This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011.
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011.
This book constitutes the refereed proceedings of the International Conference, VISIGRAPP 2010, the Joint Conference on Computer Vision Theory and Applications (VISAPP), on Imaging Theory and Applications (IMAGAPP), and on Computer Graphics Theory and Applications (GRAPP), held in Angers, France, in May 2010.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This book constitutes the refereed proceedings of the 4th International Workshop on Post-Quantum Cryptography, PQCrypto 2011, held in Taipei, Taiwan, in November/December 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011.
This book constitutes the refereed proceedings of the 14th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2009, held in La Laguna, Canary Islands, Spain, in November 2011.
This book constitutes the refereed proceedings of the 16th Iberoamerican Congress on Pattern Recognition, CIARP 2011, held in Pucon, Chile, in November 2011.
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011.
This book constitutes the refereed proceedings of the International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2011, held in Hangzhou, China, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business and Telecommunications, ICETE 2010, held in Athens, Greece, in July 2010.
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011.
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.
The two-volume set LNCS 7066 and LNCS 7067 constitutes the proceedings of the Second International Visual Informatics Conference, IVIC 2011, held in Selangor, Malaysia, during November 9-11, 2011.
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, held in Singapore in May 2011.
This book constitutes the thoroughly referred post-workshop proceedings of the 22nd International Workshop on Combinatorial Algorithms, IWOCA 2011, held in Victoria, BC, Canada, in July 2011.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011.
This book constitutes the refereed proceedings of the 10th International Conference on Intelligent Data Analysis, IDA 2011, held in Porto, Portugal, in October 2011.
This book constitutes the refereed proceedings of the Second International Conference on Algorithmic Decision Theory, ADT 2011, held in Piscataway, NJ, USA, in October 2011.
This book constitutes the refereed proceedings of the 6th International Conference on Pattern Recognition in Bioinformatics, PRIB 2011, held in Delft, The Netherlands, in November 2011.
This book constitutes the refereed proceedings of the Second International Conference on Information Computing and Applications, ICICA 2010, held in Qinhuangdao, China, in October 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.
This book constitutes the refereed proceedings of the Second International Workshop on Machine Learning in Medical Imaging, MLMI 2011, held in conjunction with MICCAI 2011, in Toronto, Canada, in September 2011.
This book constitutes the refereed proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems, FORMATS 2011, held in Aalborg, Denmark, in September 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the China-Japan Joint Conference on Computational Geometry, Graphs and Applications, CGGA 2010, held in Dalian, China, in November 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Symposium on Quantum Interaction, QI 2011, held in Aberdeen, UK, in June 2011.
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on Software Engineering and Computer Systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.
This book constitutes the refereed proceedings of the 13th International Conference on Formal Engineering Methods, ICFEM 2011, held in Durham, UK, October 2011.
This book constitutes the proceedings of the 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, held in Grenoble, France, in October 2011.
This book constitutes the refereed proceedings of the 14th International Conference on Discovery Science, DS 2011, held in Espoo, Finland, in October 2011 - co-located with ALT 2011, the 22nd International Conference on Algorithmic Learning Theory.
This book constitutes the refereed proceedings of the 18th European MPI Users' Group Meeting on Recent Advances in the Message Passing Interface, EuroMPI 2011, held in Santorini, Greece, in September 2011.
This book constitutes the refereed proceedings of the 8th International Symposium on Frontiers of Combining Systems, FroCoS 2011, held in Saarbrucken, Germany, in October 2011.
This book constitutes the refereed proceedings of the 22nd International Conference on Algorithmic Learning Theory, ALT 2011, held in Espoo, Finland, in October 2011, co-located with the 14th International Conference on Discovery Science, DS 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the workshops held at the 37th International Symposium on Computer Architecture, ISCA 2010, in Saint-Malo, France, in June 2010.
The three-volume set LNAI 7196, LNAI 7197 and LNAI 7198 constitutes the refereed proceedings of the 4th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2012, held in Kaohsiung, Taiwan in March 2012.
This book constitutes, together with LNAI 7002, LNAI 7003, and LNAI 7004, the refereed proceedings of the International Conference on Artificial Intelligence and ComputationaI Intelligence, AICI 2011, held in Taiyuan, China, in September 2011.
This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011.
This book constitutes the proceedings of the 11th International Conference on Transport Systems Telematics, TST 2011, held in Katowice-Ustron, Poland, in October 2011.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010.