1. Architectures for Dependable Services -- Semantics-Aware Services for the Mobile Computing Environment -- The Role of Agreements in IT Management Software -- Toward Undoing in Composite Web Services -- Architecting Web Services Applications for Improving Availability -- Dependable Composite Web Services with Components Upgraded Online -- 2. Monitoring and Reconfiguration in Software Architec…
Two-Server Password-Only Authenticated Key Exchange -- Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme -- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution -- A Traitor Tracing Scheme Based on RSA for Fast Decryption -- N-Par…
Invited Papers -- Expressiveness and Efficient Analysis of Stochastic Well-Formed Nets -- Applications of Craig Interpolation to Model Checking -- Towards an Algebra for Security Policies -- Continuization of Timed Petri Nets: From Performance Evaluation to Observation and Control -- Full Papers -- Genetic Process Mining -- The (True) Concurrent Markov Property and Some Applications to Markov N…
Theory of System Performance Analysis -- Time—The Zeroth Performance Metric -- Getting the Jump on Queueing -- Queueing Systems for Computer Systems -- Linux Load Average—Take a Load Off! -- Performance Bounds and Log Jams -- Practice of System Performance Analysis -- Pretty Damn Quick (PDQ)—A Slow Introduction -- Multicomputer Analysis with PDQ -- How to Scale an Elephant with PDQ -- Cli…
Software Engineering Challenges -- Software Processes and Process Models -- Project Management -- Software Configuration Management -- Software Requirements Analysis and Specification -- Software Architecture and Design -- Project Planning -- Project Scheduling and Staffing -- Software Quality Management -- Rish Management -- Structured Design Methodology -- Object-Oriented Design and Design Me…
Information Models and Metrics -- On the Formalization of the Common Information Model Metaschema -- Ontology-Based Integration of Management Behaviour and Information Definitions Using SWRL and OWL -- On the Impact of Management on the Performance of a Managed System: A JMX-Based Management Case Study -- Security and Privacy -- Improving the Configuration Management of Large Network Security S…
Session I: Steganography and Steganalysis -- A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography -- Information Transmission and Steganography -- On the Existence of Perfect Stegosystems -- Towards Multi-class Blind Steganalyzer for JPEG Images -- Session II: Fingerprinting -- An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption -- C…
Invited Lecture -- Reversible Data Hiding -- Fingerprinting Curves -- Informed Detection Revisited -- Session I: Systems -- A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Images -- A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition -- Better Use of Human Visual Model in Watermarking Based on Li…
Global optimization -- The Motivation for Differential Evolution -- Critical values for the control parameters of differential evolution algorithms -- The Differential Evolution Algorithm -- Fast Evolution Strategies -- Benchmarking Differential Evolution -- On the usage of differential evolution for function optimization -- Problem Domains -- Shape design and optimization by genetic algorithm …
Modeling -- Organizational and Social Concepts in Agent Oriented Software Engineering -- Representing Agent Interaction Protocols with Agent UML -- AML: Agent Modeling Language Toward Industry-Grade Agent-Based Modeling -- Formal Semantics for AUML Agent Interaction Protocol Diagrams -- A Study of Some Multi-agent Meta-models -- A Metamodel for Agents, Roles, and Groups -- Design -- Bridging th…