Reasoning -- Dynamics of Declarative Goals in Agent Programming -- Theories of Intentions in the Framework of Situation Calculus -- Partial Deduction for Linear Logic—The Symbolic Negotiation Perspective -- Modelling and Engineering -- On Modelling Multi-agent Systems Declaratively -- The Semantics of MALLET–An Agent Teamwork Encoding Language -- Construction of an Agent-Based Framework for…
Architectures -- Extra-dimensional Island-Style FPGAs -- A Tightly Coupled VLIW/Reconfigurable Matrix and its Modulo Scheduling Technique -- Stream-based XPP Architectures in Adaptive System-on-Chip Integration -- Core-Based Architecture for Data Transfer Control in SoC Design -- Customizable and Reduced Hardware Motion Estimation Processors -- Methodologies and Tools -- Enabling Run-time Task …
SOARS: Spot Oriented Agent Role Simulator — Design and Implementation -- Interactive inversion of agent-based models -- Modeling the Exchange of AIDS Prevention and Treatment Strategies in Hong Kong -- Effect of Mutual Choice Metanorm in Group Dynamics for Solving Social Dilemmas -- Evolution of Cooperative Behavior in C2C market: Effect of Reputation Management System -- Constructing shared …
Concepts and Techniques -- Data Mining and Knowledge Discovery: A Brief Overview -- Intelligent Agents and Multi-Agent Systems -- Methodology -- Exploiting Data Mining on Mas -- Coupling Data Mining with Intelligent Agents -- Knowledge Diffusion: Three Representative Test Cases -- Data Mining on the Application Level of a Mas -- Mining Agent Behaviors -- Mining Knowledge for Agent Communities -…
Streams, Security and Scalability -- Towards Privacy-Enhanced Authorization Policies and Languages -- Revocation of Obligation and Authorisation Policy Objects -- Role Slices: A Notation for RBAC Permission Assignment and Enforcement -- Designing Secure Indexes for Encrypted Databases -- Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases -- Verified Query Resul…
Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature Schemes from Asiacrypt 2003 -- On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme -- Cryptanalysis of Two Group Key Management Protocols for Secure Multicast -- Security Analysis of Password-Authenticated Key Agreement Protocols -- Intrusion Detection and Viruses -…
Side Channels I -- Resistance of Randomized Projective Coordinates Against Power Analysis -- Templates as Master Keys -- A Stochastic Model for Differential Side Channel Cryptanalysis -- Arithmetic for Cryptanalysis -- A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis -- Further Hidden Markov Model Cryptanalysis -- Low Resources -- Energy-Efficient Software Implementat…
Building a CSCW Infrastructure Utilizing an M&S Architecture and XML -- Modelization of a Communication Protocol for CSCW Systems Using Coloured Petri Nets -- The Design of a Workflow-Centric, Context-Aware Framework to Support Heterogeneous Computing Environments in Collaboration -- Do Tangible User Interfaces Impact Spatial Cognition in Collaborative Design? -- Cooperation in Highly Distribut…
Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation…
Preliminaries -- The Technical Background -- On Programming -- Fundamentals -- Algorithm Extraction -- Recursion Removal -- Quantifications -- Refinement and Re-use -- Developments -- Sorting -- Data Refinement -- Sorting Revisited -- Failures and Fixes -- Further Examples -- On Interactive Software.Central to Formal Methods is the so-called Correctness Theorem which relates a specification to …