Recent Developments in Equilibria Algorithms -- Partially-Specified Large Games -- Exchange Market Equilibria with Leontief’s Utility: Freedom of Pricing Leads to Rationality -- A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property -- Click Fraud Resistant Methods for Learning Click-Through Rates -- Experiments with an Economic Model of the…
Concepts and Models -- Brief Historical Perspective for Virtual Organizations -- Base Concepts -- Modeling for Virtual Organizations -- Reference Models for Virtual Organisations -- Ontology and Knowledge Management -- Collaborative Networks: A New Scientific Discipline -- Infrastructures -- ICT Infrastructures for VO -- Emerging Technologies and Standards -- Security Frameworks for Virtual Org…
Invited Talks -- The Pervasive Sensor -- From Everyday Things to Everyday Memories: Two Kinds of Interactions with Objects in a House -- Location-aware Computing -- Design, Implementation and Evaluations of a Direction Based Service System for Both Indoor and Outdoor -- Designing Transparent Location-Dependent Web-Based Applications on Mobile Environments -- Position Tracking Using Infra-Red Si…
Network and Capacity Planning -- Performance of Hierarchical Cellular Networks with Overlapping Cells -- A Hybrid Model of the UMTS Downlink Capacity with WWW Traffic on Dedicated Channels -- Performance of Different Proxy Concepts in UMTS Networks -- Algorithms for WLAN Coverage Planning -- Optimization Models for Designing Aggregation Networks to Support Fast Moving Users -- Medium Access and…
Universal Access in Health Telematics -- 1 Universal Access -- 2 Trends in Health Telematics: Electronic Health Records in an Intelligent and Communicating Environment -- 3 Towards a Universal Access Code of Practice in Health Telematics -- Reference Scenarios -- 4 The HYGEIAnet Reference Scenario -- 5 The SPERIGEST Integrated System -- 6 The Barmerzige Schwestern Reference Scenario -- 7 The Cl…
Research Overview and Technologies for Internet Security -- Impacts of TEI on SMEs -- Risk Assessment of TEI on TEISME -- Methodology -- Analysis of Results -- Critical Evaluation and Discussion -- Conclusion.The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of …
NTP: The Key to Time Transcendence -- Multiple Views of Time -- Network Administration and IT Trends Throughout History! -- NTP: The Story Behind the Accuracy and Synchronization of Network Time -- NTP Operational, Historical, and Futuristic Overview -- NTP Architecture -- NTP Design, Configuration, and Troubleshooting.Have you ever tried to figure out why your computer clock is off, or why you…
Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network Security -- Security Challenges to Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Dealing with Network Security Challenges -- Access Control and Authoriz…
The JADE Platform and Experiences with Mobile MAS Applications -- A-globe: Agent Development Platform with Inaccessibility and Mobility Support -- Supporting Agent Development in Erlang through the eXAT Platform -- Living Systems® Technology Suite -- Multi Agent System Development Kit -- An Integrated Development Environment for Electronic Institutions -- Jadex: A BDI-Agent System Combining Mi…
Shared-Path Protection for Resource Efficiency -- Sub-Path Protection for Scalability and Fast Recovery -- Segment Protection for Bandwidth Efficiency and Differentiated Quality of Protection -- Survivable Traffic Grooming-Dedicated Protection -- Survivable Traffic Grooming-Shared Protection -- Survivable Virtual Concatenation for Data Over Sonet/Sdh.Survivable Optical WDM Networks investigates…