Last update: Thu Nov 6 10:26:27 MST 2014
Volume 2991, 2004Anonymous Book Frontmatter . . . . . . . . . . . . ?? Jürgen Wolff von Gudenberg OOP and Interval Arithmetic --- Language Support and Libraries . . . . . . . . . 1--14 Werner Hofschuster and Walter Krämer C-XSC 2.0 --- A C++ Library for Extended Scientific Computing . . . . . . . . . . 15--35 R. Baker Kearfott and Markus Neher and Shin'ichi Oishi and Fabien Rico Libraries, Tools, and Interactive Systems for Verified Computations Four Case Studies . . . . . . . . . . . . . . 36--63 Markus Grimmer and Knut Petras and Nathalie Revol Multiple Precision Interval Packages: Comparing Different Approaches . . . . . 64--90 Michel Kieffer and Eric Walter Nonlinear Parameter and State Estimation for Cooperative Systems in a Bounded-Error Context . . . . . . . . . 107--123 Eric Walter and Isabelle Braems and Luc Jaulin and Michel Kieffer Guaranteed Numerical Computation as an Alternative to Computer Algebra for Testing Models for Identifiability . . . 124--131 Ekaterina Auer and Andrés Kecskeméthy and Martin Tändl and Holger Traczinski Interval Algorithms in Modeling of Multibody Systems . . . . . . . . . . . 132--159 Katja Bühler and Eva Dyllong and Wolfram Luther Reliable Distance and Intersection Computation Using Finite Precision Geometry . . . . . . . . . . . . . . . . 160--190 Götz Alefeld and Günter Mayer On Singular Interval Systems . . . . . . 191--197 Daniela Fausten and Gerhard Haßlinger Verified Numerical Analysis of the Performance of Switching Systems in Telecommunication . . . . . . . . . . . 206--225 Stefan Borovac and Gerhard Heindl Result Verification for Computational Problems in Geodesy . . . . . . . . . . 226--242 Hermann Schichl Global Optimization in the COCONUT Project . . . . . . . . . . . . . . . . 243--249 Laurent Granvilliers and Vladik Kreinovich and Norbert Müller Novel Approaches to Numerical Software with Result Verification . . . . . . . . 274--305 Sylvie Putot and Eric Goubault and Matthieu Martel Static Analysis-Based Validation of Floating-Point Computations . . . . . . 306--313 Anonymous Book Backmatter . . . . . . . . . . . . ??
Christos K. K. Loverdos and Apostolos Syropoulos Digital Typography in the New Millennium: Flexible Documents by a Flexible Engine . . . . . . . . . . . . 1--16 John Plaice and Yannis Haralambous and Paul Swoboda and Gábor Bella Moving $ \Omega $ to an Object-Oriented Platform . . . . . . . . . . . . . . . . 17--26 Jagoba Arias Pérez and Jesús Lázaro and Juan M. Aguirregabiria Basque: A Case Study in Generalizing Language Support . . . . . . . . . . . . 27--33 Johannis Likos $ \mu o \nu o 2 \pi o \lambda \upsilon $: Java-Based Conversion of Monotonic to Polytonic Greek . . . . . . . . . . . . 34--54 Manasi Athale and Rahul Athale Using \LaTeX to Typeset a Mar\=a\dth\=\i-English Dictionary . . . 55--58 Dimitrios Filippou Hyphenation Patterns for Ancient and Modern Greek . . . . . . . . . . . . . . 59--67 Kenneth R. Beesley Typesetting the Deseret Alphabet with \LaTeX and \MF . . . . . . . . . . . . . 68--111 Luis Nobre Gonçalves \FEATPOST and a Review of $3$D \MP Packages . . . . . . . . . . . . . . . . 112--124 Luca Padovani Interactive Editing of MathML Markup Using \TeX Syntax . . . . . . . . . . . 125--138 Jin-Hwan Cho and Haruhiko Okumura Typesetting CJK Languages with $ \Omega $ . . . . . . . . . . . . . . . . . . . 139--148 Mustapha Eddahibi and Azzeddine Lazrek and Khalid Sami Dynamic Arabic Mathematical Fonts . . . 149--157 Mostafa Banouni and Mohamed Elyaakoubi and Azzeddine Lazrek Arabic Mathematical e-Documents . . . . 158--168 W\lodzimierz Bzyl and Tomasz Przechlewski Migrating to XML: The Case of the GUST Bulletin Archive . . . . . . . . . . . . 169--178 Jan Hole\vcek and Petr Sojka Animations in \pdfTeX-Generated PDF: A New Method for Directly Embedding Animation into PDF . . . . . . . . . . . 179--191 Jérôme Laurens i\TeXMac: An Integrated \TeX Environment for Mac OS X . . . . . . . . . . . . . . 192--202 Jean-Michel Hufflen Ml\BibTeX: Beyond \LaTeX . . . . . . . . 203--215 Tomasz Przechlewski Managing \TeX Resources with XML Topic Maps . . . . . . . . . . . . . . . . . . 216--228 Frank-Rene Schaefer \cSäfer\TeX: Source Code Esthetics for Automated Typesetting . . . . . . . . . 229--239 Karel Pí\vska Creating Type 1 Fonts from \MF Sources: Comparison of Tools, Techniques and Results . . . . . . . . . . . . . . . . 240--256 George Williams Beyond Glyphs, Advanced Typographic Features of Fonts . . . . . . . . . . . 257--263
