Data Warehouse I -- A Tree Comparison Approach to Detect Changes in Data Warehouse Structures -- Extending the UML for Designing Association Rule Mining Models for Data Warehouses -- Event-Feeded Dimension Solution -- XML-OLAP: A Multidimensional Analysis Framework for XML Warehouses -- Data Warehouse II -- Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates -- E…
to Knowledge Discovery in Databases -- to Knowledge Discovery in Databases -- Preprocessing Methods -- Data Cleansing -- Handling Missing Attribute Values -- Geometric Methods for Feature Extraction and Dimensional Reduction -- Dimension Reduction and Feature Selection -- Discretization Methods -- Outlier Detection -- Supervised Methods -- to Supervised Methods -- Decision Trees -- Bayesian Net…
MOTIVATION AND MODELING ISSUES -- Databases: The Integrative Force in Cyberspace -- Federating Location-Based Data Services -- An Agent-Based Approach to Correctness in Databases -- INFRASTRUCTURAL SERVICES -- Thirty Years of Server Technology — From Transaction Processing to Web Services -- Caching over the Entire User-to-Data Path in the Internet -- Reweaving the Tapestry: Integrating Datab…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Keynote Lectures -- How Much Intelligence in the Semantic Web? -- The Wisdom Web – A Grand Intellectual Undertaking -- Measuring Attractiveness of Rules from the Viewpoint of Knowledge Representation, Prediction and Efficiency of Intervention -- Web Intelligence Meets Brain Informatics: An Impending Revolution in WI and Brain Sciences -- Case Studies -- Hybrid Computational Intelligence for A…
Scalable, Self-Organizing Technology for Sensor Networks -- On the Fundamental Relationship Between the Achievable Capacity and Delay in Mobile Wireless Networks -- Self-Optimization in Sensor Networks -- From Internets to Bionets: Biological Kinetic Service Oriented Networks -- Cooperative Routing in Wireless Networks -- In-Network Decision Making Via Local Message-Passing -- Maximizing Aggreg…
Session I: March 18, 2004, Heraklion, Crete, Greece -- Querying Sliding Windows Over Online Data Streams -- MIRA: Multilingual Information Processing on Relational Architecture -- Index-Based Keyword Search in Mediator Systems -- Concept-Based Search on Semi-structured Data Exploiting Mined Semantic Relations -- Distributed and Scalable Similarity Searching in Metric Spaces -- Pattern Based Man…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…
Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…