TTA Supported Service Availability -- The Value of Conformance Testing and a Look at the SAF Test Project -- Building Highly Available Application Using SA Forum Cluster: A Case Study of GGSN Application -- Using Logical Data Protection and Recovery to Improve Data Availability -- Contract-Based Web Service Composition Framework with Correctness Guarantees -- Practical Approach to Specification…
ISAS 2004 -- Architecture of Highly Available Databases -- Data Persistence in Telecom Switches -- Distributed Redundancy or Cluster Solution? An Experimental Evaluation of Two Approaches for Dependable Mobile Internet Services -- OpenHPI: An Open Source Reference Implementation of the SA Forum Hardware Platform Interface -- Quality of Service Control by Middleware -- Benefit Evaluation of High…
Semantic Web Services -- Automatic Location of Services -- Feta: A Light-Weight Architecture for User Oriented Semantic Service Discovery -- Optimally Distributing Interactions Between Composed Semantic Web Services -- A POP-Based Replanning Agent for Automatic Web Service Composition -- Process-Level Composition of Executable Web Services: ”On-the-fly” Versus ”Once-for-all” Composition…
to Semantic Web Services and Web Process Composition -- Panel -- Academic and Industrial Research: Do Their Approaches Differ in Adding Semantics to Web Services? -- Talk -- Interoperability in Semantic Web Services -- Full Papers -- Bringing Semantics to Web Services: The OWL-S Approach -- A Survey of Automated Web Service Composition Methods -- Enhancing Web Services Description and Discovery…
Service Oriented Computing: Opportunities and Challenges -- Data Semantics Revisited -- Dynamic Agent Composition from Semantic Web Services -- Ontology-Extended Component-Based Workflows : A Framework for Constructing Complex Workflows from Semantically Heterogeneous Software Components -- Data Procurement for Enabling Scientific Workflows: On Exploring Inter-ant Parasitism -- XSDL: Making XML…
Invited Paper -- Using the Semantic Web for e-Science: Inspiration, Incubation, Irritation -- Semantic Acceleration Helping Realize the Semantic Web Vision or “The Practical Web” -- Semantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood -- Research/Academic Track -- Constructing Complex Semantic Mappings Between XML Data and Ontologies -- Stable Model Theory for…
The Self-Star Vision -- The Self-Star Vision -- Self-organization -- Evolving Fractal Gene Regulatory Networks for Graceful Degradation of Software -- Evolutionary Computing and Autonomic Computing: Shared Problems, Shared Solutions? -- Self-? Topology Control in Wireless Multihop Ad Hoc Communication Networks -- Emergent Consensus in Decentralised Systems Using Collaborative Reinforcement Lear…
Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the L…
Quick Start -- Authors -- Teachers -- Managers -- Students -- In-Depth -- Protecting Content -- Security Risk Analysis -- Personal Security Checklist -- Access Control, Authentication & Auditing -- Cryptography -- Additional Resources -- PGP - Pretty Good Privacy -- Plagiarism Detection and Prevention.Security in E-Learning is organized in three parts. First, the author raises awareness that se…
New Research Challenges for the Security of Ad Hoc and Sensor Networks -- Public Key Cryptography in Sensor Networks—Revisited -- Exploring Message Authentication in Sensor Networks -- Secure Initialization in Single-Hop Radio Networks -- Some Methods for Privacy in RFID Communication -- Ring Signature Schemes for General Ad-Hoc Access Structures -- Linking Ad Hoc Charging Schemes to AAAC Arc…