Database Systems -- Database System Architecture – A Walk Through Time: From Centralized Platform to Mobile Computing – Keynote Address -- Extending Wide-Area Replication Support with Mobility and Improved Recovery -- Extending Databases to Precision-Controlled Retrieval of Qualitative Information -- An Approach for Solving Very Large Scale Instances of the Design Distribution Problem for D…
Invited Presentations -- Another Look at Dynamic Ad-Hoc Wireless Networks -- Routing in Wireless Networks and Local Solutions for Global Problems -- Contributed Papers -- Equilibria for Broadcast Range Assignment Games in Ad-Hoc Networks -- Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks -- Cluster-Based Framework in Vehicular Ad-Hoc Networks -- Randomiz…
Gödel Machines: Towards a Technical Justification of Consciousness -- Postext – A Mind for Society -- Comparing Resource Sharing with Information Exchange in Co-operative Agents, and the Role of Environment Structure -- Baselines for Joint-Action Reinforcement Learning of Coordination in Cooperative Multi-agent Systems -- SMART (Stochastic Model Acquisition with ReinforcemenT) Learning Agent…
Introduction, Motivation and Historical Background -- Router Architecture -- to the IOS and JUNOS Command Line Interface -- IS-IS Basics -- Neighbour Discovery and Handshaking -- Generating, Flooding and Ageing LSPs -- Pseudonodes and Designated Routers -- Synchronizing Databases -- Fragmentation -- SPF and Route Calculation -- TLVs and Sub-TLVs -- IP Reachability Information -- IS-IS Extension…
Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -…
Keynote -- Location Awareness: Potential Benefits and Risks -- Context Information Management and Distribution -- Context Modelling and Management in Ambient-Aware Pervasive Environments -- A Context Architecture for Service-Centric Systems -- Towards Realizing Global Scalability in Context-Aware Systems -- Positioning Sensor Systems I -- Towards LuxTrace: Using Solar Cells to Measure Distance …
Memory-Constrained Communication Minimization for a Class of Array Computations -- Forward Communication Only Placements and Their Use for Parallel Program Construction -- Hierarchical Parallelism Control for Multigrain Parallel Processing -- Compiler Analysis and Supports for Leakage Power Reduction on Microprocessors -- Automatic Detection of Saturation and Clipping Idioms -- Compiler Optimiz…
Experiences in Using Cetus for Source-to-Source Transformations -- The LLVM Compiler Framework and Infrastructure Tutorial -- An Overview of the Open Research Compiler -- Trimaran: An Infrastructure for Research in Instruction-Level Parallelism -- Phase-Based Miss Rate Prediction Across Program Inputs -- Speculative Subword Register Allocation in Embedded Processors -- Empirical Performance-Mod…
Principles and Overview -- An Introduction to DNS -- Zone Files and Resource Records -- DNS Operations -- DNS Types -- DNS and IPv6 -- Get Something Running -- Installing BIND -- BIND Type Samples -- Common DNS Tasks -- DNS Diagnostics and Tools -- DNS Security -- DNS Secure Configurations -- DNSSEC -- Reference -- BIND Configuration Reference -- Zone File Reference -- Proqramming -- BIND APIs …
A Background for Networked Digital Media -- Digital Coding of Audio and Video -- Communication Networks and Technologies -- Internet Protocols, Services and Software -- Media Protocols and Applications.This text is a light technical introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking), compressi…