The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial and proprietary engineering software tools (e.
Since its first edition in 2003, the XML Database Symposium series (XSym) has been a forum for academics, practitioners, users and vendors to discuss the use of and synergy between databases and XML.
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management.
Program Chairs' Message th The 4 International Service Availability Symposium (ISAS 2007) continued with the tradition of its predecessors by bringing together researchers and practitioners from both academia and industry to address the problems of service availability.
Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications.
The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the design, implementation, app- cation and evaluation of ubiquitous computing technologies.
On behalf of the organizing committee for EuroSSC 2007, we would like to welcome you to the proceedings of the second European Conference on Smart Sensing and Context.
The modern world has made available a wealth of new possibilities for interacting with computers, through advanced Web applications, while on the go with handheld smart telephones or using electronic tabletops or wall-sized displays.
* Semantic caching * Data warehousing and semantic data mining * Spatial, temporal, multimedia and multimodal semantics * Semantics in data visualization * Semantic services for mobile users * Supporting tools * Applications of semantic-driven approaches These topics are to be understood as specifically related to semantic issues.
On behalf of the IEEE Communications Society, the Technical Committee on Network Operations and Management (CNOM), the Manweek 2007 Organizing Committee, and the members of the IPOM Technical Program Committee, it is our pleasure to present the proceedings of the Seventh IEEE Workshop on IP Operations and Management (IPOM2007), held as part of Manweek 2007 during October 31-November 2, 2007.
This book contains the best papers of the Third International Conference on E-business and Telecommunications (ICETE), which was held in 2006 in Portugal.
This book constitutes the refereed proceedings of the 8th International Workshop on Systems, Architectures, Modeling, and Simulation, SAMOS 2008, held in Samos, Greece, in July 2008.
CHES2007,theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007.
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing.