Last update:
Thu Nov 6 10:26:27 MST 2014
Anonymous Book Frontmatter . . . . . . . . . . . . ??
Jürgen Wolff von Gudenberg OOP and Interval Arithmetic --- Language
Support and Libraries . . . . . . . . . 1--14
Werner Hofschuster and
Walter Krämer C-XSC 2.0 --- A C++ Library for Extended
Scientific Computing . . . . . . . . . . 15--35
R. Baker Kearfott and
Markus Neher and
Shin'ichi Oishi and
Fabien Rico Libraries, Tools, and Interactive
Systems for Verified Computations Four
Case Studies . . . . . . . . . . . . . . 36--63
Markus Grimmer and
Knut Petras and
Nathalie Revol Multiple Precision Interval Packages:
Comparing Different Approaches . . . . . 64--90
Michel Kieffer and
Eric Walter Nonlinear Parameter and State Estimation
for Cooperative Systems in a
Bounded-Error Context . . . . . . . . . 107--123
Eric Walter and
Isabelle Braems and
Luc Jaulin and
Michel Kieffer Guaranteed Numerical Computation as an
Alternative to Computer Algebra for
Testing Models for Identifiability . . . 124--131
Ekaterina Auer and
Andrés Kecskeméthy and
Martin Tändl and
Holger Traczinski Interval Algorithms in Modeling of
Multibody Systems . . . . . . . . . . . 132--159
Katja Bühler and
Eva Dyllong and
Wolfram Luther Reliable Distance and Intersection
Computation Using Finite Precision
Geometry . . . . . . . . . . . . . . . . 160--190
Götz Alefeld and
Günter Mayer On Singular Interval Systems . . . . . . 191--197
Daniela Fausten and
Gerhard Haßlinger Verified Numerical Analysis of the
Performance of Switching Systems in
Telecommunication . . . . . . . . . . . 206--225
Stefan Borovac and
Gerhard Heindl Result Verification for Computational
Problems in Geodesy . . . . . . . . . . 226--242
Hermann Schichl Global Optimization in the COCONUT
Project . . . . . . . . . . . . . . . . 243--249
Laurent Granvilliers and
Vladik Kreinovich and
Norbert Müller Novel Approaches to Numerical Software
with Result Verification . . . . . . . . 274--305
Sylvie Putot and
Eric Goubault and
Matthieu Martel Static Analysis-Based Validation of
Floating-Point Computations . . . . . . 306--313
Anonymous Book Backmatter . . . . . . . . . . . . ??
Christos K. K. Loverdos and
Apostolos Syropoulos Digital Typography in the New
Millennium: Flexible Documents by a
Flexible Engine . . . . . . . . . . . . 1--16
John Plaice and
Yannis Haralambous and
Paul Swoboda and
Gábor Bella Moving $ \Omega $ to an Object-Oriented
Platform . . . . . . . . . . . . . . . . 17--26
Jagoba Arias Pérez and
Jesús Lázaro and
Juan M. Aguirregabiria Basque: A Case Study in Generalizing
Language Support . . . . . . . . . . . . 27--33
Johannis Likos $ \mu o \nu o 2 \pi o \lambda \upsilon
$: Java-Based Conversion of Monotonic to
Polytonic Greek . . . . . . . . . . . . 34--54
Manasi Athale and
Rahul Athale Using \LaTeX to Typeset a
Mar\=a\dth\=\i-English Dictionary . . . 55--58
Dimitrios Filippou Hyphenation Patterns for Ancient and
Modern Greek . . . . . . . . . . . . . . 59--67
Kenneth R. Beesley Typesetting the Deseret Alphabet with
\LaTeX and \MF . . . . . . . . . . . . . 68--111
Luis Nobre Gonçalves \FEATPOST and a Review of $3$D \MP
Packages . . . . . . . . . . . . . . . . 112--124
Luca Padovani Interactive Editing of MathML Markup
Using \TeX Syntax . . . . . . . . . . . 125--138
Jin-Hwan Cho and
Haruhiko Okumura Typesetting CJK Languages with $ \Omega
$ . . . . . . . . . . . . . . . . . . . 139--148
Mustapha Eddahibi and
Azzeddine Lazrek and
Khalid Sami Dynamic Arabic Mathematical Fonts . . . 149--157
Mostafa Banouni and
Mohamed Elyaakoubi and
Azzeddine Lazrek Arabic Mathematical e-Documents . . . . 158--168
W\lodzimierz Bzyl and
Tomasz Przechlewski Migrating to XML: The Case of the GUST
Bulletin Archive . . . . . . . . . . . . 169--178
Jan Hole\vcek and
Petr Sojka Animations in \pdfTeX-Generated PDF: A
New Method for Directly Embedding
Animation into PDF . . . . . . . . . . . 179--191
Jérôme Laurens i\TeXMac: An Integrated \TeX Environment
for Mac OS X . . . . . . . . . . . . . . 192--202
Jean-Michel Hufflen Ml\BibTeX: Beyond \LaTeX . . . . . . . . 203--215
Tomasz Przechlewski Managing \TeX Resources with XML Topic
Maps . . . . . . . . . . . . . . . . . . 216--228
