Motivating Scenarios -- Attacks -- Foundations -- Design Challenges -- Platform Architecture -- Outbound Authentication -- Validation -- Application Case Studies -- TCPA/TCG -- Experimenting with TCPA/TCG -- New Horizons.How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial effor…
Evolutionary Multiobjective Optimization -- Recent Trends in Evolutionary Multiobjective Optimization -- Self-adaptation and Convergence of Multiobjective Evolutionary Algorithms in Continuous Search Spaces -- A Simple Approach to Evolutionary Multiobjective Optimization -- Quad-trees: A Data Structure for Storing Pareto Sets in Multiobjective Evolutionary Algorithms with Elitism -- Scalable Te…
On Convex Developments of a Doubly-Covered Square -- Flat 2-Foldings of Convex Polygons -- Uniform Coverings of 2-Paths with 6-Paths in the Complete Graph -- Foldings of Regular Polygons to Convex Polyhedra I: Equilateral Triangles -- Maximum Induced Matchings of Random Regular Graphs -- Antimagic Valuations for the Special Class of Plane Graphs -- A General Framework for Coloring Problems: Old…
Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert Aggregation and Verification -- High-Level Alert Structures -- Large-Scale Correlation -- Evaluation -- Open Issues -- Conclusions.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts pro…
Invited Lectures -- Hypertree Decompositions: Structure, Algorithms, and Applications -- Combinatorial Search on Graphs Motivated by Bioinformatics Applications: A Brief Survey -- Regular Papers -- Domination Search on Graphs with Low Dominating-Target-Number -- Fully Dynamic Algorithm for Recognition and Modular Decomposition of Permutation Graphs -- Approximating Rank-Width and Clique-Width Q…
Fuzzy Theory and Models -- Uncertainty Management in Data Mining -- Uncertainty Management and Probabilistic Methods in Data Mining -- Approximate Reasoning -- Axiomatic Foundation -- Fuzzy Classifiers -- Fuzzy Clustering -- Fuzzy Database Mining and Information Retrieval -- Information Fusion -- Neuro-Fuzzy Systems -- Fuzzy Control -- Fuzzy Hardware -- Knowledge Visualization and Exploration -…
Research Overview and Technologies for Internet Security -- Impacts of TEI on SMEs -- Risk Assessment of TEI on TEISME -- Methodology -- Analysis of Results -- Critical Evaluation and Discussion -- Conclusion.The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of …
Understanding Computer Network Security -- Computer Network Fundamentals -- Understanding Network Security -- Security Challenges to Computer Networks -- Security Threats to Computer Networks -- Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Hostile Scripts -- Security Assessment, Analysis, and Assurance -- Dealing with Network Security Challenges -- Access Control and Authoriz…
Knowledge-Based Systems -- Platform-Based Product Design and Development: Knowledge Support Strategy and Implementation -- Knowledge Management Systems in Continuous Product Innovation -- Knowledge-Based Measurement of Enterprise Agility -- Knowledge-Based Systems Technology in the Make or Buy Decision in Manufacturing Strategy -- Intelligent Internet Information Systems in Knowledge Acquisitio…
Session 1A: Relevance/Retrieval Models -- Session 1B: Multimedia IR -- Session 2A: Natural Language Processing in IR -- Session 3A: Web IR -- Session 3B: Question Answering -- Session 4A: Document/Query Models -- Session 4B: Special Session: Digital PhotoAlbum -- Session 5A: TDT/Clustering -- Session 5B: Multimedia/Classification -- Poster and Demo Session 1 -- Poster and Demo Session 2.Asia In…