Abstract: Invited Speakers.- Keeping Viruses Under Control.- Online Auctions: Notes on Theory, Practice, and the Role of Agents.- Computer Networks.- A Unified Approach to Survivability of Connection-Oriented Networks.- SCTP Based Framework for Mobile Web Agent.- An Agent-Based Scheme for Efficient Multicast Application in Mobile Networks.- An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem.- Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks.- An Efficient On-line Job Admission Control Scheme to Guarantee Deadlines for QoS-Demanding Applications.- A Methodology of Resilient MPLS/VPN Path Management Under Multiple Link Failures.- Sensor and Satellite Networks.- Comparison of Hyper-DAG Based Task Mapping and Scheduling Heuristics for Wireless Sensor Networks.- A Markov-Based Model to Analyze the Temporal Evolution and Lifetime of a Sensor Network.- Power-Efficient Seamless Publishing and Subscribing in Wireless Sensor Networks.- Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting.- IP Traffic Load Distribution in NGEO Broadband Satellite Networks - (Invited Paper).- Cross-Layer Management of Radio Resources in an Interactive DVB-RCS-Based Satellite Network-(Invited Paper).- Aggressive Back off Strategy in Congestion Management Algorithm for DBS-RCS - (Invited Paper).- TCP-Peach++: Enhancement of TCP-Peach+ for Satellite IP Networks with Asymmetrical Bandwidth and Persistent Fades-(Invited Paper).- Security and Cryptography.- Automatic Translation of Serial to Distributed Code Using CORBA Event Channels.- Fault Tolerant and Robust Mutual Exclusion Protocol for Synchronous Distributed Systems.- Exact Best-Case End-to-End Response Time Analysis for Hard Real-Time Distributed Systems.- A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network.- A Generic Policy-Conflict Handling Model.- A Truly Random Number Generator Based on a Continuous-Time Chaotic Oscillator for Applications in Cryptography.- A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers.- SVM Approach with a Genetic Algorithm for Network Intrusion Detection.- Performance Evaluation.- Modeling Access Control Lists with Discrete-Time Quasi Birth-Death Processes.- Stochastic Bounds on Partial Ordering: Application to Memory Overflows Due to Bursty Arrivals.- QoS Evaluation Method in Multimedia Applications Using a Fuzzy Genetic Rule-Based System.- Impact of Setup Message Processing and Optical Switch Configuration Times on the Performance of IP over Optical Burst Switching Networks.- Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation.- Computing Communities in Large Networks Using Random Walks.- Fame as an Effect of the Memory Size.- Keeping Viruses Under Control.- Distributed Evaluation Using Multi-agents.- Classification of Volatile Organic Compounds with Incremental SVMs and RBF Networks.- E-Commerce and Web Services.- Agent Based Dynamic Execution of BPEL Documents.- A Fair Multimedia Exchange Protocol.- A Pervasive Environment for Location-Aware and Semantic Matching Based Information Gathering.- A Web Service Platform for Web-Accessible Archaeological Databases.- A WSDL Extension for Performance-Enabled Description of Web Services.- A Novel Authorization Mechanism for Service-Oriented Virtual Organization.- Metrics, Methodology, and Tool for Performance-Considered Web Service Composition.- Brazilian Software Process Reference Model and Assessment Method.- Multiagent Systems.- A Secure Communication Framework for Mobile Agents.- A Novel Algorithm for the Coordination of Multiple Mobile Robots.- Multiagent Elite Search Strategy for Combinatorial Optimization Problems.- Managing Theories of Trust in Agent Based Systems.- Applying Semantic Capability Matching into Directory Service Structures of Multi Agent Systems.- Self-organizing Distribution of Agents over Hosts.- Machine Learning.- Evolutionary Design of Group Communication Schedules for Interconnection Networks.- Memetic Algorithms for Nurse Rostering.- Discretizing Continuous Attributes Using Information Theory.- System Identification Using Genetic Programming and Gene Expression Programming.- ARKAQ-Learning: Autonomous State Space Segmentation and Policy Generation.- Signature Verification Using Conic Section Function Neural Network.- Fusion of Rule-Based and Sample-Based Classifiers - Probabilistic Approach.- Construction of a Learning Automaton for Cycle Detection in Noisy Data Sequences.- Information Retrieval and Natural Language Processing.- A New Trend Heuristic Time-Variant Fuzzy Time Series Method for Forecasting Enrollments.- Using GARCH-GRNN Model to Forecast Financial Time Series.- Boosting Classifiers for Music Genre Classification.- Discriminating Biased Web Manipulations in Terms of Link Oriented Measures.- ORF-NT: An Object-Based Image Retrieval Framework Using Neighborhood Trees.- Text Categorization with Class-Based and Corpus-Based Keyword Selection.- Aligning Turkish and English Parallel Texts for Statistical Machine Translation.- The Effect of Windowing in Word Sense Disambiguation.- Pronunciation Disambiguation in Turkish.- Image and Speech Processing.- Acoustic Flow and Its Applications.- A DCOM-Based Turkish Speech Recognition System: TREN - Turkish Recognition ENgine.- Speaker Recognition in Unknown Mismatched Conditions Using Augmented PCA.- Real Time Isolated Turkish Sign Language Recognition from Video Using Hidden Markov Models with Global Features.- An Animation System for Fracturing of Rigid Objects.- 2D Shape Tracking Using Algebraic Curve Spaces.- A Multi-camera Vision System for Real-Time Tracking of Parcels Moving on a Conveyor Belt.- Selection and Extraction of Patch Descriptors for 3D Face Recognition.- Implementation of a Video Streaming System Using Scalable Extension of H.264.- Blotch Detection and Removal for Archive Video Restoration.- Performance Study of an Image Restoration Algorithm for Bursty Mobile Satellite Channels.- Algorithms and Database Systems.- Polymorphic Compression.- Efficient Adaptive Data Compression Using Fano Binary Search Trees.- Word-Based Fixed and Flexible List Compression.- Effective Early Termination Techniques for Text Similarity Join Operator.- Multimodal Video Database Modeling, Querying and Browsing.- Semantic Load Shedding for Prioritized Continuous Queries over Data Streams.- Probabilistic Point Queries over Network-Based Movements.- Effective Clustering by Iterative Approach.- Recursive Lists of Clusters: A Dynamic Data Structure for Range Queries in Metric Spaces.- Incremental Clustering Using a Core-Based Approach.- Indexing of Sequences of Sets for Efficient Exact and Similar Subsequence Matching.- An Investigation of the Course-Section Assignment Problem.- Crympix: Cryptographic Multiprecision Library.- Optimal Control for Real-Time Feedback Rate-Monotonic Schedulers.- Graphical User Interface Development on the Basis of Data Flows Specification.- Theory of Computing.- Generalizing Redundancy Elimination in Checking Sequences.- A Computable Version of Dini's Theorem for Topological Spaces.- Improved Simulation of Quantum Random Walks.- An Alternative Proof That Exact Inference Problem in Bayesian Belief Networks Is NP-Hard.- Recovering the Lattice of Repetitive Sub-functions.- Epilogue.- Erol Gelenbe's Career and Contributions.