Keynote I -- A Process Toward Total Dependability – Airbus Fly-by-Wire Paradigm -- Session 1A: Distributed Algorithms -- Building and Using Quorums Despite any Number of Process of Crashes -- Failure Detection with Booting in Partially Synchronous Systems -- Total Order Communications: A Practical Analysis -- Gracefully Degrading Fair Exchange with Security Modules -- Session 1B: Fault Tolera…
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Independent Safety Assessment -- The IEE/BCS Independent Safety Assurance Working Group -- Putting Trust into Safety Arguments -- Independent Safety Assessment of Safety Arguments -- Safety and Security -- Structuring a Safety Case for an Air Traffic Control Operations Room -- SafSec: Commonalities Between Safety and Security Assurance -- Accident Investigation -- Learning from a Train Derailme…
Peer-to-Peer Networks -- Performance of Internet Protocols I -- Wireless Security -- Network Security -- Wireless Performance -- Network Service Support -- Network Modeling and Simulations -- Wireless LANs -- Optical Networking -- Performance of Internet & Web Applications -- Ad Hoc Networks I -- Adaptive Networking -- Performance of Internet Protocols II -- Radio Resource Management -- Interne…
to Functional Verification -- Architecture Specification -- Architecture Specification -- Validation of Specification -- Top-Down Validation -- Executable Model Generation -- Design Validation -- Functional Test Generation -- Future Directions -- Conclusions.Validation of programmable architectures, consisting of processor cores, coprocessors, and memory subsystems, is one of the major bottlene…
Introduction to Control Reconfiguration -- Literature Overview -- Part I. Reconfiguration Problem -- Running Example: the 2-Tank System -- General Reconfiguration Problem -- Part II. Linear Solution Approaches -- Direct Reconfiguration Using a Static Block -- Reconfiguration Using a Virtual Sensor -- Reconfiguration Using a Virtual Actuator -- Reconfiguration with Set-Point Tracking -- Reconfig…
Advanced neural network theory and algorithms -- Advanced evolutionary computing theory and algorithms, such as particle swarm optimization, differential evolution, ant colonies, artificial life, artificial immune systems and genetic algorithm -- Fuzzy, neural, and fuzzy-neuro hybrids -- Intelligent modeling, monitoring, and control of complex nonlinear systems -- Intelligent modeling and simul…
Natural and Multimodal Interactivity Engineering - Directions and Needs -- Natural and Multimodal Interactivity Engineering - Directions and Needs -- Making Dialogues More Natural: Empirical Work and Applied Theory -- Social Dialongue with Embodied Conversational Agents -- A First Experiment in Engagement for Human-Robot Interaction in Hosting Activities -- Annotation and Analysis of Multimodal…
Related Work -- Data Analysis and Domain Model Construction -- Incorporating Additional Knowledge -- A Dialogue System for Partially Structured Data -- UKSearch - Intelligent Web Search -- UKSearch - Evaluation and Discussion -- YPA - Searching Classified Directories -- Future Directions and Conclusions.Collections of digital documents can nowadays be found everywhere in institutions, universit…
Design of IP Networks with End-To-End Performance Guarantees -- Design of IP Virtual Private Networks under End-To-End QoS Constraints -- Design of Protected Working Capacity Envelopes Based on p-Cycles: An Alternative Framework for Survivable Automated Lightpath Provisioning -- Network Traffic Engineering with Varied Levels of Protection in the Next Generation Internet -- Balancing Traffic Flo…