Table of contents for issues of Lecture Notes in Computer Science

Last update: Thu Nov 6 10:26:27 MST 2014                Valid HTML 3.2!

Volume 2991, 2004
Volume 3130, 2004
Volume 3152, 2004
Volume 3231, 2004


Lecture Notes in Computer Science
Volume 2991, 2004

                      Anonymous   Book Frontmatter . . . . . . . . . . . . ??
Jürgen Wolff von Gudenberg   OOP and Interval Arithmetic --- Language
                                  Support and Libraries  . . . . . . . . . 1--14
         Werner Hofschuster and   
             Walter Krämer   C-XSC 2.0 --- A C++ Library for Extended
                                  Scientific Computing . . . . . . . . . . 15--35
          R. Baker Kearfott and   
               Markus Neher and   
            Shin'ichi Oishi and   
                    Fabien Rico   Libraries, Tools, and Interactive
                                  Systems for Verified Computations Four
                                  Case Studies . . . . . . . . . . . . . . 36--63
             Markus Grimmer and   
                Knut Petras and   
                 Nathalie Revol   Multiple Precision Interval Packages:
                                  Comparing Different Approaches . . . . . 64--90
             Michel Kieffer and   
                    Eric Walter   Nonlinear Parameter and State Estimation
                                  for Cooperative Systems in a
                                  Bounded-Error Context  . . . . . . . . . 107--123
                Eric Walter and   
            Isabelle Braems and   
                 Luc Jaulin and   
                 Michel Kieffer   Guaranteed Numerical Computation as an
                                  Alternative to Computer Algebra for
                                  Testing Models for Identifiability . . . 124--131
             Ekaterina Auer and   
Andrés Kecskeméthy and   
          Martin Tändl and   
              Holger Traczinski   Interval Algorithms in Modeling of
                                  Multibody Systems  . . . . . . . . . . . 132--159
          Katja Bühler and   
                Eva Dyllong and   
                 Wolfram Luther   Reliable Distance and Intersection
                                  Computation Using Finite Precision
                                  Geometry . . . . . . . . . . . . . . . . 160--190
          Götz Alefeld and   
              Günter Mayer   On Singular Interval Systems . . . . . . 191--197
            Daniela Fausten and   
        Gerhard Haßlinger   Verified Numerical Analysis of the
                                  Performance of Switching Systems in
                                  Telecommunication  . . . . . . . . . . . 206--225
             Stefan Borovac and   
                 Gerhard Heindl   Result Verification for Computational
                                  Problems in Geodesy  . . . . . . . . . . 226--242
                Hermann Schichl   Global Optimization in the COCONUT
                                  Project  . . . . . . . . . . . . . . . . 243--249
       Laurent Granvilliers and   
          Vladik Kreinovich and   
            Norbert Müller   Novel Approaches to Numerical Software
                                  with Result Verification . . . . . . . . 274--305
               Sylvie Putot and   
              Eric Goubault and   
                Matthieu Martel   Static Analysis-Based Validation of
                                  Floating-Point Computations  . . . . . . 306--313
                      Anonymous   Book Backmatter  . . . . . . . . . . . . ??


