to Semantic Web Ontology Languages -- Rules and Ontologies in F-Logic -- Web and Semantic Web Query Languages: A Survey -- Evolution and Reactivity for the Web -- Personalization for the Semantic Web -- Attempto Controlled English: A Knowledge Representation Language Readable by Humans and Machines -- Rule Modeling and Markup -- Information Extraction for the Semantic Web -- Reuse in Semantic A…
Queues: The Art of Modelling -- Markov Chains and Queues in Discrete Time -- Homogeneous Markov Processes on Discrete State Spaces -- Markovian Queues in Continuous Time -- Markovian Queueing Networks -- Renewal Theory -- Markov Renewal Theory -- Semi-Markovian Queues -- Phase-Type Distributions -- Markovian Arrival Processes -- The GI/PH/1 Queue -- The BMAP/G/1 Queue -- Discrete Time Approache…
Privacy/Anonymity -- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols -- Personal Attributes and Privacy -- Mobile Security 1 -- Local Management of Credits and Debits in Mobile Ad Hoc Networks -- How Secure are Current Mobile Operating Systems? -- An Overview of Security Issues and Techniques in Mobile Agents -- Mobile Security 2 -- A Secure Channel Protocol for …
Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Ma…
Innovative Business Models -- Value Process and Business Process in E-Business Modelling -- VA3: Governance Selection in Value Webs -- From an E-Business Revenue Model to Its Software Reference Architecture -- e-Collaboration and e-Services -- Selecting Supply Partners for E-Collaboration in Supply Chains -- E-Collaboration Architecture for Customer-Driven Business Processes in Inter-Organizati…
Authentication, Encryption, Certification and Traceability in E-Services -- Safeguards, Interception, Tracking and Firewall Technology -- Administration, Management, Risk Analysis and Organizational Issues -- Mobile Access, Network Protocol and Multilateral Security -- Certification Authorities -- Public Key Infrastructures.International Federation for Information Processing The IFIP series pub…
to Stream Data Management -- Query Execution and Optimization -- Filtering, Punctuation, Windows and Synopses -- XML & Data Streams -- CAPE: A Constraint-Aware Adaptive Stream Processing Engine -- Efficient Support for Time Series Queries in Data Stream Management Systems -- Managing Distributed Geographical Data Streams with the GIDB Portal System -- Streaming Data Dissemination Using Peer-Pee…
The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- The Software -- The PIC16F84 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language Code Building Tools -- High-Level Language -- The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Ro…
Keynotes -- Reexamining the Role of Interactions in Software Architecture -- Are Successful Test Cases Useless or Not? -- QoSA Long Papers -- DoSAM – Domain-Specific Software Architecture Comparison Model -- An Architecture-Centric Approach for Producing Quality Systems -- A Model-Oriented Framework for Runtime Monitoring of Nonfunctional Properties -- Predicting Mean Service Execution Times …
Analytical Models -- An Analytical Model of a New Packet Marking Algorithm for TCP Flows -- Of Mice and Models -- A Dual Approach to Network Calculus Applying the Legendre Transform -- Service Curve Estimation by Measurement: An Input Output Analysis of a Softswitch Model -- Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach -- Traffic Characterization -- Packet S…