This book constitutes the proceedings of the 18th IFIP Working Conference on the Practice of Enterprise Modeling, PoEM 2025, which took place in Geneva, Switzerland, during December 3-5, 2025.
This two-volume set constitutes the refereed proceedings of the 18th International Conference on Interactive Digital Storytelling, ICIDS 2025, held in Saint Julian, Malta, during December 1–5, 2025.
This two-volume set constitutes the refereed proceedings of the 18th International Conference on Interactive Digital Storytelling, ICIDS 2025, held in Saint Julian, Malta, during December 1–5, 2025.
This book stimulates new conversations around the ethical and policy considerations stemming from the influence of artificial intelligence (AI) on human relationships within a cross-cultural perspective.
The 16-volume set LNCS 15960 - 15975 constitutes the refereed proceedings of the 28th International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2025, which took place in Daejeon, South Korea, during September 23–27, 2025.
The 16-volume set LNCS 15960 - 15975 constitutes the refereed proceedings of the 28th International Conference on Medical Image Computing and Computer Assisted Intervention, MICCAI 2025, which took place in Daejeon, South Korea, during September 23–27, 2025.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
This book constitutes the refereed proceedings of the workshops held at the 44th International Conference on Conceptual Modeling, ER 2025, which took place in Poitiers, France, during October 20–23, 2025.
This bookconstitutes the thoroughly refereed proceedings of the 11th InternationalConference on Web and Internet Economics, WINE 2015, held in Amsterdam, TheNetherlands, in December 2015.
This LNCS book is part of the FOLLI book series and constitutes the proceedings of the 7th International Workshop on Logic, Rationality, and Interaction, LORI 2019, held in Chongqing, China, in October 2019.
This LNCS book is part of the FOLLI book series and constitutes the proceedings of the 7th International Workshop on Logic, Rationality, and Interaction, LORI 2019, held in Chongqing, China, in October 2019.
This book constitutes the refereed proceedings of the 9th International Symposium on Algorithmic Game Theory, SAGT 2016, held in Liverpool, UK, in September 2016.
This book constitutes the refereed proceedings of the 8th International Symposium on Algorithmic Game Theory, SAGT 2015, held in Saarbrucken, Germany, in September 2015.
This bookconstitutes the thoroughly refereed proceedings of the 11th InternationalConference on Web and Internet Economics, WINE 2015, held in Amsterdam, TheNetherlands, in December 2015.
This book constitutes the thoroughly refereed conference proceedings of the 7th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2013, held in Riva del Garda, Italy, in August 2013 and of the 8th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2014, held in Hangzhou, China, in September 2014, in conjunction with VLDB 2013 and 2014, the International Conference on Very Large Data Bases.
This book constitutes the thoroughly refereed proceedings of the Third International Symposium on Data-Driven Process Discovery and Analysis held in Riva del Garda, Italy, in August 2013.
This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2014, and Ontologies, Databases, and Applications of Semantics, ODBASE 2014, held as part of OTM 2014 in October 2014 in Amantea, Italy.
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014.
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
This book constitutes the refereed post-proceedings of two workshops held at the 5th International Conference on Social Informatics, SocInfo 2013, in Kyoto, Japan, in November 2013: the First Workshop on Quality, Motivation and Coordination of Open Collaboration, QMC 2013 and the First International Workshop on Histoinformatics, HISTOINFORMATICS 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan.
This volume constitutes the refereed proceedings of the confederated international conferences: Cooperative Information Systems (CoopIS 2013), Distributed Objects and Applications (DOA-Trusted Cloud 2013), and Ontologies, Data Bases and Applications of SEmantics (ODBASE 2013) held as part of OTM 2013 in September 2013 in Graz, Austria.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013.
This book constitutes the proceedings of the 8th International and Interdisciplinary Conference on Modeling and Using Context, CONTEXT 2013, held in Annecy, France, in October/November 2013.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013.
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013.
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
This book constitutes the refereed proceedings of the 8th International Conference on Design Science Research in Information Systems and Technology, DESRIST 2013, held in Helsinki, Finland, in June 2013.
This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013.
This book constitutes the thoroughly refereed proceedings of eight international workshops held in Valencia, Spain, in conjunction with the 25th International Conference on Advanced Information Systems Engineering, CAiSE 2013, in June 2013.
This book contains the refereed proceedings of the 14th International Conference on Business Process Modeling, Development and Support (BPMDS 2013) and the 18th International Conference on Exploring Modeling Methods for Systems Analysis and Design (EMMSAD 2013), held together with the 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013) in Valencia, Spain, in June 2013.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
This book constitutes the refereed proceedings of 12 international workshops held in Tallinn, Estonia, in conjunction with the 10th International Conference on Business Process Management, BPM 2012, in September 2012.
This book constitutes the refereed proceedings of the Second International Conference on Biologically Inspired Music, Sound, Art and Design, EvoMUSART 2013, held in Vienna, Austria, in March 2013, colocated with the Evo* 2013 events EuroGP, EvoCOP, EvoBIO, and EvoApplications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011.
This volume constitutes the proceedings of the combined 7th International Workshop on Trends in Enterprise Architecture Research (TEAR 2012) and the 5th Working Conference on Practice-Driven Research on Enterprise Transformation (PRET-5), held in Barcelona, Spain, October 23-24, 2012, and co-located with The Open Group's Conference on Enterprise Architecture, Cloud Computing, and Security.
This book constitutes the refereed proceedings of the 4th International Conference on Social Robotics, ICSR 2012, held in Chengdu, China, in October 2012.
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy.