to XML for Bioinformatics -- Fundamentals of XML and BSML -- DTDs for Bioinformatics -- XML Schemas for Bioinformatics -- Parsing NCBI XML in Perl -- The Distributed Annotation System (DAS) -- Parsing DAS Data with SAX -- Parsing DAS Data with JDOM -- Web Services for Bioinformatics.XML, or Extensible Markup Language, is rapidly becoming a critical tool in bioinformatics and biological data exc…
Invited Papers -- Patterns for the Pragmatic Web -- Conceptual Graphs for Semantic Web Applications -- Knowledge Representation and Reasoning in (Controlled) Natural Language -- What Is a Concept? -- Applications of Description Logics: State of the Art and Research Challenges -- Methodologies for the Reliable Construction of Ontological Knowledge -- Using Formal Concept Analysis and Information…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Short Tour Through the Book -- Simplicity & Uncertainty -- Universal Sequence Prediction -- Agents in Known Probabilistics Environments -- The Universal Algorithmic Agent AIXI -- Important Environmental Classes -- Computational Aspects -- Discussion.Decision Theory = Probability + Utility Theory + + Universal Induction = Ockham + Bayes + Turing = = A Unified View of Artificial Intelligence This…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert Aggregation and Verification -- High-Level Alert Structures -- Large-Scale Correlation -- Evaluation -- Open Issues -- Conclusions.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts pro…