Invited Papers -- Coordinating Teams in Uncertain Environments: A Hybrid BDI-POMDP Approach -- Agents – The Challenge of Relevance to the IT Mainstream -- Agent-Oriented Programming -- Goal Representation for BDI Agent Systems -- AF-APL – Bridging Principles and Practice in Agent Oriented Languages -- Agent Platforms and Tools -- A Toolkit for the Realization of Constraint-Based Multiagent …
The Influence of Context on Privacy, Trust and Security -- Some Research Challenges in Pervasive Computing -- Overview -- Survey on Location Privacy in Pervasive Computing -- Exploring the Relationship Between Context and Privacy -- Privacy, Security and Trust Issues Raised by the Personal Server Concept -- Secure Trust Models and Management in Pervasive Computing -- Overview -- The Role of Ide…
Anonymity and Covert Channels in Simple Timed Mix-Firewalls -- Practical Traffic Analysis: Extending and Resisting Statistical Disclosure -- The Traffic Analysis of Continuous-Time Mixes -- Reputable Mix Networks -- Secure Outsourcing of Sequence Comparisons -- An Improved Construction for Universal Re-encryption -- Electromagnetic Eavesdropping Risks of Flat-Panel Displays -- On the Anonymity …
Invited Session I -- Protocol System Integration, Interface and Interoperability -- Session I (Design of Distributed Systems I) -- DART: Distributed Automated Regression Testing for Large-Scale Network Applications -- Testing Mobile and Distributed Systems: Method and Experimentation -- A UNITY-Based Framework Towards Component Based Systems -- Session II (Ad-Hoc Networks and Mobile Agents) -- …
Microarchitecture- and Circuit-Level Techniques -- An Optimized Front-End Physical Register File with Banking and Writeback Filtering -- Reducing Delay and Power Consumption of the Wakeup Logic Through Instruction Packing and Tag Memoization -- Bit-Sliced Datapath for Energy-Efficient High Performance Microprocessors -- Low-Overhead Core Swapping for Thermal Management -- Power-Aware Memory and…
Compilers -- Runtime Biased Pointer Reuse Analysis and Its Application to Energy Efficiency -- Inter-program Compilation for Disk Energy Reduction -- Embedded Systems -- Energy Consumption in Mobile Devices: Why Future Systems Need Requirements–Aware Energy Scale-Down -- Efficient Scratchpad Allocation Algorithms for Energy Constrained Embedded Systems -- Online Prediction of Battery Lifetime…
Location Techniques -- Audio Location: Accurate Low-Cost Location Sensing -- Using Sound Source Localization in a Home Environment -- Tracking Locations of Moving Hand-Held Displays Using Projected Light -- Activity and Context -- Bathroom Activity Monitoring Based on Sound -- Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors -- Enhancing Semantic Spaces…
An Overview of the EGEE Project -- Grid Computing Using Web Services Technologies -- Similarity Grid for Searching in Metric Spaces -- Organisation-Oriented Super-Peer Networks for Digital Libraries -- A Combined Hyperdatabase and Grid Infrastructure for Data Stream Management and Digital Library Processes -- The MINERVA Project: Towards Collaborative Search in Digital Libraries Using Peer-to-P…
Workshop Report -- Workshop Report -- Security and Incentives -- A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn -- A First Look at Peer-to-Peer Worms: Threats and Defenses -- A Taxonomy of Rational Attacks -- Search -- Brushwood: Distributed Trees in Peer-to-Peer Systems -- Arpeggio: Metadata Searching and Content Sharing with Chord -- OverCite: A Cooperative Dig…
Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- I Miscellaneous -- A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems -- On the Cost of Participating in a Peer-to-Peer Network -- 2 P2P or Not 2 P2P? -- II Networking -- On Transport …