Invited Papers -- Patterns for the Pragmatic Web -- Conceptual Graphs for Semantic Web Applications -- Knowledge Representation and Reasoning in (Controlled) Natural Language -- What Is a Concept? -- Applications of Description Logics: State of the Art and Research Challenges -- Methodologies for the Reliable Construction of Ontological Knowledge -- Using Formal Concept Analysis and Information…
Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…
Information Organization -- Automatic Word Clustering for Text Categorization Using Global Information -- Text Classification Using Web Corpora and EM Algorithms -- Applying CLIR Techniques to Event Tracking -- Document Clustering Using Linear Partitioning Hyperplanes and Reallocation -- Automatic Summarization -- Summary Generation Centered on Important Words -- Sentence Compression Learned by…
Invited Papers -- Lexicographic Breadth First Search – A Survey -- Wireless Networking: Graph Theory Unplugged -- Graph Algorithms: Trees -- Constant Time Generation of Trees with Specified Diameter -- Treelike Comparability Graphs: Characterization, Recognition, and Applications -- Elegant Distance Constrained Labelings of Trees -- Collective Tree Spanners and Routing in AT-free Related Grap…
Text versus Talk -- Changing Cultures of Written Communication: Letter — E-mail — SMS -- Language in SMS — a socio-linguistic view -- Please reply! The replying norm in adolescent SMS communication -- Nascent Communication Genres within SMS and MMS -- Inside Text: an introduction -- Texting and the Moral Order of Place -- From Voice to Text: continuity and change in the use of mobile phon…
The large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The more information is available, the harder it is to locate any particular piece of it. And even when it has been successfully found, it is even harder still to usefully combine it with other information we may already possess. It is commonly understood that this problem of inf…
Service -- Implementation and Usability Evaluation of AAC System for Handicapped Persons -- Tracking Data Management of Spatial DBMS Using Topology for Location-Based Services -- Optimized Initiation Phases for Anonymous Auction Protocols -- Wireless I -- mSCTP for Vertical Handover Between Heterogeneous Networks -- Increasing TCP Capacity in Wireless Multihop Networks -- A Study on Scalable Bl…
Single Stream Networks -- Background -- The Negative Feedback Network -- Peer-Inhibitory Neurons -- Multiple Cause Data -- Exploratory Data Analysis -- Topology Preserving Maps -- Maximum Likelihood Hebbian Learning -- Dual Stream Networks -- Two Neural Networks for Canonical Correlation Analysis -- Alternative Derivations of CCA Networks -- Kernel and Nonlinear Correlations -- Exploratory Corr…
Graph Transformation -- On the Concurrent Semantics of Algebraic Graph Grammars -- From Graph Transformation to Software Engineering and Back -- Flexible Interconnection of Graph Transformation Modules -- Simulating Algebraic High-Level Nets by Parallel Attributed Graph Transformation -- Graph Processes with Fusions: Concurrency by Colimits, Again -- Graph Transformation with Variables -- Graph…
Models and Software Development -- Building a Model in VDM++: An Overview -- VDM++ Tool Support -- Modelling Object-oriented Systems in VDM++ -- Defining Data -- Defining Functionality -- Modelling Unordered Collections -- Modelling Ordered Collections -- Modelling Relationships -- Modelling in Practice: Three Case Studies -- Model Structuring: The Enigma Cipher -- Combining Views: The CSLaM Sy…