Data Warehousing and Knowledge Discovery have been widely accepted as key te- nologies for enterprises and organizations to improve their abilities in data analysis, decision support, and the automatic extraction of knowledge from data.
This volume contains the proceedings of the 15th International Conference on Conceptual Structures (ICCS 2007), which is an annual event that, for the ?
This volume contains the papers presented at the 7th International Conference on Independent Component Analysis (ICA) and Source Separation held in L- don, 9-12 September 2007, at Queen Mary, University of London.
CiE 2008: Logic and Theory of Algorithms Athens, Greece, June 15-20, 2008 Computability in Europe (CiE) is an informal network of European scientists working on computability theory, including its foundations, technical devel- ment, and applications.
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008.
The Annual International Computing and Combinatorics Conference is an annual forum for exploring research, development, and novel applications of computing and combinatorics.
The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, held on Santorini Island, Greece, in June 2008.
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20-21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006).
This book constitutes the thoroughly refereed post-workshop proceedings of the First and the Second International Workshop on OpenMP, IWOMP 2005 and IWOMP 2006, held in Eugene, OR, USA, and in Reims, France, in June 2005 and 2006 respectively.
The Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP) is a forum bringing together researchers and practitioners in these related areas, coming from national and international academic institutes, from government research and development laboratories, and from industry.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Asia Information Retrieval Symposium, AIRS 2008, held in Harbin, China, in May 2008.
The papers contained in this volume were presented at the 19th Annual S- posium on Combinatorial Pattern Matching (CPM 2008) held at the University of Pisa, Italy, June 18-20, 2008.
We present in this volume the collection of finally accepted papers for the ninth e- tion of the IWANN conference ("e;International Work-Conference on Artificial Neural Networks"e;).
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Africa, held in Casablanca, Morocco, in June 2008.
Welcome to the proceedings of the 2008 International Conference on Grid and Pervasive Computing (GPC 2008) which was held in Kunming, Yunnan, China, May 25-28, 2008.
VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic Issues in Wireless Sensor Networks, and Optical Networking.
Welcome to the proceedings of the 4th International Symposium on Parallel and Distributed Processing and Applications (ISPA 2006), which was held in Sorrento, Italy, December, 4-6 2006.
This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Processing of Oriental Languages, ICCPOL 2006, held in Singapore in December 2006, colocated with ISCSLP 2006, the 5th International Symposium on Chinese Spoken Language Processing.
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4-7, 2006.
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication.