Invited Papers -- Patterns for the Pragmatic Web -- Conceptual Graphs for Semantic Web Applications -- Knowledge Representation and Reasoning in (Controlled) Natural Language -- What Is a Concept? -- Applications of Description Logics: State of the Art and Research Challenges -- Methodologies for the Reliable Construction of Ontological Knowledge -- Using Formal Concept Analysis and Information…
Invited Talks -- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography -- You Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security Proofs of Some Identity Based Encryption Schemes -- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme -- ID-Based Signature Scheme Without Trusted PKG -- Security Modelling…
Invited Talks -- Data Analysis in the Life Sciences — Sparking Ideas — -- Machine Learning for Natural Language Processing (and Vice Versa?) -- Statistical Relational Learning: An Inductive Logic Programming Perspective -- Recent Advances in Mining Time Series Data -- Focus the Mining Beacon: Lessons and Challenges from the World of E-Commerce -- Data Streams and Data Synopses for Massive D…
Short Tour Through the Book -- Simplicity & Uncertainty -- Universal Sequence Prediction -- Agents in Known Probabilistics Environments -- The Universal Algorithmic Agent AIXI -- Important Environmental Classes -- Computational Aspects -- Discussion.Decision Theory = Probability + Utility Theory + + Universal Induction = Ockham + Bayes + Turing = = A Unified View of Artificial Intelligence This…
Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generat…
Geospatial Semantics: Why, of What, and How? -- Spherical Topological Relations -- GeoPQL: A Geographical Pictorial Query Language That Resolves Ambiguities in Query Interpretation -- A Fuzzy Identity-Based Temporal GIS for the Analysis of Geomorphometry Changes -- Interoperability for GIS Document Management in Environmental Planning -- Semantic Information in Geo-Ontologies: Extraction, Compa…
String Processing and Information Retrieval 2005 -- Enhanced Byte Codes with Restricted Prefix Properties -- Experimental Analysis of a Fast Intersection Algorithm for Sorted Sequences -- Compressed Perfect Embedded Skip Lists for Quick Inverted-Index Lookups -- XML Retrieval with a Natural Language Interface -- Recommending Better Queries from Click-Through Data -- A Bilingual Linking Service …
Motivating Scenarios -- Attacks -- Foundations -- Design Challenges -- Platform Architecture -- Outbound Authentication -- Validation -- Application Case Studies -- TCPA/TCG -- Experimenting with TCPA/TCG -- New Horizons.How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial effor…
Evolutionary Multiobjective Optimization -- Recent Trends in Evolutionary Multiobjective Optimization -- Self-adaptation and Convergence of Multiobjective Evolutionary Algorithms in Continuous Search Spaces -- A Simple Approach to Evolutionary Multiobjective Optimization -- Quad-trees: A Data Structure for Storing Pareto Sets in Multiobjective Evolutionary Algorithms with Elitism -- Scalable Te…
Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert Aggregation and Verification -- High-Level Alert Structures -- Large-Scale Correlation -- Evaluation -- Open Issues -- Conclusions.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts pro…