Genetic algorithms: a guide for absolute beginners -- Evolutionary algorithms and their theory -- Epistasis -- Examples -- Walsh transforms -- Multary epistasis -- Generalized Walsh transforms.
Implementation of Functional Languages -- Lazy Assertions -- Interfacing Haskell with Object-Oriented Languages -- A Functional Shell That Dynamically Combines Compiled Code -- Polymorphic Type Reconstruction Using Type Equations -- Correctness of Non-determinism Analyses in a Parallel-Functional Language -- Inferring Cost Equations for Recursive, Polymorphic and Higher-Order Functional Program…
Session 1 - Digital Media Watermarking Session Chair: Lisa Marvel (University of Delaware) -- An Implementation of, and Attacks on, Zero-Knowledge Watermarking -- On the Possibility of Non-invertible Watermarking Schemes -- Reversing Global and Local Geometrical Distortions in Image Watermarking -- On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems -- Fixed-Distortion…
Security Standards -- Information Security Standards: Adoption Drivers (Invited Paper) -- Data Quality Dimensions for Information Systems Security: A Theoretical Exposition (Invited Paper) -- From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) -- Security Culture -- How Much Should We Pay for Security? (Invited Paper) -- Do Not Ship, or Receive, Trojan Horses -- Employee…
Cellular Networks: Where Are the Mobile Users? -- Distributed Data Structures: A Survey -- On Designing Truthful Mechanisms for Online Scheduling -- On Private Computation in Incomplete Networks -- Traffic Grooming on the Path -- Range Augmentation Problems in Static Ad-Hoc Wireless Networks -- On the Approximability of the L(h,k)-Labelling Problem on Bipartite Graphs (Extended Abstract) -- A T…
Toward a Mathematical Theory of Aeroelasticity -- Uniform Cusp Property, Boundary Integral, and Compactness for Shape Optimization -- Interior and Boundary Stabilization of Navier-Stokes Equations -- Matrix Rounding and Related Problems with Application to Digital Halftoning -- Nonlinear Programming: Algorithms, Software, and Applications -- Stochastic Modeling and Optimization of Complex Infra…
Invited Talk -- On Joint Coding for Watermarking and Encryption -- Anonymity -- Compulsion Resistant Anonymous Communications -- Provable Anonymity for Networks of Mixes -- On Blending Attacks for Mixes with Memory -- Pervasive Random Beacon in the Internet for Covert Coordination -- Censorship Resistance Revisited -- Watermarking -- Optimal Embedding for Watermarking in Discrete Data Spaces --…
Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Rat…
Research Papers -- Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry -- An Organisational Perspective on Collaborative Business Processes -- Mining Hierarchies of Models: From Abstract Views to Concrete Specifications -- Flexible Business Process Management Using Forward Stepping and Alternative Paths -- Semi-automatic Generation of Web Services and BPEL Proce…
Intelligent Agent Ontologies and Environments -- Intelligent Multimedia Solutions and the Security in the Next Generation Mobile Networks -- Intelligent E-Mail Analysis, News Extraction and Web Mining -- Semantic Integration and Ontologies -- Computer Vision, Image Processing and Retrieval -- Communicative Intelligence II -- Approaches and Methods to Security Engineering V -- Multimedia Retriev…