Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log -- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log? -- Adapting Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains -- Multiparty Computation -- Upper Bounds on the Communication Complexity …
Database Systems -- Database System Architecture – A Walk Through Time: From Centralized Platform to Mobile Computing – Keynote Address -- Extending Wide-Area Replication Support with Mobility and Improved Recovery -- Extending Databases to Precision-Controlled Retrieval of Qualitative Information -- An Approach for Solving Very Large Scale Instances of the Design Distribution Problem for D…
Component-Based Software Development for Embedded Systems – An Introduction -- Component-Based Software Development for Embedded Systems – An Introduction -- Specification and Verification -- Specification and Verification of Applications Based on Function Blocks -- A Model-Based Approach to Formal Specification and Verification of Embedded Systems Using Colored Petri Nets -- Modular Verifi…
Middleware Integration -- Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks -- Infrastructure for Automatic Dynamic Deployment of J2EE Applications in Distributed Environments -- Patterns for Deployment -- Component Deployment Using a Peer-to-Peer Overlay -- A Methodology for Developing and Deploying Distributed Applications -- QOS Issues -- Crosslets: Self-managing Ap…
Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -…
KEYNOTE SPEECHES -- Ranking Abstraction as Companion to Predicate Abstraction -- Developing High Quality Software with Formal Methods: What Else Is Needed? -- A Testing Architecture for Designing High-Reliable MANET Protocols -- REGULAR PAPERS -- A Composition Operator for Systems with Active and Passive Actions -- A Formal Semantics of UML StateCharts by Means of Timed Petri Nets -- A Hierarch…
Parallel Job Scheduling — A Status Report -- Scheduling on the Top 50 Machines -- Parallel Computer Workload Modeling with Markov Chains -- Enhancements to the Decision Process of the Self-Tuning dynP Scheduler -- Reconfigurable Gang Scheduling Algorithm -- Time-Critical Scheduling on a Well Utilised HPC System at ECMWF Using Loadleveler with Resource Reservation -- Inferring the Topology and…
Mapping Problems with Finite-Domain Variables to Problems with Boolean Variables -- Mapping Problems with Finite-Domain Variables to Problems with Boolean Variables -- A SAT-Based Decision Procedure for the Boolean Combination of Difference Constraints -- An Algebraic Approach to the Complexity of Generalized Conjunctive Queries -- Incremental Compilation-to-SAT Procedures -- Resolve and Expand…
Invited Talk -- Privacy Enhanced Technologies: Methods – Markets – Misuse -- Digital Business -- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains -- Protection Mechanisms Against Phishing Attacks -- Dropout-Tolerant TTP-Free Mental Poker -- A Self-healing Mechanism for an Intrusion Tolerance System -- Protecting Online Rating Systems from Unfair Rat…
Towards Global Collaborative Computing: Opportunities and Challenges of Peer to Peer Networks and Applications -- Session 1: Grid Service and Grid Security -- Session 2: Grid Middleware and Applications -- Session 3: Knowledge Grid and Semantic Grid -- Session 4: Resource Management -- Session 5: P2P Computing and Automatic Computing -- Session 6: Performance Evaluation and Modeling -- Session …