From the Contents. Introduction -- Background Knowledge -- Problems and Overviews of Approach -- Logic -- Formal Support for Data Modelling -- Formal Support for Process Modelling -- Reasoning on and Executing Processes -- Knowledge Sharing and Reuse of Models -- The Use of System: KBST-BM -- Evaluation of System -- Conclusion -- Appendices - A. Generic Models from BSDM -- B. Example Models of …
Requirements Engineering: Setting the Context -- State-of-the-Art Surveys of Requirements Engineering Process Research -- Requirements Elicitation: A Survey of Techniques, Approaches, and Tools -- Specification of Requirements Models -- Requirements Prioritization -- Requirements Interdependencies: State of the Art and Future Challenges -- Impact Analysis -- Requirements Negotiation -- Quality …
Challenges -- Organizational Transformation Through E-Government: Myth or Reality? -- The Governance of Back Office Integration in E-Government: Some Dutch Experiences -- E-Government Systems in Developing Countries: Stakeholders and Conflict -- Performance -- Intelligent Measuring and Improving Model for Customer Satisfaction Level in e-Government -- Accountability of Electronic Cross-Agency S…
Presentation of the PPR-Model -- The Activity and Customer Centric Approach -- The Domains and Directions of IT Impacts -- Digital Wheelbarrows in Local Government -- E-Government Objectives, Means, and Reach -- The Organizational Membrane Penetrated by Mobile Technologies -- E-Procurement: The Improvement of Supporting and Strategic Operations -- Instrumental Digital Customer Involvement -- Ev…
Invited Talks -- Attached Types and Their Application to Three Open Problems of Object-Oriented Programming -- The Emergent Structure of Development Tasks -- Java -- Loosely-Separated “Sister” Namespaces in Java -- Efficiently Refactoring Java Applications to Use Generic Libraries -- Sharing the Runtime Representation of Classes Across Class Loaders -- Aspects and Modularity -- Aspect-Orien…
Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Par…
Theory of System Performance Analysis -- Time—The Zeroth Performance Metric -- Getting the Jump on Queueing -- Queueing Systems for Computer Systems -- Linux Load Average—Take a Load Off! -- Performance Bounds and Log Jams -- Practice of System Performance Analysis -- Pretty Damn Quick (PDQ)—A Slow Introduction -- Multicomputer Analysis with PDQ -- How to Scale an Elephant with PDQ -- Cli…
Information Models and Metrics -- On the Formalization of the Common Information Model Metaschema -- Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL -- On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study -- Security and Privacy -- Improving the Configuration Management of Large Network Security S…
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…