Massively Multi-agent Technology -- Agent Server Technology for Managing Millions of Agents -- Exploring Flows in the Intelligent Agent Grid Environment -- Adaptive Agent Allocation for Massively Multi-agent Applications -- Hierarchical Resource Usage Coordination for Large-Scale Multi-agent Systems -- Towards Fault-Tolerant Massively Multiagent Systems -- Virtual Space Ontologies for Scripting…
Telemedical Applications and Grid Technology -- Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach -- A Grid Molecular Simulator for E-Science -- Application Driven Grid Developments in the OpenMolGRID Project -- ATLAS Data Challenge 2: A Massive Monte Carlo Production on the Grid -- High Throughput Computing for Spatial Information Processing (HIT-SIP) System …
Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other Hash Functions -- Collisions of SHA-0 and Reduced SHA-1 -- Theory I -- Reducing Complexity Assumptions for Statistically-Hiding Commitment -- Smooth Projective Hashing and Two-Message Oblivious Transfer -- On Robust Combiners for Oblivious Transfer and Other Primitives -- Encryption I -- Efficien…
Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characteriza…
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Keynote Address I -- Processor Architecture for Trustworthy Computers -- Session 1A: Energy Efficient and Power Aware Techniques -- Efficient Voltage Scheduling and Energy-Aware Co-synthesis for Real-Time Embedded Systems -- Energy-Effective Instruction Fetch Unit for Wide Issue Processors -- Rule-Based Power-Balanced VLIW Instruction Scheduling with Uncertainty -- An Innovative Instruction Cac…
Invited Contributions -- Towards a Unified Model for Web Services Composition -- Peer-to-Peer Data Integration with Active XML -- Query Incentive Networks -- Database and Information Retrieval Techniques for XML -- Regular Contributions -- Implementing a Tamper-Evident Database System -- Ontology Engineering from a Database Perspective -- Retracted: Shared Ontology for Pervasive Computing -- Pr…
Wireless Networking Technologies -- A New Performance Parameter for IEEE 802.11 DCF -- An Energy*Delay Efficient Routing Scheme for Wireless Sensor Networks -- Adaptive Supporting Prioritized Soft Handoff Calls for Power-Controlled DS-CDMA Cellular Networks -- Performance Bounds for Mobile Cellular Networks with Handover Prediction -- Wireless Network Applications -- Adaptive Trunk Reservation …
IT management: The basis -- The basis of the field -- Supplying IT products and services within an architecture -- Traditional IT management: organizing demand and supply -- Task focussed and simultaneous process-focussed supply of facilities -- The demand-side: functional management (using the method BiSL) -- The supply-side: application management (using the method ASL) -- The supply-side: ex…
Advanced Issues in Ad-Hoc Networking -- Highly Scalable Routing Strategies: Dztr Routing Protocol -- Localised Minimum Spanning Tree Flooding in Ad-Hoc Networks -- A Presence System for Autonomous Networks -- Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks -- Cross Layer Design for Ad-Hoc Networks -- Ideas for Advanced Mobility Support -- Federated Service Platform Solutions for He…