This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
Network Protocols -- The Timed Abstract Protocol Notation -- Execution Models of Network Protocols -- Equivalence of Execution Models -- Preserving Fairness -- The Austin Protocol Compiler -- Two Examples -- A DNS Server -- Concluding Remarks.-The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close t…
Software Engineering Challenges -- Software Processes and Process Models -- Project Management -- Software Configuration Management -- Software Requirements Analysis and Specification -- Software Architecture and Design -- Project Planning -- Project Scheduling and Staffing -- Software Quality Management -- Rish Management -- Structured Design Methodology -- Object-Oriented Design and Design Me…
Conformal prediction -- Classification with conformal predictors -- Modifications of conformal predictors -- Probabilistic prediction I: impossibility results -- Probabilistic prediction II: Venn predictors -- Beyond exchangeability -- On-line compression modeling I: conformal prediction -- On-line compression modeling II: Venn prediction -- Perspectives and contrasts.Conformal prediction is a …
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Keynotes -- Bioinformatics -- Watermarking and Encryption -- XML Query Processing -- XML Coding and Metadata Management -- Data Mining -- Data Generation and Understanding -- Panel -- Music Retrieval -- Query Processing in Subscription Systems -- Extending XML -- Web Services -- High-Dimensional Indexing -- Sensor and Stream Data Processing -- Database Performance Issues -- Clustering, Classifi…
Patterns and Types for Querying XML Documents -- Dual Syntax for XML Languages -- Exploiting Schemas in Data Synchronization -- Efficiently Enumerating Results of Keyword Search -- Mapping Maintenance in XML P2P Databases -- Inconsistency Tolerance in P2P Data Integration: An Epistemic Logic Approach -- XML Data Integration with Identification -- Satisfiability of XPath Queries with Sibling Axe…
Invited Talk (Shared with DBPL) -- Patterns and Types for Querying XML Documents -- Constraints and Views -- Checking Functional Dependency Satisfaction in XML -- A Theoretic Framework for Answering XPath Queries Using Views -- Labeling and Path Evaluation -- A Path-Based Labeling Scheme for Efficient Structural Join -- The BIRD Numbering Scheme for XML and Tree Databases – Deciding and Recon…
How to Design a Loose Inter-organizational Workflow? An Illustrative Case Study -- Recovering from Malicious Attacks in Workflow Systems -- Towards Mining Structural Workflow Patterns -- Avoiding Error-Prone Reordering Optimization During Legal Systems Migration -- Automated SuperSQL Query Formulation Based on Statistical Characteristics of Data -- Distribution Rules for Array Database Queries …
Data Warehouse I -- A Tree Comparison Approach to Detect Changes in Data Warehouse Structures -- Extending the UML for Designing Association Rule Mining Models for Data Warehouses -- Event-Feeded Dimension Solution -- XML-OLAP: A Multidimensional Analysis Framework for XML Warehouses -- Data Warehouse II -- Graph-Based Modeling of ETL Activities with Multi-level Transformations and Updates -- E…