers -- Effective Preprocessing in SAT Through Variable and Clause Elimination -- Resolution and Pebbling Games -- Local and Global Complete Solu…
String Processing and Information Retrieval 2005 -- Enhanced Byte Codes with Restricted Prefix Properties -- Experimental Analysis of a Fast Intersection Algorithm for Sorted Sequences -- Compressed Perfect Embedded Skip Lists for Quick Inverted-Index Lookups -- XML Retrieval with a Natural Language Interface -- Recommending Better Queries from Click-Through Data -- A Bilingual Linking Service …
Mixed-Integer Cuts from Cyclic Groups -- Optimizing over the First Chvàtal Closure -- Sequential Pairing of Mixed Integer Inequalities -- Approximate Min-max Relations for Odd Cycles in Planar Graphs -- Disjoint Cycles: Integrality Gap, Hardness, and Approximation -- A Combinatorial Algorithm to Find a Maximum Even Factor -- Improved Approximation Schemes for Linear Programming Relaxations of …
Research Papers -- An Output-Polynomial Time Algorithm for Mining Frequent Closed Attribute Trees -- Guiding Inference Through Relational Reinforcement Learning -- Converting Semantic Meta-knowledge into Inductive Bias -- Learning Teleoreactive Logic Programs from Problem Solving -- A Framework for Set-Oriented Computation in Inductive Logic Programming and Its Application in Generalizing Inver…
Data Mining and Knowledge Engineering -- EXiT-B: A New Approach for Extracting Maximal Frequent Subtrees from XML Data -- Synthetic Environment Representational Semantics Using the Web Ontology Language -- New Rules for Hybrid Spatial Reasoning -- Using Pre-aggregation for Efficient Spatial Query Processing in Sensor Environments -- Model Trees for Classification of Hybrid Data Types -- Finding…
Invited Talks -- The Evolution of Optimality: De Novo Programming -- Many-Objective Optimization: An Engineering Design Perspective -- Tutorial -- 1984-2004 – 20 Years of Multiobjective Metaheuristics. But What About the Solution of Combinatorial Problems with Multiple Objectives? -- Algorithm Improvements -- Omni-optimizer: A Procedure for Single and Multi-objective Optimization -- An EMO Al…
Keynote Addresses -- Data Confidentiality in Collaborative Computing -- Productivity in High Performance Computing -- A New Approach to Programming and Prototyping Parallel Systems -- The Changing Challenges of Collaborative Algorithmics -- Quantum Physics and the Nature of Computation -- Plenary Session - Best Papers -- Preemption Adaptivity in Time-Published Queue-Based Spin Locks -- Critical…
Keynote Speech -- Track 1: Network Protocols, Routing, Algorithms -- Track 2: Languages and Compilers for HPC -- Track 3: Parallel/Distributed System Architectures -- Track 4: Embedded Systems -- Track 5: Parallel/Distributed Algorithms -- Track 6: Wireless and Mobile Computing -- Track 7: Web Services and Internet Computing -- Track 8: Peer-to-Peer Computing -- Track 9: Grid and Cluster Comput…
Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Enc…