Invited Talks -- Security by, and for, Converged Mobile Devices -- Security for Ubiquitous Computing -- Block Cipher and Stream Cipher -- Algebraic Attacks on Combiners with Memory and Several Outputs -- New Method for Bounding the Maximum Differential Probability for SPNs and ARIA -- Dragon: A Fast Word Based Stream Cipher -- Public Key Cryptosystem -- An Efficient and Verifiable Solution to t…
SDL and eODL -- Deployment and Configuration of Distributed Systems -- eODL and SDL in Combination for Components -- Applying eODL and SDL-Patterns for Developing TMN Managed Systems -- SPT – The SDL Pattern Tool -- Evolution of Languages -- Comparing UML 2.0 Interactions and MSC-2000 -- Data Encoding for SDL in ITU-T Rec. Z.104 -- SDL in a Changing World -- Requirements and MSC -- Early Val…
An External Partial Permutations Memory for Ant Colony Optimization -- A Novel Application of Evolutionary Computing in Process Systems Engineering -- Choosing the Fittest Subset of Low Level Heuristics in a Hyperheuristic Framework -- An Attribute Grammar Decoder for the 01 MultiConstrained Knapsack Problem -- EvoGeneS, a New Evolutionary Approach to Graph Generation -- On the Application of E…
Invited Papers -- Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems -- Building Tailored Wireless Sensor Networks -- Users and Services in Intelligent Networks -- Wireless, Mobility and Emergency Network -- MAC Protocol for Contacts from Survivors in Disaster Areas Using Multi-hop Wireless Transmissions -- Performance Evaluation of Mobile IPv6 Wireless Test-Bed i…
Hard Real-Time Development Environments -- Executive Overview on Hard Real-Time Development Environments -- Hard Real-Time System Development -- Current Design Practice and Needs in Selected Industrial Sectors -- Tools for Requirements Capture and Exploration -- Tools for Architecture Design and Capture -- Tools for Programming, Code Generation, and Design -- Tools for Verification and Validati…
Switching and Control -- From Feedback Control to Complexity Management: A Personal Perspective -- Convex Cones, Lyapunov Functions, and the Stability of Switched Linear Systems -- Survey of Explicit Approaches to Constrained Optimal Control -- Gaussian Processes -- Analysis of Some Methods for Reduced Rank Gaussian Process Regression -- Filtered Gaussian Processes for Learning with Large Data-…
Keynotes -- Next Generation Software Product Line Engineering -- Software Product Families in Nokia -- Feature Modelling -- Feature Models, Grammars, and Propositional Formulas -- Using Product Sets to Define Complex Product Decisions -- The PLUSS Approach – Domain Modeling with Features, Use Cases and Use Case Realizations -- Re-engineering -- Feature-Oriented Re-engineering of Legacy System…
Invited Talks -- Data Analysis in the Life Sciences — Sparking Ideas — -- Machine Learning for Natural Language Processing (and Vice Versa?) -- Statistical Relational Learning: An Inductive Logic Programming Perspective -- Recent Advances in Mining Time Series Data -- Focus the Mining Beacon: Lessons and Challenges from the World of E-Commerce -- Data Streams and Data Synopses for Massive D…
Hardness Amplification and Error Correction -- Optimal Error Correction Against Computationally Bounded Noise -- Hardness Amplification of Weakly Verifiable Puzzles -- On Hardness Amplification of One-Way Functions -- Graphs and Groups -- Cryptography in Subgroups of -- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs -- Simulation and Secure Computat…
Papers -- Reconfiguring Triangulations with Edge Flips and Point Moves -- Drawing Power Law Graphs -- Hexagonal Grid Drawings: Algorithms and Lower Bounds -- Improved Bounds for the Number of (? k)-Sets, Convex Quadrilaterals, and the Rectilinear Crossing Number of K n -- On the Realizable Weaving Patterns of Polynomial Curves in -- Drawing the AS Graph in 2.5 Dimensions -- Boundary Labeling:…