Invited Lecture -- Robust Airline Fleet Assignment:Imposing Station Purity Using Station Decomposition -- Computing the Arrow-Debreu Competitive Market Equilibrium and Its Extensions -- Contributed Papers -- Complexity of Minimal Tree Routing and Coloring -- Energy Efficient Broadcasting and Multicasting in Static Wireless Ad Hoc Networks -- An Algorithm for Nonconvex Lower Semicontinuous Optim…
Invited Talks -- Abstract Scalars, Loops, and Free Traced and Strongly Compact Closed Categories -- Labels from Reductions: Towards a General Theory -- Adequacy for Algebraic Effects with State -- Contributed Papers -- Bisimilarity Is Not Finitely Based over BPA with Interrupt -- Algebra ? Coalgebra = Presheaves -- Strong Splitting Bisimulation Equivalence -- Complete Axioms for Stateless Conne…
Invited Talks -- Probabilistic Validation of Computer System Survivability -- Timed Asynchronous Distributed Systems -- WLAN in Automation – More Than an Academic Exercise? -- Evaluation -- Using Stratified Sampling for Fault Injection -- A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code -- Quantitative Evaluation of D…
Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploitin…
Invited Talks -- Is Formal Verification Bound to Remain a Junior Partner of Simulation? -- Verification Challenges in Configurable Processor Design with ASIP Meister -- Tutorial -- Towards the Pervasive Verification of Automotive Systems -- Functional Approaches to Design Description -- Wired: Wire-Aware Circuit Design -- Formalization of the DE2 Language -- Game Solving Approaches -- Finding a…
Efficient Distributed Computation Modulo a Shared Secret -- Multiparty Computation, an Introduction -- Foundations of Modern Cryptography -- Provable Security for Public Key Schemes -- Efficient and Secure Public-Key Cryptosystems.The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distr…
From the contents: Support Vector Machines – An Introduction -- Multiple Model Estimation for Nonlinear Classification -- Componentwise Least Squares Support Vector Machines -- Active Support Vector Learning with Statistical Queries -- Local Learning vs. Global Learning: An Introduction to Maxi-Min Margin Machine -- Active-Set Methods for Support Vector Machines -- Theoretical and Practical M…
Overview -- Elements of Probability Theory -- Uncertain Linear Systems and Robustness -- Linear Robust Control Design -- Some Limits of the Robustness Paradigm -- Probabilistic Methods for Robustness -- Monte Carlo Methods -- Randomized Algorithms in Systems and Control -- Probability Inequalities -- Statistical Learning Theory and Control Design -- Sequential Algorithms for Probabilistic Robus…
Evolutionary Methodology -- Quantum Computing -- Swarm Intelligence and Intelligent Agents -- Natural Computation Applications: Bioinformatics and Bio-medical Engineering -- Natural Computation Applications: Robotics and Intelligent Control -- Other Applications of Natural Computation -- Hardware Implementations of Natural Computation -- Fuzzy Neural Systems and Soft Computing.
Neural Network Applications: Pattern Recognition and Diagnostics -- Neural Network Applications: Robotics and Intelligent Control -- Neural Network Applications: Signal Processing and Multi-media -- Other Neural Networks Applications -- Evolutionary Learning -- Artificial Immune Systems -- Evolutionary Theory -- Membrane, Molecular, and DNA Computing -- Ants Colony.