This bookaims at promoting high-quality research by researchers and practitioners fromacademia and industry at the InternationalConference on Computational Intelligence, Cyber Security, and ComputationalModels ICC3 2015 organized by PSG College of Technology, Coimbatore, Indiaduring December 17 19, 2015.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15).
This book constitutes the referred proceedings of the 9th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLLAB 2023, held in Buenos Aires, Argentina, during September 13-15, 2023.
This book constitutes the refereed proceedings of the 5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024, held in Bhimavaram, India, during April 5-7, 2024.
This book constitutes the referred proceedings of the 9th Iberoamerican Workshop on Human-Computer Interaction, HCI-COLLAB 2023, held in Buenos Aires, Argentina, during September 13-15, 2023.
Digital technology is increasingly used in the healthcare sector, and healthcare organizations handle sensitive and confidential information that needs to be kept secure and protected.
This book constitutes the refereed post-conference proceedings of the 19th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2023, held in October 2023.
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curacao, during March 4-8, 2024.
This book constitutes the jointly proceedings of the 3rd International Conference on Intelligent Edge Processing in the IoT Era, Edge-IoT 2022, and the 4th International Conference on Smart Governance for Sustainable Smart Cities, SmartGov 2022.
This book constitutes the refereed proceedings of the 12th Annual Privacy Forum on Privacy Technologies and Policy, APF 2024, held in Karlstad, Sweden, during September 4-5, 2024.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
The evolving landscape of technology has presented numerous opportunities for addressing some of the most critical challenges in high-stakes domains such as medicine, law, and finance.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science.
This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016.
This volume, the 35th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully-revised selected regular papers focusing on data quality, social-data artifacts, data privacy, predictive models, and e-health.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science.
This book constitutes the refereed proceedings of the 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, held in Turku, Finland, in July/August 2014.
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios.
Dive into the fascinating world of Digital Twins, Simulation, and the Metaverse, where the virtual/digital and physical worlds collide and reshape industries.
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science.
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012.
This book offers a comprehensive dive into the rapidly evolving world of autonomous vehicles and their pivotal role in modern data collection and mission-critical operations.
Eurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the International Association for Cryptologic Research (IACR).
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book covers several essential aspects of pervasive ambient backscatter communication, one of the most cutting-edge technologies for Internet-of-Things.
This handbook, now as second edition, continues to comprehensively cover the cutting-edge trends and techniques essential for the integration of nondestructive evaluation (NDE) into the changing face of the modern industrial landscape.
This book offers a novel multi-portfolio approach and stochastic programming formulations for modeling and solving contemporary supply chain risk management problems.
This book aims to gather high-quality research papers on developing theories, frameworks, architectures, and algorithms for solving complex challenges in smart healthcare applications for real industry use.
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population.