This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009.
The 4th International Conference on Hybrid Artificial Intelligence Systems (HAIS 2009), as the name suggests, attracted researchers who are involved in developing and applying symbolic and sub-symbolic techniques aimed at the construction of highly robust and reliable problem-solving techniques, and bringing the most relevant achievements in this field.
This book constitutes the proceedings of the First International Conference on User Modeling, Adaptation, and Personalization, held in Trento, Italy, on June 22-26, 2009.
This book constitutes the refereed proceedings of the 16th International Conference on Analytical and Stochastic Modeling Techniques and Applications, ASMTA 2009, held in Madrid, Spain, in June 2009 in conjunction with ECMS 2009, the 23nd European Conference on Modeling and Simulation.
This book constitutes the thoroughly refereed postproceedings of the 9th International Workshop on Multi-Agent-based Simulation, MABS 2008, held in Estoril, Portugal, in May 2008.
This book constitutes the refereed proceedings of the 30th annual European Conference on Information Retrieval Research, ECIR 2009, held in Toulouse, France in April 2009.
This book constitutes the refereed proceedings of the 21st International Conference on Advanced Information Systems Engineering, CAiSE 2009, held in Amsterdam, The Netherlands, on June 8-12, 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Networks for Grid Applications, GridNets 2008, held in Beijing, China in October 2008.
The book constitutes the refereed proceedings of the Fifth International Conference on Distributed Computing in Sensor Systems, DCOSS 2009, held in Marina del Rey, CA, USA, in June 2009.
This book constitutes the refereed proceedings of the 11th International Conference on Coordination Models and Languages, COORDINATION 2009, held in Lisbon, Portugal, in June 2009, as one of the federated conferences on Distributed Computing Techniques, DisCoTec 2009.
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009.
This volume contains the proceedings of the 7th International Working Conference on Active and Programmable Networks (IWAN 2005) that was held during November 21-23, 2005, in Sophia Antipolis, Cote d' Azur, France, jointly organized by Hitachi Europe and INRIA.
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.
This book constitutes the proceedings of the 14th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2009, held in Brest, France, on June 8-12, 2009.
This book constitutes the refereed proceedings of the 10th International Conference on Passive and Active Measurement, PAM 2009, held in Seoul, Korea, in April 2009.
This book constitutes the refereed proceedings of the 14th International Conference on Database Systems for Advanced Applications, DASFAA 2009, held in Brisbane, Australia, in April 2009.
This book constitutes the refereed proceedings of the 7th International Conference on Pervasive Computing, Pervasive 2009, held in Nara, Japan, in May 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Web Services and Formal Methods, WS-FM 2008, held in Milan, Italy, in September 2008 in conjunction with the 6th International Conference on Business Process Management, BPM 2008.
Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications.
This book constitutes the thoroughly refereed papers presented at five international workshops held in conjunction with the 6th International Conference on Service-Oriented Computing, ICSOC 2008, in Sydney, Australia, in December 2008.
This book constitutes the proceedings of the 4th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom2008, held in Paris, France, on December 13, 2008.
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009.
This book constitutes the thoroughly refereed post-workshop proceedings of the 10th Pacific Rim International Workshop on Multi-Agents, PRIMA 2007, held in Bankok, Thailand, in November 2007.
This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.
This volume contains the proceedings of the Second International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT 2009), held in Orlando, Florida on September 30, 2009 in conjunction with the 11th International Conference on Ubiquitous Computing (Ubicomp 2009).
This book constitutes the refereed proceedings of the 18th International Conference on Compiler Construction, CC 2009, held in York, UK, in March 2009 as part of ETAPS 2009, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the refereed proceedings of the 12th International Conference on Hybrid Systems: Computation and Control, HSCC 2009, held in San Francisco, CA, USA, in April 2009.
Research and development of autonomics have come a long way, and we are - lighted to present the proceedings of the 4th IEEE International Workshop on Modeling Autonomic Communications Environments (MACE 2009).
Thisyear'svolumeofAdvancesinWebMiningandWebUsageAnalysiscontains thepostworkshopproceedingsofajointevent,the9thInternationalWorkshopon Knowledge Discovery from the Web (WEBKDD 2007) and the First SNA-KDD Workshop on Social Network Analysis (SNA-KDD 2007).
This book constitutes the refereed proceedings of the 22nd International Conference on Architecture of Computing Systems, ARCS 2009, held in Delft, The Netherlands, in March 2009.
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009.