Invited Speakers -- Computer Networks -- Sensor and Satellite Networks -- Security and Cryptography -- Performance Evaluation -- E-Commerce and Web Services -- Multiagent Systems -- Machine Learning -- Information Retrieval and Natural Language Processing -- Image and Speech Processing -- Algorithms and Database Systems -- Theory of Computing -- Epilogue.
Peer-2-Peer Systems -- Web Services -- Grid Computing -- Jini -- Gnutella -- Scalability -- Security -- Freenet -- Jxta -- Distributed Object Deployment Using Jini -- P2P Deployment Using Jxta -- Web Services Deployment -- OGSA.
to Multimedia Security -- Digital Rights Management for Multimedia -- Multimedia Cryptography -- to Multimedia Encryption -- An Overview of Modern Cryptography -- Important Modern Cryptosystems -- Image Encryption Algorithms -- Video Encryption Algorithms -- Speech and Audio Encryption -- Visual and Audio Secret Sharing -- Multimedia Watermarking -- to Watermarking -- Applications of Digital Wa…
MDA Development Processes -- Applying MDA to Voice Applications: An Experience in Building an MDA Tool Chain -- MDA, Meta-Modelling and Model Transformation: Introducing New Technology into the Defence Industry -- Using Domain Driven Development for Monitoring Distributed Systems -- MDA for Embedded and Real-Time Systems -- Model-Driven Architecture for Hard Real-Time Systems: From Platform Ind…
Designing Application Domain Models with Roles -- Model Bus: Towards the Interoperability of Modelling Tools -- Modeling in the Large and Modeling in the Small -- Model-Driven Development of Reconfigurable Mechatronic Systems with Mechatronic UML -- Model Transformation Language MOLA -- A Graphical Notation to Specify Model Queries for MDA Transformations on UML Models -- Describing Horizontal…
Take Risks into Consideration while Job Dispatching -- Support of Smart Work Processes in Context Rich Environments -- The Difference is in Messaging -- Understanding the User Within the Innovation Spiral -- The European Mobile Data Service Dilemma -- On the Development of an Open Platform for M-Government Services -- A Methodology for Designing and Managing Context-Aware Workflows -- An Extens…
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks -- Cross-Layer Simulation and Optimization for Mobile Ad-Hoc Networks -- Improving TCP Performance over Wireless Networks Using Loss Differentiation Algorithms -- TCP Performances in a Hybrid Broadcast/Telecommunication System -- Handoff Notification in Wireless Hybrid Networks -- Selective Activ…
Themes and Issues -- Dealing with Terabyte Data Sets in Digital Investigations -- Forensics and Privacy-Enhancing Technologies -- A Network-Based Architecture for Storing Digital Evidence -- Digital Forensics: Meeting the Challenges of Scientific Evidence -- Non-Technical Manipulation of Digital Data -- Investigative Techniques -- Detecting Social Engineering -- A Framework for Email Investigat…
IT management: The basis -- The basis of the field -- Supplying IT products and services within an architecture -- Traditional IT management: organizing demand and supply -- Task focussed and simultaneous process-focussed supply of facilities -- The demand-side: functional management (using the method BiSL) -- The supply-side: application management (using the method ASL) -- The supply-side: ex…
Keynote Speech -- Research Issues in Adapting Computing to Small Devices -- Mobile Context-Aware Systems – Linking the Physical and Digital World -- Architecture -- A Data Transformations Based Approach for Optimizing Memory and Cache Locality on Distributed Memory Multiprocessors -- A Fetch Policy Maximizing Throughput and Fairness for Two-Context SMT Processors -- A Loop Transformation Usin…