Lecture Notes in Computer Science
Volume 3130, 2004

    Christos K. K. Loverdos and   
           Apostolos Syropoulos   Digital Typography in the New
                                  Millennium: Flexible Documents by a
                                  Flexible Engine  . . . . . . . . . . . . 1--16
                John Plaice and   
         Yannis Haralambous and   
               Paul Swoboda and   
             Gábor Bella   Moving $ \Omega $ to an Object-Oriented
                                  Platform . . . . . . . . . . . . . . . . 17--26
  Jagoba Arias Pérez and   
 Jesús Lázaro and   
         Juan M. Aguirregabiria   Basque: A Case Study in Generalizing
                                  Language Support . . . . . . . . . . . . 27--33
                 Johannis Likos   $ \mu o \nu o 2 \pi o \lambda \upsilon
                                  $: Java-Based Conversion of Monotonic to
                                  Polytonic Greek  . . . . . . . . . . . . 34--54
              Manasi Athale and   
                   Rahul Athale   Using \LaTeX to Typeset a
                                  Mar\=a\dth\=\i-English Dictionary  . . . 55--58
             Dimitrios Filippou   Hyphenation Patterns for Ancient and
                                  Modern Greek . . . . . . . . . . . . . . 59--67
             Kenneth R. Beesley   Typesetting the Deseret Alphabet with
                                  \LaTeX and \MF . . . . . . . . . . . . . 68--111
    Luis Nobre Gonçalves   \FEATPOST and a Review of $3$D \MP
                                  Packages . . . . . . . . . . . . . . . . 112--124
                  Luca Padovani   Interactive Editing of MathML Markup
                                  Using \TeX Syntax  . . . . . . . . . . . 125--138
               Jin-Hwan Cho and   
               Haruhiko Okumura   Typesetting CJK Languages with $ \Omega
                                  $  . . . . . . . . . . . . . . . . . . . 139--148
          Mustapha Eddahibi and   
           Azzeddine Lazrek and   
                    Khalid Sami   Dynamic Arabic Mathematical Fonts  . . . 149--157
            Mostafa Banouni and   
         Mohamed Elyaakoubi and   
               Azzeddine Lazrek   Arabic Mathematical e-Documents  . . . . 158--168
          W\lodzimierz Bzyl and   
            Tomasz Przechlewski   Migrating to XML: The Case of the GUST
                                  Bulletin Archive . . . . . . . . . . . . 169--178
              Jan Hole\vcek and   
                     Petr Sojka   Animations in \pdfTeX-Generated PDF: A
                                  New Method for Directly Embedding
                                  Animation into PDF . . . . . . . . . . . 179--191
    Jérôme Laurens   i\TeXMac: An Integrated \TeX Environment
                                  for Mac OS X . . . . . . . . . . . . . . 192--202
            Jean-Michel Hufflen   Ml\BibTeX: Beyond \LaTeX . . . . . . . . 203--215
            Tomasz Przechlewski   Managing \TeX Resources with XML Topic
                                  Maps . . . . . . . . . . . . . . . . . . 216--228
            Frank-Rene Schaefer   \cSäfer\TeX: Source Code Esthetics for
                                  Automated Typesetting  . . . . . . . . . 229--239
           Karel Pí\vska   Creating Type 1 Fonts from \MF Sources:
                                  Comparison of Tools, Techniques and
                                  Results  . . . . . . . . . . . . . . . . 240--256
                George Williams   Beyond Glyphs, Advanced Typographic
                                  Features of Fonts  . . . . . . . . . . . 257--263


