to Reconfigurable Hardware -- Reconfigurable Hardware Exploitation in Wireless Multimedia Communications -- Reconfigurable Hardware Technologies -- Design Flow for Reconfigurable Systems-on-Chip -- SystemC Based Approach -- OCAPI-XL Based Approach -- MPEG-4 Video Decoder -- Prototyping of a HIPERLAN/2 Reconfigurable System-on-Chip -- WCDMA Detector.System Level Design of Reconfigurable Systems-…
Specific Approaches -- Conceptual Modeling of Structure and Behavior with UML – The Top Level Object-Oriented Framework (TLOOF) Approach -- How to Manage Uniformly Software Architecture at Different Abstraction Levels -- Schema Integration Based on Uncertain Semantic Mappings -- Process Modeling and Views -- Combining Intention-Oriented and State-Based Process Modeling -- Pattern-Based Analys…
to Memetic Algorithms -- Memetic Evolutionary Algorithms -- Applications of Memetic Algorithms -- An Evolutionary Approach for the Maximum Diversity Problem -- Multimeme Algorithms Using Fuzzy Logic Based Memes For Protein Structure Prediction -- A Memetic Algorithm Solving the VRP, the CARP and General Routing Problems with Nodes, Edges and Arcs -- Using Memetic Algorithms for Optimal Calibrat…
CSCW Techniques and Methods -- Vega Information Grid for Collaborative Computing -- Physical Object Icons Buttons Gesture (PIBG): A New Interaction Paradigm with Pen -- A Novel Method of QoS Based Resource Management and Trust Based Task Scheduling -- Learning to Plan the Collaborative Design Process -- Groupware System Design and the Context Concept -- Grid Authorization Management Oriented to…
Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical…
CMMI RAMS Extension Based on CENELEC Railway Standard -- The Importance of Single-Source Engineering of Emergency and Process Shutdown Systems -- Combining Extended UML Models and Formal Methods to Analyze Real-Time Systems -- Defining and Decomposing Safety Policy for Systems of Systems -- Generalising Event Trees Using Bayesian Networks with a Case Study of Train Derailment -- Control and Dat…
Invited Papers -- Self-managed Cells for Ubiquitous Systems -- Critical Information Assurance Challenges for Modern Large-Scale Infrastructures -- Rule-Based Topological Vulnerability Analysis -- Models and Analysis of Active Worm Defense -- Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes -- Mathematical Models, Architectures and Protocols for Compu…
Invited Speakers -- Computer Networks -- Sensor and Satellite Networks -- Security and Cryptography -- Performance Evaluation -- E-Commerce and Web Services -- Multiagent Systems -- Machine Learning -- Information Retrieval and Natural Language Processing -- Image and Speech Processing -- Algorithms and Database Systems -- Theory of Computing -- Epilogue.
Information Systems and Information Technologies (ISIT) Workshop -- Mobile Communications (Mobicomm) Workshop -- Authentication Authorization Accounting (AAA) Workshop -- Computational Geometry and Applications (CGA’05) Workshop -- Virtual Reality in Scientific Applications and Learning (VRSAL 2005) Workshop -- Molecular Structures and Processes Workshop -- Pattern Recognition and Ubiquitous …
FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion De…