This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile Multimedia Communications (MOBIMEDIA 2011) held in Cagliari, Italy, in September 2011 The 26 revised full papers presented were carefully selected from numerous submissions and focus topics such as quality of experience, dynamic spectrum access wireless networks in the TV white spaces, media streaming, mobile visual search, image processing and transmission, and mobile applications.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Mobilware 2011, held in London, UK, in June 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011.
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.
This book constitutes the refereed proceedings of the 14th International Conference on Coordination Models and Languages, COORDINATION 2012, held in Stockholm, Sweden, in June 2012, as one of the DisCoTec 2012 events.
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St.
This book constitutes the refereed proceedings of the 7th International Conference on Design Science Research in Information Systems and Technology, DERIST 2012, held in Las Vegas, NV, USA, in May 2012.
This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes thoroughly refereed post-conference proceedings ofthe workshops of the 17th International Conference on ParallelComputing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book constitutes the refereed proceedings of the 18th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, held in Essen, Germany, in March 2012.
This book constitutes thoroughly refereed post-conference proceedings of the workshops of the 17th International Conference on Parallel Computing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book constitutes the refereed post-proceedings of the Joint International Semantic Technology Conference, JIST 2011, held in Hangzhou, China, in December 2011.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the thoroughly refereed post-conference proceedings of three workshops of the 12th International Conference on Web-Age Information Management, WAIM 2011, held in Wuhan, China, in September 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the proceedings of the 21st International Conference on Compiler Construction, CC 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012.
This book constitutes the joint refereed proceedings of the 4th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2012 and Nets4Trains 2012, held in Vilnius, Lithuania, in April 2012.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011.
This book constitutes the refereed proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, held in Grenoble, France, in March 2012.
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011.
This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011.
This book constitutes the refereed proceedings of the 21st European Symposium on Programming, ESOP 2012, held in Tallinn, Estonia, as part of ETAPS 2012, in March/April 2012.
This book constitutes the refereed proceedings of the First International Conference on Biologically Inspired Music, Sound, Art and Design, EvoMUSART 2012, held in Malaga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoCOP, EvoBIO, and EvoApplications.
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies, DALT 2011, held in Taipei, Taiwan, in May 2011.
This book constitutes the refereed proceedings of 4 international workshops held in conjunction with the 14th Asia-Pacific Web Conference, APWeb 2012, in Kunming, China, in April 2012 (see LNCS 7235).
This book constitutes the proceedings of the 8th International Workshop on Programming Multi-Agent Systems held in Toronto, Canada, in May 2010 in conjunction with AAMAS 2010, the 9th International Joint Conference on Autonomous Agents and Multiagent Systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011.
This book constitutes the refereed proceedings of the Second International Multi-topic Conference, IMTIC 2012, held in Jamshoro, Pakistan, in March 2012.
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2011, held in Zanzibar, Tansania, in November 2011.
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011.
This book constitutes the refereed proceedings of the 15th International Conference on Fundamental Approaches to Software Engineering, FASE 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012.
This book constitutes the refereed proceedings of the 5th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, in April 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference, eHealth 2011, held in Malaga, Spain, in November 2011.
This book constitutes the proceedings of the 18th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012.
This book constitutes the refereed proceedings of the International Conference on the Impact of Virtual, Remote and Real Logistic Labs, ImViReLL 2012, held in Bremen, Germany, in Februar/March 2012.
This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011.