Lecture Notes in Computer Science
Volume 3152, 2004

              Alex Biryukov and   
   Christophe De Canni\`ere and   
        Michaël Quisquater   On Multiple Linear Approximations  . . . 1
            Nicolas T. Courtois   Feistel Schemes and Bi-linear
                                  Cryptanalysis: (Extended Abstract) . . . 23
                  Dan Boneh and   
               Xavier Boyen and   
                  Hovav Shacham   Short Group Signatures . . . . . . . . . 41
              Jan Camenisch and   
               Anna Lysyanskaya   Signature Schemes and Anonymous
                                  Credentials from Bilinear Maps . . . . . 56
          Thomas Holenstein and   
                Ueli Maurer and   
              Johan Sjödin   Complete Classification of Bilinear
                                  Hard-Core Functions  . . . . . . . . . . 73
            Chun-Yuan Hsiao and   
                  Leonid Reyzin   Finding Collisions on a Public Road, or
                                  Do Secure Hash Functions Need Secret
                                  Coins? . . . . . . . . . . . . . . . . . 92
                Jacques Patarin   Security of Random Feistel Schemes with
                                  $5$ or More Rounds . . . . . . . . . . . 106
            Katsuyuki Okeya and   
        Katja Schmidt-Samoa and   
            Christian Spahn and   
                Tsuyoshi Takagi   Signed Binary Representations Revisited  123
              Michael Scott and   
         Paulo S. L. M. Barreto   Compressed Pairings  . . . . . . . . . . 140
            Marten van Dijk and   
                 David Woodruff   Asymptotically Optimal Communication for
                                  Torus-Based Cryptography . . . . . . . . 157
                   Craig Gentry   How to Compress Rabin Ciphertexts and
                                  Signatures (and More)  . . . . . . . . . 179
                       Qi Cheng   On the Bounded Sum-of-Digits Discrete
                                  Logarithm Problem in Finite Fields . . . 201
                  Alexander May   Computing the RSA Secret Key Is
                                  Deterministic Polynomial Time Equivalent
                                  to Factoring . . . . . . . . . . . . . . 213
                Rosario Gennaro   Multi-trapdoor Commitments and Their
                                  Applications to Proofs of Knowledge
                                  Secure Under Concurrent
                                  Man-in-the-Middle Attacks  . . . . . . . 220
      Giovanni Di Crescenzo and   
          Giuseppe Persiano and   
                  Ivan Visconti   Constant-Round Resettable Zero Knowledge
                                  with Concurrent Soundness in the Bare
                                  Public-Key Model . . . . . . . . . . . . 237
         Ivan Damgård and   
                 Serge Fehr and   
                  Louis Salvail   Zero-Knowledge Proofs and String
                                  Commitments Withstanding Quantum Attacks 254
              Mihir Bellare and   
                Adriana Palacio   The Knowledge-of-Exponent Assumptions
                                  and $3$-Round Zero-Knowledge Protocols   273
                  Eli Biham and   
                      Rafi Chen   Near-Collisions of SHA-0 . . . . . . . . 290
                   Antoine Joux   Multicollisions in Iterated Hash
                                  Functions. Application to Cascaded
                                  Constructions  . . . . . . . . . . . . . 306
               Masayuki Abe and   
                     Serge Fehr   Adaptively Secure Feldman VSS and
                                  Applications to Universally-Composable
                                  Threshold Cryptography . . . . . . . . . 317
              Jonathan Katz and   
               Rafail Ostrovsky   Round-Optimal Secure Two-Party
                                  Computation  . . . . . . . . . . . . . . 335
                   Susan Landau   Security, Liberty, and Electronic
                                  Communications . . . . . . . . . . . . . 355
       Håvard Molland and   
                  Tor Helleseth   An Improved Correlation Attack Against
                                  Irregular Clocked and Filtered Keystream
                                  Generators . . . . . . . . . . . . . . . 373
              Philip Hawkes and   
                Gregory G. Rose   Rewriting Variables: The Complexity of
                                  Fast Algebraic Attacks on Stream Ciphers 390
                      Yi Lu and   
                 Serge Vaudenay   Faster Correlation Attack on Bluetooth
                                  Keystream Generator E0 . . . . . . . . . 407
             Kaoru Kurosawa and   
                    Yvo Desmedt   A New Paradigm of Hybrid Encryption
                                  Scheme . . . . . . . . . . . . . . . . . 426
                  Dan Boneh and   
                   Xavier Boyen   Secure Identity Based Encryption Without
                                  Random Oracles . . . . . . . . . . . . . 443
                  Tal Moran and   
             Ronen Shaltiel and   
                  Amnon Ta-Shma   Non-interactive Timestamping in the
                                  Bounded Storage Model  . . . . . . . . . 460
             Dario Catalano and   
          David Pointcheval and   
                  Thomas Pornin   IPAKE: Isomorphisms for Password-Based
                                  Authenticated Key Exchange . . . . . . . 477
             Yevgeniy Dodis and   
            Rosario Gennaro and   
         Johan Håstad and   
              Hugo Krawczyk and   
                      Tal Rabin   Randomness Extraction and Key Derivation
                                  Using the CBC, Cascade and HMAC Modes    494
        Michael T. Goodrich and   
            Jonathan Z. Sun and   
               Roberto Tamassia   Efficient Tree-Based Revocation in
                                  Groups of Low-State Devices  . . . . . . 511
              Cynthia Dwork and   
                   Kobbi Nissim   Privacy-Preserving Datamining on
                                  Vertically Partitioned Databases . . . . 528
               K. Srinathan and   
           Arvind Narayanan and   
                C. Pandu Rangan   Optimal Perfectly Secure Message
                                  Transmission . . . . . . . . . . . . . . 545
             Matthias Fitzi and   
                Stefan Wolf and   
         Jürg Wullschleger   Pseudo-signatures, Broadcast, and
                                  Multi-party Computation from Correlated
                                  Randomness . . . . . . . . . . . . . . . 562


