![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2005. The 9 revised full papers presented were carefully selected during two rounds of reviewing and improvement from about 30 workshop talks. The papers are organized in topical sections on research trends in smart devices, Web services, virtual machine technology, security, validation and formal methods, proof-carrying code, and embedded devices.
This book constitutes the refereed post-proceedings of the Third International Workshop on Engineering Self-Organising Applications, ESOA 2005, held in July 2005 as an associated event of AAMAS 2005. The 12 revised full papers and 6 revised short papers presented are organized in topical sections on novel self-organising mechanisms, methodologies, models and tools for self-organising applications, and specific applications of self-organising mechanisms.
This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.
This book constitutes the refereed proceedings of the 15th International Conference on Compiler Construction, CC 2006, held in March 2006 as part of ETAPS. The 17 revised full papers presented together with three tool demonstration papers and one invited paper were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections.
The 17 revised papers presented together with the extended
abstract of 1 invited paper were carefully reviewed and selected
from 37 submissions. The papers focus on formal aspects in security
and trust policy models, security protocol design and analysis,
formal models of trust and reputation, logics for security and
trust, distributed trust management systems, trust-based reasoning,
digital assets protection, data protection, privacy and ID issues,
information flow analysis, language-based security, security and
trust aspects in ubiquitous computing, validation/analysis tools,
web service security/trust/privacy, GRID security, security risk
assessment, and case studies.
Most programmers' fear of user interface (UI) programming comes from their fear of doing UI design. They think that UI design is like graphic designthe mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers insteadstrong at reasoning, weak on artistic judgment, and incapable of doing UI design. In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple. In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading "User Interface Design for Programmers," you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works.
This book constitutes the refereed proceedings of the 19th International Conference on Architecture of Computing Systems, ARCS 2006, held in March 2006. The 32 revised full papers presented together with two invited and keynote papers were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on pervasive computing, memory systems, architectures, multiprocessing, energy efficient design, power awareness, network protocols, security, and distributed networks.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The book presents 24 papers organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.
This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA, June 2006. The book presents 33 revised full papers, focusing on distributed computing issues in large-scale networked sensor systems. Coverage includes topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
The 7th International Conference on Theory and Applications of Satis?ab- ity Testing (SAT 2004) was held 10-13 May 2004 in Vancouver, BC, Canada. The conference featured 9 technical paper sessions, 2 poster sessions, as well as the 2004 SAT Solver Competition and the 2004 QBF Solver Evaluation. It also included invited talks by Stephen A. Cook (University of Toronto) and Kenneth McMillan (Cadence Berkeley Labs). The 89 participants represented no less than 17 countries and four continents. SAT 2004 continued the series of meetings which started with the Workshops on Satis?ability held in Siena, Italy (1996), Paderborn, Germany (1998) and Renesse, The Netherlands (2000); the Workshop on Theory and Applications of Satis?ability Testing held in Boston, USA(2001);theSymposiumonTheoryandApplicationsofSatis?abilityTesting held in Cincinnati, USA (2002); and the 6th International Conference on Theory and Applications of Satis?ability Testing held in Santa Margherita Ligure, Italy (2003). The International Conference on Theory and Applications of Satis?ability Testing is the primary annual meeting for researchers studying the propo- tional satis?ability problem (SAT), a prominent problem in both theoretical and applied computer science. SAT lies at the heart of the most important open problem in complexity theory (P vsNP) and underlies many applications in, among other examples, arti?cial intelligence, operations research and electronic design engineering. The primary objective of the conferences is to bring together researchersfromvariousareasandcommunities, includingtheoreticalandexp- imental computer science as well as many relevant application areas, to promote collaboration and the communication of new theoretical and practical results in SAT-related research and its industrial applications
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) as an annual conference that brings together experts from throughout the world to discuss the state of the art in the areas of intrusion detection, detection of malware, and assessment of vulnerabilities. TheDIMVA2005ProgramCommitteereceived51submissionsfrom18co- tries. This represents an increase of approximately 25% compared with the n- ber of submissions last year. All submissions were carefully reviewed by at least three Program Committee members or external experts according to the cri- ria of scienti?c novelty, importance to the ?eld, and technical quality. The ?nal selection took place at a meeting held on March 18, 2005, in Zurich, Switz- land. Fourteen full papers were selected for presentation and publication in the conference proceedings. In addition, three papers were selected for presentation in the industry track of the conference. The program featured both theoretical and practical research results, which were grouped into six sessions. Philip Att?eld from the Northwest Security Institute gave the opening keynote speech. The slides presented by the authors are available on the DIMVA 2005 Web site at http: //www.dimva.org/dimva2005 We sincerely thank all those who submitted papers as well as the Program Committee members and the external reviewers for their valuable contributions.
