At the time of writing (mid-October 1998) we can look back at what has been a very successful ECOOPâ98. Despite the time of the year — in the middle of what is traditionally regarded as a holiday period — ECOOP'98 was a record breaker in terms of number of participants. Over 700 persons found their way to the campus of the Brussels Free University to participate in a wide range of activities. This 3rd ECOOP workshop reader reports on many of these activities. It contains a careful selection of the input and a cautious summary of the outcome for the numerous discussions that happened during the workshops, demonstrations and posters. As such, this book serves as an excellent snapshot of the state of the art in the field of object oriented programming. About the diversity of the submissions A workshop reader is, by its very nature, quite diverse in the topics covered as well as in the form of its contributions. This reader is not an exception to this rule: as editors we have given the respective organizers much freedom in their choice of presentation because we feel form follows content. This explains the diversity in the types of reports as well as in their lay out.
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998. The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.
This book constitutes the refereed proceedings of the 12th European Conference on Object-Oriented Programming, ECOOP'98, held in Brussels, Belgium, in July 1998. The book presents 24 revised full technical papers selected for inclusion from a total of 124 submissions; also presented are two invited papers. The papers are organized in topical sections on modelling ideas and experiences; design patterns and frameworks; language problems and solutions; distributed memory systems; reuse, adaption and hardware support; reflection; extensible objects and types; and mixins, inheritance and type analysis complexity.
This book constitutes the refereed proceedings of the 8th International Symposium on System Configuration Management, SCM-8, held in conjunction with ECOOP'98 in Brussels, Belgium, in July 1998. The volume presents 17 revised full papers carefully reviewed and selected for presentation; also included is a tutorial lecture; approximately half of the papers come from industry. The book is divided into sections on industrial experience, experimental systems, product data management and system configuration management, formal approaches, cooperative systems, and Web-based applications.
This book consitutes the refereed proceedings of the 5th International Conference on Intelligence in Services and Networks, IS&N'98 in Antwerp, Belgium, in May 1998. IS&N'98 was devoted to Technology for Ubiquitous Telecom Services. The 40 revised full papers presented in a homogeneous style and editing were selected from more than 80 submissions. The book is divided in sections on quality of service, service management, agent technology and applications, architechtures, mobility, platforms, electronic commerce, service creation, network management, gateways to CORBA, and security.
This comprehensive volume presents the refereed proceedings of the International Conference and Exhibition on High-Performance Computing and Networking, HPCN Europe 1996, held in Brussels, Belgium, in April 1996 under the sponsorship of the CEC. The 175 papers and posters included address all relevant theoretical aspects of HPCN and computational sciences as well as a variety of applicational aspects in numerous fields. The volume is organized in four tracks; industrial applications, general applications, computational science, and computer science aspects of HPCN.
This volume constitutes the proceedings of the 7th International Conference on Computer Aided Verification, CAV '95, held in LiÃ¨ge, Belgium in July 1995. The book contains the 31 refereed full research papers selected for presentation at CAV '95 as well as abstracts or full papers of the three invited presentations. Originally oriented towards finite-state concurrent systems, CAV now covers all styles of verification approaches and a variety of application areas. The papers included range from theoretical issues to concrete applications with a certain emphasis on verification tools and the algorithms and techniques needed for their implementations. Beyond finite-state systems, real-time systems and hybrid systems are an important part of the conference.
This volume contains the papers accepted for presentation at the Fourth International Symposium on Programming Language Implementation and Logic Programming (PLILP '92) held in Leuven, Belgium, August 26-28, 1992. Theaim of the symposium was to explore new declarative concepts, methods and techniques relevant for implementation of all kinds of programming languages, whether algorithmic or declarative. The symposium gathered researchers from the fields of algorithmic programming languages as well as logic, functional, and object-oriented programming. The topics discussed in the volume include: - Declarative implementation techniques; - Implementation of declarative concepts and modules; - Compiler specification and construction; - Program transformation; - Programming environments for declarative languages; - Amalgamation of logic programming with algorithmic, functional, or object-oriented techniques; - Executable specification.
âIâhe int,ernational Association for Cryptologic Research (IACK) organizes two inter- tioilill coiifcrcnces every year, one in Europe and one in the United States. EUROCRIâPT â89 was the seventh European conference and was held in Houthalen, Belgium on April 10-13, 1989. With close to 300 participants, it was perhaps the largest open conferencr on c:rypt,ogra.phy ever held. The field of cryptography is expanding not only because of the increased vulnerability of computer systems and networks to a11 increasing range of threats, but also because of t1ic ra.pid progress in cryptographic methods, that t,he readers can witness by reading the book. The present proceedings contain nearly all contributions which were presented including the talks at the rump session. The chapters correspond to the sessions at the conference. It wa5 the first time that a rump session was organized on a Eurocrypt conference. Sixteen impromptu talks were given, and the authors were invited to submit short abstracts of their presentations. Because of the special character of this session, the editors have taken the liberty to shorten some of these.
This volume is the proceedings of the second International Conference on Database Theory (ICDT) held in Bruges, Belgium, August 31 - September 2, 1988. ICDT intends to provide a European forum for the international research community working on theoretical issues related to database and knowledge base systems. The proceedings of this conference contain all invited and accepted papers, which represent the latest results obtained in ongoing research in database theory worldwide. Most major themes of research in database theory are covered in ICDT '88: the relational model, logic and databases, object-oriented databases, deductive databases, conceptual models, analysis and design of data structures, query languages, concurrency control and updates and transactions.