Keynote Speech -- Track 1: Embedded Hardware -- Track 2: Embedded Software -- Track 3: Real-Time Systems -- Track 4: Power-Aware Computing -- Track 5: Hardware/Software Co-design and System-On-Chip -- Track 6: Testing and Verification -- Track 7: Reconfigurable Computing -- Track 8: Agent and Distributed Computing -- Track 9: Wireless Communications -- Track 10: Mobile Computing -- Track 11: Pe…
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005) -- IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005) -- The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) -- The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005) -- The International Workshop on Trusted and …
Keynote -- Embedded Hardware -- Embedded Software -- Real-Time Systems -- Power-Aware Computing -- H/S Co-design and Systems-on-Chip -- Testing and Verification -- Reconfigurable Computing -- Agent and Distributed Computing -- Wireless Communications -- Mobile Computing -- Multimedia, HCI and Pervasive Computing -- Network Protocol, Security and Fault-Tolerance -- Middleware and P2P Computing.W…
Introduction -- New Products and Services -- Process Efficiency through Customer Integration -- Data Format Standards -- PDF/X-3 -- JDF -- XML -- Process Efficiency through Self Service: Self-Directed Customers -- Online Calculation -- Placing Orders Online -- Remote Preflight -- Web Printing -- Order Tracking -- Archiving Orders and Offerings -- Stock Reporting Systems -- Online Ordering Syste…
Keynote I -- A Process Toward Total Dependability – Airbus Fly-by-Wire Paradigm -- Session 1A: Distributed Algorithms -- Building and Using Quorums Despite any Number of Process of Crashes -- Failure Detection with Booting in Partially Synchronous Systems -- Total Order Communications: A Practical Analysis -- Gracefully Degrading Fair Exchange with Security Modules -- Session 1B: Fault Tolera…
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation…