Sharper Upper and Lower Bounds for an Approximation Scheme for Consensus-Pattern -- On the Longest Common Rigid Subsequence Problem -- Text Indexing with Errors -- A New Compressed Suffix Tree Supporting Fast Search and Its Construction Algorithm Using Optimal Working Space -- Succinct Suffix Arrays Based on Run-Length Encoding -- Linear-Time Construction of Compressed Suffix Arrays Using o(n l…
Conservation of Combinatorial Structures in Evolution Scenarios -- Toward a Phylogenetically Aware Algorithm for Fast DNA Similarity Search -- Multiple Genome Alignment by Clustering Pairwise Matches -- On the Structure of Reconciliations -- The Statistical Significance of Max-Gap Clusters -- Identifying Evolutionarily Conserved Segments Among Multiple Divergent and Rearranged Genomes -- Genome…
Lower Bounds for Maximum Parsimony with Gene Order Data -- Genes Order and Phylogenetic Reconstruction: Application to ?-Proteobacteria -- Maximizing Synteny Blocks to Identify Ancestral Homologs -- An Expectation-Maximization Algorithm for Analysis of Evolution of Exon-Intron Structure of Eukaryotic Genes -- Likely Scenarios of Intron Evolution -- OMA, A Comprehensive, Automated Project for th…
(Semi-) Plenary Presentations -- Classification and Data Analysis: Classification; Data Analysis -- Applications -- Archaeology; Astronomy; Bio-Sciences; Electronic Data and Web; Finance and Insurance; Library Science and Linguistics; Macro-Economics; Marketing; Music Science; Quality Assurance -- Contest: Social Milieus in Dortmund.
Authentication, Encryption, Certification and Traceability in E-Services -- Safeguards, Interception, Tracking and Firewall Technology -- Administration, Management, Risk Analysis and Organizational Issues -- Mobile Access, Network Protocol and Multilateral Security -- Certification Authorities -- Public Key Infrastructures.International Federation for Information Processing The IFIP series pub…
The Influence of Context on Privacy, Trust and Security -- Some Research Challenges in Pervasive Computing -- Overview -- Survey on Location Privacy in Pervasive Computing -- Exploring the Relationship Between Context and Privacy -- Privacy, Security and Trust Issues Raised by the Personal Server Concept -- Secure Trust Models and Management in Pervasive Computing -- Overview -- The Role of Ide…
Distributed Objects and Applications (DOA) 2005 International Conference (continued) -- Evaluation of Three Approaches for CORBA Firewall/NAT Traversal -- On the Design of Access Control to Prevent Sensitive Information Leakage in Distributed Object Systems: A Colored Petri Net Based Model -- Offline Business Objects: Enabling Data Persistence for Distributed Desktop Applications -- Middleware …
OTM 2005 Keynotes -- Probabilistic Ontologies and Relational Databases -- Intelligent Web Service – From Web Services to .Plug&Play. Service Integration -- Process Modeling in Web Applications -- Cooperative Information Systems (CoopIS) 2005 International Conference -- CoopIS 2005 PC Co-chairs’ Message -- Let’s Go All the Way: From Requirements Via Colored Workflow Nets to a BPEL Implemen…
Invited Lectures -- Data Structures I -- Cryptography and Complexity -- Data Structures II -- Cryptography and Distributed Systems -- Graph Algorithms I -- Security Mechanisms -- Graph Algorithms II -- Automata and Formal Languages I -- Signature and Message Authentication -- Algorithmic Game Theory -- Automata and Logic -- Computational Algebra -- Cache-Oblivious Algorithms and Algorithmic Eng…
Invited Papers -- Evolution of Enterprise Information Systems in the Internet Era -- Managing Change — Evolving the EIS Vision -- Automatic Speech Recognition: A Review -- Reasoning with Goals to Engineer Requirements -- Real-Time Knowledge-Based Systems for Enterprise Decision Support and Systems Analysis -- Is Engineering Getting Out of Classical System Engineering -- Databases and Informat…