Alex Biryukov and Christophe De Canni\`ere and Michaël Quisquater On Multiple Linear Approximations . . . 1 Nicolas T. Courtois Feistel Schemes and Bi-linear Cryptanalysis: (Extended Abstract) . . . 23 Dan Boneh and Xavier Boyen and Hovav Shacham Short Group Signatures . . . . . . . . . 41 Jan Camenisch and Anna Lysyanskaya Signature Schemes and Anonymous Credentials from Bilinear Maps . . . . . 56 Thomas Holenstein and Ueli Maurer and Johan Sjödin Complete Classification of Bilinear Hard-Core Functions . . . . . . . . . . 73 Chun-Yuan Hsiao and Leonid Reyzin Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins? . . . . . . . . . . . . . . . . . 92 Jacques Patarin Security of Random Feistel Schemes with $5$ or More Rounds . . . . . . . . . . . 106 Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi Signed Binary Representations Revisited 123 Michael Scott and Paulo S. L. M. Barreto Compressed Pairings . . . . . . . . . . 140 Marten van Dijk and David Woodruff Asymptotically Optimal Communication for Torus-Based Cryptography . . . . . . . . 157 Craig Gentry How to Compress Rabin Ciphertexts and Signatures (and More) . . . . . . . . . 179 Qi Cheng On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields . . . 201 Alexander May Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring . . . . . . . . . . . . . . 213 Rosario Gennaro Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks . . . . . . . 220 Giovanni Di Crescenzo and Giuseppe Persiano and Ivan Visconti Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model . . . . . . . . . . . . 237 Ivan Damgård and Serge Fehr and Louis Salvail Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks 254 Mihir Bellare and Adriana Palacio The Knowledge-of-Exponent Assumptions and $3$-Round Zero-Knowledge Protocols 273 Eli Biham and Rafi Chen Near-Collisions of SHA-0 . . . . . . . . 290 Antoine Joux Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions . . . . . . . . . . . . . 306 Masayuki Abe and Serge Fehr Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography . . . . . . . . . 317 Jonathan Katz and Rafail Ostrovsky Round-Optimal Secure Two-Party Computation . . . . . . . . . . . . . . 335 Susan Landau Security, Liberty, and Electronic Communications . . . . . . . . . . . . . 355 Håvard Molland and Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators . . . . . . . . . . . . . . . 373 Philip Hawkes and Gregory G. Rose Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers 390 Yi Lu and Serge Vaudenay Faster Correlation Attack on Bluetooth Keystream Generator E0 . . . . . . . . . 407 Kaoru Kurosawa and Yvo Desmedt A New Paradigm of Hybrid Encryption Scheme . . . . . . . . . . . . . . . . . 426 Dan Boneh and Xavier Boyen Secure Identity Based Encryption Without Random Oracles . . . . . . . . . . . . . 443 Tal Moran and Ronen Shaltiel and Amnon Ta-Shma Non-interactive Timestamping in the Bounded Storage Model . . . . . . . . . 460 Dario Catalano and David Pointcheval and Thomas Pornin IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange . . . . . . . 477 Yevgeniy Dodis and Rosario Gennaro and Johan Håstad and Hugo Krawczyk and Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes 494 Michael T. Goodrich and Jonathan Z. Sun and Roberto Tamassia Efficient Tree-Based Revocation in Groups of Low-State Devices . . . . . . 511 Cynthia Dwork and Kobbi Nissim Privacy-Preserving Datamining on Vertically Partitioned Databases . . . . 528 K. Srinathan and Arvind Narayanan and C. Pandu Rangan Optimal Perfectly Secure Message Transmission . . . . . . . . . . . . . . 545 Matthias Fitzi and Stefan Wolf and Jürg Wullschleger Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness . . . . . . . . . . . . . . . 562
Elias Sinderson and Vish Magapu and Ronald Mak Middleware and Web Services for the Collaborative Information Portal of NASA's Mars Exploration Rovers Mission 1 Brian F. Cooper A Content Model for Evaluating Peer-to-Peer Searching Techniques . . . 18 Hailong Cai and Jun Wang Foreseer: A Novel, Locality-Aware Peer-to-Peer System Architecture for Keyword Searches . . . . . . . . . . . . 38 Brian F. Cooper Guiding Queries to Information Sources with InfoBeacons . . . . . . . . . . . . 59 Márk Jelasity and Rachid Guerraoui and Anne-Marie Kermarrec and Maarten van Steen The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations . . . . . . . . . . . . 79 Miklós Maróti Directed Flood-Routing Framework for Wireless Sensor Networks . . . . . . . . 99 Jingwen Jin and Klara Nahrstedt On Exploring Performance Optimizations in Web Service Composition . . . . . . . 115 Baochun Li and Jiang Guo and Mea Wang iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations . . . . . . . . . . . . 135 Christian Plattner and Gustavo Alonso Ganymed: Scalable Replication for Transactional Web Applications . . . . . 155 Jesús M. Milan-Franco and Ricardo Jiménez-Peris and Marta Patiño-Martínez and Bettina Kemme Adaptive Middleware for Data Replication 175 Avraham Leff and James T. Rayfield Alternative Edge-Server Architectures for Enterprise JavaBeans Applications 195 Amol Nayate and Mike Dahlin and Arun Iyengar Transparent Information Dissemination 212 Jinling Wang and Beihong Jin and Jing Li An Ontology-Based Publish/Subscribe System . . . . . . . . . . . . . . . . . 232 Abhishek Gupta and Ozgur D. Sahin and Divyakant Agrawal and Amr El Abbadi Meghdoot: Content-Based Publish/Subscribe over P2P Networks . . 254 Yuanyuan Zhao and Daniel Sturman and Sumeer Bhola Subscription Propagation in Highly-Available Publish/Subscribe Middleware . . . . . . . . . . . . . . . 274 Stefan Tai and Rania Khalaf and Thomas Mikalsen Composition of Coordinated Web Services 294 Vijay K. Naik and Swaminathan Sivasubramanian, Sr.iram Krishnan Adaptive Resource Sharing in a Web Services Environment . . . . . . . . . . 311 Shankar R. Ponnekanti and Armando Fox Interoperability Among Independently Evolving Web Services . . . . . . . . . 331 Sushil K. Prasad and Vijay Madisetti and Shamkant B. Navathe and Raj Sunderraman and Erdogan Dogdu and Anu Bourgeois and Michael Weeks and Bing Liu and Janaka Balasooriya and Arthi Hariharan and Wanxia Xie and Praveen Madiraju and Srilaxmi Malladi and Raghupathy Sivakumar and Alex Zelikovsky and Yanqing Zhang and Yi Pan and Saied Belkasim SyD: A Middleware Testbed for Collaborative Applications over Small Heterogeneous Devices and Data Stores 352 Manuel Roman and Nayeem Islam Dynamically Programmable and Reconfigurable Middleware Services . . . 372 Anand Ranganathan and Jalal Al-Muhtadi and Shiva Chetan and Roy Campbell and M. Dennis Mickunas MiddleWhere: A Middleware for Location Awareness in Ubiquitous Computing Applications . . . . . . . . . . . . . . 397 Shivajit Mohapatra and Nalini Venkatasubramanian A Game Theoretic Approach for Power Aware Middleware . . . . . . . . . . . . 417 Mick Jordan and Grzegorz Czajkowski and Kirill Kouklinski and Glenn Skinner Extending a J2EE Server with Dynamic and Flexible Resource Management . . . . . . 439 Daniel Oberle and Andreas Eberhart and Steffen Staab and Raphael Volz Developing and Managing Software Components in an Ontology-Based Application Server . . . . . . . . . . . 459 Eli Tilevich and Yannis Smaragdakis Portable and Efficient Distributed Threads for Java . . . . . . . . . . . . 478 Andreas Billig and Susanne Busse and Andreas Leicher and other Platform Independent Model Transformation Based on TRIPLE . . . . . 493