Frank-Rene Schaefer \cSäfer\TeX: Source Code Esthetics for
Automated Typesetting . . . . . . . . . 229--239
Karel Pí\vska Creating Type 1 Fonts from \MF Sources:
Comparison of Tools, Techniques and
Results . . . . . . . . . . . . . . . . 240--256
George Williams Beyond Glyphs, Advanced Typographic
Features of Fonts . . . . . . . . . . . 257--263
Alex Biryukov and
Christophe De Canni\`ere and
Michaël Quisquater On Multiple Linear Approximations . . . 1
Nicolas T. Courtois Feistel Schemes and Bi-linear
Cryptanalysis: (Extended Abstract) . . . 23
Dan Boneh and
Xavier Boyen and
Hovav Shacham Short Group Signatures . . . . . . . . . 41
Jan Camenisch and
Anna Lysyanskaya Signature Schemes and Anonymous
Credentials from Bilinear Maps . . . . . 56
Thomas Holenstein and
Ueli Maurer and
Johan Sjödin Complete Classification of Bilinear
Hard-Core Functions . . . . . . . . . . 73
Chun-Yuan Hsiao and
Leonid Reyzin Finding Collisions on a Public Road, or
Do Secure Hash Functions Need Secret
Coins? . . . . . . . . . . . . . . . . . 92
Jacques Patarin Security of Random Feistel Schemes with
$5$ or More Rounds . . . . . . . . . . . 106
Katsuyuki Okeya and
Katja Schmidt-Samoa and
Christian Spahn and
Tsuyoshi Takagi Signed Binary Representations Revisited 123
Michael Scott and
Paulo S. L. M. Barreto Compressed Pairings . . . . . . . . . . 140
Marten van Dijk and
David Woodruff Asymptotically Optimal Communication for
Torus-Based Cryptography . . . . . . . . 157
Craig Gentry How to Compress Rabin Ciphertexts and
Signatures (and More) . . . . . . . . . 179
Qi Cheng On the Bounded Sum-of-Digits Discrete
Logarithm Problem in Finite Fields . . . 201
Alexander May Computing the RSA Secret Key Is
Deterministic Polynomial Time Equivalent
to Factoring . . . . . . . . . . . . . . 213
Rosario Gennaro Multi-trapdoor Commitments and Their
Applications to Proofs of Knowledge
Secure Under Concurrent
Man-in-the-Middle Attacks . . . . . . . 220
Giovanni Di Crescenzo and
Giuseppe Persiano and
Ivan Visconti Constant-Round Resettable Zero Knowledge
with Concurrent Soundness in the Bare
Public-Key Model . . . . . . . . . . . . 237
Ivan Damgård and
Serge Fehr and
Louis Salvail Zero-Knowledge Proofs and String
Commitments Withstanding Quantum Attacks 254
Mihir Bellare and
Adriana Palacio The Knowledge-of-Exponent Assumptions
and $3$-Round Zero-Knowledge Protocols 273
Eli Biham and
Rafi Chen Near-Collisions of SHA-0 . . . . . . . . 290
Antoine Joux Multicollisions in Iterated Hash
Functions. Application to Cascaded
Constructions . . . . . . . . . . . . . 306
Masayuki Abe and
Serge Fehr Adaptively Secure Feldman VSS and
Applications to Universally-Composable
Threshold Cryptography . . . . . . . . . 317
Jonathan Katz and
Rafail Ostrovsky Round-Optimal Secure Two-Party
Computation . . . . . . . . . . . . . . 335
Susan Landau Security, Liberty, and Electronic
Communications . . . . . . . . . . . . . 355
Håvard Molland and
Tor Helleseth An Improved Correlation Attack Against
Irregular Clocked and Filtered Keystream
Generators . . . . . . . . . . . . . . . 373
Philip Hawkes and
Gregory G. Rose Rewriting Variables: The Complexity of
Fast Algebraic Attacks on Stream Ciphers 390
Yi Lu and
Serge Vaudenay Faster Correlation Attack on Bluetooth
Keystream Generator E0 . . . . . . . . . 407
Kaoru Kurosawa and
Yvo Desmedt A New Paradigm of Hybrid Encryption
Scheme . . . . . . . . . . . . . . . . . 426
Dan Boneh and
Xavier Boyen Secure Identity Based Encryption Without
Random Oracles . . . . . . . . . . . . . 443
Tal Moran and
Ronen Shaltiel and
Amnon Ta-Shma Non-interactive Timestamping in the
Bounded Storage Model . . . . . . . . . 460
Dario Catalano and
David Pointcheval and
Thomas Pornin IPAKE: Isomorphisms for Password-Based
Authenticated Key Exchange . . . . . . . 477
Yevgeniy Dodis and
Rosario Gennaro and
Johan Håstad and
Hugo Krawczyk and
Tal Rabin Randomness Extraction and Key Derivation
Using the CBC, Cascade and HMAC Modes 494
Michael T. Goodrich and
Jonathan Z. Sun and
Roberto Tamassia Efficient Tree-Based Revocation in
Groups of Low-State Devices . . . . . . 511
Cynthia Dwork and
Kobbi Nissim Privacy-Preserving Datamining on
Vertically Partitioned Databases . . . . 528
K. Srinathan and
Arvind Narayanan and
C. Pandu Rangan Optimal Perfectly Secure Message
Transmission . . . . . . . . . . . . . . 545
Matthias Fitzi and
Stefan Wolf and
Jürg Wullschleger Pseudo-signatures, Broadcast, and
Multi-party Computation from Correlated
Randomness . . . . . . . . . . . . . . . 562
Elias Sinderson and
Vish Magapu and
Ronald Mak Middleware and Web Services for the
Collaborative Information Portal of
NASA's Mars Exploration Rovers Mission 1
Brian F. Cooper A Content Model for Evaluating
Peer-to-Peer Searching Techniques . . . 18
Hailong Cai and
Jun Wang Foreseer: A Novel, Locality-Aware
Peer-to-Peer System Architecture for
Keyword Searches . . . . . . . . . . . . 38
Brian F. Cooper Guiding Queries to Information Sources
with InfoBeacons . . . . . . . . . . . . 59
Márk Jelasity and
Rachid Guerraoui and
Anne-Marie Kermarrec and
Maarten van Steen The Peer Sampling Service: Experimental
Evaluation of Unstructured Gossip-Based
Implementations . . . . . . . . . . . . 79
Miklós Maróti Directed Flood-Routing Framework for
Wireless Sensor Networks . . . . . . . . 99
Jingwen Jin and
Klara Nahrstedt On Exploring Performance Optimizations
in Web Service Composition . . . . . . . 115
Baochun Li and
Jiang Guo and
Mea Wang iOverlay: A Lightweight Middleware
Infrastructure for Overlay Application
Implementations . . . . . . . . . . . . 135
Christian Plattner and
Gustavo Alonso Ganymed: Scalable Replication for
Transactional Web Applications . . . . . 155
Jesús M. Milan-Franco and
Ricardo Jiménez-Peris and
Marta Patiño-Martínez and
Bettina Kemme Adaptive Middleware for Data Replication 175
Avraham Leff and
James T. Rayfield Alternative Edge-Server Architectures
for Enterprise JavaBeans Applications 195
Amol Nayate and
Mike Dahlin and
Arun Iyengar Transparent Information Dissemination 212
Jinling Wang and
Beihong Jin and
Jing Li An Ontology-Based Publish/Subscribe
System . . . . . . . . . . . . . . . . . 232
Abhishek Gupta and
Ozgur D. Sahin and
Divyakant Agrawal and
Amr El Abbadi Meghdoot: Content-Based
Publish/Subscribe over P2P Networks . . 254
Yuanyuan Zhao and
Daniel Sturman and
Sumeer Bhola Subscription Propagation in
Highly-Available Publish/Subscribe
Middleware . . . . . . . . . . . . . . . 274
Stefan Tai and
Rania Khalaf and
Thomas Mikalsen Composition of Coordinated Web Services 294
Vijay K. Naik and
Swaminathan Sivasubramanian, Sr.iram Krishnan Adaptive Resource Sharing in a Web
Services Environment . . . . . . . . . . 311
Shankar R. Ponnekanti and
Armando Fox Interoperability Among Independently
Evolving Web Services . . . . . . . . . 331
Sushil K. Prasad and
Vijay Madisetti and
Shamkant B. Navathe and
Raj Sunderraman and
Erdogan Dogdu and
Anu Bourgeois and
Michael Weeks and
Bing Liu and
Janaka Balasooriya and
Arthi Hariharan and
Wanxia Xie and
Praveen Madiraju and
Srilaxmi Malladi and
Raghupathy Sivakumar and
Alex Zelikovsky and
Yanqing Zhang and
Yi Pan and
Saied Belkasim SyD: A Middleware Testbed for
Collaborative Applications over Small
Heterogeneous Devices and Data Stores 352
Manuel Roman and
Nayeem Islam Dynamically Programmable and
Reconfigurable Middleware Services . . . 372
Anand Ranganathan and
Jalal Al-Muhtadi and
Shiva Chetan and
Roy Campbell and
M. Dennis Mickunas MiddleWhere: A Middleware for Location
Awareness in Ubiquitous Computing
Applications . . . . . . . . . . . . . . 397
Shivajit Mohapatra and
Nalini Venkatasubramanian A Game Theoretic Approach for Power
Aware Middleware . . . . . . . . . . . . 417
Mick Jordan and
Grzegorz Czajkowski and
Kirill Kouklinski and
Glenn Skinner Extending a J2EE Server with Dynamic and
Flexible Resource Management . . . . . . 439
Daniel Oberle and
Andreas Eberhart and
Steffen Staab and
Raphael Volz Developing and Managing Software
Components in an Ontology-Based
Application Server . . . . . . . . . . . 459
Eli Tilevich and
Yannis Smaragdakis Portable and Efficient Distributed
Threads for Java . . . . . . . . . . . . 478
Andreas Billig and
Susanne Busse and
Andreas Leicher and
other Platform Independent Model
Transformation Based on TRIPLE . . . . . 493