Abstract is missing.
- A Vision of the Next Generation Internet: A Policy Oriented PerspectiveSubarthi Paul, Raj Jain, Jianli Pan, Mic Bowman. 1-14 [doi]
- Keynote: The Space and Motion of Large Informatic SystemsRobin Milner. 1-79 [doi]
- Keynote: A Vision for the Science of ComputingTony Hoare. 1-29 [doi]
- Keynote: Internet EvolutionVinton G. Cerf. 1-36 [doi]
- Brain-Like Approximate ReasoningAndrzej W. Przybyszewski. 15-28 [doi]
- Developing Knowledge-Based Systems using the Semantic WebDavid Corsar, Derek H. Sleeman. 29-40 [doi]
- Web Engineering RevisitedErik Wilde, Martin Gaedke. 41-50 [doi]
- Contexts for Human ActionGraham White. 51-59 [doi]
- Dynamic Neighbourhood Cellular AutomataStefan S. Dantchev. 60-68 [doi]
- Computing a Longest Increasing Subsequence of Length k in Time O(n log log k)Maxime Crochemore, Ely Porat. 69-74 [doi]
- A Hardware Relaxation Paradigm for Solving NP-Hard ProblemsPaul Cockshott, Andreas Koltes, John O Donnell, Patrick Prosser, Wim Vanderbauwhede. 75-86 [doi]
- Automation of the Complete Sample Management in a Biotech LaboratoryMartin Wojtczyk, Michael Marszalek, Alois Knoll, Rüdiger Heidemann, Klaus Joeris, Chun Zhang, Mark Burnett, Tom Monica. 87-97 [doi]
- Beatbox - A Computer Simulation Environment for Computational Biology of the HeartRoss McFarlane, Irina V. Biktasheva. 98-110 [doi]
- Events, Causality and SymmetryGlynn Winskel. 111-127 [doi]
- Modal Logics are CoalgebraicCorina Cîrstea, Alexander Kurz, Dirk Pattinson, Lutz Schröder, Yde Venema. 128-140 [doi]
- Provenance-Based Auditing of Private Data UseRocÃo Aldeco-Pérez, Luc Moreau. 141-152 [doi]
- Distributed Defence Against Denial of Service Attacks: A Practical ViewGülay Öke, Georgios Loukas. 153-162 [doi]
- On Using Physical Analogies for Feature and Shape Extraction in Computer VisionMark S. Nixon, Cem Direkoglu, Xin U. Liu, David J. Hurley. 163-177 [doi]
- Improved SIFT-Features Matching for Object RecognitionFaraj Alhwarin, Chao Wang, Danijela Ristic-Durrant, Axel Gräser. 178-190 [doi]
- Spontaneous Pain Expression Recognition in Video SequencesZakia Hammal, Miriam Kunz, Martin Arguin, Frédéric Gosselin. 191-210 [doi]
- Incremental Connectivity-Based Outlier Factor AlgorithmDragoljub Pokrajac, Natasa Reljin, Nebojsa Pejcic, Aleksandar Lazarevic. 211-224 [doi]
- Fast Estimation of Nonparametric Kernel Density Through PDDP, and its Application in Texture SynthesisArnab Sinha, Sumana Gupta. 225-236 [doi]
- On the Complexity of Parity GamesArnold Beckmann, Faron Moller. 237-248 [doi]
- Subject Reduction vs IntersectionSteffen van Bakel. 249-258 [doi]
- A Unified Theory of Program Logics: An Approach based on the n-CalculusKohei Honda, Nobuko Yoshida. 259-274 [doi]
- Component-Based Description of Programming LanguagesPeter D. Mosses. 275-286 [doi]
- Hardware Dependability in the Presence of Soft ErrorsAshish Darbari, Bashir M. Al-Hashimi. 287-294 [doi]
- Compiling C-like Languages to FPGA Hardware: Some Novel Approaches Targeting Data Memory OrganisationQiang Liu, George A. Constantinides, Konstantinos Masselos, Peter Y. K. Cheung. 295-304 [doi]
- On the Use of Real-Time Maude for Architecture Description and Verification: A Case StudyChadlia Jerad, Kamel Barkaoui, Amel Grissa-Touzi. 305-317 [doi]
- A Customisable Multiprocessor for Application-Optimised Inductive Logic ProgrammingAndreas Fidjeland, Wayne Luk, Stephen Muggleton. 318-330 [doi]
- Implications of Electronics Technology Trends to Algorithm DesignDaniel Greenfield, Simon W. Moore. 331-342 [doi]
- Adaptive Random Re-Routing for Differentiated QoS in Sensor NetworksErol Gelenbe, Edith C. H. Ngai. 343-354 [doi]
- Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor NetworksAbdülhakim Ünlü, Albert Levi. 355-366 [doi]
- Tools for Traceable Security VerificationJan Jürjens, Yijun Yu, Andreas Bauer 0002. 367-390 [doi]
- Overcoming Software Fragility with Interacting Feedback Loops and Reversible Phase TransitionsPeter Van Roy. 379-390 [doi]
- Object representatives: a uniform abstraction for pointer informationEric Bodden, Patrick Lam, Laurie J. Hendren. 391-405 [doi]
- Grand Challenge 7: Journeys in Non-Classical ComputationSusan Stepney, Samson Abramsky, Andy Adamatzky, Colin G. Johnson, Jon Timmis. 407-421 [doi]