Invited Lectures -- Static Analysis Versus Model Checking for Bug Finding -- The Benefits of Exposing Calls and Returns -- A Compositional Approach to the Stochastic Dynamics of Gene Networks -- Contributed Papers -- Games Other People Play -- Type-Directed Concurrency -- Multiport Interaction Nets and Concurrency -- Model Checking for ?-Calculus Using Proof Search -- A Game Semantics of the As…
Task Modelling -- The Influence of Improved Task Models on Dialogues -- Task-Based Web Modelling: The Web Object Life Cycle Modelling Concept -- Hypermedia and Web-Based Systems -- Model-Based Design of Online Help Systems -- A Design Toolkit for Hypermedia Applications Based on Ariadne Development Method -- SWCEditor: A Model-Based Tool for Interactive Modelling of Web Navigation -- Model-Base…
Fuzzy Sets -- Fuzzy Estimation -- Fuzzy Probability Theory -- Fuzzy Systems Theory -- Simulation -- Queuing I: One-Step Calculations -- Simulation Optimization -- Queuing II: No One-Step Calculations -- Call Center Model -- Machine Shop I -- Machine Shop II -- Emergency Room Model -- Machine Servicing Problem -- Life Insurance: New Account Model -- Inventory Control I -- Inventory Control II --…
The Problem of Computer Insecurity -- The Need to Raise Awareness -- Common Failings That Compromise Security -- The Widespread Nature of Vulnerability -- Attack and Exploitation of Systems -- External Influences and Dependencies -- Insecurity: Here Today, Here Tomorrow?.Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recen…
Invited Speakers -- Computer Networks -- Sensor and Satellite Networks -- Security and Cryptography -- Performance Evaluation -- E-Commerce and Web Services -- Multiagent Systems -- Machine Learning -- Information Retrieval and Natural Language Processing -- Image and Speech Processing -- Algorithms and Database Systems -- Theory of Computing -- Epilogue.
Information Systems and Information Technologies (ISIT) Workshop -- Mobile Communications (Mobicomm) Workshop -- Authentication Authorization Accounting (AAA) Workshop -- Computational Geometry and Applications (CGA’05) Workshop -- Virtual Reality in Scientific Applications and Learning (VRSAL 2005) Workshop -- Molecular Structures and Processes Workshop -- Pattern Recognition and Ubiquitous …
Databases and Data Warehouses -- Temporality in Databases -- On Uncertainty and Data-Warehouse Design -- A Data Warehouse Engineering Process -- Aggregation and Analysis of Spatial Data by Means of Materialized Aggregation Tree -- An Object-Oriented Framework for Reconciliation and Extraction in Heterogeneous Data Federations -- On Optimising Data Access Via Materialised Methods in Object-Orien…
Logics, Theories, and Decision Procedures I -- A Comprehensive Framework for Combined Decision Procedures -- Connecting Many-Sorted Structures and Theories Through Adjoint Functions -- Combining Data Structures with Nonstably Infinite Theories Using Many-Sorted Logic -- On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal -- Inte…
Data Bases and Data Mining -- Algorithms and Theoretical Foundations -- Cultural and Museum Information Systems -- Internet-Scale Software/Information Systems -- Wearable and Mobile Computing -- Computer Graphics, Virtual Reality and Visualization -- AI, Machine Learning and Knowledge Bases -- Languages, Text and Speech Processing -- Bioinformatics -- Software Engineering -- Educational Technol…
Invited Papers -- Genome Halving Problem Revisited -- Verifying Probabilistic Procedural Programs -- Streaming Algorithms for Geometric Problems -- Toward a Grainless Semantics for Shared-Variable Concurrency -- Regular Languages, Unambiguous Concatenation and Computational Complexity -- Contributed Papers -- Decidability of Zenoness, Syntactic Boundedness and Token-Liveness for Dense-Timed Pet…