Preface -- Introduction -- Application of Dense Offshore Tsunami Observations from Ocean Bottom Pressure Gauges (OBPGs) for Tsunami Research and Early Warnings -- Remote Sensing for Natural or Man-made Disasters and Environmental Changes -- Classification of Post-Earthquake High Resolution Images using Adaptive Dynamic Region Merging and Gravitational Self-Organizing Maps -- A Survey on the Rol…
Biological Aspects in Technical Sensor Systems -- The International Market for Automotive Microsystems, Regional Characteristics and Challenges -- Status of the Inertial MEMS-based Sensors in the Automotive -- The Assessment of the Socio-economic Impact of the Introduction of Intelligent Safety Systems in Road Vehicles — Findings of the EU Funded Project SEiSS -- Safety -- Special Cases of La…
Queues: The Art of Modelling -- Markov Chains and Queues in Discrete Time -- Homogeneous Markov Processes on Discrete State Spaces -- Markovian Queues in Continuous Time -- Markovian Queueing Networks -- Renewal Theory -- Markov Renewal Theory -- Semi-Markovian Queues -- Phase-Type Distributions -- Markovian Arrival Processes -- The GI/PH/1 Queue -- The BMAP/G/1 Queue -- Discrete Time Approache…
Hybrid Systems -- Polytopic Approximations of Reachable Sets Applied to Linear Dynamic Games and a Class of Nonlinear Systems -- On the Problem of Measurement Feedback Control: Ellipsoidal Techniques -- Stability of Hybrid Systems and Related Questions from Systems Biology -- System Theory and Design -- Martingale Representation and All That -- Engineering Education: A Focus on Systems -- New D…
Privacy/Anonymity -- Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocols -- Personal Attributes and Privacy -- Mobile Security 1 -- Local Management of Credits and Debits in Mobile Ad Hoc Networks -- How Secure are Current Mobile Operating Systems? -- An Overview of Security Issues and Techniques in Mobile Agents -- Mobile Security 2 -- A Secure Channel Protocol for …
Applied Cryptography -- Fast Contract Signing with Batch Oblivious Transfer -- An Instruction Set Extension for Fast and Memory-Efficient AES Implementation -- Self-healing Key Distribution Schemes with Sponsorization -- DRM & E-Commerce -- Effective Protection Against Phishing and Web Spoofing -- Identity Based DRM: Personal Entertainment Domain -- Rights and Trust in Multimedia Information Ma…
Innovative Business Models -- Value Process and Business Process in E-Business Modelling -- VA3: Governance Selection in Value Webs -- From an E-Business Revenue Model to Its Software Reference Architecture -- e-Collaboration and e-Services -- Selecting Supply Partners for E-Collaboration in Supply Chains -- E-Collaboration Architecture for Customer-Driven Business Processes in Inter-Organizati…
Authentication, Encryption, Certification and Traceability in E-Services -- Safeguards, Interception, Tracking and Firewall Technology -- Administration, Management, Risk Analysis and Organizational Issues -- Mobile Access, Network Protocol and Multilateral Security -- Certification Authorities -- Public Key Infrastructures.International Federation for Information Processing The IFIP series pub…
to Stream Data Management -- Query Execution and Optimization -- Filtering, Punctuation, Windows and Synopses -- XML & Data Streams -- CAPE: A Constraint-Aware Adaptive Stream Processing Engine -- Efficient Support for Time Series Queries in Data Stream Management Systems -- Managing Distributed Geographical Data Streams with the GIDB Portal System -- Streaming Data Dissemination Using Peer-Pee…
The Fundamentals -- Digital Representation -- Logic Circuitry -- Stored Program Processing -- The Software -- The PIC16F84 Microcontroller -- The Instruction Set -- Subroutines and Modules -- Interrupt Handling -- Assembly Language Code Building Tools -- High-Level Language -- The Outside World -- The Real World -- One Byte at a Time -- One Bit at a Time -- Time Is of the Essence -- Take the Ro…