rd This book constitutes a collection of extended versions of papers presented at the 23 IFIP TC7 Conference on System Modeling and Optimization, which was held in C- cow, Poland, on July 23-27, 2007.
This volume contains the papers presented at 6th Conference on Geometric Modeling and Processing (GMP 2010) held in Castro Urdiales, Spain during June16-18,2010.
This book constitutes the proceedings of the 7th International Symposium on Automated Technology for Verification and Analysis, ATVA 2009, held in Macao, China, in October 2009.
It is our great pleasure to present the proceedings of the symposia and workshops on parallel and distributed computing and applications associated with the ICA3PP 2010 conference.
Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals.
This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009.
The International Conference on Autonomous Infrastructure, Management and Se- rity (AIMS 2010) was a single-track event integrating regular conference paper s- sions, tutorials, keynotes, and a PhD student workshop into a highly interactive event.
The International Conference on Wireless and Mobile networks (WiMo) aims to bring together innovative ideas and new research trends in wireless and mobile networks.
It is our great pleasure to welcome you to the proceedings of the 10th annual event of the International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP).
This book constitutes the refereed proceedings of the 8th International Conference on Unconventional Computation, UC 2009, held in Ponta Delgada, Portugal, in September 2009.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Digital Watermarking, IWDW 2008, held in Busan, Korea, in November 2008.
This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009.
This book constitutes the refereed proceedings of the 15th IAPR International Conference on Discrete Geometry for Computer Imagery, DGCI 2009, held in Montreal, Canada, in September/October 2009.
This book constitutes the refereed proceedings of the Second International Conference on the Theory of Information Retrieval, ICTIR 2009, held in Cambridge, UK, in September 2009.
This book constitutes the refereed proceedings of the 23nd International Symposium on Distributed Computing, DISC 2009, held in Elche, Spain, in September 2009.
The IDEAL conference boast a vibrant and successful history dating back to 1998, th and this edition marked the 10 anniversary, an important milestone demonstrating the increasing popularity and high quality of the IDEAL conferences.
This book constitutes the refereed proceedings of the 5th International Symposium on Stochastic Algorithms, Foundations and Applications, SAGA 2009, held in Sapporo, Japan, in October 2009.
This book constitutes the refereed proceedings of the 16th String Processing and Information Retrieval Symposium, SPIRE 2009 held in Saariselka, Finland in August 2009.
This book constitutes the refereed proceedings of the 13th East European Conference on Advances in Databases and Information Systems, ADBIS 2009, held in Riga, Latvia, on September 7-10, 2009.
ThisbookpresentsselectedandrevisedpapersoftheSecondWorkshoponAd- tive and Learning Agents 2009 (ALA-09), held at the AAMAS 2009 conference in Budapest, Hungary, May 12.
This book constitutes the refereed proceedings of the 17th International Symposium Fundamentals of Computation Theory, FCT 2009, held in Wroclaw, Poland in August 2009.
This book constitutes the refereed proceedings of the Third International Conference on Pairing-Based Cryptography, Pairing 2009, held in Palo Alto, CA, USA, in August 2009.
This volume contains the papers selected for presentation at the 4th Brazilian Sym- sium on Bioinformatics, BSB 2009, which was held in Porto Alegre, Brazil, during August 29-31, 2009.
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009.
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this volume constitutes a selection of papers presented at the Internatonal Conference on Infinity in Logic and Computation, ILC 2007, held in Cape Town, South Africa, in November 2007.
This book constitutes the refereed proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2009, held in Taipei, Taiwan, in June 2009.
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009.
First established in August 1988, the Transaction Processing Performance Council (TPC) has shaped the landscape of modern transaction processing and database benchmarks over two decades.