These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
In this monograph, Joachim Baumann provides in-depth coverage of essential research issues; namely, mechanisms for locating and terminating mobile agents and for orphan detection in a mobile agent system.
The 3rd International Workshop on Software Engineering and Middleware {SEM 2002) was held May 20-21, 2002, in Orlando, Florida, as a co-located event of the 2002 International Conference on Software Engineering.
This book describes recent multidisciplinary research at the confluence of the fields of logic programming, database theory and human-computer interaction.
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics.
Data management has evolved over the years from being strictly associated with database systems, through active databases, to become a topic that has grown beyond the scope of a single field encompassing a large range of subjects, such as distributed systems, event-driven systems, and peer-to-peer and streaming systems.
This book constitutes the strictly reviewed post-workshop documentation of the First International Conference on Cooperative Multimodal Communication held in Eindhoven, The Netherlands, in 1995.
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa.
This volume is based on the contributions to the International Workshop on the Web and Databases (WebDB'98), held in Valencia, Spain, March 27 and 28, 1998, in conjunction with the Sixth International Conference on Extending Database Technology (EDBT'98).
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM'99), which took place at the ETH Zurich in Switzerland and was hosted by the Computer Engineering and Networking Laboratory, TIK.
This book constitutes the refereed proceedings of the First International Workshop on Active Networks, IWAN'99, held in Berlin, Germany in June/July 1999.
Creation Techniques for Software Development and Deployment, Agent-Based Management, Virtual Home Environment, Integrated and Scalable Solutions for Telecommunications Management.
Scalable Coherent Interface (SCI) is an innovative interconnect standard (ANSI/IEEE Std 1596-1992) addressing the high-performance computing and networking domain.
This book constitutes the refereed proceedings of the 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2000, held as part of ETAPS 2000 in Berlin, Germany, in March/April 2000.
Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara.
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics and lawyers, economists and business practitioners.
This book constitutes the thoroughly refereed post-proceedings of the International Conference on Information Networking, ICOIN 2003, held at Cheju Island, Korea in February 2003.
This book contains the papers presented at the 13th International Workshop on Field Programmable Logic and Applications (FPL) held on September 1-3, 2003.
This collection represents the proceedings of the 1st GSFC/JPL Workshop on Radical Agent Concepts (WRAC), which was held on 16-18 January, 2002 at the Science Applications International Corporation (SAIC) Conference Center in McLean, VA, USA.
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas.
th We are very happy to present the proceedings of the 8 International Workshop on Interactive Distributed Multimedia Systems IDMS 2001, in co-operation with ACM SIGCOMM and SIGMM.
Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003.
This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.