This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012.
The two volume set LNCS 7133 and LNCS 7134 constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Applied Parallel and Scientific Computing, PARA 2010, held in Reykjavik, Iceland, in June 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Symposium on Parameterized and Exact Computation, IPEC 2011, in Saarbrucken, Germany, in September 2011.
This book constitutes the refereed proceedings of the 24th Australasian Joint Conference on Artificial Intelligence, AI 2011, held in Perth, Australia, in December 2011.
This volume constitutes the refereed proceedings of the 19th International Symposium on Graph Drawing, GD 2010, held in Eindhoven, The Netherlands, during September 2011.
This book constitutes the revised selected papers of the 37th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2011, held at Tepla Monastery, Czech Republic, in June 2011.
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2011, held in Lednice, Czech Republic, on October 14-16, 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Distributed Computing and Networking, ICDCN 2012, held in Hong Kong, China, during January 3-6, 2012.
The two-volume set LNAI 7120 and LNAI 7121 constitutes the refereed proceedings of the 7th International Conference on Advanced Data Mining and Applications, ADMA 2011, held in Beijing, China, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010.
This book constitutes the refereed proceedings of the 8th Discourse Anaphora and Anaphor Resolution Colloquium, DAARC 2011, held in Faro, Portugal, in October 2011.
The two-volume set LNAI 7120 and LNAI 7121 constitutes the refereed proceedings of the 7th International Conference on Advanced Data Mining and Applications, ADMA 2011, held in Beijing, China, in December 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St.
This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2012, held in Spindleruv Mlyn, Czech Republic, in January 2012.
This book constitutes the refereed proceedings of the 7th International Workshop on Internet and Network Economics, WINE 2011, held in Singapore, in December 2011.
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2012, held in Philadelphia, PA, USA, in January 2012, co-located with the Symposium on Principles of Programming Languages, POPL 2012.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012.
This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Learning and Intelligent Optimization, LION 5, held in Rome, Italy, in January 2011.
This book constitutes the refereed proceedings of the 22nd International Symposium on Algorithms and Computation, ISAAC 2011, held in Yokohama, Japan in December 2011.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011.
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011.
This book constitutes the refereed proceedings of the International Conference, VISIGRAPP 2010, the Joint Conference on Computer Vision Theory and Applications (VISAPP), on Imaging Theory and Applications (IMAGAPP), and on Computer Graphics Theory and Applications (GRAPP), held in Angers, France, in May 2010.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This book constitutes the refereed proceedings of the 14th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2009, held in La Laguna, Canary Islands, Spain, in November 2011.
This book constitutes the refereed proceedings of the 16th Iberoamerican Congress on Pattern Recognition, CIARP 2011, held in Pucon, Chile, in November 2011.
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011.
This book constitutes the refereed proceedings of the International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2011, held in Hangzhou, China, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010.
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011.
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, held in Singapore in May 2011.
This book constitutes the thoroughly referred post-workshop proceedings of the 22nd International Workshop on Combinatorial Algorithms, IWOCA 2011, held in Victoria, BC, Canada, in July 2011.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011.
This book constitutes the refereed proceedings of the 10th International Conference on Intelligent Data Analysis, IDA 2011, held in Porto, Portugal, in October 2011.
This book constitutes the refereed proceedings of the Second International Conference on Algorithmic Decision Theory, ADT 2011, held in Piscataway, NJ, USA, in October 2011.
This book constitutes the refereed proceedings of the 6th International Conference on Pattern Recognition in Bioinformatics, PRIB 2011, held in Delft, The Netherlands, in November 2011.
This book constitutes the refereed proceedings of the Second International Conference on Information Computing and Applications, ICICA 2010, held in Qinhuangdao, China, in October 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the refereed proceedings of the Second International Workshop on Machine Learning in Medical Imaging, MLMI 2011, held in conjunction with MICCAI 2011, in Toronto, Canada, in September 2011.