Network Security I -- A Dynamic Mechanism for Recovering from Buffer Overflow Attacks -- SVision: A Network Host-Centered Anomaly Visualization Technique -- Trust & Privacy -- Time-Based Release of Confidential Information in Hierarchical Settings -- “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience -- A Privacy Preservi…
Soft Computing Techniques in Stock Markets -- Intelligent Network Based Education -- Maintenance and Customization of Business Knowledge -- Intelligent Data Processing in Process Systems and Plants -- Intelligent Agent Technology and Applications I -- Intelligent Design Support Systems -- Data Engineering, Knowledge Engineering and Ontologies -- Knowledge Discovery and Data Mining -- Advanced N…
Holistic Approaches to Collaborative Networks -- Breeding Environments Management -- VO Creation and Frameworks -- VO Creation and Partner Selection -- VO Creation and Optimization -- Trust Management -- VO Management -- VO Coordination -- Network Benefit Analysis -- Performance Measurement -- Performance Management -- Modeling and Meta-Modeling -- Process Modeling -- Professional Virtual Commu…
Introductory Chapter -- An Introduction to Human-Centered Software Engineering -- Principles, Myths and Challenges -- Key Principles for User-Centred Systems Design -- HCI, Usability and Software Engineering Integration: Present and Future -- Surveying the Solitudes: An Investigation into the Relationships between Human Computer Interaction and Software Engineering in Practice -- Convergence or…
Why Agility Now? -- Agility in Fours: IT Diffusion, IT Infrastructures, IT Development, and Business -- Information Technology Diffusion Research: An Interim Balance -- Agility in Information Systems Development: A Three-Tiered Framework -- Agile IT Diffusion -- Navigating Software Process Improvement Projects -- Mapping Social Networks in Software Process Improvement: An Action Research Study …
Iris -- Face I (Short) -- Finger-I (Short) -- Face-I -- Fingerprint -- Security and Smartcard -- Short Oral -- Short Oral-4 -- Fusion -- Multi-modal -- 50 – 5:50 Oral-7 (Palm and Finger Surface) -- Speaker and Gait -- Face II -- Poster I -- Poster II.This book constitutes the refereed proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person Authentication, AV…
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Invited Talks -- Automorphisms of Finite Rings and Applications to Complexity of Problems -- Algebraic Generating Functions in Enumerative Combinatorics and Context-Free Languages -- Algorithmics in Exponential Time -- Session 1A -- Worst-Case and Average-Case Approximations by Simple Randomized Search Heuristics -- Sampling Sub-problems of Heterogeneous Max-cut Problems and Approximation Algor…
Systems of Containers and Enumeration Problems -- Some Heuristic Analysis of Local Search Algorithms for SAT Problems -- Clustering in Stochastic Asynchronous Algorithms for Distributed Simulations -- On Construction of the Set of Irreducible Partial Covers -- Recent Advances in Multiobjective Optimization -- Polynomial Time Checking for Generation of Finite Distributions of Rational Probabilit…