Wireless LAN -- Security I -- TCP and Congestion Control -- Wireless Ad Hoc Network Routing -- Network Measurement -- Routing -- Power Control in Wireless Networks -- QoS I -- High Speed Networks -- Wireless Networks I -- QoS II -- Wireless Ad Hoc Networks -- Network Design -- Peer to Peer Networks -- QoS III -- Security II -- Wireless Networks II -- Applications and Services -- Security III --…
A Theory of Predicate-Complete Test Coverage and Generation -- A Perspective on Component Refinement -- A Fully Abstract Semantics for UML Components -- From (Meta) Objects to Aspects: A Java and AspectJ Point of View -- MoMo: A Modal Logic for Reasoning About Mobility -- Probabilistic Linda-Based Coordination Languages -- Games with Secure Equilibria, -- Priced Timed Automata: Algorithms and A…
Session 1: Mobility Management -- Impact of Link State Changes and Inaccurate Link State Information on Mobility Support and Resource Reservations -- Comparison of Signaling and Packet Forwarding Overhead for HMIP and MIFA -- Profile System for Management of Mobility Context Information for Access Network Selection and Transport Service Provision in 4G Networks -- Replic8: Location-Aware Data R…
Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Enc…
CarpetLAN: A Novel Indoor Wireless(-like) Networking and Positioning System -- u-Texture: Self-Organizable Universal Panels for Creating Smart Surroundings -- Fast and Robust Interface Generation for Ubiquitous Applications -- Analysis of Chewing Sounds for Dietary Monitoring -- Preventing Camera Recording by Designing a Capture-Resistant Environment -- Self-Mapping in 802.11 Location Systems -…
CAPTCHAs and Performance Analysis -- Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs) -- A Highly Legible CAPTCHA That Resists Segmentation Attacks -- Visual CAPTCHA with Handwritten Image Analysis -- Characters or Faces: A User Study on Ease of Use for HIPs -- HIP Architectures -- Collaborative Filtering CAPTCHAs -- CAPTCHA Generation as a Web Service -- Leveraging th…
Overload Management -- Temporal Protection -- Multi-Thread Applications -- Synchronization Protocols for Hard and Soft Real-Time Systems -- Resource Reclaiming -- Quality of Service Management -- Feedback Scheduling -- Stochastic Scheduling.Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to c…