Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Rat…
to XML for Bioinformatics -- Fundamentals of XML and BSML -- DTDs for Bioinformatics -- XML Schemas for Bioinformatics -- Parsing NCBI XML in Perl -- The Distributed Annotation System (DAS) -- Parsing DAS Data with SAX -- Parsing DAS Data with JDOM -- Web Services for Bioinformatics.XML, or Extensible Markup Language, is rapidly becoming a critical tool in bioinformatics and biological data exc…
Fundamentals of Scheduling -- Is Scheduling a Solved Problem? -- Formulations, Relaxations, Approximations, and Gaps in the World of Scheduling -- Order Scheduling Models: An Overview -- Multi-criteria Scheduling -- Scheduling in Software Development Using Multiobjective Evolutionary Algorithms -- Scheduling Unit Execution Time Tasks on Two Parallel Machines with the Criteria of Makespan and To…
Modern Antennas, 2nd edition provides a complete and rigorous treatment of the theory and practice of modern antenna design and use. Written by a team of experienced engineers, the text is presented in a simple and understandable manner which guides the reader progressively through the stages of the design process. The book is aimed at practising engineers and graduate-level students, and inclu…
From Swarm Intelligence to Swarm Robotics -- Swarm Robotics: From Sources of Inspiration to Domains of Application -- Communication, Diversity and Learning: Cornerstones of Swarm Behavior -- The SWARM-BOTS Project -- Pheromone Robotics and the Logic of Virtual Pheromones -- Distributed Localization and Mapping with a Robotic Swarm -- The I-SWARM Project: Intelligent Small World Autonomous Robot…
Invited Speakers -- Performance Engineering and Stochastic Modelling -- Implicit Representations and Algorithms for the Logic and Stochastic Analysis of Discrete–State Systems -- PiDuce: A Process Calculus with Native XML Datatypes -- Life After BPEL? -- EPEW -- On Moments of Discrete Phase-Type Distributions -- Zero-Automatic Queues -- A Unified Approach to the Moments Based Distribution Est…
Towards Global Collaborative Computing: Opportunities and Challenges of Peer to Peer Networks and Applications -- Session 1: Grid Service and Grid Security -- Session 2: Grid Middleware and Applications -- Session 3: Knowledge Grid and Semantic Grid -- Session 4: Resource Management -- Session 5: P2P Computing and Automatic Computing -- Session 6: Performance Evaluation and Modeling -- Session …
Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinkin…
Beyond ROI -- Supply Chain Simulation -- Inventory Management in High Technology Value Chains -- Product Pricing in the e-Business Era -- Applications of Implosion in Manufacturing -- Strategic Sourcing and Procurement -- Managing Risk with Structured Supply Agreements -- Reverse Logistics — Capturing Value in the Extended Supply Chain -- Service Parts Logistics Management -- Business Process…
Service -- Implementation and Usability Evaluation of AAC System for Handicapped Persons -- Tracking Data Management of Spatial DBMS Using Topology for Location-Based Services -- Optimized Initiation Phases for Anonymous Auction Protocols -- Wireless I -- mSCTP for Vertical Handover Between Heterogeneous Networks -- Increasing TCP Capacity in Wireless Multihop Networks -- A Study on Scalable Bl…