Theory of System Performance Analysis -- Time—The Zeroth Performance Metric -- Getting the Jump on Queueing -- Queueing Systems for Computer Systems -- Linux Load Average—Take a Load Off! -- Performance Bounds and Log Jams -- Practice of System Performance Analysis -- Pretty Damn Quick (PDQ)—A Slow Introduction -- Multicomputer Analysis with PDQ -- How to Scale an Elephant with PDQ -- Cli…
Information Models and Metrics -- On the Formalization of the Common Information Model Metaschema -- Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL -- On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study -- Security and Privacy -- Improving the Configuration Management of Large Network Security S…
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Building a CSCW Infrastructure Utilizing an M&S Architecture and XML -- Modelization of a Communication Protocol for CSCW Systems Using Coloured Petri Nets -- The Design of a Workflow-Centric, Context-Aware Framework to Support Heterogeneous Computing Environments in Collaboration -- Do Tangible User Interfaces Impact Spatial Cognition in Collaborative Design? -- Cooperation in Highly Distribut…
Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation…
CSCW Techniques and Methods -- Vega Information Grid for Collaborative Computing -- Physical Object Icons Buttons Gesture (PIBG): A New Interaction Paradigm with Pen -- A Novel Method of QoS Based Resource Management and Trust Based Task Scheduling -- Learning to Plan the Collaborative Design Process -- Groupware System Design and the Context Concept -- Grid Authorization Management Oriented to…