Restricted Towers of Hanoi and Morphisms -- Collapsing Words: A Progress Report -- Locally Consistent Parsing and Applications to Approximate String Comparisons -- Central Sturmian Words: Recent Developments -- Reversible Cellular Automata -- Inexpressibility Results for Regular Languages in Nonregular Settings -- Complexity of Quantum Uniform and Nonuniform Automata -- Membership and Finitenes…
Invited Talks -- Discovering Treewidth -- From Research Prototypes to Industrial Strength Open Source Products – The ObjectWeb Experience -- How Hard Is It to Take a Snapshot? -- Logical Foundations for Data Integration -- Recent Advances in Graph Drawing -- The Hyperdatabase Network – New Middleware for Searching and Maintaining the Information Space -- Architecture of a Business Framework…
Web Mining -- Web Information Retrieval -- Metadata Management -- Ontology and Semantic Web -- XML -- Web Service Method -- Web Service Structure -- Collaborative Methodology -- P2P, Ubiquitous and Mobile -- Document Retrieval Applications -- Short Paper Session 1: Web Services and E-Commerce -- Short Paper Session 2: Recommendation and Web Information Extraction -- Short Paper Session 3: P2P, …
The Cognitive Framework for Information -- The Development of Information Seeking Research -- System-Oriented Information Retrieval -- Cognitive and User-Oriented Information Retrieval -- The Integrated IS&R Research Framework -- Implications of the Cognitive Framework for IS&R -- Towards a Research Program -- Conclusion.T The Turn analyzes the research of information seeking and retrieval (IS&…
Fair Exchange -- An Evenhanded Certified Email System for Contract Signing -- Efficient ID-Based Optimistic Fair Exchange with Provable Security -- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol -- Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme…
Innovations in Intelligent Systems and Their Applications -- Data Mining and Soft Computing Applications II -- Skill Acquisition and Ubiquitous Human Computer Interaction -- Soft Computing and Their Applications – IV -- Agent-Based Workflows, Knowledge Sharing and Reuse -- Multi-media Authentication andWatermarking Applications -- Knowledge and Engineering Techniques for Spatio-temporal Appli…
Short Tour Through the Book -- Simplicity & Uncertainty -- Universal Sequence Prediction -- Agents in Known Probabilistics Environments -- The Universal Algorithmic Agent AIXI -- Important Environmental Classes -- Computational Aspects -- Discussion.Decision Theory = Probability + Utility Theory + + Universal Induction = Ockham + Bayes + Turing = = A Unified View of Artificial Intelligence This…
Workshops -- Consistency Problems in UML-Based Software Development -- 5th International Workshop on Aspect-Oriented Modeling -- Software Architecture Description and UML -- SVERTS – Specification and Validation of Real-Time and Embedded Systems -- Essentials of the 3rd UML Workshop in Software Model Engineering (WiSME’2004) -- Open Issues in Industrial Use Case Modeling -- Models for Non-…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Surve…