Lecture Notes in Computer Science
Volume 3231, 2004

            Elias Sinderson and   
                Vish Magapu and   
                     Ronald Mak   Middleware and Web Services for the
                                  Collaborative Information Portal of
                                  NASA's Mars Exploration Rovers Mission   1
                Brian F. Cooper   A Content Model for Evaluating
                                  Peer-to-Peer Searching Techniques  . . . 18
                Hailong Cai and   
                       Jun Wang   Foreseer: A Novel, Locality-Aware
                                  Peer-to-Peer System Architecture for
                                  Keyword Searches . . . . . . . . . . . . 38
                Brian F. Cooper   Guiding Queries to Information Sources
                                  with InfoBeacons . . . . . . . . . . . . 59
       Márk Jelasity and   
           Rachid Guerraoui and   
       Anne-Marie Kermarrec and   
              Maarten van Steen   The Peer Sampling Service: Experimental
                                  Evaluation of Unstructured Gossip-Based
                                  Implementations  . . . . . . . . . . . . 79
    Miklós Maróti   Directed Flood-Routing Framework for
                                  Wireless Sensor Networks . . . . . . . . 99
                Jingwen Jin and   
                Klara Nahrstedt   On Exploring Performance Optimizations
                                  in Web Service Composition . . . . . . . 115
                 Baochun Li and   
                  Jiang Guo and   
                       Mea Wang   iOverlay: A Lightweight Middleware
                                  Infrastructure for Overlay Application
                                  Implementations  . . . . . . . . . . . . 135
         Christian Plattner and   
                 Gustavo Alonso   Ganymed: Scalable Replication for
                                  Transactional Web Applications . . . . . 155
Jesús M. Milan-Franco and   
Ricardo Jiménez-Peris and   
Marta Patiño-Martínez and   
                  Bettina Kemme   Adaptive Middleware for Data Replication 175
               Avraham Leff and   
              James T. Rayfield   Alternative Edge-Server Architectures
                                  for Enterprise JavaBeans Applications    195
                Amol Nayate and   
                Mike Dahlin and   
                   Arun Iyengar   Transparent Information Dissemination    212
               Jinling Wang and   
                Beihong Jin and   
                        Jing Li   An Ontology-Based Publish/Subscribe
                                  System . . . . . . . . . . . . . . . . . 232
             Abhishek Gupta and   
             Ozgur D. Sahin and   
          Divyakant Agrawal and   
                  Amr El Abbadi   Meghdoot: Content-Based
                                  Publish/Subscribe over P2P Networks  . . 254
              Yuanyuan Zhao and   
             Daniel Sturman and   
                   Sumeer Bhola   Subscription Propagation in
                                  Highly-Available Publish/Subscribe
                                  Middleware . . . . . . . . . . . . . . . 274
                 Stefan Tai and   
               Rania Khalaf and   
                Thomas Mikalsen   Composition of Coordinated Web Services  294
              Vijay K. Naik and   
Swaminathan Sivasubramanian, Sr.iram Krishnan   Adaptive Resource Sharing in a Web
                                  Services Environment . . . . . . . . . . 311
      Shankar R. Ponnekanti and   
                    Armando Fox   Interoperability Among Independently
                                  Evolving Web Services  . . . . . . . . . 331
           Sushil K. Prasad and   
            Vijay Madisetti and   
        Shamkant B. Navathe and   
            Raj Sunderraman and   
              Erdogan Dogdu and   
              Anu Bourgeois and   
              Michael Weeks and   
                   Bing Liu and   
         Janaka Balasooriya and   
            Arthi Hariharan and   
                 Wanxia Xie and   
           Praveen Madiraju and   
           Srilaxmi Malladi and   
       Raghupathy Sivakumar and   
            Alex Zelikovsky and   
              Yanqing Zhang and   
                     Yi Pan and   
                 Saied Belkasim   SyD: A Middleware Testbed for
                                  Collaborative Applications over Small
                                  Heterogeneous Devices and Data Stores    352
               Manuel Roman and   
                   Nayeem Islam   Dynamically Programmable and
                                  Reconfigurable Middleware Services . . . 372
          Anand Ranganathan and   
           Jalal Al-Muhtadi and   
               Shiva Chetan and   
               Roy Campbell and   
             M. Dennis Mickunas   MiddleWhere: A Middleware for Location
                                  Awareness in Ubiquitous Computing
                                  Applications . . . . . . . . . . . . . . 397
         Shivajit Mohapatra and   
      Nalini Venkatasubramanian   A Game Theoretic Approach for Power
                                  Aware Middleware . . . . . . . . . . . . 417
                Mick Jordan and   
        Grzegorz Czajkowski and   
          Kirill Kouklinski and   
                  Glenn Skinner   Extending a J2EE Server with Dynamic and
                                  Flexible Resource Management . . . . . . 439
              Daniel Oberle and   
           Andreas Eberhart and   
              Steffen Staab and   
                   Raphael Volz   Developing and Managing Software
                                  Components in an Ontology-Based
                                  Application Server . . . . . . . . . . . 459
               Eli Tilevich and   
             Yannis Smaragdakis   Portable and Efficient Distributed
                                  Threads for Java . . . . . . . . . . . . 478
             Andreas Billig and   
              Susanne Busse and   
            Andreas Leicher and   
                          other   Platform Independent Model
                                  Transformation Based on TRIPLE . . . . . 493