This volume constitutes the thoroughly refereed conference proceedings of the 25th International Conference on Industrial Engineering and Other Applications of Applied Intelligend Systems, IEA/AIE 2012, held in Dalian, China, in June 2012.
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Agents and Artificial Intelligence, ICAART 2011, held in Rome, Italy, in January 2011.
This book constitutes the refereed proceedings of the 9th International Workshop on Algorithms and Models for the Web-Graph, WAW 2012, held in Halifax, Nova Scotia, Canada, in June 2012.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Broadband Communications, Networks and Systems (BROADNETS 2010) held in October 2010 in Athens, Greece.
This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012.
This book constitutes the refereed proceedings of the 12th International Conference on Software Process Improvement and Capability Determination, SPICE 2012, held in Palma de Mallorca, Spain, in May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Game Theory for Networks (GameNets 2011) held in Shanghai, China, April 16-18, 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International ICST Conference on Wireless Internet (WICON 2011) held in Xi'an, Shaanxi, China in October 2011.
This book constitutes the refereed proceedings of the Third International Conference on Computational Logistics, held in Shanghai, China, in September 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Mobile Networks and Managements (MONAMI 2011) held in Aveiro, Portugal, in September 2011.
This book constitutes the refereed proceedings of the International Symposium on Bioinformatics Research and Applications, ISBRA 2012, held in Dallas, Texas, USA, in May 2012.
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10.
This book constitutes the refereed proceedings of the Turing Centenary Conference and the 8th Conference on Computability in Europe, CiE 2012, held in Cambridge, UK, in June 2012.
This book constitutes revised and selected papers of the 9th European Workshop on Reinforcement Learning, EWRL 2011, which took place in Athens, Greece in September 2011.
This book constitutes the refereed proceedings of the 9th International Conference on Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2012, held in Nantes, France, in May/June 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011.
This book constitutes thoroughly refereed post-conference proceedings ofthe workshops of the 17th International Conference on ParallelComputing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Applications of Models of Computation, TAMC 2012, held in Beijing, China, in May 2012.
This book constitutes thoroughly refereed post-conference proceedings of the workshops of the 17th International Conference on Parallel Computing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
This book constitutes the refereed proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology, RECOMB 2012, held in Barcelona, Spain, in April 2012.
This book contains thoroughly refereed and revised papers from the 8th International Andrei Ershov Memorial Conference on Perspectives of System Informatics, PSI 2011, held in Akademgorodok, Novosibirsk, Russia, in June/July 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.
This book constitutes the refereed proceedings of the 6th International Frontiers of Algorithmics Workshop, FAW 2012, and the 8th International Conference on Algorithmic Aspects in Information and Management, AAIM 2012, jointly held in Beijing, China, in May 2012.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the proceedings of the 21st International Conference on Compiler Construction, CC 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012.
This book constitutes the proceedings of the 10th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICA 2012, held in Tel Aviv, Israel, in March 2012.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011.
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011.
This book constitutes the refereed proceedings of the 12th European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2012, held in Malaga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoBIO, EvoMUSART, and EvoApplications.
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Approximation and Online Algorithms, WAOA 2011, held in Saarbrucken, Germany, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011.
This book constitutes the refereed proceedings of the 10th European Conference on Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, EvoBIO 2012, held in Malaga, Spain, in April 2012 co-located with the Evo* 2012 events.
This book constitutes the refereed proceedings of the Second International Multi-topic Conference, IMTIC 2012, held in Jamshoro, Pakistan, in March 2012.
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011.
This two-volume set (CCIS 267 and CCIS 268) constitutes the refereed proceedings of the International Conference on Information and Business Intelligence, IBI 2011, held in Chongqing, China, in December 2011.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012.
This book constitutes thoroughly refereed revised selected papers from the First IAPR TC3 Workshop on Partially Supervised Learning, PSL 2011, held in Ulm, Germany, in September 2011.
This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011.