𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science, 2000)

✍ Scribed by Reinhard Wilhelm


Publisher
Springer
Year
2001
Tongue
English
Leaves
378
Edition
2001
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Informatics - 10 Years Back, 10 Years Ahead presents a unique collection of expository papers on major current issues in the field of computer science and information technology. The 26 contributions written by leading researchers on personal invitation assess the state of the art of the field by looking back over the past decade, presenting important results, identifying relevant open problems, and developing visions for the decade to come.
This book marks two remarkable and festive moments: the 10th anniversary of the International Research and Conference Center for Computer Science in Dagstuhl, Germany and the 2000th volume published in the Lecture Notes in Computer Science series.

✦ Table of Contents


front-matter
Lecture Notes in Computer Science
Springer
Informatics
Preface
Table of Contents
The Web
How to Make the Best Use of It
What’s Underneath
How to Still Feel Secure
the Right Engineering
the Right Tooling
A Political Issue: Open Source?
Architecture
Theory
Why It Is Needed
How It Becomes Practice
Artificial Intelligence
Graphics and Vision
Immersion into Other Disciplines
fulltext
The Web in 2010: Challenges and Opportunities for Database Research
Introduction
Blessings and Curses of the World Wide Web
Towards a Science of Service Quality Guarantees
Outline of the Paper
Performance Guarantees
State of the Art
Grand Challenge
Research Avenues
Continuous Availability
State of the Art
Grand Challenge
Research Avenues
Search Result Quality
State of the Art
Grand Challenge
Research Avenues
The Great Synergy.
XML.
Ontologies.
Automatic Classification.
Deep Search.
Concluding Remarks
References
fulltext2
Challenges in Ubiquitous Data Management
Introduction
Applications and Data Management Requirements
Categories of Functionality
Adaptivity and User Interaaction
Requirements Due to Mobility
Requirements Due to Context-Awareness
Requirements Due to Collaboration
Example Data Management Technologies – On-Going Projects
Data Recharging: Profile-Based Data Dissemination and Synchronization
Adaptive Dataflow Query Processing
Conclusions
Acknowledgements
References
fulltext3
Programmable Networks
Introduction
Networking Technology
IP Networks: Smart Packets
ATM Networks: xbind
Mobile Networks: Mobiware
Level of Programmability
Capsules: ANTS
Active Extensions: Switchware
Composition Languages: CANEs
Network APIs: xbind
Programmable Communications Abstractions
Active Node Abstractions: NodeOS
Virtual Active Networks: Netscript
Virtual ATM Networks: Tempest
Architectural Domains
Application-Level: Active Services
Resource Management: Darwin
Network Management: Smart Packets
Discussion
Open Programmable Interfaces
Virtualization and Resource Partitioning
Programmable Virtual Networking
Spawning Networks
Conclusion
References
fulltext4
Multilateral Security: Enabling Technologies and Their Evaluation
Introduction and Overview
Protection Goals, Their Synergies and Interferences
Basic Facts
Overview of Technologies for Security
Unilateral Technologies
Bilateral Technologies
Trilateral Technologies
Multilateral Technologies
Evaluation of Maturity and Effectiveness
A Vision
References
fulltext5
Cryptography 2000Β±10
Introduction
Scope of This Article
Information Security
History: From an Old Art to a Young Science
The Role of Assumptions and Trust
Cryptography -- Science of Paradoxes
Computational Complexity Theory
Security Definitions
Keyless Cryptographic Functions
Symmetric Cryptography
Cipher Design: Towards the Eternally Secure Cipher
Cryptanalysis
Security Proofs
Public-Key Cryptography and Digital Signatures
New Systems
Cryptanalysis
Security Proofs
Cryptographic Protocols
The Role of Physics
Applications and Politics
The Future of Cryptography
Acknowledgments
References
fulltext6
A Language-Based Approach to Security
Introduction
Some Classic Principles
The Case for Language-Based Security
Enforcing Security Policies
In-Lined Reference Monitors
Type Systems
Certifying Compilers
Putting the Technologies Together
Concluding Remarks
Acknowledgments
References
fulltext7
Software Engineering in the Years 2000 Minus and Plus Ten
1 What Is Software Engineering?
2 The Current State of Software Engineering
2.1 The State of Practice
2.2 The State of Research
2.3 Who Is to Blame?
