Although the quality of a system's software architecture is one of the critical factors in its overall quality, the architecture is simply a means to an end, the end being the implemented system.
This volume, LNCS 3961, contains the papers selected from those presented at the International Conference on Information Networking 2006 (ICOIN 2006), held in Sendai, Japan.
This volume contains the papers and posters selected for presentation at the First European Conference on Smart Sensing and Context (EuroSSC 2006) in Enschede, The Netherlands.
th This volume presents the proceedings of the 6 IEEE International Workshop on IP Operations and Management (IPOM 2006), which was held as part of Manweek 2006 rd th in Dublin, Ireland from October 23 to 25 , 2006.
This book constitutes the refereed proceedings of the First International Conference on Grid and Pervasive Computing, GPC 2006, held in Taichung, Taiwan, in May 2006.
TheWebisaliveenvironmentthatmanagesanddrivesawidespectrumofapp- cations in which a user may interact with a company, a governmental authority, a non-governmental organization or other non-pro?
This volume of Lecture Notes in Computer Science contains all accepted papers th of the 5 International Conference on Innovative Internet Community Systems 2 (I CS), which was held at the Sorbonne in Paris, from June 20-22, 2005.
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others.
This book contains selected and revised papers of the International Workshop on Lea- ing and Adaptation in Multi-Agent Systems (LAMAS 2005), held at the AAMAS 2005 Conference in Utrecht, The Netherlands, July 26.
This book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2005, held in Coventry, UK, in May 2005.
Defence applications are subject to some of the world's most demanding requirements for reliability, controllability, security, flexibility, and synchronization.
The autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly as follows: Autonomic communication is centered on selfware - an innovative approach to perform known and emerging tasks of a network control plane, both end-to-end and middle box communication-based.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.
For more than a decade, data warehousing together with knowledge discovery technology have made up the key technology for the decision-making process in companies.
This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005).
Welcome to the proceedings of the 2006 International Conference on High- Performance Computing and Communications (HPCC 2006), which was held in Munich, Germany, September 13-15, 2006.
Fifteen years after the publication of Weiser's seminal paper in Scientific American, ubiquitous computing is a large, thriving field of academic research and commercial innovation.
- semantic caching - data warehousing and semantic data mining - spatial, temporal, multimedia and multimodal semantics - semantics in data visualization - semantic services for mobile users - supporting tools - applications of semantic-driven approaches These topics are to be understood as speci?
This volume contains the papers presented at the 2nd European Semantic Web Conference (ESWC 2005) held in Heraklion, Crete, Greece, from 29th May to 1st June, 2005.
Welcome to the proceedings of the 2005 International Conference on Emb- ded Software and Systems (ICESS 2005) held in Xian, China, December 16-18, 2005.