A central aim and ever-lasting dream of computer science is to put the development of hardware and software systems on a mathematical basis which is both firm and practical. Such a scientific foundation is needed especially for the construction of reactive programs, like communication protocols or control systems.
For the construction and analysis of reactive systems an elegant and powerful theory has been developed based on automata theory, logical systems for the specification of nonterminating behavior, and infinite two-person games.
The 19 chapters presented in this...
A central aim and ever-lasting dream of computer science is to put the development of hardware and software systems on a mathematical basis which i...
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachusetts, and the third held in Europe, this is the ?rst Workshop on the West Coast of the United States. There was a record number of submissions this year and in response the technical program was extended to 3 days. As is evident by the papers in these proceedings, there have been again many excellent submissions. Selecting the papers for this year's CHES was not an easy task, and we regret that we could not accept many contributions due to the...
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachuse...
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA),...
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 Octob...
Machine Learning has become a key enabling technology for many engineering applications and theoretical problems alike. To further discussions and to dis- minate new results, a Summer School was held on February 11-22, 2002 at the Australian National University. The current book contains a collection of the main talks held during those two weeks in February, presented as tutorial chapters on topics such as Boosting, Data Mining, Kernel Methods, Logic, Reinforcement Learning, and Statistical Learning Theory. The papers provide an in-depth overview of these exciting new areas, contain a large...
Machine Learning has become a key enabling technology for many engineering applications and theoretical problems alike. To further discussions and to ...
The second Privacy Enhancing Technologies workshop (PET2002), held April 14-15, 2002 in San Francisco, California, continued the enthusiasm and quality of the ?rst workshop in July 2000 (then called "Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability," LNCS 2009). The workshop focused on the design and realization of anonymity and an- censorship services for the Internet and other communication networks. For c- venienceitwasheldattheCathedralHillHoteljustpriortotheTwelfthConf- ence on Computers, Freedom, and Privacy (CFP2002), but it was not formally...
The second Privacy Enhancing Technologies workshop (PET2002), held April 14-15, 2002 in San Francisco, California, continued the enthusiasm and qualit...
By presenting state-of-the-art aspects of theoretical computer science and practical applications in various fields, this book commemorates the 60th birthday of Thomas Ottmann.
The 26 research papers presented span the whole range of Thomas Ottmann's scientific career, from formal languages to algorithms and data structures, from topics in practical computer science like software engineering or database systems to applications of Web technology, groupware, and e-learning.
By presenting state-of-the-art aspects of theoretical computer science and practical applications in various fields, this book commemorates the 60t...
This volume of the Springer Series "Lecture Notes in Computer Science" c- tains refereed papers which were presented at the Fifth International Conf- ence on Numerical Methods and Applications, NMA 2002, held in Borovets, Bulgaria, during 20-24 August 2002. The NMA 2002 Conference was organized by the Central Laboratory for Parallel Processing at the Bulgarian Academy of Sciences in cooperation with SIAM (Society for Industrial and Applied Mat- matics) and GAMM (Gesellschaft fur ] Angewandte Mathematik und Mechanik). Co-organizers of this traditional scienti?c meeting were the Institute of...
This volume of the Springer Series "Lecture Notes in Computer Science" c- tains refereed papers which were presented at the Fifth International Conf- ...
This volume originated in the Workshop on Membrane Computing, WMC- CdeA 2002, which took place in Curtea de Arge, s, Romania, during August 19- 23, 2002.This was the third annual workshop held in Curtea de Arge, s.The rst one, Workshop on Multiset Processing, WMP-CdeA 2000, took place in August 2000, and the proceedings were published in Lecture Notes in Computer Science, volume 2235.The second one, Workshop on Membrane Comp- ing, WMC-CdeA 2001, took place in August 2001, and selected papers were published as a special issue of Fundamenta Informaticae, volume 49, numbers 1-3, 2002. The aim of...
This volume originated in the Workshop on Membrane Computing, WMC- CdeA 2002, which took place in Curtea de Arge, s, Romania, during August 19- 23, 20...
This book constitutes the refereed proceedings of the 10th International Workshop on Abstract State Machines, ASM 2003, held in Taormina, Italy in March 2003.
The 16 revised full papers presented together with 8 invited papers and 12 abstracts were carefully reviewed and selected for inclusion in the book. The papers reflect the state of the art of the abstract state machine method for the design and analysis of complex software/hardware systems. Besides theoretical results and methodological progress, application in various fields are studied as well.
This book constitutes the refereed proceedings of the 10th International Workshop on Abstract State Machines, ASM 2003, held in Taormina, Italy in ...
For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.
This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C...
For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent ge...