2.4 Results of the Dagstuhl-Seminar ”Software Engineering Research and Education: Seeking a New Agenda”
2.5 The Topics
(1) Requirements (Joanne Atlee)
(2) Software Design (Johannes Siedersleben)
(3) Implementation (Peter Knoke)
(4) COTS (Commercial-Off-the-Shelf) (Paul Strooper)
(5) Test (Dan Hoffman)
(6) Families (David Weiss)
(7) Maintenance (Andreas Zeller)
(8) Measurement (Motei Azuma)
(9) Software Configuration Management (Walter Tichy)
2.6 Summary of the Dagstuhl-Seminar
3 Software Engineering – 10 Years Back and 10 Years Ahead
3.1 The Past: What Was Different?
3.2 The Trend: What Is Currently Changing?
3.2.1 Software from Components versus High Quality?
3.2.2 Domain Specific Software Engineering
3.3 What Else Will Change? What Could Be Changed?
3.3.1 Research and Transfer
3.3.2 Education
References
fulltext8
Thinking Tools for the Future of Computing
Background
Current Use of Formal Methods
Historical Comment on Syntax Description
Historical Comment on Semantic Description
Historical Comment on Reasoning about Programs
Lessons
Some Incremental Challenges
Conceptual Gaps
Compositional Development of Concurrent Systems
Design by Atomicity Refinement
Unification of State and Communication
A Grand Challenge: Dependability
A Grand Challenge: Programming Paradigms
A Grand Challenge: Information Access
Conclusions
Acknowledgements
References
fulltext9
Orientations in Verification Engineering of Avionics Software
1 Introduction
2 Avionics Elements
3 Today's Engineering
3.1 Certification
3.2 Life Cycle Processes
Planning Process
Development Processes
Integral Processes
3.3 Verification Process
Review and Analysis
Testing
Unit Testing
Integration Testing
Validation Testing
4 The Future
4.1 Change Factors
Technology Domain
The Standard Domain
The Computer Science Domain
4.2 Orientations
New Approach in Verification Engineering
Computer-Supported Static Analysis Technology
Practical Objectives
Priorities
Feasibility Conditions
5 Concluding Remarks
References
fulltext10
Abstract Interpretation Based Formal Methods and Future Challenges
Introductory Motivations
Abstract Interpretation
Fixpoint Semantics
Trace Semantics
Least Fixpoint Trace Semantics
Abstractions & Abstract Domains
Hierarchy of Abstractions
Effective Abstractions
Information Loss
Function Abstraction
Fixpoint Abstraction
Composing Abstractions
Sound and Complete Abstractions
Static Program Analysis
Foundational Ideas of Static Program Analysis
Shortcomings of Static Program Analysis
Applications of Static Program Analysis
Industrialization of Static Analysis by Abstract Interpretation
Grand Challenge for the Next Decade
Acknowledgements
References
fulltext11
Extended Static Checking: A Ten-Year Perspective
Introduction
Challenges
Deciding Which Errors to Check for
Defining Formal Semantics for Modern Languages
Using a Theorem Prover
Producing Meaningful Warning Messages
Grappling with Annotations
Future Challenges
Reduce Annotation Burden
Understand Sound Modular Checking
Investigate More-than-Types Systems
Teach
Conclusions
Acknowledgments
References
fulltext12
Progress on the State Explosion Problem in Model Checking
Introduction
Organization of the Paper.
Fundamentals of Model Checking
Kripke Structures.
Computation Tree Logics.
Explicit State Model Checking.
State Explosion.
Symbolic Model Checking
Ordered Binary Decision Diagrams.
Symbolic Verification Algorithms.
Theoretical Limitations of Symbolic Model Checking.
Abstraction
Existential Abstraction.
Spurious Counterexamples.
The Fine Structure of Abstraction Functions.
Counterexample-Guided Abstraction
Model Checking the Abstract Model
Identification of Spurious Finite Path Counterexamples
Identification of Spurious Loop Counterexamples.
Refining the Abstraction
Directions for Future Research
References
fulltext13
From Research Software to Open Source
Introduction
Why Share Source Code?
Validating Research Results
Software Research Infrastructure
Widely Used Research Software
How Berkeley Unix Came About
Richard Stallman and the Free Software Movement
Mid-80's to Mid 90's
The Cathedral and the Bazaar
What Is the Bazaar Development Model?
The Open Source Movement
The Evolution of Widely Used Research Software
Open Source and the Commercial World
Licensing and Intellectual Property
Government Policy and Open Source Software
Open Source for High-End Software
Working Group on Libre Software
Comments
Final Observations
References
fulltext14
Microprocessors β€” 10 Years Back, 10 Years Ahead
