The 2010 Asian Conference on Intelligent Information and Database Systems (ACIIDS) was the second event of the series of international scientific conferences for research and applications in the field of intelligent information and database systems.
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries.
The 2010 International Conference on Life System Modeling and Simulation (LSMS 2010) and the 2010 International Conference on Intelligent Computing for Sustainable Energy and Environment (ICSEE 2010) were formed to bring together researchers and practitioners in the fields of life system modeling/simulation and intelligent computing applied to worldwide sustainable energy and environmental applications.
The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organised by the International Federation for Information Processing (IFIP).
Wireless sensor networks (WSNs) are envisioned to enable a variety of applications including environmental monitoring, building and plant automation, homeland se- rity and healthcare.
This book constitutes the refereed proceedings of the Seventh Theory of Cryptography Conference, TCC 2010, held in Zurich, Switzerland, February 9-11, 2010.
This volume contains the papers presented at RECOMB 2010: the 14th Annual International Conference on Research in Computational Molecular Biology held in Lisbon, Portugal, during April 25-28, 2010.
Ad hoc networks refer to the wireless networking paradigm that covers a variety of network forms for specific purposes, such as mobile ad hoc networks, sensor n- works, vehicular networks, underwater networks, underground networks, personal area networks, and home networks.
The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security.
The first International Workshop on Machine Learning in Medical Imaging, MLMI 2010, was held at the China National Convention Center, Beijing, China on Sept- ber 20, 2010 in conjunction with the International Conference on Medical Image Computing and Computer Assisted Intervention (MICCAI) 2010.
With the rapid growth of the Internet as well as the increasing demand for broadband services, access networks have been receiving growing investments in recent years.
The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009) were held during December 13-14, 2009, in Sanya, Hainan Island, China.
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2009, held in Waterloo, Canada, in May 2009.
This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Information Theoretic Security, ICITS 2007, held in Madrid, Spain, in May 2007.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others.
This book constitutes the refereed proceedings of the 12th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2009.
We are proud to present the proceedings of NET-COOP 2009, the inter- tionalconferenceonnetworkcontrolandoptimization,co-organizedbyEURAN- DOM/Eindhoven University of Technology and CWI.