KEYNOTE SPEECHES -- Ranking Abstraction as Companion to Predicate Abstraction -- Developing High Quality Software with Formal Methods: What Else Is Needed? -- A Testing Architecture for Designing High-Reliable MANET Protocols -- REGULAR PAPERS -- A Composition Operator for Systems with Active and Passive Actions -- A Formal Semantics of UML StateCharts by Means of Timed Petri Nets -- A Hierarch…
Keynote Addresses -- Rethinking Computer Architecture Research -- Event Servers for Crisis Management -- DIET: Building Problem Solving Environments for the Grid -- The Future Evolution of High-Performance Microprocessors -- Low Power Robust Computing -- Networks and Games -- Plenary Session - Best Papers -- An Incentive Driven Lookup Protocol for Chord-Based Peer-to-Peer (P2P) Networks -- A No…
Overview -- Basic Computer Organization -- Pentium Assembly Language -- The Pentium Processor -- Overview of Assembly Language -- Procedures and the Stack -- Addressing Modes -- Arithmetic Flags and Instructions -- Selection and Iteration -- Logical and Bit Operations -- String Processing -- ASCII and BCD Arithmetic -- MIPS Assembly Language -- MIPS Processor -- MIPS Assembly Language -- Interr…
Parallel Job Scheduling — A Status Report -- Scheduling on the Top 50 Machines -- Parallel Computer Workload Modeling with Markov Chains -- Enhancements to the Decision Process of the Self-Tuning dynP Scheduler -- Reconfigurable Gang Scheduling Algorithm -- Time-Critical Scheduling on a Well Utilised HPC System at ECMWF Using Loadleveler with Resource Reservation -- Inferring the Topology and…
Mapping Problems with Finite-Domain Variables to Problems with Boolean Variables -- Mapping Problems with Finite-Domain Variables to Problems with Boolean Variables -- A SAT-Based Decision Procedure for the Boolean Combination of Difference Constraints -- An Algebraic Approach to the Complexity of Generalized Conjunctive Queries -- Incremental Compilation-to-SAT Procedures -- Resolve and Expand…
Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Rat…
Numerical Methods -- Algorithms and Computational Kernels -- Nonnumerical Algorithms -- Parallel Algorithms -- Environments and Libraries -- Performance and Scalability -- Programming Techniques -- Networks and Distributed Algorithms -- Parallel and Distributed Computing -- Grid Computing -- Failure Handling -- Optimization -- Modeling and Simulation -- Image Analysis and Processing -- Graphics…
Workshop on “Simulation of Multiphysics Multiscale Systems” -- Workshop on “Grid Computing Security and Resource Management” -- 2nd International Workshop on Active and Programmable Grids Architectures and Components (APGAC2005) -- International Workshop on Computational Nano-Science and Technology -- Workshop on “Collaborative and Cooperative Environments” -- Workshop on “Autonom…
Towards Global Collaborative Computing: Opportunities and Challenges of Peer to Peer Networks and Applications -- Session 1: Grid Service and Grid Security -- Session 2: Grid Middleware and Applications -- Session 3: Knowledge Grid and Semantic Grid -- Session 4: Resource Management -- Session 5: P2P Computing and Automatic Computing -- Session 6: Performance Evaluation and Modeling -- Session …
Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…