We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany. We hope that all attendees enjoyed their time in that ancient and historic city. Quality of Service(QoS) continues to be an important area of research. T- ditionally very focused on the area of networking, it has grown to include mobile applications, wireless environments, 3G and 4G cellular networks, user expe- ence, overlay networks, large-scale systemsand other important areas ofappli- tion. Six full-paper sessions that comprised selected papers of very high quality were devoted to the above mentioned, cutting-edge topics in this volume. We had a fascinating cross-disciplinary program and hope to have seeded conn- tions between di?erent disciplines and between industry and academia. In addition to the reviewed paper sessions, we were pleased to present two inspiring keynote speakers in this year's program: Randy Katz, Universityof California, Berkeley, USA, and Michael Stal, SiemensAG, Munich, Germany. One speaker being from academia and one from industry, re?ected well the balanced view of this workshop. Both keynotes extended the scope of QoS and addressed pressing issues, such as "spam," and leading trends, such as "service orientation," and their relevance to QoS.
The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has grown from a relativelysmallconferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2005 was held at Queensland University of Technology in Brisbane, d- ing July 4-6, 2005. This year there were 185 paper submissions and from these 45 papers were accepted. Accepted papers came from 13 countries, with the largest proportions coming from Australia (12), China (8) and Japan (6). India and Korea both contributed 2 papers and one came from Singapore. There were also 11 papers from European countries and 3 from North America. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2005. The contributed papers were supplemented by four invited talks from e- nent researchers in information security. The father-and-son team of Prof. and Dr. Bob Blakley (Texas A&M University and IBM) gave a talk entitled "All Sail, No Anchor III," following up on a theme started at their ACISP 2000 - vited talk. Adrian McCullagh (Phillips Fox Lawyers and QUT) talked on the bene?t and perils of Internet banking. Ted Dunstone (Biometix) enlightened us on multimodal biometric systems. Yvo Desmedt (University College London) elucidated the growing gap between theory and practice in information security.
The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, held in Marina del Rey, California, USA in June/July 2005. The 26 revised full papers presented were carefully reviewed and selected from 85 submissions; also included are the abstracts of 3 invited talks, 2 short papers, 9 invited poster abstracts, and 10 contributed abstracts.The papers address all current aspects of distributed computing issues in large-scale networked sensor systems, including systematic design techniques and tools, algorithms, and applications.
This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc
The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity, enableparticipantstobene?tfrompersonalcontactwithother researchers and expand their knowledge, support the activities of the Working Group, and disseminate the research results. This volume contains the 24 papers that were presented at the working c- ference. These papers, which had been selected from 54 submissions, were rig- ously reviewed by the Working Group members. The volume is o?ered both to document progressand to provideresearcherswith a broadperspective of recent developments in data and application security. A special note of thanks goes to the many volunteers whose e?orts made the working conference a success. We wish to thank Divesh Srivastava for agreeing to deliver the invited talk, Carl Landwehr and David Spooner for organizing the panel, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to T. C. Ting for serving as the General Chair, Steven Demurjian and Charles E. Phillips, Jr. for their hard work as Local Arrangements Chairs, and Pierangela Samarati, Working Group Chair, for managing the IFIP approval process. We would also like to acknowledge Sabrina De Capitani di Vimercati for managing the conference's Web site.
This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.
This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the ?eld of Petri nets and related models of concurrency, and to foster new - vancesintheapplicationandtheoryofPetrinets.Theconferencestypicallyhave 100-150 participants, one third from industry and the others from universities and research institutions, and they always take place in the last week of June. SuccessiveeditionsoftheconferencearecoordinatedbytheSteeringCommittee, whose members are listed on the next page, which also supervises several other activities-see the Petri Nets World at the URLwww.daimi.au.dk/PetriNets. The 2005 conference was organized in Miami by the School of Computer Science at Florida International University (USA). We would like to express our deep thanks to the Organizing Committee, chaired by Xudong He, for the time and e?ort invested to the bene't of the community in making the event successful. Several tutorials and workshops were organized within the conf- ence, covering introductory and advanced aspects related to Petri nets. Detailed information can be found at the conference URLwww.cs.fiu.edu/atpn2005. We received altogether 71 submissions from authors in 22 countries. Two submissions were not in the scope of the conference. The Program Comm- tee selected 23 contributions from the remaining 69 submissions, classi?ed into three categories: application papers (6 accepted, 25 submitted), theory papers (14 accepted, 40 submitted), and tool presentations (3 accepted, 4 submitted).
Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#. Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code
ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.
Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment. This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.
This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."
E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.
WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion
Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%." |
![]() ![]() You may like...
EURO Working Group on DSS - A Tour of…
Jason Papathanasiou, Pascale Zarate, …
Hardcover
R2,941
Discovery Miles 29 410
Scheduling with Time-Changing Effects…
Vitaly A. Strusevich, Kabir Rustogi
Hardcover
Code of Federal Regulations, Title 31…
Office of the Federal Register (U S )
Paperback
R1,216
Discovery Miles 12 160
29th European Symposium on Computer…
Anton A Kiss, Edwin Zondervan, …
Hardcover
R12,034
Discovery Miles 120 340
|