Introduction
10 Years Back: The Emergence of Speculative Execution Microarchitectures
Current: The Blossoming of Speculative Execution Microarchitectures
Near Future: The Emergence of Clustered and Multithreaded Microarchitectures
10 Years Ahead: The Blossoming of Speculative Multithreaded Microarchitectures
Summary
Acknowledgements
References
fulltext15
The Quantum Computing Challenge
Introduction
Wither Classical Computing?
Quantum Computation
Background: Probabilistic Turing Machines
Quantum Turing Machines
Multi-qubit States
Input and Output
Quantum Algorithmics
What Quantum Computers Can Do
How Quantum Computers Do It
References
fulltext16
Parallel Computation: MM +/- X
Introduction
Technology: Performance of CMOS Processor Chips Will Soon Peak'' Architecture:The One Feature Essential for All Parallel Computers Is ...''
Shared Memory Parallel Computers
Nonshared Memory Parallel Computers
Programming Languages: Program to Exploit the Machine's Features'' Parallelizing Compilers Language Extensions New Languages Libraries Models:Start with the PRAM Model, and Refine to a More Realistic Model''
The Present
WYSIWYG: The Interrelationship among Models, Languages, Architectures
The Future
References
fulltext17
Computational Complexity and Mathematical Proofs
Proof Finding and Checking
Interactive Proofs
Conclusion
Acknowledgement
References
fulltext18
Logic for Computer Science: The Engineering Challenge
Introduction
Mathematical Logic as an Origin
Logic in Computer Science
Some Challenges in the Context of Engineering
Pragmatics Is Important
Building a New Model Theory
Merging the Languages of Formulas and Diagrams
Taking Hierarchy Seriously
The Challenge of the Web
Conclusion
Acknowledgment
References
fulltext19
From Algorithm to Program to Software Library
References
fulltext20
Pervasive Speech and Language Technology
Introduction
The Speech-to-Speech-Translation System Verbmobil
Some Grand Challenges for Speech and Language Technology
Verbmobil's Massive Data Collection Effort
The Main Components of Verbmobil
Using Prosodic Information at All Processing Stages
The Multi-blackboard Architecture of Verbmobil
Verbmobil's Multi-engine Approach
Summarizing Dialogs
Conclusion: Lessons Learned, Open Problems, and Future Impact
Open Problems
Future Impact
References
fulltext21
Embodied Artificial Intelligence 10 Years Back, 10 Years Forward
1 Introduction
2 A Brief History of Artificial Intelligence
3 Embodiment
3.1 Implications of Embodiment
3.2 Case Studies
Case Study 1: The β€’Swiss Robotsβ€’
Case Study 2: Evolving the Morphology of an ''Insect Eye'' on a Robot
Case Study 3: The Passive Dynamic Walker
Case Study 4: Muscles β€’ Control from Materials
4 State-of-the Art
5 Some Grand Challenges
5.1 The First Challenge: Evolving Grounded Intelligence
5.2 The Second Challenge: Understanding and Exploring β€œEcological Balance”
6 Conclusions
Acknowledgment
References
fulltext22
Scientific Visualization - Methods and Applications -
Introduction
MacVis --- A System Architecture for Intelligent Component-Based Visualization
General System Architecture
Agent-Based Visualization Control
Topological Vector and Tensor Field Visualization
Local Vector Field Topology
Vector Field Topology Simplification
Tensor Field Topology Simplification
Virtual Echocardiography System
Parametric Heart Model
Artificial Ultrasound Image Generation
Augmented Reality Environment
References
fulltext23
Computer Vision: Past and Future
Introduction
The First Attempts
The First Paradigms
The Past Ten Years
Methods and Techniques
Pattern Recognition Revived
Animate Vision
Challenges of the Future
References
fulltext24
Computational Biology at the Beginning of the Post-genomic Era
1. Introduction
2. Grand Challenge Problems in Computational Biology
Grand Challenge 1: Finding Genes in Genomic Sequences
Grand Challenge 2: Protein Folding and Protein Structure Prediction
Grand Challenge 3: Estimating the Free Energy of Biomolecules and Their Complexes
Grand Challenge 4: Simulating a Cell
3. Computational Biology in Applied Biology and Medicine
Molecular Therapy of Diseases
Searching for New Drugs
Perspectives of Computational Biology in Medical and Pharmaceutical Applications
4. Methodical Demands on Computational Biology
5. Summary
6. Acknowledgements
7. References
fulltext25
Computer Science in Physics
Introduction
The Random Field Model
The Spin Glass
Conclusions
Acknowledgments:
References
back-matter
Author Index


