Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks.
The design and analysis of electronic commerce systems in which agents are - ployed involves finding solutions to a large and diverse array of problems, concerning individual agent behaviors, interaction, and collective behavior.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
This book constitutes the proceedings of the nine workshops that were organized in conjunction with the Business Information Systems Conference, BIS 2009, taking place in Poznan, Poland, on April 27-29, 2009.
Welcome to the Second International IFIP Entertainment Computing Symposium on st Cultural Computing (ECS 2010), which was part of the 21 IFIP World Computer Congress, held in Brisbane, Australia during September 21-23, 2010.
The IFIP World Computer Congress (WCC) is one of the most important conferences in the area of computer science at the worldwide level and it has a federated structure, which takes into account the rapidly growing and expanding interests in this area.
This book contains a selection of the best papers from WEBIST 2009 (the 5th Int- national Conference on Web Information Systems and Technologies), held in Lisbon, Portugal, in 2009, organized by the Institute for Systems and Technologies of Inf- mation, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC).
th This volume contains the papers selected for the 13 FIRA Robot World Congress, held at Amrita Vishwa Vidyapeetham Bangalore, India, September 15-17, 2010.
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments in recent years.
After the lesson learned during last years and following the successful edition of EC-Web 2009, for its 11th edition EC-Web tried to provide a clearer description of the electronic commerce universe focusing on some relevant topics.
The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009) were held during December 13-14, 2009, in Sanya, Hainan Island, China.
The International Conference on Intelligent Computing (ICIC) was formed to provide an annual forum dedicated to the emerging and challenging topics in artificial intel- gence, machine learning, pattern recognition, image processing, bioinformatics, and computational biology.
This book constitutes the refereed proceedings of the 5th International Conference on High Performance Embedded Architectures and Compilers, HiPEAC 2010, held in Pisa, Italy, in January 2010.
This volume contains the proceedings of the Third International DMTF Academic Alliance Workshop on Systems and Virtualization Management: Standards and the Cloud (SVM 2009) held in Wuhan, China, during September 22-23, 2009.
This year's volume of Advances in Social Network Analysis contains the p- ceedings for the Second International Workshop on Social Network Analysis (SNAKDD 2008).
This book constitutes the refereed proceedings of the 13th International Conference on Principles of Distributed Systems, OPODIS 2009, held in Nimes, France, in December 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the International Workshop on Service-Oriented Computing: Agents, Semantics and Engineering, SOCASE 2009, held in Budapest, Hungary, as an associated event of AAMAS 2009, the main international conference on autonomous agents and multi-agent systems.
th The 11 International Workshop on Knowledge Management and Acquisition for Smart Systems and Services (PKAW 2010) has provided a forum for the past two decades for researchers and practitioners working in the area of machine intelligence.
This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others.
This book constitutes the refereed proceedings of the 4th Australian Conference on Artificial Life, ACAL 2009, held in Melbourne, Australia, in December 2009.
The development and increasingly widespread deployment of high-throughput experimental methods in the life sciences is giving rise to numerous large, c- plex and valuable data resources.
The management of services and operations in today's organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN).
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010.
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23-25, 2010.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2007, held in Honululu, Hawaii, USA, in May 2007, in the context of the 6th International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2007.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.