πŸ“œ SIMILAR VOLUMES


Informatics: 10 Years Back, 10 Years Ahe
✍ Gerhard Weikum (auth.), Reinhard Wilhelm (eds.) πŸ“‚ Library πŸ“… 2001 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><I>Informatics - 10 Years Back, 10 Years Ahead</I> presents a unique collection of expository papers on major current issues in the field of computer science and information technology. The 26 contributions written by leading researchers on personal invitation assess the state of the art of the f

Informatics: 10 Years Back, 10 Years Ahe
✍ Gerhard Weikum (auth.), Reinhard Wilhelm (eds.) πŸ“‚ Library πŸ“… 2001 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><I>Informatics - 10 Years Back, 10 Years Ahead</I> presents a unique collection of expository papers on major current issues in the field of computer science and information technology. The 26 contributions written by leading researchers on personal invitation assess the state of the art of the f

LATIN 2000: Theoretical Informatics: 4th
✍ Gaston H. Gonnet (editor), Daniel Panario (editor), Alfredo Viola (editor) πŸ“‚ Library πŸ“… 2000 πŸ› Springer 🌐 English

<span>This volume contains the proceedings of the LATIN 2000 International Conference (LatinAmerican Theoretical INformatics), to be held in Punta del Este, Uruguay, April 10-14, 2000. This is the fourth event in the series following Sao ~ Paulo, Brazil (1992), ValparaΓ­so, Chile (1995), and Campinas

Computational Combinatorial Optimization
✍ Michael JΓΌnger (editor), Denis Naddef (editor) πŸ“‚ Library πŸ“… 2001 πŸ› Springer 🌐 English

<span>This tutorial contains written versions of seven lectures on Computational Combinatorial Optimization given by leading members of the optimization community. The lectures introduce modern combinatorial optimization techniques, with an emphasis on branch and cut algorithms and Lagrangian relaxa

Informatics in Schools. A Step Beyond Di
✍ Andreas Bollin (editor), Gerald Futschek (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book constitutes the proceedings of the 14th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2021, held in Nijmegen, The Netherlands, in November 2020. Due to COVID-19 related travelling restrictions the conference had to be switched to onl

Informatics in Schools. Beyond Bits and
✍ Jean-Philippe Pellet (editor), Gabriel Parriaux (editor) πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book constitutes the proceedings of the 16th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2023, held in Lausanne, Switzerland, during October 23–25, 2023. </span></p><span> The 14 full papers presented in this book were carefully revi